WorldWideScience

Sample records for mesh network devices

  1. Method and system for mesh network embedded devices

    Wang, Ray (Inventor)

    2009-01-01

    A method and system for managing mesh network devices. A mesh network device with integrated features creates an N-way mesh network with a full mesh network topology or a partial mesh network topology.

  2. Measurement campaign on connectivity of mesh networks formed by mobile devices

    Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo

    2007-01-01

    This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...

  3. Wireless mesh networks.

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

  4. Multipath diffuse routing over heterogeneous mesh networks of web devices and sensors

    Vitale, G.; Stassen, M.L.A.; Colak, S.B.; Pronk, V.; Macq, B.; Quisquater, J.-.J.

    2002-01-01

    In this paper we present a new data flow algorithm based on physical diffusion for dense device networks needed for future ubiquitous communications. This diffuse data routing concept is based on multi-path signal propagation aided with adaptive beam-forming methods. Adaptation for beam-forming at

  5. Capacity Analysis of Wireless Mesh Networks

    M. I. Gumel

    2012-06-01

    Full Text Available The next generation wireless networks experienced a great development with emergence of wireless mesh networks (WMNs, which can be regarded as a realistic solution that provides wireless broadband access. The limited available bandwidth makes capacity analysis of the network very essential. While the network offers broadband wireless access to community and enterprise users, the problems that limit the network capacity must be addressed to exploit the optimum network performance. The wireless mesh network capacity analysis shows that the throughput of each mesh node degrades in order of l/n with increasing number of nodes (n in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network.

  6. How to model wireless mesh networks topology

    Sanni, M L; Hashim, A A; Anwar, F; Ali, S; Ahmed, G S M

    2013-01-01

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  7. Energy-efficient wireless mesh networks

    Ntlatlapa, N

    2007-06-01

    Full Text Available This paper outlines the objectives of a recently formed research group at Meraka Institute. The authors consider application of wireless mesh networks in rural infrastructure deficient parts of the African continent where nodes operate on batteries...

  8. Towards Blockchain-enabled Wireless Mesh Networks

    Selimi, Mennan; Kabbinale, Aniruddh Rao; Ali, Anwaar; Navarro, Leandro; Sathiaseelan, Arjuna

    2018-01-01

    Recently, mesh networking and blockchain are two of the hottest technologies in the telecommunications industry. Combining both can reformulate internet access and make connecting to the Internet not only easy, but affordable too. Hyperledger Fabric (HLF) is a blockchain framework implementation and one of the Hyperledger projects hosted by The Linux Foundation. We evaluate HLF in a real production mesh network and in the laboratory, quantify its performance, bottlenecks and limitations of th...

  9. Heterogeneous Wireless Mesh Network Technology Evaluation for Space Proximity and Surface Applications

    DeCristofaro, Michael A.; Lansdowne, Chatwin A.; Schlesinger, Adam M.

    2014-01-01

    NASA has identified standardized wireless mesh networking as a key technology for future human and robotic space exploration. Wireless mesh networks enable rapid deployment, provide coverage in undeveloped regions. Mesh networks are also self-healing, resilient, and extensible, qualities not found in traditional infrastructure-based networks. Mesh networks can offer lower size, weight, and power (SWaP) than overlapped infrastructure-perapplication. To better understand the maturity, characteristics and capability of the technology, we developed an 802.11 mesh network consisting of a combination of heterogeneous commercial off-the-shelf devices and opensource firmware and software packages. Various streaming applications were operated over the mesh network, including voice and video, and performance measurements were made under different operating scenarios. During the testing several issues with the currently implemented mesh network technology were identified and outlined for future work.

  10. Mesh networks: an optimum solution for AMR

    Mimno, G.

    2003-12-01

    Characteristics of mesh networks and the advantage of using them in automatic meter reading equipment (AMR) are discussed. Mesh networks are defined as being similar to a fishing net made of knots and links. In mesh networks the knots represent meter sites and the links are the radio paths between the meter sites and the neighbourhood concentrator. In mesh networks any knot in the communications chain can link to any other and the optimum path is calculated by the network by hopping from meter to meter until the radio message reaches a concentrator. This mesh communications architecture is said to be vastly superior to many older types of radio-based meter reading technologies; its main advantage is that it not only significantly improves the economics of fixed network deployment, but also supports time-of-use metering, remote disconnect services and advanced features, such as real-time pricing, demand response, and other efficiency measures, providing a better return on investment and reliability.

  11. Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank

    2013-01-01

    This paper introduces a design and simulation of a locally optimized network coding protocol, called PlayNCool, for wireless mesh networks. PlayN-Cool is easy to implement and compatible with existing routing protocols and devices. This allows the system to gain from network coding capabilities i...

  12. Performance Evaluation of Coded Meshed Networks

    Krigslund, Jeppe; Hansen, Jonas; Pedersen, Morten Videbæk

    2013-01-01

    of the former to enhance the gains of the latter. We first motivate our work through measurements in WiFi mesh networks. Later, we compare state-of-the-art approaches, e.g., COPE, RLNC, to CORE. Our measurements show the higher reliability and throughput of CORE over other schemes, especially, for asymmetric...

  13. Novel Concepts for Device to Device Communication using Network Coding

    Pahlevani, Peyman; Hundebøll, Martin; Pedersen, Morten Videbæk

    2014-01-01

    Device-to-device communication is currently a hot research topic within 3GPP. Even though D2D communication has been part of previous ad hoc, meshed and sensor networks proposals, the main contribution by 3GPP is that the direct communication among two devices is carried out over a dynamically as...

  14. Capacity analysis of wireless mesh networks | Gumel | Nigerian ...

    ... number of nodes (n) in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network. Key words: Wireless mesh network (WMN), Adhoc network, Network capacity analysis, Bottleneck collision domain, Medium access control ...

  15. Scalable Video Streaming in Wireless Mesh Networks for Education

    Liu, Yan; Wang, Xinheng; Zhao, Liqiang

    2011-01-01

    In this paper, a video streaming system for education based on a wireless mesh network is proposed. A wireless mesh network is a self-organizing, self-managing and reliable intelligent network, which allows educators to deploy a network quickly. Video streaming plays an important role in this system for multimedia data transmission. This new…

  16. An Analysis of Network and Sensor Performance Within IEEE 802.X Wireless MESH Networks in the Tactical Network Topology (TNT)

    Davis, Joseph A., Sr

    2005-01-01

    .... Specifically, this thesis will attempt establish the foundation for the development of wireless MESH "network health" models by examining the performance of sensors operating within a MESH network...

  17. Challenges in Second-Generation Wireless Mesh Networks

    Pescapé Antonio

    2008-01-01

    Full Text Available Wireless mesh networks have the potential to provide ubiquitous high-speed Internet access at low costs. The good news is that initial deployments of WiFi meshes show the feasibility of providing ubiquitous Internet connectivity. However, their performance is far below the necessary and achievable limit. Moreover, users' subscription in the existing meshes is dismal even though the technical challenges to get connectivity are low. This paper provides an overview of the current status of mesh networks' deployment, and highlights the technical, economical, and social challenges that need to be addressed in the next years. As a proof-of-principle study, we discuss the above-mentioned challenges with reference to three real networks: (i MagNets, an operator-driven planned two-tier mesh network; (ii Berlin Freifunk network as a pure community-driven single-tier network; (iii Weimar Freifunk network, also a community-driven but two-tier network.

  18. Expected Transmission Energy Route Metric for Wireless Mesh Senor Networks

    YanLiang Jin

    2011-01-01

    Full Text Available Mesh is a network topology that achieves high throughput and stable intercommunication. With great potential, it is expected to be the key architecture of future networks. Wireless sensor networks are an active research area with numerous workshops and conferences arranged each year. The overall performance of a WSN highly depends on the energy consumption of the network. This paper designs a new routing metric for wireless mesh sensor networks. Results from simulation experiments reveal that the new metric algorithm improves the energy balance of the whole network and extends the lifetime of wireless mesh sensor networks (WMSNs.

  19. Enhancing a network coding security scheme to avoid packet dropping in wireless mesh networks / H.L.H.C. Terblanche.

    Terblanche, Heila Levina Helena Catharina

    2013-01-01

    With the increase of mobile and smart device usage, the interest in dynamically forming networks is rising. One such type of network isWireless Mesh Networks (WMNs). WMNs are multi-hop networks, with a decentralised nature that can dynamically form into mesh topologies. Network Coding (NC) is a method that is used to increase the efficiency of networks by encoding and decoding data on packet level by means of an XOR operation. NC works well with WMNs because it can exploit WMNs broadcast a...

  20. Surface micromachined counter-meshing gears discrimination device

    Polosky, Marc A.; Garcia, Ernest J.; Allen, James J.

    2000-12-12

    A surface micromachined Counter-Meshing Gears (CMG) discrimination device which functions as a mechanically coded lock. Each of two CMG has a first portion of its perimeter devoted to continuous driving teeth that mesh with respective pinion gears. Each EMG also has a second portion of its perimeter devoted to regularly spaced discrimination gear teeth that extend outwardly on at least one of three levels of the CMG. The discrimination gear teeth are designed so as to pass each other without interference only if the correct sequence of partial rotations of the CMG occurs in response to a coded series of rotations from the pinion gears. A 24 bit code is normally input to unlock the device. Once unlocked, the device provides a path for an energy or information signal to pass through the device. The device is designed to immediately lock up if any portion of the 24 bit code is incorrect.

  1. Creating wi-fi bluetooth mesh network for crisis management applications

    Al-Tekreeti, Safa; Adams, Christopher; Al-Jawad, Naseer

    2010-04-01

    This paper proposes a wireless mesh network implementation consisting of both Wi-Fi Ad-Hoc networks as well as Bluetooth Piconet/Scatternet networks, organised in an energy and throughput efficient structure. This type of networks can be easily constructed for Crises management applications, for example in an Earthquake disaster. The motivation of this research is to form mesh network from the mass availability of WiFi and Bluetooth enabled electronic devices such as mobile phones and PC's that are normally present in most regions were major crises occurs. The target of this study is to achieve an effective solution that will enable Wi-Fi and/or Bluetooth nodes to seamlessly configure themselves to act as a bridge between their own network and that of the other network to achieve continuous routing for our proposed mesh networks.

  2. Sending policies in dynamic wireless mesh using network coding

    Pandi, Sreekrishna; Fitzek, Frank; Pihl, Jeppe

    2015-01-01

    This paper demonstrates the quick prototyping capabilities of the Python-Kodo library for network coding based performance evaluation and investigates the problem of data redundancy in a network coded wireless mesh with opportunistic overhearing. By means of several wireless meshed architectures ...

  3. A Reconfigurable Mesh-Ring Topology for Bluetooth Sensor Networks

    Ben-Yi Wang

    2018-05-01

    Full Text Available In this paper, a Reconfigurable Mesh-Ring (RMR algorithm is proposed for Bluetooth sensor networks. The algorithm is designed in three stages to determine the optimal configuration of the mesh-ring network. Firstly, a designated root advertises and discovers its neighboring nodes. Secondly, a scatternet criterion is built to compute the minimum number of piconets and distributes the connection information for piconet and scatternet. Finally, a peak-search method is designed to determine the optimal mesh-ring configuration for various sizes of networks. To maximize the network capacity, the research problem is formulated by determining the best connectivity of available mesh links. During the formation and maintenance phases, three possible configurations (including piconet, scatternet, and hybrid are examined to determine the optimal placement of mesh links. The peak-search method is a systematic approach, and is implemented by three functional blocks: the topology formation block generates the mesh-ring topology, the routing efficiency block computes the routing performance, and the optimum decision block introduces a decision-making criterion to determine the optimum number of mesh links. Simulation results demonstrate that the optimal mesh-ring configuration can be determined and that the scatternet case achieves better overall performance than the other two configurations. The RMR topology also outperforms the conventional ring-based and cluster-based mesh methods in terms of throughput performance for Bluetooth configurable networks.

  4. Fair packet scheduling in Wireless Mesh Networks

    Nawab, Faisal

    2014-02-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs. TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed with the transmission only if it receives a sufficient number of grant control messages from these neighbors. A grant message indicates that the associated data packet has the lowest timestamp of all the packets pending transmission at the local transmit queue. We demonstrate that a loose ordering of timestamps among neighboring nodes is sufficient for enforcing local fairness, subsequently leading to flow rate fairness in a multi-hop WMN. We show that TMAC can be implemented using the control frames in IEEE 802.11, and thus can be easily integrated in existing 802.11-based WMNs. Our simulation results show that TMAC achieves excellent resource allocation fairness while maintaining over 90% of maximum link capacity across a large number of topologies.

  5. Performance of the hybrid wireless mesh protocol for wireless mesh networks

    Boye, Magnus; Staalhagen, Lars

    2010-01-01

    Wireless mesh networks offer a new way of providing end-user access and deploying network infrastructure. Though mesh networks offer a price competitive solution to wired networks, they also come with a set of new challenges such as optimal path selection, channel utilization, and load balancing....... and proactive. Two scenarios of different node density are considered for both path selection modes. The results presented in this paper are based on a simulation model of the HWMP specification in the IEEE 802.11s draft 4.0 implemented in OPNET Modeler....

  6. Surface micromachined counter-meshing gears discrimination device

    Polosky, M.A.; Garcia, E.J.; Allen, J.J.

    1998-01-01

    This paper discusses the design, fabrication and testing of a surface micromachined Counter-Meshing Gears (CMG) discrimination device which functions as a mechanically coded lock, A 24 bit code is input to unlock the device. Once unlocked, the device provides a path for an energy or information signal to pass through the device. The device is designed to immediately lock up if any portion of the 24 bit code is incorrect. The motivation for the development of this device is based on occurrences referred to as High Consequence Events, A High Consequence Event is an event where an inadvertent operation of a system could result in the catastrophic loss of life, property, or damage to the environment

  7. Dynamic power control for wireless backbone mesh networks: a survey

    Olwal, TO

    2010-01-01

    Full Text Available points of failures, and robust against RF interference, obstacles or power outage. This is because WMRs forming wireless backbone mesh networks (WBMNs) are built on advanced physical technologies. Such nodes perform both accessing and forwarding...

  8. Distributed Cross-layer Monitoring in Wireless Mesh Networks

    Panmin, Ye; Yong,

    2009-01-01

    Wireless mesh networks has rapid development over the last few years. However, due to properties such as distributed infrastructure and interference, which strongly affect the performance of wireless mesh networks, developing technology has to face the challenge of architecture and protocol design issues. Traditional layered protocols do not function efficiently in multi-hop wireless environments. To get deeper understanding on interaction of the layered protocols and optimize the performance...

  9. Mesh Network Architecture for Enabling Inter-Spacecraft Communication

    Becker, Christopher; Merrill, Garrick

    2017-01-01

    To enable communication between spacecraft operating in a formation or small constellation, a mesh network architecture was developed and tested using a time division multiple access (TDMA) communication scheme. The network is designed to allow for the exchange of telemetry and other data between spacecraft to enable collaboration between small spacecraft. The system uses a peer-to-peer topology with no central router, so that it does not have a single point of failure. The mesh network is dynamically configurable to allow for addition and subtraction of new spacecraft into the communication network. Flight testing was performed using an unmanned aerial system (UAS) formation acting as a spacecraft analogue and providing a stressing environment to prove mesh network performance. The mesh network was primarily devised to provide low latency, high frequency communication but is flexible and can also be configured to provide higher bandwidth for applications desiring high data throughput. The network includes a relay functionality that extends the maximum range between spacecraft in the network by relaying data from node to node. The mesh network control is implemented completely in software making it hardware agnostic, thereby allowing it to function with a wide variety of existing radios and computing platforms..

  10. A SURVEY on WIRELESS MESH NETWORKS, ROUTING METRICS and PROTOCOLS

    Safak DURUKAN ODABASI

    2013-01-01

    Full Text Available Today, Internet has become an indispensable part of our daily lives. It has a growing user community in many fields from banking transactions to online entertainment. It will be very efficient for users, as the next generation internet access becomes wireless like frequently used services such as cellular phones. But for providing this, a new network is needed to be designed or an existing network must be improved as well as making changes on infrastructure. At this point, mesh network infrastructure arises and offers more sophisticated internet access with less need. The most important advantage of mesh networks is the capability of working without infrastructure. Mesh networks are an additional access technology more than being a renewed one in the next generation wireless networks called 4G. In this study, wireless mesh networks and example applications are mentioned. Base architecture and design factors are emphasized, current routing protocols that are used on wireless mesh networks and routing metrics on which these protocols are based, are explained. Finally, the performance effects of these protocols and metrics on different network topologies are referred.

  11. On the Feasibility of Wireless Multimedia Sensor Networks over IEEE 802.15.5 Mesh Topologies.

    Garcia-Sanchez, Antonio-Javier; Losilla, Fernando; Rodenas-Herraiz, David; Cruz-Martinez, Felipe; Garcia-Sanchez, Felipe

    2016-05-05

    Wireless Multimedia Sensor Networks (WMSNs) are a special type of Wireless Sensor Network (WSN) where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload nodes located within radio communication range of the data collection unit or data sink. The battery life of these nodes is therefore reduced considerably, requiring frequent battery replacement work to extend the operational life of the WSN system. In a wireless sensor network with mesh topology, any node may act as a forwarder node, thereby enabling multiple routing paths toward any other node or collection unit. In addition, mesh topologies have proven advantages, such as data transmission reliability, network robustness against node failures, and potential reduction in energy consumption. This work studies the feasibility of implementing WMSNs in mesh topologies and their limitations by means of exhaustive computer simulation experiments. To this end, a module developed for the Synchronous Energy Saving (SES) mode of the IEEE 802.15.5 mesh standard has been integrated with multimedia tools to thoroughly test video sequences encoded using H.264 in mesh networks.

  12. On the Feasibility of Wireless Multimedia Sensor Networks over IEEE 802.15.5 Mesh Topologies

    Antonio-Javier Garcia-Sanchez

    2016-05-01

    Full Text Available Wireless Multimedia Sensor Networks (WMSNs are a special type of Wireless Sensor Network (WSN where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload nodes located within radio communication range of the data collection unit or data sink. The battery life of these nodes is therefore reduced considerably, requiring frequent battery replacement work to extend the operational life of the WSN system. In a wireless sensor network with mesh topology, any node may act as a forwarder node, thereby enabling multiple routing paths toward any other node or collection unit. In addition, mesh topologies have proven advantages, such as data transmission reliability, network robustness against node failures, and potential reduction in energy consumption. This work studies the feasibility of implementing WMSNs in mesh topologies and their limitations by means of exhaustive computer simulation experiments. To this end, a module developed for the Synchronous Energy Saving (SES mode of the IEEE 802.15.5 mesh standard has been integrated with multimedia tools to thoroughly test video sequences encoded using H.264 in mesh networks.

  13. 802.11s Wireless Mesh Network Visualization Application

    Mauldin, James Alexander

    2014-01-01

    Results of past experimentation at NASA Johnson Space Center showed that the IEEE 802.11s standard has better performance than the widely implemented alternative protocol B.A.T.M.A.N (Better Approach to Mobile Ad hoc Networking). 802.11s is now formally incorporated into the Wi- Fi 802.11-2012 standard, which specifies a hybrid wireless mesh networking protocol (HWMP). In order to quickly analyze changes to the routing algorithm and to support optimizing the mesh network behavior for our intended application a visualization tool was developed by modifying and integrating open source tools.

  14. Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks

    Laisen Nie

    2018-01-01

    Full Text Available Wireless mesh network is prevalent for providing a decentralized access for users and other intelligent devices. Meanwhile, it can be employed as the infrastructure of the last few miles connectivity for various network applications, for example, Internet of Things (IoT and mobile networks. For a wireless mesh backbone network, it has obtained extensive attention because of its large capacity and low cost. Network traffic prediction is important for network planning and routing configurations that are implemented to improve the quality of service for users. This paper proposes a network traffic prediction method based on a deep learning architecture and the Spatiotemporal Compressive Sensing method. The proposed method first adopts discrete wavelet transform to extract the low-pass component of network traffic that describes the long-range dependence of itself. Then, a prediction model is built by learning a deep architecture based on the deep belief network from the extracted low-pass component. Otherwise, for the remaining high-pass component that expresses the gusty and irregular fluctuations of network traffic, the Spatiotemporal Compressive Sensing method is adopted to predict it. Based on the predictors of two components, we can obtain a predictor of network traffic. From the simulation, the proposed prediction method outperforms three existing methods.

  15. Energy Consumption Model and Measurement Results for Network Coding-enabled IEEE 802.11 Meshed Wireless Networks

    Paramanathan, Achuthan; Rasmussen, Ulrik Wilken; Hundebøll, Martin

    2012-01-01

    This paper presents an energy model and energy measurements for network coding enabled wireless meshed networks based on IEEE 802.11 technology. The energy model and the energy measurement testbed is limited to a simple Alice and Bob scenario. For this toy scenario we compare the energy usages...... for a system with and without network coding support. While network coding reduces the number of radio transmissions, the operational activity on the devices due to coding will be increased. We derive an analytical model for the energy consumption and compare it to real measurements for which we build...... a flexible, low cost tool to be able to measure at any given node in a meshed network. We verify the precision of our tool by comparing it to a sophisticated device. Our main results in this paper are the derivation of an analytical energy model, the implementation of a distributed energy measurement testbed...

  16. Design and implementation of a topology control scheme for wireless mesh networks

    Mudali, P

    2009-09-01

    Full Text Available The Wireless Mesh Network (WMN) backbone is usually comprised of stationary nodes but the transient nature of wireless links results in changing network topologies. Topology Control (TC) aims to preserve network connectivity in ad hoc and mesh...

  17. Deflating link buffers in a wireless mesh network

    Jamshaid, Kamran; Shihada, Basem; Showail, Ahmad; Levis, Philip

    2014-01-01

    We analyze the problem of buffer sizing for backlogged TCP flows in 802.11-based wireless mesh networks. Our objective is to maintain high network utilization while providing low queueing delays. Unlike wired networks where a single link buffer feeds a bottleneck link, the radio spectral resource in a mesh network is shared among a set of contending mesh routers. We account for this by formulating the buffer size problem as sizing a collective buffer distributed over a set of interfering nodes. In this paper we propose mechanisms for sizing and distributing this collective buffer among the mesh nodes constituting the network bottleneck. Our mechanism factors in the network topology and wireless link rates, improving on pre-set buffer allocations that cannot optimally work across the range of configurations achievable with 802.11 radios. We evaluate our mechanisms using simulations as well as experiments on a testbed. Our results show that we can reduce the RTT of a flow by 6× or more, at the cost of less than 10% drop in end-to-end flow throughput.

  18. Deflating link buffers in a wireless mesh network

    Jamshaid, Kamran

    2014-05-01

    We analyze the problem of buffer sizing for backlogged TCP flows in 802.11-based wireless mesh networks. Our objective is to maintain high network utilization while providing low queueing delays. Unlike wired networks where a single link buffer feeds a bottleneck link, the radio spectral resource in a mesh network is shared among a set of contending mesh routers. We account for this by formulating the buffer size problem as sizing a collective buffer distributed over a set of interfering nodes. In this paper we propose mechanisms for sizing and distributing this collective buffer among the mesh nodes constituting the network bottleneck. Our mechanism factors in the network topology and wireless link rates, improving on pre-set buffer allocations that cannot optimally work across the range of configurations achievable with 802.11 radios. We evaluate our mechanisms using simulations as well as experiments on a testbed. Our results show that we can reduce the RTT of a flow by 6× or more, at the cost of less than 10% drop in end-to-end flow throughput.

  19. Adaptive, Tactical Mesh Networking: Control Base MANET Model

    2010-09-01

    pp. 316–320 Available: IEEE Xplore , http://ieeexplore.ieee.org [Accessed: June 9, 2010]. [5] N. Sidiropoulos, “Multiuser Transmit Beamforming...Mobile Mesh Segments of TNT Testbed .......... 11 Figure 5. Infrastructure and Ad Hoc Mode of IEEE 802.11................................ 13 Figure...6. The Power Spectral Density of OFDM................................................ 14 Figure 7. A Typical IEEE 802.16 Network

  20. Shuffle-Exchange Mesh Topology for Networks-on-Chip

    Sabbaghi-Nadooshan, Reza; Modarressi, Mehdi; Sarbazi-Azad, Hamid

    2010-01-01

    The mesh topology has been used in a variety of interconnection network applications especially for NoC designs due to its desirable properties in VLSI implementation. In this chapter, we proposed a new topology based on the shuffle-exchange topology, the 2D

  1. Scalable power selection method for wireless mesh networks

    Olwal, TO

    2009-01-01

    Full Text Available This paper addresses the problem of a scalable dynamic power control (SDPC) for wireless mesh networks (WMNs) based on IEEE 802.11 standards. An SDPC model that accounts for architectural complexities witnessed in multiple radios and hops...

  2. MAC layer security issues in wireless mesh networks

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  3. Secure Multicast Routing Algorithm for Wireless Mesh Networks

    Rakesh Matam

    2016-01-01

    Full Text Available Multicast is an indispensable communication technique in wireless mesh network (WMN. Many applications in WMN including multicast TV, audio and video conferencing, and multiplayer social gaming use multicast transmission. On the other hand, security in multicast transmissions is crucial, without which the network services are significantly disrupted. Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. Moreover, existing secure routing protocols assume that adversarial nodes cannot share an out-of-band communication channel which rules out the possibility of wormhole attack. In this paper, we propose SEMRAW (SEcure Multicast Routing Algorithm for Wireless mesh network that is resistant against all known active threats including wormhole attack. SEMRAW employs digital signatures to prevent a malicious node from gaining illegitimate access to the message contents. Security of SEMRAW is evaluated using the simulation paradigm approach.

  4. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  5. Context-Based Topology Control for Wireless Mesh Networks

    Pragasen Mudali

    2016-01-01

    Full Text Available Topology Control has been shown to provide several benefits to wireless ad hoc and mesh networks. However these benefits have largely been demonstrated using simulation-based evaluations. In this paper, we demonstrate the negative impact that the PlainTC Topology Control prototype has on topology stability. This instability is found to be caused by the large number of transceiver power adjustments undertaken by the prototype. A context-based solution is offered to reduce the number of transceiver power adjustments undertaken without sacrificing the cumulative transceiver power savings and spatial reuse advantages gained from employing Topology Control in an infrastructure wireless mesh network. We propose the context-based PlainTC+ prototype and show that incorporating context information in the transceiver power adjustment process significantly reduces topology instability. In addition, improvements to network performance arising from the improved topology stability are also observed. Future plans to add real-time context-awareness to PlainTC+ will have the scheme being prototyped in a software-defined wireless mesh network test-bed being planned.

  6. Construct mine environment monitoring system based on wireless mesh network

    Chen, Xin; Ge, Gengyu; Liu, Yinmei; Cheng, Aimin; Wu, Jun; Fu, Jun

    2018-04-01

    The system uses wireless Mesh network as a network transmission medium, and strive to establish an effective and reliable underground environment monitoring system. The system combines wireless network technology and embedded technology to monitor the internal data collected in the mine and send it to the processing center for analysis and environmental assessment. The system can be divided into two parts: the main control network module and the data acquisition terminal, and the SPI bus technology is used for mutual communication between them. Multi-channel acquisition and control interface design Data acquisition and control terminal in the analog signal acquisition module, digital signal acquisition module, and digital signal output module. The main control network module running Linux operating system, in which the transplant SPI driver, USB card driver and AODV routing protocol. As a result, the internal data collection and reporting of the mine are realized.

  7. Airborne Tactical Data Network Gateways: Evaluating EPLRS' Ability to Integrate With Wireless Meshed Networks

    Bey, Christopher S

    2005-01-01

    ... and 802.16 standards and prevalent developing meshed network routing protocols. Finally, this thesis evaluates fielded and emergent technologies to see if they are suitable to build and to sustain...

  8. A Novel Capacity Analysis for Wireless Backhaul Mesh Networks

    Chung, Tein-Yaw; Lee, Kuan-Chun; Lee, Hsiao-Chih

    This paper derived a closed-form expression for inter-flow capacity of a backhaul wireless mesh network (WMN) with centralized scheduling by employing a ring-based approach. Through the definition of an interference area, we are able to accurately describe a bottleneck collision area for a WMN and calculate the upper bound of inter-flow capacity. The closed-form expression shows that the upper bound is a function of the ratio between transmission range and network radius. Simulations and numerical analysis show that our analytic solution can better estimate the inter-flow capacity of WMNs than that of previous approach.

  9. PlayNCool: Opportunistic Network Coding for Local Optimization of Routing in Wireless Mesh Networks

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Pedersen, Morten Videbæk

    2013-01-01

    This paper introduces PlayNCool, an opportunistic protocol with local optimization based on network coding to increase the throughput of a wireless mesh network (WMN). PlayNCool aims to enhance current routing protocols by (i) allowing random linear network coding transmissions end-to-end, (ii) r...

  10. A conceptual framework for technology-enabled and technology-dependent user behavior toward device mesh and mesh app

    Ming-Hsiung Hsiao

    2018-06-01

    Full Text Available The device mesh and mesh app revealed by Gartner as the future strategic technology trend are able to predict people's need from their historic data, then provides the needed services or service innovation to support their activity engagement. However, many theories have identified that it is the motivation, rather than technology, that drives people to engage in activities or tasks. For this reason, this study builds a conceptual framework by integrating the extant logic and theories to explore how future technology would generate benefits for people. It integrates task-technology fit (TTF model and motivation theory (mainly expectancy-value theory to explain such technology user behavior. It also points out the difference between technology-enabled and technology-dependent user behavior and concludes that too much emphasis on the role of technology with too little attention on motivation would distort technology user behavior, and the role of technology as well. Keywords: Device mesh, Mesh app, Expectancy-value theory, Task-technology fit (TTF, Technology-enabled user, Technology-dependent user

  11. The efficacy of centralized flow rate control in 802.11-based wireless mesh networks

    Jamshaid, K.

    2013-06-13

    Commodity WiFi-based wireless mesh networks (WMNs) can be used to provide last mile Internet access. These networks exhibit extreme unfairness with backlogged traffic sources. Current solutions propose distributed source-rate control algorithms requiring link-layer or transport-layer changes on all mesh nodes. This is often infeasible in large practical deployments. In wireline networks, router-assisted rate control techniques have been proposed for use alongside end-to-end mechanisms. We wish to evaluate the feasibility of establishing similar centralized control via gateways in WMNs. In this paper, we focus on the efficacy of this control rather than the specifics of the controller design mechanism. We answer the question: Given sources that react predictably to congestion notification, can we enforce a desired rate allocation through a single centralized controller? The answer is not obvious because flows experience varying contention levels, and transmissions are scheduled by a node using imperfect local knowledge. We find that common router-assisted flow control schemes used in wired networks fail in WMNs because they assume that (1) links are independent, and (2) router queue buildups are sufficient for detecting congestion. We show that non-work-conserving, rate-based centralized scheduling can effectively enforce rate allocation. It can achieve results comparable to source rate limiting, without requiring any modifications to mesh routers or client devices. 2013 Jamshaid et al.; licensee Springer.

  12. Multimodal processes scheduling in mesh-like network environment

    Bocewicz Grzegorz

    2015-06-01

    Full Text Available Multimodal processes planning and scheduling play a pivotal role in many different domains including city networks, multimodal transportation systems, computer and telecommunication networks and so on. Multimodal process can be seen as a process partially processed by locally executed cyclic processes. In that context the concept of a Mesh-like Multimodal Transportation Network (MMTN in which several isomorphic subnetworks interact each other via distinguished subsets of common shared intermodal transport interchange facilities (such as a railway station, bus station or bus/tram stop as to provide a variety of demand-responsive passenger transportation services is examined. Consider a mesh-like layout of a passengers transport network equipped with different lines including buses, trams, metro, trains etc. where passenger flows are treated as multimodal processes. The goal is to provide a declarative model enabling to state a constraint satisfaction problem aimed at multimodal transportation processes scheduling encompassing passenger flow itineraries. Then, the main objective is to provide conditions guaranteeing solvability of particular transport lines scheduling, i.e. guaranteeing the right match-up of local cyclic acting bus, tram, metro and train schedules to a given passengers flow itineraries.

  13. Buffer Sizing in 802.11 Wireless Mesh Networks

    Jamshaid, Kamran; Shihada, Basem; Xia, Li; Levis, Philip

    2011-01-01

    We analyze the problem of buffer sizing for TCP flows in 802.11-based Wireless Mesh Networks. Our objective is to maintain high network utilization while providing low queueing delays. The problem is complicated by the time-varying capacity of the wireless channel as well as the random access mechanism of 802.11 MAC protocol. While arbitrarily large buffers can maintain high network utilization, this results in large queueing delays. Such delays may affect TCP stability characteristics, and also increase queueing delays for other flows (including real-time flows) sharing the buffer. In this paper we propose sizing link buffers collectively for a set of nodes within mutual interference range called the 'collision domain'. We aim to provide a buffer just large enough to saturate the available capacity of the bottleneck collision domain that limits the carrying capacity of the network. This neighborhood buffer is distributed over multiple nodes that constitute the network bottleneck; a transmission by any of these nodes fully utilizes the available spectral resource for the duration of the transmission. We show that sizing routing buffers collectively for this bottleneck allows us to have small buffers (as low as 2 - 3 packets) at individual nodes without any significant loss in network utilization. We propose heuristics to determine these buffer sizes in WMNs. Our results show that we can reduce the end-to-end delays by 6× to 10× at the cost of losing roughly 5% of the network capacity achievable with large buffers.

  14. Buffer Sizing in 802.11 Wireless Mesh Networks

    Jamshaid, Kamran

    2011-10-01

    We analyze the problem of buffer sizing for TCP flows in 802.11-based Wireless Mesh Networks. Our objective is to maintain high network utilization while providing low queueing delays. The problem is complicated by the time-varying capacity of the wireless channel as well as the random access mechanism of 802.11 MAC protocol. While arbitrarily large buffers can maintain high network utilization, this results in large queueing delays. Such delays may affect TCP stability characteristics, and also increase queueing delays for other flows (including real-time flows) sharing the buffer. In this paper we propose sizing link buffers collectively for a set of nodes within mutual interference range called the \\'collision domain\\'. We aim to provide a buffer just large enough to saturate the available capacity of the bottleneck collision domain that limits the carrying capacity of the network. This neighborhood buffer is distributed over multiple nodes that constitute the network bottleneck; a transmission by any of these nodes fully utilizes the available spectral resource for the duration of the transmission. We show that sizing routing buffers collectively for this bottleneck allows us to have small buffers (as low as 2 - 3 packets) at individual nodes without any significant loss in network utilization. We propose heuristics to determine these buffer sizes in WMNs. Our results show that we can reduce the end-to-end delays by 6× to 10× at the cost of losing roughly 5% of the network capacity achievable with large buffers.

  15. Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks

    Donghai Zhu; Xinyu Yang Yang; Peng Zhao; Wei Yu

    2016-01-01

    Wireless Mesh Networks (WMNs) have potential to provide convenient broadband wireless Internet access to mobile users.With the support of Software-Defined Networking (SDN) paradigm that separates control plane and data plane, WMNs can be easily deployed and managed. In addition, by exploiting the broadcast nature of the wireless medium and the spatial diversity of multi-hop wireless networks, intra-flow network coding has shown a greater benefit in comparison with traditional routing paradigm...

  16. Reliable Communication in Wireless Meshed Networks using Network Coding

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses...... this problem and suggests different mechanisms to support reliability as part of the MAC protocol. Analytical expressions to this problem are given to qualify the performance of the modified network coding. These expressions are confirmed by numerical result. While the suggested reliability mechanisms...

  17. Throughput vs. Delay in Lossy Wireless Mesh Networks with Random Linear Network Coding

    Hundebøll, Martin; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank

    2014-01-01

    This work proposes a new protocol applying on–the–fly random linear network coding in wireless mesh net-works. The protocol provides increased reliability, low delay,and high throughput to the upper layers, while being obliviousto their specific requirements. This seemingly conflicting goalsare achieved by design, using an on–the–fly network codingstrategy. Our protocol also exploits relay nodes to increasethe overall performance of individual links. Since our protocolnaturally masks random p...

  18. Obstetrical and Gynecological Devices; Reclassification of Surgical Mesh for Transvaginal Pelvic Organ Prolapse Repair; Final order.

    2016-01-05

    The Food and Drug Administration (FDA or the Agency) is issuing a final order to reclassify surgical mesh for transvaginal pelvic organ prolapse (POP) repair from class II to class III. FDA is reclassifying these devices based on the determination that general controls and special controls together are not sufficient to provide reasonable assurance of safety and effectiveness for this device, and these devices present a potential unreasonable risk of illness or injury. The Agency is reclassifying surgical mesh for transvaginal POP repair on its own initiative based on new information.

  19. Vacuum with mesh is a feasible temporary closure device after fascial dehiscence

    Bjørsum-Meyer, Thomas; Skarbye, Mona; Jensen, Kenneth Højsgaard

    2013-01-01

    INTRODUCTION: The open abdomen is a challenging condition and a temporary abdominal closure device is required in order to protect the intra-abdominal viscera. We aimed to evaluate the feasibility of a recent device: vacuum-assisted wound closure and mesh-mediated fascial traction (VAWCM) after f...

  20. Effective Bandwidth Allocation for WiMAX Mesh Network

    Hung-Chin Jang

    2010-04-01

    Full Text Available The aim of this paper is to reduce the media access delay in a WiMAX mesh network. We observe that as the number of subscriber stations (SS in a neighborhood increases, the processes of transmission opportunity (TO competition and 3- way handshake are easy to fail. This may degrade transmission efficiency and increase packet transmission delay. Besides, the minislot allocation defined in the WiMAX mesh mode may cause many lower priority services reserve earlier minislots than that of higher priority services like rtPS. This may cause great negative impact on delay-sensitive traffic. In this paper, we design a QoS classifier to enqueue packets according to different QoS service classes, present a dynamic holdoff exponent mechanism to reduce control subframe delay, and propose a Neighborhood-Based Minislot Allocation (NBMA mechanism to reduce data subframe delay. Simulations show that the proposed methodology outperforms that of IEEE 802.16 and Baye's DynExp in delay, jitter and throughput.

  1. Throughput vs. Delay in Lossy Wireless Mesh Networks with Random Linear Network Coding

    Hundebøll, Martin; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2014-01-01

    This work proposes a new protocol applying on– the–fly random linear network coding in wireless mesh net- works. The protocol provides increased reliability, low delay, and high throughput to the upper layers, while being oblivious to their specific requirements. This seemingly conflicting goals ...

  2. Performance of Implementation IBR-DTN and Batman-Adv Routing Protocol in Wireless Mesh Networks

    Herman Yuliandoko

    2016-03-01

    Full Text Available Wireless mesh networks is a network which has high mobility and flexibility network. In Wireless mesh networks nodes are free to move and able to automatically build a network connection with other nodes. High mobility, heterogeneous condition and intermittent network connectivity cause data packets drop during wireless communication and it becomes a problem in the wireless mesh networks. This condition can happen because wireless mesh networks use connectionless networking type such as IP protocol which it is not tolerant to delay. To solve this condition it is needed a technology to keep data packets when the network is disconnect. Delay tolerant technology is a technology that provides store and forward mechanism and it can prevent packet data dropping during communication. In our research, we proposed a test bed wireless mesh networks implementation by using proactive routing protocol and combining with delay tolerant technology. We used Batman-adv routing protocol and IBR-DTN on our research. We measured some particular performance aspect of networking such as packet loss, delay, and throughput of the network. We identified that delay tolerant could keep packet data from dropping better than current wireless mesh networks in the intermittent network condition. We also proved that IBR-DTN and Batman-adv could run together on the wireless mesh networks. In The experiment throughput test result of IBR-DTN was higher than Current TCP on the LoS (Line of Side and on environment with obstacle. Keywords: Delay Tolerant, IBR-DTN, Wireless Mesh, Batman-adv, Performance

  3. Geometrical modification transfer between specific meshes of each coupled physical codes. Application to the Jules Horowitz research reactor experimental devices

    Duplex, B.

    2011-01-01

    The CEA develops and uses scientific software, called physical codes, in various physical disciplines to optimize installation and experimentation costs. During a study, several physical phenomena interact, so a code coupling and some data exchanges between different physical codes are required. Each physical code computes on a particular geometry, usually represented by a mesh composed of thousands to millions of elements. This PhD Thesis focuses on the geometrical modification transfer between specific meshes of each coupled physical code. First, it presents a physical code coupling method where deformations are computed by one of these codes. Next, it discusses the establishment of a model, common to different physical codes, grouping all the shared data. Finally, it covers the deformation transfers between meshes of the same geometry or adjacent geometries. Geometrical modifications are discrete data because they are based on a mesh. In order to permit every code to access deformations and to transfer them, a continuous representation is computed. Two functions are developed, one with a global support, and the other with a local support. Both functions combine a simplification method and a radial basis function network. A whole use case is dedicated to the Jules Horowitz reactor. The effect of differential dilatations on experimental device cooling is studied. (author) [fr

  4. Performance evaluation of multi-channel wireless mesh networks with embedded systems.

    Lam, Jun Huy; Lee, Sang-Gon; Tan, Whye Kit

    2012-01-01

    Many commercial wireless mesh network (WMN) products are available in the marketplace with their own proprietary standards, but interoperability among the different vendors is not possible. Open source communities have their own WMN implementation in accordance with the IEEE 802.11s draft standard, Linux open80211s project and FreeBSD WMN implementation. While some studies have focused on the test bed of WMNs based on the open80211s project, none are based on the FreeBSD. In this paper, we built an embedded system using the FreeBSD WMN implementation that utilizes two channels and evaluated its performance. This implementation allows the legacy system to connect to the WMN independent of the type of platform and distributes the load between the two non-overlapping channels. One channel is used for the backhaul connection and the other one is used to connect to the stations to wireless mesh network. By using the power efficient 802.11 technology, this device can also be used as a gateway for the wireless sensor network (WSN).

  5. Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks

    Donghai Zhu

    2016-01-01

    Full Text Available Wireless Mesh Networks (WMNs have potential to provide convenient broadband wireless Internet access to mobile users.With the support of Software-Defined Networking (SDN paradigm that separates control plane and data plane, WMNs can be easily deployed and managed. In addition, by exploiting the broadcast nature of the wireless medium and the spatial diversity of multi-hop wireless networks, intra-flow network coding has shown a greater benefit in comparison with traditional routing paradigms in data transmission for WMNs. In this paper, we develop a novel OpenCoding protocol, which combines the SDN technique with intra-flow network coding for WMNs. Our developed protocol can simplify the deployment and management of the network and improve network performance. In OpenCoding, a controller that works on the control plane makes routing decisions for mesh routers and the hop-by-hop forwarding function is replaced by network coding functions in data plane. We analyze the overhead of OpenCoding. Through a simulation study, we show the effectiveness of the OpenCoding protocol in comparison with existing schemes. Our data shows that OpenCoding outperforms both traditional routing and intra-flow network coding schemes.

  6. TMAC: Timestamp-Ordered MAC Protocol for Wireless Mesh Networks

    Nawab, Faisal

    2011-05-01

    Wireless Mesh Networks (WMNs) have emerged to meet a need for a self-organized and self-configured multi-hop wireless network infrastructure. Low cost infrastructure and ease of deployment have made WMNs an attractive technology for last mile access. However, 802.11 based WMNs are subject to serious fairness issues. With backlogged TCP traffic, nodes which are two or more hops away from the gateway are subject to starvation, while the one-hop away node saturates the channel with its own local traffic. We study the interactions of TCP and IEEE 802.11 MAC in WMNs to aid us in understanding and overcoming the unfairness problem. We propose a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically derive the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs via a manipulative per-node scheduling mechanism which takes advantage of the age of each packet as a priority metric. Simulation is conducted to validate our model and to illustrate the fairness characteristics of TMAC. Our results show that TMAC achieves excellent resource allocation fairness while maintaining above 90% of maximum link capacity in parking lot and large grid topologies. Our work illuminates the factors affecting TCP fairness in WMNs. Our theoretical and empirical findings can be used in future research to develop more fairness-aware protocols for WMNs.

  7. WING/WORLD: An Open Experimental Toolkit for the Design and Deployment of IEEE 802.11-Based Wireless Mesh Networks Testbeds

    Daniele Miorandi

    2010-01-01

    Full Text Available Wireless Mesh Networks represent an interesting instance of light-infrastructure wireless networks. Due to their flexibility and resiliency to network failures, wireless mesh networks are particularly suitable for incremental and rapid deployments of wireless access networks in both metropolitan and rural areas. This paper illustrates the design and development of an open toolkit aimed at supporting the design of different solutions for wireless mesh networking by enabling real evaluation, validation, and demonstration. The resulting testbed is based on off-the-shelf hardware components and open-source software and is focused on IEEE 802.11 commodity devices. The software toolkit is based on an “open” philosophy and aims at providing the scientific community with a tool for effective and reproducible performance analysis of WMNs. The paper describes the architecture of the toolkit, and its core functionalities, as well as its potential evolutions.

  8. Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network

    Sangil Choi

    2016-12-01

    Full Text Available Wireless mesh networks (WMNs have been considered as one of the key technologies for the configuration of wireless machines since they emerged. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts in the network and also allow them to access the Internet via gateway devices. Wireless routers are typically equipped with multiple radios operating on different channels to increase network throughput. Multicast is a form of communication that delivers data from a source to a set of destinations simultaneously. It is used in a number of applications, such as distributed games, distance education, and video conferencing. In this study, we address a channel assignment problem for multicast in multi-radio multi-channel WMNs. In a multi-radio multi-channel WMN, two nearby nodes will interfere with each other and cause a throughput decrease when they transmit on the same channel. Thus, an important goal for multicast channel assignment is to reduce the interference among networked devices. We have developed a minimum interference channel assignment (MICA algorithm for multicast that accurately models the interference relationship between pairs of multicast tree nodes using the concept of the interference factor and assigns channels to tree nodes to minimize interference within the multicast tree. Simulation results show that MICA achieves higher throughput and lower end-to-end packet delay compared with an existing channel assignment algorithm named multi-channel multicast (MCM. In addition, MICA achieves much lower throughput variation among the destination nodes than MCM.

  9. Space Network Devices Developed

    Jones, Robert E.

    2004-01-01

    The NASA Glenn Research Center through a contract with Spectrum Astro, Inc., has been developing space network hardware as an enabling technology using open systems interconnect (OSI) standards for space-based communications applications. The OSI standard is a well-recognized layered reference model that specifies how data should be sent node to node in a communications network. Because of this research and technology development, a space-qualifiable Ethernet-based network interface card (similar to the type found in a networked personal computer) and the associated four-port hub were designed and developed to flight specifications. During this research and development, there also have been many lessons learned for determining approaches for migrating existing spacecraft architectures to an OSI-network-based platform. Industry has recognized the benefits of targeting hardware developed around OSI standards such as Transmission Control Protocol/Internet Protocol (TCP/IP) or similar protocols for use in future generations of space communication systems. Some of these tangible benefits include overall reductions in mission schedule and cost and in system complexity. This development also brings us a step closer to the realization of a principal investigator on a terrestrial Internet site being able to interact with space platform assets in near real time. To develop this hardware, Spectrum Astro first conducted a technology analysis of alternatives study. For this analysis, they looked at the features of three protocol specifications: Ethernet (IEEE 802.3), Firewire (IEEE 1394), and Spacewire (IEEE 1355). A thorough analysis was performed on the basis of criteria such as current protocol performance and suitability for future space applications. Spectrum Astro also projected future influences such as cost, hardware and software availability, throughput performance, and integration procedures for current and transitive space architectures. After a thorough analysis

  10. Developments of DPF systems with mesh laminated structures. Performances of DPF systems which consist of the metal-mesh laminated filter combustion with the alumina-fiber mesh, and the combustion device of trapped diesel particles; Mesh taso kozo no DPF no kaihatsu. Kinzokusen to arumina sen`i mesh ni yoru fukugo filter to filter heiyo heater ni yoru DPF no seino

    Kojima, T; Tange, A; Matsuda, K [NHK Spring Co. Ltd., Yokohama (Japan)

    1997-10-01

    For the purpose of continuous run without any maintenance, new DPF (diesel particulate filter)systems laminated by both metal-wire mesh and alumina-fiber mesh alternately, are under the developments. The perfect combustion of trapped diesel particulate can be achieved by a couple of the resistance heating devices inserted into the filter. 5 refs., 7 figs., 3 tabs.

  11. Six-port optical switch for cluster-mesh photonic network-on-chip

    Jia, Hao; Zhou, Ting; Zhao, Yunchou; Xia, Yuhao; Dai, Jincheng; Zhang, Lei; Ding, Jianfeng; Fu, Xin; Yang, Lin

    2018-05-01

    Photonic network-on-chip for high-performance multi-core processors has attracted substantial interest in recent years as it offers a systematic method to meet the demand of large bandwidth, low latency and low power dissipation. In this paper we demonstrate a non-blocking six-port optical switch for cluster-mesh photonic network-on-chip. The architecture is constructed by substituting three optical switching units of typical Spanke-Benes network to optical waveguide crossings. Compared with Spanke-Benes network, the number of optical switching units is reduced by 20%, while the connectivity of routing path is maintained. By this way the footprint and power consumption can be reduced at the expense of sacrificing the network latency performance in some cases. The device is realized by 12 thermally tuned silicon Mach-Zehnder optical switching units. Its theoretical spectral responses are evaluated by establishing a numerical model. The experimental spectral responses are also characterized, which indicates that the optical signal-to-noise ratios of the optical switch are larger than 13.5 dB in the wavelength range from 1525 nm to 1565 nm. Data transmission experiment with the data rate of 32 Gbps is implemented for each optical link.

  12. Dynamic channel assignment scheme for multi-radio wireless mesh networks

    Kareem, TR

    2008-09-01

    Full Text Available This paper investigates the challenges involve in designing a dynamic channel assignment (DCA) scheme for wireless mesh networks, particularly for multi-radio systems. It motivates the need for fast switching and process coordination modules...

  13. Significant performance improvement obtained in a wireless mesh network using a beamswitching antenna

    Lysko, AA

    2012-09-01

    Full Text Available mesh network operated in a fixed 11 Mbps mode. The throughput improvement in multi-hop communication obtained in the presence of an interferer is tenfold, from 0.2 Mbps to 2 Mbps. Index Terms?antenna, smart antenna, wireless mesh network, WMN... efficiency in the communications, and active research and development of new methods and technologies enabling this at the physical layer, including multiple antenna techniques, such as multiple input multiple output (MIMO) and smart antennas...

  14. An Effective Wormhole Attack Defence Method for a Smart Meter Mesh Network in an Intelligent Power Grid

    Jungtaek Seo

    2012-08-01

    Full Text Available Smart meters are one of the key components of intelligent power grids. Wireless mesh networks based on smart meters could provide customer-oriented information on electricity use to the operational control systems, which monitor power grid status and estimate electric power demand. Using this information, an operational control system could regulate devices within the smart grid in order to provide electricity in a cost-efficient manner. Ensuring the availability of the smart meter mesh network is therefore a critical factor in securing the soundness of an intelligent power system. Wormhole attacks can be one of the most difficult-to-address threats to the availability of mesh networks, and although many methods to nullify wormhole attacks have been tried, these have been limited by high computational resource requirements and unnecessary overhead, as well as by the lack of ability of such methods to respond to attacks. In this paper, an effective defense mechanism that both detects and responds to wormhole attacks is proposed. In the proposed system, each device maintains information on its neighbors, allowing each node to identify replayed packets. The effectiveness and efficiency of the proposed method is analyzed in light of additional computational message and memory complexities.

  15. Collision Analysis at 60-GHz mmWave Mesh Networks: The Case With Blockage and Shadowing

    Lyu, Kangjia

    2018-05-01

    This thesis can be viewed as two parts. The first part focuses on performance analysis of millimeter wave (mmWave) communications. We investigate how the interference behaves in the outdoor mesh network operating at 60-GHz when block age and shadowing are present using the probability of collision as a metric, under both the protocol model and the physical model. In contrast with results reported in mmWave mesh networks at 60-GHz that advocates that interference has only a marginal effect, our results show that for a short-range link of 100 m, the collision probability gets considerably larger (beyond 0.1) at the signal-to-interference-plus-noise ratio (SINR) of interest (for example, the reference value is chosen as 15 dB for uncoded quadrature phase shift keying (QPSK)). Compensation or compromise should be made in order to maintain a low probability of collision, either by reducing transmitter node density which is to the detriment of the network connectivity, or by switching to a compact linear antenna array with more at-top elements, which places more stringent requirements in device integration techniques. The second part of this thesis focuses on finding the optimal unmanned aerial vehicle (UAV) deployment in the sense that it can maximize over specific network connectivity. We have introduced a connectivity measure based on the commonly used network connectivity metric, which is refered to as global soft connectivity. This measure can be easily extended to account for different propagation models, such as Rayleigh fading and Nakagami fading. It can also be modified to incorporate the link state probability and beam alignment errors in highly directional networks. As can be shown, under the line-of-sight (LOS) and Rayleigh fading assumptions, the optimization regarding the global soft connectivity can be expressed as a weighted sum of the square of link distances between the nodes within the network, namely the ground-to-ground links, the UAV-to-UAV links

  16. Mesh Network Design for Smart Charging Infrastructure and Electric Vehicle Remote Monitoring

    Shepelev, Aleksey; Chung, Ching-Yen; Chu, Chi-Cheng; Gadh, Rajit

    2013-10-14

    Plug-In Electric Vehicle (PEV) charging today happens with little knowledge of the state of the vehicle being charged. In order to implement smart charging algorithms and other capabilities of the future smart grid, provisions for remote PEV monitoring will have to be developed and tested. The UCLA Smart-grid Energy Research Center (SMERC) is working on a smart charging research platform that includes data acquired in real time from PEVs being charged in order to investigate smart charging algorithms and demand response (DR) strategies for PEVs in large parking garage settings. The system outlined in this work allows PEVs to be remotely monitored throughout the charging process by a smart-charging controller communicating through a mesh network of charging stations and in-vehicle monitoring devices. The approach may be used for Vehicle to Grid (V2G) communication as well as PEV monitoring.

  17. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network

    Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi

    2016-01-01

    Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.’s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.’s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client’s privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay. PMID:27171160

  18. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.

    Yan-Ming Lai

    Full Text Available Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN based on tickets. Unfortunately, Li et al.'s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.'s protocol includes the use of high-quality tamper-proof devices (TPDs, and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client's privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay.

  19. Networked Attached Devices at SNS

    Blokland, W

    2003-01-01

    The Spallation Neutron Source (SNS) diagnostic instruments at Oak Ridge National Laboratory are based on the Network Attached Device (NAD) concept. Each pickup or sensor has its own resources such as timing, data acquisition and processing. NADs are individually connected to the network, thus reducing the brittleness inherent in tightly coupled systems. This architecture allows an individual device to fail or to be serviced or removed without disrupting other devices. This paper describes our implementation of the nearly 400 NADs to be deployed. The hardware consists of rack-mounted PCs with standard motherboards and PCI data-acquisition boards. The software environment is based on LabVIEW and EPICS. LabVIEW supports the agile development demanded by modern diagnostic systems. EPICS is the control system standard for the entire SNS facility. To achieve high performance, LabVIEW and EPICS communicate through shared memory. SNS diagnostics are developed by a multi-laboratory partnership including ORNL, BNL, LAN...

  20. Intercluster Connection in Cognitive Wireless Mesh Networks Based on Intelligent Network Coding

    Chen, Xianfu; Zhao, Zhifeng; Jiang, Tao; Grace, David; Zhang, Honggang

    2009-12-01

    Cognitive wireless mesh networks have great flexibility to improve spectrum resource utilization, within which secondary users (SUs) can opportunistically access the authorized frequency bands while being complying with the interference constraint as well as the QoS (Quality-of-Service) requirement of primary users (PUs). In this paper, we consider intercluster connection between the neighboring clusters under the framework of cognitive wireless mesh networks. Corresponding to the collocated clusters, data flow which includes the exchanging of control channel messages usually needs four time slots in traditional relaying schemes since all involved nodes operate in half-duplex mode, resulting in significant bandwidth efficiency loss. The situation is even worse at the gateway node connecting the two colocated clusters. A novel scheme based on network coding is proposed in this paper, which needs only two time slots to exchange the same amount of information mentioned above. Our simulation shows that the network coding-based intercluster connection has the advantage of higher bandwidth efficiency compared with the traditional strategy. Furthermore, how to choose an optimal relaying transmission power level at the gateway node in an environment of coexisting primary and secondary users is discussed. We present intelligent approaches based on reinforcement learning to solve the problem. Theoretical analysis and simulation results both show that the intelligent approaches can achieve optimal throughput for the intercluster relaying in the long run.

  1. An Efficient Mesh Generation Method for Fractured Network System Based on Dynamic Grid Deformation

    Shuli Sun

    2013-01-01

    Full Text Available Meshing quality of the discrete model influences the accuracy, convergence, and efficiency of the solution for fractured network system in geological problem. However, modeling and meshing of such a fractured network system are usually tedious and difficult due to geometric complexity of the computational domain induced by existence and extension of fractures. The traditional meshing method to deal with fractures usually involves boundary recovery operation based on topological transformation, which relies on many complicated techniques and skills. This paper presents an alternative and efficient approach for meshing fractured network system. The method firstly presets points on fractures and then performs Delaunay triangulation to obtain preliminary mesh by point-by-point centroid insertion algorithm. Then the fractures are exactly recovered by local correction with revised dynamic grid deformation approach. Smoothing algorithm is finally applied to improve the quality of mesh. The proposed approach is efficient, easy to implement, and applicable to the cases of initial existing fractures and extension of fractures. The method is successfully applied to modeling of two- and three-dimensional discrete fractured network (DFN system in geological problems to demonstrate its effectiveness and high efficiency.

  2. Almost optimal distributed M2M multicasting in wireless mesh networks

    Xin, Qin; Manne, Fredrik; Zhang, Yan

    2012-01-01

    Wireless Mesh Networking (WMN) is an emerging communication paradigm to enable resilient, cost-efficient and reliable services for the future-generation wireless networks. In this paper, we study the problem of multipoint-to- multipoint (M2M) multicasting in a WMN which aims to use the minimum nu...

  3. Work in progress: a channel selection algorithm for a TVWS mesh network

    Zlobinsky, Natasha

    2016-09-01

    Full Text Available and routing for throughput optimization in multi-radio wireless mesh networks,” Proc. 11th Annu. Int. Conf. Mob. Comput. Netw. - MobiCom ’05, p. 58, 2005. [4] M. R. Rai, S. Vahid, and K. Moessner, “SINR based Topology Control for Multihop Wireless Networks...

  4. Energy optimization based path selection algorithm for IEEE 802.11s wireless mesh networks

    Mhlanga, MM

    2011-09-01

    Full Text Available It is everyone’s dream to have network connectivity anywhere at all times. This dream can only be realized provided there are feasible solutions that are put in place for the next generation of wireless works. Wireless Mesh Networks (WMNs...

  5. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    Nawab, Faisal; Jamshaid, Kamran; Shihada, Basem; Ho, Pin-Han

    2012-01-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue

  6. Network topology exploration of mesh-based coarse-grain reconfigurable architectures

    Bansal, N.; Gupta, S.; Dutt, N.D.; Nicolau, A.; Gupta, R.

    2004-01-01

    Several coarse-grain reconfigurable architectures proposed recently consist of a large number of processing elements (PEs) connected in a mesh-like network topology. We study the effects of three aspects of network topology exploration on the performance of applications on these architectures: (a)

  7. The earthing system of the PRIMA Neutral Beam Test Facility based on the Mesh Common Bonding Network topology

    Pomaro, Nicola; Boldrin, Marco; Lazzaro, Gabriele

    2015-01-01

    Highlights: • We designed a high performance earthing system for the ITER Neutral Beam Test Facility. • The system is based on the Mesh Common Bonded Network topology. • Careful bonding of all metallic structures allowed to obtain a well meshed system. • Special care was dedicated to improve EMC performance of critical areas like control rooms. • The facility experimental results will be representative also of the ITER situation. - Abstract: PRIMA is a large experimental facility under realization in Padova, aimed at developing and testing the Neutral Beam Injectors for ITER. The operation of these devices involves high RF power and voltage up to 1 MV. Frequent and high voltage electrical breakdowns inside the beam sources occur regularly. The presence of a distributed carefully optimized earthing system is of paramount importance to achieve a satisfying disturbances immunity for equipment and diagnostics. The paper describes the design and the realization of the earthing system of the PRIMA facility, which is based on the MESH-Common Bonding Network (MESH-CBN) topology, as recommended by IEC and IEEE standards for installations with high levels of Electromagnetic Interferences (EMI). The principles of the MESH-CBN approach were adapted to the PRIMA layout, which is composed by several buildings, that are independent for seismic and architectural reasons, but are linked by many electrical conduits and hydraulic pipelines. The availability of huge foundations, with a large number of poles and pillars, was taken into account; building parts dedicated to host control rooms and sensitive equipment were treated with particular care. Moreover, the lightning protection system was integrated and harmonized with the earthing system.

  8. The earthing system of the PRIMA Neutral Beam Test Facility based on the Mesh Common Bonding Network topology

    Pomaro, Nicola, E-mail: nicola.pomaro@igi.cnr.it; Boldrin, Marco; Lazzaro, Gabriele

    2015-10-15

    Highlights: • We designed a high performance earthing system for the ITER Neutral Beam Test Facility. • The system is based on the Mesh Common Bonded Network topology. • Careful bonding of all metallic structures allowed to obtain a well meshed system. • Special care was dedicated to improve EMC performance of critical areas like control rooms. • The facility experimental results will be representative also of the ITER situation. - Abstract: PRIMA is a large experimental facility under realization in Padova, aimed at developing and testing the Neutral Beam Injectors for ITER. The operation of these devices involves high RF power and voltage up to 1 MV. Frequent and high voltage electrical breakdowns inside the beam sources occur regularly. The presence of a distributed carefully optimized earthing system is of paramount importance to achieve a satisfying disturbances immunity for equipment and diagnostics. The paper describes the design and the realization of the earthing system of the PRIMA facility, which is based on the MESH-Common Bonding Network (MESH-CBN) topology, as recommended by IEC and IEEE standards for installations with high levels of Electromagnetic Interferences (EMI). The principles of the MESH-CBN approach were adapted to the PRIMA layout, which is composed by several buildings, that are independent for seismic and architectural reasons, but are linked by many electrical conduits and hydraulic pipelines. The availability of huge foundations, with a large number of poles and pillars, was taken into account; building parts dedicated to host control rooms and sensitive equipment were treated with particular care. Moreover, the lightning protection system was integrated and harmonized with the earthing system.

  9. Electrostatic X-ray image recording device with mesh-base photocathode photoelectron discriminator means

    1977-01-01

    An electrostatic X-ray image recording device having a pair of spaced electrodes with a gas-filled gap therebetween, and including discrimination means, having a conductive mesh supporting a photocathodic material, positioned in the gas-filled gap between a first electrode having a layer of ultraviolet-emitting fluorescent material and a second electrode having a plastic sheet adjacent thereto for receiving photoelectrons emitted by the photocathodic material and accelerated to the second electrode by an applied field. The photoconductor-mesh element discriminates against fast electrons, produced by direct impingement of X-rays upon the photocathode to substantially reduce secondary electron production and amplification, thereby increasing both the signal-to-noise and contrast ratios. The electrostatic image formed on the plastic sheet is developed by zerographic techniques after exposure. (Auth.)

  10. Leveraging the power of mesh

    Glass, H. [Cellnet, Alpharetta, GA (United States)

    2006-07-01

    Mesh network applications are used by utilities for metering, demand response, and mobile workforce management. This presentation provided an overview of a multi-dimensional mesh application designed to offer improved scalability and higher throughput in advanced metering infrastructure (AMI) systems. Mesh applications can be used in AMI for load balancing and forecasting, as well as for distribution and transmission planning. New revenue opportunities can be realized through the application's ability to improve notification and monitoring services, and customer service communications. Mesh network security features include data encryption, data fragmentation and the automatic re-routing of data. In order to use mesh network applications, networks must have sufficient bandwidth and provide flexibility at the endpoint layer to support multiple devices from multiple vendors, as well as support multiple protocols. It was concluded that smart meters will not enable energy response solutions without an underlying AMI that is reliable, scalable and self-healing. .refs., tabs., figs.

  11. Temporary abdominal closure with zipper-mesh device for management of intra-abdominal sepsis

    Edivaldo Massazo Utiyama

    Full Text Available OBJECTIVE: to present our experience with scheduled reoperations in 15 patients with intra-abdominal sepsis. METHODS: we have applied a more effective technique consisting of temporary abdominal closure with a nylon mesh sheet containing a zipper. We performed reoperations in the operating room under general anesthesia at an average interval of 84 hours. The revision consisted of debridement of necrotic material and vigorous lavage of the involved peritoneal area. The mean age of patients was 38.7 years (range, 15 to 72 years; 11 patients were male, and four were female. RESULTS: forty percent of infections were due to necrotizing pancreatitis. Sixty percent were due to perforation of the intestinal viscus secondary to inflammation, vascular occlusion or trauma. We performed a total of 48 reoperations, an average of 3.2 surgeries per patient. The mesh-zipper device was left in place for an average of 13 days. An intestinal ostomy was present adjacent to the zipper in four patients and did not present a problem for patient management. Mortality was 26.6%. No fistulas resulted from this technique. When intra-abdominal disease was under control, the mesh-zipper device was removed, and the fascia was closed in all patients. In three patients, the wound was closed primarily, and in 12 it was allowed to close by secondary intent. Two patients developed hernia; one was incisional and one was in the drain incision. CONCLUSION: the planned reoperation for manual lavage and debridement of the abdomen through a nylon mesh-zipper combination was rapid, simple, and well-tolerated. It permitted effective management of severe septic peritonitis, easy wound care and primary closure of the abdominal wall.

  12. Design of RFID Mesh Network for Electric Vehicle Smart Charging Infrastructure

    Chung, Ching-Yen; Shepelev, Aleksey; Qiu, Charlie; Chu, Chi-Cheng; Gadh, Rajit

    2013-09-04

    With an increased number of Electric Vehicles (EVs) on the roads, charging infrastructure is gaining an ever-more important role in simultaneously meeting the needs of the local distribution grid and of EV users. This paper proposes a mesh network RFID system for user identification and charging authorization as part of a smart charging infrastructure providing charge monitoring and control. The Zigbee-based mesh network RFID provides a cost-efficient solution to identify and authorize vehicles for charging and would allow EV charging to be conducted effectively while observing grid constraints and meeting the needs of EV drivers

  13. Energy efficient topology control algorithm for wireless mesh networks

    Aron, FO

    2008-08-01

    Full Text Available The control of the topology of a network makes it possible for the network nodes to reduce their power of transmission while ensuring that network connectivity is preserved. This paper explains the need for energy consumption control in Wireless...

  14. Device Performance Improvement of Double-Pass Wire Mesh Packed Solar Air Heaters under Recycling Operation Conditions

    Chii-Dong Ho

    2016-01-01

    Full Text Available The improvement of device performance of a recycling solar air heater featuring a wire mesh packing was investigated experimentally and theoretically. The application of the wire mesh packing and recycle-effect concept to the present study were proposed aiming to strengthen the convective heat-transfer coefficient due to increased turbulence. Comparisons were made among different designs, including the single-pass, flat-plate double-pass and recycling double-pass wire mesh packed operations. The collector efficiency of the recycling double-pass wire mesh packed solar air heater was much higher than that of the other configurations for various recycle ratios and mass flow rates scenarios. The power consumption increment due to implementing wire mesh in solar air heaters was also discussed considering the economic feasibility. A fairly good agreement between theoretical predictions and experimental measurements was achieved with an analyzed error of 1.07%–9.32%.

  15. Multiple-state based power control for multi-radio multi-channel wireless mesh networks

    Olwal, TO

    2009-01-01

    Full Text Available Multi-Radio Multi-Channel (MRMC) systems are key to power control problems in wireless mesh networks (WMNs). In this paper, we present asynchronous multiple-state based power control for MRMC WMNs. First, WMN is represented as a set of disjoint...

  16. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    Mhlanga, MM

    2009-01-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  17. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    Mhlanga, MM

    2009-08-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  18. Range based power control for multi-radio multi-channel wireless mesh networks

    Olwal, TO

    2009-08-01

    Full Text Available Multi-Radio Multi-Channel (MRMC) systems are key to power control problems in Wireless Mesh Networks (WMNs). In this paper, researchers present a range based dynamic power control for MRMC WMNs. First, WMN is represented as a set of disjoint Unified...

  19. TMAC: Timestamp-Ordered MAC for CSMA/CA Wireless Mesh Networks

    Nawab, Faisal Saud Yousef; Jamshaid, Kamran; Shihada, Basem; Ho, Pin-Han

    2011-01-01

    We propose TMAC, a timestamp-ordered MAC protocol for Wireless Mesh Networks (WMNs). TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended

  20. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  1. Joint Channel Assignment and Routing in Multiradio Multichannel Wireless Mesh Networks: Design Considerations and Approaches

    Omar M. Zakaria

    2016-01-01

    Full Text Available Multiradio wireless mesh network is a promising architecture that improves the network capacity by exploiting multiple radio channels concurrently. Channel assignment and routing are underlying challenges in multiradio architectures since both determine the traffic distribution over links and channels. The interdependency between channel assignments and routing promotes toward the joint solutions for efficient configurations. This paper presents an in-depth review of the joint approaches of channel assignment and routing in multiradio wireless mesh networks. First, the key design issues, modeling, and approaches are identified and discussed. Second, existing algorithms for joint channel assignment and routing are presented and classified based on the channel assignment types. Furthermore, the set of reconfiguration algorithms to adapt the network traffic dynamics is also discussed. Finally, the paper presents some multiradio practical implementations and test-beds and points out the future research directions.

  2. Optimization of the Compensation of a Meshed MV Network by a Modified Genetic Algorithm

    Nielsen, Hans; Paar, M.; Toman, P.

    2007-01-01

    The article discusses the utilization of a modified genetic algorithm (GA) for the optimization of the shunt compensation in meshed and radial MV distribution networks. The algorithm looks for minimum costs of the network power losses and minimum capital and operating costs of applied capacitors......, all of this under limitations specified by a multicriteria penalization function. The parallel evolution branches in the GA are used for the purpose of the optimization accelaration. The application of this GA has been implemented in Matlab. The evaluation part of the GA implementation is based...... on the steady-state analysis using a linear one-line diagram model of a power network. The results of steady-state solutions are compared with the results from the DIgSILENT PowerFactory program. Its practical applicability is demonstrated on examples of 22 kV and meshed overhead distribution networks....

  3. High throughput route selection in multi-rate wireless mesh networks

    WEI Yi-fei; GUO Xiang-li; SONG Mei; SONG Jun-de

    2008-01-01

    Most existing Ad-hoc routing protocols use the shortest path algorithm with a hop count metric to select paths. It is appropriate in single-rate wireless networks, but has a tendency to select paths containing long-distance links that have low data rates and reduced reliability in multi-rate networks. This article introduces a high throughput routing algorithm utilizing the multi-rate capability and some mesh characteristics in wireless fidelity (WiFi) mesh networks. It uses the medium access control (MAC) transmission time as the routing metric, which is estimated by the information passed up from the physical layer. When the proposed algorithm is adopted, the Ad-hoc on-demand distance vector (AODV) routing can be improved as high throughput AODV (HT-AODV). Simulation results show that HT-AODV is capable of establishing a route that has high data-rate, short end-to-end delay and great network throughput.

  4. Mesh Networking in the Tactical Environment Using White Space Technolog

    2015-12-01

    facilitate the establishment of a point to multi-point network topology . The base station node handles the compilation of data necessary to determine a...the client nodes from the base station node, the number of client nodes, and the network topology . The metrics chosen for evaluation were picked as a...model, are commonly utilized to simulate quadratic path loss across free space [22]. This model uses the following formula to calculate path loss: L

  5. Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks

    Hassanzadeh, Amin

    2011-07-18

    Wireless Mesh Networks (WMN) are easy-to-deploy, low cost solutions for providing networking and internet services in environments with no network infrastructure, e.g., disaster areas and battlefields. Since electric power is not readily available in such environments battery-powered mesh routers, operating in an energy efficient manner, are required. To the best of our knowledge, the impact of energy efficient solutions, e.g., involving duty-cycling, on WMN intrusion detection systems, which require continuous monitoring, remains an open research problem. In this paper we propose that carefully chosen monitoring mesh nodes ensure continuous and complete detection coverage, while allowing non-monitoring mesh nodes to save energy through duty-cycling. We formulate the monitoring node selection problem as an optimization problem and propose distributed and centralized solutions for it, with different tradeoffs. Through extensive simulations and a proof-of-concept hardware/software implementation we demonstrate that our solutions extend the WMN lifetime by 8%, while ensuring, at the minimum, a 97% intrusion detection rate.

  6. Promoting Wired Links in Wireless Mesh Networks: An Efficient Engineering Solution

    Barekatain, Behrang; Raahemifar, Kaamran; Ariza Quintana, Alfonso; Triviño Cabrera, Alicia

    2015-01-01

    Wireless Mesh Networks (WMNs) cannot completely guarantee good performance of traffic sources such as video streaming. To improve the network performance, this study proposes an efficient engineering solution named Wireless-to-Ethernet-Mesh-Portal-Passageway (WEMPP) that allows effective use of wired communication in WMNs. WEMPP permits transmitting data through wired and stable paths even when the destination is in the same network as the source (Intra-traffic). Tested with four popular routing protocols (Optimized Link State Routing or OLSR as a proactive protocol, Dynamic MANET On-demand or DYMO as a reactive protocol, DYMO with spanning tree ability and HWMP), WEMPP considerably decreases the end-to-end delay, jitter, contentions and interferences on nodes, even when the network size or density varies. WEMPP is also cost-effective and increases the network throughput. Moreover, in contrast to solutions proposed by previous studies, WEMPP is easily implemented by modifying the firmware of the actual Ethernet hardware without altering the routing protocols and/or the functionality of the IP/MAC/Upper layers. In fact, there is no need for modifying the functionalities of other mesh components in order to work with WEMPPs. The results of this study show that WEMPP significantly increases the performance of all routing protocols, thus leading to better video quality on nodes. PMID:25793516

  7. On the Packet Loss Correlation in Wireless Mesh Networks

    Pahlevani, Peyman; Cabrera Guerrero, Juan Alberto; Roetter, Daniel Enrique Lucani

    2014-01-01

    /or multi-path routing approaches as well as network coding (NC) subgraph selection problems (routing in NC). This paper proposes simple channel models to incorporate the effect of correlation between receivers in a parametric fashion and supports them with a measurement campaign that leverages various...

  8. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  9. Achieving Fair Throughput among TCP Flows in Multi-Hop Wireless Mesh Networks

    Hou, Ting-Chao; Hsu, Chih-Wei

    Previous research shows that the IEEE 802.11 DCF channel contention mechanism is not capable of providing throughput fairness among nodes in different locations of the wireless mesh network. The node nearest the gateway will always strive for the chance to transmit data, causing fewer transmission opportunities for the nodes farther from the gateway, resulting in starvation. Prior studies modify the DCF mechanism to address the fairness problem. This paper focuses on the fairness study when TCP flows are carried over wireless mesh networks. By not modifying lower layer protocols, the current work identifies TCP parameters that impact throughput fairness and proposes adjusting those parameters to reduce frame collisions and improve throughput fairness. With the aid of mathematical formulation and ns2 simulations, this study finds that frame transmission from each node can be effectively controlled by properly controlling the delayed ACK timer and using a suitable advertised window. The proposed method reduces frame collisions and greatly improves TCP throughput fairness.

  10. Contribution to the improvement of the performance of wireless mesh networks providing real time services

    Vázquez Rodas, Andrés Marcelo

    2015-01-01

    Nowadays, people expectations for ubiquitous connectivity is continuously growing. Cities are now moving towards the smart city paradigm. Electricity companies aims to become part of smart grids. Internet is no longer exclusive for humans, we now assume the Internet of everything. We consider that Wireless Mesh Networks (WMNs) have a set of valuable features that will make it an important part of such environments. WMNs can also be use in less favored areas thanks to their low-cost deployment...

  11. Inter-flow and intra-flow interference mitigation routing in wireless mesh networks

    Houaidia, Chiraz; Idoudi, Hanen; Van den Bossche, Adrien; Saidane, Leila; Val, Thierry

    2017-01-01

    In this paper, we address the problem of QoS support in an heterogeneous multi-rate wireless mesh network. We propose a new routing metric that provides information about link quality, based on PHY and MAC characteristics, including the link availability, the loss rate and the available bandwidth. This metric allows to apprehend inter-flow interferences and avoid bottleneck formation by balancing traffic load on the links. Based on the conflict graph model and calculation of maximal cliques, ...

  12. A QoS Framework with Traffic Request in Wireless Mesh Network

    Fu, Bo; Huang, Hejiao

    In this paper, we consider major issues in ensuring greater Quality-of-Service (QoS) in Wireless Mesh Networks (WMNs), specifically with regard to reliability and delay. To this end, we use traffic request to record QoS requirements of data flows. In order to achieve required QoS for all data flows efficiently and with high portability, we develop Network State Update Algorithm. All assumptions, definitions, and algorithms are made exclusively with WMNs in mind, guaranteeing the portability of our framework to various environments in WMNs. The simulation results in proof that our framework is correct.

  13. Large Scale Environmental Monitoring through Integration of Sensor and Mesh Networks

    Raja Jurdak

    2008-11-01

    Full Text Available Monitoring outdoor environments through networks of wireless sensors has received interest for collecting physical and chemical samples at high spatial and temporal scales. A central challenge to environmental monitoring applications of sensor networks is the short communication range of the sensor nodes, which increases the complexity and cost of monitoring commodities that are located in geographically spread areas. To address this issue, we propose a new communication architecture that integrates sensor networks with medium range wireless mesh networks, and provides users with an advanced web portal for managing sensed information in an integrated manner. Our architecture adopts a holistic approach targeted at improving the user experience by optimizing the system performance for handling data that originates at the sensors, traverses the mesh network, and resides at the server for user consumption. This holistic approach enables users to set high level policies that can adapt the resolution of information collected at the sensors, set the preferred performance targets for their application, and run a wide range of queries and analysis on both real-time and historical data. All system components and processes will be described in this paper.

  14. Large Scale Environmental Monitoring through Integration of Sensor and Mesh Networks.

    Jurdak, Raja; Nafaa, Abdelhamid; Barbirato, Alessio

    2008-11-24

    Monitoring outdoor environments through networks of wireless sensors has received interest for collecting physical and chemical samples at high spatial and temporal scales. A central challenge to environmental monitoring applications of sensor networks is the short communication range of the sensor nodes, which increases the complexity and cost of monitoring commodities that are located in geographically spread areas. To address this issue, we propose a new communication architecture that integrates sensor networks with medium range wireless mesh networks, and provides users with an advanced web portal for managing sensed information in an integrated manner. Our architecture adopts a holistic approach targeted at improving the user experience by optimizing the system performance for handling data that originates at the sensors, traverses the mesh network, and resides at the server for user consumption. This holistic approach enables users to set high level policies that can adapt the resolution of information collected at the sensors, set the preferred performance targets for their application, and run a wide range of queries and analysis on both real-time and historical data. All system components and processes will be described in this paper.

  15. 3D High Resolution Mesh Deformation Based on Multi Library Wavelet Neural Network Architecture

    Dhibi, Naziha; Elkefi, Akram; Bellil, Wajdi; Amar, Chokri Ben

    2016-12-01

    This paper deals with the features of a novel technique for large Laplacian boundary deformations using estimated rotations. The proposed method is based on a Multi Library Wavelet Neural Network structure founded on several mother wavelet families (MLWNN). The objective is to align features of mesh and minimize distortion with a fixed feature that minimizes the sum of the distances between all corresponding vertices. New mesh deformation method worked in the domain of Region of Interest (ROI). Our approach computes deformed ROI, updates and optimizes it to align features of mesh based on MLWNN and spherical parameterization configuration. This structure has the advantage of constructing the network by several mother wavelets to solve high dimensions problem using the best wavelet mother that models the signal better. The simulation test achieved the robustness and speed considerations when developing deformation methodologies. The Mean-Square Error and the ratio of deformation are low compared to other works from the state of the art. Our approach minimizes distortions with fixed features to have a well reconstructed object.

  16. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  17. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    Nawab, Faisal

    2012-08-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol to alleviate the unfairness problem in WMNs. Our protocol uses the age of packet as a priority metric for packet scheduling. Simulation is conducted to validate our model and to illustrate the fairness characteristics of our proposed MAC protocol. We conclude that we can achieve fairness with only little impact on network capacity.

  18. Dynamic segment shared protection for multicast traffic in meshed wavelength-division-multiplexing optical networks

    Liao, Luhua; Li, Lemin; Wang, Sheng

    2006-12-01

    We investigate the protection approach for dynamic multicast traffic under shared risk link group (SRLG) constraints in meshed wavelength-division-multiplexing optical networks. We present a shared protection algorithm called dynamic segment shared protection for multicast traffic (DSSPM), which can dynamically adjust the link cost according to the current network state and can establish a primary light-tree as well as corresponding SRLG-disjoint backup segments for a dependable multicast connection. A backup segment can efficiently share the wavelength capacity of its working tree and the common resources of other backup segments based on SRLG-disjoint constraints. The simulation results show that DSSPM not only can protect the multicast sessions against a single-SRLG breakdown, but can make better use of the wavelength resources and also lower the network blocking probability.

  19. Algorithm for protecting light-trees in survivable mesh wavelength-division-multiplexing networks

    Luo, Hongbin; Li, Lemin; Yu, Hongfang

    2006-12-01

    Wavelength-division-multiplexing (WDM) technology is expected to facilitate bandwidth-intensive multicast applications such as high-definition television. A single fiber cut in a WDM mesh network, however, can disrupt the dissemination of information to several destinations on a light-tree based multicast session. Thus it is imperative to protect multicast sessions by reserving redundant resources. We propose a novel and efficient algorithm for protecting light-trees in survivable WDM mesh networks. The algorithm is called segment-based protection with sister node first (SSNF), whose basic idea is to protect a light-tree using a set of backup segments with a higher priority to protect the segments from a branch point to its children (sister nodes). The SSNF algorithm differs from the segment protection scheme proposed in the literature in how the segments are identified and protected. Our objective is to minimize the network resources used for protecting each primary light-tree such that the blocking probability can be minimized. To verify the effectiveness of the SSNF algorithm, we conduct extensive simulation experiments. The simulation results demonstrate that the SSNF algorithm outperforms existing algorithms for the same problem.

  20. Large-scale structure of a network of co-occurring MeSH terms: statistical analysis of macroscopic properties.

    Andrej Kastrin

    Full Text Available Concept associations can be represented by a network that consists of a set of nodes representing concepts and a set of edges representing their relationships. Complex networks exhibit some common topological features including small diameter, high degree of clustering, power-law degree distribution, and modularity. We investigated the topological properties of a network constructed from co-occurrences between MeSH descriptors in the MEDLINE database. We conducted the analysis on two networks, one constructed from all MeSH descriptors and another using only major descriptors. Network reduction was performed using the Pearson's chi-square test for independence. To characterize topological properties of the network we adopted some specific measures, including diameter, average path length, clustering coefficient, and degree distribution. For the full MeSH network the average path length was 1.95 with a diameter of three edges and clustering coefficient of 0.26. The Kolmogorov-Smirnov test rejects the power law as a plausible model for degree distribution. For the major MeSH network the average path length was 2.63 edges with a diameter of seven edges and clustering coefficient of 0.15. The Kolmogorov-Smirnov test failed to reject the power law as a plausible model. The power-law exponent was 5.07. In both networks it was evident that nodes with a lower degree exhibit higher clustering than those with a higher degree. After simulated attack, where we removed 10% of nodes with the highest degrees, the giant component of each of the two networks contains about 90% of all nodes. Because of small average path length and high degree of clustering the MeSH network is small-world. A power-law distribution is not a plausible model for the degree distribution. The network is highly modular, highly resistant to targeted and random attack and with minimal dissortativity.

  1. A Cross-Layer Routing Design for Multi-Interface Wireless Mesh Networks

    Tzu-Chieh Tsai

    2009-01-01

    Full Text Available In recent years, Wireless Mesh Networks (WMNs technologies have received significant attentions. WMNs not only accede to the advantages of ad hoc networks but also provide hierarchical multi-interface architecture. Transmission power control and routing path selections are critical issues in the past researches of multihop networks. Variable transmission power levels lead to different network connectivity and interference. Further, routing path selections among different radio interfaces will also produce different intra-/interflow interference. These features tightly affect the network performance. Most of the related works on the routing protocol design do not consider transmission power control and multi-interface environment simultaneously. In this paper, we proposed a cross-layer routing protocol called M2iRi2 which coordinates transmission power control and intra-/interflow interference considerations as routing metrics. Each radio interface calculates the potential tolerable-added transmission interference in the physical layer. When the route discovery starts, the M2iRi2 will adopt the appropriate power level to evaluate each interface quality along paths. The simulation results demonstrate that our design can enhance both network throughput and end-to-end delay.

  2. An Underlay Communication Channel for 5G Cognitive Mesh Networks: Packet Design, Implementation, Analysis, and Experimental Results

    Tarek Haddadin; Stephen Andrew Laraway; Arslan Majid; Taylor Sibbett; Daryl Leon Wasden; Brandon F Lo; Lloyd Landon; David Couch; Hussein Moradi; Behrouz Farhang-Boroujeny

    2016-04-01

    This paper proposes and presents the design and implementation of an underlay communication channel (UCC) for 5G cognitive mesh networks. The UCC builds its waveform based on filter bank multicarrier spread spectrum (FB-MCSS) signaling. The use of this novel spread spectrum signaling allows the device-to-device (D2D) user equipments (UEs) to communicate at a level well below noise temperature and hence, minimize taxation on macro-cell/small-cell base stations and their UEs in 5G wireless systems. Moreover, the use of filter banks allows us to avoid those portions of the spectrum that are in use by macro-cell and small-cell users. Hence, both D2D-to-cellular and cellular-to-D2D interference will be very close to none. We propose a specific packet for UCC and develop algorithms for packet detection, timing acquisition and tracking, as well as channel estimation and equalization. We also present the detail of an implementation of the proposed transceiver on a software radio platform and compare our experimental results with those from a theoretical analysis of our packet detection algorithm.

  3. Virtual MIMO Beamforming and Device Pairing Enabled by Device-to-Device Communications for Multidevice Networks

    Yeonjin Jeong

    2017-01-01

    Full Text Available We consider a multidevice network with asymmetric antenna configurations which supports not only communications between an access point and devices but also device-to-device (D2D communications for the Internet of things. For the network, we propose the transmit and receive beamforming with the channel state information (CSI for virtual multiple-input multiple-output (MIMO enabled by D2D receive cooperation. We analyze the sum rate achieved by a device pair in the proposed method and identify the strategies to improve the sum rate of the device pair. We next present a distributed algorithm and its equivalent algorithm for device pairing to maximize the throughput of the multidevice network. Simulation results confirm the advantages of the transmit CSI and D2D cooperation as well as the validity of the distributive algorithm.

  4. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...

  5. Interference Effects Redress over Power-Efficient Wireless-Friendly Mesh Networks for Ubiquitous Sensor Communications across Smart Cities.

    Santana, Jose; Marrero, Domingo; Macías, Elsa; Mena, Vicente; Suárez, Álvaro

    2017-07-21

    Ubiquitous sensing allows smart cities to take control of many parameters (e.g., road traffic, air or noise pollution levels, etc.). An inexpensive Wireless Mesh Network can be used as an efficient way to transport sensed data. When that mesh is autonomously powered (e.g., solar powered), it constitutes an ideal portable network system which can be deployed when needed. Nevertheless, its power consumption must be restrained to extend its operational cycle and for preserving the environment. To this end, our strategy fosters wireless interface deactivation among nodes which do not participate in any route. As we show, this contributes to a significant power saving for the mesh. Furthermore, our strategy is wireless-friendly, meaning that it gives priority to deactivation of nodes receiving (and also causing) interferences from (to) the rest of the smart city. We also show that a routing protocol can adapt to this strategy in which certain nodes deactivate their own wireless interfaces.

  6. Flow Oriented Channel Assignment for Multi-radio Wireless Mesh Networks

    Niu Zhisheng

    2010-01-01

    Full Text Available We investigate channel assignment for a multichannel wireless mesh network backbone, where each router is equipped with multiple interfaces. Of particular interest is the development of channel assignment heuristics for multiple flows. We present an optimization formulation and then propose two iterative flow oriented heuristics for the conflict-free and interference-aware cases, respectively. To maximize the aggregate useful end-to-end flow rates, both algorithms identify and resolve congestion at instantaneous bottleneck link in each iteration. Then the link rate is optimally allocated among contending flows that share this link by solving a linear programming (LP problem. A thorough performance evaluation is undertaken as a function of the number of channels and interfaces/node and the number of contending flows. The performance of our algorithm is shown to be significantly superior to best known algorithm in its class in multichannel limited radio scenarios.

  7. An Interference-Aware Admission Control Design for Wireless Mesh Networks

    Manikantan Shila Devu

    2010-01-01

    Full Text Available In this paper, we present IAC, an interference aware admission control algorithm for use in wireless mesh networks. The core concept of IAC is to use a low overhead dual threshold based approach to share the bandwidth information with its neighbors in the interfering range. As a result, IAC guarantees that the shared wireless bandwidth is not overutilized and the quality of all existing flows are preserved. Moreover, IAC takes into account the intraflow interference effect to estimate the bandwidth consumption of the flow in a multihop path. We have further proposed two approaches of bandwidth allocation, FCFS and MCU, and demonstrated that proper tuning of thresholds can lead to high performance of both schemes. Simulation results illustrate that IAC effectively limits the overutilization of channel resources which in turn results in high throughput, low delay and low packet loss rate for all admitted flows.

  8. Distributed Synchronization Technique for OFDMA-Based Wireless Mesh Networks Using a Bio-Inspired Algorithm

    Mi Jeong Kim

    2015-07-01

    Full Text Available In this paper, a distributed synchronization technique based on a bio-inspired algorithm is proposed for an orthogonal frequency division multiple access (OFDMA-based wireless mesh network (WMN with a time difference of arrival. The proposed time- and frequency-synchronization technique uses only the signals received from the neighbor nodes, by considering the effect of the propagation delay between the nodes. It achieves a fast synchronization with a relatively low computational complexity because it is operated in a distributed manner, not requiring any feedback channel for the compensation of the propagation delays. In addition, a self-organization scheme that can be effectively used to construct 1-hop neighbor nodes is proposed for an OFDMA-based WMN with a large number of nodes. The performance of the proposed technique is evaluated with regard to the convergence property and synchronization success probability using a computer simulation.

  9. Distributed Synchronization Technique for OFDMA-Based Wireless Mesh Networks Using a Bio-Inspired Algorithm.

    Kim, Mi Jeong; Maeng, Sung Joon; Cho, Yong Soo

    2015-07-28

    In this paper, a distributed synchronization technique based on a bio-inspired algorithm is proposed for an orthogonal frequency division multiple access (OFDMA)-based wireless mesh network (WMN) with a time difference of arrival. The proposed time- and frequency-synchronization technique uses only the signals received from the neighbor nodes, by considering the effect of the propagation delay between the nodes. It achieves a fast synchronization with a relatively low computational complexity because it is operated in a distributed manner, not requiring any feedback channel for the compensation of the propagation delays. In addition, a self-organization scheme that can be effectively used to construct 1-hop neighbor nodes is proposed for an OFDMA-based WMN with a large number of nodes. The performance of the proposed technique is evaluated with regard to the convergence property and synchronization success probability using a computer simulation.

  10. Evaluation of VoIP QoS Performance in Wireless Mesh Networks

    Mohammad Tariq Meeran

    2017-07-01

    Full Text Available The main focus of this research article is the evaluation of selected voice over Internet protocol (VoIP solutions in wireless mesh network (WMN scenarios. While WMNs have self-healing, self-forming, and dynamic topology features, they still pose challenges for the implementation of multimedia applications such as voice in various scenarios. Therefore, various solutions to make WMN more suitable for VoIP application have been proposed in the scientific literature. In this work, we have extensively explored a set of applicable scenarios by conducting experiments by means of a network simulator. The following scenarios were selected as the most representatives for performance evaluation: first responders, flooded village, remote village, and platoon deployment. Each selected scenario has been studied under six sub-scenarios corresponding to various combinations of the IEEE 802.11g, 802.11n, 802.11s, and 802.11e standards; the G.711 and G.729 codecs; and the ad hoc on demand distance vector (AODV and hybrid wireless mesh protocol (HWMP routing protocols. The results in terms of quality of service (measured with the mean opinion score rating scale, supported by the analysis of delay, jitter and packet loss, show that 802.11g integration with both VoIP codecs and AODV routing protocol results in better VoIP performance as compared to most other scenarios. In case of 802.11g integration with 802.11s, VoIP performance decreases as compared to the other sub-scenarios without 802.11s. The results also show that 802.11n integration with 802.11e decreases VoIP performance in larger deployments. We conclude the paper with some recommendations in terms of combinations of those standards and protocols with a view to achieve a higher quality of service for the given scenarios.

  11. 3D Polygon Mesh Compression with Multi Layer Feed Forward Neural Networks

    Emmanouil Piperakis

    2003-06-01

    Full Text Available In this paper, an experiment is conducted which proves that multi layer feed forward neural networks are capable of compressing 3D polygon meshes. Our compression method not only preserves the initial accuracy of the represented object but also enhances it. The neural network employed includes the vertex coordinates, the connectivity and normal information in one compact form, converting the discrete and surface polygon representation into an analytic, solid colloquial. Furthermore, the 3D object in its compressed neural form can be directly - without decompression - used for rendering. The neural compression - representation is viable to 3D transformations without the need of any anti-aliasing techniques - transformations do not disrupt the accuracy of the geometry. Our method does not su.er any scaling problem and was tested with objects of 300 to 107 polygons - such as the David of Michelangelo - achieving in all cases an order of O(b3 less bits for the representation than any other commonly known compression method. The simplicity of our algorithm and the established mathematical background of neural networks combined with their aptness for hardware implementation can establish this method as a good solution for polygon compression and if further investigated, a novel approach for 3D collision, animation and morphing.

  12. Automated and comprehensive link engineering supporting branched, ring, and mesh network topologies

    Farina, J.; Khomchenko, D.; Yevseyenko, D.; Meester, J.; Richter, A.

    2016-02-01

    Link design, while relatively easy in the past, can become quite cumbersome with complex channel plans and equipment configurations. The task of designing optical transport systems and selecting equipment is often performed by an applications or sales engineer using simple tools, such as custom Excel spreadsheets. Eventually, every individual has their own version of the spreadsheet as well as their own methodology for building the network. This approach becomes unmanageable very quickly and leads to mistakes, bending of the engineering rules and installations that do not perform as expected. We demonstrate a comprehensive planning environment, which offers an efficient approach to unify, control and expedite the design process by controlling libraries of equipment and engineering methodologies, automating the process and providing the analysis tools necessary to predict system performance throughout the system and for all channels. In addition to the placement of EDFAs and DCEs, performance analysis metrics are provided at every step of the way. Metrics that can be tracked include power, CD and OSNR, SPM, XPM, FWM and SBS. Automated routine steps assist in design aspects such as equalization, padding and gain setting for EDFAs, the placement of ROADMs and transceivers, and creating regeneration points. DWDM networks consisting of a large number of nodes and repeater huts, interconnected in linear, branched, mesh and ring network topologies, can be designed much faster when compared with conventional design methods. Using flexible templates for all major optical components, our technology-agnostic planning approach supports the constant advances in optical communications.

  13. On the Performance of Millimeter Wave-based RF-FSO Multi-hop and Mesh Networks

    Makki, Behrooz; Svensson, Tommy; Brandt-Pearce, Maite; Alouini, Mohamed-Slim

    2017-01-01

    This paper studies the performance of multi-hop and mesh networks composed of millimeter wave-based radio frequency (RF) and free-space optical (FSO) links. The results are obtained in cases with and without hybrid automatic repeat request (HARQ

  14. Expansion of the role of web-based social networks related to synthetic mesh/tape complications.

    Stephens, Caroline; Zimmern, Philippe E

    2015-07-01

    To update a prior report on web-based networks and frequently visited forums used by patients affected by synthetic mesh and/or tape (SMT) complications and to present the new developments in this dynamic SMT field following recent FDA notifications. A review of available blogs and forums on SMT complications was conducted using the terms "mesh complications", "mesh blogs", and "polypropylene mesh removal" in Internet search engines for the United States and several other countries. Forums from a prior report were analyzed for updates, and new forums with their founders were identified using same search methodology. The number of posts and new fields from 07/2011 to 10/2013 was recorded, and then divided into categories based on broad content (personal stories, supportive replies to complaints, patients recommending physicians, legal stories, newspaper/article stories with reactions, other). Although four social networks became inactive, four expanded and at least five new major ones surfaced. While personal stories and support remained a prominent topic of discussion, other categories increased, such as the number of posts discussing physician referrals and reactions to news stories. Additionally, the number of posts designated to personal stories decreased. Finally, discussion about the topic expanded internationally. Web-based social networks for women suffering from SMT have expanded and the contents have broadened with new domains being introduced. Patient networking remains a dynamic force in the current debate on the future of these procedures.

  15. Social networking and ecomobility through nomadic devices

    PAUZIE, Annie

    2012-01-01

    Widespread among population of sophisticated nomadic devices such as smart phones is a possibility to be connected to social networks 'Anytime', 'Anywhere'. It can constitute a potential to support ecomobility with information on real time of location of danger/risky zones identified by drivers belonging to community members: potential to avoid traffic jams and to optimise the trip, ridesharing through connections between drivers and travellers belonging to the same community: potential to de...

  16. Supporting Dynamic Adaptive Streaming over HTTP in Wireless Meshed Networks using Random Linear Network Coding

    Hundebøll, Martin; Pedersen, Morten Videbæk; Roetter, Daniel Enrique Lucani

    2014-01-01

    This work studies the potential and impact of the FRANC network coding protocol for delivering high quality Dynamic Adaptive Streaming over HTTP (DASH) in wireless networks. Although DASH aims to tailor the video quality rate based on the available throughput to the destination, it relies...

  17. A novel safety device with metal counter meshing gears discriminator directly driven by axial flux permanent magnet micromotors based on MEMS technology

    Zhang, Weiping; Chen, Wenyuan; Zhao, Xiaolin; Li, Shengyong; Jiang, Yong

    2005-08-01

    In a novel safety device based on MEMS technology for high consequence systems, the discriminator consists of two groups of metal counter meshing gears and two pawl/ratchet wheel mechanisms. Each group of counter meshing gears is onepiece and driven directly by an axial flux permanent magnet micromotor respectively. The energy-coupling element is an optical shutter with two collimators and a coupler wheel. The safety device's probability is less than 1/106. It is fabricated by combination of an LiGA-like process and precision mechanical engineering. The device has simple structure, few dynamic problems, high strength and strong reliability.

  18. Intelligent Devices in Rural Wireless Networks

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  19. Delay reduction in multi-hop device-to-device communication using network coding

    Douik, Ahmed S.; Sorour, Sameh; Al-Naffouri, Tareq Y.; Yang, Hong-Chuan; Alouini, Mohamed-Slim

    2015-01-01

    This paper considers the problem of reducing the broadcast delay of wireless networks using instantly decodable network coding (IDNC) based device-to-device (D2D) communications. In D2D-enabled networks, devices help hasten the recovery of the lost

  20. Joint optimization of physical layer parameters and routing in wireless mesh networks

    Tobagi, Fouad A.

    2010-06-01

    Achieving the best performance in a wireless mesh network requires striking the right balance between the performance of links carrying traffic and the extent of spatial reuse of the wireless medium. The performance of a link depends on its transmit power and data rate as well as the level of interference caused by concurrent transmissions in the network; the latter is function of the Energy Detect (ED) threshold that determines when a node may access the medium. Which links in the network carry traffic is determined by the routing function; routing selects paths according to a link metric that reflects the relative performance of links (e.g., the expected transmission time of a packet on the link). In this paper, we seek to maximize end-to-end network throughput by jointly optimizing physical layer parameters and routing. We consider a random topology with a uniform node density. We consider that the signal attenuation between a pair of nodes is determined by a power law path loss model with an exponent equal to 3. Our findings are as follows. Consider first that the same transmit power and same data rate are used on all links. For any transmit power, data rate and ED threshold setting, the highest feasible load is obtained when the level of interference experienced by links used by routing is the highest possible. For a given transmit power and data rate setting, there is an optimum ED threshold that maximizes network performance. At the optimum ED threshold and maximum load, the range of link lengths used by routing is the lowest possible given the topology and routing metric used. With an ED threshold higher than the optimum, the same range of links is used by routing; however, the highest feasible load in this case is lower due to the fact that concurrent transmitters are allowed to be closer. With a lower ED threshold, concurrent transmitters are forced to be farther apart, and thus longer links become more attractive; as a result, the range of link lengths

  1. Joint optimization of physical layer parameters and routing in wireless mesh networks

    Tobagi, Fouad A.; Hira, Mukesh M.

    2010-01-01

    Achieving the best performance in a wireless mesh network requires striking the right balance between the performance of links carrying traffic and the extent of spatial reuse of the wireless medium. The performance of a link depends on its transmit power and data rate as well as the level of interference caused by concurrent transmissions in the network; the latter is function of the Energy Detect (ED) threshold that determines when a node may access the medium. Which links in the network carry traffic is determined by the routing function; routing selects paths according to a link metric that reflects the relative performance of links (e.g., the expected transmission time of a packet on the link). In this paper, we seek to maximize end-to-end network throughput by jointly optimizing physical layer parameters and routing. We consider a random topology with a uniform node density. We consider that the signal attenuation between a pair of nodes is determined by a power law path loss model with an exponent equal to 3. Our findings are as follows. Consider first that the same transmit power and same data rate are used on all links. For any transmit power, data rate and ED threshold setting, the highest feasible load is obtained when the level of interference experienced by links used by routing is the highest possible. For a given transmit power and data rate setting, there is an optimum ED threshold that maximizes network performance. At the optimum ED threshold and maximum load, the range of link lengths used by routing is the lowest possible given the topology and routing metric used. With an ED threshold higher than the optimum, the same range of links is used by routing; however, the highest feasible load in this case is lower due to the fact that concurrent transmitters are allowed to be closer. With a lower ED threshold, concurrent transmitters are forced to be farther apart, and thus longer links become more attractive; as a result, the range of link lengths

  2. Network preservation through a topology control algorithm for wireless mesh networks

    Aron, FO

    2008-09-01

    Full Text Available to the wireless infrastructure-based networks. The benefits of WMN deployments, however, come with certain challenges e.g., power management. While focussing on WMN applications in rural areas, this paper explains the need for transmit power consumption control...

  3. ICE-Based Custom Full-Mesh Network for the CHIME High Bandwidth Radio Astronomy Correlator

    Bandura, K.; Cliche, J. F.; Dobbs, M. A.; Gilbert, A. J.; Ittah, D.; Mena Parra, J.; Smecher, G.

    2016-03-01

    New generation radio interferometers encode signals from thousands of antenna feeds across large bandwidth. Channelizing and correlating this data requires networking capabilities that can handle unprecedented data rates with reasonable cost. The Canadian Hydrogen Intensity Mapping Experiment (CHIME) correlator processes 8-bits from N=2,048 digitizer inputs across 400MHz of bandwidth. Measured in N2× bandwidth, it is the largest radio correlator that is currently commissioning. Its digital back-end must exchange and reorganize the 6.6terabit/s produced by its 128 digitizing and channelizing nodes, and feed it to the 256 graphics processing unit (GPU) node spatial correlator in a way that each node obtains data from all digitizer inputs but across a small fraction of the bandwidth (i.e. ‘corner-turn’). In order to maximize performance and reliability of the corner-turn system while minimizing cost, a custom networking solution has been implemented. The system makes use of Field Programmable Gate Array (FPGA) transceivers to implement direct, passive copper, full-mesh, high speed serial connections between sixteen circuit boards in a crate, to exchange data between crates, and to offload the data to a cluster of 256 GPU nodes using standard 10Gbit/s Ethernet links. The GPU nodes complete the corner-turn by combining data from all crates and then computing visibilities. Eye diagrams and frame error counters confirm error-free operation of the corner-turn network in both the currently operating CHIME Pathfinder telescope (a prototype for the full CHIME telescope) and a representative fraction of the full CHIME hardware providing an end-to-end system validation. An analysis of an equivalent corner-turn system built with Ethernet switches instead of custom passive data links is provided.

  4. Implantable Medical Devices; Networking Security Survey

    Siamak Aram

    2016-08-01

    Full Text Available The industry of implantable medical devices (IMDs is constantly evolving, which is dictated by the pressing need to comprehensively address new challenges in the healthcare field. Accordingly, IMDs are becoming more and more sophisticated. Not long ago, the range of IMDs’ technical capacities was expanded, making it possible to establish Internet connection in case of necessity and/or emergency situation for the patient. At the same time, while the web connectivity of today’s implantable devices is rather advanced, the issue of equipping the IMDs with sufficiently strong security system remains unresolved. In fact, IMDs have relatively weak security mechanisms which render them vulnerable to cyber-attacks that compromise the quality of IMDs’ functionalities. This study revolves around the security deficiencies inherent to three types of sensor-based medical devices; biosensors, insulin pump systems and implantable cardioverter defibrillators. Manufacturers of these devices should take into consideration that security and effectiveness of the functionality of implants is highly dependent on the design. In this paper, we present a comprehensive study of IMDs’ architecture and specifically investigate their vulnerabilities at networking interface.

  5. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  6. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  7. TMAC: Timestamp-Ordered MAC for CSMA/CA Wireless Mesh Networks

    Nawab, Faisal Saud Yousef

    2011-07-31

    We propose TMAC, a timestamp-ordered MAC protocol for Wireless Mesh Networks (WMNs). TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed with the transmission only if it receives a sufficient number of grant control messages from these neighbors. A grant message indicates that the associated data packet has the lowest timestamp of all the packets pending transmission at the local transmit queue. We demonstrate that a loose ordering of timestamps among neighboring nodes is sufficient for enforcing local fairness, subsequently leading to flow rate fairness in a multi-hop WMN. We show that TMAC can be implemented using the control frames in IEEE 802.11 stack, and thus can be easily integrated in existing 802.11-based WMNs. Our simulation results show that TMAC achieves excellent resource allocation fairness while maintaining over 90% of maximum link capacity in parking lot and large grid topologies.

  8. Routing protocol for wireless quantum multi-hop mesh backbone network based on partially entangled GHZ state

    Xiong, Pei-Ying; Yu, Xu-Tao; Zhang, Zai-Chen; Zhan, Hai-Tao; Hua, Jing-Yu

    2017-08-01

    Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multihop teleportation for wireless mesh backbone networks. Based on an analysis of quantum multi-hop protocols, a partially entangled Greenberger-Horne-Zeilinger (GHZ) state is selected as the quantum channel for the proposed protocol. Both quantum and classical wireless channels exist between two neighboring nodes along the route. With the proposed routing protocol, quantum information can be transmitted hop by hop from the source node to the destination node. Based on multi-hop teleportation based on the partially entangled GHZ state, a quantum route established with the minimum number of hops. The difference between our routing protocol and the classical one is that in the former, the processes used to find a quantum route and establish quantum channel entanglement occur simultaneously. The Bell state measurement results of each hop are piggybacked to quantum route finding information. This method reduces the total number of packets and the magnitude of air interface delay. The deduction of the establishment of a quantum channel between source and destination is also presented here. The final success probability of quantum multi-hop teleportation in wireless mesh backbone networks was simulated and analyzed. Our research shows that quantum multi-hop teleportation in wireless mesh backbone networks through a partially entangled GHZ state is feasible.

  9. Network Resource Awareness and Prediction on Mobile Devices

    Peddemors, A.J.H.

    2009-01-01

    In the past several years, personal mobile devices have developed rapidly as versatile computing platforms, capable of installing and running many different applications. Often, these devices are equipped with multiple (wireless) network interfaces supporting internet access through one or more

  10. Opfront: mesh

    2015-01-01

    Mesh generation and visualization software based on the CGAL library. Folder content: drawmesh Visualize slices of the mesh (surface/volumetric) as wireframe on top of an image (3D). drawsurf Visualize surfaces of the mesh (surface/volumetric). img2mesh Convert isosurface in image to volumetric m...... mesh (medit format). img2off Convert isosurface in image to surface mesh (off format). off2mesh Convert surface mesh (off format) to volumetric mesh (medit format). reduce Crop and resize 3D and stacks of images. data Example data to test the library on...

  11. Multiuser Collaboration with Networked Mobile Devices

    Tso, Kam S.; Tai, Ann T.; Deng, Yong M.; Becks, Paul G.

    2006-01-01

    In this paper we describe a multiuser collaboration infrastructure that enables multiple mission scientists to remotely and collaboratively interact with visualization and planning software, using wireless networked personal digital assistants(PDAs) and other mobile devices. During ground operations of planetary rover and lander missions, scientists need to meet daily to review downlinked data and plan science activities. For example, scientists use the Science Activity Planner (SAP) in the Mars Exploration Rover (MER) mission to visualize downlinked data and plan rover activities during the science meetings [1]. Computer displays are projected onto large screens in the meeting room to enable the scientists to view and discuss downlinked images and data displayed by SAP and other software applications. However, only one person can interact with the software applications because input to the computer is limited to a single mouse and keyboard. As a result, the scientists have to verbally express their intentions, such as selecting a target at a particular location on the Mars terrain image, to that person in order to interact with the applications. This constrains communication and limits the returns of science planning. Furthermore, ground operations for Mars missions are fundamentally constrained by the short turnaround time for science and engineering teams to process and analyze data, plan the next uplink, generate command sequences, and transmit the uplink to the vehicle [2]. Therefore, improving ground operations is crucial to the success of Mars missions. The multiuser collaboration infrastructure enables users to control software applications remotely and collaboratively using mobile devices. The infrastructure includes (1) human-computer interaction techniques to provide natural, fast, and accurate inputs, (2) a communications protocol to ensure reliable and efficient coordination of the input devices and host computers, (3) an application

  12. Security of Mobile Devices and Wi-Fi Networks

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  13. Towards Device-Independent Information Processing on General Quantum Networks

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  14. Preclinical evaluation of the effect of the combined use of the Ethicon Securestrap® Open Absorbable Strap Fixation Device and Ethicon Physiomesh™ Open Flexible Composite Mesh Device on surgeon stress during ventral hernia repair

    Sutton N

    2017-12-01

    Full Text Available Nadia Sutton,1 Melinda H MacDonald,2 John Lombard,1 Bodgan Ilie,3 Piet Hinoul,4 Douglas A Granger5,6 1Global Health Economics and Market Access, Johnson & Johnson Medical Devices, New Brunswick, NJ, USA; 2Preclinical Center of Excellence, Johnson & Johnson Medical Devices Companies, Somerville, NJ, USA; 3Biostatistics, Ethicon, Somerville, NJ, USA; 4Medical Affairs, Ethicon, Somerville, NJ, USA; 5Institute for Interdisciplinary Salivary Bioscience Research (IISBR, University of California at Irvine, Irvine, CA, USA; 6Johns Hopkins University School of Nursing, Bloomberg School of Public Health, and School of Medicine, Baltimore, MD, USA Aim: To evaluate whether performing ventral hernia repairs using the Ethicon Physiomesh™ Open Flexible Composite Mesh Device in conjunction with the Ethicon Securestrap® Open Absorbable Strap Fixation Device reduces surgical time and surgeon stress levels, compared with traditional surgical repair methods. Methods: To repair a simulated ventral incisional hernia, two surgeries were performed by eight experienced surgeons using a live porcine model. One procedure involved traditional suture methods and a flat mesh, and the other procedure involved a mechanical fixation device and a skirted flexible composite mesh. A Surgery Task Load Index questionnaire was administered before and after the procedure to establish the surgeons’ perceived stress levels, and saliva samples were collected before, during, and after the surgical procedures to assess the biologically expressed stress (cortisol and salivary alpha amylase levels. Results: For mechanical fixation using the Ethicon Physiomesh Open Flexible Composite Mesh Device in conjunction with the Ethicon Securestrap Open Absorbable Strap Fixation Device, surgeons reported a 46.2% reduction in perceived workload stress. There was also a lower physiological reactivity to the intraoperative experience and the total surgical procedure time was reduced by 60

  15. Surface modification of polypropylene mesh devices with cyclodextrin via cold plasma for hernia repair: Characterization and antibacterial properties

    Sanbhal, Noor; Mao, Ying; Sun, Gang; Xu, Rui Fang; Zhang, Qian; Wang, Lu

    2018-05-01

    Light weight polypropylene (PP) mesh is the most widely used implant among all other synthetic meshes for hernia repair. However, infection is the complication associated to all synthetic meshes after hernia repair. Thus, to manage mesh related infection; antibacterial drug is generally loaded to surgical implants to supply drug locally in mesh implanted site. Nevertheless, PP mesh restricts the loading of antibacterial drug at operated area due to its low wettability. The aim of this study was to introduce a novel antimicrobial PP mesh modified with β-cyclodextrine (CD) and loaded with antimicrobial agent for infection prevention. A cold oxygen plasma treatment was able to activate the surfaces of polypropylene fibers, and then CD was incorporated onto the surfaces of PP fibers. Afterward, triclosan, as a model antibacterial agent, was loaded into CD cavity to provide desired antibacterial functions. The modified polypropylene mesh samples CD-Tric-1, CD-Tric-3 exhibited excellent inhibition zone and continuous antibacterial efficacy against E. coli and S. aureus up to 6 and 7 days respectively. Results of AFM, SEM, FTIR and antibacterial tests evidenced that oxygen plasma process is necessary to increase chemical connection between CD molecules and PP fibers. The samples were also characterized by using EDX, XRD, TGA, DSC and water contact angle.

  16. Power Flow Calculation for Weakly Meshed Distribution Networks with Multiple DGs Based on Generalized Chain-table Storage Structure

    Chen, Shuheng; Hu, Weihao; Chen, Zhe

    2014-01-01

    Based on generalized chain-table storage structure (GCTSS), a novel power flow method is proposed, which can be used to solve the power flow of weakly meshed distribution networks with multiple distributed generators (DGs). GCTSS is designed based on chain-table technology and its target is to de......Based on generalized chain-table storage structure (GCTSS), a novel power flow method is proposed, which can be used to solve the power flow of weakly meshed distribution networks with multiple distributed generators (DGs). GCTSS is designed based on chain-table technology and its target...... is to describe the topology of radial distribution networks with a clear logic and a small memory size. The strategies of compensating the equivalent currents of break-point branches and the reactive power outputs of PV-type DGs are presented on the basis of superposition theorem. Their formulations...... are simplified to be the final multi-variable linear functions. Furthermore, an accelerating factor is applied to the outer-layer reactive power compensation for improving the convergence procedure. Finally, the proposed power flow method is performed in program language VC++ 6.0, and numerical tests have been...

  17. Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks

    Hassanzadeh, Amin; Stoleru, Radu; Shihada, Basem

    2011-01-01

    in such environments battery-powered mesh routers, operating in an energy efficient manner, are required. To the best of our knowledge, the impact of energy efficient solutions, e.g., involving duty-cycling, on WMN intrusion detection systems, which require continuous

  18. Composing Networks: Writing Practices on Mobile Devices

    Swarts, Jason

    2016-01-01

    This article is an investigation of composing practices through which people create networks with mobile phones. By looking through the lens of actor-network theory, the author portrays the networking activity of mobile phone users as translation, what Latour describes as an infralanguage to which different disciplinary perspectives can be…

  19. Interface Assignment-Based AODV Routing Protocol to Improve Reliability in Multi-Interface Multichannel Wireless Mesh Networks

    Won-Suk Kim

    2015-01-01

    Full Text Available The utilization of wireless mesh networks (WMNs has greatly increased, and the multi-interface multichannel (MIMC technic has been widely used for the backbone network. Unfortunately, the ad hoc on-demand distance vector (AODV routing protocol defined in the IEEE 802.11s standard was designed for WMNs using the single-interface single-channel technic. So, we define a problem that happens when the legacy AODV is used in MIMC WMNs and propose an interface assignment-based AODV (IA-AODV in order to resolve that problem. IA-AODV, which is based on multitarget path request, consists of the PREQ prediction scheme, the PREQ loss recovery scheme, and the PREQ sender assignment scheme. A detailed operation according to various network conditions and services is introduced, and the routing efficiency and network reliability of a network using IA-AODV are analyzed over the presented system model. Finally, after a real-world test-bed for MIMC WMNs using the IA-AODV routing protocol is implemented, the various indicators of the network are evaluated through experiments. When the proposed routing protocol is compared with the existing AODV routing protocol, it performs the path update using only 14.33% of the management frames, completely removes the routing malfunction, and reduces the UDP packet loss ratio by 0.0012%.

  20. An evaluation of the Manufacturer And User Facility Device Experience database that inspired the United States Food and Drug Administration's Reclassification of transvaginal mesh

    Jason M. Sandberg

    2018-03-01

    Full Text Available Purpose: To assess the utility of the Manufacturer And User Facility Device Experience (MAUDE database in objectively capturing adverse events for transvaginal mesh in the United States. Materials and Methods: We reviewed 1,103 individual medical device reports submitted to the MAUDE database that inspired the United States (US Food and Drug Administration's 2008 Public Health Notification. Entries were compiled into a categorical database that reported manufacturer, brand, reporter type, report source, and type of adverse event. Results: There were numerous examples of missing, duplicated, and non-standardized entries. Analysis revealed 64 reports with duplicated information, and six reports representing multiple patients. Forty-seven percent of medical device reports did not identify a reporter source. At least 28% of reported devices are no longer on the US market. There was wide variability in the quality and completeness of submitted reports and true adverse event rates could not be accurately calculated because the number of total cases was unknown. Conclusions: The MAUDE database was limited in its ability to collect, quantify, and standardize real-life adverse events related to transvaginal mesh. While it functions to collect information related to isolated adverse events, systematic limitations of the MAUDE database, that no doubt extend to other medical devices, necessitate the development of new reporting systems. Alternatives are under development, which may allow regulators to more accurately scrutinize the safety profiles of specific medical devices.

  1. An evaluation of the Manufacturer And User Facility Device Experience database that inspired the United States Food and Drug Administration's Reclassification of transvaginal mesh.

    Sandberg, Jason M; Gray, Ian; Pearlman, Amy; Terlecki, Ryan P

    2018-03-01

    To assess the utility of the Manufacturer And User Facility Device Experience (MAUDE) database in objectively capturing adverse events for transvaginal mesh in the United States. We reviewed 1,103 individual medical device reports submitted to the MAUDE database that inspired the United States (US) Food and Drug Administration's 2008 Public Health Notification. Entries were compiled into a categorical database that reported manufacturer, brand, reporter type, report source, and type of adverse event. There were numerous examples of missing, duplicated, and non-standardized entries. Analysis revealed 64 reports with duplicated information, and six reports representing multiple patients. Forty-seven percent of medical device reports did not identify a reporter source. At least 28% of reported devices are no longer on the US market. There was wide variability in the quality and completeness of submitted reports and true adverse event rates could not be accurately calculated because the number of total cases was unknown. The MAUDE database was limited in its ability to collect, quantify, and standardize real-life adverse events related to transvaginal mesh. While it functions to collect information related to isolated adverse events, systematic limitations of the MAUDE database, that no doubt extend to other medical devices, necessitate the development of new reporting systems. Alternatives are under development, which may allow regulators to more accurately scrutinize the safety profiles of specific medical devices.

  2. Apple IOS Devices for Network Administrators

    Mirzoev, Timur; Gingo, Gerard; Stawchansky, Mike; White, Tracy

    2014-01-01

    As tablet devices continue to gain market share at the expense of the traditional PC, they become a more integral part of the corporate landscape. Tablets are no longer being utilized only by sales executives for presentation purposes, or as addition to the traditional laptop. Users are attempting to perform significant amounts of their daily work on tablet devices, some even abandoning the ubiquitous laptop or desktop entirely. Operating exclusively from a tablet device, specifically Apple I...

  3. Security for Network Attached Storage Devices

    Gobioff, Howard

    1997-01-01

    This paper presents a novel cryptographic capability system addressing the security and performance needs of network attached storage systems in which file management functions occur at a different...

  4. Monitoring burst (M-burst) — A novel framework of failure localization in all-optical mesh networks

    Ali, Mohammed L.; Ho, Pin-Han; Wu, Bin; Tapolcai, Janos; Shihada, Basem

    2011-01-01

    Achieving instantaneous and precise failure localization in all-optical wavelength division multiplexing (WDM) networks has been an attractive feature of network fault management systems, and is particularly important when failure-dependent protection is employed. The paper introduces a novel framework of real-time failure localization in all-optical WDM mesh networks, called monitoring-burst (m-burst), which aims to initiate a graceful compromise between consumed monitoring resources and monitoring delay. Different from any previously reported solution, the proposed m-burst framework has a single monitoring node (MN) which launches optical bursts along a set of pre-defined close-loop routes, called monitoring cycles (m-cycles), to probe the links along the m-cycles. Bursts along different m-cycles are kept non-overlapping through any link of the network. By identifying the lost bursts due to single link failure events only, the MN can unambiguously localize the failed link in at least 3-connected networks. We will justify the feasibility and applicability of the proposed m-burst framework in the scenario of interest. To avoid possible collision among optical bursts launched by the MN, we define the problem of collision-free scheduling and formulate it into an integer linear program (ILP) in order to minimize the monitoring delay. Numerical results demonstrate the effectiveness of the proposed framework and the proposed solution.

  5. Monitoring burst (M-burst) — A novel framework of failure localization in all-optical mesh networks

    Ali, Mohammed L.

    2011-10-10

    Achieving instantaneous and precise failure localization in all-optical wavelength division multiplexing (WDM) networks has been an attractive feature of network fault management systems, and is particularly important when failure-dependent protection is employed. The paper introduces a novel framework of real-time failure localization in all-optical WDM mesh networks, called monitoring-burst (m-burst), which aims to initiate a graceful compromise between consumed monitoring resources and monitoring delay. Different from any previously reported solution, the proposed m-burst framework has a single monitoring node (MN) which launches optical bursts along a set of pre-defined close-loop routes, called monitoring cycles (m-cycles), to probe the links along the m-cycles. Bursts along different m-cycles are kept non-overlapping through any link of the network. By identifying the lost bursts due to single link failure events only, the MN can unambiguously localize the failed link in at least 3-connected networks. We will justify the feasibility and applicability of the proposed m-burst framework in the scenario of interest. To avoid possible collision among optical bursts launched by the MN, we define the problem of collision-free scheduling and formulate it into an integer linear program (ILP) in order to minimize the monitoring delay. Numerical results demonstrate the effectiveness of the proposed framework and the proposed solution.

  6. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Wang, Lei; Wang, Qing

    2017-01-01

    In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D) communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the netw...

  7. Multi-Device to Multi-Device (MD2MD Content-Centric Networking Based on Multi-RAT Device

    Cheolhoon Kim

    2017-11-01

    Full Text Available This paper proposes a method whereby a device can transmit and receive information using a beacon, and also describes application scenarios for the proposed method. In a multi-device to multi-device (MD2MD content-centric networking (CCN environment, the main issue involves searching for and connecting to nearby devices. However, if a device can’t find another device that satisfies its requirements, the connection is delayed due to the repetition of processes. It is possible to rapidly connect to a device without repetition through the selection of the optimal device using the proposed method. Consequently, the proposed method and scenarios are advantageous in that they enable efficient content identification and delivery in a content-centric Internet of Things (IoT environment, in which multiple mobile devices coexist.

  8. Collision Analysis at 60-GHz mmWave Mesh Networks: The Case With Blockage and Shadowing

    Lyu, Kangjia

    2018-01-01

    maximize over specific network connectivity. We have introduced a connectivity measure based on the commonly used network connectivity metric, which is refered to as global soft connectivity. This measure can be easily extended to account for different

  9. Effectiveness of a Littoral Combat Ship as a Major Node in a Wireless Mesh Network

    2017-03-01

    responsible for connection management, handover control and measurement control (Scalable Network Technologies, 2014c). The final layer in the LTE ...26 2. Oceus Networks 4G LTE ...32 2. LTE Library .................................................................................32 3

  10. Mountainous Ecosystem Sensor Array (MESA): a mesh sensor network for climate change research in remote mountainous environments

    Robinson, P. W.; Neal, D.; Frome, D.; Kavanagh, K.; Davis, A.; Gessler, P. E.; Hess, H.; Holden, Z. A.; Link, T. E.; Newingham, B. A.; Smith, A. M.

    2013-12-01

    Developing sensor networks robust enough to perform unattended in the world's remote regions is critical since these regions serve as important benchmarks that lack anthropogenic influence. Paradoxically, the factors that make these remote, natural sites challenging for sensor networking are often what make them indispensable for climate change research. The MESA (Mountainous Ecosystem Sensor Array) project has faced these challenges and developed a wireless mesh sensor network across a 660 m topoclimatic gradient in a wilderness area in central Idaho. This sensor array uses advances in sensing, networking, and power supply technologies to provide near real-time synchronized data covering a suite of biophysical parameters used in ecosystem process models. The 76 sensors in the network monitor atmospheric carbon dioxide concentration, humidity, air and soil temperature, soil water content, precipitation, incoming and outgoing shortwave and longwave radiation, snow depth, wind speed and direction, and leaf wetness at synchronized time intervals ranging from two minutes to two hours and spatial scales from a few meters to two kilometers. We present our novel methods of placing sensors and network nodes above, below, and throughout the forest canopy without using meteorological towers. In addition, we explain our decision to use different forms of power (wind and solar) and the equipment we use to control and integrate power harvesting. Further, we describe our use of the network to sense and quantify its own power use. Using examples of environmental data from the project, we discuss how these data may be used to increase our understanding of the effects of climate change on ecosystem processes in mountainous environments. MESA sensor locations across a 700 m topoclimatic gradient at the University of Idaho Taylor Wilderness Research Station.

  11. Multilevel Bloom Filters for P2P Flows Identification Based on Cluster Analysis in Wireless Mesh Network

    Xia-an Bi

    2015-01-01

    Full Text Available With the development of wireless mesh networks and distributed computing, lots of new P2P services have been deployed and enrich the Internet contents and applications. The rapid growth of P2P flows brings great pressure to the regular network operation. So the effective flow identification and management of P2P applications become increasingly urgent. In this paper, we build a multilevel bloom filters data structure to identify the P2P flows through researches on the locality characteristics of P2P flows. Different level structure stores different numbers of P2P flow rules. According to the characteristics values of the P2P flows, we adjust the parameters of the data structure of bloom filters. The searching steps of the scheme traverse from the first level to the last level. Compared with the traditional algorithms, our method solves the drawbacks of previous schemes. The simulation results demonstrate that our algorithm effectively enhances the performance of P2P flows identification. Then we deploy our flow identification algorithm in the traffic monitoring sensors which belong to the network traffic monitoring system at the export link in the campus network. In the real environment, the experiment results demonstrate that our algorithm has a fast speed and high accuracy to identify the P2P flows; therefore, it is suitable for actual deployment.

  12. Smart-Home Architecture Based on Bluetooth mesh Technology

    Wan, Qing; Liu, Jianghua

    2018-03-01

    This paper describes the smart home network system based on Nordic nrf52832 device. Nrf52832 is new generation RF SOC device focus on sensor monitor and low power Bluetooth connection applications. In this smart home system, we set up a self-organizing network system which consists of one control node and a lot of monitor nodes. The control node manages the whole network works; the monitor nodes collect the sensor information such as light intensity, temperature, humidity, PM2.5, etc. Then update to the control node by Bluetooth mesh network. The design results show that the Bluetooth mesh wireless network system is flexible and construction cost is low, which is suitable for the communication characteristics of a smart home network. We believe it will be wildly used in the future.

  13. BAKNET - Communication network for radiation monitoring devices

    Cohen, Y.; Wengrowicz, U.; Tirosh, D.; Barak, D.

    1997-01-01

    A system, based on a new concept of controlling and monitoring distributed radiation monitors, has been developed and approved at the NRCN. The system, named B AKNET Network , consists of a series of communication adapters connected to a main PC via an RS-485 communication network (see Fig. 1). The network's maximal length is 1200 meters and it enables connection of up to 128 adapters. The BAKNET adapters are designed to interface output signals of different types of stationary radiation monitors to a main PC. The BAKNET adapters' interface type includes: digital, analog, RS-232, and mixed output signals. This allows versatile interfacing of different stationary radiation monitors to the main computer. The connection to the main computer is via an RS-485 network, utilizing an identical communication protocol. The PC software, written in C ++ under MS-Windows, consists of two main programs. The first is the data collection program and the second is the Human Machine Interface (HMI). (authors)

  14. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  15. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  16. Residual Network Data Structures in Android Devices

    2011-09-01

    particular cellular tower that can be physically geolocated . Wireless routers, commonly found in businesses and homes share their unique Media Access...commercial acquisition tool. The method was compiled with standard Symbian APIs to access the file system and only tested on Symbian mobile devices [20

  17. On the Performance of Millimeter Wave-based RF-FSO Multi-hop and Mesh Networks

    Makki, Behrooz

    2017-09-22

    This paper studies the performance of multi-hop and mesh networks composed of millimeter wave-based radio frequency (RF) and free-space optical (FSO) links. The results are obtained in cases with and without hybrid automatic repeat request (HARQ). Using the central limit theorem as well as other state-of-the-art approximation schemes, we derive closed-form expressions for the networks’ outage probability and ergodic achievable rates. We also evaluate the effect of various parameters such as power amplifiers efficiency, number of antennas as well as different coherence times of the RF and the FSO links on the system performance. Finally, we determine the minimum number of the transmit antennas in the RF link such that the same rate is supported in the RF- and the FSO-based hops. The results show the efficiency of the RF-FSO setups in different conditions. Moreover, HARQ can effectively improve the outage probability/energy efficiency, and compensate for the effect of hardware impairments in RF-FSO networks. For common parameter settings of the RF-FSO dual-hop networks, outage probability of 10−4 and code rate of 3 nats-per-channel-use, the implementation of HARQ with a maximum of 2 and 3 retransmissions reduces the required power, compared to cases with open-loop communication, by 13 and 17 dB, respectively.

  18. Implantable Medical Devices; Networking Security Survey

    Siamak Aram; Rouzbeh A. Shirvani; Eros G. Pasero; Mohamd F. Chouikha

    2016-01-01

    The industry of implantable medical devices (IMDs) is constantly evolving, which is dictated by the pressing need to comprehensively address new challenges in the healthcare field. Accordingly, IMDs are becoming more and more sophisticated. Not long ago, the range of IMDs’ technical capacities was expanded, making it possible to establish Internet connection in case of necessity and/or emergency situation for the patient. At the same time, while the web connectivity of today’s implantable dev...

  19. Delay reduction in multi-hop device-to-device communication using network coding

    Douik, Ahmed S.

    2015-08-12

    This paper considers the problem of reducing the broadcast delay of wireless networks using instantly decodable network coding (IDNC) based device-to-device (D2D) communications. In D2D-enabled networks, devices help hasten the recovery of the lost packets of devices in their transmission range by sending network coded packets. To solve the problem, the different events occurring at each device are identified so as to derive an expression for the probability distribution of the decoding delay. The joint optimization problem over the set of transmitting devices and the packet combinations of each is formulated. Due to the high complexity of finding the optimal solution, this paper focuses on cooperation without interference between the transmitting users. The optimal solution, in such interference-less scenario, is expressed using a graph theory approach by introducing the cooperation graph. Extensive simulations compare the decoding delay experienced in the Point to Multi-Point (PMP), the fully connected D2D (FC-D2D) and the more practical partially connected D2D (PC-D2D) configurations and suggest that the PC-D2D outperforms the FC-D2D in all situations and provides an enormous gain for poorly connected networks.

  20. SAFETY ON UNTRUSTED NETWORK DEVICES (SOUND)

    2017-10-10

    and LSD-41 labs to show how it can work at scale to protect a ship network. 15. SUBJECT TERMS Communities of trust, SAFE architecture, adaptable... environment . Then, SOUND development would extend the SAFE implementation from the CRASH program to allow SAFE hosts to operate in a heterogeneous...hardware level on a SAFE processor (developed under the DARPA CRASH program). This section summarizes our work ; more details can be found in [K+14

  1. A new 2D mesh routing approach for networks on chip Une nouvelle ...

    a modified XY routing and a communication load-based clustering technique. We show that our .... (TDMA), Round-Robin and fixed priority. B. routing. Figure.3: Router ..... Algorithms for Wireless Sensor Networks,” Computer. Communications ...

  2. Achievable capacity limit of high performance nodes for wireless mesh networks

    Olwal, T

    2012-08-01

    Full Text Available have the ability to simultaneously communicate with many neighbours using multiple radios over orthogonal channels thereby improving effective and "online" channel utilisation. Many such networks emerging from standards such as IEEE 802.11 a...

  3. Signal Processing Device (SPD) for networked radiation monitoring system

    Dharmapurikar, A.; Bhattacharya, S.; Mukhopadhyay, P.K.; Sawhney, A.; Patil, R.K.

    2010-01-01

    A networked radiation and parameter monitoring system with three tier architecture is being developed. Signal Processing Device (SPD) is a second level sub-system node in the network. SPD is an embedded system which has multiple input channels and output communication interfaces. It acquires and processes data from first level parametric sensor devices, and sends to third level devices in response to request commands received from host. It also performs scheduled diagnostic operations and passes on the information to host. It supports inputs in the form of differential digital signals and analog voltage signals. SPD communicates with higher level devices over RS232/RS422/USB channels. The system has been designed with main requirements of minimal power consumption and harsh environment in radioactive plants. This paper discusses the hardware and software design details of SPD. (author)

  4. Wearable Device Control Platform Technology for Network Application Development

    Heejung Kim

    2016-01-01

    Full Text Available Application development platform is the most important environment in IT industry. There are a variety of platforms. Although the native development enables application to optimize, various languages and software development kits need to be acquired according to the device. The coexistence of smart devices and platforms has rendered the native development approach time and cost consuming. Cross-platform development emerged as a response to these issues. These platforms generate applications for multiple devices based on web languages. Nevertheless, development requires additional implementation based on a native language because of the coverage and functions of supported application programming interfaces (APIs. Wearable devices have recently attracted considerable attention. These devices only support Bluetooth-based interdevice communication, thereby making communication and device control impossible beyond a certain range. We propose Network Application Agent (NetApp-Agent in order to overcome issues. NetApp-Agent based on the Cordova is a wearable device control platform for the development of network applications, controls input/output functions of smartphones and wearable/IoT through the Cordova and Native API, and enables device control and information exchange by external users by offering a self-defined API. We confirmed the efficiency of the proposed platform through experiments and a qualitative assessment of its implementation.

  5. Custom-made titanium devices as membranes for bone augmentation in implant treatment: Clinical application and the comparison with conventional titanium mesh.

    Sumida, Tomoki; Otawa, Naruto; Kamata, Y U; Kamakura, Satoshi; Mtsushita, Tomiharu; Kitagaki, Hisashi; Mori, Shigeo; Sasaki, Kiyoyuki; Fujibayashi, Shunsuke; Takemoto, Mitsuru; Yamaguchi, Atsushi; Sohmura, Taiji; Nakamura, Takashi; Mori, Yoshihide

    2015-12-01

    Development of new custom-made devices to reconstruct alveolar bone for implantation, and comparison with conventional methods were the goals of this study. Using a computer-aided design technique, three-dimensional images were constructed. From these data, custom-made devices were produced by a selective laser melting method with pure titanium. Clinical trials also have been conducted with 26 participants who needed bone reconstruction before implantation; they were divided into 2 groups with 13 patients each. The first group uses custom-made devices; the other uses commercial titanium meshes that need to bend during operation. Some clinical aspects are evaluated after the trial. The custom-made devices can be produced closely by following the data precisely. Devices are fit for bone defect site. Moreover, the operation time of the custom-made group (75.4 ± 11.6 min) was significantly shorter than that of the conventional group (111.9 ± 17.8 min) (p < 0.01). Mucosal rupture occurs, without significant difference (p = 0.27), in a patient in the custom-made without severe infection (7.7%), and 3 in conventional (23.1%), respectively. The retaining screw is significantly fewer in the custom-made group than commercial mesh group (p < 0.01). These results indicate that our novel protocol could be simple and safe for providing powerful support for guided bone regeneration. Copyright © 2015 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.

  6. A model to improve the routing performance of Cognitive Radio Wireless Mesh Networks

    Lesiba Morries Kola

    2017-12-01

    Full Text Available The increasing demand for broadband wireless technologies has led to the scarcity, inefficient utilization, and underutilization of the spectrum. The Cognitive Radio (CR technology has emerged as the promising solution which improves the utilization of the spectrum. However, routing is a challenge due to the dynamic nature of the CR networks. The link quality varies in space and time as nodes join and leave the network. The network connectivity is intermittent due to node mobility and the activities of the primary user. The spectrum aware, spectrum agile, and interference aware routing protocols are vital for the sturdiness of the network and efficient utilization of the resources. We propose an interference aware, spectrum aware, and agile extended Weighted Cumulative Expected Transmission Time (xWCETT routing protocol. The protocol integrates the features of the Ad-hoc On-demand Distance Vector (AODV and the weighted cumulative expected transmission time (WCETT routing protocols. The xWCETT was simulated using the Network Simulator 2 and its performance compared with the AODV and the WCETT routing protocols. The xWCETT was evaluated with respect to quality of service related metrics and the results show that it outperformed the AODV and WCETT routing protocols.

  7. Distributed topology control algorithm to conserve energy in heterogeneous wireless mesh networks

    Aron, FO

    2008-07-01

    Full Text Available in performance with the resulting topology being a sub-network of the one generated by [11]. Li and Halpern [13] further propose the small minimum energy communication network (SMECN). In this algorithm, each node u initially broadcasts a “hello” message... algorithm that runs in each node is presented as follows:- Phase1: Establishing the accessible neighbourhood topology. In this stage, node u broadcasts a “hello” message using its full power, max uP . The nodes that receive the “hello” message form...

  8. Low-cost Augmented Reality prototype for controlling network devices

    Nguyen, Anh; Banic, Amy

    2014-01-01

    With the evolution of mobile devices, and smart-phones in particular, comes the ability to create new experiences that enhance the way we see, interact, and manipulate objects, within the world that surrounds us. It is now possible to blend data from our senses and our devices in numerous ways that simply were not possible before using Augmented Reality technology. In a near future, when all of the office devices as well as your personal electronic gadgets are on a common wireless network, op...

  9. Evaluating transceiver power savings produced by connectivity strategies for infrastructure wireless mesh networks

    Mudali, P

    2011-06-01

    Full Text Available . Santi, ?The k-neighbors Approach to Physical Degree Bounded and Symmetric Topology Control in ad hoc networks, ? Instituto di Informatica e Telematica, Pisa, Technical Report IIT-TR-142003, 2003. [20] P. Hall, ?On continuum percolation,? The Annals...

  10. Designing Interference-Robust Wireless Mesh Networks Using a Defender-Attacker-Defender Model

    2015-02-01

    solution does not provide more network flow than the undefended attacker’s solution. (However, our tool stores alternate, runner -up solutions that often...approximate real WMNs. 51 LIST OF REFERENCES Alderson, D.L., Brown, G.G., & Carlyle, W.M. (2014). Assessing and improving operational resilience

  11. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...... link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  12. Neural Networks through Shared Maps in Mobile Devices

    William Raveane

    2014-12-01

    Full Text Available We introduce a hybrid system composed of a convolutional neural network and a discrete graphical model for image recognition. This system improves upon traditional sliding window techniques for analysis of an image larger than the training data by effectively processing the full input scene through the neural network in less time. The final result is then inferred from the neural network output through energy minimization to reach a more precize localization than what traditional maximum value class comparisons yield. These results are apt for applying this process in a mobile device for real time image recognition.

  13. Resource and Traffic Management Techniques for Performance Optimization in Wireless Mesh Networks

    D'Elia, Francesco Paolo

    2010-01-01

    Since Internet was born, it has steadily evolved. New devices, new needs, new applications, new protocols, and this evolution is not going to slow down in the near future. As a result of the introduction and standardization of wireless access technology, we are living through an inevitable replacement of the old wired technology. We are going through a wireless revolution, which brings with it new ways to access information: simply, anywhere, anytime. The new Internet challenge is to embo...

  14. Developing a Procedure for Segmenting Meshed Heat Networks of Heat Supply Systems without Outflows

    Tokarev, V. V.

    2018-06-01

    The heat supply systems of cities have, as a rule, a ring structure with the possibility of redistributing the flows. Despite the fact that a ring structure is more reliable than a radial one, the operators of heat networks prefer to use them in normal modes according to the scheme without overflows of the heat carrier between the heat mains. With such a scheme, it is easier to adjust the networks and to detect and locate faults in them. The article proposes a formulation of the heat network segmenting problem. The problem is set in terms of optimization with the heat supply system's excessive hydraulic power used as the optimization criterion. The heat supply system computer model has a hierarchically interconnected multilevel structure. Since iterative calculations are only carried out for the level of trunk heat networks, decomposing the entire system into levels allows the dimensionality of the solved subproblems to be reduced by an order of magnitude. An attempt to solve the problem by fully enumerating possible segmentation versions does not seem to be feasible for systems of really existing sizes. The article suggests a procedure for searching rational segmentation of heat supply networks with limiting the search to versions of dividing the system into segments near the flow convergence nodes with subsequent refining of the solution. The refinement is performed in two stages according to the total excess hydraulic power criterion. At the first stage, the loads are redistributed among the sources. After that, the heat networks are divided into independent fragments, and the possibility of increasing the excess hydraulic power in the obtained fragments is checked by shifting the division places inside a fragment. The proposed procedure has been approbated taking as an example a municipal heat supply system involving six heat mains fed from a common source, 24 loops within the feeding mains plane, and more than 5000 consumers. Application of the proposed

  15. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  16. Method and device for monitoring distortion in an optical network

    2012-01-01

    A method and a device for monitoring of distortion in an optical network are provided, wherein at least one reference signal and at least one data signal are conveyed via an optical link and wherein a distortion of the at least one data signal is determined based on the at least one reference

  17. Node Load Balance Multi-flow Opportunistic Routing in Wireless Mesh Networks

    Wang Tao

    2014-04-01

    Full Text Available Opportunistic routing (OR has been proposed to improve the performance of wireless networks by exploiting the multi-user diversity and broadcast nature of the wireless medium. It involves multiple candidate forwarders to relay packets every hop. The existing OR doesn’t take account of the traffic load and load balance, therefore some nodes may be overloaded while the others may not, leading to network performance decline. In this paper, we focus on opportunities routing selection with node load balance which is described as a convex optimization problem. To solve the problem, by combining primal-dual and sub-gradient methods, a fully distributed Node load balance Multi-flow Opportunistic Routing algorithm (NMOR is proposed. With node load balance constraint, NMOR allocates the flow rate iteratively and the rate allocation decides the candidate forwarder selection of opportunities routing. The simulation results show that NMOR algorithm improves 100 %, 62 % of the aggregative throughput than ETX and EAX, respectively.

  18. Interference-aware power control for multi-radio multi-channel wireless mesh networks

    Olwal, TO

    2009-09-01

    Full Text Available are well known in [9], [6]. The operation of multi-radio multi-channel (MRMC) WMNs generally requires sustainable energy supply. Substantial deployments of WMNs have recently been witnessed in rural and remote communities [4]. In such applications...]. Power resources are dynamically adjusted by each NIC using intra and inter-subsystem (channel) states. Due to the decentralized nature, each MP assumes imperfect knowledge about the global network. Further we assume that there exists...

  19. Anomaly detection in wide area network mesh using two machine learning anomaly detection algorithms

    Zhang, James; Vukotic, Ilija; Gardner, Robert

    2018-01-01

    Anomaly detection is the practice of identifying items or events that do not conform to an expected behavior or do not correlate with other items in a dataset. It has previously been applied to areas such as intrusion detection, system health monitoring, and fraud detection in credit card transactions. In this paper, we describe a new method for detecting anomalous behavior over network performance data, gathered by perfSONAR, using two machine learning algorithms: Boosted Decision Trees (BDT...

  20. Different types of mesh fixation for laparoscopic repair of inguinal hernia: A protocol for systematic review and network meta-analysis with randomized controlled trials.

    Wei, Kongyuan; Lu, Cuncun; Ge, Long; Pan, Bei; Yang, Huan; Tian, Jinhui; Cao, Nong

    2018-04-01

    Laparoscopic inguinal hernia repair has become a valid option for repair of an inguinal hernia. Due to there are several types of mesh fixation for laparoscopic repair of inguinal hernia. The study aims to assess and compare the efficacy of different types of mesh fixation for laparoscopic repair of inguinal hernia using network meta-analysis. We will systematically search PubMed, EMBASE the Cochrane library, and Chinese Biomedical Literature Database from their inception to March 2018. Randomized controlled trials (RCTs) that compared the effect of different types of mesh fixation for laparoscopic inguinal hernia repair will be included. The primary outcomes are chronic groin pain, incidence risk of hernia recurrence, and complications. Risk of bias assessment of the included RCTs will be conducted using to Cochrane risk of bias tool. A network meta-analysis will be performed using WinBUGS 1.4.3 software and the result figures will be generated using R x64 3.1.2 software and STATA V.12.0 software. Grading of Recommendations Assessment, Development and Evaluation (GRADE) will be used to assess the quality of evidence. The results of this study will be published in a peer-reviewed journal. Our study will generate evidence of laparoscopic repair of mesh fixation for adult patients with inguinal hernia and provide suggestions for clinical practice or guideline.

  1. Communication devices for network-hopping communications and methods of network-hopping communications

    Buttles, John W

    2013-04-23

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The system controller is configured to execute computer programming code. Storage media is coupled to the system controller and includes computer programming code configured to cause the system controller to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  2. CERN tests reveal security flaws with industrial network devices

    Lüders, Stefan

    2006-01-01

    The CERN high energy particle physics facility at Geneva, Switzerland will incorporate a wide range of COTS industrial control systems within its next generation particle collider, the LHC. In particular, the Internet will be used to facilitate the remote access for accelerator and particle physicists and system experts based at several hundred locations around the globe. The integration of Industrial Ethernet and COTS PLCs within the LHC program focuses extreme attention on the industrial network cyber-security requirement. CERN's response has been to conduct operational research on the security resilience of networked industrial devices. As test team lead Stefan Lüders reports here, industrial networked devices put through the organisation's test procedures have generally shown up unexpected vulnerabilities.

  3. Network-Assisted Device-to-Device (D2D) Direct Proximity Discovery with Underlay Communication

    Pratas, Nuno; Popovski, Petar

    2015-01-01

    ) direct communication between proximate devices. While (ii) is treated extensively in the recent literature, (i) has received relatively little attention. In this paper we analyze a network-assisted underlay proximity discovery protocol, where a cellular device can take the role of: announcer (which......Device-to-Device communications are expected to play an important role in current and future cellular generations, by increasing the spatial reuse of spectrum resources and enabling lower latency communication links. This paradigm has two fundamental building blocks: (i) proximity discovery and (ii......, we consider the case where the announcers underlay their messages in the downlink transmissions that are directed towards the monitoring devices. We propose a power control scheme applied to the downlink transmission, which copes with the underlay transmission via additional power expenditure, while...

  4. A Fast and Scalable Algorithm for Calculating the Achievable Capacity of a Wireless Mesh Network

    2016-05-09

    increase the speed of the proposed algorithm with only limited decrease in the solution quality. One of the primary motivations of our work is to have a...outline of the scheduling algorithm. Afterwards, each step is discussed in more detail, and potential speed improvements are explored. 1) Algorithm...GHz ISM band has been considered for future 5G network design [33]. Atmospheric absorption loss at 24 GHz is around 0.1 dB/km [34], while at 2.4 GHz

  5. Achievable capacity design for irregular and clustered high performance mesh networks

    Olwal, TO

    2012-11-01

    Full Text Available interference, it is assumed that no any two HPNs are placed within a radius less than 400 m at the edge and less than 700 m toward the centre of the deployment area. However, between any two HPNs the largest separation distance is allowed as much possible... q mc p bit-meters/sec when cm = O(n). Proof : Let us consider that in irregular and static networks, the node den- sity varies over space (i.e., an area) but stays constant over time. Suppose the regularity rate (probability) of HPN...

  6. Improving the Reliability of Optimised Link State Routing in a Smart Grid Neighbour Area Network based Wireless Mesh Network Using Multiple Metrics

    Yakubu Tsado

    2017-02-01

    Full Text Available Reliable communication is the backbone of advanced metering infrastructure (AMI. Within the AMI, the neighbourhood area network (NAN transports a multitude of traffic, each with unique requirements. In order to deliver an acceptable level of reliability and latency, the underlying network, such as the wireless mesh network(WMN, must provide or guarantee the quality-of-service (QoS level required by the respective application traffic. Existing WMN routing protocols, such as optimised link state routing (OLSR, typically utilise a single metric and do not consider the requirements of individual traffic; hence, packets are delivered on a best-effort basis. This paper presents a QoS-aware WMN routing technique that employs multiple metrics in OLSR optimal path selection for AMI applications. The problems arising from this approach are non deterministic polynomial time (NP-complete in nature, which were solved through the combined use of the analytical hierarchy process (AHP algorithm and pruning techniques. For smart meters transmitting Internet Protocol (IP packets of varying sizes at different intervals, the proposed technique considers the constraints of NAN and the applications’ traffic characteristics. The technique was developed by combining multiple OLSR path selection metrics with the AHP algorithminns-2. Compared with the conventional link metric in OLSR, the results show improvements of about 23% and 45% in latency and Packet Delivery Ratio (PDR, respectively, in a 25-node grid NAN.

  7. Novel Opportunistic Network Routing Based on Social Rank for Device-to-Device Communication

    Tong Wang

    2017-01-01

    Full Text Available In recent years, there has been dramatic proliferation of research concerned with fifth-generation (5G mobile communication networks, among which device-to-device (D2D communication is one of the key technologies. Due to the intermittent connection of nodes, the D2D network topology may be disconnected frequently, which will lead to failure in transmission of large data files. In opportunistic networks, in case of encountering nodes which never meet before a flood message blindly to cause tremendous network overhead, a novel opportunistic network routing protocol based on social rank and intermeeting time (SRIT is proposed in this paper. An improved utility approach applied in utility replication based on encounter durations and intermeeting time is put forward to enhance the routing efficiency. Meanwhile, in order to select better candidate nodes in the network, a social graph among people is established when they socially relate to each other in social rank replication. The results under the scenario show an advantage of the proposed opportunistic network routing based on social rank and intermeeting time (SRIT over the compared algorithms in terms of delivery ratio, average delivery latency, and overhead ratio.

  8. SLA mechanism in wireless Mesh network%无线Mesh网络环境下的SLA机制

    赵耀培; 杨扬

    2015-01-01

    SLA mechanism in wireless Mesh network was studied .A collision avoidance mechanism based on different service levels in wireless network was presented .The collision avoidance algorithm based on multiple service levels in MAC was de‐signed ,named as multipriority collision avoidance (MPCA) .Considering the data stream with different strategies of SLA ,MP‐CA adopted different retreating algorithms .M PCA supported the transmission of sudden business flow ,and assured the instan‐taneity of business with high service level .The simulation results show that MPCA can effectively improve service quality of cus‐tomers’ perception ,service reliability ,usability and stability .%对无线Mesh网络环境中SLA机制进行研究,建立一套无线Mesh环境下基于不同服务等级的冲突避免机制,在M AC层设计基于多服务等级的冲突避免算法(multipriority collision avoidance , M PCA ),针对不同SLA策略的数据流采用不同退避算法。该算法支持突发业务流传输,能够保证高服务等级业务的实时性。仿真结果表明, M PC A能有效提高用户感知服务质量、服务可靠性以及可用性和稳定性。

  9. Using virtual ridge augmentation and 3D printing to fabricate a titanium mesh positioning device: A novel technique letter.

    Al-Ardah, Aladdin; Alqahtani, Nasser; AlHelal, Abdulaziz; Goodacre, Brian; Swamidass, Rajesh; Garbacea, Antoanela; Lozada, Jaime

    2018-05-02

    This technique describes a novel approach for planning and augmenting a large bony defect using a titanium mesh (TiMe). A 3-dimensional (3D) surgical model was virtually created from a cone beam computed tomography (CBCT) and wax-pattern of the final prosthetic outcome. The required bone volume (horizontally and vertically) was digitally augmented and then 3D printed to create a bone model. The 3D model was then used to contour the TiMe in accordance with the digital augmentation. With the contoured / preformed TiMe on the 3D printed model a positioning jig was made to aid the placement of the TiMe as planned during surgery. Although this technique does not impact the final outcome of the augmentation procedure, it allows the clinician to virtually design the augmentation, preform and contour the TiMe, and create a positioning jig reducing surgical time and error.

  10. 21 CFR 870.3650 - Pacemaker polymeric mesh bag.

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Pacemaker polymeric mesh bag. 870.3650 Section 870...) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Prosthetic Devices § 870.3650 Pacemaker polymeric mesh bag. (a) Identification. A pacemaker polymeric mesh bag is an implanted device used to hold a...

  11. Network device interface for digitally interfacing data channels to a controller via a network

    Ellerbrock, Philip J. (Inventor); Grant, Robert L. (Inventor); Konz, Daniel W. (Inventor); Winkelmann, Joseph P. (Inventor)

    2009-01-01

    A communications system and method are provided for digitally connecting a plurality of data channels, such as sensors, actuators, and subsystems, to a controller using a network bus. The network device interface interprets commands and data received from the controller and polls the data channels in accordance with these commands. Specifically, the network device interface receives digital commands and data from the controller, and based on these commands and data, communicates with the data channels to either retrieve data in the case of a sensor or send data to activate an actuator. Data retrieved from the sensor is converted into digital signals and transmitted to the controller. Network device interfaces associated with different data channels can coordinate communications with the other interfaces based on either a transition in a command message sent by the bus controller or a synchronous clock signal.

  12. AVAILABILITY RESEARCH OF REMOTE DEVICES FOR WIRELESS NETWORKS

    N. A. Bazhayev

    2016-05-01

    Full Text Available We consider the wireless network under attack, aimed at "broadcast storm" initiation, in order to determine the availability of stand-alone units and the ability to carry out their functional tasks under information exposure. We determine a set of conditions for such type of attacks on the part of potential information interloper. The functional analysis of the systems based on wireless technology is made. We examine the remote device of a self-organizing wireless network as a queuing system M/M/1/n. Model dependencies are shown for normal system performance and at information exposure on the part of potential information interloper. Analytical simulation of wireless network functioning is carried out in the normal mode and under the attack aimed at "broadcast storm" initiation. An experiment is described which provides statistical information on operation of network remote devices. We present experiment results on carrying out attack at typical system transferring data by broabcast net scanning package at different noise intensities on the part of information interloper. The proposed model can be used to determine the technical characteristics of wireless ad-hoc network, develop recommendations for node configuration, aimed at countering "broadcast storm".

  13. Tunable photonic bandgap fiber based devices for optical networks

    Alkeskjold, Thomas Tanggaard; Scolari, Lara; Rottwitt, Karsten

    2005-01-01

    In future all optical networks one of the enabling technologies is tunable elements including reconfigurable routers, switches etc. Thus, the development of a technology platform that allows construction of tuning components is critical. Lately, microstructured optical fibers, filled with liquid......, for example a liquid crystal that changes optical properties when subjected to, for example, an optical or an electrical field. The utilization of these two basic properties allows design of tunable optical devices for optical networks. In this work, we focus on applications of such devices and discuss recent...... crystals, have proven to be a candidate for such a platform. Microstructured optical fibers offer unique wave-guiding properties that are strongly related to the design of the air holes in the cladding of the fiber. These wave-guiding properties may be altered by filling the air holes with a material...

  14. Network-based Fingerprint Authentication System Using a Mobile Device

    Zhang, Qihu

    2016-01-01

    Abstract— Fingerprint-based user authentication is highly effective in networked services such as electronic payment, but conventional authentication solutions have problems in cost, usability and security. To resolve these problems, we propose a touch-less fingerprint authentication solution, in which a mobile device's built-in camera is used to capture fingerprint image, and then it is sent to the server to determine the identity of the user. We designed and implemented a prototype as an a...

  15. Throughput, Energy and Overhead of Multicast Device-to-Device Communications with Network Coded Cooperation

    Hernandez, Nestor; Heide, Janus; Roetter, Daniel Enrique Lucani

    2017-01-01

    , this assumes that the throughput gains and energy savings in multicasting are much larger between devices than the base station to the receivers. However, current mobile networks suffer from many different issues varying the performance in data rates, which calls into question these assumptions. Therefore......, a first objective of this work is to assess the operating regions where employing cooperation results in higher throughput and/or energy savings. We consider multicast scenarios with network coded mechanisms employing Random Linear Network Coding (RLNC). However, although RLNC is good for low amount...... of transmissions in multicast, it has an inherent overhead from extreme high or low field related caveats. Thus, as a second objective, we review and propose the application of new network codes that posses low overhead for multicasting, by having a short representation and low dependence probability. We provide...

  16. A Single-Walled Carbon Nanotube Network Gas Sensing Device

    I-Ju Teng

    2011-08-01

    Full Text Available The goal of this research was to develop a chemical gas sensing device based on single-walled carbon nanotube (SWCNT networks. The SWCNT networks are synthesized on Al2O3-deposted SiO2/Si substrates with 10 nm-thick Fe as the catalyst precursor layer using microwave plasma chemical vapor deposition (MPCVD. The development of interconnected SWCNT networks can be exploited to recognize the identities of different chemical gases by the strength of their particular surface adsorptive and desorptive responses to various types of chemical vapors. The physical responses on the surface of the SWCNT networks cause superficial changes in the electric charge that can be converted into electronic signals for identification. In this study, we tested NO2 and NH3 vapors at ppm levels at room temperature with our self-made gas sensing device, which was able to obtain responses to sensitivity changes with a concentration of 10 ppm for NO2 and 24 ppm for NH3.

  17. Device-to-Device Underlay Cellular Networks with Uncertain Channel State Information

    Memmi, Amen

    2016-01-06

    Device-to-Device (D2D) communications underlying the cellular infrastructure is a technology that has recently been proposed as a promising solution to enhance cellular network capabilities: It improves spectrum utilization, overall throughput and energy efficiency while enabling new peer-to-peer and location-based applications and services. However, interference is the major challenge since the same resources are shared by both systems. Therefore, interference management techniques are required to keep the interference under control. In this work, in order to mitigate interference, we consider centralized and distributed power control algorithms in a one-cell random network model. Differently from previous works, we are assuming that the channel state information (CSI) may be imperfect and include estimation errors. We evaluate how this uncertainty impacts performances.

  18. Instantly decodable network coding for real-time device-to-device communications

    Douik, Ahmed

    2016-01-04

    This paper studies the delay reduction problem for instantly decodable network coding (IDNC)-based device-to-device (D2D) communication-enabled networks. Unlike conventional point-to-multipoint (PMP) systems in which the wireless base station has the sufficient computation abilities, D2D networks rely on battery-powered operations of the devices. Therefore, a particular emphasis on the computation complexity needs to be addressed in the design of delay reduction algorithms for D2D networks. While most of the existing literature on IDNC directly extend the delay reduction PMP schemes, known to be NP-hard, to the D2D setting, this paper proposes to investigate and minimize the complexity of such algorithms for battery-powered devices. With delay minimization problems in IDNC-based systems being equivalent to a maximum weight clique problems in the IDNC graph, the presented algorithms, in this paper, can be applied to different delay aspects. This paper introduces and focuses on the reduction of the maximum value of the decoding delay as it represents the most general solution. The complexity of the solution is reduced by first proposing efficient methods for the construction, the update, and the dimension reduction of the IDNC graph. The paper, further, shows that, under particular scenarios, the problem boils down to a maximum clique problem. Due to the complexity of discovering such maximum clique, the paper presents a fast selection algorithm. Simulation results illustrate the performance of the proposed schemes and suggest that the proposed fast selection algorithm provides appreciable complexity gain as compared to the optimal selection one, with a negligible degradation in performance. In addition, they indicate that the running time of the proposed solution is close to the random selection algorithm.

  19. Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

    Douik, Ahmed S.

    2015-05-01

    From its introduction to its quindecennial, network coding have built a strong reputation in enhancing packet recovery process and achieving maximum information flow in both wires and wireless networks. Traditional studies focused on optimizing the throughput of the network by proposing complex schemes that achieve optimal delay. With the shift toward distributed computing at mobile devices, throughput and complexity become both critical factors that affect the efficiency of a coding scheme. Instantly decodable network coding imposed itself as a new paradigm in network coding that trades off this two aspects. This paper presents a survey of instantly decodable network coding schemes that are proposed in the literature. The various schemes are identified, categorized and evaluated. Two categories can be distinguished namely the conventional centralized schemes and the distributed or cooperative schemes. For each scheme, the comparison is carried out in terms of reliability, performance, complexity and packet selection methodology. Although the performance is generally inversely proportional to the computation complexity, numerous successful schemes from both the performance and complexity viewpoint are identified.

  20. Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

    Douik, Ahmed S.

    2015-01-01

    From its introduction to its quindecennial, network coding have built a strong reputation in enhancing packet recovery process and achieving maximum information flow in both wires and wireless networks. Traditional studies focused on optimizing the throughput of the network by proposing complex schemes that achieve optimal delay. With the shift toward distributed computing at mobile devices, throughput and complexity become both critical factors that affect the efficiency of a coding scheme. Instantly decodable network coding imposed itself as a new paradigm in network coding that trades off this two aspects. This paper presents a survey of instantly decodable network coding schemes that are proposed in the literature. The various schemes are identified, categorized and evaluated. Two categories can be distinguished namely the conventional centralized schemes and the distributed or cooperative schemes. For each scheme, the comparison is carried out in terms of reliability, performance, complexity and packet selection methodology. Although the performance is generally inversely proportional to the computation complexity, numerous successful schemes from both the performance and complexity viewpoint are identified.

  1. Performance of FACTS equipment in Meshed systems

    Lerch, E; Povh, D [Siemens AG, Berlin (Germany)

    1994-12-31

    Modern power electronic devices such as thyristors and GTOs have made it possible to design controllable network elements, which will play a considerable role in ensuring reliable economic operation of transmission systems as a result of their capability to rapidly change active and reactive power. A number of FACTS elements for high-speed active and reactive power control will be described. Control of power system fluctuations in meshed systems by modulation of active and reactive power will be demonstrated using a number of examples. (author) 7 refs., 11 figs.

  2. Network-Assisted Distributed Fairness-Aware Interference Coordination for Device-to-Device Communication Underlaid Cellular Networks

    Francis Boabang

    2017-01-01

    Full Text Available Device-to-device (D2D communication underlaid cellular network is considered a key integration feature in future cellular network. However, without properly designed interference management, the interference from D2D transmission tends to degrade the performance of cellular users and D2D pairs. In this work, we proposed a network-assisted distributed interference mitigation scheme to address this issue. Specifically, the base station (BS acts as a control agent that coordinates the cross-tier interference from D2D transmission through a taxation scheme. The cotier interference is controlled by noncooperative game amongst D2D pairs. In general, the outcome of noncooperative game is inefficient due to the selfishness of each player. In our game formulation, reference user who is the victim of cotier interference is factored into the payoff function of each player to obtain fair and efficient outcome. The existence, uniqueness of the Nash Equilibrium (NE, and the convergence of the proposed algorithm are characterized using Variational Inequality theory. Finally, we provide simulation results to evaluate the efficiency of the proposed algorithm.

  3. Definition of an 802.11 Interface Management Process in a Proposed System for Transmission Capacity Enhancement in Wireless Mesh Networks

    Christian Köbel

    2015-01-01

    Full Text Available 802.11-based wireless mesh networks (WMNs as last mile solutions frequently become bottlenecks in the overall Internet communication structure. The lack of end-to-end capacity on routes also affects vertical traffic coming from or flowing towards external networks, such as the Internet. The presented approach aims to increase the overall network performance by exploiting channel diversity and to additionally favor vertical traffic. To achieve this, first we propose a general system that modifies an existing mesh node architecture, in order to prepare a more efficient resource management and to enhance the restricted transmission capacity in standard WMNs. The parallel use of nonoverlapping channels, based on a multiradio node, marks the starting point. The system treats aspects of channel assignment, traffic analysis, and fast layer 2 forwarding. Then, the impact of a novel Multihop Radio Resource Management process is discussed as a relevant component of this new system architecture. The process combines per-hop priority queuing and load balancing in a novel way. It was designed, developed, and evaluated in the presented paper, resulting in the fact that capacity in WMNs was significantly increased, Quality-of-Service parameters were improved, and more efficient use of multiple radios could be reached. The proposed process was validated using a simulation approach.

  4. Management of complications of mesh surgery.

    Lee, Dominic; Zimmern, Philippe E

    2015-07-01

    Transvaginal placements of synthetic mid-urethral slings and vaginal meshes have largely superseded traditional tissue repairs in the current era because of presumed efficacy and ease of implant with device 'kits'. The use of synthetic material has generated novel complications including mesh extrusion, pelvic and vaginal pain and mesh contraction. In this review, our aim is to discuss the management, surgical techniques and outcomes associated with mesh removal. Recent publications have seen an increase in presentation of these mesh-related complications, and reports from multiple tertiary centers have suggested that not all patients benefit from surgical intervention. Although the true incidence of mesh complications is unknown, recent publications can serve to guide physicians and inform patients of the surgical outcomes from mesh-related complications. In addition, the literature highlights the growing need for a registry to account for a more accurate reporting of these events and to counsel patients on the risk and benefits before proceeding with mesh surgeries.

  5. Urogynecologic Surgical Mesh Implants

    ... procedures performed to treat pelvic floor disorders with surgical mesh: Transvaginal mesh to treat POP Transabdominal mesh to treat ... address safety risks Final Order for Reclassification of Surgical Mesh for Transvaginal Pelvic Organ Prolapse Repair Final Order for Effective ...

  6. Resource Allocation for Multicell Device-to-Device Communications in Cellular Network: A Game Theoretic Approach

    Jun Huang

    2015-08-01

    Full Text Available Device-to-Device (D2D communication has recently emerged as a promising technology to improve the capacity and coverage of cellular systems. To successfully implement D2D communications underlaying a cellular network, resource allocation for D2D links plays a critical role. While most of prior resource allocation mechanisms for D2D communications have focused on interference within a single-cell system, this paper investigates the resource allocation problem for a multicell cellular network in which a D2D link reuses available spectrum resources of multiple cells. A repeated game theoretic approach is proposed to address the problem. In this game, the base stations (BSs act as players that compete for resource supply of D2D, and the utility of each player is formulated as revenue collected from both cellular and D2D users using resources. Extensive simulations are conducted to verify the proposed approach and the results show that it can considerably enhance the system performance in terms of sum rate and sum rate gain.

  7. Nonlinear Silicon Photonic Signal Processing Devices for Future Optical Networks

    Cosimo Lacava

    2017-01-01

    Full Text Available In this paper, we present a review on silicon-based nonlinear devices for all optical nonlinear processing of complex telecommunication signals. We discuss some recent developments achieved by our research group, through extensive collaborations with academic partners across Europe, on optical signal processing using silicon-germanium and amorphous silicon based waveguides as well as novel materials such as silicon rich silicon nitride and tantalum pentoxide. We review the performance of four wave mixing wavelength conversion applied on complex signals such as Differential Phase Shift Keying (DPSK, Quadrature Phase Shift Keying (QPSK, 16-Quadrature Amplitude Modulation (QAM and 64-QAM that dramatically enhance the telecom signal spectral efficiency, paving the way to next generation terabit all-optical networks.

  8. Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications

    Yong Deng

    2016-01-01

    Full Text Available The explosive use of smart devices enabled the emergence of collective resource sharing among mobile individuals. Mobile users need to cooperate with each other to improve the whole network’s quality of service. By modeling the cooperative behaviors in a mobile crowd into an evolutionary Prisoner’s dilemma game, we investigate the relationships between cooperation rate and some main influence factors, including crowd density, communication range, temptation to defect, and mobility attributes. Using evolutionary game theory, our analysis on the cooperative behaviors of mobile takes a deep insight into the cooperation promotion in a dynamical network with selfish autonomous users. The experiment results show that mobile user’s features, including speed, moving probability, and reaction radius, have an obvious influence on the formation of a cooperative mobile social network. We also found some optimal status when the crowd’s cooperation rate reaches the best. These findings are important if we want to establish a mobile social network with a good performance.

  9. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    Bonné, Bram; Rovelo Ruiz, Gustavo; Quax, Peter; Lamotte, Wim

    2017-01-01

    Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the partici...

  10. Wireless microsensor network solutions for neurological implantable devices

    Abraham, Jose K.; Whitchurch, Ashwin; Varadan, Vijay K.

    2005-05-01

    The design and development of wireless mocrosensor network systems for the treatment of many degenerative as well as traumatic neurological disorders is presented in this paper. Due to the advances in micro and nano sensors and wireless systems, the biomedical sensors have the potential to revolutionize many areas in healthcare systems. The integration of nanodevices with neurons that are in communication with smart microsensor systems has great potential in the treatment of many neurodegenerative brain disorders. It is well established that patients suffering from either Parkinson"s disease (PD) or Epilepsy have benefited from the advantages of implantable devices in the neural pathways of the brain to alter the undesired signals thus restoring proper function. In addition, implantable devices have successfully blocked pain signals and controlled various pelvic muscles in patients with urinary and fecal incontinence. Even though the existing technology has made a tremendous impact on controlling the deleterious effects of disease, it is still in its infancy. This paper presents solutions of many problems of today's implantable and neural-electronic interface devices by combining nanowires and microelectronics with BioMEMS and applying them at cellular level for the development of a total wireless feedback control system. The only device that will actually be implanted in this research is the electrodes. All necessary controllers will be housed in accessories that are outside the body that communicate with the implanted electrodes through tiny inductively-coupled antennas. A Parkinson disease patient can just wear a hat-system close to the implantable neural probe so that the patient is free to move around, while the sensors continually monitor, record, transmit all vital information to health care specialist. In the event of a problem, the system provides an early warning to the patient while they are still mobile thus providing them the opportunity to react and

  11. FY1995 optoelectronic devices and circuits for terabit class network; 1995 nendo terabit kyu network yo hikari denshi device kairo

    NONE

    1997-03-01

    The necessary technology realizing Terabit class optical network is the signal multiplexing both in temporal and spectral domains. Controllability of ultrafast optoelectronic systems is therefore the priority issue. Specifically we chose semiconductor lasers as the key devices. The methodology for performance improvement and the creation of novel functionality are investigated. Firstly compression of semiconductor laser pulse reached the world record of 65 femto second. Secondly a proposal was made to control mode locked semiconductor lasers via subharmonic synchronization and a substantial phase noise reduction was demonstrated. Thirdly a new technology was developed to realize broadband anti-reflection coating on semiconductor laser amplifier facet, bringing about significant performance improvement. To compensate the dispersion induced signal distortion a broadband semiconductor laser amplifier four wave mixing was analyzed and also demonstrated experimentally. (NEDO)

  12. Ag/Au/Polypyrrole Core-shell Nanowire Network for Transparent, Stretchable and Flexible Supercapacitor in Wearable Energy Devices

    Moon, Hyunjin; Lee, Habeom; Kwon, Jinhyeong; Suh, Young Duk; Kim, Dong Kwan; Ha, Inho; Yeo, Junyeob; Hong, Sukjoon; Ko, Seung Hwan

    2017-02-01

    Transparent and stretchable energy storage devices have attracted significant interest due to their potential to be applied to biocompatible and wearable electronics. Supercapacitors that use the reversible faradaic redox reaction of conducting polymer have a higher specific capacitance as compared with electrical double-layer capacitors. Typically, the conducting polymer electrode is fabricated through direct electropolymerization on the current collector. However, no research have been conducted on metal nanowires as current collectors for the direct electropolymerization, even though the metal nanowire network structure has proven to be superior as a transparent, flexible, and stretchable electrode platform because the conducting polymer’s redox potential for polymerization is higher than that of widely studied metal nanowires such as silver and copper. In this study, we demonstrated a highly transparent and stretchable supercapacitor by developing Ag/Au/Polypyrrole core-shell nanowire networks as electrode by coating the surface of Ag NWs with a thin layer of gold, which provide higher redox potential than the electropolymerizable monomer. The Ag/Au/Polypyrrole core-shell nanowire networks demonstrated superior mechanical stability under various mechanical bending and stretching. In addition, proposed supercapacitors showed fine optical transmittance together with fivefold improved areal capacitance compared to pristine Ag/Au core-shell nanowire mesh-based supercapacitors.

  13. Monitoring burst (M-burst) — A novel framework of failure localization in all-optical mesh networks

    Ali, Mohammed L.; Ho, Pin-Han; Wu, Bin; Tapolcai, Janos; Shihada, Basem

    2011-01-01

    Achieving instantaneous and precise failure localization in all-optical wavelength division multiplexing (WDM) networks has been an attractive feature of network fault management systems, and is particularly important when failure

  14. Resource Management for Device-to-Device Communications in Heterogeneous Networks Using Stackelberg Game

    Yinuo He

    2014-01-01

    Full Text Available Device-to-device (D2D communications and femtocell systems can bring significant benefits to users’ throughput. However, the complicated three-tier interference among macrocell, femtocell, and D2D systems is a challenging issue in heterogeneous networks. As D2D user equipment (UE can cause interference to cellular UE, scheduling and allocation of channel resources and power of D2D communication need elaborate coordination. In this paper, we propose a joint scheduling and resource allocation scheme to improve the performance of D2D communication. We take UE rate and UE fairness into account by performing interference management. First, we construct a Stackelberg game framework in which we group a macrocellular UE, a femtocellular UE, and a D2D UE to form a two-leader one-follower pair. The cellular UE are leaders, and D2D UE is the follower who buys channel resources from the leaders. We analyze the equilibrium of the game and obtain solutions to the equilibrium. Second, we propose an algorithm for joint scheduling of D2D pairs based on their utility. Finally, we perform computer simulations to study the performance of the proposed scheme.

  15. A Game-theoretic Framework for Network Coding Based Device-to-Device Communications

    Douik, Ahmed S.; Sorour, Sameh; Tembine, Hamidou; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    This paper investigates the delay minimization problem for instantly decodable network coding (IDNC) based deviceto- device (D2D) communications. In D2D enabled systems, users cooperate to recover all their missing packets. The paper proposes a game theoretic framework as a tool for improving the distributed solution by overcoming the need for a central controller or additional signaling in the system. The session is modeled by self-interested players in a non-cooperative potential game. The utility functions are designed so as increasing individual payoff results in a collective behavior achieving both a desirable system performance in a shared network environment and the Nash equilibrium. Three games are developed whose first reduces the completion time, the second the maximum decoding delay and the third the sum decoding delay. The paper, further, improves the formulations by including a punishment policy upon collision occurrence so as to achieve the Nash bargaining solution. Learning algorithms are proposed for systems with complete and incomplete information, and for the imperfect feedback scenario. Numerical results suggest that the proposed game-theoretical formulation provides appreciable performance gain against the conventional point-to-multipoint (PMP), especially for reliable user-to-user channels.

  16. A Game-theoretic Framework for Network Coding Based Device-to-Device Communications

    Douik, Ahmed

    2016-06-29

    This paper investigates the delay minimization problem for instantly decodable network coding (IDNC) based deviceto- device (D2D) communications. In D2D enabled systems, users cooperate to recover all their missing packets. The paper proposes a game theoretic framework as a tool for improving the distributed solution by overcoming the need for a central controller or additional signaling in the system. The session is modeled by self-interested players in a non-cooperative potential game. The utility functions are designed so as increasing individual payoff results in a collective behavior achieving both a desirable system performance in a shared network environment and the Nash equilibrium. Three games are developed whose first reduces the completion time, the second the maximum decoding delay and the third the sum decoding delay. The paper, further, improves the formulations by including a punishment policy upon collision occurrence so as to achieve the Nash bargaining solution. Learning algorithms are proposed for systems with complete and incomplete information, and for the imperfect feedback scenario. Numerical results suggest that the proposed game-theoretical formulation provides appreciable performance gain against the conventional point-to-multipoint (PMP), especially for reliable user-to-user channels.

  17. A Systematic Approach for Understanding and Modeling the Performance of Network Security Devices

    Beyene, Yordanos

    2014-01-01

    In this dissertation, we attempt to understand and predict the performance of security devices. More specifically, we examine the following types of questions: (a) Given a security device, and a traffic load, can we predict the performance of the device? (b) Given a traffic load and a security device, how can we tune the performance of the device to achieve the desired trade-off between security and performance? We consider both stateful firewalls and Network Intrusion Prevention systems (NIP...

  18. Service and multimedia data transmission in IoT networks using hybrid communication devices

    Saveliev Anton

    2017-01-01

    Full Text Available Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization of IoT network, using hybrid modules. These devices provide flexibility, scalability, energy efficiency and multi-use of network for the transfer of various types of data. This approach takes into account software and hardware features of the devices used for data transmission in IoT networks, which helps to automate connecting the modules chosen by user.

  19. Network Coding Applications and Implementations on Mobile Devices

    Fitzek, Frank; Pedersen, Morten Videbæk; Heide, Janus

    2010-01-01

    Network coding has attracted a lot of attention lately. The goal of this paper is to demonstrate that the implementation of network coding is feasible on mobile platforms. The paper will guide the reader through some examples and demonstrate uses for network coding. Furthermore the paper will also...... show that the implementation of network coding is feasible today on commercial mobile platforms....

  20. CAPAClTYANALYSIS OF WIRELESS MESH NET\\VORKS

    The limited available bandwidth makes capacity analysis of the network very essential. ... Wireless mesh networks can also be employed for wide variety ofapplications such ... wireless mesh networks using OPNET (Optimized Network Engineering Tool) Modeller 1-J..5. The .... /bps using I I Mbps data rate and 12000 bits.

  1. Wifi, WiMax and LTE multi-hop mesh networks basic communication protocols and application areas

    Wei, Hung-Yu; Dixit, Sudhir

    2013-01-01

    Wifi, WiMAX, and Cellular Multihop Networks presents an overview of WiFi-based and WiMAX-based multihop relay networks. As the first text to cover IEEE 802.16j multihop hop relay technology, this revolutionary resource explores the latest advances in multi-hop and ad-hoc networking. Not only does this reference provide the technological aspects, but also the applications for the emerging technology and architectural issues. Ranging from introductory material to advanced topics, this guidebook, plus PowerPoint slides, is essential for engineers, researchers, and students interested in

  2. Simulation of devices mobility to estimate wireless channel quality metrics in 5G networks

    Orlov, Yu.; Fedorov, S.; Samuylov, A.; Gaidamaka, Yu.; Molchanov, D.

    2017-07-01

    The problem of channel quality estimation for devices in a wireless 5G network is formulated. As a performance metrics of interest we choose the signal-to-interference-plus-noise ratio, which depends essentially on the distance between the communicating devices. A model with a plurality of moving devices in a bounded three-dimensional space and a simulation algorithm to determine the distances between the devices for a given motion model are devised.

  3. Plasticity in memristive devices for Spiking Neural Networks

    Sylvain eSaïghi

    2015-03-01

    Full Text Available Memristive devices present a new device technology allowing for the realization of compact nonvolatile memories. Some of them are already in the process of industrialization. Additionally, they exhibit complex multilevel and plastic behaviors, which make them good candidates for the implementation of artificial synapses in neuromorphic engineering. However, memristive effects rely on diverse physical mechanisms, and their plastic behaviors differ strongly from one technology to another. Here, we present measurements performed on different memristive devices and the opportunities that they provide. We show that they can be used to implement different learning rules whose properties emerge directly from device physics: real time or accelerated operation, deterministic or stochastic behavior, long term or short term plasticity. We then discuss how such devices might be integrated into a complete architecture. These results highlight that there is no unique way to exploit memristive devices in neuromorphic systems. Understanding and embracing device physics is the key for their optimal use.

  4. Smart home design for electronic devices monitoring based wireless gateway network using cisco packet tracer

    Sihombing, Oloan; Zendrato, Niskarto; Laia, Yonata; Nababan, Marlince; Sitanggang, Delima; Purba, Windania; Batubara, Diarmansyah; Aisyah, Siti; Indra, Evta; Siregar, Saut

    2018-04-01

    In the era of technological development today, the technology has become the need for the life of today's society. One is needed to create a smart home in turning on and off electronic devices via smartphone. So far in turning off and turning the home electronic device is done by pressing the switch or remote button, so in control of electronic device control less effective. The home smart design is done by simulation concept by testing system, network configuration, and wireless home gateway computer network equipment required by a smart home network on cisco packet tracer using Internet Thing (IoT) control. In testing the IoT home network wireless network gateway system, multiple electronic devices can be controlled and monitored via smartphone based on predefined configuration conditions. With the Smart Ho me can potentially increase energy efficiency, decrease energy usage costs, control electronics and change the role of residents.

  5. Integration of a network aware traffic generation device into a computer network emulation platform

    Von Solms, S

    2014-07-01

    Full Text Available Flexible, open source network emulation tools can provide network researchers with significant benefits regarding network behaviour and performance. The evaluation of these networks can benefit greatly from the integration of realistic, network...

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF MOBILE SOURCE EMISSIONS CONTROL DEVICES: CLEAN DIESEL TECHNOLOGIES FUEL-BORNE CATALYST WITH MITSUI/PUREARTH CATALYZED WIRE MESH FILTER

    The Environmental Technology Verification report discusses the technology and performance of the Fuel-Borne Catalyst with Mitsui/PUREarth Catalyzed Wire Mesh Filter manufactured by Clean Diesel Technologies, Inc. The technology is a platinum/cerium fuel-borne catalyst in commerci...

  7. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    Bram Bonné

    2017-07-01

    Full Text Available Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the participants’ devices connect to and the connections made by apps on these devices, for a period of 30 days. Afterwards, participants are surveyed about their awareness and privacy sensitiveness. We show that while a higher expertise in computer networks corresponds to more awareness about the connections made by apps, neither this expertise nor the actual privacy stance of the participant translates to better security habits. Moreover, participants in general were unaware about a significant part of connections made by apps on their devices, a matter that is worsened by the fact that one third of Wi-Fi networks that participants connect to do not have any security enabled. Based on our results, we provide recommendations to network providers, developers and users on how to improve Wi-Fi security for mobile devices.

  8. 3G, 4G and beyond bringing networks, devices and the web together

    Sauter, Martin

    2012-01-01

    Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile devices, voice and multimedia services and the mobile web 2.0.  Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.  It discusses how these elements strongly influence each other and how network ca

  9. Biological Mesh Implants for Abdominal Hernia Repair: US Food and Drug Administration Approval Process and Systematic Review of Its Efficacy.

    Huerta, Sergio; Varshney, Anubodh; Patel, Prachi M; Mayo, Helen G; Livingston, Edward H

    2016-04-01

    Expensive biological mesh materials are increasingly used to reinforce abdominal wall hernia repairs. The clinical and cost benefit of these materials are unknown. To review the published evidence on the use of biological mesh materials and to examine the US Food and Drug Administration (FDA) approval history for these devices. Search of multiple electronic databases (Ovid, MEDLINE, EMBASE, Cochrane Systematic Reviews, Cochrane Database of Abstracts of Reviews of Effects, Cochrane Central Register of Controlled Trials, and Cochrane National Health Service Economic Evaluation Database) to identify articles published between 1948 and June 30, 2015, on the use of biological mesh materials used to reinforce abdominal wall hernia repair. Keywords searched included surgical mesh, abdominal hernia, recurrence, infection, fistula, bioprosthesis, biocompatible materials, absorbable implants, dermis, and collagen. The FDA online database for 510(k) clearances was reviewed for all commercially available biological mesh materials. The median national price for mesh materials was established by a benchmarking query through several Integrated Delivery Network and Group Purchasing Organization tools. Of 274 screened articles, 20 met the search criteria. Most were case series that reported results of convenience samples of patients at single institutions with a variety of clinical problems. Only 3 of the 20 were comparative studies. There were no randomized clinical trials. In total, outcomes for 1033 patients were described. Studies varied widely in follow-up time, operative technique, meshes used, and patient selection criteria. Reported outcomes and clinical outcomes, such as fistula formation and infection, were inconsistently reported across studies. Conflicts of interest were not reported in 16 of the 20 studies. Recurrence rates ranged from 0% to 80%. All biological mesh devices were approved by the FDA based on substantial equivalence to a group of nonbiological predicate

  10. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security

    Ganger, Gregory

    2000-01-01

    This report contains the technical content of a recent funding proposal. In it, we propose a new approach to network security in which each individual device erects its own security perimeter and defends its own critical resources...

  11. Optimizing Electric Vehicle Coordination Over a Heterogeneous Mesh Network in a Scaled-Down Smart Grid Testbed

    Bhattarai, Bishnu Prasad; Lévesque, Martin; Maier, Martin

    2015-01-01

    High penetration of renewable energy sources and electric vehicles (EVs) create power imbalance and congestion in the existing power network, and hence causes significant problems in the control and operation. Despite investing huge efforts from the electric utilities, governments, and researchers......, smart grid (SG) is still at the developmental stage to address those issues. In this regard, a smart grid testbed (SGT) is desirable to develop, analyze, and demonstrate various novel SG solutions, namely demand response, real-time pricing, and congestion management. In this paper, a novel SGT...... is developed in a laboratory by scaling a 250 kVA, 0.4 kV real low-voltage distribution feeder down to 1 kVA, 0.22 kV. Information and communication technology is integrated in the scaled-down network to establish real-time monitoring and control. The novelty of the developed testbed is demonstrated...

  12. Implementation of software programmable radios to form ad-hoc meshed networks to enhance maritime interception operations

    Vann, Christopher Allen

    2010-01-01

    Approved for public release; distribution is unlimited Maritime Interception Operations have become a core competency for United States naval vessels working in conjunction with coalition units in remote waters. An increased need for real-time communication networks exists that will bring VBSS and SOC Teams in contact with experts who can determine the urgency and threat levels of vessels at sea and possible targets on land. The ultimate objective is to deliver timely intelligence, sur...

  13. Coordination Protocols for a Reliable Sensor, Actuator, and Device Network (SADN

    Keiji Ozaki

    2008-01-01

    Full Text Available A sensor, actuator, and device network (SADN is composed of three types of nodes, which are sensor, actuator, and actuation device nodes. Sensor nodes and actuator nodes are interconnected in wireless networks as discussed in wireless sensor and actuator networks (WSANs. Actuator nodes and device nodes are interconnected in types of networks, i.e. wireless and wired network. Sensor nodes sense an physical event and send sensed values of the event to actuator nodes. An actuator node makes a decision on proper actions on receipt of sensed values and then issue the action requests to the device nodes. A device node really acts to the physical world. For example, moves a robot arms by performing the action on receipt of the action request. Messages may be lost and nodes may be faulty. Especially, messages are lost due to noise and collision in a wireless network. We propose a fully redundant model for an SADN where each of sensor, actuator, and device functions is replicated in multiple nodes and each of sensor-actuator and actuator-device communication is realized in many-to-many type of communication protocols. Even if some number of nodes are faulty, the other nodes can perform requested tasks. Here, each sensor node sends sensed values to multiple actuator nodes and each actuator node receives sensed values from multiple sensor nodes. While multiple actuator nodes communicate with multiple replica nodes of a device. Even if messages are lost and some number of nodes are faulty, device nodes can surely receive action requests required for sensed values and the actions are performed. In this paper, we discuss a type of semi-passive coordination (SPC protocol of multiple actuator nodes for multiple sensor nodes. We discuss a type of active coordination protocol for multiple actuator nodes and multiple actuation device nodes. We evaluate the SPC protocol for the sensor-actuator coordination in terms of the number of messages exchanged among

  14. Twiddlenet: Metadata Tagging and Data Dissemination in Mobile Device Networks

    Clotfelter, Christopher T; Towle, Jonathon E

    2007-01-01

    .... TwiddleNet is a distributed architecture of personal servers that harnesses the power of these mobile devices, enabling real time information dissemination and file sharing of multiple data types...

  15. Self-Regulating Capillary Flow Networks for Electrospray Micropropulsion Devices

    National Aeronautics and Space Administration — Advances in miniaturization of electronics and MEMS devices enable microsatellites and CubeSats to perform tasks that previously required massive satellites. Low...

  16. An Interference Mitigation Scheme of Device-to-Device Communications for Sensor Networks Underlying LTE-A.

    Kim, Jeehyeong; Karim, Nzabanita Abdoul; Cho, Sunghyun

    2017-05-10

    Device-to-Device (D2D) communication technology has become a key factor in wireless sensor networks to form autonomous communication links among sensor nodes. Many research results for D2D have been presented to resolve different technical issues of D2D. Nevertheless, the previous works have not resolved the shortage of data rate and limited coverage of wireless sensor networks. Due to bandwidth shortages and limited communication coverage, 3rd Generation Partnership Project (3GPP) has introduced a new Device-to-Device (D2D) communication technique underlying cellular networks, which can improve spectral efficiencies by enabling the direct communication of devices in proximity without passing through enhanced-NodeB (eNB). However, to enable D2D communication in a cellular network presents a challenge with regard to radio resource management since D2D links reuse the uplink radio resources of cellular users and it can cause interference to the receiving channels of D2D user equipment (DUE). In this paper, a hybrid mechanism is proposed that uses Fractional Frequency Reuse (FFR) and Almost Blank Sub-frame (ABS) schemes to handle inter-cell interference caused by cellular user equipments (CUEs) to D2D receivers (DUE-Rxs), reusing the same resources at the cell edge area. In our case, DUE-Rxs are considered as victim nodes and CUEs as aggressor nodes, since our primary target is to minimize inter-cell interference in order to increase the signal to interference and noise ratio (SINR) of the target DUE-Rx at the cell edge area. The numerical results show that the interference level of the target D2D receiver (DUE-Rx) decreases significantly compared to the conventional FFR at the cell edge. In addition, the system throughput of the proposed scheme can be increased up to 60% compared to the conventional FFR.

  17. Service and device discovery of nodes in a wireless sensor network

    Östmark, Å.; Lindgren, P.; van Halteren, Aart; Meppelink, L.

    2006-01-01

    Emerging wireless communication standards and more capable sensors and actuators have pushed further development of wireless sensor networks. Deploying a large number of sensor nodes requires a high-level framework enabling the devices to present themselves and the resources they hold. The device

  18. Concept for trusted personal devices in a mobile and networked environment

    Bormann, Frank C.; Manteau, Laurent; Linke, Andreas; Pailles, Jean C.; van Dijk, Johannes A.G.M.

    2006-01-01

    In this article we present a concept for Trusted Personal Devices, which are intended to be the common platform for the next generation of Smart Cards and other secure devices in mobile and networked environments. The concept is based on a classification of technical profiles for different potential

  19. InP monolithically integrated label swapper device for spectral amplitude coded optical packet networks

    Muñoz, P.; García-Olcina, R.; Doménech, J.D.; Rius, M.; Sancho, J.C.; Capmany, J.; Chen, L.R.; Habib, C.; Leijtens, X.J.M.; Vries, de T.; Heck, M.J.R.; Augustin, L.M.; Nötzel, R.; Robbins, D.J.

    2010-01-01

    In this paper a label swapping device, for spectral amplitude coded optical packet networks, fully integrated using InP technology is presented. Compared to previous demonstrations using discrete component assembly, the device footprint is reduced by a factor of 105 and the operation speed is

  20. Effects of junctions on carbon nanotube network-based devices

    Kang, Pil Soo; Kim, Gyu Tae [School of Electrical Engineering, Korea University, Seoul 136-713 (Korea, Republic of)

    2011-11-15

    Realistic random networks of carbon nanotubes (CNTs) were simulated by the noble hybrid method combining Monte Carlo and SPICE simulations. Near the percolation threshold, the electrical characteristics of networks are strongly affected by the contacts among nanotubes. The nonlinear electrical junctions in the CNT network were modeled by suitable SPICE models and simulated using our hybrid simulation method. We successfully described the morphological percolation threshold, and the critical density was determined as a function of normalized length. The effects of electrical junctions on the scaling of the sheet conductance were investigated. (Copyright copyright 2011 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  1. Detection of Traffic Initiated by Mobile Malware Targeting Android Devices in 3GPP Networks

    Kühnel, Marián

    2017-01-01

    Android devices have become the most popular of mobile devices; omnipresent in both business and private use. They are virtually always on and offer functionalities exceeding those of desktop computers. These properties, as well as sensitive information stored on Android devices, render them an attractive target for mobile malware authors. As the volume of mobile malware increases, analysis is becoming challenging and, sometimes, infeasible. Additionally, current network-based intrusion detec...

  2. Physical removal of metallic carbon nanotubes from nanotube network devices using a thermal and fluidic process

    Ford, Alexandra C; Shaughnessy, Michael; Wong, Bryan M; Kane, Alexander A; Krafcik, Karen L; Léonard, François; Kuznetsov, Oleksandr V; Billups, W Edward; Hauge, Robert H

    2013-01-01

    Electronic and optoelectronic devices based on thin films of carbon nanotubes are currently limited by the presence of metallic nanotubes. Here we present a novel approach based on nanotube alkyl functionalization to physically remove the metallic nanotubes from such network devices. The process relies on preferential thermal desorption of the alkyls from the semiconducting nanotubes and the subsequent dissolution and selective removal of the metallic nanotubes in chloroform. The approach is versatile and is applied to devices post-fabrication. (paper)

  3. Integrating wireless sensor networks with CE devices for health care activity tracking in the home environment

    Bosman, R.P.; Lukkien, J.J.; Verhoeven, R.

    2009-01-01

    Wireless sensing devices containing limited processing and communication capabilities are becoming available for all sorts of purposes. An important problem is to integrate networks of these sensors with the existing CE en IT infrastructure such that a) data coming out of the sensor network can be

  4. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  5. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  6. A Conflict-Free Low-Jitter Guaranteed-Rate MAC Protocol for Base-Station Communications in Wireless Mesh Networks

    Szymanski, T. H.

    A scheduling algorithm and MAC protocol which provides low-jitter guaranteed-rate (GR) communications between base-stations (BS) in a Wireless Mesh Network (WMN) is proposed. The protocol can provision long-term multimedia services such as VOIP, IPTV, or Video-on-Demand. The time-axis is partitioned into scheduling frames with F time-slots each. A directional antennae scheme is used to provide each directed link with a fixed transmission rate. A protocol such as IntServ is used to provision resources along an end-to-end path of BSs for GR sessions. The Guaranteed Rates between the BSs are then specified in a doubly stochastic traffic rate matrix, which is recursively decomposed to yield a low-jitter GR frame transmission schedule. In the resulting schedule, the end-to-end delay and jitter are small and bounded, and the cell loss rate due to primary scheduling conflicts is zero. For dual-channel WMNs, the MAC protocol can achieve 100% utilization, as well as near-minimal queueing delays and near minimal delay jitter. The scheduling time complexity is O(NFlogNF), where N is the number of BSs. Extensive simulation results are presented.

  7. Mesh Excision: Is Total Mesh Excision Necessary?

    Wolff, Gillian F; Winters, J Christian; Krlin, Ryan M

    2016-04-01

    Nearly 29% of women will undergo a secondary, repeat operation for pelvic organ prolapse (POP) symptom recurrence following a primary repair, as reported by Abbott et al. (Am J Obstet Gynecol 210:163.e1-163.e1, 2014). In efforts to decrease the rates of failure, graft materials have been utilized to augment transvaginal repairs. Following the success of using polypropylene mesh (PPM) for stress urinary incontinence (SUI), the use of PPM in the transvaginal repair of POP increased. However, in recent years, significant concerns have been raised about the safety of PPM mesh. Complications, some specific to mesh, such as exposures, erosion, dyspareunia, and pelvic pain, have been reported with increased frequency. In the current literature, there is not substantive evidence to suggest that PPM has intrinsic properties that warrant total mesh removal in the absence of complications. There are a number of complications that can occur after transvaginal mesh placement that do warrant surgical intervention after failure of conservative therapy. In aggregate, there are no high-quality controlled studies that clearly demonstrate that total mesh removal is consistently more likely to achieve pain reduction. In the cases of obstruction and erosion, it seems clear that definitive removal of the offending mesh is associated with resolution of symptoms in the majority of cases and reasonable practice. There are a number of complications that can occur with removal of mesh, and patients should be informed of this as they formulate a choice of treatment. We will review these considerations as we examine the clinical question of whether total versus partial removal of mesh is necessary for the resolution of complications following transvaginal mesh placement.

  8. Regenerable Photovoltaic Devices with a Hydrogel-Embedded Microvascular Network

    Koo, Hyung-Jun; Velev, Orlin D.

    2013-01-01

    Light-driven degradation of photoactive molecules could be one of the major obstacles to stable long term operation of organic dye-based solar light harvesting devices. One solution to this problem may be mimicking the regeneration functionality of a plant leaf. We report an organic dye photovoltaic system that has been endowed with such microfluidic regeneration functionality. A hydrogel medium with embedded channels allows rapid and uniform supply of photoactive reagents by a convection-diffusion mechanism. A washing-activation cycle enables reliable replacement of the organic component in a dye-sensitized photovoltaic system. Repetitive restoration of photovoltaic performance after intensive device degradation is demonstrated. PMID:23912814

  9. Forensic analysis of social networking application on iOS devices

    Zhang, Shuhui; Wang, Lianhai

    2013-12-01

    The increased use of social networking application on iPhone and iPad make these devices a goldmine for forensic investigators. Besides, QQ, Wechat, Sina Weibo and skype applications are very popular in China and didn't draw attention to researchers. These social networking applications are used not only on computers, but also mobile phones and tablets. This paper focuses on conducting forensic analysis on these four social networking applications on iPhone and iPad devices. The tests consisted of installing the social networking applications on each device, conducting common user activities through each application and correlation analysis with other activities. Advices to the forensic investigators are also given. It could help the investigators to describe the crime behavior and reconstruct the crime venue.

  10. Security Frameworks for Machine-to-Machine Devices and Networks

    Demblewski, Michael

    Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.

  11. Transparent Electrodes Based on Silver Nanowire Networks: From Physical Considerations towards Device Integration.

    Bellet, Daniel; Lagrange, Mélanie; Sannicolo, Thomas; Aghazadehchors, Sara; Nguyen, Viet Huong; Langley, Daniel P; Muñoz-Rojas, David; Jiménez, Carmen; Bréchet, Yves; Nguyen, Ngoc Duy

    2017-05-24

    The past few years have seen a considerable amount of research devoted to nanostructured transparent conducting materials (TCM), which play a pivotal role in many modern devices such as solar cells, flexible light-emitting devices, touch screens, electromagnetic devices, and flexible transparent thin film heaters. Currently, the most commonly used TCM for such applications (ITO: Indium Tin oxide) suffers from two major drawbacks: brittleness and indium scarcity. Among emerging transparent electrodes, silver nanowire (AgNW) networks appear to be a promising substitute to ITO since such electrically percolating networks exhibit excellent properties with sheet resistance lower than 10 Ω/sq and optical transparency of 90%, fulfilling the requirements of most applications. In addition, AgNW networks also exhibit very good mechanical flexibility. The fabrication of these electrodes involves low-temperature processing steps and scalable methods, thus making them appropriate for future use as low-cost transparent electrodes in flexible electronic devices. This contribution aims to briefly present the main properties of AgNW based transparent electrodes as well as some considerations relating to their efficient integration in devices. The influence of network density, nanowire sizes, and post treatments on the properties of AgNW networks will also be evaluated. In addition to a general overview of AgNW networks, we focus on two important aspects: (i) network instabilities as well as an efficient Atomic Layer Deposition (ALD) coating which clearly enhances AgNW network stability and (ii) modelling to better understand the physical properties of these networks.

  12. Laser Processed Silver Nanowire Network Transparent Electrodes for Novel Electronic Devices

    Spechler, Joshua Allen

    Silver nanowire network transparent conducting layers are poised to make headway into a space previously dominated by transparent conducting oxides due to the promise of a flexible, scaleable, lab-atmosphere processable alternative. However, there are many challenges standing in the way between research scale use and consumer technology scale adaptation of this technology. In this thesis we will explore many, and overcome a few of these challenges. We will address the poor conductivity at the narrow nanowire-nanowire junction points in the network by developing a laser based process to weld nanowires together on a microscopic scale. We address the need for a comparative metric for transparent conductors in general, by taking a device level rather than a component level view of these layers. We also address the mechanical, physical, and thermal limitations to the silver nanowire networks by making composites from materials including a colorless polyimide and titania sol-gel. Additionally, we verify our findings by integrating these processes into devices. Studying a hybrid organic/inorganic heterojunction photovoltaic device we show the benefits of a laser processed electrode. Green phosphorescent organic light emitting diodes fabricated on a solution phase processed silver nanowire based electrode show favorable device metrics compared to a conductive oxide electrode based control. The work in this thesis is intended to push the adoption of silver nanowire networks to further allow new device architectures, and thereby new device applications.

  13. Information Collection using Handheld Devices in Unreliable Networking Environments

    2014-06-01

    joint logistics operations center JMS Java Message System JUNG Java Universal Network/Graph Framework KTG Kestral Technology Group MILOB... Java Message System, a Publisher/Subscriber system that is explained in greater detail at either Oracle’s JMS site (Oracle 2014) or the JMS Wikipedia...Google’s infrastructure and local servers with MySQL and PostgreSQL on the backend (ODK 2014b). (2) Google Fusion Tables are used to do basic link

  14. On Transmission Policies in Multihop Device-to-Device Communications with Network Coded Cooperation

    Hernandez, Nestor; Heide, Janus; Roetter, Daniel Enrique Lucani

    2016-01-01

    Ideal transmission policies are relevant nowadays to reduce energy consumption or increase throughput in mobile networks. In this work, we propose two recoding schemes with collision avoidance mechanism to reduce the number of transmission required to convey a batch of packets from a source...

  15. Developing and Testing SpaceWire Devices and Networks

    Parkes, Steve; Mills, Stuart

    2014-08-01

    SpaceWire is a data-handling network for use on-board spacecraft, which connects together instruments, mass- memory, processors, downlink telemetry, and other on- board sub-systems [1]. SpaceWire is simple to implement and has some specific characteristics that help it support data-handling applications in space: high-speed, low-power, simplicity, relatively low implementation cost, and architectural flexibility making it ideal for many space missions. SpaceWire provides high-speed (2 Mbits/s to 200 Mbits/s), bi- directional, full-duplex data-links, which connect together SpaceWire enabled equipment. Data-handling networks can be built to suit particular applications using point-to-point data-links and routing switches.Since the SpaceWire standard was published in January 2003, it has been adopted by ESA, NASA, JAXA and RosCosmos for many missions and is being widely used on scientific, Earth observation, commercial and other spacecraft. High-profile missions using SpaceWire include: Gaia, ExoMars rover, Bepi- Colombo, James Webb Space Telescope, GOES-R, Lunar Reconnaissance Orbiter and Astro-H.The development and testing of the SpaceWire links and networks used on these and many other spacecraft currently under development, requires a comprehensive array of test equipment. In this paper the requirements for test equipment fulfilling key test functions are outlined and then equipment that meets these requirements is described. Finally the all-important software that operates with the test equipment is introduced.

  16. Game-Theoretic Social-Aware Resource Allocation for Device-to-Device Communications Underlaying Cellular Network

    Lei Wang

    2018-01-01

    Full Text Available Device-to-Device communication underlaying cellular network can increase the spectrum efficiency due to direct proximity communication and frequency reuse. However, such performance improvement is influenced by the power interference caused by spectrum sharing and social characteristics in each social community jointly. In this investigation, we present a dynamic game theory with complete information based D2D resource allocation scheme for D2D communication underlaying cellular network. In this resource allocation method, we quantify both the rate influence from the power interference caused by the D2D transmitter to cellular users and rate enhancement brought by the social relationships between mobile users. Then, the utility function maximization game is formulated to optimize the overall transmission rate performance of the network, which synthetically measures the final influence from both power interference and sociality enhancement. Simultaneously, we discuss the Nash Equilibrium of the proposed utility function maximization game from a theoretical point of view and further put forward a utility priority searching algorithm based resource allocation scheme. Simulation results show that our proposed scheme attains better performance compared with the other two advanced proposals.

  17. Impact of stand-by energy losses in electronic devices on smart network performance

    Mandić-Lukić Jasmina S.

    2012-01-01

    Full Text Available Limited energy resources and environmental concerns due to ever increasing energy consumption, more and more emphasis is being put on energy savings. Smart networks are promoted worldwide as a powerful tool used to improve the energy efficiency through consumption management, as well as to enable the distributed power generation, primarily based on renewable energy sources, to be optimally explored. To make it possible for the smart networks to function, a large number of electronic devices is needed to operate or to be in their stand-by mode. The consumption of these devices is added to the consumption of many other electronic devices already in use in households and offices, thus giving rise to the overall power consumption and threatening to counteract the primary function of smart networks. This paper addresses the consumption of particular electronic devices, with an emphasis placed on their thermal losses when in stand-by mode and their total share in the overall power consumption in certain countries. The thermal losses of electronic devices in their stand-by mode are usually neglected, but it seems theoretically possible that a massive increase in their number can impact net performance of the future smart networks considerably so that above an optimum level of energy savings achieved by their penetration, total consumption begins to increase. Based on the current stand-by energy losses from the existing electronic devices, we propose that the future penetration of smart networks be optimized taking also into account losses from their own electronic devices, required to operate in stand-by mode.

  18. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  19. Adaptive Learning Rule for Hardware-based Deep Neural Networks Using Electronic Synapse Devices

    Lim, Suhwan; Bae, Jong-Ho; Eum, Jai-Ho; Lee, Sungtae; Kim, Chul-Heung; Kwon, Dongseok; Park, Byung-Gook; Lee, Jong-Ho

    2017-01-01

    In this paper, we propose a learning rule based on a back-propagation (BP) algorithm that can be applied to a hardware-based deep neural network (HW-DNN) using electronic devices that exhibit discrete and limited conductance characteristics. This adaptive learning rule, which enables forward, backward propagation, as well as weight updates in hardware, is helpful during the implementation of power-efficient and high-speed deep neural networks. In simulations using a three-layer perceptron net...

  20. System Control Device Electronics Smart Home Using Neural Networks

    Safarul Ilham

    2017-06-01

    Full Text Available The use of information technology is very useful for today’s life and the next, where the human facilitated in doing a variety of activities in the life day to day. By the development of the existing allows people no longer do a job with difficulty. For that, it takes a system safety home using system technology Web-based and complete video streaming CCTV (video streaming a person can see the condition of his home whenever and wherever by using handphone, laptops and other tools are connected to the Internet network. This tool can facilitate someone in the monitor at home and control equipment the House as open and close and the lock the gate, turning on and off the lights so homeowners are no longer have to visit their home and fear the state of the House because fully security and control in the House was handled by the system. based on the above problems Writer try to design work system a tool that can control the simulation tools home using two Microcontroller is Attiny 2313 and Atmega16.

  1. Spin wave absorber generated by artificial surface anisotropy for spin wave device network

    Naoki Kanazawa

    2016-09-01

    Full Text Available Spin waves (SWs have the potential to reduce the electric energy loss in signal processing networks. The SWs called magnetostatic forward volume waves (MSFVWs are advantageous for networking due to their isotropic dispersion in the plane of a device. To control the MSFVW flow in a processing network based on yttrium iron garnet, we developed a SW absorber using artificial structures. The mechanical surface polishing method presented in this work can well control extrinsic damping without changing the SW dispersion of the host material. Furthermore, enhancement of the ferromagnetic resonance linewidth over 3 Oe was demonstrated.

  2. ING: INDOOR ROUTING PROTOCOL FOR GREEN HOME NETWORKS

    Kaouthar Sethom; Nozha Al- Ibrahimi; Guy Pujolle

    2011-01-01

    Because of all the innovations in computer communications and digital consumer device technologies,people have had great interest in researching home networking systems. The home is evolving rapidlyinto a smart Mesh networked environment.Moreover, the energy consumption of wireless devices and networks gradually increases to represent asignificant portion of the operational cost, naturally also causing increased equivalent carbonemissions to the environment. Therefore, reducing the energy con...

  3. Formation of a national network for rapid response to device and lead advisories: The Canadian Heart Rhythm Society Device Advisory Committee

    Krahn, Andrew D; Simpson, Christopher S; Parkash, Ratika; Yee, Raymond; Champagne, Jean; Healey, Jeffrey S; Cameron, Doug; Thibault, Bernard; Mangat, Iqwal; Tung, Stanley; Sterns, Laurence; Birnie, David H; Exner, Derek V; Sivakumaran, Soori; Davies, Ted; Coutu, Benoit; Crystal, Eugene; Wolfe, Kevin; Verma, Atul; Stephenson, Elizabeth A; Sanatani, Shubhayan; Gow, Robert; Connors, Sean; Paredes, Felix Ayala; Turabian, Mike; Kus, Teresa; Essebag, Vidal; Gardner, Martin

    2009-01-01

    The Canadian Heart Rhythm Society (CHRS) Device Advisory Committee was commissioned to respond to advisories regarding cardiac rhythm device and lead performance on behalf of the CHRS. In the event of an advisory, the Chair uses an e-mail network to disseminate advisory information to Committee members broadly representative of the Canadian device community. A consensus recommendation is prepared by the Committee and made available to all Canadian centres on the CHRS Web site after approval by the CHRS executive. This collaborative approach using an e-mail network has proven very efficient in providing a rapid national response to device advisories. The network is an ideal tool to collect specific data on implanted device system performance and allows for prompt reporting of clinically relevant data to front-line clinicians and patients. PMID:19584969

  4. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  5. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN). PMID:27907113

  6. Wireless experiments on a Motorola mesh testbed.

    Riblett, Loren E., Jr.; Wiseman, James M.; Witzke, Edward L.

    2010-06-01

    Motomesh is a Motorola product that performs mesh networking at both the client and access point levels and allows broadband mobile data connections with or between clients moving at vehicular speeds. Sandia National aboratories has extensive experience with this product and its predecessors in infrastructure-less mobile environments. This report documents experiments, which characterize certain aspects of how the Motomesh network performs when obile units are added to a fixed network infrastructure.

  7. Hernia Surgical Mesh Implants

    ... knitted mesh or non-knitted sheet forms. The synthetic materials used can be absorbable, non-absorbable or a combination of absorbable and non-absorbable materials. Animal-derived mesh are made of animal tissue, such as intestine or skin, that has been processed and disinfected to be ...

  8. Response of asymmetric carbon nanotube network devices to sub-terahertz and terahertz radiation

    Gayduchenko, I.; Kardakova, A.; Voronov, B.; Finkel, M.; Fedorov, G.; Jiménez, D.; Morozov, S.; Presniakov, M.; Goltsman, G.

    2015-01-01

    Demand for efficient terahertz radiation detectors resulted in intensive study of the asymmetric carbon nanostructures as a possible solution for that problem. It was maintained that photothermoelectric effect under certain conditions results in strong response of such devices to terahertz radiation even at room temperature. In this work, we investigate different mechanisms underlying the response of asymmetric carbon nanotube (CNT) based devices to sub-terahertz and terahertz radiation. Our structures are formed with CNT networks instead of individual CNTs so that effects probed are more generic and not caused by peculiarities of an individual nanoscale object. We conclude that the DC voltage response observed in our structures is not only thermal in origin. So called diode-type response caused by asymmetry of the device IV characteristic turns out to be dominant at room temperature. Quantitative analysis provides further routes for the optimization of the device configuration, which may result in appearance of novel terahertz radiation detectors

  9. Accuracy Enhancements for Positioning of Mobile Devices in Wireless Communication Networks

    Figueiras, Joao

    of the physical length of the communication links. Since these solutions do not require integration of additional hardware into the mobile nodes, they are cheap and simple to implement. As a price to pay, accuracy is typically lower in comparison to dedicated positioning systems. Thus, an important challenge...... communication among users, cooperative positioning strategies aim at localizing devices as a group and not as individuals. In order to reach this goal it is necessary to combine measurements from two domains: device-to-device links and cellular links. Since this combination of information......Positioning of mobile devices in wireless communication networks is nowadays being intensively investigated due to the combined benefit of location information and communication. Typical solutions for such scenario rely on robust algorithms that estimate position from indirect measurements...

  10. Demo - Talk2Me: A Framework for Device–to–Device Augmented Reality Social Network

    Shu, Jiayu; Kosta, Sokol; Zheng, Rui

    2018-01-01

    –to–Device fashion. When a user looks at nearby persons through her camera–enabled wearable devices (e.g., Google Glass), the framework automatically extracts the face–signature of the person of interest, compares it with the previously captured signatures, and presents the information shared by this person......In this demo, we present Talk2Me, an augmented reality social network framework that enables users to disseminate information in a distributed way and view others’ information instantly. Talk2Me advertises users’ messages, together with their face–signatures, to every nearby device in a Device...... to the user. We design a lightweight and yet accurate face recognition algorithm, together with an efficient distributed dissemination protocol. We integrate their implementations in an Android prototype....

  11. Current situation of transvaginal mesh repair for pelvic organ prolapse.

    Zhu, Lan; Zhang, Lei

    2014-09-01

    Surgical mesh is a metallic or polymeric screen intended to be implanted to reinforce soft tissue or bone where weakness exists. Surgical mesh has been used since the 1950s to repair abdominal hernias. In the 1970s, gynecologists began using surgical mesh products to indicate the repair of pelvic organ prolapse (POP), and in the 1990s, gynecologists began using surgical mesh for POP. Then the U.S. Food and Drug Administration (FDA) approved the first surgical mesh product specifically for use in POP. Surgical mesh materials can be divided into several categories. Most surgical mesh devices cleared for POP procedures are composed of non-absorbable synthetic polypropylene. Mesh can be placed in the anterior vaginal wall to aid in the correction of cystocele (anterior repair), in the posterior vaginal wall to aid in correction of rectocele (posterior repair), or attached to the top of the vagina to correct uterine prolapse or vaginal apical prolapse (apical repair). Over the past decades, surgical mesh products for transvaginal POP repair became incorporated into "kits" that included tools to aid in the delivery and insertion of the mesh. Surgical mesh kits continue to evolve, adding new insertion tools, tissue fixation anchors, surgical techniques, and ab- sorbable and biological materials. This procedure has been performed popularly. It was also performed increased in China. But this new technique met some trouble recently and let shake in urogynecology.

  12. Growing pains: medical device interoperability. Regulators and new standards are helping to bring about the convergence of medical devices and information management systems on IT networks.

    Degaspari, John

    2011-07-01

    Both provider organizations and medical device vendors have made significant, if slow-going, progress over the last several years to network their digitally-enabled medical devices. Recent strides in both the regulatory and standards arenas have provided renewed impetus on the part of both stakeholder groups to bring more interoperability to disparate medical devices, resulting in better security and quality of patient data.

  13. A neural network device for on-line particle identification in cosmic ray experiments

    Scrimaglio, R.; Finetti, N.; D'Altorio, L.; Rantucci, E.; Raso, M.; Segreto, E.; Tassoni, A.; Cardarilli, G.C.

    2004-01-01

    On-line particle identification is one of the main goals of many experiments in space both for rare event studies and for optimizing measurements along the orbital trajectory. Neural networks can be a useful tool for signal processing and real time data analysis in such experiments. In this document we report on the performances of a programmable neural device which was developed in VLSI analog/digital technology. Neurons and synapses were accomplished by making use of Operational Transconductance Amplifier (OTA) structures. In this paper we report on the results of measurements performed in order to verify the agreement of the characteristic curves of each elementary cell with simulations and on the device performances obtained by implementing simple neural structures on the VLSI chip. A feed-forward neural network (Multi-Layer Perceptron, MLP) was implemented on the VLSI chip and trained to identify particles by processing the signals of two-dimensional position-sensitive Si detectors. The radiation monitoring device consisted of three double-sided silicon strip detectors. From the analysis of a set of simulated data it was found that the MLP implemented on the neural device gave results comparable with those obtained with the standard method of analysis confirming that the implemented neural network could be employed for real time particle identification

  14. LiteNet: Lightweight Neural Network for Detecting Arrhythmias at Resource-Constrained Mobile Devices

    Ziyang He

    2018-04-01

    Full Text Available By running applications and services closer to the user, edge processing provides many advantages, such as short response time and reduced network traffic. Deep-learning based algorithms provide significantly better performances than traditional algorithms in many fields but demand more resources, such as higher computational power and more memory. Hence, designing deep learning algorithms that are more suitable for resource-constrained mobile devices is vital. In this paper, we build a lightweight neural network, termed LiteNet which uses a deep learning algorithm design to diagnose arrhythmias, as an example to show how we design deep learning schemes for resource-constrained mobile devices. Compare to other deep learning models with an equivalent accuracy, LiteNet has several advantages. It requires less memory, incurs lower computational cost, and is more feasible for deployment on resource-constrained mobile devices. It can be trained faster than other neural network algorithms and requires less communication across different processing units during distributed training. It uses filters of heterogeneous size in a convolutional layer, which contributes to the generation of various feature maps. The algorithm was tested using the MIT-BIH electrocardiogram (ECG arrhythmia database; the results showed that LiteNet outperforms comparable schemes in diagnosing arrhythmias, and in its feasibility for use at the mobile devices.

  15. Device-Relaying in Cellular D2D Networks: A Fairness Perspective

    Chaaban, Anas; Sezgin, Aydin

    2015-01-01

    Device-to-Device (D2D) communication is envisioned to play a key role in 5G networks as a technique for meeting the demand for high data rates. In a cellular network, D2D allows not only direct communication between users, but also device relaying. In this paper, a simple instance of device-relaying is investigated, and its impact on fairness among users is studied. Namely, a cellular network consisting of two D2D-enabled users and a base-station (BS) is considered. Thus, the users who want to establish communication with the BS can act as relays for each other’s signals. While this problem is traditionally considered in the literature as a multiple-access channel with cooperation in the uplink, and a broadcast channel with cooperation in the downlink, we propose a different treatment of the problem as a multi-way channel. A simple communication scheme is proposed, and is shown to achieve significant gain in terms of fairness (measured by the symmetric rate supported) in comparison to the aforementioned traditional treatment.

  16. LiteNet: Lightweight Neural Network for Detecting Arrhythmias at Resource-Constrained Mobile Devices.

    He, Ziyang; Zhang, Xiaoqing; Cao, Yangjie; Liu, Zhi; Zhang, Bo; Wang, Xiaoyan

    2018-04-17

    By running applications and services closer to the user, edge processing provides many advantages, such as short response time and reduced network traffic. Deep-learning based algorithms provide significantly better performances than traditional algorithms in many fields but demand more resources, such as higher computational power and more memory. Hence, designing deep learning algorithms that are more suitable for resource-constrained mobile devices is vital. In this paper, we build a lightweight neural network, termed LiteNet which uses a deep learning algorithm design to diagnose arrhythmias, as an example to show how we design deep learning schemes for resource-constrained mobile devices. Compare to other deep learning models with an equivalent accuracy, LiteNet has several advantages. It requires less memory, incurs lower computational cost, and is more feasible for deployment on resource-constrained mobile devices. It can be trained faster than other neural network algorithms and requires less communication across different processing units during distributed training. It uses filters of heterogeneous size in a convolutional layer, which contributes to the generation of various feature maps. The algorithm was tested using the MIT-BIH electrocardiogram (ECG) arrhythmia database; the results showed that LiteNet outperforms comparable schemes in diagnosing arrhythmias, and in its feasibility for use at the mobile devices.

  17. Device-Relaying in Cellular D2D Networks: A Fairness Perspective

    Chaaban, Anas

    2015-10-24

    Device-to-Device (D2D) communication is envisioned to play a key role in 5G networks as a technique for meeting the demand for high data rates. In a cellular network, D2D allows not only direct communication between users, but also device relaying. In this paper, a simple instance of device-relaying is investigated, and its impact on fairness among users is studied. Namely, a cellular network consisting of two D2D-enabled users and a base-station (BS) is considered. Thus, the users who want to establish communication with the BS can act as relays for each other’s signals. While this problem is traditionally considered in the literature as a multiple-access channel with cooperation in the uplink, and a broadcast channel with cooperation in the downlink, we propose a different treatment of the problem as a multi-way channel. A simple communication scheme is proposed, and is shown to achieve significant gain in terms of fairness (measured by the symmetric rate supported) in comparison to the aforementioned traditional treatment.

  18. Analisis Kinerja EIGRP dan OSPF pada Topologi Ring dan Mesh

    DWI ARYANTA

    2014-01-01

    Full Text Available ABSTRAK EIGRP (Enhanced Interior Gateway Routing Protocol dan OSPF (Open Shortest Path Fisrt adalah routing protokol yang banyak digunakan pada suatu jaringan komputer. EIGRP hanya dapat digunakan pada perangkat Merk CISCO, sedangkan OSPF dapat digunakan pada semua merk jaringan. Pada penelitian ini dibandingkan delay dan rute dari kedua routing protokol yang diimplementasikan pada topologi Ring dan Mesh. Cisco Packet Tracer 5.3 digunakan untuk mensimulasikan kedua routing protokol ini. Skenario pertama adalah perancangan jaringan kemudian dilakukan pengujian waktu delay 100 kali dalam 5 kasus. Skenario kedua dilakukan pengujian trace route untuk mengetahui jalur yang dilewati paket data lalu memutus link utama. Pada skenario kedua juga dilakukan perbandingan nilai metric dan cost hasil simulasi dengan perhitungan rumus. Skenario ketiga dilakukan pengujian waktu konvergensi untuk setiap routing protokol pada setiap topologi. Hasilnya EIGRP lebih cepat 386 µs daripada OSPF untuk topologi Ring sedangkan OSPF lebih cepat 453 µs daripada EIGRP untuk topologi Mesh. Hasil trace route menunjukan rute yang dipilih oleh routing protokol yaitu nilai metric dan cost yang terkecil. Waktu konvergensi rata-rata topologi Ring pada EIGRP sebesar 12,75 detik dan 34,5 detik pada OSPF sedangkan topologi Mesh di EIGRP sebesar 13 detik dan 35,25 detik di OSPF. Kata Kunci: EIGRP, OSPF, Packet Tracer 5.3, Ring, Mesh, Konvergensi ABSTRACT EIGRP (Enhanced Interior Gateway Routing Protocol and OSPF (Open Shortest Path Fisrt is the routing protocol that is widely used in a computer network. EIGRP can only be used on devices Brand CISCO, while OSPF can be used on all brands of network. In this study comparison of both the delay and the routing protocol implemented on Ring and Mesh topology. Cisco Packet Tracer 5.3 is used to simulate both the routing protocol. The first scenario is the design of the network and then do the test of time delay 100 times in 5 cases. The

  19. Analisis Kinerja EIGRP dan OSPF pada Topologi Ring dan Mesh

    DWI ARYANTA

    2016-02-01

    Full Text Available ABSTRAK EIGRP (Enhanced Interior Gateway Routing Protocol dan OSPF (Open Shortest Path Fisrt adalah routing protokol yang banyak digunakan pada suatu jaringan komputer. EIGRP hanya dapat digunakan pada perangkat Merk CISCO, sedangkan OSPF dapat digunakan pada semua merk jaringan. Pada penelitian ini dibandingkan delay dan rute dari kedua routing protokol yang diimplementasikan pada topologi Ring dan Mesh. Cisco Packet Tracer 5.3 digunakan untuk mensimulasikan kedua routing protokol ini. Skenario pertama adalah perancangan jaringan kemudian dilakukan pengujian waktu delay 100 kali dalam 5 kasus. Skenario kedua dilakukan pengujian trace route untuk mengetahui jalur yang dilewati paket data lalu memutus link utama. Pada skenario kedua juga dilakukan perbandingan nilai metric dan cost hasil simulasi dengan perhitungan rumus. Skenario ketiga dilakukan pengujian waktu konvergensi untuk setiap routing protokol pada setiap topologi. Hasilnya EIGRP lebih cepat 386 µs daripada OSPF untuk topologi Ring sedangkan OSPF lebih cepat 453 µs daripada EIGRP untuk topologi Mesh. Hasil trace route menunjukan rute yang dipilih oleh routing protokol yaitu nilai metric dan cost yang terkecil. Waktu konvergensi rata-rata topologi Ring pada EIGRP sebesar 12,75 detik dan 34,5 detik pada OSPF sedangkan topologi Mesh di EIGRP sebesar 13 detik dan 35,25 detik di OSPF. Kata Kunci : EIGRP, OSPF, Packet Tracer 5.3, Ring, Mesh, Konvergensi ABSTRACT EIGRP (Enhanced Interior Gateway Routing Protocol and OSPF (Open Shortest Path Fisrt is the routing protocol that is widely used in a computer network. EIGRP can only be used on devices Brand CISCO, while OSPF can be used on all brands of network. In this study comparison of both the delay and the routing protocol implemented on Ring and Mesh topology. Cisco Packet Tracer 5.3 is used to simulate both the routing protocol. The first scenario is the design of the network and then do the test of time delay 100 times in 5 cases. The

  20. Towards an autonomous self-tuning vibration energy harvesting device for wireless sensor network applications

    Challa, Vinod R; Prasad, M G; Fisher, Frank T

    2011-01-01

    Future deployment of wireless sensor networks will ultimately require a self-sustainable local power source for each sensor, and vibration energy harvesting is a promising approach for such applications. A requirement for efficient vibration energy harvesting is to match the device and source frequencies. While techniques to tune the resonance frequency of an energy harvesting device have recently been described, in many applications optimization of such systems will require the energy harvesting device to be able to autonomously tune its resonance frequency. In this work a vibration energy harvesting device with autonomous resonance frequency tunability utilizing a magnetic stiffness technique is presented. Here a piezoelectric cantilever beam array is employed with magnets attached to the free ends of cantilever beams to enable magnetic force resonance frequency tuning. The device is successfully tuned from − 27% to + 22% of its untuned resonance frequency while outputting a peak power of approximately 1 mW. Since the magnetic force tuning technique is semi-active, energy is only consumed during the tuning process. The developed prototype consumed maximum energies of 3.3 and 3.9 J to tune to the farthest source frequencies with respect to the untuned resonance frequency of the device. The time necessary for this prototype device to harvest the energy expended during its most energy-intensive (largest resonant frequency adjustment) tuning operation is 88 min in a low amplitude 0.1g vibration environment, which could be further optimized using higher efficiency piezoelectric materials and system components

  1. The optimal number, type and location of devices in automation of electrical distribution networks

    Popović Željko N.

    2015-01-01

    Full Text Available This paper presents the mixed integer linear programming based model for determining optimal number, type and location of remotely controlled and supervised devices in distribution networks in the presence of distributed generators. The proposed model takes into consideration a number of different devices simultaneously (remotely controlled circuit breakers/reclosers, sectionalizing switches, remotely supervised and local fault passage indicators along with the following: expected outage cost to consumers and producers due to momentary and long-term interruptions, automated device expenses (capital investment, installation, and annual operation and maintenance costs, number and expenses of crews involved in the isolation and restoration process. Furthermore, the other possible benefits of each of automated device are also taken into account (e.g., benefits due to decreasing the cost of switching operations in normal conditions. The obtained numerical results emphasize the importance of consideration of different types of automation devices simultaneously. They also show that the proposed approach have a potential to improve the process of determining of the best automation strategy in real life distribution networks.

  2. Designing and Implementing a Distributed Social Network Service for Mobile Devices

    Alexandru RADOVICI

    2011-01-01

    Full Text Available The paper presents a new paradigm for building social network services. The proposed platform is called eXtensible Social Network. As it uses the XMPP protocol for authentication and communication, it allows users from different service providers interact with each other, without having to change their accounts. Moreover, the platform provides means for users to authenticate and interact with each other while temporary disconnected from the Internet. Moreover, the platform is specially designed for mobile devices, running on their restrictive operating systems and taking advantage of the systems optimizations.

  3. Adapting cognitive radio technology for low-power wireless personal area network devices

    Toftegaard, Thomas Skjødeberg; Rohde, John

    2011-01-01

    The application of wireless personal area network (WPAN) and simple point-to-point wireless communication devices has increased drastically both in private household and in our workspaces in general over the last decade. Combined with the fact that the total number of wireless devices...... and associated standards present in the wireless environment is experiencing an extreme growth, the frequency spectrum scarcity is exposed as a severe challenge. Setting up efficient and reliable wireless WPAN links can be challenging even today. This is especially true because of the intensive use...... discusses the challenges associated with the implementation of highly reliable low-power WPAN networks for the future and the adaption of Cognitive Radio technology as a potential solution. A brief status on the maturity of CR technology will be presented as an integral part of this discussion....

  4. Frequency of Internet, Social Network and Mobile Devices use in Prospective Teachers from Faculty of Education

    Murat Tezer

    2017-11-01

    Full Text Available The basic aim of this study was to determine the relationship between university students’ frequency of internet use, duration of internet connection, environments that they connect to the internet, duration use of mobile devices, frequency of social networking leisure activities and internet addiction levels. The participants included a total of 363 university students of whom 255 were female and 108 were male. Quantitative research methods were used in this study. A survey was developed by the researchers and administered to the students. Based on statistical analysis; it was revealed that the frequency of internet use was every day throughout the week, students frequently stayed connected to the internet at home with their computers and the frequency of mobile devices and social network use was found as “Always”. In addition, university students stated that they connected to the internet in their leisure time.

  5. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices.

    Gokmen, Tayfun; Onen, Murat; Haensch, Wilfried

    2017-01-01

    In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN) in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU) devices to convolutional neural networks (CNNs). We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  6. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Tayfun Gokmen

    2017-10-01

    Full Text Available In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU devices to convolutional neural networks (CNNs. We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  7. Hybrid Spintronic-CMOS Spiking Neural Network with On-Chip Learning: Devices, Circuits, and Systems

    Sengupta, Abhronil; Banerjee, Aparajita; Roy, Kaushik

    2016-12-01

    Over the past decade, spiking neural networks (SNNs) have emerged as one of the popular architectures to emulate the brain. In SNNs, information is temporally encoded and communication between neurons is accomplished by means of spikes. In such networks, spike-timing-dependent plasticity mechanisms require the online programing of synapses based on the temporal information of spikes transmitted by spiking neurons. In this work, we propose a spintronic synapse with decoupled spike-transmission and programing-current paths. The spintronic synapse consists of a ferromagnet-heavy-metal heterostructure where the programing current through the heavy metal generates spin-orbit torque to modulate the device conductance. Low programing energy and fast programing times demonstrate the efficacy of the proposed device as a nanoelectronic synapse. We perform a simulation study based on an experimentally benchmarked device-simulation framework to demonstrate the interfacing of such spintronic synapses with CMOS neurons and learning circuits operating in the transistor subthreshold region to form a network of spiking neurons that can be utilized for pattern-recognition problems.

  8. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Gokmen, Tayfun; Onen, Murat; Haensch, Wilfried

    2017-01-01

    In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN) in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU) devices to convolutional neural networks (CNNs). We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures. PMID:29066942

  9. Talk2Me: A Framework for Device–to–Device Augmented Reality Social Network

    Shu, Jiayu; Kosta, Sokol; Zheng, Rui

    2018-01-01

    , an augmented reality social network framework that enables users to disseminate information in a distributed way and view others’ information instantly. Talk2Me advertises users’ messages, together with their face–signature, to every nearby device in a Device–to–Device fashion. When a user looks at nearby...... persons through her camera–enabled wearable devices (e.g., Google Glass), the framework automatically extracts the face–signature of the person of interest, compares it with the previously captured signatures, and presents the information shared by this person to the user. We design and implement Talk2Me...... a novel face recognition algorithm for this specific scenario with a small number of face features and limited computing capability. Evaluation results of the prototype with real users and extensive simulations validate the performance and usability of our design, showing the potentials of the augmented...

  10. Automatic disease diagnosis using optimised weightless neural networks for low-power wearable devices.

    Cheruku, Ramalingaswamy; Edla, Damodar Reddy; Kuppili, Venkatanareshbabu; Dharavath, Ramesh; Beechu, Nareshkumar Reddy

    2017-08-01

    Low-power wearable devices for disease diagnosis are used at anytime and anywhere. These are non-invasive and pain-free for the better quality of life. However, these devices are resource constrained in terms of memory and processing capability. Memory constraint allows these devices to store a limited number of patterns and processing constraint provides delayed response. It is a challenging task to design a robust classification system under above constraints with high accuracy. In this Letter, to resolve this problem, a novel architecture for weightless neural networks (WNNs) has been proposed. It uses variable sized random access memories to optimise the memory usage and a modified binary TRIE data structure for reducing the test time. In addition, a bio-inspired-based genetic algorithm has been employed to improve the accuracy. The proposed architecture is experimented on various disease datasets using its software and hardware realisations. The experimental results prove that the proposed architecture achieves better performance in terms of accuracy, memory saving and test time as compared to standard WNNs. It also outperforms in terms of accuracy as compared to conventional neural network-based classifiers. The proposed architecture is a powerful part of most of the low-power wearable devices for the solution of memory, accuracy and time issues.

  11. Double network bacterial cellulose hydrogel to build a biology-device interface

    Shi, Zhijun; Li, Ying; Chen, Xiuli; Han, Hongwei; Yang, Guang

    2013-12-01

    Establishing a biology-device interface might enable the interaction between microelectronics and biotechnology. In this study, electroactive hydrogels have been produced using bacterial cellulose (BC) and conducting polymer (CP) deposited on the BC hydrogel surface to cover the BC fibers. The structures of these composites thus have double networks, one of which is a layer of electroactive hydrogels combined with BC and CP. The electroconductivity provides the composites with capabilities for voltage and current response, and the BC hydrogel layer provides good biocompatibility, biodegradability, bioadhesion and mass transport properties. Such a system might allow selective biological functions such as molecular recognition and specific catalysis and also for probing the detailed genetic and molecular mechanisms of life. A BC-CP composite hydrogel could then lead to a biology-device interface. Cyclic voltammetry and electrochemical impedance spectroscopy (EIS) are used here to study the composite hydrogels' electroactive property. BC-PAni and BC-PPy respond to voltage changes. This provides a mechanism to amplify electrochemical signals for analysis or detection. BC hydrogels were found to be able to support the growth, spreading and migration of human normal skin fibroblasts without causing any cytotoxic effect on the cells in the cell culture. These double network BC-CP hydrogels are biphasic Janus hydrogels which integrate electroactivity with biocompatibility, and might provide a biology-device interface to produce implantable devices for personalized and regenerative medicine.

  12. Motorized CPM/CAM physiotherapy device with sliding-mode Fuzzy Neural Network control loop.

    Ho, Hung-Jung; Chen, Tien-Chi

    2009-11-01

    Continuous passive motion (CPM) and controllable active motion (CAM) physiotherapy devices promote rehabilitation of damaged joints. This paper presents a computerized CPM/CAM system that obviates the need for mechanical resistance devices such as springs. The system is controlled by a computer which performs sliding-mode Fuzzy Neural Network (FNN) calculations online. CAM-type resistance force is generated by the active performance of an electric motor which is controlled so as to oppose the motion of the patient's leg. A force sensor under the patient's foot on the device pedal provides data for feedback in a sliding-mode FNN control loop built around the motor. Via an active impedance control feedback system, the controller drives the motor to behave similarly to a damped spring by generating and controlling the amplitude and direction of the pedal force in relation to the patient's leg. Experiments demonstrate the high sensitivity and speed of the device. The PC-based feedback nature of the control loop means that sophisticated auto-adaptable CPM/CAM custom-designed physiotherapy becomes possible. The computer base also allows extensive data recording, data analysis and network-connected remote patient monitoring.

  13. Geometrically Consistent Mesh Modification

    Bonito, A.

    2010-01-01

    A new paradigm of adaptivity is to execute refinement, coarsening, and smoothing of meshes on manifolds with incomplete information about their geometry and yet preserve position and curvature accuracy. We refer to this collectively as geometrically consistent (GC) mesh modification. We discuss the concept of discrete GC, show the failure of naive approaches, and propose and analyze a simple algorithm that is GC and accuracy preserving. © 2010 Society for Industrial and Applied Mathematics.

  14. Continuous-variable Measurement-device-independent Quantum Relay Network with Phase-sensitive Amplifiers

    Li, Fei; Zhao, Wei; Guo, Ying

    2018-01-01

    Continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is now heading towards solving the practical problem of implementing scalable quantum networks. In this paper, we show that a solution can come from deploying an optical amplifier in the CV-MDI system, aiming to establish a high-rate quantum network. We suggest an improved CV-MDI protocol using the EPR states coupled with optical amplifiers. It can implement a practical quantum network scheme, where the legal participants create the secret correlations by using EPR states connecting to an untrusted relay via insecure links and applying the multi-entangled Greenberger-Horne-Zeilinger (GHZ) state analysis at relay station. Despite the possibility that the relay could be completely tampered with and imperfect links are subject to the powerful attacks, the legal participants are still able to extract a secret key from network communication. The numerical simulation indicates that the quantum network communication can be achieved in an asymmetric scenario, fulfilling the demands of a practical quantum network. Furthermore, we show that the use of optical amplifiers can compensate the inherent imperfections and improve the secret key rate of the CV-MDI system.

  15. Modeling fiber Bragg grating device networks in photomechanical polymer optical fibers

    Lanska, Joseph T.; Kuzyk, Mark G.; Sullivan, Dennis M.

    2015-09-01

    We report on the modeling of fiber Bragg grating (FBG) networks in poly(methyl methacrylate) (PMMA) polymer fibers doped with azo dyes. Our target is the development of Photomechanical Optical Devices (PODs), comprised of two FBGs in series, separated by a Fabry-Perot cavity of photomechanical material. PODs exhibit photomechanical multi-stability, with the capacity to access multiple length states for a fixed input intensity when a mechanical shock is applied. Using finite-difference time-domain (FDTD) numerical methods, we modeled the photomechanical response of both Fabry-Perot and Bragg-type PODs in a single polymer optical fiber. The polymer fiber was modeled as an instantaneous Kerr-type nonlinear χ(3) material. Our model correctly predicts the essential optical features of FBGs as well as the photomechanical multi-stability of nonlinear Fabry-Perot cavity-based PODs. Networks of PODs may provide a framework for smart shape-shifting materials and fast optical computation where the decision process is distributed over the entire network. In addition, a POD can act as memory, and its response can depend on input history. Our models inform and will accelerate targeted development of novel Bragg grating-based polymer fiber device networks for a variety of applications in optical computing and smart materials.

  16. The Role of Social Networks in Early Adoption of Mobile Devices

    Tscherning, Heidi; Mathiassen, Lars

    As mobile devices have become the personal information-processing interface of choice, many individuals seem to swiftly follow fashion. Yet, the literature is silent on how early adopters of mobile devices overcome uncertainties related to shifts in technology. Based on purposive sampling, this paper presents detailed insights into why and how five closely related individuals made the decision to adopt the iPhone before it was available through traditional supply chains. Focusing on the role played by social networks, we analyze how adoption threshold, opinion leaders, social contagion, and social learning shaped adoption behaviors and outcomes. The analyses confirm that network structures impact the early decision to accept the iPhone; they show that when facing uncertainty, adoption decisions emerged as a combined result of individual adoption reflections and major influences from the social network as well as behaviors observed within the network, and, they reveal interesting behaviors that differed from expectations. In conclusion, we discuss implications for both theory and practice.

  17. Using smart mobile devices in social-network-based health education practice: a learning behavior analysis.

    Wu, Ting-Ting

    2014-06-01

    Virtual communities provide numerous resources, immediate feedback, and information sharing, enabling people to rapidly acquire information and knowledge and supporting diverse applications that facilitate interpersonal interactions, communication, and sharing. Moreover, incorporating highly mobile and convenient devices into practice-based courses can be advantageous in learning situations. Therefore, in this study, a tablet PC and Google+ were introduced to a health education practice course to elucidate satisfaction of learning module and conditions and analyze the sequence and frequency of learning behaviors during the social-network-based learning process. According to the analytical results, social networks can improve interaction among peers and between educators and students, particularly when these networks are used to search for data, post articles, engage in discussions, and communicate. In addition, most nursing students and nursing educators expressed a positive attitude and satisfaction toward these innovative teaching methods, and looked forward to continuing the use of this learning approach. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Development of Network Devices Supporting Communication Independence In NPP I and C Systems

    Jeong, K.-I.; Suh, Y.S.; Park, G.-O.; Park, J.-Y.

    2013-06-01

    As advanced digital I and C systems of nuclear power plants or research reactors are being introduced to replace analog systems, a data communication network is necessary for data exchanges between I and C systems of nuclear power plants or research reactors. Data communication network technology may have significant impact on I and C systems. As the safety I and C system is composed of redundant channels to enhance the performance of the safety functions and data communication system is used to transmit the data generated by the digital I and C systems, communication independence is required to mitigate the risk of safety I and C system failure. Therefore this paper mainly discusses the issues related to the communication independence and the current status of network devices we designed, developed, and validated to satisfy the requirements of function, performance, and communication independence. (authors)

  19. QNAP 1263U Network Attached Storage (NAS)/ Storage Area Network (SAN) Device Users Guide

    2016-11-01

    position unless so designated by other authorized documents. Citation of manufacturer’s or trade names does not constitute an official endorsement or...Message Block, and newer standards such as Internet Small Computer Systems Interface. The differences in the protocols also play an important role in...Mapping the Network Drive 4 5.1 Windows 7 4 5.2 Windows 10 6 6. Connecting to the iSCSI on the NAS 6 7. Adding a New IQN to iSCSI ACL 7 8

  20. Design and Implementation of the MESH Services Platform

    Batteram, Harold J.; Bakker, John-Luc; Verhoosel, Jack P.C.; Diakov, N.K.

    1999-01-01

    Industry acceptance of TINA (Telecommunications Information Networking Architecture) will depend heavily on both the evaluation of working systems that implement this architecture, and on the experiences obtained during the design and implementation of these systems. During the MESH' (Multimedia

  1. Coarse mesh code development

    Lieberoth, J.

    1975-06-15

    The numerical solution of the neutron diffusion equation plays a very important role in the analysis of nuclear reactors. A wide variety of numerical procedures has been proposed, at which most of the frequently used numerical methods are fundamentally based on the finite- difference approximation where the partial derivatives are approximated by the finite difference. For complex geometries, typical of the practical reactor problems, the computational accuracy of the finite-difference method is seriously affected by the size of the mesh width relative to the neutron diffusion length and by the heterogeneity of the medium. Thus, a very large number of mesh points are generally required to obtain a reasonably accurate approximate solution of the multi-dimensional diffusion equation. Since the computation time is approximately proportional to the number of mesh points, a detailed multidimensional analysis, based on the conventional finite-difference method, is still expensive even with modern large-scale computers. Accordingly, there is a strong incentive to develop alternatives that can reduce the number of mesh-points and still retain accuracy. One of the promising alternatives is the finite element method, which consists of the expansion of the neutron flux by piecewise polynomials. One of the advantages of this procedure is its flexibility in selecting the locations of the mesh points and the degree of the expansion polynomial. The small number of mesh points of the coarse grid enables to store the results of several of the least outer iterations and to calculate well extrapolated values of them by comfortable formalisms. This holds especially if only one energy distribution of fission neutrons is assumed for all fission processes in the reactor, because the whole information of an outer iteration is contained in a field of fission rates which has the size of all mesh points of the coarse grid.

  2. In Vitro Reconstruction of Neuronal Networks Derived from Human iPS Cells Using Microfabricated Devices.

    Yuzo Takayama

    Full Text Available Morphology and function of the nervous system is maintained via well-coordinated processes both in central and peripheral nervous tissues, which govern the homeostasis of organs/tissues. Impairments of the nervous system induce neuronal disorders such as peripheral neuropathy or cardiac arrhythmia. Although further investigation is warranted to reveal the molecular mechanisms of progression in such diseases, appropriate model systems mimicking the patient-specific communication between neurons and organs are not established yet. In this study, we reconstructed the neuronal network in vitro either between neurons of the human induced pluripotent stem (iPS cell derived peripheral nervous system (PNS and central nervous system (CNS, or between PNS neurons and cardiac cells in a morphologically and functionally compartmentalized manner. Networks were constructed in photolithographically microfabricated devices with two culture compartments connected by 20 microtunnels. We confirmed that PNS and CNS neurons connected via synapses and formed a network. Additionally, calcium-imaging experiments showed that the bundles originating from the PNS neurons were functionally active and responded reproducibly to external stimuli. Next, we confirmed that CNS neurons showed an increase in calcium activity during electrical stimulation of networked bundles from PNS neurons in order to demonstrate the formation of functional cell-cell interactions. We also confirmed the formation of synapses between PNS neurons and mature cardiac cells. These results indicate that compartmentalized culture devices are promising tools for reconstructing network-wide connections between PNS neurons and various organs, and might help to understand patient-specific molecular and functional mechanisms under normal and pathological conditions.

  3. Distributed processing and network of data acquisition and diagnostics control for Large Helical Device (LHD)

    Nakanishi, H.; Kojima, M.; Hidekuma, S.

    1997-11-01

    The LHD (Large Helical Device) data processing system has been designed in order to deal with the huge amount of diagnostics data of 600-900 MB per 10-second short-pulse experiment. It prepares the first plasma experiment in March 1998. The recent increase of the data volume obliged to adopt the fully distributed system structure which uses multiple data transfer paths in parallel and separates all of the computer functions into clients and servers. The fundamental element installed for every diagnostic device consists of two kinds of server computers; the data acquisition PC/Windows NT and the real-time diagnostics control VME/VxWorks. To cope with diversified kinds of both device control channels and diagnostics data, the object-oriented method are utilized wholly for the development of this system. It not only reduces the development burden, but also widen the software portability and flexibility. 100Mbps EDDI-based fast networks will re-integrate the distributed server computers so that they can behave as one virtual macro-machine for users. Network methods applied for the LHD data processing system are completely based on the TCP/IP internet technology, and it provides the same accessibility to the remote collaborators as local participants can operate. (author)

  4. A large interconnecting network within hybrid MEH-PPV/TiO2 nanorod photovoltaic devices

    Zeng, T-W; Lin, Y-Y; Lo, H-H; Chen, C-W; Chen, C-H; Liou, S-C; Huang, H-Y; Su, W-F

    2006-01-01

    This is a study of hybrid photovoltaic devices based on TiO 2 nanorods and poly[2-methoxy-5-(2'-ethyl-hexyloxy)-1,4-phenylene vinylene] (MEH-PPV). We use TiO 2 nanorods as the electron acceptors and conduction pathways. Here we describe how to develop a large interconnecting network within the photovoltaic device fabricated by inserting a layer of TiO 2 nanorods between the MEH-PPV:TiO 2 nanorod hybrid active layer and the aluminium electrode. The formation of a large interconnecting network provides better connectivity to the electrode, leading to a 2.5-fold improvement in external quantum efficiency as compared to the reference device without the TiO 2 nanorod layer. A power conversion efficiency of 2.2% under illumination at 565 nm and a maximum external quantum efficiency of 24% at 430 nm are achieved. A power conversion efficiency of 0.49% is obtained under Air Mass 1.5 illumination

  5. Documentation for MeshKit - Reactor Geometry (&mesh) Generator

    Jain, Rajeev [Argonne National Lab. (ANL), Argonne, IL (United States); Mahadevan, Vijay [Argonne National Lab. (ANL), Argonne, IL (United States)

    2015-09-30

    This report gives documentation for using MeshKit’s Reactor Geometry (and mesh) Generator (RGG) GUI and also briefly documents other algorithms and tools available in MeshKit. RGG is a program designed to aid in modeling and meshing of complex/large hexagonal and rectilinear reactor cores. RGG uses Argonne’s SIGMA interfaces, Qt and VTK to produce an intuitive user interface. By integrating a 3D view of the reactor with the meshing tools and combining them into one user interface, RGG streamlines the task of preparing a simulation mesh and enables real-time feedback that reduces accidental scripting mistakes that could waste hours of meshing. RGG interfaces with MeshKit tools to consolidate the meshing process, meaning that going from model to mesh is as easy as a button click. This report is designed to explain RGG v 2.0 interface and provide users with the knowledge and skills to pilot RGG successfully. Brief documentation of MeshKit source code, tools and other algorithms available are also presented for developers to extend and add new algorithms to MeshKit. RGG tools work in serial and parallel and have been used to model complex reactor core models consisting of conical pins, load pads, several thousands of axially varying material properties of instrumentation pins and other interstices meshes.

  6. Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices

    Andrea Baiocchi

    2015-01-01

    Full Text Available Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. On one side there is a need to maintain the logic of high level policies, which requires administrators to implement and update a large amount of filtering rules while keeping them conflict-free, that is, avoiding security inconsistencies. On the other side, traffic adaptive optimization of large rule lists is useful for general purpose computers used as filtering devices, without specific designed hardware, to face growing link speeds and to harden filtering devices against DoS and DDoS attacks. Our work joins the two issues in an innovative way and defines a traffic adaptive algorithm to find conflict-free optimized rule sets, by relying on information gathered with traffic logs. The proposed approach suits current technology architectures and exploits available features, like traffic log databases, to minimize the impact of ACO development on the packet filtering devices. We demonstrate the benefit entailed by the proposed algorithm through measurements on a test bed made up of real-life, commercial packet filtering devices.

  7. Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor network (WSN applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.

  8. Overview of FACTS devices for wind power plants directly connected to the transmission network

    Adamczyk, Andrzej Grzegorz; Teodorescu, Remus; Rodriguez, Pedro

    2010-01-01

    Growing number of wind turbines is changing electricity generation profile all over the world. This brings challenges for power system operation, which was designed and developed around conventional power plants with directly coupled synchronous generators. In result, safety and stability...... of the electrical network with high wind energy penetration might be compromised. For this reason transmission system operators (TSO) impose more stringent connection requirements on the wind power plant (WPP) owners. On the other hand flexible AC transmission systems (FACTS) devices offer enhancement of grid...... research in FACTS applicability for WPPs is summarized. Examples of few existing FACTS applications for wind farms are given....

  9. A cost-effective measurement-device-independent quantum key distribution system for quantum networks

    Valivarthi, Raju; Zhou, Qiang; John, Caleb; Marsili, Francesco; Verma, Varun B.; Shaw, Matthew D.; Nam, Sae Woo; Oblak, Daniel; Tittel, Wolfgang

    2017-12-01

    We experimentally realize a measurement-device-independent quantum key distribution (MDI-QKD) system. It is based on cost-effective and commercially available hardware such as distributed feedback lasers and field-programmable gate arrays that enable time-bin qubit preparation and time-tagging, and active feedback systems that allow for compensation of time-varying properties of photons after transmission through deployed fiber. We examine the performance of our system, and conclude that its design does not compromise performance. Our demonstration paves the way for MDI-QKD-based quantum networks in star-type topology that extend over more than 100 km distance.

  10. Research on two-port network of wavelet transform processor using surface acoustic wavelet devices and its application.

    Liu, Shoubing; Lu, Wenke; Zhu, Changchun

    2017-11-01

    The goal of this research is to study two-port network of wavelet transform processor (WTP) using surface acoustic wave (SAW) devices and its application. The motive was prompted by the inconvenience of the long research and design cycle and the huge research funding involved with traditional method in this field, which were caused by the lack of the simulation and emulation method of WTP using SAW devices. For this reason, we introduce the two-port network analysis tool, which has been widely used in the design and analysis of SAW devices with uniform interdigital transducers (IDTs). Because the admittance parameters calculation formula of the two-port network can only be used for the SAW devices with uniform IDTs, this analysis tool cannot be directly applied into the design and analysis of the processor using SAW devices, whose input interdigital transducer (IDT) is apodized weighting. Therefore, in this paper, we propose the channel segmentation method, which can convert the WTP using SAW devices into parallel channels, and also provide with the calculation formula of the number of channels, the number of finger pairs and the static capacitance of an interdigital period in each parallel channel firstly. From the parameters given above, we can calculate the admittance parameters of the two port network for each channel, so that we can obtain the admittance parameter of the two-port network of the WTP using SAW devices on the basis of the simplification rule of parallel two-port network. Through this analysis tool, not only can we get the impulse response function of the WTP using SAW devices but we can also get the matching circuit of it. Large numbers of studies show that the parameters of the two-port network obtained by this paper are consistent with those measured by network analyzer E5061A, and the impulse response function obtained by the two-port network analysis tool is also consistent with that measured by network analyzer E5061A, which can meet the

  11. Application of the device based on chirping of optical impulses for management of software-defined networks in dynamic mode

    Vinogradova, Irina L.; Khasansin, Vadim R.; Andrianova, Anna V.; Yantilina, Liliya Z.; Vinogradov, Sergey L.

    2016-03-01

    The analysis of the influence of the physical layer concepts in optical networks on the performance of the whole network. It is concluded that the relevance of the search for new means of transmitting information on a physical level. It is proposed to use an optical chirp overhead transmission between controllers SDN. This article is devoted to research of a creation opportunity of optical neural switchboards controlled in addition by submitted optical radiation. It is supposed, that the managing radiation changes a parameter of refraction of optical environment of the device, and with it and length of a wave of information radiation. For the control by last is used multibeam interferometer. The brief estimation of technical aspects of construction of the device is carried out. The principle of using the device to an extensive network. Simulation of network performance parameters.

  12. A Ubiquitous Sensor Network Platform for Integrating Smart Devices into the Semantic Sensor Web

    de Vera, David Díaz Pardo; Izquierdo, Álvaro Sigüenza; Vercher, Jesús Bernat; Gómez, Luis Alfonso Hernández

    2014-01-01

    Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN) Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted) information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs. PMID:24945678

  13. Method for determining dynamic short circuit withstand capability of installations in meshed cable MV-networks, during switch on to a fault

    Parabirsing, E.N.; Coster, E.J.; Goerdin, S.A.V.

    2013-01-01

    tedin is the Distribution Grid Operator in the western part of the Netherlands and is known to be a "slim network operator" which means that it is only responsible for managing the gas and electricity networks. In this paper a method will be described with which Stedin proved that the dynamic short

  14. Toward An Unstructured Mesh Database

    Rezaei Mahdiraji, Alireza; Baumann, Peter Peter

    2014-05-01

    Unstructured meshes are used in several application domains such as earth sciences (e.g., seismology), medicine, oceanography, cli- mate modeling, GIS as approximate representations of physical objects. Meshes subdivide a domain into smaller geometric elements (called cells) which are glued together by incidence relationships. The subdivision of a domain allows computational manipulation of complicated physical structures. For instance, seismologists model earthquakes using elastic wave propagation solvers on hexahedral meshes. The hexahedral con- tains several hundred millions of grid points and millions of hexahedral cells. Each vertex node in the hexahedrals stores a multitude of data fields. To run simulation on such meshes, one needs to iterate over all the cells, iterate over incident cells to a given cell, retrieve coordinates of cells, assign data values to cells, etc. Although meshes are used in many application domains, to the best of our knowledge there is no database vendor that support unstructured mesh features. Currently, the main tool for querying and manipulating unstructured meshes are mesh libraries, e.g., CGAL and GRAL. Mesh li- braries are dedicated libraries which includes mesh algorithms and can be run on mesh representations. The libraries do not scale with dataset size, do not have declarative query language, and need deep C++ knowledge for query implementations. Furthermore, due to high coupling between the implementations and input file structure, the implementations are less reusable and costly to maintain. A dedicated mesh database offers the following advantages: 1) declarative querying, 2) ease of maintenance, 3) hiding mesh storage structure from applications, and 4) transparent query optimization. To design a mesh database, the first challenge is to define a suitable generic data model for unstructured meshes. We proposed ImG-Complexes data model as a generic topological mesh data model which extends incidence graph model to multi

  15. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  16. An optimized electronic device for solar power harvesting dedicated to wireless sensor networks

    Le Cam, Vincent; Le Maulf, Regis; Lemarchand, Laurent; Martin, William; Le Pen, Mathieu [LUNAM Univ., Bouguenais (France). IFSTTAR, MACS Dept.

    2012-07-01

    For economics as for practical reasons, this last decade, the use and dissemination of wireless sensor networks (WSN) became obvious; particularly in structural heath monitoring (SHM) use-cases where distances between sensors could be long and access to the structure quite difficult. Even if efforts are leaded to design small components and RF modules that ask for low-power, the need of an external source is often necessary. After have acquired knowledge in solar cells as in batteries technologies and methods to control charge/discharge phases as in optimizing algorithms, IFSTTAR laboratory has designed an electronic device that integrates those progress. This electronic device has a quite generic mission: for a panel of batteries chemistry (Lithium, NiMh) and a panel of solar cells sources (frome mW to some W), the system acts as an improved battery charger whatever the load ask for power. The system applies control algorithms based on battery capacity and chemistry profile. It also applies the MPPT (Maximum Power Point Tracking) algorithm. At any time, battery State Of Charge (SOC) can be requested via I2C bus as well as a warning signal is output when SOC becomes critical. Through standard pin connectors and a simple I2C interface, the system can be used by many wireless devices (sensors) that have to run autonomously. After the presentation of this system, a focus on its application on a real use-case will be given. (orig.)

  17. Innovative, wearable snap connector technology for improved device networking in electronic garments

    Kostrzewski, Andrew A.; Lee, Kang S.; Gans, Eric; Winterhalter, Carole A.; Jannson, Tomasz P.

    2007-04-01

    This paper discusses Physical Optics Corporation's (POC) wearable snap connector technology that provides for the transfer of data and power throughout an electronic garment (e-garment). These connectors resemble a standard garment button and can be mated blindly with only one hand. Fully compatible with military clothing, their application allows for the networking of multiple electronic devices and an intuitive method for adding/removing existing components from the system. The attached flexible cabling also permits the rugged snap connectors to be fed throughout the standard webbing found in military garments permitting placement in any location within the uniform. Variations of the snap electronics/geometry allow for integration with USB 2.0 devices, RF antennas, and are capable of transferring high bandwidth data streams such as the 221 Mbps required for VGA video. With the trend towards providing military officers with numerous electronic devices (i.e., heads up displays (HMD), GPS receiver, PDA, etc), POC's snap connector technology will greatly improve cable management resulting in a less cumbersome uniform. In addition, with electronic garments gaining widespread adoption in the commercial marketplace, POC's technology is finding applications in such areas as sporting good manufacturers and video game technology.

  18. A Software Suite for Testing SpaceWire Devices and Networks

    Mills, Stuart; Parkes, Steve

    2015-09-01

    SpaceWire is a data-handling network for use on-board spacecraft, which connects together instruments, mass-memory, processors, downlink telemetry, and other on-board sub-systems. SpaceWire is simple to implement and has some specific characteristics that help it support data-handling applications in space: high-speed, low-power, simplicity, relatively low implementation cost, and architectural flexibility making it ideal for many space missions. SpaceWire provides high-speed (2 Mbits/s to 200 Mbits/s), bi-directional, full-duplex data-links, which connect together SpaceWire enabled equipment. Data-handling networks can be built to suit particular applications using point-to-point data-links and routing switches. STAR-Dundee’s STAR-System software stack has been designed to meet the needs of engineers designing and developing SpaceWire networks and devices. This paper describes the aims of the software and how those needs were met.

  19. The cell envelope stress response of Bacillus subtilis: from static signaling devices to dynamic regulatory network.

    Radeck, Jara; Fritz, Georg; Mascher, Thorsten

    2017-02-01

    The cell envelope stress response (CESR) encompasses all regulatory events that enable a cell to protect the integrity of its envelope, an essential structure of any bacterial cell. The underlying signaling network is particularly well understood in the Gram-positive model organism Bacillus subtilis. It consists of a number of two-component systems (2CS) and extracytoplasmic function σ factors that together regulate the production of both specific resistance determinants and general mechanisms to protect the envelope against antimicrobial peptides targeting the biogenesis of the cell wall. Here, we summarize the current picture of the B. subtilis CESR network, from the initial identification of the corresponding signaling devices to unraveling their interdependence and the underlying regulatory hierarchy within the network. In the course of detailed mechanistic studies, a number of novel signaling features could be described for the 2CSs involved in mediating CESR. This includes a novel class of so-called intramembrane-sensing histidine kinases (IM-HKs), which-instead of acting as stress sensors themselves-are activated via interprotein signal transfer. Some of these IM-HKs are involved in sensing the flux of antibiotic resistance transporters, a unique mechanism of responding to extracellular antibiotic challenge.

  20. Acceleration of Deep Neural Network Training with Resistive Cross-Point Devices: Design Considerations

    Tayfun Gokmen

    2016-07-01

    Full Text Available In recent years, deep neural networks (DNN have demonstrated significant business impact in large scale analysis and classification tasks such as speech recognition, visual object detection, pattern extraction, etc. Training of large DNNs, however, is universally considered as time consuming and computationally intensive task that demands datacenter-scale computational resources recruited for many days. Here we propose a concept of resistive processing unit (RPU devices that can potentially accelerate DNN training by orders of magnitude while using much less power. The proposed RPU device can store and update the weight values locally thus minimizing data movement during training and allowing to fully exploit the locality and the parallelism of the training algorithm. We evaluate the effect of various RPU device features/non-idealities and system parameters on performance in order to derive the device and system level specifications for implementation of an accelerator chip for DNN training in a realistic CMOS-compatible technology. For large DNNs with about 1 billion weights this massively parallel RPU architecture can achieve acceleration factors of 30,000X compared to state-of-the-art microprocessors while providing power efficiency of 84,000 GigaOps/s/W. Problems that currently require days of training on a datacenter-size cluster with thousands of machines can be addressed within hours on a single RPU accelerator. A system consisting of a cluster of RPU accelerators will be able to tackle Big Data problems with trillions of parameters that is impossible to address today like, for example, natural speech recognition and translation between all world languages, real-time analytics on large streams of business and scientific data, integration and analysis of multimodal sensory data flows from a massive number of IoT (Internet of Things sensors.

  1. Three-terminal ferroelectric synapse device with concurrent learning function for artificial neural networks

    Nishitani, Y.; Kaneko, Y.; Ueda, M.; Fujii, E.; Morie, T.

    2012-01-01

    Spike-timing-dependent synaptic plasticity (STDP) is demonstrated in a synapse device based on a ferroelectric-gate field-effect transistor (FeFET). STDP is a key of the learning functions observed in human brains, where the synaptic weight changes only depending on the spike timing of the pre- and post-neurons. The FeFET is composed of the stacked oxide materials with ZnO/Pr(Zr,Ti)O 3 (PZT)/SrRuO 3 . In the FeFET, the channel conductance can be altered depending on the density of electrons induced by the polarization of PZT film, which can be controlled by applying the gate voltage in a non-volatile manner. Applying a pulse gate voltage enables the multi-valued modulation of the conductance, which is expected to be caused by a change in PZT polarization. This variation depends on the height and the duration of the pulse gate voltage. Utilizing these characteristics, symmetric and asymmetric STDP learning functions are successfully implemented in the FeFET-based synapse device by applying the non-linear pulse gate voltage generated from a set of two pulses in a sampling circuit, in which the two pulses correspond to the spikes from the pre- and post-neurons. The three-terminal structure of the synapse device enables the concurrent learning, in which the weight update can be performed without canceling signal transmission among neurons, while the neural networks using the previously reported two-terminal synapse devices need to stop signal transmission for learning.

  2. Acceleration of Deep Neural Network Training with Resistive Cross-Point Devices: Design Considerations.

    Gokmen, Tayfun; Vlasov, Yurii

    2016-01-01

    In recent years, deep neural networks (DNN) have demonstrated significant business impact in large scale analysis and classification tasks such as speech recognition, visual object detection, pattern extraction, etc. Training of large DNNs, however, is universally considered as time consuming and computationally intensive task that demands datacenter-scale computational resources recruited for many days. Here we propose a concept of resistive processing unit (RPU) devices that can potentially accelerate DNN training by orders of magnitude while using much less power. The proposed RPU device can store and update the weight values locally thus minimizing data movement during training and allowing to fully exploit the locality and the parallelism of the training algorithm. We evaluate the effect of various RPU device features/non-idealities and system parameters on performance in order to derive the device and system level specifications for implementation of an accelerator chip for DNN training in a realistic CMOS-compatible technology. For large DNNs with about 1 billion weights this massively parallel RPU architecture can achieve acceleration factors of 30, 000 × compared to state-of-the-art microprocessors while providing power efficiency of 84, 000 GigaOps∕s∕W. Problems that currently require days of training on a datacenter-size cluster with thousands of machines can be addressed within hours on a single RPU accelerator. A system consisting of a cluster of RPU accelerators will be able to tackle Big Data problems with trillions of parameters that is impossible to address today like, for example, natural speech recognition and translation between all world languages, real-time analytics on large streams of business and scientific data, integration, and analysis of multimodal sensory data flows from a massive number of IoT (Internet of Things) sensors.

  3. SUPERIMPOSED MESH PLOTTING IN MCNP

    J. HENDRICKS

    2001-02-01

    The capability to plot superimposed meshes has been added to MCNP{trademark}. MCNP4C featured a superimposed mesh weight window generator which enabled users to set up geometries without having to subdivide geometric cells for variance reduction. The variance reduction was performed with weight windows on a rectangular or cylindrical mesh superimposed over the physical geometry. Experience with the new capability was favorable but also indicated that a number of enhancements would be very beneficial, particularly a means of visualizing the mesh and its values. The mathematics for plotting the mesh and its values is described here along with a description of other upgrades.

  4. Engineering Silver Nanowire Networks: From Transparent Electrodes to Resistive Switching Devices.

    Du, Haiwei; Wan, Tao; Qu, Bo; Cao, Fuyang; Lin, Qianru; Chen, Nan; Lin, Xi; Chu, Dewei

    2017-06-21

    Metal nanowires (NWs) networks with high conductance have shown potential applications in modern electronic components, especially the transparent electrodes over the past decade. In metal NW networks, the electrical connectivity of nanoscale NW junction can be modulated for various applications. In this work, silver nanowire (Ag NW) networks were selected to achieve the desired functions. The Ag NWs were first synthesized by a classic polyol process, and spin-coated on glass to fabricate transparent electrodes. The as-fabricated electrode showed a sheet resistance of 7.158 Ω □ -1 with an optical transmittance of 79.19% at 550 nm, indicating a comparable figure of merit (FOM, or Φ TC ) (13.55 × 10 -3 Ω -1 ). Then, two different post-treatments were designed to tune the Ag NWs for not only transparent electrode but also for threshold resistive switching (RS) application. On the one hand, the Ag NW film was mechanically pressed to significantly improve the conductance by reducing the junction resistance. On the other hand, an Ag@AgO x core-shell structure was deliberately designed by partial oxidation of Ag NWs through simple ultraviolet (UV)-ozone treatment. The Ag core can act as metallic interconnect and the insulating AgO x shell acts as a switching medium to provide a conductive pathway for Ag filament migration. By fabricating Ag/Ag@AgO x /Ag planar structure, a volatile threshold switching characteristic was observed and an on/off ratio of ∼100 was achieved. This work showed that through different post-treatments, Ag NW network can be engineered for diverse functions, transforming from transparent electrodes to RS devices.

  5. Spiking Neural Networks with Unsupervised Learning Based on STDP Using Resistive Synaptic Devices and Analog CMOS Neuron Circuit.

    Kwon, Min-Woo; Baek, Myung-Hyun; Hwang, Sungmin; Kim, Sungjun; Park, Byung-Gook

    2018-09-01

    We designed the CMOS analog integrate and fire (I&F) neuron circuit can drive resistive synaptic device. The neuron circuit consists of a current mirror for spatial integration, a capacitor for temporal integration, asymmetric negative and positive pulse generation part, a refractory part, and finally a back-propagation pulse generation part for learning of the synaptic devices. The resistive synaptic devices were fabricated using HfOx switching layer by atomic layer deposition (ALD). The resistive synaptic device had gradual set and reset characteristics and the conductance was adjusted by spike-timing-dependent-plasticity (STDP) learning rule. We carried out circuit simulation of synaptic device and CMOS neuron circuit. And we have developed an unsupervised spiking neural networks (SNNs) for 5 × 5 pattern recognition and classification using the neuron circuit and synaptic devices. The hardware-based SNNs can autonomously and efficiently control the weight updates of the synapses between neurons, without the aid of software calculations.

  6. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  7. InP on SOI devices for optical communication and optical network on chip

    Fedeli, J.-M.; Ben Bakir, B.; Olivier, N.; Grosse, Ph.; Grenouillet, L.; Augendre, E.; Phillippe, P.; Gilbert, K.; Bordel, D.; Harduin, J.

    2011-01-01

    For about ten years, we have been developing InP on Si devices under different projects focusing first on μlasers then on semicompact lasers. For aiming the integration on a CMOS circuit and for thermal issue, we relied on SiO2 direct bonding of InP unpatterned materials. After the chemical removal of the InP substrate, the heterostructures lie on top of silicon waveguides of an SOI wafer with a separation of about 100nm. Different lasers or photodetectors have been achieved for off-chip optical communication and for intra-chip optical communication within an optical network. For high performance computing with high speed communication between cores, we developed InP microdisk lasers that are coupled to silicon waveguide and produced 100μW of optical power and that can be directly modulated up to 5G at different wavelengths. The optical network is based on wavelength selective circuits with ring resonators. InGaAs photodetectors are evanescently coupled to the silicon waveguide with an efficiency of 0.8A/W. The fabrication has been demonstrated at 200mm wafer scale in a microelectronics clean room for CMOS compatibility. For off-chip communication, silicon on InP evanescent laser have been realized with an innovative design where the cavity is defined in silicon and the gain localized in the QW of bonded InP hererostructure. The investigated devices operate at continuous wave regime with room temperature threshold current below 100 mA, the side mode suppression ratio is as high as 20dB, and the fibercoupled output power is {7mW. Direct modulation can be achieved with already 6G operation.

  8. Performance Analysis of Dual-Polarized Massive MIMO System with Human-Care IoT Devices for Cellular Networks

    Jun-Ki Hong

    2018-01-01

    Full Text Available The performance analysis of the dual-polarized massive multiple-input multiple-output (MIMO system with Internet of things (IoT devices is studied when outdoor human-care IoT devices are connected to a cellular network via a dual-polarized massive MIMO system. The research background of the performance analysis of dual-polarized massive MIMO system with IoT devices is that recently the data usage of outdoor human-care IoT devices has increased. Therefore, the outdoor human-care IoT devices are necessary to connect with 5G cellular networks which can expect 1000 times higher performance compared with 4G cellular networks. Moreover, in order to guarantee the safety of the patient for emergency cases, a human-care Iot device must be connected to cellular networks which offer more stable communication for outdoors compared to short-range communication technologies such as Wi-Fi, Zigbee, and Bluetooth. To analyze the performance of the dual-polarized massive MIMO system for human-care IoT devices, a dual-polarized MIMO spatial channel model (SCM is proposed which considers depolarization effect between the dual-polarized transmit-antennas and the receive-antennas. The simulation results show that the performance of the dual-polarized massive MIMO system is improved about 16% to 92% for 20 to 150 IoT devices compared to conventional single-polarized massive MIMO system for identical size of the transmit array.

  9. Quantum transport through complex networks - from light-harvesting proteins to semiconductor devices

    Kreisbeck, Christoph

    2012-06-18

    Electron transport through small systems in semiconductor devices plays an essential role for many applications in micro-electronics. One focus of current research lies on establishing conceptually new devices based on ballistic transport in high mobility AlGaAs/AlGa samples. In the ballistic regime, the transport characteristics are determined by coherent interference effects. In order to guide experimentalists to an improved device design, the characterization and understanding of intrinsic device properties is crucial. We develop a time-dependent approach that allows us to simulate experimentally fabricated, complex devicegeometries with an extension of up to a few micrometers. Particularly, we explore the physical origin of unexpected effects that have been detected in recent experiments on transport through Aharonov-Bohm waveguide-interferometers. Such interferometers can be configured as detectors for transfer properties of embedded quantum systems. We demonstrate that a four-terminal waveguide-ring is a suitable setup for measuring the transmission phase of a harmonic quantum dot. Quantum effects are not restricted exclusively to artificial devices but have been found in biological systems as well. Pioneering experiments reveal quantum effects in light-harvesting complexes, the building blocks of photosynthesis. We discuss the Fenna-Matthews-Olson complex, which is a network of coupled bacteriochlorophylls. It acts as an energy wire in the photosynthetic apparatus of green sulfur bacteria. Recent experimental findings suggest that energy transfer takes place in the form of coherent wave-like motion, rather than through classical hopping from one bacteriochlorophyll to the next. However, the question of why and how coherent transfer emerges in light-harvesting complexes is still open. The challenge is to merge seemingly contradictory features that are observed in experiments on two-dimensional spectroscopy into a consistent theory. Here, we provide such a

  10. Modeling of frequency agile devices: development of PKI neuromodeling library based on hierarchical network structure

    Sanchez, P.; Hinojosa, J.; Ruiz, R.

    2005-06-01

    Recently, neuromodeling methods of microwave devices have been developed. These methods are suitable for the model generation of novel devices. They allow fast and accurate simulations and optimizations. However, the development of libraries makes these methods to be a formidable task, since they require massive input-output data provided by an electromagnetic simulator or measurements and repeated artificial neural network (ANN) training. This paper presents a strategy reducing the cost of library development with the advantages of the neuromodeling methods: high accuracy, large range of geometrical and material parameters and reduced CPU time. The library models are developed from a set of base prior knowledge input (PKI) models, which take into account the characteristics common to all the models in the library, and high-level ANNs which give the library model outputs from base PKI models. This technique is illustrated for a microwave multiconductor tunable phase shifter using anisotropic substrates. Closed-form relationships have been developed and are presented in this paper. The results show good agreement with the expected ones.

  11. Comparison of home and away-from-home physical activity using accelerometers and cellular network-based tracking devices.

    Ramulu, Pradeep Y; Chan, Emilie S; Loyd, Tara L; Ferrucci, Luigi; Friedman, David S

    2012-08-01

    Measuring physical at home and away from home is essential for assessing health and well-being, and could help design interventions to increase physical activity. Here, we describe how physical activity at home and away from home can be quantified by combining information from cellular network-based tracking devices and accelerometers. Thirty-five working adults wore a cellular network-based tracking device and an accelerometer for 6 consecutive days and logged their travel away from home. Performance of the tracking device was determined using the travel log for reference. Tracking device and accelerometer data were merged to compare physical activity at home and away from home. The tracking device detected 98.6% of all away-from-home excursions, accurately measured time away from home and demonstrated few prolonged signal drop-out periods. Most physical activity took place away from home on weekdays, but not on weekends. Subjects were more physically active per unit of time while away from home, particularly on weekends. Cellular network-based tracking devices represent an alternative to global positioning systems for tracking location, and provide information easily integrated with accelerometers to determine where physical activity takes place. Promoting greater time spent away from home may increase physical activity.

  12. Development of a prototype solid state fault current limiting and interrupting device for low voltage distribution networks.

    Ahmed, M.; Putrus, G. A.; Ran, L.; Penlington, R.

    2006-01-01

    This paper describes the development of a solid-state Fault Current Limiting and Interrupting Device (FCLID) suitable for low voltage distribution networks. The main components of the FCLID are a bidirectional semiconductor switch that can disrupt the short-circuit current, and a voltage clamping element that helps in controlling the current and absorbing the inductive energy stored in the network during current interruption. Using a hysteresis type control algorithm, the short-circuit curren...

  13. Influence of vascular network design on gas transfer in lung assist device technology.

    Bassett, Erik K; Hoganson, David M; Lo, Justin H; Penson, Elliot J N; Vacanti, Joseph P

    2011-01-01

    Blood oxygenators are vital for the critically ill, but their use is limited to the hospital setting. A portable blood oxygenator or a lung assist device for ambulatory or long-term use would greatly benefit patients with chronic lung disease. In this work, a biomimetic blood oxygenator system was developed which consisted of a microfluidic vascular network covered by a gas permeable silicone membrane. This system was used to determine the influence of key microfluidic parameters-channel size, oxygen exposure length, and blood shear rate-on blood oxygenation and carbon dioxide removal. Total gas transfer increased linearly with flow rate, independent of channel size and oxygen exposure length. On average, CO(2) transfer was 4.3 times higher than oxygen transfer. Blood oxygen saturation was also found to depend on the flow rate per channel but in an inverse manner; oxygenation decreased and approached an asymptote as the flow rate per channel increased. These relationships can be used to optimize future biomimetic vascular networks for specific lung applications: gas transfer for carbon dioxide removal in patients with chronic obstructive pulmonary disease or oxygenation for premature infants requiring complete lung replacement therapy.

  14. Mesh erosion after abdominal sacrocolpopexy.

    Kohli, N; Walsh, P M; Roat, T W; Karram, M M

    1998-12-01

    To report our experience with erosion of permanent suture or mesh material after abdominal sacrocolpopexy. A retrospective chart review was performed to identify patients who underwent sacrocolpopexy by the same surgeon over 8 years. Demographic data, operative notes, hospital records, and office charts were reviewed after sacrocolpopexy. Patients with erosion of either suture or mesh were treated initially with conservative therapy followed by surgical intervention as required. Fifty-seven patients underwent sacrocolpopexy using synthetic mesh during the study period. The mean (range) postoperative follow-up was 19.9 (1.3-50) months. Seven patients (12%) had erosions after abdominal sacrocolpopexy with two suture erosions and five mesh erosions. Patients with suture erosion were asymptomatic compared with patients with mesh erosion, who presented with vaginal bleeding or discharge. The mean (+/-standard deviation) time to erosion was 14.0+/-7.7 (range 4-24) months. Both patients with suture erosion were treated conservatively with estrogen cream. All five patients with mesh erosion required transvaginal removal of the mesh. Mesh erosion can follow abdominal sacrocolpopexy over a long time, and usually presents as vaginal bleeding or discharge. Although patients with suture erosion can be managed successfully with conservative treatment, patients with mesh erosion require surgical intervention. Transvaginal removal of the mesh with vaginal advancement appears to be an effective treatment in patients failing conservative management.

  15. Notes on the Mesh Handler and Mesh Data Conversion

    Lee, Sang Yong; Park, Chan Eok

    2009-01-01

    At the outset of the development of the thermal-hydraulic code (THC), efforts have been made to utilize the recent technology of the computational fluid dynamics. Among many of them, the unstructured mesh approach was adopted to alleviate the restriction of the grid handling system. As a natural consequence, a mesh handler (MH) has been developed to manipulate the complex mesh data from the mesh generator. The mesh generator, Gambit, was chosen at the beginning of the development of the code. But a new mesh generator, Pointwise, was introduced to get more flexible mesh generation capability. An open source code, Paraview, was chosen as a post processor, which can handle unstructured as well as structured mesh data. Overall data processing system for THC is shown in Figure-1. There are various file formats to save the mesh data in the permanent storage media. A couple of dozen of file formats are found even in the above mentioned programs. A competent mesh handler should have the capability to import or export mesh data as many as possible formats. But, in reality, there are two aspects that make it difficult to achieve the competence. The first aspect to consider is the time and efforts to program the interface code. And the second aspect, which is even more difficult one, is the fact that many mesh data file formats are proprietary information. In this paper, some experience of the development of the format conversion programs will be presented. File formats involved are Gambit neutral format, Ansys-CFX grid file format, VTK legacy file format, Nastran format and CGNS

  16. Optimal Throughput and Self-adaptability of Robust Real-Time IEEE 802.15.4 MAC for AMI Mesh Network

    Shabani, Hikma; Ahmed, Musse Mohamud; Khan, Sheroz; Hameed, Shahab Ahmed; Habaebi, Mohamed Hadi

    2013-01-01

    A smart grid refers to a modernization of the electricity system that brings intelligence, reliability, efficiency and optimality to the power grid. To provide an automated and widely distributed energy delivery, the smart grid will be branded by a two-way flow of electricity and information system between energy suppliers and their customers. Thus, the smart grid is a power grid that integrates data communication networks which provide the collected and analysed data at all levels in real time. Therefore, the performance of communication systems is so vital for the success of smart grid. Merit to the ZigBee/IEEE802.15.4std low cost, low power, low data rate, short range, simplicity and free licensed spectrum that makes wireless sensor networks (WSNs) the most suitable wireless technology for smart grid applications. Unfortunately, almost all ZigBee channels overlap with wireless local area network (WLAN) channels, resulting in severe performance degradation due to interference. In order to improve the performance of communication systems, this paper proposes an optimal throughput and self-adaptability of ZigBee/IEEE802.15.4std for smart grid

  17. SPECIFIC FEATURES OF POWER CONSUMPTION OF LED DEVICES AND ACCOUNTING THEM IN CALCULATION OF ELECTRICAL NETWORKS

    V. N. Radkevich

    2016-01-01

    Full Text Available The indicators of power consumption of lighting devices based on LEDs are studied depending on the supplied voltage. For the lamp and floodlight with LEDs active and reactive power, current and power factor as a function of voltage (which value changed in the range 200–245 V were experimentally determined. The analysis of experimental data demonstrated that due to the drivers in the specified voltage range the active power consumed by light devices remains practically unchanged. The reactive power of LED devices depends on the supplied voltage and is capacitive in its nature. In contrast with gas-discharge light sources the LED devices under study do not consume reactive power, but generate it. With the change of the supplied voltage from 200 to 245 V the value of the generated reactive power increases to 60 % for the floodlight and 50 % for the lamp. The LED floodlight has a low coefficient of active power. The current consumed by the floodlight has increased by 22 %, and by the lamp – by 13 %. The formulas for determining the maximum value of the length of the calculated section of single-phase group lines were developed, taking into account specific source data. LED light sources tend to feed by electric power by single-phase group lines. The number of lamps connected to single-phase lines is regulated by normative documents. Bearing this in mind as well as the small power of LED sources single-phase group lines are usually performed with conductors of the smallest possible cross section. The limit values of the length of the calculated section that correspond to a predetermined loss of voltage in line with ambient temperature from 15 to 60 °С were determined for them. The calculations demonstrated that for group lines that feed the LEDs, the choice of conductor cross-sections in accordance with permissible voltage loss is not critical. The determinant factor for the choice of the cross-section of the conductors of group electrical

  18. Streaming simplification of tetrahedral meshes.

    Vo, Huy T; Callahan, Steven P; Lindstrom, Peter; Pascucci, Valerio; Silva, Cláudio T

    2007-01-01

    Unstructured tetrahedral meshes are commonly used in scientific computing to represent scalar, vector, and tensor fields in three dimensions. Visualization of these meshes can be difficult to perform interactively due to their size and complexity. By reducing the size of the data, we can accomplish real-time visualization necessary for scientific analysis. We propose a two-step approach for streaming simplification of large tetrahedral meshes. Our algorithm arranges the data on disk in a streaming, I/O-efficient format that allows coherent access to the tetrahedral cells. A quadric-based simplification is sequentially performed on small portions of the mesh in-core. Our output is a coherent streaming mesh which facilitates future processing. Our technique is fast, produces high quality approximations, and operates out-of-core to process meshes too large for main memory.

  19. Surface meshing with curvature convergence

    Li, Huibin; Zeng, Wei; Morvan, Jean-Marie; Chen, Liming; Gu, Xianfengdavid

    2014-01-01

    Surface meshing plays a fundamental role in graphics and visualization. Many geometric processing tasks involve solving geometric PDEs on meshes. The numerical stability, convergence rates and approximation errors are largely determined by the mesh qualities. In practice, Delaunay refinement algorithms offer satisfactory solutions to high quality mesh generations. The theoretical proofs for volume based and surface based Delaunay refinement algorithms have been established, but those for conformal parameterization based ones remain wide open. This work focuses on the curvature measure convergence for the conformal parameterization based Delaunay refinement algorithms. Given a metric surface, the proposed approach triangulates its conformal uniformization domain by the planar Delaunay refinement algorithms, and produces a high quality mesh. We give explicit estimates for the Hausdorff distance, the normal deviation, and the differences in curvature measures between the surface and the mesh. In contrast to the conventional results based on volumetric Delaunay refinement, our stronger estimates are independent of the mesh structure and directly guarantee the convergence of curvature measures. Meanwhile, our result on Gaussian curvature measure is intrinsic to the Riemannian metric and independent of the embedding. In practice, our meshing algorithm is much easier to implement and much more efficient. The experimental results verified our theoretical results and demonstrated the efficiency of the meshing algorithm. © 2014 IEEE.

  20. Surface meshing with curvature convergence

    Li, Huibin

    2014-06-01

    Surface meshing plays a fundamental role in graphics and visualization. Many geometric processing tasks involve solving geometric PDEs on meshes. The numerical stability, convergence rates and approximation errors are largely determined by the mesh qualities. In practice, Delaunay refinement algorithms offer satisfactory solutions to high quality mesh generations. The theoretical proofs for volume based and surface based Delaunay refinement algorithms have been established, but those for conformal parameterization based ones remain wide open. This work focuses on the curvature measure convergence for the conformal parameterization based Delaunay refinement algorithms. Given a metric surface, the proposed approach triangulates its conformal uniformization domain by the planar Delaunay refinement algorithms, and produces a high quality mesh. We give explicit estimates for the Hausdorff distance, the normal deviation, and the differences in curvature measures between the surface and the mesh. In contrast to the conventional results based on volumetric Delaunay refinement, our stronger estimates are independent of the mesh structure and directly guarantee the convergence of curvature measures. Meanwhile, our result on Gaussian curvature measure is intrinsic to the Riemannian metric and independent of the embedding. In practice, our meshing algorithm is much easier to implement and much more efficient. The experimental results verified our theoretical results and demonstrated the efficiency of the meshing algorithm. © 2014 IEEE.

  1. Molecular basis of human Usher syndrome: deciphering the meshes of the Usher protein network provides insights into the pathomechanisms of the Usher disease.

    Reiners, Jan; Nagel-Wolfrum, Kerstin; Jürgens, Karin; Märker, Tina; Wolfrum, Uwe

    2006-07-01

    Usher syndrome (USH) is the most frequent cause of combined deaf-blindness in man. It is clinically and genetically heterogeneous and at least 12 chromosomal loci are assigned to three clinical USH types, namely USH1A-G, USH2A-C, USH3A (Davenport, S.L.H., Omenn, G.S., 1977. The heterogeneity of Usher syndrome. Vth Int. Conf. Birth Defects, Montreal; Petit, C., 2001. Usher syndrome: from genetics to pathogenesis. Annu. Rev. Genomics Hum. Genet. 2, 271-297). Mutations in USH type 1 genes cause the most severe form of USH. In USH1 patients, congenital deafness is combined with a pre-pubertal onset of retinitis pigmentosa (RP) and severe vestibular dysfunctions. Those with USH2 have moderate to severe congenital hearing loss, non-vestibular dysfunction and a later onset of RP. USH3 is characterized by variable RP and vestibular dysfunction combined with progressive hearing loss. The gene products of eight identified USH genes belong to different protein classes and families. There are five known USH1 molecules: the molecular motor myosin VIIa (USH1B); the two cell-cell adhesion cadherin proteins, cadherin 23 (USH1D) and protocadherin 15, (USH1F) and the scaffold proteins, harmonin (USH1C) and SANS (USH1G). In addition, two USH2 genes and one USH3A gene have been identified. The two USH2 genes code for the transmembrane protein USH2A, also termed USH2A ("usherin") and the G-protein-coupled 7-transmembrane receptor VLGR1b (USH2C), respectively, whereas the USH3A gene encodes clarin-1, a member of the clarin family which exhibits 4-transmembrane domains. Molecular analysis of USH1 protein function revealed that all five USH1 proteins are integrated into a protein network via binding to PDZ domains in the USH1C protein harmonin. Furthermore, this scaffold function of harmonin is supported by the USH1G protein SANS. Recently, we have shown that the USH2 proteins USH2A and VLGR1b as well as the candidate for USH2B, the sodium bicarbonate co-transporter NBC3, are also

  2. User-Adapted Recommendation of Content on Mobile Devices Using Bayesian Networks

    Iwasaki, Hirotoshi; Mizuno, Nobuhiro; Hara, Kousuke; Motomura, Yoichi

    Mobile devices, such as cellular phones and car navigation systems, are essential to daily life. People acquire necessary information and preferred content over communication networks anywhere, anytime. However, usability issues arise from the simplicity of user interfaces themselves. Thus, a recommendation of content that is adapted to a user's preference and situation will help the user select content. In this paper, we describe a method to realize such a system using Bayesian networks. This user-adapted mobile system is based on a user model that provides recommendation of content (i.e., restaurants, shops, and music that are suitable to the user and situation) and that learns incrementally based on accumulated usage history data. However, sufficient samples are not always guaranteed, since a user model would require combined dependency among users, situations, and contents. Therefore, we propose the LK method for modeling, which complements incomplete and insufficient samples using knowledge data, and CPT incremental learning for adaptation based on a small number of samples. In order to evaluate the methods proposed, we applied them to restaurant recommendations made on car navigation systems. The evaluation results confirmed that our model based on the LK method can be expected to provide better generalization performance than that of the conventional method. Furthermore, our system would require much less operation than current car navigation systems from the beginning of use. Our evaluation results also indicate that learning a user's individual preference through CPT incremental learning would be beneficial to many users, even with only a few samples. As a result, we have developed the technology of a system that becomes more adapted to a user the more it is used.

  3. Participative Teaching with Mobile Devices and Social Networks for K-12 Children

    Livia Stefan

    2016-08-01

    Full Text Available This article details a set of participatory pedagogical experiments conducted within a research grant PN II IDEI (”Time Maps. Real communities, virtual worlds, experimented pasts” performed with the purpose of helping rural communities in identifying their cultural heritage andtransmitting it to the younger generations by means of modern IT technologies, including web 2.0. In a Danubian rural community, several points of archaeological interest (POIs were identified, which were then included in a geographic Augmented Reality application for smartphones and tablets. Subsequently, the geographic data were collected from the archaeological site by the K-12 children, under the coordination of an academic staff member of the National University of Arts in Bucharest, and stored on their devices using Google Maps. The augmented information provided onthe site was annotated and shared with other K-12 children, through different social networks sites (SNS and content postings. This first stage experiment was extended to the development of a social learning environment complementary to the educational site (www.timemaps.net to support thetransmission of several traditional technologies (textile, ceramic, glass in a collaborative manner. We consider that our experiments can significantly increase the visibility of the information pertaining to the identity of target places and communities among the younger generation. A mobile-learning paradigm, in combination with web 2.0 technologies, was the support for a distributed and low-cost platform for communication and collaboration. Social networks linked thearchaeological heritage and the academic research with the larger community of rural K-12 children. The article analyzes this platform as a solution for creating, collecting and sharingeducational content, and presents conclusions on using social media for effective blended learning and transmittal of the cultural heritage.

  4. Organizing NPD networks for high innovation performance: the case of Dutch medical devices SMEs

    Pullen, A.J.J.; Groen, Arend J.; de Weerd-Nederhof, Petronella C.; Fisscher, O.A.M.

    2010-01-01

    This research examines which combination of network characteristics (the network configuration) leads to high innovation performance for small and medium sized companies (SMEs). Even though research has paid significant attention to the relation between the external network and the innovation

  5. Ordering schemes for parallel processing of certain mesh problems

    O'Leary, D.

    1984-01-01

    In this work, some ordering schemes for mesh points are presented which enable algorithms such as the Gauss-Seidel or SOR iteration to be performed efficiently for the nine-point operator finite difference method on computers consisting of a two-dimensional grid of processors. Convergence results are presented for the discretization of u /SUB xx/ + u /SUB yy/ on a uniform mesh over a square, showing that the spectral radius of the iteration for these orderings is no worse than that for the standard row by row ordering of mesh points. Further applications of these mesh point orderings to network problems, more general finite difference operators, and picture processing problems are noted

  6. Which hemostatic device in thyroid surgery? A network meta-analysis of surgical technologies.

    Garas, George; Okabayashi, Koji; Ashrafian, Hutan; Shetty, Kunal; Palazzo, Fausto; Tolley, Neil; Darzi, Ara; Athanasiou, Thanos; Zacharakis, Emmanouil

    2013-09-01

    Energy-based hemostatic devices are increasingly being used in thyroid surgery. However, there are several limitations with regard to the existing evidence and a paucity of guidelines on the subject. The goal of this review is to employ the novel evidence synthesis technique of a network meta-analysis to assess the comparative effectiveness of surgical technologies in thyroid surgery and contribute to enhanced governance in the field of thyroid surgery. Articles published between January 2000 and June 2012 were identified from Embase, Medline, Cochrane Library, and PubMed databases. Randomized controlled trials of any size comparing the use of ultrasonic coagulation (harmonic scalpel) or Ligasure either head-to-head or against the "clamp-and-tie" technique were included. Two reviewers independently critically appraised and extracted the data from each study. The number of patients who experienced postoperative events was extracted in dichotomous format or continuous outcomes. Odds ratios were calculated by a Bayesian network meta-analysis, and metaregression was used for pair-wise comparisons. Indirect and direct comparisons were performed and inconsistency was assessed. Thirty-five randomized controlled trials with 2856 patients were included. Ultrasonic coagulation ranked first (followed by Ligasure and then clamp-and-tie) with the lowest risk of postoperative hypoparathyroidism (odds ratio 1.43 [95% confidence interval (CI) 0.77-2.67] and 0.70 [CI 0.43-1.13], ultrasonic coagulation vs. Ligasure and ultrasonic coagulation vs. clamp-and-tie, respectively), least blood loss (-0.25 [CI -0.84 to -0.35] and -1.22 [CI -1.85 to -0.59]), and drain output (0.28 [CI -0.35 to -0.91] and -0.36 [CI -0.70 to -0.03]). From a health technology viewpoint, ultrasonic coagulation was associated with the shortest operative time (-0.66 [CI -1.17 to -0.14] and -1.29 [CI -1.59 to -1.00]) and hospital stay (-0.28 [CI -0.78 to 0.22] and -0.56 [CI -1.28 to 0.15]). The only exception

  7. LOOM-P: a finite element mesh generation program with on-line graphic display

    Ise, Takeharu; Yamazaki, Toshio.

    1977-06-01

    A description of the two-dimensional mesh generation program, LOOM-P, is given in detail. The program is developed newly to produce a mesh network for a reactor core geometry with the help of an automatic mesh generation routine built in it, under the control of the refresh-type graphic display. It is therefore similar to the edit program of the self-organizing mesh generator, QMESH-RENUM. Additional techniques are incorporated to improve the pattern of mesh elements by means of on-line conversational mode. The obtained mesh network is edited out as input data to the three-dimensional neutron diffusion theory code, FEM-BABEL. (auth.)

  8. Improving the network infeed accuracy of non-dispatchable generators with energy storage devices

    Koeppel, Gaudenz; Korpaas, Magnus

    2008-01-01

    The power output of generators based on renewable energy sources is often difficult to predict due to the non-deterministic behaviour of the energy source. Particularly in the case of wind turbines this leads to unpredicted line loading and requires balancing energy, at relatively high costs, depending on market structures. Consequently, the income from the production from such non-dispatchable generators can be significantly reduced by the penalty costs incurred. This paper investigates the potential of operating an energy storage device in parallel with the non-dispatchable generator in order to compensate the inaccuracies of the forecasted infeed and to avoid infeed deviations. A time series based simulation methodology is discussed, suitable for any type of non-dispatchable generator. The methodology contains a procedure for simulating different forecast errors, applying an exponentially weighted moving average approach. Analysis procedures and system performance indices are introduced for the evaluation of the configuration's performance. The applicability is shown in two case studies, using measurement data from a wind turbine and from a photovoltaic system. Both case studies show that the suggested configuration considerably improves the reliability or dependability of the network infeed, in turn reducing the demand for balancing energy and back-up generation. The relation between forecast error magnitude and required energy capacity is identified and the coherence of the time series analysis is discussed. (author)

  9. Structural Engineering of Metal-Mesh Structure Applicable for Transparent Electrodes Fabricated by Self-Formable Cracked Template

    Yeong-gyu Kim

    2017-08-01

    Full Text Available Flexible and transparent conducting electrodes are essential for future electronic devices. In this study, we successfully fabricated a highly-interconnected metal-mesh structure (MMS using a self-formable cracked template. The template—fabricated from colloidal silica—can be easily formed and removed, presenting a simple and cost-effective way to construct a randomly and uniformly networked MMS. The structure of the MMS can be controlled by varying the spin-coating speed during the coating of the template solution or by stacking of metal-mesh layers. Through these techniques, the optical transparency and sheet resistance of the MMS can be designed for a specific purpose. A double-layered Al MMS showed high optical transparency (~80% in the visible region, low sheet resistance (~20 Ω/sq, and good flexibility under bending test compared with a single-layered MMS, because of its highly-interconnected wire structure. Additionally, we identified the applicability of the MMS in the case of practical devices by applying it to electrodes of thin-film transistors (TFTs. The TFTs with MMS electrodes showed comparable electrical characteristics to those with conventional film-type electrodes. The cracked template can be used for the fabrication of a mesh structure consisting of any material, so it can be used for not only transparent electrodes, but also various applications such as solar cells, sensors, etc.

  10. Mobile Device Applications for the Visualization of Functional Connectivity Networks and EEG electrodes: iBraiN and iBraiNEEG.

    Gonzalo Mauricio Rojas

    2016-10-01

    Full Text Available Multiple fMRI-based functional connectivity networks were obtained by Yeo et al., and the visualization of these complex networks is a difficult task. Also, the combination of functional connectivity networks determined by fMRI with EEG data could be a very useful tool. Mobile devices are becoming increasingly common among users, and for this reason, we describe here two applications for Android and iOS mobile devices: one that shows in an interactive way the seven Yeo functional connectivity networks, and another application that shows the relative position of 10-20 EEG electrodes with Yeo’s seven functional connectivity networks.

  11. Mobile Device Applications for the Visualization of Functional Connectivity Networks and EEG Electrodes: iBraiN and iBraiNEEG.

    Rojas, Gonzalo M; Fuentes, Jorge A; Gálvez, Marcelo

    2016-01-01

    Multiple functional MRI (fMRI)-based functional connectivity networks were obtained by Yeo et al. (2011), and the visualization of these complex networks is a difficult task. Also, the combination of functional connectivity networks determined by fMRI with electroencephalography (EEG) data could be a very useful tool. Mobile devices are becoming increasingly common among users, and for this reason, we describe here two applications for Android and iOS mobile devices: one that shows in an interactive way the seven Yeo functional connectivity networks, and another application that shows the relative position of 10-20 EEG electrodes with Yeo's seven functional connectivity networks.

  12. Attacks on the Network Synchronization Systems Counteraction Method Implemented in the Software and Hardware Device «MARSH! 3.0»

    Dmitry Anatolevich Melnikov

    2013-12-01

    Full Text Available This paper proposes attacks on the network synchronization systems counteraction technique, method, algorithm and realizable aspects. The network synchronization systems are included in information technology systems or networks. This method is implemented in software and hardware device (means «MARSH! 3.0» providing trusted session.

  13. PIYAS-Proceeding to Intelligent Service Oriented Memory Allocation for Flash Based Data Centric Sensor Devices in Wireless Sensor Networks

    Sanam Shahla Rizvi

    2009-12-01

    Full Text Available Flash memory has become a more widespread storage medium for modern wireless devices because of its effective characteristics like non-volatility, small size, light weight, fast access speed, shock resistance, high reliability and low power consumption. Sensor nodes are highly resource constrained in terms of limited processing speed, runtime memory, persistent storage, communication bandwidth and finite energy. Therefore, for wireless sensor networks supporting sense, store, merge and send schemes, an efficient and reliable file system is highly required with consideration of sensor node constraints. In this paper, we propose a novel log structured external NAND flash memory based file system, called Proceeding to Intelligent service oriented memorY Allocation for flash based data centric Sensor devices in wireless sensor networks (PIYAS. This is the extended version of our previously proposed PIYA [1]. The main goals of the PIYAS scheme are to achieve instant mounting and reduced SRAM space by keeping memory mapping information to a very low size of and to provide high query response throughput by allocation of memory to the sensor data by network business rules. The scheme intelligently samples and stores the raw data and provides high in-network data availability by keeping the aggregate data for a longer period of time than any other scheme has done before. We propose effective garbage collection and wear-leveling schemes as well. The experimental results show that PIYAS is an optimized memory management scheme allowing high performance for wireless sensor networks.

  14. PIYAS-proceeding to intelligent service oriented memory allocation for flash based data centric sensor devices in wireless sensor networks.

    Rizvi, Sanam Shahla; Chung, Tae-Sun

    2010-01-01

    Flash memory has become a more widespread storage medium for modern wireless devices because of its effective characteristics like non-volatility, small size, light weight, fast access speed, shock resistance, high reliability and low power consumption. Sensor nodes are highly resource constrained in terms of limited processing speed, runtime memory, persistent storage, communication bandwidth and finite energy. Therefore, for wireless sensor networks supporting sense, store, merge and send schemes, an efficient and reliable file system is highly required with consideration of sensor node constraints. In this paper, we propose a novel log structured external NAND flash memory based file system, called Proceeding to Intelligent service oriented memorY Allocation for flash based data centric Sensor devices in wireless sensor networks (PIYAS). This is the extended version of our previously proposed PIYA [1]. The main goals of the PIYAS scheme are to achieve instant mounting and reduced SRAM space by keeping memory mapping information to a very low size of and to provide high query response throughput by allocation of memory to the sensor data by network business rules. The scheme intelligently samples and stores the raw data and provides high in-network data availability by keeping the aggregate data for a longer period of time than any other scheme has done before. We propose effective garbage collection and wear-leveling schemes as well. The experimental results show that PIYAS is an optimized memory management scheme allowing high performance for wireless sensor networks.

  15. Fast pyrolysis in a novel wire-mesh reactor: design and initial results

    Hoekstra, E.; van Swaaij, Willibrordus Petrus Maria; Kersten, Sascha R.A.; Hogendoorn, Kees

    2012-01-01

    Pyrolysis is known to occur by decomposition processes followed by vapour phase reactions. The goal of this research is to develop a novel device to study the initial decomposition processes. For this, a novel wire-mesh reactor was constructed. A small sample (<0.1 g) was clamped between two meshes

  16. Multi-Radio Mobile Device in Role of Hybrid Node Between WiFi and LTE networks

    Pavel Masek

    2015-05-01

    Full Text Available With the ubiquitous wireless network coverage, Machine-Type Communications (MTC is emerging to enable data transfers using devices/sensors without need for human interaction. In this paper we, we introduce a comprehensive simulation scenario for modeling and analysis for heterogeneous MTC. We demonstrate the most expected scenario of MTC communication using the IEEE 802.11 standard for direct communication between sensors and for transmitting data between individual sensor and Machine-Type Communication Gateway (MTCG. The MTCG represents the hybrid node serving as bridge between two heterogeneous networks (WiFi and LTE. Following the idea of hybrid node, two active interfaces must be implemented on this node together with mechanism for handling the incoming traffic (from WiFi network to LTE network. As a simulation tool, the Network Simulator 3 (NS-3 with implemented LTE/EPC Network Simulator (LENA framework was used. The major contribution of this paper therefore lies in the implementation of logic for interconnection of two heterogeneous networks in simulation environment NS-3.

  17. Streaming Compression of Hexahedral Meshes

    Isenburg, M; Courbet, C

    2010-02-03

    We describe a method for streaming compression of hexahedral meshes. Given an interleaved stream of vertices and hexahedral our coder incrementally compresses the mesh in the presented order. Our coder is extremely memory efficient when the input stream documents when vertices are referenced for the last time (i.e. when it contains topological finalization tags). Our coder then continuously releases and reuses data structures that no longer contribute to compressing the remainder of the stream. This means in practice that our coder has only a small fraction of the whole mesh in memory at any time. We can therefore compress very large meshes - even meshes that do not file in memory. Compared to traditional, non-streaming approaches that load the entire mesh and globally reorder it during compression, our algorithm trades a less compact compressed representation for significant gains in speed, memory, and I/O efficiency. For example, on the 456k hexahedra 'blade' mesh, our coder is twice as fast and uses 88 times less memory (only 3.1 MB) with the compressed file increasing about 3% in size. We also present the first scheme for predictive compression of properties associated with hexahedral cells.

  18. Joint Optimized CPU and Networking Control Scheme for Improved Energy Efficiency in Video Streaming on Mobile Devices

    Sung-Woong Jo

    2017-01-01

    Full Text Available Video streaming service is one of the most popular applications for mobile users. However, mobile video streaming services consume a lot of energy, resulting in a reduced battery life. This is a critical problem that results in a degraded user’s quality of experience (QoE. Therefore, in this paper, a joint optimization scheme that controls both the central processing unit (CPU and wireless networking of the video streaming process for improved energy efficiency on mobile devices is proposed. For this purpose, the energy consumption of the network interface and CPU is analyzed, and based on the energy consumption profile a joint optimization problem is formulated to maximize the energy efficiency of the mobile device. The proposed algorithm adaptively adjusts the number of chunks to be downloaded and decoded in each packet. Simulation results show that the proposed algorithm can effectively improve the energy efficiency when compared with the existing algorithms.

  19. Mesh Adaptation and Shape Optimization on Unstructured Meshes, Phase I

    National Aeronautics and Space Administration — In this SBIR CRM proposes to implement the entropy adjoint method for solution adaptive mesh refinement into the Loci/CHEM unstructured flow solver. The scheme will...

  20. Application of Detailed Phase Comparison Protection Models for the Analysis of its Operation in Networks with Facts Devices

    Ruban Nikolay Yu.

    2015-01-01

    Full Text Available The problem of relay protection misoperations in networks with FACTS devices is considered in the paper. It is offered a solution to this problem for a phase comparison protection of transmission power line through the use of its detailed model for the analysis of the functioning for a case of various normal, emergency and post-emergency modes of electric power systems. The research results of this approach are given in the paper.

  1. A microfluidic device for simultaneous measurement of viscosity and flow rate of blood in a complex fluidic network

    Jun Kang, Yang; Yeom, Eunseop; Lee, Sang-Joon

    2013-01-01

    Blood viscosity has been considered as one of important biophysical parameters for effectively monitoring variations in physiological and pathological conditions of circulatory disorders. Standard previous methods make it difficult to evaluate variations of blood viscosity under cardiopulmonary bypass procedures or hemodialysis. In this study, we proposed a unique microfluidic device for simultaneously measuring viscosity and flow rate of whole blood circulating in a complex fluidic network i...

  2. Surface orientation effects on bending properties of surgical mesh are independent of tensile properties.

    Simon, David D; Andrews, Sharon M; Robinson-Zeigler, Rebecca; Valdes, Thelma; Woods, Terry O

    2018-02-01

    Current mechanical testing of surgical mesh focuses primarily on tensile properties even though implanted devices are not subjected to pure tensile loads. Our objective was to determine the flexural (bending) properties of surgical mesh and determine if they correlate with mesh tensile properties. The flexural rigidity values of 11 different surgical mesh designs were determined along three textile directions (machine, cross-machine, and 45° to machine; n = 5 for each) using ASTM D1388-14 while tracking surface orientation. Tensile testing was also performed on the same specimens using ASTM D882-12. Linear regressions were performed to compare mesh flexural rigidity to mesh thickness, areal mass density, filament diameter, ultimate tensile strength, and maximum extension. Of 33 mesh specimen groups, 30 had significant differences in flexural rigidity values when comparing surface orientations (top and bottom). Flexural rigidity and mesh tensile properties also varied with textile direction (machine and cross-machine). There was no strong correlation between the flexural and tensile properties, with mesh thickness having the best overall correlation with flexural rigidity. Currently, surface orientation is not indicated on marketed surgical mesh, and a single mesh may behave differently depending on the direction of loading. The lack of correlation between flexural stiffness and tensile properties indicates the need to examine mesh bending stiffness to provide a more comprehensive understanding of surgical mesh mechanical behaviors. Further investigation is needed to determine if these flexural properties result in the surgical mesh behaving mechanically different depending on implantation direction. © 2017 Wiley Periodicals, Inc. J Biomed Mater Res Part B: Appl Biomater, 106B: 854-862, 2018. © 2017 Wiley Periodicals, Inc.

  3. 3D Mesh Compression and Transmission for Mobile Robotic Applications

    Bailin Yang

    2016-01-01

    Full Text Available Mobile robots are useful for environment exploration and rescue operations. In such applications, it is crucial to accurately analyse and represent an environment, providing appropriate inputs for motion planning in order to support robot navigation and operations. 2D mapping methods are simple but cannot handle multilevel or multistory environments. To address this problem, 3D mapping methods generate structural 3D representations of the robot operating environment and its objects by 3D mesh reconstruction. However, they face the challenge of efficiently transmitting those 3D representations to system modules for 3D mapping, motion planning, and robot operation visualization. This paper proposes a quality-driven mesh compression and transmission method to address this. Our method is efficient, as it compresses a mesh by quantizing its transformed vertices without the need to spend time constructing an a-priori structure over the mesh. A visual distortion function is developed to govern the level of quantization, allowing mesh transmission to be controlled under different network conditions or time constraints. Our experiments demonstrate how the visual quality of a mesh can be manipulated by the visual distortion function.

  4. Identifying the best locations to install flow control devices in sewer networks to enable in-sewer storage

    Leitão, J. P.; Carbajal, J. P.; Rieckermann, J.; Simões, N. E.; Sá Marques, A.; de Sousa, L. M.

    2018-01-01

    The activation of available in-sewer storage volume has been suggested as a low-cost flood and combined sewer overflow mitigation measure. However, it is currently unknown what the attributes for suitable objective functions to identify the best location for flow control devices are and the impact of those attributes on the results. In this study, we present a novel location model and efficient algorithm to identify the best location(s) to install flow limiters. The model is a screening tool that does not require hydraulic simulations but rather considers steady state instead of simplistic static flow conditions. It also maximises in-sewer storage according to different reward functions that also considers the potential impact of flow control device failure. We demonstrate its usefulness on two real sewer networks, for which an in-sewer storage potential of approximately 2,000 m3 and 500 m3 was estimated with five flow control devices installed.

  5. Mersiline mesh in premaxillary augmentation.

    Foda, Hossam M T

    2005-01-01

    Premaxillary retrusion may distort the aesthetic appearance of the columella, lip, and nasal tip. This defect is characteristically seen in, but not limited to, patients with cleft lip nasal deformity. This study investigated 60 patients presenting with premaxillary deficiencies in which Mersiline mesh was used to augment the premaxilla. All the cases had surgery using the external rhinoplasty technique. Two methods of augmentation with Mersiline mesh were used: the Mersiline roll technique, for the cases with central symmetric deficiencies, and the Mersiline packing technique, for the cases with asymmetric deficiencies. Premaxillary augmentation with Mersiline mesh proved to be simple technically, easy to perform, and not associated with any complications. Periodic follow-up evaluation for a mean period of 32 months (range, 12-98 months) showed that an adequate degree of premaxillary augmentation was maintained with no clinically detectable resorption of the mesh implant.

  6. Worlds largest particle physics laboratory selects Proxim Wireless Mesh

    2007-01-01

    "Proxim Wireless has announced that the European Organization for Nuclear Research (CERN), the world's largest particle physics laboratory and the birthplace of the World Wide Web, is using it's ORiNOCO AP-4000 mesh access points to extend the range of the laboratory's Wi-Fi network and to provide continuous monitoring of the lab's calorimeters" (1/2 page)

  7. GENERATION OF IRREGULAR HEXAGONAL MESHES

    Vlasov Aleksandr Nikolaevich

    2012-07-01

    Decomposition is performed in a constructive way and, as option, it involves meshless representation. Further, this mapping method is used to generate the calculation mesh. In this paper, the authors analyze different cases of mapping onto simply connected and bi-connected canonical domains. They represent forward and backward mapping techniques. Their potential application for generation of nonuniform meshes within the framework of the asymptotic homogenization theory is also performed to assess and project effective characteristics of heterogeneous materials (composites.

  8. Field-aligned mesh joinery

    Cignoni, Paolo; Pietroni, Nico; Malomo, Luigi

    2014-01-01

    Mesh joinery is an innovative method to produce illustrative shape approximations suitable for fabrication. Mesh joinery is capable of producing complex fabricable structures in an efficient and visually pleasing manner. We represent an input geometry as a set of planar pieces arranged to compose a rigid structure, by exploiting an efficient slit mechanism. Since slices are planar, to fabricate them a standard 2D cutting system is enough. We automatically arrange slices according to a smooth ...

  9. Dense wavelength division multiplexing devices for metropolitan-area datacom and telecom networks

    DeCusatis, Casimer M.; Priest, David G.

    2000-12-01

    Large data processing environments in use today can require multi-gigabyte or terabyte capacity in the data communication infrastructure; these requirements are being driven by storage area networks with access to petabyte data bases, new architecture for parallel processing which require high bandwidth optical links, and rapidly growing network applications such as electronic commerce over the Internet or virtual private networks. These datacom applications require high availability, fault tolerance, security, and the capacity to recover from any single point of failure without relying on traditional SONET-based networking. These requirements, coupled with fiber exhaust in metropolitan areas, are driving the introduction of dense optical wavelength division multiplexing (DWDM) in data communication systems, particularly for large enterprise servers or mainframes. In this paper, we examine the technical requirements for emerging nextgeneration DWDM systems. Protocols for storage area networks and computer architectures such as Parallel Sysplex are presented, including their fiber bandwidth requirements. We then describe two commercially available DWDM solutions, a first generation 10 channel system and a recently announced next generation 32 channel system. Technical requirements, network management and security, fault tolerant network designs, new network topologies enabled by DWDM, and the role of time division multiplexing in the network are all discussed. Finally, we present a description of testing conducted on these networks and future directions for this technology.

  10. Mesh versus non-mesh repair of ventral abdominal hernias

    Jawaid, M.A.; Talpur, A.H.

    2008-01-01

    To investigate the relative effectiveness of mesh and suture repair of ventral abdominal hernias in terms of clinical outcome, quality of life and rate of recurrence in both the techniques. This is a retrospective descriptive analysis of 236 patients with mesh and non-mesh repair of primary ventral hernias performed between January 2000 to December 2004 at Surgery Department, Liaquat University of Medical and Health Sciences, Jamshoro. The record sheets of the patients were analyzed and data retrieved to compare the results of both techniques for short-term and long-term results. The data retrieved is statistically analyzed on SPSS version 11. There were 43 (18.22%) males and 193 (81.77%) females with a mean age of 51.79 years and a range of 59 (81-22). Para-umbilical hernia was the commonest of ventral hernia and accounted for 49.8% (n=118) of the total study population followed by incisional hernia comprising 24% (n=57) of the total number. There was a significant difference in the recurrent rate at 3 years interval with 23/101 (22.77%) recurrences in suture-repaired subjects compared to 10/135 (7.40%) in mesh repair group. Chronic pain lasting up to 1-2 years was noted in 14 patients with suture repair. Wound infection is comparatively more common (8.14%) in mesh group. The other variables such as operative and postoperative complications, total hospital stay and quality of life is also discussed. Mesh repair of ventral hernia is much superior to non-mesh suture repair in terms of recurrence and overall outcome. (author)

  11. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  12. Sodium aerosol recovering device

    Fujimori, Koji; Ueda, Mitsuo; Tanaka, Kazuhisa.

    1997-01-01

    A main body of a recovering device is disposed in a sodium cooled reactor or a sodium cooled test device. Air containing sodium aerosol is sucked into the main body of the recovering device by a recycling fan and introduced to a multi-staged metal mesh filter portion. The air about against each of the metal mesh filters, and the sodium aerosol in the air is collected. The air having a reduced sodium aerosol concentration circulates passing through a recycling fan and pipelines to form a circulation air streams. Sodium aerosol deposited on each of the metal mesh filters is scraped off periodically by a scraper driving device to prevent clogging of each of the metal filters. (I.N.)

  13. The Role of Vaginal Mesh Procedures in Pelvic Organ Prolapse Surgery in View of Complication Risk

    Ellington, David R.; Richter, Holly E.

    2013-01-01

    Synthetic transvaginal mesh has been employed in the treatment of pelvic organ prolapse for more than a decade. As the use of these devices increased during this period so did adverse event reporting. In 2008, the Food and Drug Administration (FDA) Public Health Notification informed physicians and patients of rising concerns with the use of synthetic transvaginal mesh. Shortly thereafter and in parallel to marked increases in adverse event reporting within the Manufacturer and User Device E...

  14. User Manual for the PROTEUS Mesh Tools

    Smith, Micheal A. [Argonne National Lab. (ANL), Argonne, IL (United States); Shemon, Emily R. [Argonne National Lab. (ANL), Argonne, IL (United States)

    2015-06-01

    This report describes the various mesh tools that are provided with the PROTEUS code giving both descriptions of the input and output. In many cases the examples are provided with a regression test of the mesh tools. The most important mesh tools for any user to consider using are the MT_MeshToMesh.x and the MT_RadialLattice.x codes. The former allows the conversion between most mesh types handled by PROTEUS while the second allows the merging of multiple (assembly) meshes into a radial structured grid. Note that the mesh generation process is recursive in nature and that each input specific for a given mesh tool (such as .axial or .merge) can be used as “mesh” input for any of the mesh tools discussed in this manual.

  15. User Manual for the PROTEUS Mesh Tools

    Smith, Micheal A.; Shemon, Emily R.

    2015-01-01

    This report describes the various mesh tools that are provided with the PROTEUS code giving both descriptions of the input and output. In many cases the examples are provided with a regression test of the mesh tools. The most important mesh tools for any user to consider using are the MT M eshToMesh.x and the MT R adialLattice.x codes. The former allows the conversion between most mesh types handled by PROTEUS while the second allows the merging of multiple (assembly) meshes into a radial structured grid. Note that the mesh generation process is recursive in nature and that each input specific for a given mesh tool (such as .axial or .merge) can be used as ''mesh'' input for any of the mesh tools discussed in this manual.

  16. Cumulus Humilis: Wireless Mesh Networking for Gliders

    Baardman, Roel; Meratnia, Nirvana

    Digital communication between gliders would be beneficial because exchange of information has the potential to provide insight not only to the pilot but also other pilots and people on the ground. However, such a communication does not exist. In this paper we present a solution for the exchange of

  17. Fair packet scheduling in Wireless Mesh Networks

    Nawab, Faisal; Jamshaid, Kamran; Shihada, Basem; Ho, Pin Han

    2014-01-01

    ordering of timestamps among neighboring nodes is sufficient for enforcing local fairness, subsequently leading to flow rate fairness in a multi-hop WMN. We show that TMAC can be implemented using the control frames in IEEE 802.11, and thus can be easily

  18. Continued Development and Implementation of the Universal Network Interface Device (UNID) II, Digital Engineering Laboratory Network (DELNET) Volume 1.

    1984-12-01

    3. It is assuied that the network software design as J,!veloed functions properly. Sum.mary of Current Knowlede [re aost tip to late sumfnary of the...conversations with the program management staff regarding multi-user and multi-level security issues related to the Integrated-Service/Agency Automated

  19. Search for transient ultralight dark matter signatures with networks of precision measurement devices using a Bayesian statistics method

    Roberts, B. M.; Blewitt, G.; Dailey, C.; Derevianko, A.

    2018-04-01

    We analyze the prospects of employing a distributed global network of precision measurement devices as a dark matter and exotic physics observatory. In particular, we consider the atomic clocks of the global positioning system (GPS), consisting of a constellation of 32 medium-Earth orbit satellites equipped with either Cs or Rb microwave clocks and a number of Earth-based receiver stations, some of which employ highly-stable H-maser atomic clocks. High-accuracy timing data is available for almost two decades. By analyzing the satellite and terrestrial atomic clock data, it is possible to search for transient signatures of exotic physics, such as "clumpy" dark matter and dark energy, effectively transforming the GPS constellation into a 50 000 km aperture sensor array. Here we characterize the noise of the GPS satellite atomic clocks, describe the search method based on Bayesian statistics, and test the method using simulated clock data. We present the projected discovery reach using our method, and demonstrate that it can surpass the existing constrains by several order of magnitude for certain models. Our method is not limited in scope to GPS or atomic clock networks, and can also be applied to other networks of precision measurement devices.

  20. In-Line Acoustic Device Inspection of Leakage in Water Distribution Pipes Based on Wavelet and Neural Network

    Dileep Kumar

    2017-01-01

    Full Text Available Traditionally permanent acoustic sensors leak detection techniques have been proven to be very effective in water distribution pipes. However, these methods need long distance deployment and proper position of sensors and cannot be implemented on underground pipelines. An inline-inspection acoustic device is developed which consists of acoustic sensors. The device will travel by the flow of water through the pipes which record all noise events and detect small leaks. However, it records all the noise events regarding background noises, but the time domain noisy acoustic signal cannot manifest complete features such as the leak flow rate which does not distinguish the leak signal and environmental disturbance. This paper presents an algorithm structure with the modularity of wavelet and neural network, which combines the capability of wavelet transform analyzing leakage signals and classification capability of artificial neural networks. This study validates that the time domain is not evident to the complete features regarding noisy leak signals and significance of selection of mother wavelet to extract the noise event features in water distribution pipes. The simulation consequences have shown that an appropriate mother wavelet has been selected and localized to extract the features of the signal with leak noise and background noise, and by neural network implementation, the method improves the classification performance of extracted features.

  1. Research Devices Maintenance Programs and Safety Network Infrastructures in Nuclear Malaysia

    Zainudin Jaafar; Muhammad Zahidee Taat; Ishak Mansor

    2015-01-01

    Instrumentation and Automation Center (PIA) is responsible in carrying out maintenance work for building safety infrastructure and area for nuclear scientific and research work. Care cycle and nuclear scientific tools starting from the preparation of specifications until devices disposal- to get the maximum output from devices therefore PIA has introduced Effective and Comprehensive Maintenance Plan under Management/ Trust/ Development/ Science Fund budgets and also user, Asset Management, caring and handling of the devices. This paper also discussed more on case study related to using and handling so that it can be guidance and standard when its involving mishandling, improper maintenance, inadequacy of supervision and others including improvement suggestion programs. (author)

  2. Datacollection And Fault Tolerant Design Of Iot Devices Over A Distributed Network System

    Bharadwaj Turlapati

    2017-10-01

    Full Text Available In a world where connecting and communicating with devices have never been more in need The Internet of Things thereby has a demanding need for a strategy of a design to ensure the communication between these devices is reliable maintainable and scalable. Having many permutations and combinations of possibilities of devices and solutions offered to world this paper addresses a solution with a working use case to design the system check for reliability throughput maintainability scalability and address the issues in the current system and how this design will help to overcome those issues.

  3. 3D face analysis by using Mesh-LBP feature

    Wang, Haoyu; Yang, Fumeng; Zhang, Yuming; Wu, Congzhong

    2017-11-01

    Objective: Face Recognition is one of the widely application of image processing. Corresponding two-dimensional limitations, such as the pose and illumination changes, to a certain extent restricted its accurate rate and further development. How to overcome the pose and illumination changes and the effects of self-occlusion is the research hotspot and difficulty, also attracting more and more domestic and foreign experts and scholars to study it. 3D face recognition fusing shape and texture descriptors has become a very promising research direction. Method: Our paper presents a 3D point cloud based on mesh local binary pattern grid (Mesh-LBP), then feature extraction for 3D face recognition by fusing shape and texture descriptors. 3D Mesh-LBP not only retains the integrity of the 3D geometry, is also reduces the need for recognition process of normalization steps, because the triangle Mesh-LBP descriptor is calculated on 3D grid. On the other hand, in view of multi-modal consistency in face recognition advantage, construction of LBP can fusing shape and texture information on Triangular Mesh. In this paper, some of the operators used to extract Mesh-LBP, Such as the normal vectors of the triangle each face and vertex, the gaussian curvature, the mean curvature, laplace operator and so on. Conclusion: First, Kinect devices obtain 3D point cloud face, after the pretreatment and normalization, then transform it into triangular grid, grid local binary pattern feature extraction from face key significant parts of face. For each local face, calculate its Mesh-LBP feature with Gaussian curvature, mean curvature laplace operator and so on. Experiments on the our research database, change the method is robust and high recognition accuracy.

  4. Cache-Oblivious Mesh Layouts

    Yoon, S; Lindstrom, P; Pascucci, V; Manocha, D

    2005-01-01

    We present a novel method for computing cache-oblivious layouts of large meshes that improve the performance of interactive visualization and geometric processing algorithms. Given that the mesh is accessed in a reasonably coherent manner, we assume no particular data access patterns or cache parameters of the memory hierarchy involved in the computation. Furthermore, our formulation extends directly to computing layouts of multi-resolution and bounding volume hierarchies of large meshes. We develop a simple and practical cache-oblivious metric for estimating cache misses. Computing a coherent mesh layout is reduced to a combinatorial optimization problem. We designed and implemented an out-of-core multilevel minimization algorithm and tested its performance on unstructured meshes composed of tens to hundreds of millions of triangles. Our layouts can significantly reduce the number of cache misses. We have observed 2-20 times speedups in view-dependent rendering, collision detection, and isocontour extraction without any modification of the algorithms or runtime applications

  5. Connectivity editing for quadrilateral meshes

    Peng, Chihan; Zhang, Eugene; Kobayashi, Yoshihiro; Wonka, Peter

    2011-01-01

    We propose new connectivity editing operations for quadrilateral meshes with the unique ability to explicitly control the location, orientation, type, and number of the irregular vertices (valence not equal to four) in the mesh while preserving sharp edges. We provide theoretical analysis on what editing operations are possible and impossible and introduce three fundamental operations to move and re-orient a pair of irregular vertices. We argue that our editing operations are fundamental, because they only change the quad mesh in the smallest possible region and involve the fewest irregular vertices (i.e., two). The irregular vertex movement operations are supplemented by operations for the splitting, merging, canceling, and aligning of irregular vertices. We explain how the proposed highlevel operations are realized through graph-level editing operations such as quad collapses, edge flips, and edge splits. The utility of these mesh editing operations are demonstrated by improving the connectivity of quad meshes generated from state-of-art quadrangulation techniques. © 2011 ACM.

  6. Connectivity editing for quadrilateral meshes

    Peng, Chihan

    2011-12-12

    We propose new connectivity editing operations for quadrilateral meshes with the unique ability to explicitly control the location, orientation, type, and number of the irregular vertices (valence not equal to four) in the mesh while preserving sharp edges. We provide theoretical analysis on what editing operations are possible and impossible and introduce three fundamental operations to move and re-orient a pair of irregular vertices. We argue that our editing operations are fundamental, because they only change the quad mesh in the smallest possible region and involve the fewest irregular vertices (i.e., two). The irregular vertex movement operations are supplemented by operations for the splitting, merging, canceling, and aligning of irregular vertices. We explain how the proposed highlevel operations are realized through graph-level editing operations such as quad collapses, edge flips, and edge splits. The utility of these mesh editing operations are demonstrated by improving the connectivity of quad meshes generated from state-of-art quadrangulation techniques. © 2011 ACM.

  7. Visual Localisation of Mobile Devices in an Indoor Environment under Network Delay Conditions

    Fernández, Alberto Alonso; Fres, Omar Álvarez; Alonso, Ignacio González; Hu, Huosheng

    2011-01-01

    Current progresses in home automation and service robotic environment have highlighted the need to develop interoperability mechanisms that allow a standard communication between the two systems. During the development of the DHCompliant protocol, the problem of locating mobile devices in an indoor environment has been investigated. The communication of the device with the location service has been carried out to study the time delay that web services offer in front of the sockets. The import...

  8. Temporal sequence learning in winner-take-all networks of spiking neurons demonstrated in a brain-based device.

    McKinstry, Jeffrey L; Edelman, Gerald M

    2013-01-01

    Animal behavior often involves a temporally ordered sequence of actions learned from experience. Here we describe simulations of interconnected networks of spiking neurons that learn to generate patterns of activity in correct temporal order. The simulation consists of large-scale networks of thousands of excitatory and inhibitory neurons that exhibit short-term synaptic plasticity and spike-timing dependent synaptic plasticity. The neural architecture within each area is arranged to evoke winner-take-all (WTA) patterns of neural activity that persist for tens of milliseconds. In order to generate and switch between consecutive firing patterns in correct temporal order, a reentrant exchange of signals between these areas was necessary. To demonstrate the capacity of this arrangement, we used the simulation to train a brain-based device responding to visual input by autonomously generating temporal sequences of motor actions.

  9. Analysis of Heat Transfer in Power Split Device for Hybrid Electric Vehicle Using Thermal Network Method

    Jixin Wang

    2014-06-01

    Full Text Available This paper presents a rational prediction of temperature field on the differential hybrid system (DHS based on the thermal network method (TNM. The whole thermal network model is built by considering both the contact thermal resistance between gasket and planet gear and the temperature effect on the physical property parameters of lubricant. The contact thermal resistance is obtained by using the concept of contact branch thermal resistance and G-W elastic model. By building an elaborate thermal network model and computing models for power losses and thermal resistances between components, the whole temperature field of DHS under typical operating condition is predicted. Results show that thermal network method can be effectively used to predict the temperature distribution and the rule of temperature variation, the surface roughness significantly affects contact thermal conduction, and the decrease in the thermal resistance of the natural convection between air and DHS housing can effectively improve the thermal environment of DHS.

  10. Synthesis and characterization of p and n dopable interpenetrating polymer networks for organic photovoltaic devices

    Lav, T.X.; Tran-Van, F.; Vidal, F.; Peralta, S.; Chevrot, C.; Teyssie, D.; Grazulevicius, J.V.; Getautis, V.; Derbal, H.; Nunzi, J.-M.

    2008-01-01

    Interpenetrating polymer networks (IPN) based on carbazole derivatives and diacrylate perylene are synthesized in two steps via an in-situ process. From a spin-coated thin film of a mixture of the two precursors, the diacrylate perylene is first photopolymerized to form a network in the presence of the carbazole derivative which is then electropolymerized to elaborate the IPN. Electrochemical characterizations show that the carbazole and perylene are electroactive inside the film which confirm the p and n dopable properties of the IPN. AFM images of the IPNs show a homogenous and smooth surface, compared to single network, which indicate a high quality of association of each network which should allow an efficient p/n bulk heterojunction

  11. Synthesis and characterization of p and n dopable interpenetrating polymer networks for organic photovoltaic devices

    Lav, T.X. [Laboratoire de Physicochimie des Polymeres et des Interfaces, EA 2528 Universite de Cergy-Pontoise, 5 mail Gay-Lussac, 95031 Cergy-Pontoise Cedex (France); Tran-Van, F. [Laboratoire de Physicochimie des Polymeres et des Interfaces, EA 2528 Universite de Cergy-Pontoise, 5 mail Gay-Lussac, 95031 Cergy-Pontoise Cedex (France)], E-mail: francois.tran-van@u-cergy.fr; Vidal, F.; Peralta, S.; Chevrot, C.; Teyssie, D. [Laboratoire de Physicochimie des Polymeres et des Interfaces, EA 2528 Universite de Cergy-Pontoise, 5 mail Gay-Lussac, 95031 Cergy-Pontoise Cedex (France); Grazulevicius, J.V.; Getautis, V. [Faculty of Chemical Technology, Kaunas University of Technology, Radvilenu Plentas 19, LT 50254 (Lithuania); Derbal, H.; Nunzi, J.-M. [PPF Cellules Solaires Photovoltaiques Plastiques - Laboratoire POMA, UMR-CNRS 6136, Universite d' Angers, 2 bd Lavoisier, 49045 Angers (France)

    2008-08-30

    Interpenetrating polymer networks (IPN) based on carbazole derivatives and diacrylate perylene are synthesized in two steps via an in-situ process. From a spin-coated thin film of a mixture of the two precursors, the diacrylate perylene is first photopolymerized to form a network in the presence of the carbazole derivative which is then electropolymerized to elaborate the IPN. Electrochemical characterizations show that the carbazole and perylene are electroactive inside the film which confirm the p and n dopable properties of the IPN. AFM images of the IPNs show a homogenous and smooth surface, compared to single network, which indicate a high quality of association of each network which should allow an efficient p/n bulk heterojunction.

  12. Impact of stand-by energy losses in electronic devices on smart network performance

    Mandić-Lukić Jasmina S.; Pantović Vladan S.; Vasiljević Željko S.

    2012-01-01

    Limited energy resources and environmental concerns due to ever increasing energy consumption, more and more emphasis is being put on energy savings. Smart networks are promoted worldwide as a powerful tool used to improve the energy efficiency through consumption management, as well as to enable the distributed power generation, primarily based on renewable energy sources, to be optimally explored. To make it possible for the smart networks to function, a large number of electronic dev...

  13. Mesh Nanoelectronics: Seamless Integration of Electronics with Tissues.

    Dai, Xiaochuan; Hong, Guosong; Gao, Teng; Lieber, Charles M

    2018-02-20

    Nanobioelectronics represents a rapidly developing field with broad-ranging opportunities in fundamental biological sciences, biotechnology, and medicine. Despite this potential, seamless integration of electronics has been difficult due to fundamental mismatches, including size and mechanical properties, between the elements of the electronic and living biological systems. In this Account, we discuss the concept, development, key demonstrations, and future opportunities of mesh nanoelectronics as a general paradigm for seamless integration of electronics within synthetic tissues and live animals. We first describe the design and realization of hybrid synthetic tissues that are innervated in three dimensions (3D) with mesh nanoelectronics where the mesh serves as both as a tissue scaffold and as a platform of addressable electronic devices for monitoring and manipulating tissue behavior. Specific examples of tissue/nanoelectronic mesh hybrids highlighted include 3D neural tissue, cardiac patches, and vascular constructs, where the nanoelectronic devices have been used to carry out real-time 3D recording of electrophysiological and chemical signals in the tissues. This novel platform was also exploited for time-dependent 3D spatiotemporal mapping of cardiac tissue action potentials during cell culture and tissue maturation as well as in response to injection of pharmacological agents. The extension to simultaneous real-time monitoring and active control of tissue behavior is further discussed for multifunctional mesh nanoelectronics incorporating both recording and stimulation devices, providing the unique capability of bidirectional interfaces to cardiac tissue. In the case of live animals, new challenges must be addressed, including minimally invasive implantation, absence of deleterious chronic tissue response, and long-term capability for monitoring and modulating tissue activity. We discuss each of these topics in the context of implantation of mesh

  14. New IEEE 11073 Standards for interoperable, networked Point-of-Care Medical Devices.

    Kasparick, Martin; Schlichting, Stefan; Golatowski, Frank; Timmermann, Dirk

    2015-08-01

    Surgical procedures become more and more complex and the number of medical devices in an operating room (OR) increases continuously. Today's vendor-dependent solutions for integrated ORs are not able to handle this complexity. They can only form isolated solutions. Furthermore, high costs are a result of vendor-dependent approaches. Thus we present a service-oriented device communication for distributed medical systems that enables the integration and interconnection between medical devices among each other and to (medical) information systems, including plug-and-play functionality. This system will improve patient's safety by making technical complexity of a comprehensive integration manageable. It will be available as open standards that are part of the IEEE 11073 family of standards. The solution consists of a service-oriented communication technology, the so called Medical Devices Profile for Web Services (MDPWS), a Domain Information & Service Model, and a binding between the first two mechanisms. A proof of this concept has been done with demonstrators of real world OR devices.

  15. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  16. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  17. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  18. Label swapper device for spectral amplitude coded optical packet networks monolithically integrated on InP.

    Muñoz, P; García-Olcina, R; Habib, C; Chen, L R; Leijtens, X J M; de Vries, T; Robbins, D; Capmany, J

    2011-07-04

    In this paper the design, fabrication and experimental characterization of an spectral amplitude coded (SAC) optical label swapper monolithically integrated on Indium Phosphide (InP) is presented. The device has a footprint of 4.8x1.5 mm2 and is able to perform label swapping operations required in SAC at a speed of 155 Mbps. The device was manufactured in InP using a multiple purpose generic integration scheme. Compared to previous SAC label swapper demonstrations, using discrete component assembly, this label swapper chip operates two order of magnitudes faster.

  19. Automatic Defect Detection of Fasteners on the Catenary Support Device Using Deep Convolutional Neural Network

    Chen, Junwen; Liu, Zhigang; Wang, H.; Nunez Vicencio, Alfredo; Han, Zhiwei

    2018-01-01

    The excitation and vibration triggered by the long-term operation of railway vehicles inevitably result in defective states of catenary support devices. With the massive construction of high-speed electrified railways, automatic defect detection of diverse and plentiful fasteners on the catenary

  20. Label swapper device for spectral amplitude coded optical packet networks monolithically integrated on InP

    Muñoz, P.; García-Olcina, R.; Habib, C.; Chen, L.R.; Leijtens, X.J.M.; Vries, de T.; Robbins, D.J.; Capmany, J.

    2011-01-01

    In this paper the design, fabrication and experimental characterization of an spectral amplitude coded (SAC) optical label swapper monolithically integrated on Indium Phosphide (InP) is presented. The device has a footprint of 4.8x1.5 mm2 and is able to perform label swapping operations required in

  1. Prediction of Operating Characteristics of Electrotechnical Devices using Artificial Neural Networks

    PASCA Alexandra

    2014-05-01

    Full Text Available The paper purpose is to emphasize the possibilities and the advantages to use the artificial intelligence techniques for operating mode prediction of electrotechnical devices. The considered application consists of the analysis of behavior of an inductive proximity sensor at variation of design parameters.

  2. Mobile Device Management in the DOD Enterprise Network: Factors for Risk Management, Integration, and It Acquisition

    2013-03-01

    Administration NFC Near Field Communications NIST National Institute of Standards and Technology NPRST Navy Personnel Research, Studies, and Technology ...information technology (IT) system acquisition process to acquire a mobile device management (MDM) toolset to mitigate information assurance (IA) risks...method study to understand the concerns of federal information technology professionals who are knowledgeable on MDM and the acquisition

  3. Reducing Communication Overhead by Scheduling TCP Transfers on Mobile Devices using Wireless Network Performance Maps

    Højgaard-Hansen, Kim; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2012-01-01

    The performance of wireless communication networks has been shown to have a strong location dependence. Measuring the performance while having accurate location information available makes it possible to generate performance maps. In this paper we propose a framework for the generation and use...... of such performance maps. We demonstrate how the framework can be used to reduce the retransmissions and to better utilise network resources when performing TCP-based file downloads in vehicular M2M communication scenarios. The approach works on top of a standard TCP stack hence has to map identified transmission...

  4. Multigrid for refined triangle meshes

    Shapira, Yair

    1997-02-01

    A two-level preconditioning method for the solution of (locally) refined finite element schemes using triangle meshes is introduced. In the isotropic SPD case, it is shown that the condition number of the preconditioned stiffness matrix is bounded uniformly for all sufficiently regular triangulations. This is also verified numerically for an isotropic diffusion problem with highly discontinuous coefficients.

  5. A microfluidic device for simultaneous measurement of viscosity and flow rate of blood in a complex fluidic network.

    Jun Kang, Yang; Yeom, Eunseop; Lee, Sang-Joon

    2013-01-01

    Blood viscosity has been considered as one of important biophysical parameters for effectively monitoring variations in physiological and pathological conditions of circulatory disorders. Standard previous methods make it difficult to evaluate variations of blood viscosity under cardiopulmonary bypass procedures or hemodialysis. In this study, we proposed a unique microfluidic device for simultaneously measuring viscosity and flow rate of whole blood circulating in a complex fluidic network including a rat, a reservoir, a pinch valve, and a peristaltic pump. To demonstrate the proposed method, a twin-shaped microfluidic device, which is composed of two half-circular chambers, two side channels with multiple indicating channels, and one bridge channel, was carefully designed. Based on the microfluidic device, three sequential flow controls were applied to identify viscosity and flow rate of blood, with label-free and sensorless detection. The half-circular chamber was employed to achieve mechanical membrane compliance for flow stabilization in the microfluidic device. To quantify the effect of flow stabilization on flow fluctuations, a formula of pulsation index (PI) was analytically derived using a discrete fluidic circuit model. Using the PI formula, the time constant contributed by the half-circular chamber is estimated to be 8 s. Furthermore, flow fluctuations resulting from the peristaltic pumps are completely removed, especially under periodic flow conditions within short periods (T viscosity with respect to varying flow rate conditions [(a) known blood flow rate via a syringe pump, (b) unknown blood flow rate via a peristaltic pump]. As a result, the flow rate and viscosity of blood can be simultaneously measured with satisfactory accuracy. In addition, the proposed method was successfully applied to identify the viscosity of rat blood, which circulates in a complex fluidic network. These observations confirm that the proposed method can be used for

  6. Resterilized Polypropylene Mesh for Inguinal Hernia Repair

    2018-04-19

    Apr 19, 2018 ... Conclusion: The use of sterilized polypropylene mesh for the repair of inguinal ... and nonabsorbable materials to reduce the tissue–mesh. INTRODUCTION ... which we have been practicing in our center since we introduced ...

  7. Comparison of the efficacy and safety of thrombectomy devices in acute stroke : a network meta-analysis of randomized trials.

    Saber, Hamidreza; Rajah, Gary B; Kherallah, Riyad Y; Jadhav, Ashutosh P; Narayanan, Sandra

    2017-12-15

    Mechanical thrombectomy (MT) is increasingly used for large-vessel occlusions (LVO), but randomized clinical trial (RCT) level data with regard to differences in clinical outcomes of MT devices are limited. We conducted a network meta-analysis (NMA) that enables comparison of modern MT devices (Trevo, Solitaire, Aspiration) and strategies (stent retriever vs aspiration) across trials. Relevant RCTs were identified by a systematic review. The efficacy outcome was 90-day functional independence (modified Rankin Scale (mRS) score 0-2). Safety outcomes were 90-day catastrophic outcome (mRS 5-6) and symptomatic intracranial hemorrhage (sICH). Fixed-effect Bayesian NMA was performed to calculate risk estimates and the rank probabilities. In a NMA of six relevant RCTs (SWIFT, TREVO2, EXTEND-IA, SWIFT-PRIME, REVASCAT, THERAPY; total of 871 patients, 472 Solitaire vs medical-only, 108 Aspiration vs medical-only, 178 Trevo vs Merci, and 113 Solitaire vs Merci) with medical-only arm as the reference, Trevo had the greatest functional independence (OR 4.14, 95% credible interval (CrI) 1.41-11.80; top rank probability 92%) followed by Solitaire (OR 2.55, 95% CrI 1.75-3.74; top rank probability 72%). Solitaire and Aspiration devices had the greatest top rank probability with respect to low sICH and catastrophic outcomes (76% and 91%, respectively), but without significant differences between each other. In a separate network of seven RCTs (MR-CLEAN, ESCAPE, EXTEND-IA, SWIFT-PRIME, REVASCAT, THERAPY, ASTER; 1737 patients), first-line stent retriever was associated with a higher top rank probability of functional independence than aspiration (95% vs 54%), with comparable safety outcomes. These findings suggest that Trevo and Solitaire devices are associated with a greater likelihood of functional independence whereas Solitaire and Aspiration devices appear to be safer. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights

  8. Advancing medical device innovation through collaboration and coordination of structured data capture pilots: Report from the Medical Device Epidemiology Network (MDEpiNet) Specific, Measurable, Achievable, Results-Oriented, Time Bound (SMART) Think Tank.

    Reed, Terrie L; Drozda, Joseph P; Baskin, Kevin M; Tcheng, James; Conway, Karen; Wilson, Natalia; Marinac-Dabic, Danica; Heise, Theodore; Krucoff, Mitchell W

    2017-12-01

    The Medical Device Epidemiology Network (MDEpiNet) is a public private partnership (PPP) that provides a platform for collaboration on medical device evaluation and depth of expertise for supporting pilots to capture, exchange and use device information for improving device safety and protecting public health. The MDEpiNet SMART Think Tank, held in February, 2013, sought to engage expert stakeholders who were committed to improving the capture of device data, including Unique Device Identification (UDI), in key electronic health information. Prior to the Think Tank there was limited collaboration among stakeholders beyond a few single health care organizations engaged in electronic capture and exchange of device data. The Think Tank resulted in what has become two sustainable multi-stakeholder device data capture initiatives, BUILD and VANGUARD. These initiatives continue to mature within the MDEpiNet PPP structure and are well aligned with the goals outlined in recent FDA-initiated National Medical Device Planning Board and Medical Device Registry Task Force white papers as well as the vision for the National Evaluation System for health Technology.%. Published by Elsevier Inc.

  9. Integrated approach for fusion multi-physics coupled analyses based on hybrid CAD and mesh geometries

    Qiu, Yuefeng, E-mail: yuefeng.qiu@kit.edu; Lu, Lei; Fischer, Ulrich

    2015-10-15

    Highlights: • Integrated approach for neutronics, thermal and structural analyses was developed. • MCNP5/6, TRIPOLI-4 were coupled with CFX, Fluent and ANSYS Workbench. • A novel meshing approach has been proposed for describing MC geometry. - Abstract: Coupled multi-physics analyses on fusion reactor devices require high-fidelity neutronic models, and flexible, accurate data exchanging between various calculation codes. An integrated coupling approach has been developed to enable the conversion of CAD, mesh, or hybrid geometries for Monte Carlo (MC) codes MCNP5/6, TRIPOLI-4, and translation of nuclear heating data for CFD codes Fluent, CFX and structural mechanical software ANSYS Workbench. The coupling approach has been implemented based on SALOME platform with CAD modeling, mesh generation and data visualization capabilities. A novel meshing approach has been developed for generating suitable meshes for MC geometry descriptions. The coupling approach has been concluded to be reliable and efficient after verification calculations of several application cases.

  10. Soft hydrogels interpenetrating silicone – a polymer network for drug releasing medical devices

    Steffensen, Søren Langer; Merete H., Vestergaard,; Møller, Eva Horn

    2016-01-01

    such a sophisticated material by forming an interpenetrating polymer network (IPN) material through modification of silicone elastomers with a poly(2-hydroxyethyl methacrylate) (PHEMA)-based hydrogel. IPN materials with a PHEMA content in the range of 13%–38% (w/w) were synthesized by using carbon dioxide...

  11. Danger of Prolific Cybercrime and Network DDOS from Unprotected IoT Devices

    internet, the internet of things pumping all of the big data, all of the, enable all types of the security framework that you can use the big data, leveraging the AI based approach, fully leveraging that vulnerability detection like the use case we mentioned earlier or to protect the whole traffic and network so

  12. Multiobjective planning of distribution networks incorporating switches and protective devices using a memetic optimization

    Pombo, A. Vieira; Murta-Pina, João; Pires, V. Fernão

    2015-01-01

    A multi-objective planning approach for the reliability of electric distribution networks using a memetic optimization is presented. In this reliability optimization, the type of the equipment (switches or reclosers) and their location are optimized. The multiple objectives considered to find the optimal values for these planning variables are the minimization of the total equipment cost and at the same time the minimization of two distribution network reliability indexes. The reliability indexes are the system average interruption frequency index (SAIFI) and system average interruption duration index (SAIDI). To solve this problem a memetic evolutionary algorithm is proposed, which combines the Non-Dominated Sorting Genetic Algorithm II (NSGA-II) with a local search algorithm. The obtained Pareto-optimal front contains solutions of different trade-offs with respect to the three objectives. A real distribution network is used to test the proposed algorithm. The obtained results show that this approach allows the utility to obtain the optimal type and location of the equipments to achieve the best reliability with the lower cost. - Highlights: • Reliability indexes SAIFI and SAIDI and Equipment Cost are optimized. • Optimization of equipment type, number and location on a MV network. • Memetic evolutionary algorithm with a local search algorithm is proposed. • Pareto optimal front solutions with respect to the three objective functions

  13. Ion track based tunable device as humidity sensor: a neural network approach

    Sharma, Mamta; Sharma, Anuradha; Bhattacherjee, Vandana

    2013-01-01

    Artificial Neural Network (ANN) has been applied in statistical model development, adaptive control system, pattern recognition in data mining, and decision making under uncertainty. The nonlinear dependence of any sensor output on the input physical variable has been the motivation for many researchers to attempt unconventional modeling techniques such as neural networks and other machine learning approaches. Artificial neural network (ANN) is a computational tool inspired by the network of neurons in biological nervous system. It is a network consisting of arrays of artificial neurons linked together with different weights of connection. The states of the neurons as well as the weights of connections among them evolve according to certain learning rules.. In the present work we focus on the category of sensors which respond to electrical property changes such as impedance or capacitance. Recently, sensor materials have been embedded in etched tracks due to their nanometric dimensions and high aspect ratio which give high surface area available for exposure to sensing material. Various materials can be used for this purpose to probe physical (light intensity, temperature etc.), chemical (humidity, ammonia gas, alcohol etc.) or biological (germs, hormones etc.) parameters. The present work involves the application of TEMPOS structures as humidity sensors. The sample to be studied was prepared using the polymer electrolyte (PEO/NH4ClO4) with CdS nano-particles dispersed in the polymer electrolyte. In the present research we have attempted to correlate the combined effects of voltage and frequency on impedance of humidity sensors using a neural network model and results have indicated that the mean absolute error of the ANN Model for the training data was 3.95% while for the validation data it was 4.65%. The corresponding values for the LR model were 8.28% and 8.35% respectively. It was also demonstrated the percentage improvement of the ANN Model with respect to the

  14. 6th International Meshing Roundtable '97

    White, D.

    1997-09-01

    The goal of the 6th International Meshing Roundtable is to bring together researchers and developers from industry, academia, and government labs in a stimulating, open environment for the exchange of technical information related to the meshing process. In the pas~ the Roundtable has enjoyed significant participation born each of these groups from a wide variety of countries. The Roundtable will consist of technical presentations from contributed papers and abstracts, two invited speakers, and two invited panels of experts discussing topics related to the development and use of automatic mesh generation tools. In addition, this year we will feature a "Bring Your Best Mesh" competition and poster session to encourage discussion and participation from a wide variety of mesh generation tool users. The schedule and evening social events are designed to provide numerous opportunities for informal dialog. A proceedings will be published by Sandia National Laboratories and distributed at the Roundtable. In addition, papers of exceptionally high quaIity will be submitted to a special issue of the International Journal of Computational Geometry and Applications. Papers and one page abstracts were sought that present original results on the meshing process. Potential topics include but are got limited to: Unstructured triangular and tetrahedral mesh generation Unstructured quadrilateral and hexahedral mesh generation Automated blocking and structured mesh generation Mixed element meshing Surface mesh generation Geometry decomposition and clean-up techniques Geometry modification techniques related to meshing Adaptive mesh refinement and mesh quality control Mesh visualization Special purpose meshing algorithms for particular applications Theoretical or novel ideas with practical potential Technical presentations from industrial researchers.

  15. Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks

    Blerim Rexha

    2018-02-01

    Full Text Available Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the promising biometrics-based user authentication mechanisms that has been widely available in this era of mobile computing. With a built-in camera capability on smartphones, tablets, and laptops, face authentication provides an attractive alternative of legacy passwords for its memory-less authentication process, which is so sophisticated that it can unlock the device faster than a fingerprint. Nevertheless, face authentication in the context of smartphones has proven to be vulnerable to attacks. In most current implementations, a sufficiently high-resolution face image displayed on another mobile device will be enough to circumvent security measures and bypass the authentication process. In order to prevent such bypass attacks, gesture recognition together with location is proposed to be additionally modeled. Gestures provide a faster and more convenient method of authentication compared to a complex password. The focus of this paper is to build a secure authentication system with face, location and gesture recognition as components. User gestures and location data are a sequence of time series; therefore, in this paper we propose to use unsupervised learning in the long short-term memory recurrent neural network to actively learn to recognize, group and discriminate user gestures and location. Moreover, a clustering-based technique is also implemented for recognizing gestures and location.

  16. User Manual for the PROTEUS Mesh Tools

    Smith, Micheal A. [Argonne National Lab. (ANL), Argonne, IL (United States); Shemon, Emily R [Argonne National Lab. (ANL), Argonne, IL (United States)

    2016-09-19

    PROTEUS is built around a finite element representation of the geometry for visualization. In addition, the PROTEUS-SN solver was built to solve the even-parity transport equation on a finite element mesh provided as input. Similarly, PROTEUS-MOC and PROTEUS-NEMO were built to apply the method of characteristics on unstructured finite element meshes. Given the complexity of real world problems, experience has shown that using commercial mesh generator to create rather simple input geometries is overly complex and slow. As a consequence, significant effort has been put into place to create multiple codes that help assist in the mesh generation and manipulation. There are three input means to create a mesh in PROTEUS: UFMESH, GRID, and NEMESH. At present, the UFMESH is a simple way to generate two-dimensional Cartesian and hexagonal fuel assembly geometries. The UFmesh input allows for simple assembly mesh generation while the GRID input allows the generation of Cartesian, hexagonal, and regular triangular structured grid geometry options. The NEMESH is a way for the user to create their own mesh or convert another mesh file format into a PROTEUS input format. Given that one has an input mesh format acceptable for PROTEUS, we have constructed several tools which allow further mesh and geometry construction (i.e. mesh extrusion and merging). This report describes the various mesh tools that are provided with the PROTEUS code giving both descriptions of the input and output. In many cases the examples are provided with a regression test of the mesh tools. The most important mesh tools for any user to consider using are the MT_MeshToMesh.x and the MT_RadialLattice.x codes. The former allows the conversion between most mesh types handled by PROTEUS while the second allows the merging of multiple (assembly) meshes into a radial structured grid. Note that the mesh generation process is recursive in nature and that each input specific for a given mesh tool (such as .axial

  17. Optimal sizing and location of SVC devices for improvement of voltage profile in distribution network with dispersed photovoltaic and wind power plants

    Savić, Aleksandar; Đurišić, Željko

    2014-01-01

    Highlights: • Significant voltage variations in a distribution network with dispersed generation. • The use of SVC devices to improve the voltage profiles are an effective solution. • Number, size and location of SVC devices are optimized using genetic algorithm. • The methodology is presented on an example of a real distribution system in Serbia. - Abstract: Intermittent power generation of wind turbines and photovoltaic plants creates voltage disturbances in power distribution networks which may not be acceptable to the consumers. To control the deviations of the nodal voltages, it is necessary to use fast dynamic control of the reactive power in the distribution network. Implementation of the power electronic devices, such as Static Var Compensator (SVC), enables effective dynamic state as well as a static state of the nodal voltage control in the distribution network. This paper analyzed optimal sizing and location of SVC devices by using genetic algorithm, to improve nodal voltages profile in a distribution network with dispersed photovoltaic and wind power plants. Practical application of the developed methodology was tested on an example of a real distribution network

  18. Monitor Network Traffic with Packet Capture (pcap) on an Android Device

    2015-09-01

    administrative privileges . Under the current design Android development requirement, an Android Graphical User Interface (GUI) application cannot directly...build an Android application to monitor network traffic using open source packet capture (pcap) libraries. 15. SUBJECT TERMS ELIDe, Android , pcap 16...Building Application with Native Codes 5 8.1 Calling Native Codes Using JNI 5 8.2 Calling Native Codes from an Android Application 8 9. Retrieve Live

  19. Application of Artificial Neural Networks in Modeling Direction Wheelchairs Using Neurosky Mindset Mobile (EEG Device

    Agus Siswoyo

    2017-07-01

    Full Text Available The implementation of Artificial Neural Network in prediction the direction of electric wheelchair from brain signal input for physical mobility impairment.. The control of the wheelchair as an effort in improving disabled person life quality. The interaction from disabled person is helping in relation to social life with others. Because of the mobility impairment, the wheelchair with brain signal input is made. This wheel chair is purposed to help the disabled person and elderly for their daily activity. ANN helps to develop the mapping from input to target. ANN is developed in 3 level: input level, one hidden level, and output level (6-2-1. There are 6 signal from Neurosky Mindset sensor output, Alpha1, Alpha2, Raw signal, Total time signal, Attention Signal, and Meditation signal. The purpose of this research is to find out the output value from ANN: value in turning right, turning left, and forward. From those outputs, we can prove the relevance to the target. One of the main problem that interfering with success is the problem of proper neural network training. Arduino uno is chosen to implement the learning program algorithm because it is a popular microcontroller that is economic and efficient. The training of artificial neural network in this research uses 21 data package from raw data, Alpha1, Aplha2, Meditation data, Attention data, total time data. At the time of the test there is a value of Mean square Error(MSE at the end of training amounted to 0.92495 at epoch 9958, value a correlation coefficient of 0.92804 shows that accuracy the results of the training process good.     Keywords: Navigation, Neural network, Real-time training, Arduino

  20. International Conference on VLSI, Communication, Advanced Devices, Signals & Systems and Networking

    Shirur, Yasha; Prasad, Rekha

    2013-01-01

    This book is a collection of papers presented by renowned researchers, keynote speakers and academicians in the International Conference on VLSI, Communication, Analog Designs, Signals and Systems, and Networking (VCASAN-2013), organized by B.N.M. Institute of Technology, Bangalore, India during July 17-19, 2013. The book provides global trends in cutting-edge technologies in electronics and communication engineering. The content of the book is useful to engineers, researchers and academicians as well as industry professionals.

  1. Mesh complications in female pelvic floor reconstructive surgery and their management: A systematic review

    Hemendra N Shah

    2012-01-01

    Full Text Available We reviewed the incidence, predisposing factors, presentation and management of complications related to the use of synthetic mesh in the management of stress urinary incontinence and pelvic organ prolapse repair. Immediate complications, such as bleeding, hematoma, injury to adjacent organs during placement of mesh and complication of voiding dysfunction are not discussed in this review, since they are primarily related to technique. A PubMed search of related articles published in English was done from April 2008 to March 2011. Key words used were urinary incontinence, mesh, complications, midurethral sling, anterior prolapse, anterior vaginal repair, pelvic organ prolapse, transvaginal mesh, vault prolapse, midurethral slings, female stress urinary incontinence, mesh erosion, vaginal mesh complications, and posterior vaginal wall prolapse. Since there were very few articles dealing with the management of mesh-related complications in the period covered in the search we extended the search from January 2005 onwards. Articles were selected to fit the scope of the topic. In addition, landmark publications and Manufacturer and User Facility Device Experience (MAUDE data (FDA website were included on the present topic. A total of 170 articles were identified. The use of synthetic mesh in sub-urethral sling procedures is now considered the standard for the surgical management of stress urinary incontinence. Synthetic mesh is being increasingly used in the management of pelvic organ prolapse. While the incidence of extrusion and erosion with mid-urethral sling is low, the extrusion rate in prolapse repair is somewhat higher and the use in posterior compartment remains controversial. When used through the abdominal approach the extrusion and erosion rates are lower. The management of mesh complication is an individualized approach. The choice of the technique should be based on the type of mesh complication, location of the extrusion and/or erosion

  2. Mesh complications in female pelvic floor reconstructive surgery and their management: A systematic review

    Shah, Hemendra N.; Badlani, Gopal H.

    2012-01-01

    We reviewed the incidence, predisposing factors, presentation and management of complications related to the use of synthetic mesh in the management of stress urinary incontinence and pelvic organ prolapse repair. Immediate complications, such as bleeding, hematoma, injury to adjacent organs during placement of mesh and complication of voiding dysfunction are not discussed in this review, since they are primarily related to technique. A PubMed search of related articles published in English was done from April 2008 to March 2011. Key words used were urinary incontinence, mesh, complications, midurethral sling, anterior prolapse, anterior vaginal repair, pelvic organ prolapse, transvaginal mesh, vault prolapse, midurethral slings, female stress urinary incontinence, mesh erosion, vaginal mesh complications, and posterior vaginal wall prolapse. Since there were very few articles dealing with the management of mesh-related complications in the period covered in the search we extended the search from January 2005 onwards. Articles were selected to fit the scope of the topic. In addition, landmark publications and Manufacturer and User Facility Device Experience (MAUDE) data (FDA website) were included on the present topic. A total of 170 articles were identified. The use of synthetic mesh in sub-urethral sling procedures is now considered the standard for the surgical management of stress urinary incontinence. Synthetic mesh is being increasingly used in the management of pelvic organ prolapse. While the incidence of extrusion and erosion with mid-urethral sling is low, the extrusion rate in prolapse repair is somewhat higher and the use in posterior compartment remains controversial. When used through the abdominal approach the extrusion and erosion rates are lower. The management of mesh complication is an individualized approach. The choice of the technique should be based on the type of mesh complication, location of the extrusion and/or erosion, its magnitude

  3. Critical Under-Reporting of Hernia Mesh Properties and Development of a Novel Package Label.

    Kahan, Lindsey G; Blatnik, Jeffrey A

    2018-02-01

    With an array of hernia meshes with varying properties, intraoperative decision making for the optimal mesh is critical. Although meshes are subjected to regulatory review through the Food and Drug Administration, it is unknown whether mesh properties are visually accessible. To facilitate greater knowledge for the surgeon on mesh choice, we aimed to comprehensively analyze hernia mesh packaging and regulations. Labeling guidelines and 510(k) requirements across Food and Drug Administration-regulated products were analyzed and compared with mesh packaging. Packages and Instructions for Use were analyzed for commonly available hernia meshes. Literature review was conducted to understand recommended guidelines for mesh products. A novel hernia mesh packaging label was designed to rectify under-reporting. We found that food labels undergo critical scrutiny and detailed specifications, yet medical devices are not subjected to similar guidelines. The highest reported property on packages was the presence of a barrier (80%), and the lowest reported property was barrier composition (33%). For Instructions for Use, the lowest reported properties were mechanics (31%) and thickness (11%), both of which were not reported on packaging. Descriptive terms for pore size and mechanics were reported inconsistently. To overcome this under-reporting of properties, we propose a novel packaging label with properties chosen from regulatory guidelines, packaging analysis, and literature review. Although standardized terminology has been proposed in literature, property knowledge has not adequately permeated surgery, industry, or regulatory guidelines. There is extreme under-reporting and lack of consistency of clinically important mesh properties. Standardized packaging labels will provide accessibility of these properties and aim to bring standardized terminology into practice. With an increase in access to important properties, this can facilitate intraoperative decision making on a

  4. Communication Software Performance for Linux Clusters with Mesh Connections

    Jie Chen; William Watson

    2003-09-01

    Recent progress in copper based commodity Gigabit Ethernet interconnects enables constructing clusters to achieve extremely high I/O bandwidth at low cost with mesh connections. However, the TCP/IP protocol stack cannot match the improved performance of Gigabit Ethernet networks especially in the case of multiple interconnects on a single host. In this paper, we evaluate and compare the performance characteristics of TCP/IP and M-VIA software that is an implementation of VIA.In particular, we focus on the performance of the software systems for a mesh communication architecture and demonstrate the feasibility of using multiple Gigabit Ethernet cards on one host to achieve aggregated bandwidth and latency that are not only better than what TCP provides but also compare favorably to some of the special purpose high-speed networks. In addition, implementation of a new M-VIA driver for one type of Gigabit Ethernet card will be discussed.

  5. Laparoscopy-like operative vaginoscopy: a new approach to manage mesh erosions.

    Billone, Valentina; Amorim-Costa, Célia; Campos, Sara; Rabischong, Benoĭt; Bourdel, Nicolas; Canis, Michel; Botchorishvili, Revaz

    2015-01-01

    Mesh erosion through the vagina is the most common complication of synthetic mesh used for pelvic organ prolapse repair. However, conventional transvaginal mesh excision has many technical limitations. We aimed at creating and describing a new surgical technique for transvaginal removal of exposed mesh that would enable better exposition and access, thus facilitating optimal treatment. A step-by-step video showing the technique. A university tertiary care hospital. Five patients previously submitted to pelvic organ prolapse repair using synthetic mesh, presenting mesh erosion through the vagina. Mesh excision using a laparoscopy-like operative vaginoscopy in which standard laparoscopic instruments are used through a single-incision laparoscopic surgery port device placed in the vagina. In all cases, a very good exposure of the mesh was achieved, a minimal tissue traction was required, and the procedures were performed in a very ergonomic way. All the patients were discharged on the same day of the surgery and had a painless postoperative course. So far, there have been no cases of relapse. This seems to be a simple, cheap, and valuable minimally invasive technique with many advantages in comparison with the conventional approach. More cases and time are necessary to access its long-term efficacy. It may possibly be used for the management of other conditions. Copyright © 2015 AAGL. Published by Elsevier Inc. All rights reserved.

  6. Design of personal positioning for coal mine based on mesh

    Gao, W.H.; Ma, J.; Kang, L. [Taiyuan University of Science and Technology, Taiyuan (China). College of Electronic Information and Engineering

    2008-07-01

    This paper puts forward a method for a location system for colliery workers based on wireless mesh network combined with zigbee technology which supports IEEE 802.15.4 wireless communication standard, with low power dissipation. Data receipt and transmission by wireless communication is realized by RF chip MC13192 produced by the Freescale company. Data procession and analysis is achieved by an S3C2410A chip manufactured by Sumsung which belongs to the ARM9 16/32 RISC processor.

  7. Voltammetry at micro-mesh electrodes

    Wadhawan Jay D.

    2003-01-01

    Full Text Available The voltammetry at three micro-mesh electrodes is explored. It is found that at sufficiently short experimental durations, the micro-mesh working electrode first behaves as an ensemble of microband electrodes, then follows the behaviour anticipated for an array of diffusion-independent micro-ring electrodes of the same perimeter as individual grid-squares within the mesh. During prolonged electrolysis, the micro-mesh electrode follows that behaviour anticipated theoretically for a cubically-packed partially-blocked electrode. Application of the micro-mesh electrode for the electrochemical determination of carbon dioxide in DMSO electrolyte solutions is further illustrated.

  8. 22nd International Meshing Roundtable

    Staten, Matthew

    2014-01-01

    This volume contains the articles presented at the 22nd International Meshing Roundtable (IMR) organized, in part, by Sandia National Laboratories and was held on Oct 13-16, 2013 in Orlando, Florida, USA.  The first IMR was held in 1992, and the conference series has been held annually since.  Each year the IMR brings together researchers, developers, and application experts in a variety of disciplines, from all over the world, to present and discuss ideas on mesh generation and related topics.  The technical papers in this volume present theoretical and novel ideas and algorithms with practical potential, as well as technical applications in science and engineering, geometric modeling, computer graphics and visualization.

  9. 21st International Meshing Roundtable

    Weill, Jean-Christophe

    2013-01-01

    This volume contains the articles presented at the 21st International Meshing Roundtable (IMR) organized, in part, by Sandia National Laboratories and was held on October 7–10, 2012 in San Jose, CA, USA. The first IMR was held in 1992, and the conference series has been held annually since. Each year the IMR brings together researchers, developers, and application experts in a variety of disciplines, from all over the world, to present and discuss ideas on mesh generation and related topics. The technical papers in this volume present theoretical and novel ideas and algorithms with practical potential, as well as technical applications in science and engineering, geometric modeling, computer graphics, and visualization.

  10. Adaptive Mesh Refinement in CTH

    Crawford, David

    1999-01-01

    This paper reports progress on implementing a new capability of adaptive mesh refinement into the Eulerian multimaterial shock- physics code CTH. The adaptivity is block-based with refinement and unrefinement occurring in an isotropic 2:1 manner. The code is designed to run on serial, multiprocessor and massive parallel platforms. An approximate factor of three in memory and performance improvements over comparable resolution non-adaptive calculations has-been demonstrated for a number of problems

  11. Mobile device geo-localization and object visualization in sensor networks

    Lemaire, Simon; Bodensteiner, Christoph; Arens, Michael

    2014-10-01

    In this paper we present a method to visualize geo-referenced objects on modern smartphones using a multi- functional application design. The application applies different localization and visualization methods including the smartphone camera image. The presented application copes well with different scenarios. A generic application work flow and augmented reality visualization techniques are described. The feasibility of the approach is experimentally validated using an online desktop selection application in a network with a modern of-the-shelf smartphone. Applications are widespread and include for instance crisis and disaster management or military applications.

  12. Facile Preparation of Carbon-Nanotube-based 3-Dimensional Transparent Conducting Networks for Flexible Noncontact Sensing Device

    Tai, Yanlong

    2016-04-12

    Here, we report the controllable fabrication of transparent conductive films (TCFs) for moisture-sensing applications based on heating-rate-triggered, 3-dimensional porous conducting networks of single-walled carbon nanotube (SWCNT)/poly(3,4-ethylenedioxythiophene)-polystyrene sulfonate (PEDOT:PSS). How baking conditions influence the self-assembled microstructure of the TCFs is discussed. The sensor presents high-performance properties, including a reasonable sheet resistance (2.1 kohm/sq), a high visible-range transmittance (> 69 %, PET = 90 %), and good stability when subjected to cyclic loading (> 1000 cycles, better than indium tin oxide film) during processing. Moreover, the benefits of these kinds of TCFs were verified through a fully transparent, highly sensitive, rapid response, noncontact moisture-sensing device (5×5 sensing pixels).

  13. Proposal for the award of a blanket order contract for the supply of microprocessor-based protection and control devices for the CERN HV distribution network

    2004-01-01

    This document concerns the award of a blanket contract for the supply of microprocessor-based protection and control devices for the CERN HV distribution network. The Finance Committee is invited to agree to the negotiation of a blanket order contract with SCHNEIDER ELECTRIC (PT), the lowest technically acceptable bidder after realignment, for the supply of microprocessor-based protection and control devices for the CERN HV distribution network for a total amount of 1 900 000 euros (2 924 128 Swiss francs), subject to revision for inflation after 1 January 2007. The rate of exchange used is that stipulated in the tender

  14. Analysis of achievable capacity in irregularly-placed high performance mesh nodes

    Olwal, TO

    2012-09-01

    Full Text Available -directional antenna for backhaul mesh connectivity and access. The third radio interface card is attached to a 2.4 GHz omni-directional antenna for mesh client access network. As shown in Figure 2, the HPN block diagram has a weather proof Unshielded Twisted Pair... by an embedded microcontroller technology [11]. To ensure high speed performance, the innovation has the first radio interface card attached to a 5 GHz directional antenna for backhaul mesh routing; the second interface card is connected to a 5 GHz omni...

  15. Improvement of voltage stability in wind farm connection to distribution network using FACTS devices

    Salehi, V.; Kahrobaee, S.; Afsharnia, S. [School of Electrical and Computer Engineering, ECE, University of Tehran (Iran)

    2006-07-01

    Increasing capacity of connected wind power generation to utilities brings new opportunities and also problems to the utilities and customers. Evolution and analyzing of the connection conditions and effects of wind farms especially on remote areas are the main aspects of developing wind power on the utilities. The problem is that these wind turbine that mostly uses induction generators, tend to drain large amounts of VARs from the grid, potentially causing low voltage and maybe voltage stability problems for the utility owner, especially in the case of large load variation on distribution feeder. To investigate the impact of large wind farms on power system voltage stability, one of the Iran's wind farms is modeled in DIgSILENT software and the simulation results shows the effect of using FACTS devices including SVC and STATCOM on power system performance. (orig.)

  16. Wearable Device-Based Gait Recognition Using Angle Embedded Gait Dynamic Images and a Convolutional Neural Network.

    Zhao, Yongjia; Zhou, Suiping

    2017-02-28

    The widespread installation of inertial sensors in smartphones and other wearable devices provides a valuable opportunity to identify people by analyzing their gait patterns, for either cooperative or non-cooperative circumstances. However, it is still a challenging task to reliably extract discriminative features for gait recognition with noisy and complex data sequences collected from casually worn wearable devices like smartphones. To cope with this problem, we propose a novel image-based gait recognition approach using the Convolutional Neural Network (CNN) without the need to manually extract discriminative features. The CNN's input image, which is encoded straightforwardly from the inertial sensor data sequences, is called Angle Embedded Gait Dynamic Image (AE-GDI). AE-GDI is a new two-dimensional representation of gait dynamics, which is invariant to rotation and translation. The performance of the proposed approach in gait authentication and gait labeling is evaluated using two datasets: (1) the McGill University dataset, which is collected under realistic conditions; and (2) the Osaka University dataset with the largest number of subjects. Experimental results show that the proposed approach achieves competitive recognition accuracy over existing approaches and provides an effective parametric solution for identification among a large number of subjects by gait patterns.

  17. Virtual reality interface devices in the reorganization of neural networks in the brain of patients with neurological diseases

    Gatica-Rojas, Valeska; Méndez-Rebolledo, Guillermo

    2014-01-01

    Two key characteristics of all virtual reality applications are interaction and immersion. Systemic interaction is achieved through a variety of multisensory channels (hearing, sight, touch, and smell), permitting the user to interact with the virtual world in real time. Immersion is the degree to which a person can feel wrapped in the virtual world through a defined interface. Virtual reality interface devices such as the Nintendo® Wii and its peripheral nunchuks-balance board, head mounted displays and joystick allow interaction and immersion in unreal environments created from computer software. Virtual environments are highly interactive, generating great activation of visual, vestibular and proprioceptive systems during the execution of a video game. In addition, they are entertaining and safe for the user. Recently, incorporating therapeutic purposes in virtual reality interface devices has allowed them to be used for the rehabilitation of neurological patients, e.g., balance training in older adults and dynamic stability in healthy participants. The improvements observed in neurological diseases (chronic stroke and cerebral palsy) have been shown by changes in the reorganization of neural networks in patients’ brain, along with better hand function and other skills, contributing to their quality of life. The data generated by such studies could substantially contribute to physical rehabilitation strategies. PMID:25206907

  18. Power-Management Techniques for Wireless Sensor Networks and Similar Low-Power Communication Devices Based on Nonrechargeable Batteries

    Agnelo Silva

    2012-01-01

    Full Text Available Despite the well-known advantages of communication solutions based on energy harvesting, there are scenarios where the absence of batteries (supercapacitor only or the use of rechargeable batteries is not a realistic option. Therefore, the alternative is to extend as much as possible the lifetime of primary cells (nonrechargeable batteries. By assuming low duty-cycle applications, three power-management techniques are combined in a novel way to provide an efficient energy solution for wireless sensor networks nodes or similar communication devices powered by primary cells. Accordingly, a customized node is designed and long-term experiments in laboratory and outdoors are realized. Simulated and empirical results show that the battery lifetime can be drastically enhanced. However, two trade-offs are identified: a significant increase of both data latency and hardware/software complexity. Unattended nodes deployed in outdoors under extreme temperatures, buried sensors (underground communication, and nodes embedded in the structure of buildings, bridges, and roads are some of the target scenarios for this work. Part of the provided guidelines can be used to extend the battery lifetime of communication devices in general.

  19. Wearable Device-Based Gait Recognition Using Angle Embedded Gait Dynamic Images and a Convolutional Neural Network

    Zhao, Yongjia; Zhou, Suiping

    2017-01-01

    The widespread installation of inertial sensors in smartphones and other wearable devices provides a valuable opportunity to identify people by analyzing their gait patterns, for either cooperative or non-cooperative circumstances. However, it is still a challenging task to reliably extract discriminative features for gait recognition with noisy and complex data sequences collected from casually worn wearable devices like smartphones. To cope with this problem, we propose a novel image-based gait recognition approach using the Convolutional Neural Network (CNN) without the need to manually extract discriminative features. The CNN’s input image, which is encoded straightforwardly from the inertial sensor data sequences, is called Angle Embedded Gait Dynamic Image (AE-GDI). AE-GDI is a new two-dimensional representation of gait dynamics, which is invariant to rotation and translation. The performance of the proposed approach in gait authentication and gait labeling is evaluated using two datasets: (1) the McGill University dataset, which is collected under realistic conditions; and (2) the Osaka University dataset with the largest number of subjects. Experimental results show that the proposed approach achieves competitive recognition accuracy over existing approaches and provides an effective parametric solution for identification among a large number of subjects by gait patterns. PMID:28264503

  20. Virtual reality interface devices in the reorganization of neural networks in the brain of patients with neurological diseases.

    Gatica-Rojas, Valeska; Méndez-Rebolledo, Guillermo

    2014-04-15

    Two key characteristics of all virtual reality applications are interaction and immersion. Systemic interaction is achieved through a variety of multisensory channels (hearing, sight, touch, and smell), permitting the user to interact with the virtual world in real time. Immersion is the degree to which a person can feel wrapped in the virtual world through a defined interface. Virtual reality interface devices such as the Nintendo® Wii and its peripheral nunchuks-balance board, head mounted displays and joystick allow interaction and immersion in unreal environments created from computer software. Virtual environments are highly interactive, generating great activation of visual, vestibular and proprioceptive systems during the execution of a video game. In addition, they are entertaining and safe for the user. Recently, incorporating therapeutic purposes in virtual reality interface devices has allowed them to be used for the rehabilitation of neurological patients, e.g., balance training in older adults and dynamic stability in healthy participants. The improvements observed in neurological diseases (chronic stroke and cerebral palsy) have been shown by changes in the reorganization of neural networks in patients' brain, along with better hand function and other skills, contributing to their quality of life. The data generated by such studies could substantially contribute to physical rehabilitation strategies.

  1. Comparison of the Bronchodilative Effects of Salbutamol Delivered via Three Mesh Nebulizers in Children with Bronchial Asthma

    Fumitake Kurosaka

    2009-01-01

    Conclusions: Overall, all 3 mesh nebulizers were useful devices in treating bronchial asthma, although some differences in lung function improvement were evident. The limitation of this study is that subjects did not include patients with severe asthma attacks.

  2. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified. PMID:26393617

  3. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Lusheng Wang

    2015-09-01

    Full Text Available With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI. In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG, forming a congestion game with ICI (CGI and a congestion game with capacity (CGC. For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE. Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell is profoundly revealed, and the collapse points are identified.

  4. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things.

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-09-18

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified.

  5. Orientation of a 3D object: implementation with an artificial neural network using a programmable logic device

    Carnevale, Federico J.

    2010-01-01

    Complex information extraction from images is a key skill of intelligent machines, with wide application in automated systems, robotic manipulation and human-computer interaction. However, solving this problem with traditional, geometric or analytical, strategies is extremely difficult. Therefore, an approach based on learning from examples seems to be more appropriate. This thesis addresses the problem of 3D orientation, aiming to estimate the angular coordinates of a known object from an image shot from any direction. We describe a system based on artificial neural networks to solve this problem in real time. The implementation is performed using a programmable logic device. The digital system described in this paper has the ability to estimate two rotational coordinates of a 3D known object, in ranges from -80 0 to 80 0 . The operation speed allows a real time performance at video rate. The system accuracy can be successively increased by increasing the size of the artificial neural network and using a larger number of training examples [es

  6. Reference Architecture for Multi-Layer Software Defined Optical Data Center Networks

    Casimer DeCusatis

    2015-09-01

    Full Text Available As cloud computing data centers grow larger and networking devices proliferate; many complex issues arise in the network management architecture. We propose a framework for multi-layer; multi-vendor optical network management using open standards-based software defined networking (SDN. Experimental results are demonstrated in a test bed consisting of three data centers interconnected by a 125 km metropolitan area network; running OpenStack with KVM and VMW are components. Use cases include inter-data center connectivity via a packet-optical metropolitan area network; intra-data center connectivity using an optical mesh network; and SDN coordination of networking equipment within and between multiple data centers. We create and demonstrate original software to implement virtual network slicing and affinity policy-as-a-service offerings. Enhancements to synchronous storage backup; cloud exchanges; and Fibre Channel over Ethernet topologies are also discussed.

  7. Laparoscopic appendicectomy for suspected mesh-induced appendicitis after laparoscopic transabdominal preperitoneal polypropylene mesh inguinal herniorraphy

    Jennings Jason

    2010-01-01

    Full Text Available Laparoscopic inguinal herniorraphy via a transabdominal preperitoneal (TAPP approach using Polypropylene Mesh (Mesh and staples is an accepted technique. Mesh induces a localised inflammatory response that may extend to, and involve, adjacent abdominal and pelvic viscera such as the appendix. We present an interesting case of suspected Mesh-induced appendicitis treated successfully with laparoscopic appendicectomy, without Mesh removal, in an elderly gentleman who presented with symptoms and signs of acute appendicitis 18 months after laparoscopic inguinal hernia repair. Possible mechanisms for Mesh-induced appendicitis are briefly discussed.

  8. Textile properties of synthetic prolapse mesh in response to uniaxial loading

    Barone, William R.; Moalli, Pamela A.; Abramowitch, Steven D.

    2016-01-01

    BACKGROUND Although synthetic mesh is associated with superior anatomic outcomes for the repair of pelvic organ prolapse, the benefits of mesh have been questioned because of the relatively high complication rates. To date, the mechanisms that result in such complications are poorly understood, yet the textile characteristics of mesh products are believed to play an important role. Interestingly, the pore diameter of synthetic mesh has been shown to impact the host response after hernia repair greatly, and such findings have served as design criteria for prolapse meshes, with larger pores viewed as more favorable. Although pore size and porosity are well-characterized before implantation, the changes in these textile properties after implantation are unclear; the application of mechanical forces has the potential to greatly alter pore geometries in vivo. Understanding the impact of mechanical loading on the textile properties of mesh is essential for the development of more effective devices for prolapse repair. OBJECTIVE The objective of this study was to determine the effect of tensile loading and pore orientation on mesh porosity and pore dimensions. STUDY DESIGN In this study, the porosity and pore diameter of 4 currently available prolapse meshes were examined in response to uniaxial tensile loads of 0.1, 5, and 10 N while mimicking clinical loading conditions. The textile properties were compared with those observed for the unloaded mesh. Meshes included Gynemesh PS (Ethicon, Somerville, NJ), UltraPro (Artisyn; Ethicon), Restorelle (Coloplast, Minneapolis, MN), and Alyte Y-mesh (Bard, Covington, GA). In addition to the various pore geometries, 3 orientations of Restorelle (0-, 5-, 45-degree offset) and 2 orientations of UltraPro (0-, 90-degree offset) were examined. RESULTS In response to uniaxial loading, both porosity and pore diameter dramatically decreased for most mesh products. The application of 5 N led to reductions in porosity for nearly all groups

  9. Towards transparent all-optical label-swapped networks: 40 Gbit/s ultra-fast dynamic wavelength routing using integrated devices

    Seoane, Jorge; Holm-Nielsen, Pablo Villanueva; Jeppesen, Palle

    2006-01-01

    All-optical routing of 40 Gbit/s 1.6 ns packets is demonstrated employing integrated devices based on SOA-MZIs. The scheme allows wavelength transparent operation and sub-nanosecond dynamic wavelength selection for future packet/label switched networks....

  10. Sierra toolkit computational mesh conceptual model

    Baur, David G.; Edwards, Harold Carter; Cochran, William K.; Williams, Alan B.; Sjaardema, Gregory D.

    2010-01-01

    The Sierra Toolkit computational mesh is a software library intended to support massively parallel multi-physics computations on dynamically changing unstructured meshes. This domain of intended use is inherently complex due to distributed memory parallelism, parallel scalability, heterogeneity of physics, heterogeneous discretization of an unstructured mesh, and runtime adaptation of the mesh. Management of this inherent complexity begins with a conceptual analysis and modeling of this domain of intended use; i.e., development of a domain model. The Sierra Toolkit computational mesh software library is designed and implemented based upon this domain model. Software developers using, maintaining, or extending the Sierra Toolkit computational mesh library must be familiar with the concepts/domain model presented in this report.

  11. The Optimization Based Dynamic and Cyclic Working Strategies for Rechargeable Wireless Sensor Networks with Multiple Base Stations and Wireless Energy Transfer Devices

    Ding, Xu; Han, Jianghong; Shi, Lei

    2015-01-01

    In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating “bottleneck” sensor nodes is also developed in this paper. PMID:25785305

  12. The optimization based dynamic and cyclic working strategies for rechargeable wireless sensor networks with multiple base stations and wireless energy transfer devices.

    Ding, Xu; Han, Jianghong; Shi, Lei

    2015-03-16

    In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating "bottleneck" sensor nodes is also developed in this paper.

  13. Anisotropic evaluation of synthetic surgical meshes.

    Saberski, E R; Orenstein, S B; Novitsky, Y W

    2011-02-01

    The material properties of meshes used in hernia repair contribute to the overall mechanical behavior of the repair. The anisotropic potential of synthetic meshes, representing a difference in material properties (e.g., elasticity) in different material axes, is not well defined to date. Haphazard orientation of anisotropic mesh material can contribute to inconsistent surgical outcomes. We aimed to characterize and compare anisotropic properties of commonly used synthetic meshes. Six different polypropylene (Trelex(®), ProLite™, Ultrapro™), polyester (Parietex™), and PTFE-based (Dualmesh(®), Infinit) synthetic meshes were selected. Longitudinal and transverse axes were defined for each mesh, and samples were cut in each axis orientation. Samples underwent uniaxial tensile testing, from which the elastic modulus (E) in each axis was determined. The degree of anisotropy (λ) was calculated as a logarithmic expression of the ratio between the elastic modulus in each axis. Five of six meshes displayed significant anisotropic behavior. Ultrapro™ and Infinit exhibited approximately 12- and 20-fold differences between perpendicular axes, respectively. Trelex(®), ProLite™, and Parietex™ were 2.3-2.4 times. Dualmesh(®) was the least anisotropic mesh, without marked difference between the axes. Anisotropy of synthetic meshes has been underappreciated. In this study, we found striking differences between elastic properties of perpendicular axes for most commonly used synthetic meshes. Indiscriminate orientation of anisotropic mesh may adversely affect hernia repairs. Proper labeling of all implants by manufacturers should be mandatory. Understanding the specific anisotropic behavior of synthetic meshes should allow surgeons to employ rational implant orientation to maximize outcomes of hernia repair.

  14. Unstructured mesh adaptivity for urban flooding modelling

    Hu, R.; Fang, F.; Salinas, P.; Pain, C. C.

    2018-05-01

    Over the past few decades, urban floods have been gaining more attention due to their increase in frequency. To provide reliable flooding predictions in urban areas, various numerical models have been developed to perform high-resolution flood simulations. However, the use of high-resolution meshes across the whole computational domain causes a high computational burden. In this paper, a 2D control-volume and finite-element flood model using adaptive unstructured mesh technology has been developed. This adaptive unstructured mesh technique enables meshes to be adapted optimally in time and space in response to the evolving flow features, thus providing sufficient mesh resolution where and when it is required. It has the advantage of capturing the details of local flows and wetting and drying front while reducing the computational cost. Complex topographic features are represented accurately during the flooding process. For example, the high-resolution meshes around the buildings and steep regions are placed when the flooding water reaches these regions. In this work a flooding event that happened in 2002 in Glasgow, Scotland, United Kingdom has been simulated to demonstrate the capability of the adaptive unstructured mesh flooding model. The simulations have been performed using both fixed and adaptive unstructured meshes, and then results have been compared with those published 2D and 3D results. The presented method shows that the 2D adaptive mesh model provides accurate results while having a low computational cost.

  15. Adaptive hybrid mesh refinement for multiphysics applications

    Khamayseh, Ahmed; Almeida, Valmor de

    2007-01-01

    The accuracy and convergence of computational solutions of mesh-based methods is strongly dependent on the quality of the mesh used. We have developed methods for optimizing meshes that are comprised of elements of arbitrary polygonal and polyhedral type. We present in this research the development of r-h hybrid adaptive meshing technology tailored to application areas relevant to multi-physics modeling and simulation. Solution-based adaptation methods are used to reposition mesh nodes (r-adaptation) or to refine the mesh cells (h-adaptation) to minimize solution error. The numerical methods perform either the r-adaptive mesh optimization or the h-adaptive mesh refinement method on the initial isotropic or anisotropic meshes to equidistribute weighted geometric and/or solution error function. We have successfully introduced r-h adaptivity to a least-squares method with spherical harmonics basis functions for the solution of the spherical shallow atmosphere model used in climate modeling. In addition, application of this technology also covers a wide range of disciplines in computational sciences, most notably, time-dependent multi-physics, multi-scale modeling and simulation

  16. Meshes optimized for discrete exterior calculus (DEC).

    Mousley, Sarah C. [Univ. of Illinois, Urbana-Champaign, IL (United States); Deakin, Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Knupp, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mitchell, Scott A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-12-01

    We study the optimization of an energy function used by the meshing community to measure and improve mesh quality. This energy is non-traditional because it is dependent on both the primal triangulation and its dual Voronoi (power) diagram. The energy is a measure of the mesh's quality for usage in Discrete Exterior Calculus (DEC), a method for numerically solving PDEs. In DEC, the PDE domain is triangulated and this mesh is used to obtain discrete approximations of the continuous operators in the PDE. The energy of a mesh gives an upper bound on the error of the discrete diagonal approximation of the Hodge star operator. In practice, one begins with an initial mesh and then makes adjustments to produce a mesh of lower energy. However, we have discovered several shortcomings in directly optimizing this energy, e.g. its non-convexity, and we show that the search for an optimized mesh may lead to mesh inversion (malformed triangles). We propose a new energy function to address some of these issues.

  17. Transrectal Mesh Erosion Requiring Bowel Resection.

    Kemp, Marta Maria; Slim, Karem; Rabischong, Benoît; Bourdel, Nicolas; Canis, Michel; Botchorishvili, Revaz

    To report a case of a transrectal mesh erosion as complication of laparoscopic promontofixation with mesh repair, necessitating bowel resection and subsequent surgical interventions. Sacrocolpopexy has become a standard procedure for vaginal vault prolapse [1], and the laparoscopic approach has gained popularity owing to more rapid recovery and less morbidity [2,3]. Mesh erosion is a well-known complication of surgical treatment for prolapse as reported in several negative evaluations, including a report from the US Food and Drug Administration in 2011 [4]. Mesh complications are more common after surgeries via the vaginal approach [5]; nonetheless, the incidence of vaginal mesh erosion after laparoscopic procedures is as high as 9% [6]. The incidence of transrectal mesh exposure after laparoscopic ventral rectopexy is roughly 1% [7]. The diagnosis may be delayed because of its rarity and variable presentation. In addition, polyester meshes, such as the mesh used in this case, carry a higher risk of exposure [8]. A 57-year-old woman experiencing genital prolapse, with the cervix classified as +3 according to the Pelvic Organ Prolapse Quantification system, underwent laparoscopic standard sacrocolpopexy using polyester mesh. Subtotal hysterectomy and bilateral adnexectomy were performed concomitantly. A 3-year follow-up consultation demonstrated no signs or symptoms of erosion of any type. At 7 years after the surgery, however, the patient presented with rectal discharge, diagnosed as infectious rectocolitis with the isolation of Clostridium difficile. She underwent a total of 5 repair surgeries in a period of 4 months, including transrectal resection of exposed mesh, laparoscopic ablation of mesh with digestive resection, exploratory laparoscopy with abscess drainage, and exploratory laparoscopy with ablation of residual mesh and transverse colostomy. She recovered well after the last intervention, exhibiting no signs of vaginal or rectal fistula and no recurrence

  18. RGG: Reactor geometry (and mesh) generator

    Jain, R.; Tautges, T.

    2012-01-01

    The reactor geometry (and mesh) generator RGG takes advantage of information about repeated structures in both assembly and core lattices to simplify the creation of geometry and mesh. It is released as open source software as a part of the MeshKit mesh generation library. The methodology operates in three stages. First, assembly geometry models of various types are generated by a tool called AssyGen. Next, the assembly model or models are meshed by using MeshKit tools or the CUBIT mesh generation tool-kit, optionally based on a journal file output by AssyGen. After one or more assembly model meshes have been constructed, a tool called CoreGen uses a copy/move/merge process to arrange the model meshes into a core model. In this paper, we present the current state of tools and new features in RGG. We also discuss the parallel-enabled CoreGen, which in several cases achieves super-linear speedups since the problems fit in available RAM at higher processor counts. Several RGG applications - 1/6 VHTR model, 1/4 PWR reactor core, and a full-core model for Monju - are reported. (authors)

  19. Parallel adaptive simulations on unstructured meshes

    Shephard, M S; Jansen, K E; Sahni, O; Diachin, L A

    2007-01-01

    This paper discusses methods being developed by the ITAPS center to support the execution of parallel adaptive simulations on unstructured meshes. The paper first outlines the ITAPS approach to the development of interoperable mesh, geometry and field services to support the needs of SciDAC application in these areas. The paper then demonstrates the ability of unstructured adaptive meshing methods built on such interoperable services to effectively solve important physics problems. Attention is then focused on ITAPs' developing ability to solve adaptive unstructured mesh problems on massively parallel computers

  20. Modeling and Performance Analysis of Route-Over and Mesh-Under Routing Schemes in 6LoWPAN under Error-Prone Channel Condition

    Tsung-Han Lee

    2013-01-01

    Full Text Available 6LoWPAN technology has attracted extensive attention recently. It is because 6LoWPAN is one of Internet of Things standard and it adapts to IPv6 protocol stack over low-rate wireless personal area network, such as IEEE 802.15.4. One view is that IP architecture is not suitable for low-rate wireless personal area network. It is a challenge to implement the IPv6 protocol stack into IEEE 802.15.4 devices due to that the size of IPv6 packet is much larger than the maximum packet size of IEEE 802.15.4 in data link layer. In order to solve this problem, 6LoWPAN provides header compression to reduce the transmission overhead for IP packets. In addition, two selected routing schemes, mesh-under and route-over routing schemes, are also proposed in 6LoWPAN to forward IP fragmentations under IEEE 802.15.4 radio link. The distinction is based on which layer of the 6LoWPAN protocol stack is in charge of routing decisions. In route-over routing scheme, the routing distinction is taken at the network layer and, in mesh-under, is taken by the adaptation layer. Thus, the goal of this research is to understand the performance of two routing schemes in 6LoWPAN under error-prone channel condition.

  1. Adaptive and dynamic meshing methods for numerical simulations

    Acikgoz, Nazmiye

    -hoc application of the simulated annealing technique, which improves the likelihood of removing poor elements from the grid. Moreover, a local implementation of the simulated annealing is proposed to reduce the computational cost. Many challenging multi-physics and multi-field problems that are unsteady in nature are characterized by moving boundaries and/or interfaces. When the boundary displacements are large, which typically occurs when implicit time marching procedures are used, degenerate elements are easily formed in the grid such that frequent remeshing is required. To deal with this problem, in the second part of this work, we propose a new r-adaptation methodology. The new technique is valid for both simplicial (e.g., triangular, tet) and non-simplicial (e.g., quadrilateral, hex) deforming grids that undergo large imposed displacements at their boundaries. A two- or three-dimensional grid is deformed using a network of linear springs composed of edge springs and a set of virtual springs. The virtual springs are constructed in such a way as to oppose element collapsing. This is accomplished by confining each vertex to its ball through springs that are attached to the vertex and its projection on the ball entities. The resulting linear problem is solved using a preconditioned conjugate gradient method. The new method is compared with the classical spring analogy technique in two- and three-dimensional examples, highlighting the performance improvements achieved by the new method. Meshes are an important part of numerical simulations. Depending on the geometry and flow conditions, the most suitable mesh for each particular problem is different. Meshes are usually generated by either using a suitable software package or solving a PDE. In both cases, engineering intuition plays a significant role in deciding where clusterings should take place. In addition, for unsteady problems, the gradients vary for each time step, which requires frequent remeshing during simulations

  2. Tensile Behaviour of Welded Wire Mesh and Hexagonal Metal Mesh for Ferrocement Application

    Tanawade, A. G.; Modhera, C. D.

    2017-08-01

    Tension tests were conducted on welded mesh and hexagonal Metal mesh. Welded Mesh is available in the market in different sizes. The two types are analysed viz. Ø 2.3 mm and Ø 2.7 mm welded mesh, having opening size 31.75 mm × 31.75 mm and 25.4 mm × 25.4 mm respectively. Tensile strength test was performed on samples of welded mesh in three different orientations namely 0°, 30° and 45° degrees with the loading axis and hexagonal Metal mesh of Ø 0.7 mm, having opening 19.05 × 19.05 mm. Experimental tests were conducted on samples of these meshes. The objective of this study was to investigate the behaviour of the welded mesh and hexagonal Metal mesh. The result shows that the tension load carrying capacity of welded mesh of Ø 2.7 mm of 0° orientation is good as compared to Ø2.3 mm mesh and ductility of hexagonal Metal mesh is good in behaviour.

  3. Mesh optimization for microbial fuel cell cathodes constructed around stainless steel mesh current collectors

    Zhang, Fang; Merrill, Matthew D.; Tokash, Justin C.; Saito, Tomonori; Cheng, Shaoan; Hickner, Michael A.; Logan, Bruce E.

    2011-01-01

    that the mesh properties of these cathodes can significantly affect performance. Cathodes made from the coarsest mesh (30-mesh) achieved the highest maximum power of 1616 ± 25 mW m-2 (normalized to cathode projected surface area; 47.1 ± 0.7 W m-3 based on liquid

  4. Intravesical midurethral sling mesh erosion secondary to transvaginal mesh reconstructive surgery

    Sukanda Bin Jaili

    2015-05-01

    Conclusion: Repeated vaginal reconstructive surgery may jeopardize a primary mesh or sling, and pose a high risk of mesh erosion, which may be delayed for several years. Removal of the mesh erosion and bladder repair are feasible pervaginally with good outcome.

  5. IEEE 802.15.4 MAC with GTS transmission for heterogeneous devices with application to wheelchair body-area sensor networks.

    Shrestha, Bharat; Hossain, Ekram; Camorlinga, Sergio

    2011-09-01

    In wireless personal area networks, such as wireless body-area sensor networks, stations or devices have different bandwidth requirements and, thus, create heterogeneous traffics. For such networks, the IEEE 802.15.4 medium access control (MAC) can be used in the beacon-enabled mode, which supports guaranteed time slot (GTS) allocation for time-critical data transmissions. This paper presents a general discrete-time Markov chain model for the IEEE 802.15.4-based networks taking into account the slotted carrier sense multiple access with collision avoidance and GTS transmission phenomena together in the heterogeneous traffic scenario and under nonsaturated condition. For this purpose, the standard GTS allocation scheme is modified. For each non-identical device, the Markov model is solved and the average service time and the service utilization factor are analyzed in the non-saturated mode. The analysis is validated by simulations using network simulator version 2.33. Also, the model is enhanced with a wireless propagation model and the performance of the MAC is evaluated in a wheelchair body-area sensor network scenario.

  6. MCR2S unstructured mesh capabilities for use in shutdown dose rate analysis

    Eade, T.; Stonell, D.; Turner, A.

    2015-01-01

    Highlights: • Advancements in shutdown dose rate calculations will be needed as fusion moves from experimental reactors to full scale demonstration reactors in order to ensure the safety of personnel. • The MCR2S shutdown dose rate tool has been modified to allow shutdown dose rates calculations using an unstructured mesh. • The unstructured mesh capability of MCR2S was used on three shutdown dose rate models, a simple sphere, the ITER computational benchmark and the DEMO computational benchmark. • The results showed a reasonable agreement between an unstructured mesh approach and the CSG approach and highlighted the need to carefully choose the unstructured mesh resolution. - Abstract: As nuclear fusion progresses towards a sustainable energy source and the power of tokamak devices increases, a greater understanding of the radiation fields will be required. As well as on-load radiation fields, off-load or shutdown radiation field are an important consideration for the safety and economic viability of a commercial fusion reactor. Previously codes such as MCR2S have been written in order to predict the shutdown dose rates within, and in regions surrounding, a fusion reactor. MCR2S utilises a constructive solid geometry (CSG) model and a superimposed structured mesh to calculate 3-D maps of the shutdown dose rate. A new approach to MCR2S calculations is proposed and implemented using a single unstructured mesh to replace both the CSG model and the superimposed structured mesh. This new MCR2S approach has been demonstrated on three models of increasing complexity. These models were: a sphere, the ITER computational shutdown dose rate benchmark and the DEMO computational shutdown dose rate benchmark. In each case the results were compared to MCR2S calculations performed using MCR2S with CSG geometry and a superimposed structured mesh. It was concluded that the results from the unstructured mesh implementation of MCR2S compared well to the CSG structured mesh

  7. NeuroTessMesh: A Tool for the Generation and Visualization of Neuron Meshes and Adaptive On-the-Fly Refinement

    Juan J. Garcia-Cantero

    2017-06-01

    Full Text Available Gaining a better understanding of the human brain continues to be one of the greatest challenges for science, largely because of the overwhelming complexity of the brain and the difficulty of analyzing the features and behavior of dense neural networks. Regarding analysis, 3D visualization has proven to be a useful tool for the evaluation of complex systems. However, the large number of neurons in non-trivial circuits, together with their intricate geometry, makes the visualization of a neuronal scenario an extremely challenging computational problem. Previous work in this area dealt with the generation of 3D polygonal meshes that approximated the cells’ overall anatomy but did not attempt to deal with the extremely high storage and computational cost required to manage a complex scene. This paper presents NeuroTessMesh, a tool specifically designed to cope with many of the problems associated with the visualization of neural circuits that are comprised of large numbers of cells. In addition, this method facilitates the recovery and visualization of the 3D geometry of cells included in databases, such as NeuroMorpho, and provides the tools needed to approximate missing information such as the soma’s morphology. This method takes as its only input the available compact, yet incomplete, morphological tracings of the cells as acquired by neuroscientists. It uses a multiresolution approach that combines an initial, coarse mesh generation with subsequent on-the-fly adaptive mesh refinement stages using tessellation shaders. For the coarse mesh generation, a novel approach, based on the Finite Element Method, allows approximation of the 3D shape of the soma from its incomplete description. Subsequently, the adaptive refinement process performed in the graphic card generates meshes that provide good visual quality geometries at a reasonable computational cost, both in terms of memory and rendering time. All the described techniques have been

  8. A high reliability module with thermoelectric device by molding technology for M2M wireless sensor network

    Nakagawa, K; Tanaka, T; Suzuki, T

    2015-01-01

    This paper presents the fabrication of a new energy harvesting module that uses a thermoelectric device (TED) by using molding technology. Through molding technology, the TED and circuit board can be properly protected and a heat-radiating fin structure can be simultaneously constructed. The output voltage per heater temperature of the TED module at 20 °C ambient temperature is 8 mV K −1 , similar to the result with the aluminum heat sink which is almost the same fin size as the TED module. The accelerated environmental tests are performed on a damp heat test, which is an aging test under high temperature and high humidity, highly accelerated temperature, and humidity stress test (HAST) for the purpose of evaluating the electrical reliability in harsh environments, cold test and thermal cycle test to evaluate degrading characteristics by cycling through two temperatures. All test results indicate that the TED and circuit board can be properly protected from harsh temperature and humidity by using molding technology because the output voltage of after-tested modules is reduced by less than 5%. This study presents a novel fabrication method for a high reliability TED-installed module appropriate for Machine to Machine wireless sensor networks. (paper)

  9. Heating-Rate-Triggered Carbon-Nanotube-based 3-Dimensional Conducting Networks for a Highly Sensitive Noncontact Sensing Device

    Tai, Yanlong

    2016-01-28

    Recently, flexible and transparent conductive films (TCFs) are drawing more attention for their central role in future applications of flexible electronics. Here, we report the controllable fabrication of TCFs for moisture-sensing applications based on heating-rate-triggered, 3-dimensional porous conducting networks through drop casting lithography of single-walled carbon nanotube (SWCNT)/poly(3,4-ethylenedioxythiophene)-polystyrene sulfonate (PEDOT:PSS) ink. How ink formula and baking conditions influence the self-assembled microstructure of the TCFs is discussed. The sensor presents high-performance properties, including a reasonable sheet resistance (2.1 kohm/sq), a high visible-range transmittance (>69%, PET = 90%), and good stability when subjected to cyclic loading (>1000 cycles, better than indium tin oxide film) during processing, when formulation parameters are well optimized (weight ratio of SWCNT to PEDOT:PSS: 1:0.5, SWCNT concentration: 0.3 mg/ml, and heating rate: 36 °C/minute). Moreover, the benefits of these kinds of TCFs were verified through a fully transparent, highly sensitive, rapid response, noncontact moisture-sensing device (5 × 5 sensing pixels).

  10. A high Reliability Module with Thermoelectric Device by Molding Technology for M2M Wireless Sensor Network

    Nakagawa, K; Tanaka, T; Suzuki, T

    2014-01-01

    This paper presents the fabrication of a new energy harvesting module that used the thermoelectric device (TED) by using molding technology. The output voltage per heater temperature of the TED module at 20 °C ambient temperature is 8mV/K and similar to the result with the aluminium heat sink which is almost the same fin size as the TED module. The accelerated environmental tests are performed on damp heat test that is an aging test under high temperature and high humidity, cold test and highly accelerated temperature and humidity stress test (HAST) for the purpose of evaluating the electrical reliability in harsh environments. Every result of tests indicates that the TED and circuit board can be properly protected from harsh temperature and humidity by using molding technology, because the output voltage of after tested modules is reduced by less than 5%.This study presents a novel fabrication method for a high reliability TED-installed module appropriate for Machine to Machine wireless sensor networks

  11. ACED devices and SECAF supports for the control of structure, pipe network and equipment behaviour at seismic movements in order to enhance the safety margin

    Serban, Viorel; Prisecaru, I.; Cretu, D.; Moldoveanu, T.

    2002-01-01

    In order to enhance the safety margin of structure, pipe networks and equipment associated to the existing NPPs, the classic consolidation solutions are very expensive and many times, impossible to be implemented. Structures, pipe networks, systems and equipment have geometries imposed by the basic construction requirements, operating and safety requirements and their modifications is not always possible. In order to enhance the strength capacity of (new or old) structures, systems and equipment mechanical devices with controlled elasticity and damping (ACED) have been designed, constructed and experimented. These devices are capable to support very large static loads over which dynamic loads (shock, vibration and seismic movements) overlap (which are damped). To increase the strength capacity of (new or existing) pipe networks and equipment connecting with pipes, SECAF supports that allow displacements from thermal expansions with low reaction force have been designed, constructed and experimented. SECAF supports are capable elastically to take permanent loads over which shocks, vibrations and seismic movements (which are damp) overlap. ACED devices and SECAF supports can be used to rehabilitate the existing NPPs with law financial costs and an increase of their strength capacity up to 100% under seismic movements, shocks and vibrations. ACED devices and SECAF supports do not require maintenance, are not affected by presence of a radiation field and their estimated service-life is similar to the NPPs

  12. Laparoscopic Pelvic Floor Repair Using Polypropylene Mesh

    Shih-Shien Weng

    2008-09-01

    Conclusion: Laparoscopic pelvic floor repair using a single piece of polypropylene mesh combined with uterosacral ligament suspension appears to be a feasible procedure for the treatment of advanced vaginal vault prolapse and enterocele. Fewer mesh erosions and postoperative pain syndromes were seen in patients who had no previous pelvic floor reconstructive surgery.

  13. Robust diamond meshes with unique wettability properties.

    Yang, Yizhou; Li, Hongdong; Cheng, Shaoheng; Zou, Guangtian; Wang, Chuanxi; Lin, Quan

    2014-03-18

    Robust diamond meshes with excellent superhydrophobic and superoleophilic properties have been fabricated. Superhydrophobicity is observed for water with varying pH from 1 to 14 with good recyclability. Reversible superhydrophobicity and hydrophilicity can be easily controlled. The diamond meshes show highly efficient water-oil separation and water pH droplet transference.

  14. Mesh-graft urethroplasty: a case report

    田中, 敏博; 滝川, 浩; 香川, 征; 長江, 浩朗

    1987-01-01

    We used a meshed free-foreskin transplant in a two-stage procedure for reconstruction of the extended stricture of urethra after direct vision urethrotomy. The results were excellent. Mesh-graft urethroplasty is a useful method for patients with extended strictures of the urethra or recurrent strictures after several operations.

  15. 7th International Meshing Roundtable '98

    Eldred, T.J.

    1998-10-01

    The goal of the 7th International Meshing Roundtable is to bring together researchers and developers from industry, academia, and government labs in a stimulating, open environment for the exchange of technical information related to the meshing process. In the past, the Roundtable has enjoyed significant participation from each of these groups from a wide variety of countries.

  16. Postoperative pain outcomes after transvaginal mesh revision.

    Danford, Jill M; Osborn, David J; Reynolds, W Stuart; Biller, Daniel H; Dmochowski, Roger R

    2015-01-01

    Although the current literature discusses mesh complications including pain, as well as suggesting different techniques for removing mesh, there is little literature regarding pain outcomes after surgical removal or revision. The purpose of this study is to determine if surgical removal or revision of vaginal mesh improves patient's subjective complaints of pelvic pain associated with original placement of mesh. After obtaining approval from the Vanderbilt University Medical Center Institutional Review Board, a retrospective review of female patients with pain secondary to previous mesh placement who underwent excision or revision of vaginal mesh from January 2000 to August 2012 was performed. Patient age, relevant medical history including menopause status, previous hysterectomy, smoking status, and presence of diabetes, fibromyalgia, interstitial cystitis, and chronic pelvic pain, was obtained. Patients' postoperative pain complaints were assessed. Of the 481 patients who underwent surgery for mesh revision, removal or urethrolysis, 233 patients met our inclusion criteria. One hundred and sixty-nine patients (73 %) reported that their pain improved, 19 (8 %) reported that their pain worsened, and 45 (19 %) reported that their pain remained unchanged after surgery. Prior history of chronic pelvic pain was associated with increased risk of failure of the procedure to relieve pain (OR 0.28, 95 % CI 0.12-0.64, p = 0.003). Excision or revision of vaginal mesh appears to be effective in improving patients' pain symptoms most of the time. Patients with a history of chronic pelvic pain are at an increased risk of no improvement or of worsening pain.

  17. Converting skeletal structures to quad dominant meshes

    Bærentzen, Jakob Andreas; Misztal, Marek Krzysztof; Welnicka, Katarzyna

    2012-01-01

    We propose the Skeleton to Quad-dominant polygonal Mesh algorithm (SQM), which converts skeletal structures to meshes composed entirely of polar and annular regions. Both types of regions have a regular structure where all faces are quads except for a single ring of triangles at the center of each...

  18. Adaptive mesh refinement in titanium

    Colella, Phillip; Wen, Tong

    2005-01-21

    In this paper, we evaluate Titanium's usability as a high-level parallel programming language through a case study, where we implement a subset of Chombo's functionality in Titanium. Chombo is a software package applying the Adaptive Mesh Refinement methodology to numerical Partial Differential Equations at the production level. In Chombo, the library approach is used to parallel programming (C++ and Fortran, with MPI), whereas Titanium is a Java dialect designed for high-performance scientific computing. The performance of our implementation is studied and compared with that of Chombo in solving Poisson's equation based on two grid configurations from a real application. Also provided are the counts of lines of code from both sides.

  19. Automatic mesh generation with QMESH program

    Ise, Takeharu; Tsutsui, Tsuneo

    1977-05-01

    Usage of the two-dimensional self-organizing mesh generation program, QMESH, is presented together with the descriptions and the experience, as it has recently been converted and reconstructed from the NEACPL version to the FACOM. The program package consists of the QMESH code to generate quadrilaterial meshes with smoothing techniques, the QPLOT code to plot the data obtained from the QMESH on the graphic COM, and the RENUM code to renumber the meshes by using a bandwidth minimization procedure. The technique of mesh reconstructuring coupled with smoothing techniques is especially useful when one generates the meshes for computer codes based on the finite element method. Several typical examples are given for easy access to the QMESH program, which is registered in the R.B-disks of JAERI for users. (auth.)

  20. Fog water collection effectiveness: Mesh intercomparisons

    Fernandez, Daniel; Torregrosa, Alicia; Weiss-Penzias, Peter; Zhang, Bong June; Sorensen, Deckard; Cohen, Robert; McKinley, Gareth; Kleingartner, Justin; Oliphant, Andrew; Bowman, Matthew

    2018-01-01

    To explore fog water harvesting potential in California, we conducted long-term measurements involving three types of mesh using standard fog collectors (SFC). Volumetric fog water measurements from SFCs and wind data were collected and recorded in 15-minute intervals over three summertime fog seasons (2014–2016) at four California sites. SFCs were deployed with: standard 1.00 m2 double-layer 35% shade coefficient Raschel; stainless steel mesh coated with the MIT-14 hydrophobic formulation; and FogHa-Tin, a German manufactured, 3-dimensional spacer fabric deployed in two orientations. Analysis of 3419 volumetric samples from all sites showed strong relationships between mesh efficiency and wind speed. Raschel mesh collected 160% more fog water than FogHa-Tin at wind speeds less than 1 m s–1 and 45% less for wind speeds greater than 5 m s–1. MIT-14 coated stainless-steel mesh collected more fog water than Raschel mesh at all wind speeds. At low wind speeds of steel mesh collected 3% more and at wind speeds of 4–5 m s–1, it collected 41% more. FogHa-Tin collected 5% more fog water when the warp of the weave was oriented vertically, per manufacturer specification, than when the warp of the weave was oriented horizontally. Time series measurements of three distinct mesh across similar wind regimes revealed inconsistent lags in fog water collection and inconsistent performance. Since such differences occurred under similar wind-speed regimes, we conclude that other factors play important roles in mesh performance, including in-situ fog event and aerosol dynamics that affect droplet-size spectra and droplet-to-mesh surface interactions.