WorldWideScience

Sample records for network wlan devices

  1. A Low-Power WLAN Communication Scheme for IoT WLAN Devices Using Wake-Up Receivers

    Directory of Open Access Journals (Sweden)

    Hanseul Hong

    2018-01-01

    Full Text Available In this paper, we propose a delay- and power-efficient, multi-user, low-power wireless local area network (WLAN communication scheme for Internet of Things (IoT WLAN devices. Extremely low-power operation is one of the key requirements of emerging IoT devices. However, the current duty-cycle-based power saving approach may incur large access delay times owing to the trade-offs between the power consumption and the access delay. In order to reduce this delay and enhance the power-saving performance, wake-up receiver-based schemes have been proposed. However, because wake-up receiver-based schemes do not consider multiuser operation in dense communication environments, large delays are inevitable in the case of multiuser operation. In order to provide extremely low-power operation and under 1-mW standby power with reduced delay, we employed the optimized multiuser transmission scheduling of IEEE 802.11ax in the proposed scheme and proper enhanced distributed channel access (EDCA parameter settings. This is with the aim to reduce the delay caused by long wake-up times, and to avoid collisions caused by simultaneous transmission in uplink multiuser scenario. By using the proposed scheme, simultaneous IoT communication with multiple mobile IoT devices is possible while providing low-power operation. Simulation results verified the outstanding delay performance of the proposed scheme.

  2. Performance of SON for RSRP-based LTE/WLAN access network selection

    NARCIS (Netherlands)

    Kovács, I.Z.; Laselva, D.; Michaelsen, P.H.; Wang, Y.; Djapic, R.; Spaey, K.

    2014-01-01

    Carrier-grade Wireless Local Area Network (WLAN) is becoming an important complementary system to cellular networks for Mobile Network Operators (MNOs). Network controlled access network selection between cellular and WLAN is an essential functionality to optimize network performance and user

  3. SON for LTE-WLAN access network selection : design and performance

    NARCIS (Netherlands)

    Willemen, P.; Laselva, D.; Wang, Y.; Kovács, I.; Djapic, R.; Moerman, I.

    2016-01-01

    Mobile network operators (MNOs) are deploying carrier-grade Wireless Local Area Network (WLAN) as an important complementary system to cellular networks. Access network selection (ANS) between cellular and WLAN is an essential component to improve network performance and user quality-of-service

  4. Electromagnetic compatibility of WLAN adapters with life-supporting medical devices.

    Science.gov (United States)

    Calcagnini, G; Mattei, E; Censi, F; Triventi, M; Lo Sterzo, R; Marchetta, E; Bartolini, P

    2011-05-01

    This paper investigates the electromagnetic compatibility of 45 critical care medical devices (infusion pumps, defibrillators, monitors, lung ventilators, anesthesia machines and external pacemakers) with various types of wireless local area network (WLAN, IEEE 802.11 b/g, 2.45 GHz, 100 mW) adapters. Interference is evaluated by performing ad-hoc tests according to the ANSI C63.18 recommended practice. The behavior of the devices during the tests was monitored using patient simulators/device testers specific for each device class. Electromagnetic interference cases were observed in three of 45 devices at a maximum distance of 5 cm. In two cases the interference caused malfunctions that may have clinical consequences for the patient. The authors' findings show that the use of these wireless local area network adapters can be considered reasonably safe, although interference may occur if they are operated at very close distance (<10 cm) to the medical devices.

  5. SON for LTE-WLAN access network selection: design and performance

    National Research Council Canada - National Science Library

    Willemen, Pieter; Laselva, Daniela; Wang, Yu; Kovács, Istvan; Djapic, Relja; Moerman, Ingrid

    2016-01-01

    ...) via controlled loading of these systems. In emerging heterogeneous networks characterized by different cell sizes and diverse WLAN deployments, automatic tuning of the network selection functionality plays a crucial role...

  6. Internet roaming: a WLAN/3G integration system for enterprises

    Science.gov (United States)

    Luo, Hui; Jiang, Zhimei; Kim, Byoung J.; Shankar, Narendra K.; Henry, Paul

    2002-08-01

    This paper proposes an enterprise-oriented WLAN/3G network integration solution, called the Internet Roaming system. Differing from other operator-oriented WLAN/3G network integration solutions, the Internet Roaming system is a practical IP-based corporate network architecture that provides seamless internetworking across office WLAN, home WLAN, public WLAN, and 2.5G/3G cellular network for corporate wireless data users. An Internet Roaming system may have four building blocks. They are IRC (Internet Roaming Client), SMG (secure mobility gateway), SIA (Secure IP Access) gateway, and VSA (virtual single account) server. The IRC is a special client tool (software or hardware) installed on a wireless data device. It provides a secure mobile IP connection from the wireless data device to the corporate network transparent to the operating system of the wireless data devices. The SMG is a mobile IPsec gateway installed on the corporate core network facing the Internet. It works with the IRC to maintain a secure mobile IP connection when the wireless data device is connected on the Internet through a home WLAN, a public WLAN, or a cellular network. The SIA server is a special IPsec gateway installed on the corporate intranet where office WLAN is installed. It works with the IRC to assure the security of office WLAN while improving the routing efficiency for users computers. The VSA server manages the IRC, SMG, and SIA servers.

  7. WLAN-VERKON SUUNNITTELU JA TESTAUS : Wireless Local Area Network (WLAN) design and testing

    OpenAIRE

    Isotalo, Atte

    2017-01-01

    Tämän työn aiheena oli WLAN-verkon suunnittelu ja toteutus käyttämällä Savoniaammattikorkeakoulun tarjoamia laitteita. Opinnäytetyön teko aloitettiin etsimällä taustamateriaalia työn suorittamiseen. Opinnäytetyössä käytettiin esimerkki tietoverkkoa testauksia varten. Esimerkkiverkossa testattiin koulun tilaamaa langattoman verkon ohjaustilaitetta. Esimerkkiverkkoni sisälsi kaksi OSI-mallin toisen tason kytkintä, yhden OSI-mallin kolmannen tason kytkimen, kaksi langattoman verkon tuki...

  8. Incorporating antenna beamswitching technique into drivers for IEEE802.11 WLAN devices

    CSIR Research Space (South Africa)

    Mofolo, M

    2015-11-23

    Full Text Available the beamswitching technique for switched parasitic array (SPA) and electronically steerable parasitic array radiator (ESPAR) antennas in the drivers for IEEE802.11 WLAN devices. The modifications of the open source drivers (ath5k and ath9k) to enable real...

  9. Handoff Between a Wireless Local Area Network (WLAN and a Wide Area Network (UMTS

    Directory of Open Access Journals (Sweden)

    J. Sánchez–García

    2009-04-01

    Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.

  10. Cost-Based Vertical Handover Decision Algorithm for WWAN/WLAN Integrated Networks

    Directory of Open Access Journals (Sweden)

    Kim LaeYoung

    2009-01-01

    Full Text Available Abstract Next generation wireless communications are expected to rely on integrated networks consisting of multiple wireless technologies. Heterogeneous networks based on Wireless Local Area Networks (WLANs and Wireless Wide Area Networks (WWANs can combine their respective advantages on coverage and data rates, offering a high Quality of Service (QoS to mobile users. In such environment, multi-interface terminals should seamlessly switch from one network to another in order to obtain improved performance or at least to maintain a continuous wireless connection. Therefore, network selection algorithm is important in providing better performance to the multi-interface terminals in the integrated networks. In this paper, we propose a cost-based vertical handover decision algorithm that triggers the Vertical Handover (VHO based on a cost function for WWAN/WLAN integrated networks. For the cost function, we focus on developing an analytical model of the expected cost of WLAN for the mobile users that enter the double-coverage area while having a connection in the WWAN. Our simulation results show that the proposed scheme achieves better performance in terms of power consumption and throughput than typical approach where WLANs are always preferred whenever the WLAN access is available.

  11. Cost-Based Vertical Handover Decision Algorithm for WWAN/WLAN Integrated Networks

    Directory of Open Access Journals (Sweden)

    KunHo Hong

    2009-01-01

    Full Text Available Next generation wireless communications are expected to rely on integrated networks consisting of multiple wireless technologies. Heterogeneous networks based on Wireless Local Area Networks (WLANs and Wireless Wide Area Networks (WWANs can combine their respective advantages on coverage and data rates, offering a high Quality of Service (QoS to mobile users. In such environment, multi-interface terminals should seamlessly switch from one network to another in order to obtain improved performance or at least to maintain a continuous wireless connection. Therefore, network selection algorithm is important in providing better performance to the multi-interface terminals in the integrated networks. In this paper, we propose a cost-based vertical handover decision algorithm that triggers the Vertical Handover (VHO based on a cost function for WWAN/WLAN integrated networks. For the cost function, we focus on developing an analytical model of the expected cost of WLAN for the mobile users that enter the double-coverage area while having a connection in the WWAN. Our simulation results show that the proposed scheme achieves better performance in terms of power consumption and throughput than typical approach where WLANs are always preferred whenever the WLAN access is available.

  12. Indoor positioning system using WLAN channel estimates as fingerprints for mobile devices

    Science.gov (United States)

    Schmidt, Erick; Akopian, David

    2015-03-01

    With the growing integration of location based services (LBS) such as GPS in mobile devices, indoor position systems (IPS) have become an important role for research. There are several IPS methods such as AOA, TOA, TDOA, which use trilateration for indoor location estimation but are generally based on line-of-sight. Other methods rely on classification such as fingerprinting which uses WLAN indoor signals. This paper re-examines the classical WLAN fingerprinting accuracy which uses received signal strength (RSS) measurements by introducing channel estimates for improvements in the classification of indoor locations. The purpose of this paper is to improve existing classification algorithms used in fingerprinting by introducing channel estimates when there are a low number of APs available. The channel impulse response, or in this case the channel estimation from the receiver, should characterize a complex indoor area which usually has multipath, thus providing a unique signature for each location which proves useful for better pattern recognition. In this experiment, channel estimates are extracted from a Software-Defined Radio (SDR) environment, thus exploiting the benefits of SDR from a NI-USRP model and LabVIEW software. Measurements are taken from a known building, and several scenarios with one and two access points (APs) are used in this experiment. Also, three granularities in distance between locations are analyzed. A Support Vector Machine (SVM) is used as the algorithm for pattern recognition of different locations based on the samples taken from RSS and channel estimation coefficients.

  13. LTE, WiMAX and WLAN network design, optimization and performance analysis

    CERN Document Server

    Korowajczuk, Leonhard

    2011-01-01

    A technological overview of LTE and WiMAX LTE, WiMAX and WLAN Network Design, Optimization and Performance Analysis provides a practical guide to LTE and WiMAX technologies introducing various tools and concepts used within. In addition, topics such as traffic modelling of IP-centric networks, RF propagation, fading, mobility, and indoor coverage are explored; new techniques which increase throughput such as MIMO and AAS technology are highlighted; and simulation, network design and performance analysis are also examined. Finally, in the latter part of the book Korowajczuk gives a step-by-step

  14. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    National Research Council Canada - National Science Library

    Kessel, Adam; Goodwin, Shane

    2005-01-01

    The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...

  15. Motion adaptive vertical handoff in cellular/WLAN heterogeneous wireless network.

    Science.gov (United States)

    Li, Limin; Ma, Lin; Xu, Yubin; Fu, Yunhai

    2014-01-01

    In heterogeneous wireless network, vertical handoff plays an important role for guaranteeing quality of service and overall performance of network. Conventional vertical handoff trigger schemes are mostly developed from horizontal handoff in homogeneous cellular network. Basically, they can be summarized as hysteresis-based and dwelling-timer-based algorithms, which are reliable on avoiding unnecessary handoff caused by the terminals dwelling at the edge of WLAN coverage. However, the coverage of WLAN is much smaller compared with cellular network, while the motion types of terminals can be various in a typical outdoor scenario. As a result, traditional algorithms are less effective in avoiding unnecessary handoff triggered by vehicle-borne terminals with various speeds. Besides that, hysteresis and dwelling-timer thresholds usually need to be modified to satisfy different channel environments. For solving this problem, a vertical handoff algorithm based on Q-learning is proposed in this paper. Q-learning can provide the decider with self-adaptive ability for handling the terminals' handoff requests with different motion types and channel conditions. Meanwhile, Neural Fuzzy Inference System (NFIS) is embedded to retain a continuous perception of the state space. Simulation results verify that the proposed algorithm can achieve lower unnecessary handoff probability compared with the other two conventional algorithms.

  16. Power-Efficient Communication Protocol for Integrated WWAN and WLAN

    Directory of Open Access Journals (Sweden)

    Golmie Nada

    2008-01-01

    Full Text Available Abstract One of the most impending requirements to support a seamless communication environment in heterogeneous wireless networks comes from the limited power supply of small-size and low-cost mobile terminals as in stand-alone WLANs or cellular networks. Thus, it is a challenge to design new techniques so that mobile terminals are able to not only maintain their active connection as they move across different types of wireless networks, but also minimize their power consumption. There have been several efforts aimed at having mobile devices equipped with multiple interfaces connect optimally to the access network that minimizes their power consumption. However, a study of existing schemes for WLAN notes that in the idle state, a device with both a WLAN and a WWAN interface needs to keep both interfaces on in order to receive periodic beacon messages from the access point (AP: WLAN and downlink control information from the base station (WWAN, resulting in significant power consumption. Therefore, in this paper, we propose a power-efficient communication protocol (PCP that includes turning off the WLAN interface after it enters the idle state and using the paging channel of WWAN in order to wake up the WLAN interface when there is incoming long-lived multimedia data. This scheme is known to limit the power consumption, while at the same time, it makes use of the paging channel in cellular networks. Further, our proposed scheme is designed to avoid repeatedly turning on and off WLAN interfaces, that consumes a significant amount of power. We propose turning on the WLAN interface when the number of packets in the radio network controller (RNC's buffer reaches a certain threshold level. The tradeoffs between the power saving and the number of packets dropped at the buffer are investigated analytically through the study of an on/off traffic model. Simulation results for scenarios of interest are also provided.

  17. Power-Efficient Communication Protocol for Integrated WWAN and WLAN

    Directory of Open Access Journals (Sweden)

    SuKyoung Lee

    2008-01-01

    Full Text Available One of the most impending requirements to support a seamless communication environment in heterogeneous wireless networks comes from the limited power supply of small-size and low-cost mobile terminals as in stand-alone WLANs or cellular networks. Thus, it is a challenge to design new techniques so that mobile terminals are able to not only maintain their active connection as they move across different types of wireless networks, but also minimize their power consumption. There have been several efforts aimed at having mobile devices equipped with multiple interfaces connect optimally to the access network that minimizes their power consumption. However, a study of existing schemes for WLAN notes that in the idle state, a device with both a WLAN and a WWAN interface needs to keep both interfaces on in order to receive periodic beacon messages from the access point (AP: WLAN and downlink control information from the base station (WWAN, resulting in significant power consumption. Therefore, in this paper, we propose a power-efficient communication protocol (PCP that includes turning off the WLAN interface after it enters the idle state and using the paging channel of WWAN in order to wake up the WLAN interface when there is incoming long-lived multimedia data. This scheme is known to limit the power consumption, while at the same time, it makes use of the paging channel in cellular networks. Further, our proposed scheme is designed to avoid repeatedly turning on and off WLAN interfaces, that consumes a significant amount of power. We propose turning on the WLAN interface when the number of packets in the radio network controller (RNC's buffer reaches a certain threshold level. The tradeoffs between the power saving and the number of packets dropped at the buffer are investigated analytically through the study of an on/off traffic model. Simulation results for scenarios of interest are also provided.

  18. Comparative Performance Evaluation of TCP Variants in WiMAX (and WLANs Network Configurations

    Directory of Open Access Journals (Sweden)

    Konstantinos Tsiknas

    2012-01-01

    Full Text Available An important application for the IEEE 802.16 technology (also called WiMAX is to provide high-speed access to the Internet where the transmission control protocol (TCP is the core transport protocol. In this paper we study through extensive simulation scenarios the performance characteristics of five representative TCP schemes, namely, TCP New Reno, Vegas, Veno, Westwood, and BIC, in WiMAX (and WLANs networks, under the conditions of correlated wireless errors, asymmetric end-to-end capabilities, and link congestion. The target is to evaluate how the above conditions would affect the TCP congestion control and suggest the best schemes to be employed in WiMAX networks.

  19. Handoff Triggering and Network Selection Algorithms for Load-Balancing Handoff in CDMA-WLAN Integrated Networks

    Directory of Open Access Journals (Sweden)

    Kim Jang-Sub

    2008-01-01

    Full Text Available This paper proposes a novel vertical handoff algorithm between WLAN and CDMA networks to enable the integration of these networks. The proposed vertical handoff algorithm assumes a handoff decision process (handoff triggering and network selection. The handoff trigger is decided based on the received signal strength (RSS. To reduce the likelihood of unnecessary false handoffs, the distance criterion is also considered. As a network selection mechanism, based on the wireless channel assignment algorithm, this paper proposes a context-based network selection algorithm and the corresponding communication algorithms between WLAN and CDMA networks. This paper focuses on a handoff triggering criterion which uses both the RSS and distance information, and a network selection method which uses context information such as the dropping probability, blocking probability, GoS (grade of service, and number of handoff attempts. As a decision making criterion, the velocity threshold is determined to optimize the system performance. The optimal velocity threshold is adjusted to assign the available channels to the mobile stations. The optimal velocity threshold is adjusted to assign the available channels to the mobile stations using four handoff strategies. The four handoff strategies are evaluated and compared with each other in terms of GOS. Finally, the proposed scheme is validated by computer simulations.

  20. Handoff Triggering and Network Selection Algorithms for Load-Balancing Handoff in CDMA-WLAN Integrated Networks

    Directory of Open Access Journals (Sweden)

    Khalid Qaraqe

    2008-10-01

    Full Text Available This paper proposes a novel vertical handoff algorithm between WLAN and CDMA networks to enable the integration of these networks. The proposed vertical handoff algorithm assumes a handoff decision process (handoff triggering and network selection. The handoff trigger is decided based on the received signal strength (RSS. To reduce the likelihood of unnecessary false handoffs, the distance criterion is also considered. As a network selection mechanism, based on the wireless channel assignment algorithm, this paper proposes a context-based network selection algorithm and the corresponding communication algorithms between WLAN and CDMA networks. This paper focuses on a handoff triggering criterion which uses both the RSS and distance information, and a network selection method which uses context information such as the dropping probability, blocking probability, GoS (grade of service, and number of handoff attempts. As a decision making criterion, the velocity threshold is determined to optimize the system performance. The optimal velocity threshold is adjusted to assign the available channels to the mobile stations. The optimal velocity threshold is adjusted to assign the available channels to the mobile stations using four handoff strategies. The four handoff strategies are evaluated and compared with each other in terms of GOS. Finally, the proposed scheme is validated by computer simulations.

  1. Ubiquitous health monitoring system for multiple users using a ZigBee and WLAN dual-network.

    Science.gov (United States)

    Cha, Yong Dae; Yoon, Gilwon

    2009-11-01

    A ubiquitous health monitoring system for multiple users was developed based on a ZigBee and wireless local area network (WLAN) dual-network. A compact biosignal monitoring unit (BMU) for measuring electrocardiogram (ECG), photoplethysmogram (PPG), and temperature was also developed. A single 8-bit microcontroller operated the BMU including most of digital filtering and wireless communication. The BMU with its case was reduced to 55 x 35 x 15 mm and 33 g. In routine use, vital signs of 6 bytes/sec (heart rate, temperature, pulse transit time) per each user were transmitted through a ZigBee module even though all the real-time data were recorded in a secure digital memory of the BMU. In an emergency or when need arises, a channel of a particular user was switched to another ZigBee module, called the emergency module, that sent all ECG and PPG waveforms in real time. Each emergency ZigBee module handled up to a few users. Data from multiple users were wirelessly received by the ZigBee receiver modules in a controller called ZigBee-WLAN gateway, where the ZigBee modules were connected to a WLAN module. This WLAN module sent all data wirelessly to a monitoring center. Operating the dual modes of ZigBee/WLAN utilized an advantage of ZigBee by handling multiple users with minimum power consumption, and overcame the ZigBee limitation of low data rate. This dual-network system for LAN is economically competitive and reliable.

  2. Improved Association and Disassociation Scheme for Enhanced WLAN Handover and VHO

    OpenAIRE

    Sungjin Shin; Donghyuk Han; Hyoungjun Cho; Jong-Moon Chung

    2016-01-01

    The number of mobile devices and wireless connections is significantly increasing. Among many wireless protocol types, wireless local area networks (WLANs) are expected to support a significant number of devices. Due to this reason, effective and efficient handover (HO) and vertical handover (VHO) support for WLAN mobile devices is important. A significant improvement in quality of service (QoS) can be obtained by reducing the association and disassociation interruption time for user equipmen...

  3. Labeling Diversity for 2x2 WLAN Coded-Cooperative Networks

    Directory of Open Access Journals (Sweden)

    S. Ejaz

    2015-06-01

    Full Text Available Labelling diversity is an efficient technique recently proposed in the literature and aims to improve the bit error rate(BER performance of wireless local area network (WLAN systems with two transmit and two receive antennas without increasing the transmit power and bandwidth requirements. In this paper, we employ labelling diversity with different space-time channel codes such as convolutional, turbo and low density parity check (LDPC for both point-to-point and coded-cooperative communication scenarios. Joint iterative decoding schemes for distributed turbo and LDPC codes are also presented. BER performance bounds at an error floor (EF region are derived and verified with the help of numerical simulations for both cooperative and non-cooperative schemes. Numerical simulations show that the coded-cooperative schemes with labelling diversity achieve better BER performances and use of labelling diversity at the source node significantly lowers relay outage probability and hence the overall BER performance of the coded-cooperative scheme is improved manifolds.

  4. Analysis And Simulation Of Low Profile Planar Inverted - F Antenna Design For WLAN Operation In Portable Devices

    Directory of Open Access Journals (Sweden)

    Zaw Htet Lwin

    2015-08-01

    Full Text Available This paper presents a compact planar invertedF antenna PIFA design for WLAN operation in portable devices. The proposed design has size of 8 x 21 mm and provides peak directive gain of 5.78dBi with the peak return loss of -33.89dB and input impedance of 50.28amp8486. It covers a 10dB return loss bandwidth of 410MHz 2.37GHz 2.789GHz. Its VSWR varies from 1.96 to 1.93 within the antenna return loss bandwidth. As the dimension of the proposed antenna is very small the antenna is promising to be embedded within the different portable devices employing WiFi applications. This paper includes the return loss as a function of frequency with varying the different parameters VSWR input resistance radiation pattern and current distribution of the proposed antenna.

  5. WLAN vs. UMTS - The European Scene

    DEFF Research Database (Denmark)

    Tan, Su-En; Saugstrup, Dan; Olesen, Henning

    for further development/deployment of UMTS and WLAN services. More specifically, the paper discusses the technologies of "Voice over IP" (VoIP) and "Mobile over WLAN" through mobile devices, and the quasi-3G technology of EDGE, which could provide some of the same services as UMTS, but at a substantially...

  6. Recommended Practices Guide Securing WLANs using 802.11i

    Energy Technology Data Exchange (ETDEWEB)

    Masica, K

    2006-10-16

    This paper addresses design principles and best practices regarding the implementation and operation of Wireless LAN (WLAN) communication networks based on the 802.11i security standard. First, a general overview of WLAN technology and standards is provided in order to ground the discussion in the evolution of WLAN standards and security approaches. This is followed by a detailed explanation of the 802.11i standard for securing WLAN networks. Principles for designing secure WLAN networks are then presented, followed by a list of specific best practices that can be used as a guideline for organizations considering the deployment of WLAN networks for non-critical control and monitoring applications. Finally, a section on technical issues and considerations for deploying WLAN networks in critical environments is presented.

  7. SSTL Based Low Power Thermal Efficient WLAN Specific 32bit ALU Design on 28nm FPGA

    DEFF Research Database (Denmark)

    Kalia, Kartik; Pandey, Bishwajeet; Das, Teerath

    2016-01-01

    In this paper we have designed a Thermal energy efficient 32Bit ALU for network processor, the main objective of this design is to provide better thermal efficiency with respect to existing designs. For that purpose we have used six different members of SSTL I/Os standards on 28nm technology along...... with consideration of airflow toward hit sink and different frequency on which ALU operate in network processor or any WLAN devices. We have done total power analysis of WLAN operating on different frequencies. We have considered a set of frequencies, which are based on IEEE 802.11 standards. First we did...... at minimum and maximum temperature as compared to all other considered I/O standards. This design has application where 32bit ALU design is considered for designing an electronic device such as WLAN. The design can be implemented on different nano chips for better efficiency depending upon the design...

  8. Programming an Artificial Neural Network Tool for Spatial Interpolation in GIS - A Case Study for Indoor Radio Wave Propagation of WLAN

    Directory of Open Access Journals (Sweden)

    Umut Bulucu

    2008-09-01

    Full Text Available Wireless communication networks offer subscribers the possibilities of free mobility and access to information anywhere at any time. Therefore, electromagnetic coverage calculations are important for wireless mobile communication systems, especially in Wireless Local Area Networks (WLANs. Before any propagation computation is performed, modeling of indoor radio wave propagation needs accurate geographical information in order to avoid the interruption of data transmissions. Geographic Information Systems (GIS and spatial interpolation techniques are very efficient for performing indoor radio wave propagation modeling. This paper describes the spatial interpolation of electromagnetic field measurements using a feed-forward back-propagation neural network programmed as a tool in GIS. The accuracy of Artificial Neural Networks (ANN and geostatistical Kriging were compared by adjusting procedures. The feedforward back-propagation ANN provides adequate accuracy for spatial interpolation, but the predictions of Kriging interpolation are more accurate than the selected ANN. The proposed GIS ensures indoor radio wave propagation model and electromagnetic coverage, the number, position and transmitter power of access points and electromagnetic radiation level. Pollution analysis in a given propagation environment was done and it was demonstrated that WLAN (2.4 GHz electromagnetic coverage does not lead to any electromagnetic pollution due to the low power levels used. Example interpolated electromagnetic field values for WLAN system in a building of Yildiz Technical University, Turkey, were generated using the selected network architectures to illustrate the results with an ANN.

  9. Improved Association and Disassociation Scheme for Enhanced WLAN Handover and VHO

    Directory of Open Access Journals (Sweden)

    Sungjin Shin

    2016-01-01

    Full Text Available The number of mobile devices and wireless connections is significantly increasing. Among many wireless protocol types, wireless local area networks (WLANs are expected to support a significant number of devices. Due to this reason, effective and efficient handover (HO and vertical handover (VHO support for WLAN mobile devices is important. A significant improvement in quality of service (QoS can be obtained by reducing the association and disassociation interruption time for user equipment (UE servicing real-time applications during WLAN HO and VHO operations. Based on this focus, this paper investigates the problem of using only the received signal strength indicator (RSSI in HO and VHO decisions, which is what the current IEEE 802.11 based WLAN systems use. Experimental results presented in this paper demonstrate that only using the RSSI results in significant interruption time during HO to another WLAN access point (AP or to a cellular base station during VHO. Therefore, in this paper, an improved association and disassociation scheme that can reduce the data interruption time (DIT and improve the throughput performance is proposed.

  10. Cognitive Radio MAC Protocol for WLAN

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...... hole; moreover, it designs dual inband sensing scheme to detect primary user appearance. Additionally, C-CSMA/CA has the advantage to effectively solve the cognitive radio self-coexistence issues in the overlapping CR BSSs scenario. It also realizes station-based dynamic resource selection...

  11. WLAN Technologies for Audio Delivery

    Directory of Open Access Journals (Sweden)

    Nicolas-Alexander Tatlas

    2007-01-01

    Full Text Available Audio delivery and reproduction for home or professional applications may greatly benefit from the adoption of digital wireless local area network (WLAN technologies. The most challenging aspect of such integration relates the synchronized and robust real-time streaming of multiple audio channels to multipoint receivers, for example, wireless active speakers. Here, it is shown that current WLAN solutions are susceptible to transmission errors. A detailed study of the IEEE802.11e protocol (currently under ratification is also presented and all relevant distortions are assessed via an analytical and experimental methodology. A novel synchronization scheme is also introduced, allowing optimized playback for multiple receivers. The perceptual audio performance is assessed for both stereo and 5-channel applications based on either PCM or compressed audio signals.

  12. Handover Incentives for Self-Interested WLANs with Overlapping Coverage

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Siris, Vasilios A.

    2012-01-01

    We consider an environment where self-interested IEEE 802.11 Wireless Local Area Networks (WLANs) have overlapping coverage, and investigate the incentives that can trigger handovers between the WLANs. Our focus is on the incentives for supporting handovers due solely to the improved performance ...

  13. Polarization diverse antenna for dual-band WLAN applications

    CSIR Research Space (South Africa)

    Steyn, JM

    2009-10-01

    Full Text Available A dual-band dual-polarized (DBDP) configuration is proposed for wireless local area network (WLAN) applications. A four-element array is used to facilitate operation in both the standard WLAN frequency bands (IEEE 802.11b and IEEE 802.11a...

  14. A QoE Aware Fairness Bi-level Resource Allocation Algorithm for Multiple Video Streaming in WLAN

    Directory of Open Access Journals (Sweden)

    Hu Zhou

    2015-11-01

    Full Text Available With the increasing of smart devices such as mobile phones and tablets, the scenario of multiple video users watching video streaming simultaneously in one wireless local area network (WLAN becomes more and more popular. However, the quality of experience (QoE and the fairness among multiple users are seriously impacted by the limited bandwidth and shared resources of WLAN. In this paper, we propose a novel bi-level resource allocation algorithm. To maximize the total throughput of the network, the WLAN is firstly tuned to the optimal operation point. Then the wireless resource is carefully allocated at the first level, i.e., between AP and uplink background traffic users, and the second level, i.e., among downlink video users. The simulation results show that the proposed algorithm can guarantee the QoE and the fairness for all the video users, and there is little impact on the average throughput of the background traffic users.

  15. Performance analysis of channel assignment schemes for coordinated cognitive WLAN networks

    OpenAIRE

    Churchman Barata, Mathew William

    2009-01-01

    Nowadays local wireless networks are very used by an elevated number of people and its use continues rising. This provokes an increase of the interference and as consequence, congestion in the non-licensed band of 2.4GHz, caused by the increase of users in a given zone and thus, the limitation of channels offered by this band. As a solution to this problem, in this project it is studied the possibility of using additional channels from licensed bands used for other radio-communications servic...

  16. Capacity and performance study of IEEE 802.11e in WLANs and ad hoc networks

    OpenAIRE

    Mjøberg, Frank Roar

    2007-01-01

    This master thesis focuses on the IEEE 802.11e Enhanced Distribution Channel Access (EDCA). The IEEE 802.11e protocol became an IEEE standard in November 2005 and is a very popular research topic. Even though the protocol has been tested for faults and errors a long time there are still research topics to explore. This thesis will try to answer some of those topics. The main topic in this thesis is how the IEEE 802.11e MAC operates in a multihop ad hoc network. We discuss and evaluated th...

  17. AIS Algorithm for Smart Antenna Application in WLAN

    Directory of Open Access Journals (Sweden)

    Evizal Abdul Kadir

    2015-07-01

    Full Text Available Increasing numbers of wireless local area networks (WLAN replacing wired networks have an impact on wireless network systems, causing issues such as interference. The smart antenna system is a method to overcome interference issues in WLANs. This paper proposes an artificial immune system (AIS for a switch beam smart antenna system. A directional antenna is introduced to aim the beam at the desired user. The antenna consists of 8 directional antennas, each of which covers 45 degrees, thus creating an omnidirectional configuration of which the beams cover 360 degrees. To control the beam switching, an inexpensive PIC 16F877 microchip was used. An AIS algorithm was implemented in the microcontroller, which uses the received radio signal strength of the mobile device as reference. This is compared for each of the eight beams, after which the AIS algorithm selects the strongest signal received by the system and the microcontroller will then lock to the desired beam. In the experiment a frequency of 2.4 GHz (ISM band was used for transmitting and receiving. A test of the system was conducted in an outdoor environment. The results show that the switch beam smart antenna worked fine based on locating the mobile device.

  18. A flexible WLAN receiver

    NARCIS (Netherlands)

    Schiphorst, Roelof; Hoeksema, F.W.; Slump, Cornelis H.

    2003-01-01

    Flexible radio receivers are also called Software Defined Radios (SDRs) [1], [2]. The focus of our SDR project [3] is on designing the front end, from antenna to demodulation in bits, of a °exible, multi-standard WLAN receiver. We try to combine an instance of a (G)FSK receiver (Bluetooth) with an

  19. A solution of High-precision WLAN positioning based on TDOA and PTP

    Directory of Open Access Journals (Sweden)

    Zhou Junjie

    2016-01-01

    Full Text Available For indoor WLAN positioning it is difficult to achieve decimeter or centimeter-level precision questions, to IEEE1588v2 (PTP precision network clock synchronization technology and the arrival time difference principle (TDOA, combined with non line of sight (NLOS error mitigation techniques ranging research and design a set based on the existing WLAN (IEEE802.11x series of standards device with high precision realtime location solutions. First, build a high-performance software-defined radio network communications platform, for accurate measurement of the radio signal arrival time and is calculated based on TDOA location. Secondly, the use of high-precision clock IEEE1588v2 standard equipment PTPGrand-2100 as a network clock source, through the integrated application of multi-hop latency compensation and asymmetric compensation algorithm to ensure nanosecond clock synchronization between the various WLAN access points (AP accuracy(Experiments show that 1 nanosecond time synchronization error is equivalent to 10 to 30 cm of positioning error. Finally, based NLOS error becomes stability principle, filtered NLOS error and pre-positioned before the data, eliminate the influence of the greatest degree of NLOS error, the time domain error control in wireless ranging 5ns or less to achieve decimeter or more accurately estimate the position. The case can be widely used in mobile Internet, logistics management, mineral exploration, health and other needs of the precise location services (LBS in other industry sectors.

  20. Using Weighted Graphs for Computationally Efficient WLAN Location Determination

    DEFF Research Database (Denmark)

    Thomsen, Bent; Hansen, Rene

    2007-01-01

    Indoor location-based services hold promise for a multitude of valuable services, but require micro-detailed geo-referencing not achievable with "outdoor" technologies such as GPS and cellular networks. A widely used technique for accurate indoor positioning is location fingerprinting which makes...... use of existing WLAN infrastructures. The technique consists of building a radio map of signal strength measurements which is searched to determine a position estimate. While the fingerprinting technique has produced good positioning accuracy results, the technique incurs a substantial computational...... burden for large buildings and is thus problematic for tracking users in real time on processor-constrained mobile devices. In this paper we present a technique for improving the computational efficiency of the fingerprinting technique such that location determination becomes tractable on a mobile device...

  1. Codebook Selection Strategies in Long-range Sub-1 GHz WLANs

    NARCIS (Netherlands)

    Aust, S.; Venkatesha Prasad, R.R.; Niemegeers, I.G.M.M.

    2014-01-01

    The new long-range WLANs will enable a simple and cost-efficient setup of wireless ambient systems, including smart city and smart grid communication networks. The emerging IEEE 802.11ah WLAN standard utilizes carrier frequencies at 900 MHz in the ISM-band and facilitates multi-antenna MIMO-OFDM. In

  2. Pre-Authentication Schemes for UMTS-WLAN Interworking

    Directory of Open Access Journals (Sweden)

    Al Shidhani Ali

    2009-01-01

    Full Text Available Abstract Interworking Universal Mobile Telecommunication System (UMTS and IEEE 802.11 Wireless Local Area Networks (WLANs introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS of the applications running on the User Equipment (UE. There is a need to design fast and secured handover protocols to operate in UMTS-WLAN interworking architectures. This paper proposes two secured pre-authentication protocols in the UMTS-WLAN interworking architectures. Performance analysis of the proposed protocols show superior results in comparison to existing protocols in terms of authentication signaling cost, authentication delay and load on critical nodes involved in the authentication procedure. Additionally, the security of the proposed protocols was verified by the Automated Validation of Internet Security Protocols and Applications (AVISPA security analyzer.

  3. Pre-Authentication Schemes for UMTS-WLAN Interworking

    Directory of Open Access Journals (Sweden)

    Ali Al Shidhani

    2009-01-01

    Full Text Available Interworking Universal Mobile Telecommunication System (UMTS and IEEE 802.11 Wireless Local Area Networks (WLANs introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS of the applications running on the User Equipment (UE. There is a need to design fast and secured handover protocols to operate in UMTS-WLAN interworking architectures. This paper proposes two secured pre-authentication protocols in the UMTS-WLAN interworking architectures. Performance analysis of the proposed protocols show superior results in comparison to existing protocols in terms of authentication signaling cost, authentication delay and load on critical nodes involved in the authentication procedure. Additionally, the security of the proposed protocols was verified by the Automated Validation of Internet Security Protocols and Applications (AVISPA security analyzer.

  4. Interference Effects of Blue tooth on WLAN Performance | Okhaifor ...

    African Journals Online (AJOL)

    In this paper, Network stumbler version 0.4.0 was used to estimate the impact of impulsive interference on Wireless Local Area Network (WLAN) when Bluetooth coexist by measuring radiation from a WiFi Access Point (AP) in a homogeneous and heterogeneous scenarios. The parameters measured include Received ...

  5. Multidimensional Optimization of Signal Space Distance Parameters in WLAN Positioning

    Directory of Open Access Journals (Sweden)

    Milenko Brković

    2014-01-01

    Full Text Available Accurate indoor localization of mobile users is one of the challenging problems of the last decade. Besides delivering high speed Internet, Wireless Local Area Network (WLAN can be used as an effective indoor positioning system, being competitive both in terms of accuracy and cost. Among the localization algorithms, nearest neighbor fingerprinting algorithms based on Received Signal Strength (RSS parameter have been extensively studied as an inexpensive solution for delivering indoor Location Based Services (LBS. In this paper, we propose the optimization of the signal space distance parameters in order to improve precision of WLAN indoor positioning, based on nearest neighbor fingerprinting algorithms. Experiments in a real WLAN environment indicate that proposed optimization leads to substantial improvements of the localization accuracy. Our approach is conceptually simple, is easy to implement, and does not require any additional hardware.

  6. Networked Attached Devices at SNS

    CERN Document Server

    Blokland, W

    2003-01-01

    The Spallation Neutron Source (SNS) diagnostic instruments at Oak Ridge National Laboratory are based on the Network Attached Device (NAD) concept. Each pickup or sensor has its own resources such as timing, data acquisition and processing. NADs are individually connected to the network, thus reducing the brittleness inherent in tightly coupled systems. This architecture allows an individual device to fail or to be serviced or removed without disrupting other devices. This paper describes our implementation of the nearly 400 NADs to be deployed. The hardware consists of rack-mounted PCs with standard motherboards and PCI data-acquisition boards. The software environment is based on LabVIEW and EPICS. LabVIEW supports the agile development demanded by modern diagnostic systems. EPICS is the control system standard for the entire SNS facility. To achieve high performance, LabVIEW and EPICS communicate through shared memory. SNS diagnostics are developed by a multi-laboratory partnership including ORNL, BNL, LAN...

  7. Hybrid Indoor-Based WLAN-WSN Localization Scheme for Improving Accuracy Based on Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    Zahid Farid

    2016-01-01

    Full Text Available In indoor environments, WiFi (RSS based localization is sensitive to various indoor fading effects and noise during transmission, which are the main causes of localization errors that affect its accuracy. Keeping in view those fading effects, positioning systems based on a single technology are ineffective in performing accurate localization. For this reason, the trend is toward the use of hybrid positioning systems (combination of two or more wireless technologies in indoor/outdoor localization scenarios for getting better position accuracy. This paper presents a hybrid technique to implement indoor localization that adopts fingerprinting approaches in both WiFi and Wireless Sensor Networks (WSNs. This model exploits machine learning, in particular Artificial Natural Network (ANN techniques, for position calculation. The experimental results show that the proposed hybrid system improved the accuracy, reducing the average distance error to 1.05 m by using ANN. Applying Genetic Algorithm (GA based optimization technique did not incur any further improvement to the accuracy. Compared to the performance of GA optimization, the nonoptimized ANN performed better in terms of accuracy, precision, stability, and computational time. The above results show that the proposed hybrid technique is promising for achieving better accuracy in real-world positioning applications.

  8. Security aspects of 3G-WLAN interworking

    DEFF Research Database (Denmark)

    Køien, Geir M.

    2003-01-01

    to roaming and mobility support. In short, WLAN systems are great for hot spot coverage, while 3G systems provide global coverage and the necessary network and management infrastructure to cater for security, roaming, and charging requirements. The focus of the article is on security aspects of 3GPP...

  9. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  10. Novel Concepts for Device to Device Communication using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Hundebøll, Martin; Pedersen, Morten Videbæk

    2014-01-01

    Device-to-device communication is currently a hot research topic within 3GPP. Even though D2D communication has been part of previous ad hoc, meshed and sensor networks proposals, the main contribution by 3GPP is that the direct communication among two devices is carried out over a dynamically...

  11. Protecting and securing networked medical devices.

    Science.gov (United States)

    Riha, Chris

    2004-01-01

    Designing, building, and maintaining a secure environment for medical devices is a critical component in health care technology management. This article will address several avenues to harden a health care information network to provide a secure enclave for medical devices.

  12. Research of WLAN CAN Bus Data Test System

    Science.gov (United States)

    Wu, Weibin; Zhu, Yuqing; Hong, Tiansheng; Ye, Cheng; Ye, Zhijie; He, Guangbin; Li, Haobiao

    Both controller area network (CAN) and wireless local area network (WLAN) bus technologies are developing rapidly nowadays. But the study on WLAN technology with CAN bus data is relative to be less researched. So a WLAN CAN bus data test system was present in this paper. The system hardware consists of two control modules, each of which consistently allows link test to the CAN bus network. Each hardware of the module is composed by a microcontroller STC12C5410AD, a CAN bus control unit MCP2515, a CAN bus transceiver MCP2551 and a RF wireless module RF903. During the test process, the CAN bus analyzer, Kvaser USBCAN II, receives and dispatches the CAN messages. Test results showed that the system's error score was approximately zero when messages are transmitted and the system can message transmission from one side of CAN panel point to the other side. The communication of the system is suitable for the CAN treaty standard and it can allow wireless message transmission to other suitable networks meeting the CAN treaty standard as well. Finally the system has been applied to the project for hill citrus leaf area index (LAI) acquisition.

  13. A novel network module for medical devices.

    Science.gov (United States)

    Chen, Ping-Yu

    2008-01-01

    In order to allow medical devices to upload the vital signs to a server on a network without manually configuring for end-users, a new network module is proposed. The proposed network module, called Medical Hub (MH), functions as a bridge to fetch the data from all connecting medical devices, and then upload these data to the server. When powering on, the MH can immediately establish network configuration automatically. Network Address Translation (NAT) traversal is also supported by the MH with the UPnP Internet Gateway Device (IGD) methodology. Besides the network configuration, other configuration in the MH is automatically established by using the remote management protocol TR-069. On the other hand, a mechanism for updating software automatically according to the variant connected medical device is proposed. With this mechanism, newcome medical devices can be detected and supported by the MH without manual operation.

  14. Efficient and Accurate WLAN Positioning with Weighted Graphs

    DEFF Research Database (Denmark)

    Hansen, Rene; Thomsen, Bent

    2009-01-01

    of the indoor environment to improve positioning accuracy and computational efficiency by only considering the subset of locations in the radio map that are feasible to reach from a previously estimated position. The technique is general and can be used on top of any existing location system. Our results......This paper concerns indoor location determination by using existing WLAN infrastructures and WLAN enabled mobile devices. The location fingerprinting technique performs localization by first constructing a radio map of signal strengths from nearby access points. The radio map is subsequently...... searched using a classification algorithm to determine a location estimate. This paper addresses two distinct challenges of location fingerprinting incurred by positioning moving users. Firstly, movement affects the positioning accuracy negatively due to increased signal strength fluctuations. Secondly...

  15. Compact Dual-Band Dipole Antenna with Asymmetric Arms for WLAN Applications

    Directory of Open Access Journals (Sweden)

    Chung-Hsiu Chiu

    2014-01-01

    Full Text Available A dual-band dipole antenna that consists of a horn- and a C-shaped metallic arm is presented. Depending on the asymmetric arms, the antenna provides two −10 dB impedance bandwidths of 225 MHz (about 9.2% at 2.45 GHz and 1190 MHz (about 21.6% at 5.5 GHz, respectively. This feature enables it to cover the required bandwidths for wireless local area network (WLAN operation at the 2.4 GHz band and 5.2/5.8 GHz bands for IEEE 802.11 a/b/g standards. More importantly, the compact size (7 mm × 24 mm and good radiating performance of the antenna are profitable to be integrated with wireless communication devices on restricted RF-elements spaces.

  16. Electronic device aspects of neural network memories

    Science.gov (United States)

    Lambe, J.; Moopenn, A.; Thakoor, A. P.

    1985-01-01

    The basic issues related to the electronic implementation of the neural network model (NNM) for content addressable memories are examined. A brief introduction to the principles of the NNM is followed by an analysis of the information storage of the neural network in the form of a binary connection matrix and the recall capability of such matrix memories based on a hardware simulation study. In addition, materials and device architecture issues involved in the future realization of such networks in VLSI-compatible ultrahigh-density memories are considered. A possible space application of such devices would be in the area of large-scale information storage without mechanical devices.

  17. A Channel Assignment Extension of Active Access-Point Configuration Algorithm for Elastic WLAN System and Its Implementation Using Raspberry Pi

    National Research Council Canada - National Science Library

    Mamun, Md. Selim Al; Funabiki, Nobuo; Lwin, Kyaw Soe; Islam, Md. Ezharul; Kao, Wen-Chung

    2017-01-01

    Recently, Wireless Local-Area Network (WLAN) has become prevailing as it provides flexible Internet access to users with low cost through installation of several types of access points (APs) in the network...

  18. Coexistence issues for a 2.4 GHz wireless audio streaming in presence of bluetooth paging and WLAN

    Science.gov (United States)

    Pfeiffer, F.; Rashwan, M.; Biebl, E.; Napholz, B.

    2015-11-01

    Nowadays, customers expect to integrate their mobile electronic devices (smartphones and laptops) in a vehicle to form a wireless network. Typically, IEEE 802.11 is used to provide a high-speed wireless local area network (WLAN) and Bluetooth is used for cable replacement applications in a wireless personal area network (PAN). In addition, Daimler uses KLEER as third wireless technology in the unlicensed (UL) 2.4 GHz-ISM-band to transmit full CD-quality digital audio. As Bluetooth, IEEE 802.11 and KLEER are operating in the same frequency band, it has to be ensured that all three technologies can be used simultaneously without interference. In this paper, we focus on the impact of Bluetooth and IEEE 802.11 as interferer in presence of a KLEER audio transmission.

  19. A Study of WLAN Campus in an Educational Establishment

    Directory of Open Access Journals (Sweden)

    Taghareed Abdul-Hameed

    2009-10-01

    Full Text Available the main aim of campus network is to efficiently separate, share and access knowledge among its users. The big demand of such systems of distributed knowledge networks is to be able to handle advanced applications which are the end-user requirements. The main goal of this study is to assess the ability of WLAN campus to dealing with applications request of end users in education establishments and network achievement under different conditions of operation. The study has been conducted in two stages: the first stage was accomplished by conducting a survey, using the Student Village network at Anglia Ruskin University as a case study; the main aim was to determine end-use requirements, gather information about the nature applications running by users and get a view about the likely future applications. The second stage was achieved by conducting experiments to evaluate the WLAN campus network performance under various different scenarios: impact of handover from Access Point (AP to another AP on end-user link performance, network performance in different usage time and network performance in different weather conditions.

  20. IEEE 802.1 (WLAN) -verkkojen tietoturva

    OpenAIRE

    Moilanen, Ilkka

    2014-01-01

    Tämän työn tarkoituksena on käydä läpi WLAN/Wi-Fi-verkkojen tietoturvaa ja tarkastella, miten turvallisia ovat avoimet WLAN-verkot tai WEP-, WPA/WPA2 + WPS suojatut WLAN-verkot. Työssä käydään myös läpi WLAN-verkkojen tuomia uhkia tavalliselle käyttäjälle ja miten tällaisilta uhkilta voidaan suojautua. Työssä on myös tarkoitus teorian lisäksi toteuttaa osa hyökkäyksistä, jotta saadaan parempi kuva siitä, miten tällaiset hyökkäykset oikeasti toimivat. WEP-salaus osoittautui odotusten m...

  1. Determination of the duty cycle of WLAN for realistic radio frequency electromagnetic field exposure assessment.

    Science.gov (United States)

    Joseph, Wout; Pareit, Daan; Vermeeren, Günter; Naudts, Dries; Verloock, Leen; Martens, Luc; Moerman, Ingrid

    2013-01-01

    Wireless Local Area Networks (WLANs) are commonly deployed in various environments. The WLAN data packets are not transmitted continuously but often worst-case exposure of WLAN is assessed, assuming 100% activity and leading to huge overestimations. Actual duty cycles of WLAN are thus of importance for time-averaging of exposure when checking compliance with international guidelines on limiting adverse health effects. In this paper, duty cycles of WLAN using Wi-Fi technology are determined for exposure assessment on large scale at 179 locations for different environments and activities (file transfer, video streaming, audio, surfing on the internet, etc.). The median duty cycle equals 1.4% and the 95th percentile is 10.4% (standard deviation SD = 6.4%). Largest duty cycles are observed in urban and industrial environments. For actual applications, the theoretical upper limit for the WLAN duty cycle is 69.8% and 94.7% for maximum and minimum physical data rate, respectively. For lower data rates, higher duty cycles will occur. Although counterintuitive at first sight, poor WLAN connections result in higher possible exposures. File transfer at maximum data rate results in median duty cycles of 47.6% (SD = 16%), while it results in median values of 91.5% (SD = 18%) at minimum data rate. Surfing and audio streaming are less intensively using the wireless medium and therefore have median duty cycles lower than 3.2% (SD = 0.5-7.5%). For a specific example, overestimations up to a factor 8 for electric fields occur, when considering 100% activity compared to realistic duty cycles. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Embedded Network Protocols for Mobile Devices

    Science.gov (United States)

    Galataki, Despo; Radulescu, Andrei; Verstoep, Kees; Fokkink, Wan

    Embedded networks for chip-to-chip networks are emerging as communication infrastructure in mobile devices. We present three novel embedded network protocols: a sliding window protocol, a protocol for opening and closing connections, and a bandwidth reservation protocol. The design of these protocols is tailored to the low power and low cost requirements of mobile devices. The model checker SPIN played an important role in the design and analysis of these protocols. Large instances of the protocols could be analyzed successfully using the distributed model checker DiVinE.

  3. Signal processing devices and networks

    Science.gov (United States)

    Graveline, S. W.

    1985-02-01

    According to an axiom employed with respect to electronic warfare (EW) behavior, system effectiveness increases directly with the amount of information recovered from an intercepted signal. The evolution in EW signal processing capability has proceeded accordingly. After an initiation of EW systems as broadband receivers, the most significant advance was related to the development of digital instantaneous frequency measurement (DIFM) devices. The use of such devices provides significant improvements regarding signal identification and RF measurement to within a few MHz. An even more accurate processing device, the digital RF memory (DRFM), allows frequency characterization to within a few Hz. This invention was made in response to the need to process coherent pulse signals. Attention is given to the generic EW system, the modern EW system, and the generic receiver function for a modern EW system showing typical output signals.

  4. A Multi-QoS Aggregation Mechanism for Improved Fairness in WLAN

    DEFF Research Database (Denmark)

    Gatnau, Marta; Catania, Davide; Cattoni, Andrea Fabio

    2013-01-01

    The 802.11e and subsequently the 802.11n amendments brought Quality of Service (QoS) into the Wireless Local Area Network (WLAN) arena, in order to provide higher access priority to certain types of traffic such as video and voice. Unfortunately these improvements are not enough, since in very de...

  5. Virtual MIMO Beamforming and Device Pairing Enabled by Device-to-Device Communications for Multidevice Networks

    Directory of Open Access Journals (Sweden)

    Yeonjin Jeong

    2017-01-01

    Full Text Available We consider a multidevice network with asymmetric antenna configurations which supports not only communications between an access point and devices but also device-to-device (D2D communications for the Internet of things. For the network, we propose the transmit and receive beamforming with the channel state information (CSI for virtual multiple-input multiple-output (MIMO enabled by D2D receive cooperation. We analyze the sum rate achieved by a device pair in the proposed method and identify the strategies to improve the sum rate of the device pair. We next present a distributed algorithm and its equivalent algorithm for device pairing to maximize the throughput of the multidevice network. Simulation results confirm the advantages of the transmit CSI and D2D cooperation as well as the validity of the distributive algorithm.

  6. Design control system of telescope force actuators based on WLAN

    Science.gov (United States)

    Shuai, Xiaoying; Zhang, Zhenchao

    2010-05-01

    With the development of the technology of autocontrol, telescope, computer, network and communication, the control system of the modern large and extra lager telescope become more and more complicated, especially application of active optics. Large telescope based on active optics maybe contain enormous force actuators. This is a challenge to traditional control system based on wired networks, which result in difficult-to-manage, occupy signification space and lack of system flexibility. Wireless network can resolve these disadvantages of wired network. Presented control system of telescope force actuators based on WLAN (WFCS), designed the control system framework of WFCS. To improve the performance of real-time, we developed software of force actuators control system in Linux. Finally, this paper discussed improvement of WFCS real-time, conceived maybe improvement in the future.

  7. WLAN-verkon suunnittelu ja asennus

    OpenAIRE

    Ruuskanen, Ville

    2013-01-01

    Tässä insinöörityössä esitellään WLAN-verkon suunnittelu radiopeittomittaustekniikalla käyttäen AirMagnet-ohjelmaa. Työssä toteutetaan WLAN-verkko mahdollisimman vähillä tukiasemilla saavuttaen kuitenkin verkolle asetetut tavoitteet siirtokapasiteetista sekä sig-naalin voimakkuudesta. Radiopeittomittauksissa käytettiin kannettavaa tietokonetta, johon oli asennettu AirMagnet 802.11a/b/g/n -verkkokortti ja AirMagnet Survey Pro -ohjelma. Ohjelma mittaa signaalin voimakkuuden, jonka lisäksi se la...

  8. TRENDS IN THE CONVERGENCE OF WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    Daniel SORA

    2011-01-01

    Full Text Available In today’s technological market, there are many types of networks. These networks include wireless personal area networks (WPANs, wireless local area networks (WLANs, wireless metropolitan area networks (WMANs, and cellular networks. A vision of a future convergence of networks envisaged for WPANs, WLANs, WiMax, and cellular networks is presented in this paper.

  9. POINT COORDINATION FUNCTION WLAN TRAFFIC LOADINGS

    African Journals Online (AJOL)

    UNN

    DCF function is contention based and is supported by carrier sense multiple access with collision avoidance (CSMA/CA) protocol [7, 8]. The CSMA/CA media access control (MAC) protocol of IEEE WLAN is a unique way of avoiding the collision of the user packets when the traffic sources transmit bursty packets [3, 4, 5, 6].

  10. Received Signal Strength Recovery in Green WLAN Indoor Positioning System Using Singular Value Thresholding

    Directory of Open Access Journals (Sweden)

    Lin Ma

    2015-01-01

    Full Text Available Green WLAN is a promising technique for accessing future indoor Internet services. It is designed not only for high-speed data communication purposes but also for energy efficiency. The basic strategy of green WLAN is that all the access points are not always powered on, but rather work on-demand. Though powering off idle access points does not affect data communication, a serious asymmetric matching problem will arise in a WLAN indoor positioning system due to the fact the received signal strength (RSS readings from the available access points are different in their offline and online phases. This asymmetry problem will no doubt invalidate the fingerprint algorithm used to estimate the mobile device location. Therefore, in this paper we propose a green WLAN indoor positioning system, which can recover RSS readings and achieve good localization performance based on singular value thresholding (SVT theory. By solving the nuclear norm minimization problem, SVT recovers not only the radio map, but also online RSS readings from a sparse matrix by sensing only a fraction of the RSS readings. We have implemented the method in our lab and evaluated its performances. The experimental results indicate the proposed system could recover the RSS readings and achieve good localization performance.

  11. Received signal strength recovery in green WLAN indoor positioning system using singular value thresholding.

    Science.gov (United States)

    Ma, Lin; Xu, Yubin

    2015-01-12

    Green WLAN is a promising technique for accessing future indoor Internet services. It is designed not only for high-speed data communication purposes but also for energy efficiency. The basic strategy of green WLAN is that all the access points are not always powered on, but rather work on-demand. Though powering off idle access points does not affect data communication, a serious asymmetric matching problem will arise in a WLAN indoor positioning system due to the fact the received signal strength (RSS) readings from the available access points are different in their offline and online phases. This asymmetry problem will no doubt invalidate the fingerprint algorithm used to estimate the mobile device location. Therefore, in this paper we propose a green WLAN indoor positioning system, which can recover RSS readings and achieve good localization performance based on singular value thresholding (SVT) theory. By solving the nuclear norm minimization problem, SVT recovers not only the radio map, but also online RSS readings from a sparse matrix by sensing only a fraction of the RSS readings. We have implemented the method in our lab and evaluated its performances. The experimental results indicate the proposed system could recover the RSS readings and achieve good localization performance.

  12. Ubiquitous and Seamless Localization: Fusing GNSS Pseudoranges and WLAN Signal Strengths

    Directory of Open Access Journals (Sweden)

    Philipp Richter

    2017-01-01

    Full Text Available Ubiquitous global positioning is not feasible by GNSS alone, as it lacks accurate position fixes in dense urban centres and indoors. Hybrid positioning methods have been developed to aid GNSS in those environments. Fingerprinting localization in wireless local area networks (WLANs is a promising aiding system because of its availability, accuracy, and error mechanisms opposed to that of GNSS. This article presents a low-cost approach to ubiquitous, seamless positioning based on a particle filter integrating GNSS pseudoranges and WLAN received signal strength indicators (RSSIs. To achieve accurate location estimates indoors/outdoors and in the transition zones, appropriate likelihood functions are essential as they determine the influence of each sensor information on the position estimate. We model the spatial RSSI distributions with Gaussian processes and use these models to predict RSSIs at the particle’s positions to obtain point estimates of the RSSI likelihood function. The particle filter’s performance is assessed with real data of two test trajectories in an environment challenging for GNSS and WLAN fingerprinting localization. Outcomes of an extended Kalman filter using pseudoranges and a WLAN position as observation is included as benchmark. The proposed algorithm achieves accurate and robust seamless localization with a median accuracy of five meters.

  13. Intelligent Devices in Rural Wireless Networks

    Directory of Open Access Journals (Sweden)

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  14. The Feasibility, Semantics, and Scope of Mobile Wireless Device-to-Device Networking

    OpenAIRE

    Wirtz, Hanno

    2015-01-01

    Wireless networking technology, as prevalently realized according to the IEEE 802.11 standard, successfully complements wired access to local networks and the Internet. Current mobile devices, such as smartphones, manifest wireless networking within everyday mobile scenarios and diverse and dynamic device-to-device (D2D) communication contexts that are independent from any network infrastructure, motivating the research directions of Mobile Ad-Hoc, Delay Tolerant, and Opportunistic Networking...

  15. Implantable Medical Devices; Networking Security Survey

    Directory of Open Access Journals (Sweden)

    Siamak Aram

    2016-08-01

    Full Text Available The industry of implantable medical devices (IMDs is constantly evolving, which is dictated by the pressing need to comprehensively address new challenges in the healthcare field. Accordingly, IMDs are becoming more and more sophisticated. Not long ago, the range of IMDs’ technical capacities was expanded, making it possible to establish Internet connection in case of necessity and/or emergency situation for the patient. At the same time, while the web connectivity of today’s implantable devices is rather advanced, the issue of equipping the IMDs with sufficiently strong security system remains unresolved. In fact, IMDs have relatively weak security mechanisms which render them vulnerable to cyber-attacks that compromise the quality of IMDs’ functionalities. This study revolves around the security deficiencies inherent to three types of sensor-based medical devices; biosensors, insulin pump systems and implantable cardioverter defibrillators. Manufacturers of these devices should take into consideration that security and effectiveness of the functionality of implants is highly dependent on the design. In this paper, we present a comprehensive study of IMDs’ architecture and specifically investigate their vulnerabilities at networking interface.

  16. The impact of wireless device access on content delivery networks

    OpenAIRE

    Denney, Justin; Race, Nicholas

    2003-01-01

    Content delivery network architectures are initiatives designed to support the effective delivery of continuous and discrete media to end-users. Mobile devices are now capable of exploiting services such as content delivery, but with the protocols governing the content delivery networks designed for wired networked topologies; an assessment of the impact of mobile devices on the network has never been undertaken. Wireless devices access causes significant issues in the ability of the media tr...

  17. Space partitioning strategies for indoor WLAN positioning with cascade-connected ANN structures.

    Science.gov (United States)

    Borenović, Miloš; Nešković, Aleksandar; Budimir, Djuradj

    2011-02-01

    Position information in indoor environments can be procured using diverse approaches. Due to the ubiquitous presence of WLAN networks, positioning techniques in these environments are the scope of intense research. This paper explores two strategies for space partitioning when utilizing cascade-connected Artificial Neural Networks (ANNs) structures for indoor WLAN positioning. A set of cascade-connected ANN structures with different space partitioning strategies are compared mutually and to the single ANN structure. The benefits of using cascade-connected ANNs structures are shown and discussed in terms of the size of the environment, number of subspaces and partitioning strategy. The optimal cascade-connected ANN structures with space partitioning show up to 50% decrease in median error and up to 12% decrease in the average error with respect to the single ANN model. Finally, the single ANN and the optimal cascade-connected ANN model are compared against other well-known positioning techniques.

  18. Performance Analysis of a Burst Transmission Mechanism Using Microsleep Operation for Green IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Raul Palacios-Trujillo

    2017-07-01

    Full Text Available This paper evaluates the performance of a burst transmission mechanism using microsleep operation to support high energy efficiency in IEEE 802.11 Wireless Local Area Networks (WLANs. This mechanism is an implementation of the IEEE 802.11ac Transmission Opportunity Power Save Mode (TXOP PSM. A device using the TXOP PSM-based mechanism can switch to a low-power sleep state for the time that another device transmits a burst of data frames to a third one. This operation is called microsleep and its feasibility strongly depends on the time and energy consumption that a device incurs in the transitions from and to the sleep state. This paper accounts for the impact of these transitions in the derivation of an analytical model to calculate the energy efficiency of the TXOP PSM-based mechanism under network saturation. Results obtained show that the impact of the transition requirements on the feasibility of microsleep operation can be significant depending on the selected system parameters, although it can be reduced by using burst transmissions. When microsleep operation is feasible, the TXOP PSM-based mechanism can improve the energy efficiency of other legacy mechanisms by up to 424% under high traffic loads.

  19. Exposure to radio frequency electromagnetic fields from wireless computer networks: duty factors of Wi-Fi devices operating in schools.

    Science.gov (United States)

    Khalid, M; Mee, T; Peyman, A; Addison, D; Calderon, C; Maslanyj, M; Mann, S

    2011-12-01

    The growing use of wireless local area networks (WLAN) in schools has prompted a study to investigate exposure to the radio frequency (RF) electromagnetic fields from Wi-Fi devices. International guidelines on limiting the adverse health effects of RF, such as those of ICNIRP, allow for time-averaging of exposure. Thus, as Wi-Fi signals consist of intermittent bursts of RF energy, it is important to consider the duty factors of devices in assessing the extent of exposure and compliance with guidelines. Using radio packet capture methods, the duty factor of Wi-Fi devices has been assessed in a sample of 6 primary and secondary schools during classroom lessons. For the 146 individual laptops investigated, the range of duty factors was from 0.02 to 0.91%, with a mean of 0.08% (SD 0.10%). The duty factors of access points from 7 networks ranged from 1.0% to 11.7% with a mean of 4.79% (SD 3.76%). Data gathered with transmit time measuring devices attached to laptops also showed similar results. Within the present limited sample, the range of duty factors from laptops and access points were found to be broadly similar for primary and secondary schools. Applying these duty factors to previously published results from this project, the maximum time-averaged power density from a laptop would be 220 μW m(-2), at a distance of 0.5 m and the peak localised SAR predicted in the torso region of a 10 year old child model, at 34 cm from the antenna, would be 80 μW kg(-1). Crown Copyright © 2011. Published by Elsevier Ltd. All rights reserved.

  20. Sensing motion using spectral and spatial analysis of WLAN RSSI

    NARCIS (Netherlands)

    Kavitha Muthukrishnan, K.; Lijding, M.E.M.; Meratnia, Nirvana; Havinga, Paul J.M.

    2007-01-01

    In this paper we present how motion sensing can be obtained just by observing the WLAN radio signal strength and its fluctuations. The temporal, spectral and spatial characteristics of WLAN signal are analyzed. Our analysis confirms our claim that ’signal strength from access points appear to jump

  1. Throughput, Energy and Overhead of Multicast Device-to-Device Communications with Network Coded Cooperation

    DEFF Research Database (Denmark)

    Hernandez Marcano, Nestor Javier; Heide, Janus; Lucani Rötter, Daniel Enrique

    2016-01-01

    Cooperation strategies in mobile networks typically rely in short range technologies, like LTE-A Device to Device (D2D) communications, for data exchange between devices forming mobile clouds. These communications provide a better device experience since the clouds offload the network. Nevertheless......, this assumes that the throughput gains and energy savings in multicasting are much larger between devices than the base station to the receivers. However, current mobile networks suffer from many different issues varying the performance in data rates, which calls into question these assumptions. Therefore...

  2. Aspect Ratio of Receiver Node Geometry based Indoor WLAN Propagation Model

    Science.gov (United States)

    Naik, Udaykumar; Bapat, Vishram N.

    2017-08-01

    This paper presents validation of indoor wireless local area network (WLAN) propagation model for varying rectangular receiver node geometry. The rectangular client node configuration is a standard node arrangement in computer laboratories of academic institutes and research organizations. The model assists to install network nodes for the better signal coverage. The proposed model is backed by wide ranging real time received signal strength measurements at 2.4 GHz. The shadow fading component of signal propagation under realistic indoor environment is modelled with the dependency on varying aspect ratio of the client node geometry. The developed new model is useful in predicting indoor path loss for IEEE 802.11b/g WLAN. The new model provides better performance in comparison to well known International Telecommunication Union and free space propagation models. It is shown that the proposed model is simple and can be a useful tool for indoor WLAN node deployment planning and quick method for the best utilisation of the office space.

  3. Security of Mobile Devices and Wi-Fi Networks

    OpenAIRE

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  4. Towards Device-Independent Information Processing on General Quantum Networks

    Science.gov (United States)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  5. Reducing Energy Waste Due to Idle Network Devices

    OpenAIRE

    Khan, Rafiullah; Khan, Sarmad Ullah

    2017-01-01

    Network devices always demand full time Internet connectivity for remote access, VoIP & Instant Messaging (IM) clients and other Internet based applications. Their built-in low power management features are usually disabled by users due to their incapability of maintaining network connectivity. The concept of Network Connectivity Proxy (NCP) has recently been proposed as an effective mechanism for reducing energy waste by impersonating presence of sleeping devices. However, proposed strat...

  6. Interference Measurements and Throughput Analysis for 2.4 GHz Wireless Devices in Hospital Environments

    OpenAIRE

    Krishnamoorthy, Seshagiri

    2003-01-01

    In recent years, advancements in the field of wireless communication have led to more innovative consumer products at reduced cost. Over the next 2 to 5 years, short-range wireless devices such as Bluetooth and Wireless Local Area Networks (WLANs) are expected to become widespread throughout hospital environments for various applications. Consequently the medical community views wireless applications as ineludible and necessary. However, currently there exist regulations on the use of wireles...

  7. A CPW-Fed Rectangular Ring Monopole Antenna for WLAN Applications

    Directory of Open Access Journals (Sweden)

    Sangjin Jo

    2014-01-01

    Full Text Available We present a simple coplanar waveguide- (CPW- fed rectangular ring monopole antenna designed for dual-band wireless local area network (WLAN applications. The antenna is based on a simple structure composed of a CPW feed line and a rectangular ring. Dual-band WLAN operation can be achieved by controlling the distance between the rectangular ring and the ground plane of the CPW feed line, as well as the horizontal vertical lengths of the rectangular ring. Simulated and measured data show that the antenna has a compact size of 21.4×59.4 mm2, an impedance bandwidths of 2.21–2.70 GHz and 5.04–6.03 GHz, and a reflection coefficient of less than −10 dB. The antenna also exhibits an almost omnidirectional radiation pattern. This simple compact antenna with favorable frequency characteristics therefore is attractive for applications in dual-band WLAN.

  8. A Low-Profile WLAN Antenna with Inductor and Tuning Stub for Broadband Impedance Matching

    Directory of Open Access Journals (Sweden)

    Woo-Su Kim

    2014-01-01

    Full Text Available This paper presents a low-profile multiband antenna suitable for wireless local area networks (WLANs, using a chip inductor and tuning stub for broadband impedance matching. The proposed antenna is compact 12×10×1 mm3 and covers three bands: 2.4-GHz (2.400–2.484 GHz, 5.2-GHz (5.150–5.350 GHz, and 5.8-GHz (5.725–5.825 GHz. The measured 10-dB bandwidths are 12.0% (2.28–2.57 GHz in the lower band for 2.4-GHz WLANs and 39.1% (4.81–7.15 GHz in the upper band for 5 GHz-WLANs. The measured peak gain of the antenna is between 2.7 and 4.39 dBi and the radiation patterns are omnidirectional.

  9. Comparisons process-to-bay level peer-to-peer network delay in IEC 61850 substation communication systems

    Directory of Open Access Journals (Sweden)

    Nasser Hasan Ali

    2014-12-01

    Full Text Available This paper presents the application of IEC 61850 protocol in electrical power engineering industry for data communication systems between substations. This IEC 61850 protocol presents new challenges for real-time communication performance between Intelligent Electronic Devices (IEDs within substation because of the Generic Object Oriented Substation Event (GOOSE messages. The analyses of substation Ethernet and WLAN (wireless LAN communication delay, its impact factors, various methods and different network topologies which can improve the real-time performance are discussed. For basic analysis of data flow within a substation, the Optimized Network Engineering Tool (OPNET software is used. The process-to-bay level network simulation model is performed by using the OPNET software. The Ethernet delay and WLAN peer-to-peer performance of the process-to-bay level network simulation results are analyzed which is based on AP (access point, switched, shared Ethernet network or peer-to-peer network.

  10. Novel Concepts for Device to Device Communication using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Hundebøll, Martin; Pedersen, Morten Videbæk

    2014-01-01

    assigned, licensed spectrum; thus, it is under full control of the cellular network. D2D communication creates a market potential for new services, new approaches to efficient spectrum use, and security concepts. This is especially true if D2D communication is extended to larger communication groups...... organized in meshed clusters. In this article, we discuss the potential and shortcomings of D2D communication as proposed today, advocating for the use of network coding as an enabling technology for enhanced security and communication efficiency using the PlayNCool and CORE protocols as key examples...

  11. A high performance SAR ADC for WLAN analog front end

    Science.gov (United States)

    Lian, Pengfei; Yi, Bo; Wu, Bin; Wang, Han; Pu, Yilin

    2017-08-01

    A 10 bit 100 MS/s successive approximation register (SAR) analog to digital converter (ADC) for WLAN analog front end is presented. To ensure high performance and low power, we presented a method that is based on figure of merit (FOM) to obtain the optimal unit capacitance of the digital-to-analog converter (DAC) capacitor network. With this method, we obtain the minimum FOM 17.92 fJ/Conv.-step as well as the optimal unit capacitance of the DAC capacitor network 1.59 fF. What is more, to ensure high performance of the dynamic comparator, a comparator clock logic is presented. Post-simulation results in 55 nm CMOS technology show that, this 10-bit 100-MS/s ADC achieves the signal-to-noise-and-distortion ratio (SNDR), the signal-to-noise ratio (SNR) and the spurious-free dynamic range (SFDR) of 61.7 dB, 63.7 dB and 72.5 dB with 1.3V supply. The ADC consumes 1.67 mW, and the active area is only 0.0162 mm2.

  12. Performance evaluation of cellular phone network based portable ECG device.

    Science.gov (United States)

    Hong, Joo-Hyun; Cha, Eun-Jong; Lee, Tae-Soo

    2008-01-01

    In this study, cellular phone network based portable ECG device was developed and three experiments were performed to evaluate the accuracy, reliability and operability, applicability during daily life of the developed device. First, ECG signals were measured using the developed device and Biopac device (reference device) during sitting and marking time and compared to verify the accuracy of R-R intervals. Second, the reliable data transmission to remote server was verified on two types of simulated emergency event using patient simulator. Third, during daily life with five types of motion, accuracy of data transmission to remote server was verified on two types of event occurring. By acquiring and comparing subject's biomedical signal and motion signal, the accuracy, reliability and operability, applicability during daily life of the developed device were verified. Therefore, cellular phone network based portable ECG device can monitor patient with inobtrusive manner.

  13. Multi-Device to Multi-Device (MD2MD Content-Centric Networking Based on Multi-RAT Device

    Directory of Open Access Journals (Sweden)

    Cheolhoon Kim

    2017-11-01

    Full Text Available This paper proposes a method whereby a device can transmit and receive information using a beacon, and also describes application scenarios for the proposed method. In a multi-device to multi-device (MD2MD content-centric networking (CCN environment, the main issue involves searching for and connecting to nearby devices. However, if a device can’t find another device that satisfies its requirements, the connection is delayed due to the repetition of processes. It is possible to rapidly connect to a device without repetition through the selection of the optimal device using the proposed method. Consequently, the proposed method and scenarios are advantageous in that they enable efficient content identification and delivery in a content-centric Internet of Things (IoT environment, in which multiple mobile devices coexist.

  14. Modeling and Analysis of Hybrid Cellular/WLAN Systems with Integrated Service-Based Vertical Handoff Schemes

    Science.gov (United States)

    Xia, Weiwei; Shen, Lianfeng

    We propose two vertical handoff schemes for cellular network and wireless local area network (WLAN) integration: integrated service-based handoff (ISH) and integrated service-based handoff with queue capabilities (ISHQ). Compared with existing handoff schemes in integrated cellular/WLAN networks, the proposed schemes consider a more comprehensive set of system characteristics such as different features of voice and data services, dynamic information about the admitted calls, user mobility and vertical handoffs in two directions. The code division multiple access (CDMA) cellular network and IEEE 802.11e WLAN are taken into account in the proposed schemes. We model the integrated networks by using multi-dimensional Markov chains and the major performance measures are derived for voice and data services. The important system parameters such as thresholds to prioritize handoff voice calls and queue sizes are optimized. Numerical results demonstrate that the proposed ISHQ scheme can maximize the utilization of overall bandwidth resources with the best quality of service (QoS) provisioning for voice and data services.

  15. Tunable photonic bandgap fiber based devices for optical networks

    DEFF Research Database (Denmark)

    Alkeskjold, Thomas Tanggaard; Scolari, Lara; Rottwitt, Karsten

    2005-01-01

    , for example a liquid crystal that changes optical properties when subjected to, for example, an optical or an electrical field. The utilization of these two basic properties allows design of tunable optical devices for optical networks. In this work, we focus on applications of such devices and discuss recent...

  16. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  17. Reliable beacon transmission based MAC protocol for LR-WPANs over WLAN interferences

    Institute of Scientific and Technical Information of China (English)

    Ji-Hoon PARK; Byung-Seo KIM

    2014-01-01

    The use of IEEE 802.15.4 standard based application systems has been rapidly increasing, for example, in medical services, sensor networks, public safety systems, and home automation systems. However, issues arise from the fact that IEEE 802.15.4 standard based low rate wireless personal area networks (LR-WPANs) use the same frequency bands as wireless local area networks (WLANs), and they interfere with each other. Based on past research on this issue, the interference has a more serious impact on LR-WPANs’ performance than on WLANs’ performance. In this paper we propose a method to improve LR-WPANs’ performance while coexisting with WLANs, which is called the reliable beacon transmission based medium access control (MAC) protocol. Since the reliability of a beacon frame is important, in this method, only the beacon frame is transmitted in interference-free channels, and the data packets are transmitted in interfered channels instead of abandoning the channels altogether. This method increases the reliability of beacon frames as well as overall channel utilizations. The effectiveness of the proposed method was evaluated through extensive simulations, and this paper proves that this method improves the performance of IEEE 802.15.4 based wireless sensor networks (WSNs) over WLANs’ interferences.

  18. Increased Participation and Conversation Using Networked Devices

    Science.gov (United States)

    Danielson, Christopher; Meyer, Dan

    2016-01-01

    For many the phrase "teaching math online" evokes a vision of teaching and learning that is not based in physical classrooms. Perhaps teachers and students are even interacting asynchronously. In math classrooms in the United States, the increasing availability of devices (e.g. laptops, Chromebooks™, smartphones, and tablets) and…

  19. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  20. Delay reduction in multi-hop device-to-device communication using network coding

    KAUST Repository

    Douik, Ahmed S.

    2015-08-12

    This paper considers the problem of reducing the broadcast delay of wireless networks using instantly decodable network coding (IDNC) based device-to-device (D2D) communications. In D2D-enabled networks, devices help hasten the recovery of the lost packets of devices in their transmission range by sending network coded packets. To solve the problem, the different events occurring at each device are identified so as to derive an expression for the probability distribution of the decoding delay. The joint optimization problem over the set of transmitting devices and the packet combinations of each is formulated. Due to the high complexity of finding the optimal solution, this paper focuses on cooperation without interference between the transmitting users. The optimal solution, in such interference-less scenario, is expressed using a graph theory approach by introducing the cooperation graph. Extensive simulations compare the decoding delay experienced in the Point to Multi-Point (PMP), the fully connected D2D (FC-D2D) and the more practical partially connected D2D (PC-D2D) configurations and suggest that the PC-D2D outperforms the FC-D2D in all situations and provides an enormous gain for poorly connected networks.

  1. Silicon photonic integrated devices for datacenter optical networks

    Science.gov (United States)

    Fiorentino, Marco; Chen, Chin-Hui; Kurczveil, Géza; Liang, Di; Peng, Zhen; Beausoleil, Raymond

    2014-03-01

    The evolution of computing infrastructure and workloads has put an enormous pressure on datacenter networks. It is expected that bandwidth will scale without increases in the network power envelope and total cost of ownership. Networks based on silicon photonic devices promise to help alleviate these problems, but a viable development path for these technologies is not yet fully outlined. In this paper, we report our progress on developing components and strategies for datacenter silicon photonics networks. We will focus on recent progress on compact, low-threshold hybrid Si lasers and the CWDM transceivers based on these lasers as well as DWDM microring resonator-based transceivers.

  2. Efficient Transmission of H.264 Video over Multirate IEEE 802.11e WLANs

    Directory of Open Access Journals (Sweden)

    Alnuweiri Hussein

    2008-01-01

    Full Text Available The H.264 video encoding technology, which has emerged as one of the most promising compression standards, offers many new delivery-aware features such as data partitioning. Efficient transmission of H.264 video over any communication medium requires a great deal of coordination between different communication network layers. This paper considers the increasingly popular and widespread 802.11 Wireless Local Area Networks (WLANs and studies different schemes for the delivery of the baseline and extended profiles of H.264 video over such networks. While the baseline profile produces data similar to conventional video technologies, the extended profile offers a partitioning feature that divides video data into three sets with different levels of importance. This allows for the use of service differentiation provided in the WLAN. This paper examines the video transmission performance of the existing contention-based solutions for 802.11e, and compares it to our proposed scheduled access mechanism. It is demonstrated that the scheduled access scheme outperforms contention-based prioritized services of the 802.11e standard. For partitioned video, it is shown that the overhead of partitioning is too high, and better results are achieved if some partitions are aggregated. The effect of link adaptation and multirate operation of the physical layer (PHY is also investigated in this paper.

  3. Wearable Device Control Platform Technology for Network Application Development

    Directory of Open Access Journals (Sweden)

    Heejung Kim

    2016-01-01

    Full Text Available Application development platform is the most important environment in IT industry. There are a variety of platforms. Although the native development enables application to optimize, various languages and software development kits need to be acquired according to the device. The coexistence of smart devices and platforms has rendered the native development approach time and cost consuming. Cross-platform development emerged as a response to these issues. These platforms generate applications for multiple devices based on web languages. Nevertheless, development requires additional implementation based on a native language because of the coverage and functions of supported application programming interfaces (APIs. Wearable devices have recently attracted considerable attention. These devices only support Bluetooth-based interdevice communication, thereby making communication and device control impossible beyond a certain range. We propose Network Application Agent (NetApp-Agent in order to overcome issues. NetApp-Agent based on the Cordova is a wearable device control platform for the development of network applications, controls input/output functions of smartphones and wearable/IoT through the Cordova and Native API, and enables device control and information exchange by external users by offering a self-defined API. We confirmed the efficiency of the proposed platform through experiments and a qualitative assessment of its implementation.

  4. Erlang-Based Sensor Network Management For Heterogeneous Devices

    Directory of Open Access Journals (Sweden)

    Michal Niec

    2012-01-01

    Full Text Available The paper describes a system designed to manage and collect data from the network of heterogeneous sensors. It was implemented using Erlang OTP and CouchDB for maximum fault tolerance, scalability and ease of deployment. It is resistant to poor network quality, shows high tolerance for software errors and power failures, operates on flexible data model. Additionally, it is available to users through an Web application, which shows just how easy it is to use the server HTTP API to communicate with it. The whole platform was implemented and tested on variety of devices like PC, Mac, ARM-based embedded devices and Android tablets.

  5. A Rectangular Ring, Open-Ended Monopole Antenna with Two Symmetric Strips for WLAN and WiMAX Applications

    Directory of Open Access Journals (Sweden)

    Joong-Han Yoon

    2013-01-01

    Full Text Available A triple-band rectangular ring, open-ended monopole antenna with symmetric L strips for wireless local area network (WLAN/Worldwide Interoperability of Microwave Access (WiMAX applications is proposed. The proposed antenna consists of two symmetric folded arms and L strips. Based on the concept, a prototype of the proposed triple antenna has been designed, fabricated, and tested. The numerical and experimental results demonstrated that the proposed antenna satisfied the −10 dB impedance bandwidth requirement while simultaneously covering the WLAN and WiMAX bands. Furthermore, this paper presented and discussed the 2D radiation patterns and 3D gains according to the results of the experiment. The proposed antenna’s peak gain varied between 2.17 and 4.93 dBi, and its average gain varied between −2.97 and −0.53 dBi.

  6. Empirical investigation on the dependence of TCP downstream throughput on SNR in an IEEE802.11b WLAN system

    Directory of Open Access Journals (Sweden)

    Ikponmwosa Oghogho

    2017-04-01

    Full Text Available The dependence of TCP downstream throughput (TCPdownT on signal to noise ratio (SNR in an IEEE802.11b WLAN system was investigated in various environments and varieties of QoS traffic. TCPdownT was measured for various SNR observed. An Infrastructure based IEEE802.11b WLAN system having networked computers on which measurement software were installed, was set up consecutively in various environments (open corridor, small offices with block walls and plaster boards and free space. Empirical models describing TCPdownT against SNR for different signal ranges (all ranges of signals, strong signals only, grey signals only and weak signals only were statistically generated and validated. As the SNR values changed from high (strong signals through low (grey signals to very low (weak signals, our results show a strong dependence of TCPdownT on the received SNR. Our models showed lower RMS errors when compared with other similar models. We observed RMS errors of 0.6734791 Mbps, 0.472209 Mbps, 0.9111563 Mbps and 0.5764460 Mbps for general (all SNR model, strong signals model, grey signals model and Weak signals model respectively. Our models will provide researchers and WLAN systems users with a tool to estimate the TCP downstream throughput in a real network in various environments by monitoring the received SNR.

  7. Neural Networks through Shared Maps in Mobile Devices

    Directory of Open Access Journals (Sweden)

    William Raveane

    2014-12-01

    Full Text Available We introduce a hybrid system composed of a convolutional neural network and a discrete graphical model for image recognition. This system improves upon traditional sliding window techniques for analysis of an image larger than the training data by effectively processing the full input scene through the neural network in less time. The final result is then inferred from the neural network output through energy minimization to reach a more precize localization than what traditional maximum value class comparisons yield. These results are apt for applying this process in a mobile device for real time image recognition.

  8. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...... link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  9. Leaner and meaner: Network coding in SIMD enabled commercial devices

    DEFF Research Database (Denmark)

    W. Sørensen, Chres; Paramanathan, Achuthan; Cabrera, Juan A.

    2016-01-01

    into energy use that may reduce the battery life of a device. This paper focuses not only on providing a comprehensive measurement study of the energy cost of RLNC in eight different computing platforms, but also explores novel approaches (e.g., tunable sparse network coding) and hardware optimizations...... 2x to as high as 20x. Finally, our results show that the latest generation of mobile processors reduce dramatically the energy per bit consumed for carrying out network coding operations compared to previous generations, thus making network coding a viable technology for the upcoming 5G...

  10. Cooperative device-to-device communication in cognitive radio cellular networks

    CERN Document Server

    Li, Peng

    2014-01-01

    This brief examines current research on cooperative device-to-device (D2D) communication as an enhanced offloading technology to improve the performance of cognitive radio cellular networks. By providing an extensive review of recent advances in D2D communication, the authors demonstrate that the quality of D2D links significantly affects offloading performance in cellular networks, which motivates the design of cooperative D2D communication. After presenting the architecture of cooperative D2D communication, the challenges of capacity maximization and energy efficiency are addressed by optimi

  11. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  12. The Device Centric Communication System for 5G Networks

    Science.gov (United States)

    Biswash, S. K.; Jayakody, D. N. K.

    2017-01-01

    The Fifth Generation Communication (5G) networks have several functional features such as: Massive Multiple Input and Multiple Output (MIMO), Device centric data and voice support, Smarter-device communications, etc. The objective for 5G networks is to gain the 1000x more throughput, 10x spectral efficiency, 100 x more energy efficiency than existing technologies. The 5G system will provide the balance between the Quality of Experience (QoE) and the Quality of Service (QoS), without compromising the user benefit. The data rate has been the key metric for wireless QoS; QoE deals with the delay and throughput. In order to realize a balance between the QoS and QoE, we propose a cellular Device centric communication methodology for the overlapping network coverage area in the 5G communication system. The multiple beacon signals mobile tower refers to an overlapping network area, and a user must be forwarded to the next location area. To resolve this issue, we suggest the user centric methodology (without Base Station interface) to handover the device in the next area, until the users finalize the communication. The proposed method will reduce the signalling cost and overheads for the communication.

  13. Communication devices for network-hopping communications and methods of network-hopping communications

    Science.gov (United States)

    Buttles, John W

    2013-04-23

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The system controller is configured to execute computer programming code. Storage media is coupled to the system controller and includes computer programming code configured to cause the system controller to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  14. Network-Assisted Device-to-Device (D2D) Direct Proximity Discovery with Underlay Communication

    DEFF Research Database (Denmark)

    Pratas, Nuno; Popovski, Petar

    2015-01-01

    Device-to-Device communications are expected to play an important role in current and future cellular generations, by increasing the spatial reuse of spectrum resources and enabling lower latency communication links. This paradigm has two fundamental building blocks: (i) proximity discovery and (ii......) direct communication between proximate devices. While (ii) is treated extensively in the recent literature, (i) has received relatively little attention. In this paper we analyze a network-assisted underlay proximity discovery protocol, where a cellular device can take the role of: announcer (which......, we consider the case where the announcers underlay their messages in the downlink transmissions that are directed towards the monitoring devices. We propose a power control scheme applied to the downlink transmission, which copes with the underlay transmission via additional power expenditure, while...

  15. Wireless local area network in a prehospital environment

    Directory of Open Access Journals (Sweden)

    Grimes Gary J

    2004-08-01

    Full Text Available Abstract Background Wireless local area networks (WLANs are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER. The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  16. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  17. Novel Opportunistic Network Routing Based on Social Rank for Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Tong Wang

    2017-01-01

    Full Text Available In recent years, there has been dramatic proliferation of research concerned with fifth-generation (5G mobile communication networks, among which device-to-device (D2D communication is one of the key technologies. Due to the intermittent connection of nodes, the D2D network topology may be disconnected frequently, which will lead to failure in transmission of large data files. In opportunistic networks, in case of encountering nodes which never meet before a flood message blindly to cause tremendous network overhead, a novel opportunistic network routing protocol based on social rank and intermeeting time (SRIT is proposed in this paper. An improved utility approach applied in utility replication based on encounter durations and intermeeting time is put forward to enhance the routing efficiency. Meanwhile, in order to select better candidate nodes in the network, a social graph among people is established when they socially relate to each other in social rank replication. The results under the scenario show an advantage of the proposed opportunistic network routing based on social rank and intermeeting time (SRIT over the compared algorithms in terms of delivery ratio, average delivery latency, and overhead ratio.

  18. Connectivity Analysis of Millimeter-Wave Device-to-Device Networks with Blockage

    Directory of Open Access Journals (Sweden)

    Haejoon Jung

    2016-01-01

    Full Text Available We consider device-to-device (D2D communications in millimeter-wave (mm Wave for the future fifth generation (5G cellular networks. While the mm Wave systems can support multiple D2D pairs simultaneously through beamforming with highly directional antenna arrays, the mm Wave channel is significantly more susceptible to blockage compared to microwave; mm Wave channel studies indicate that if line-of-sight (LoS paths are blocked, reliable mm Wave communications may not be achieved for high data-rate applications. Therefore, assuming that an outage occurs in the absence of the LoS path between two wireless devices by obstructions, we focus on connectivity of the mm Wave D2D networks. We consider two types of D2D communications: direct and indirect schemes. The connectivity performances of the two schemes are investigated in terms of (i the probability to achieve a fully connected network PFC and (ii the average number of reliably connected devices γ. Through analysis and simulation, we show that, as the network size increases, PFC and γ decrease. Also, PFC and γ decrease, when the blockage parameter increases. Moreover, simulation results indicate that the hybrid direct and indirect scheme can improve both PFC and γ up to about 35% compared to the nonhybrid scheme.

  19. Fairness and resource allocation in device-to-device wireless regional area network

    NARCIS (Netherlands)

    Shi, H.

    2014-01-01

    With the rapid development in wireless devices, applications and networks, radio frequencies have become scarce resources. Therefore, it is critical to make efficient use of the radio frequencies. A promising way to solve this problem is the use of cognitive radio (CR). In CR, radio frequencies are

  20. Building an SDN enterprise WLAN based on virtual APs

    NARCIS (Netherlands)

    Sequeira, L.; Cruz, J.L. de la; Ruiz-Mas, J.; Saldana, J.; Fernandez-Navajas, J.; Almodovar, J.

    2017-01-01

    In this letter, the development and testing of an open enterprise Wi-Fi solution based on virtual access points (APs), managed by a central WLAN controller is presented. It allows seamless handovers between APs in different channels, maintaining the QoS of real-time services. The potential

  1. WLAN location sharing through a privacy observant architecture

    NARCIS (Netherlands)

    Kavitha Muthukrishnan, K.; Meratnia, Nirvana; Lijding, M.E.M.; Koprinkov, G.T.; Havinga, Paul J.M.

    In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links. Furthermore, the infrastructure already exists in most public places and is cheap to extend. These advantages, together with the

  2. Using time-of-flight for WLAN localization: feasibility study

    NARCIS (Netherlands)

    Kavitha Muthukrishnan, K.; Koprinkov, G.T.; Meratnia, Nirvana; Lijding, M.E.M.

    Although signal strength based techniques are widely employed for WLAN localization, they generally suffer from providing highly accurate location information. In this paper, we first present the general shortcomings of the signal strength based approaches used for WLANbased localization and then

  3. Exposure assessment of microwave ovens and impact on total exposure in WLANs.

    Science.gov (United States)

    Plets, David; Verloock, Leen; Van Den Bossche, Matthias; Tanghe, Emmeric; Joseph, Wout; Martens, Luc

    2016-02-01

    In situ exposure of electric fields of 11 microwave ovens is assessed in an occupational environment and in an office. Measurements as a function of distance without load and with a load of 275 ml of tap water were performed at distances of oven (without load), which is 2.5 and 1.1 times below the International Commission on Non-Ionizing Radiation Protection reference level for occupational exposure and general public exposure, respectively. For exposure at distances of >1 m, a model of the electric field in a realistic environment is proposed. In an office scenario, switching on a microwave oven increases the median field strength from 91 to 145 mV m(-1) (+91 %) in a traditional Wireless Local Area Network (WLAN) deployment and from 44 to 92 mV m(-1) (+109 %) in an exposure-optimised WLAN deployment. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. Predictable and reliable ECG monitoring over IEEE 802.11 WLANs within a hospital.

    Science.gov (United States)

    Park, Juyoung; Kang, Kyungtae

    2014-09-01

    Telecardiology provides mobility for patients who require constant electrocardiogram (ECG) monitoring. However, its safety is dependent on the predictability and robustness of data delivery, which must overcome errors in the wireless channel through which the ECG data are transmitted. We report here a framework that can be used to gauge the applicability of IEEE 802.11 wireless local area network (WLAN) technology to ECG monitoring systems in terms of delay constraints and transmission reliability. For this purpose, a medical-grade WLAN architecture achieved predictable delay through the combination of a medium access control mechanism based on the point coordination function provided by IEEE 802.11 and an error control scheme based on Reed-Solomon coding and block interleaving. The size of the jitter buffer needed was determined by this architecture to avoid service dropout caused by buffer underrun, through analysis of variations in transmission delay. Finally, we assessed this architecture in terms of service latency and reliability by modeling the transmission of uncompressed two-lead electrocardiogram data from the MIT-BIH Arrhythmia Database and highlight the applicability of this wireless technology to telecardiology.

  5. Improving Energy Efficiency in Idle Listening of IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Muhammad Adnan

    2016-01-01

    Full Text Available This paper aims to improve energy efficiency of IEEE 802.11 wireless local area networks (WLANs by effectively dealing with idle listening (IL, which is required for channel sensing and is unavoidable in a contention-based channel access mechanism. Firstly, we show that IL is a dominant source of energy drain in WLANs and it cannot be effectively alleviated by the power saving mechanism proposed in the IEEE 802.11 standard. To solve this problem, we propose an energy-efficient mechanism that combines three schemes in a systematic way: downclocking, frame aggregation, and contention window adjustment. The downclocking scheme lets a station remain in a semisleep state when overhearing frames destined to neighbor stations, whereby the station consumes the minimal energy without impairing channel access capability. As well as decreasing the channel access overhead, the frame aggregation scheme prolongs the period of semisleep time. Moreover, by controlling the size of contention window based on the number of stations, the proposed mechanism decreases unnecessary IL time due to collision and retransmission. By deriving an analysis model and performing extensive simulations, we confirm that the proposed mechanism significantly improves the energy efficiency and throughput, by up to 2.8 and 1.8 times, respectively, compared to the conventional power saving mechanisms.

  6. AVAILABILITY RESEARCH OF REMOTE DEVICES FOR WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    N. A. Bazhayev

    2016-05-01

    Full Text Available We consider the wireless network under attack, aimed at "broadcast storm" initiation, in order to determine the availability of stand-alone units and the ability to carry out their functional tasks under information exposure. We determine a set of conditions for such type of attacks on the part of potential information interloper. The functional analysis of the systems based on wireless technology is made. We examine the remote device of a self-organizing wireless network as a queuing system M/M/1/n. Model dependencies are shown for normal system performance and at information exposure on the part of potential information interloper. Analytical simulation of wireless network functioning is carried out in the normal mode and under the attack aimed at "broadcast storm" initiation. An experiment is described which provides statistical information on operation of network remote devices. We present experiment results on carrying out attack at typical system transferring data by broabcast net scanning package at different noise intensities on the part of information interloper. The proposed model can be used to determine the technical characteristics of wireless ad-hoc network, develop recommendations for node configuration, aimed at countering "broadcast storm".

  7. Towards a quantum network of room temperature quantum devices

    Science.gov (United States)

    Jordaan, Bertus; Shahrokhshahi, Reihaneh; Namazi, Mehdi; Goham, Connor; Figueroa, Eden

    2017-04-01

    Progressing quantum technologies to room temperature operation is key to unlock the potential and economical viability of novel many-device architectures. Along these lines, warm vapor alleviates the need for laser trapping and cooling in vacuum or cooling to cryogenic temperatures. Here we report our progress towards building a prototypical quantum network, containing several high duty cycle room-temperature quantum memories interconnected using high rate single photon sources. We have already demonstrated important capabilities, such as memory-built photon-shaping techniques, compatibility with BB84-like quantum communication links, and the possibility of interfacing with low bandwidth (MHz range), cavity enhanced, SPDC-based photon source tuned to the Rb transitions. This body of works suggest that an elementary quantum network of room temperature devices is already within experimental reach.

  8. A Single-Walled Carbon Nanotube Network Gas Sensing Device

    Directory of Open Access Journals (Sweden)

    I-Ju Teng

    2011-08-01

    Full Text Available The goal of this research was to develop a chemical gas sensing device based on single-walled carbon nanotube (SWCNT networks. The SWCNT networks are synthesized on Al2O3-deposted SiO2/Si substrates with 10 nm-thick Fe as the catalyst precursor layer using microwave plasma chemical vapor deposition (MPCVD. The development of interconnected SWCNT networks can be exploited to recognize the identities of different chemical gases by the strength of their particular surface adsorptive and desorptive responses to various types of chemical vapors. The physical responses on the surface of the SWCNT networks cause superficial changes in the electric charge that can be converted into electronic signals for identification. In this study, we tested NO2 and NH3 vapors at ppm levels at room temperature with our self-made gas sensing device, which was able to obtain responses to sensitivity changes with a concentration of 10 ppm for NO2 and 24 ppm for NH3.

  9. Device-to-Device Underlay Cellular Networks with Uncertain Channel State Information

    KAUST Repository

    Memmi, Amen

    2016-01-06

    Device-to-Device (D2D) communications underlying the cellular infrastructure is a technology that has recently been proposed as a promising solution to enhance cellular network capabilities: It improves spectrum utilization, overall throughput and energy efficiency while enabling new peer-to-peer and location-based applications and services. However, interference is the major challenge since the same resources are shared by both systems. Therefore, interference management techniques are required to keep the interference under control. In this work, in order to mitigate interference, we consider centralized and distributed power control algorithms in a one-cell random network model. Differently from previous works, we are assuming that the channel state information (CSI) may be imperfect and include estimation errors. We evaluate how this uncertainty impacts performances.

  10. Communication method for high density wireless networks, terminal, cluster master device, central node, and system therefor

    NARCIS (Netherlands)

    Havinga, Paul J.M.; van Hoesel, L.F.W.; Bijwaard, D.

    2009-01-01

    Large-scale wireless sensor and actuator networks(LWSANs) are networks that consist of many sensor and/or actuator devices (i.e. >1,000 devices). These sensor and/or actuator devices (also called nodes) communicate wirelessly to deliver their sensor readings to one or more gateway devices in the

  11. Instantly decodable network coding for real-time device-to-device communications

    KAUST Repository

    Douik, Ahmed

    2016-01-04

    This paper studies the delay reduction problem for instantly decodable network coding (IDNC)-based device-to-device (D2D) communication-enabled networks. Unlike conventional point-to-multipoint (PMP) systems in which the wireless base station has the sufficient computation abilities, D2D networks rely on battery-powered operations of the devices. Therefore, a particular emphasis on the computation complexity needs to be addressed in the design of delay reduction algorithms for D2D networks. While most of the existing literature on IDNC directly extend the delay reduction PMP schemes, known to be NP-hard, to the D2D setting, this paper proposes to investigate and minimize the complexity of such algorithms for battery-powered devices. With delay minimization problems in IDNC-based systems being equivalent to a maximum weight clique problems in the IDNC graph, the presented algorithms, in this paper, can be applied to different delay aspects. This paper introduces and focuses on the reduction of the maximum value of the decoding delay as it represents the most general solution. The complexity of the solution is reduced by first proposing efficient methods for the construction, the update, and the dimension reduction of the IDNC graph. The paper, further, shows that, under particular scenarios, the problem boils down to a maximum clique problem. Due to the complexity of discovering such maximum clique, the paper presents a fast selection algorithm. Simulation results illustrate the performance of the proposed schemes and suggest that the proposed fast selection algorithm provides appreciable complexity gain as compared to the optimal selection one, with a negligible degradation in performance. In addition, they indicate that the running time of the proposed solution is close to the random selection algorithm.

  12. Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed S.

    2015-05-01

    From its introduction to its quindecennial, network coding have built a strong reputation in enhancing packet recovery process and achieving maximum information flow in both wires and wireless networks. Traditional studies focused on optimizing the throughput of the network by proposing complex schemes that achieve optimal delay. With the shift toward distributed computing at mobile devices, throughput and complexity become both critical factors that affect the efficiency of a coding scheme. Instantly decodable network coding imposed itself as a new paradigm in network coding that trades off this two aspects. This paper presents a survey of instantly decodable network coding schemes that are proposed in the literature. The various schemes are identified, categorized and evaluated. Two categories can be distinguished namely the conventional centralized schemes and the distributed or cooperative schemes. For each scheme, the comparison is carried out in terms of reliability, performance, complexity and packet selection methodology. Although the performance is generally inversely proportional to the computation complexity, numerous successful schemes from both the performance and complexity viewpoint are identified.

  13. Middleware de seguridad para el interworking WLAN-IMS

    Directory of Open Access Journals (Sweden)

    Oscar Caicedo

    2010-01-01

    Full Text Available El 3GPP plantea una arquitectura de seguridad para el interworking WLAN-3GPP, sin embargo ésta presenta ineficiencias en el procedimiento de autenticación, lo que produce un mayor, consumo de recursos de radio, procesamiento en los dispositivos y retardo en la autenticación. Debido a esto, en este artículo se propone un middleware de seguridad que reduce los pasos en la autenticación del interworking WLAN-3GPP y asegura la señalización SIP entre el equipo de usuario (UE, User Equipment y el Proxy CSCF (P-CSCF, Proxy - Call State Control Function del subsistema multimedia IP (IMS, IP Multimedia Subsystem.

  14. Dual-Band Compact Planar Antenna for a Low-Cost WLAN USB Dongle

    Directory of Open Access Journals (Sweden)

    Maurício Henrique Costa Dias

    2014-01-01

    Full Text Available Among the present technologies for WLAN devices, USB dongles still play a noticeable role. One major design challenge regards the antenna, which unavoidably has to comply with a very small volume available and sometimes should also allow multiband operation. In this scope, the present work discusses a dual-band WiFi compact planar IFA-based antenna design for a low-cost USB dongle application. Like most of the related published solutions, the methodology for deriving the present proposition was assisted by the use of an antenna analysis software. A prototype was assembled and tested in order to qualify the radiator design. Practical operation conditions were considered in the tests, such as the influence of the dongle case and the effect of the notebook itself. The results complied with the design constraints, presenting an impedance match quite stable regardless of the stick position alongside a laptop base.

  15. Energy-Efficient Bandwidth Allocation for Multiuser Scalable Video Streaming over WLAN

    Directory of Open Access Journals (Sweden)

    Lafruit Gauthier

    2008-01-01

    Full Text Available Abstract We consider the problem of packet scheduling for the transmission of multiple video streams over a wireless local area network (WLAN. A cross-layer optimization framework is proposed to minimize the wireless transceiver energy consumption while meeting the user required visual quality constraints. The framework relies on the IEEE 802.11 standard and on the embedded bitstream structure of the scalable video coding scheme. It integrates an application-level video quality metric as QoS constraint (instead of a communication layer quality metric with energy consumption optimization through link layer scaling and sleeping. Both energy minimization and min-max energy optimization strategies are discussed. Simulation results demonstrate significant energy gains compared to the state-of-the-art approaches.

  16. Energy-Efficient Bandwidth Allocation for Multiuser Scalable Video Streaming over WLAN

    Directory of Open Access Journals (Sweden)

    Xin Ji

    2008-01-01

    Full Text Available We consider the problem of packet scheduling for the transmission of multiple video streams over a wireless local area network (WLAN. A cross-layer optimization framework is proposed to minimize the wireless transceiver energy consumption while meeting the user required visual quality constraints. The framework relies on the IEEE 802.11 standard and on the embedded bitstream structure of the scalable video coding scheme. It integrates an application-level video quality metric as QoS constraint (instead of a communication layer quality metric with energy consumption optimization through link layer scaling and sleeping. Both energy minimization and min-max energy optimization strategies are discussed. Simulation results demonstrate significant energy gains compared to the state-of-the-art approaches.

  17. A Categorized Resource Sharing Mechanism for Device-to-Device Communications in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Jie Chen

    2016-01-01

    Full Text Available Device-to-Device (D2D communications are considered one of the key technologies for 5G wireless communication systems. In this paper, a resource sharing mechanism, which applies different policies for different cases (thus being categorized, is proposed. In this scheme, all D2D pairs are divided into three groups by comparing the minimum transmit power with the maximum transmit power of each cellular UE. The proposed mechanism enables multiple D2D pairs in the second group to share the resource with cellular user equipment (UE simultaneously, by adjusting the transmit powers of these D2D transmitters. At the same time, D2D pairs in the first group and the third group share resource with cellular UE based on the transmit power minimization principle. Simulation results show that the proposed scheme can achieve relatively higher network throughput and lower transmit power consumption of the D2D system.

  18. The modeling of a digital forensic readiness approach to WLAN digital forensics

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available digital forensics is seen as not only a counterproposal but as a solution to the rapid increase of cyber crime in WLANs. The key issue impacting WLAN digital forensics is that, it is an enormous challenge to intercept and preserve all the communications...

  19. ASSESSMENT OF PUBLIC EXPOSURE FORM WLANS IN THE WEST BANK-PALESTINE.

    Science.gov (United States)

    Lahham, Adnan; Sharabati, Afifeh; ALMasri, Hussein

    2017-03-03

    A total of 271 measurements were conducted at 69 different sites including homes, hospitals, educational institutions and other public places to assess the exposure to radiofrequency emission from wireless local area networks (WLANs). Measurements were conducted at different distances from 40 to 10 m from the access points (APs) in real life conditions using Narda SRM-3000 selective radiation meter. Three measurements modes were considered at 1 m distance from the AP which are transmit mode, idle mode, and from the client card (laptop computer). All measurements were conducted indoor in the West Bank environment. Power density levels from WLAN systems were found to vary from 0.001 to ~1.9 μW cm-2 with an average of 0.12 μW cm-2. Maximum value found was in university environment, while the minimum was found in schools. For one measurement case where the AP was 20 cm far while transmitting large files, the measured power density reached a value of ~4.5 μW cm-2. This value is however 221 times below the general public exposure limit recommended by the International Commission on Non-Ionizing Radiation Protection, which was not exceeded in any case. Measurements of power density at 1 m around the laptop resulted in less exposure than the AP in both transmit and idle modes as well. Specific absorption rate for the head of the laptop user was estimated and found to vary from 0.1 to 2 mW/kg. The frequency distribution of measured power densities follows a log-normal distribution which is generally typical in the assessment of exposure resulting from sources of radiofrequency emissions. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  20. Resource Allocation for Multicell Device-to-Device Communications in Cellular Network: A Game Theoretic Approach

    Directory of Open Access Journals (Sweden)

    Jun Huang

    2015-08-01

    Full Text Available Device-to-Device (D2D communication has recently emerged as a promising technology to improve the capacity and coverage of cellular systems. To successfully implement D2D communications underlaying a cellular network, resource allocation for D2D links plays a critical role. While most of prior resource allocation mechanisms for D2D communications have focused on interference within a single-cell system, this paper investigates the resource allocation problem for a multicell cellular network in which a D2D link reuses available spectrum resources of multiple cells. A repeated game theoretic approach is proposed to address the problem. In this game, the base stations (BSs act as players that compete for resource supply of D2D, and the utility of each player is formulated as revenue collected from both cellular and D2D users using resources. Extensive simulations are conducted to verify the proposed approach and the results show that it can considerably enhance the system performance in terms of sum rate and sum rate gain.

  1. _ MULTl-CELL CAMPUS WLAN ENVIRONMENT -

    African Journals Online (AJOL)

    behavror. Scientific Research and. Essay Vol.3 (10, Pp- 460-466. lSSN 1992-2 48 © 2008. AcademicJoumals. Plassmann, D. (1994). Location management scheme for mobile cellular network of 3'“ generation. 0-7803-1 927~3l941$4.on © 1994. EEE) pp 649 653. Ramachandran, R.; Erran, L. L.; Thomas, F. L. and Sneha,.

  2. Nonlinear Silicon Photonic Signal Processing Devices for Future Optical Networks

    Directory of Open Access Journals (Sweden)

    Cosimo Lacava

    2017-01-01

    Full Text Available In this paper, we present a review on silicon-based nonlinear devices for all optical nonlinear processing of complex telecommunication signals. We discuss some recent developments achieved by our research group, through extensive collaborations with academic partners across Europe, on optical signal processing using silicon-germanium and amorphous silicon based waveguides as well as novel materials such as silicon rich silicon nitride and tantalum pentoxide. We review the performance of four wave mixing wavelength conversion applied on complex signals such as Differential Phase Shift Keying (DPSK, Quadrature Phase Shift Keying (QPSK, 16-Quadrature Amplitude Modulation (QAM and 64-QAM that dramatically enhance the telecom signal spectral efficiency, paving the way to next generation terabit all-optical networks.

  3. Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications

    Directory of Open Access Journals (Sweden)

    Yong Deng

    2016-01-01

    Full Text Available The explosive use of smart devices enabled the emergence of collective resource sharing among mobile individuals. Mobile users need to cooperate with each other to improve the whole network’s quality of service. By modeling the cooperative behaviors in a mobile crowd into an evolutionary Prisoner’s dilemma game, we investigate the relationships between cooperation rate and some main influence factors, including crowd density, communication range, temptation to defect, and mobility attributes. Using evolutionary game theory, our analysis on the cooperative behaviors of mobile takes a deep insight into the cooperation promotion in a dynamical network with selfish autonomous users. The experiment results show that mobile user’s features, including speed, moving probability, and reaction radius, have an obvious influence on the formation of a cooperative mobile social network. We also found some optimal status when the crowd’s cooperation rate reaches the best. These findings are important if we want to establish a mobile social network with a good performance.

  4. Wireless microsensor network solutions for neurological implantable devices

    Science.gov (United States)

    Abraham, Jose K.; Whitchurch, Ashwin; Varadan, Vijay K.

    2005-05-01

    The design and development of wireless mocrosensor network systems for the treatment of many degenerative as well as traumatic neurological disorders is presented in this paper. Due to the advances in micro and nano sensors and wireless systems, the biomedical sensors have the potential to revolutionize many areas in healthcare systems. The integration of nanodevices with neurons that are in communication with smart microsensor systems has great potential in the treatment of many neurodegenerative brain disorders. It is well established that patients suffering from either Parkinson"s disease (PD) or Epilepsy have benefited from the advantages of implantable devices in the neural pathways of the brain to alter the undesired signals thus restoring proper function. In addition, implantable devices have successfully blocked pain signals and controlled various pelvic muscles in patients with urinary and fecal incontinence. Even though the existing technology has made a tremendous impact on controlling the deleterious effects of disease, it is still in its infancy. This paper presents solutions of many problems of today's implantable and neural-electronic interface devices by combining nanowires and microelectronics with BioMEMS and applying them at cellular level for the development of a total wireless feedback control system. The only device that will actually be implanted in this research is the electrodes. All necessary controllers will be housed in accessories that are outside the body that communicate with the implanted electrodes through tiny inductively-coupled antennas. A Parkinson disease patient can just wear a hat-system close to the implantable neural probe so that the patient is free to move around, while the sensors continually monitor, record, transmit all vital information to health care specialist. In the event of a problem, the system provides an early warning to the patient while they are still mobile thus providing them the opportunity to react and

  5. AN APPROACH TO RESOURCE ALLOCATION FOR FUTURE WLAN

    OpenAIRE

    Luntovskyy, Andriy; Klymash, Mykhailo

    2017-01-01

    Background. Nowadays wireless and mobile communication is occupied with provision in general of IP-services and transmission of MM-content from one place to another, but tomorrow the new 5G will be able to control a wide range of objects in real time with only insignificant human intervention. IoT with multiple new attractive apps is created. An important new approach for resource allocation for future WLAN towards 5G has to be discussed within the work.Objective. DIDO (Distributed Input Dist...

  6. Adaptive Backoff Algorithm for Contention Window for Dense IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Ikram Syed

    2016-01-01

    Full Text Available The performance improvement in IEEE 802.11 WLANs in widely fluctuating network loads is a challenging task. To improve the performance in this saturated state, we develop an adaptive backoff algorithm that maximizes the system throughput, reduces the collision probability, and maintains a high fairness for the IEEE 802.11 DCF under dense network conditions. In this paper, we present two main advantages of the proposed ABA-CW algorithm. First, it estimates the number of active stations and then calculates an optimal contention window based on the active station number. Each station calculates the channel state probabilities by observing the channel for the total backoff period. Based on these channel states probabilities, each station can estimate the number of active stations in the network, after which it calculates the optimal CW utilizing the estimated active number of stations. To evaluate the proposed mechanism, we derive an analytical model to determine the network performance. From our results, the proposed ABA-CW mechanism achieved better system performance compared to fixed-CW (BEB, EIED, LILD, and SETL and adaptive-CW (AMOCW, Idle Sense mechanisms. The simulation results confirmed the outstanding performance of the proposed mechanism in that it led to a lower collision probability, higher throughput, and high fairness.

  7. FY1995 optoelectronic devices and circuits for terabit class network; 1995 nendo terabit kyu network yo hikari denshi device kairo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    The necessary technology realizing Terabit class optical network is the signal multiplexing both in temporal and spectral domains. Controllability of ultrafast optoelectronic systems is therefore the priority issue. Specifically we chose semiconductor lasers as the key devices. The methodology for performance improvement and the creation of novel functionality are investigated. Firstly compression of semiconductor laser pulse reached the world record of 65 femto second. Secondly a proposal was made to control mode locked semiconductor lasers via subharmonic synchronization and a substantial phase noise reduction was demonstrated. Thirdly a new technology was developed to realize broadband anti-reflection coating on semiconductor laser amplifier facet, bringing about significant performance improvement. To compensate the dispersion induced signal distortion a broadband semiconductor laser amplifier four wave mixing was analyzed and also demonstrated experimentally. (NEDO)

  8. A Game-theoretic Framework for Network Coding Based Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed

    2016-06-29

    This paper investigates the delay minimization problem for instantly decodable network coding (IDNC) based deviceto- device (D2D) communications. In D2D enabled systems, users cooperate to recover all their missing packets. The paper proposes a game theoretic framework as a tool for improving the distributed solution by overcoming the need for a central controller or additional signaling in the system. The session is modeled by self-interested players in a non-cooperative potential game. The utility functions are designed so as increasing individual payoff results in a collective behavior achieving both a desirable system performance in a shared network environment and the Nash equilibrium. Three games are developed whose first reduces the completion time, the second the maximum decoding delay and the third the sum decoding delay. The paper, further, improves the formulations by including a punishment policy upon collision occurrence so as to achieve the Nash bargaining solution. Learning algorithms are proposed for systems with complete and incomplete information, and for the imperfect feedback scenario. Numerical results suggest that the proposed game-theoretical formulation provides appreciable performance gain against the conventional point-to-multipoint (PMP), especially for reliable user-to-user channels.

  9. Measurement campaign on connectivity of mesh networks formed by mobile devices

    DEFF Research Database (Denmark)

    Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo

    2007-01-01

    This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...

  10. On the Choice of Access Point Selection Criterion and Other Position Estimation Characteristics for WLAN-Based Indoor Positioning.

    Science.gov (United States)

    Laitinen, Elina; Lohan, Elena Simona

    2016-05-20

    The positioning based on Wireless Local Area Networks (WLAN) is one of the most promising technologies for indoor location-based services, generally using the information carried by Received Signal Strengths (RSS). One challenge, however, is the huge amount of data in the radiomap database due to the enormous number of hearable Access Points (AP) that could make the positioning system very complex. This paper concentrates on WLAN-based indoor location by comparing fingerprinting, path loss and weighted centroid based positioning approaches in terms of complexity and performance and studying the effects of grid size and AP reduction with several choices for appropriate selection criterion. All results are based on real field measurements in three multi-floor buildings. We validate our earlier findings concerning several different AP selection criteria and conclude that the best results are obtained with a maximum RSS-based criterion, which also proved to be the most consistent among the different investigated approaches. We show that the weighted centroid based low-complexity method is very sensitive to AP reduction, while the path loss-based method is also very robust to high percentage removals. Indeed, for fingerprinting, 50% of the APs can be removed safely with a properly chosen removal criterion without increasing the positioning error much.

  11. Service and multimedia data transmission in IoT networks using hybrid communication devices

    Directory of Open Access Journals (Sweden)

    Saveliev Anton

    2017-01-01

    Full Text Available Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization of IoT network, using hybrid modules. These devices provide flexibility, scalability, energy efficiency and multi-use of network for the transfer of various types of data. This approach takes into account software and hardware features of the devices used for data transmission in IoT networks, which helps to automate connecting the modules chosen by user.

  12. Network Coding Applications and Implementations on Mobile Devices

    DEFF Research Database (Denmark)

    Fitzek, Frank; Pedersen, Morten Videbæk; Heide, Janus

    2010-01-01

    Network coding has attracted a lot of attention lately. The goal of this paper is to demonstrate that the implementation of network coding is feasible on mobile platforms. The paper will guide the reader through some examples and demonstrate uses for network coding. Furthermore the paper will also...... show that the implementation of network coding is feasible today on commercial mobile platforms....

  13. The Combined Effect of Signal Strength and Background Traffic Load on Speech Quality in IEEE 802.11 WLAN

    Directory of Open Access Journals (Sweden)

    P. Pocta

    2011-04-01

    Full Text Available This paper deals with measurements of the combined effect of signal strength and background traffic load on speech quality in IEEE 802.11 WLAN. The ITU-T G.729AB encoding scheme is deployed in this study and the Distributed Internet Traffic Generator (D-ITG is used for the purpose of background traffic generation. The speech quality and background traffic load are assessed by means of the accomplished PESQ algorithm and Wireshark network analyzer, respectively. The results show that background traffic load has a bit higher impact on speech quality than signal strength when both effects are available together. Moreover, background traffic load also partially masks the impact of signal strength. The reasons for those findings are particularly discussed. The results also suggest some implications for designers of wireless networks providing VoIP service.

  14. Analisa Horizontal Handover Terhadap Qos Layanan Streaming Multimedia E-Learning Pada Jaringan WLAN 802.11

    Directory of Open Access Journals (Sweden)

    I M.O. Widyantara

    2015-06-01

    Full Text Available In this globalization era, the state of the user who no longer occupies in a single place, but always moving, it is necessary to continuity of communication that will cause a handover. This paper intends to analyze the effect of 802.11 WLAN horizontal handover to the QoS of streaming e-learning. Methods of data collection process using the Cisco 3500 series access point that supports handover with existing network systems, ad-hoc network and type of hard handover. The results of the data analysis showed that the handover process is able to improve the QoS by gradually restored gradually, to get back to normal QoS

  15. Service and multimedia data transmission in IoT networks using hybrid communication devices

    OpenAIRE

    Saveliev Anton; Malov Dmitry; Tamashakin Michael; Budkov Victor

    2017-01-01

    Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization o...

  16. On Potentials and Limitations of a Hybrid WLAN-RFID Indoor Positioning Technique

    Directory of Open Access Journals (Sweden)

    Silverio C. Spinella

    2010-01-01

    Full Text Available This paper addresses the important issue of position estimation in indoor environments. Starting point of the research is positioning techniques that exploit the knowledge of power levels of RF signals from multiple 802.11 WLAN APs (Access Points. In particular, the key idea in this paper is to enhance the performance of a WLAN fingerprinting approach by coupling it to a RFID-based procedure. WLAN and RFID technologies are synergistically used to provide a platform for a more performing positioning process, in which the very strong identification capabilities of the RFID technology allow to increase the accuracy of positioning systems via WLAN fingerprinting. The algorithm performance is assessed through general and repeatable experimental campaigns, during which the main algorithm parameters are dimensioned. The results testify both to the feasibility of the solution and to its higher accuracy (attainable at very reduced costs compared to traditional positioning techniques.

  17. Multiband Printed Asymmetric Dipole Antenna for LTE/WLAN Applications

    Directory of Open Access Journals (Sweden)

    Chia-Mei Peng

    2013-01-01

    Full Text Available The ability of a single layer strip fed printed asymmetric dipole antenna, which is composed of top-loading, asymmetric coplanar waveguide (ACPW and stepped-feeding structure, to operate at three wide frequency bands (698~960 MHz, 1710~2620 MHz, and 5150~5850 MHz to cover WLAN and LTE operation has been demonstrated. A prototype of the proposed antenna with 57.5 mm in length, 0.4 mm in thickness, and 5 mm in width is fabricated and experimentally investigated. The experimental results indicate that the VSWR 2.5 : 1 bandwidths achieved were 74.3%, 40.8%, and 18.2% at 700 MHz, 2450 MHz, and 5500 MHz, respectively. Experimental results are shown to verify the validity of theoretical work.

  18. Simulation of devices mobility to estimate wireless channel quality metrics in 5G networks

    Science.gov (United States)

    Orlov, Yu.; Fedorov, S.; Samuylov, A.; Gaidamaka, Yu.; Molchanov, D.

    2017-07-01

    The problem of channel quality estimation for devices in a wireless 5G network is formulated. As a performance metrics of interest we choose the signal-to-interference-plus-noise ratio, which depends essentially on the distance between the communicating devices. A model with a plurality of moving devices in a bounded three-dimensional space and a simulation algorithm to determine the distances between the devices for a given motion model are devised.

  19. Intelligent wireless forensic model (IWFM) for moving devices between wireless networks

    CSIR Research Space (South Africa)

    Ngobeni, SJ

    2008-09-01

    Full Text Available There are currently many different types of wireless crime investigation tools designed for different purposes in order to track down intruders of wireless crime, like Intrusion Detection Systems (IDSs), Wlan-Jack, HotSpotter, Monkey Jack, TULP 2G...

  20. Plasticity in memristive devices for Spiking Neural Networks

    Directory of Open Access Journals (Sweden)

    Sylvain eSaïghi

    2015-03-01

    Full Text Available Memristive devices present a new device technology allowing for the realization of compact nonvolatile memories. Some of them are already in the process of industrialization. Additionally, they exhibit complex multilevel and plastic behaviors, which make them good candidates for the implementation of artificial synapses in neuromorphic engineering. However, memristive effects rely on diverse physical mechanisms, and their plastic behaviors differ strongly from one technology to another. Here, we present measurements performed on different memristive devices and the opportunities that they provide. We show that they can be used to implement different learning rules whose properties emerge directly from device physics: real time or accelerated operation, deterministic or stochastic behavior, long term or short term plasticity. We then discuss how such devices might be integrated into a complete architecture. These results highlight that there is no unique way to exploit memristive devices in neuromorphic systems. Understanding and embracing device physics is the key for their optimal use.

  1. Integration of a network aware traffic generation device into a computer network emulation platform

    CSIR Research Space (South Africa)

    Von Solms, S

    2014-07-01

    Full Text Available Flexible, open source network emulation tools can provide network researchers with significant benefits regarding network behaviour and performance. The evaluation of these networks can benefit greatly from the integration of realistic, network...

  2. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    Directory of Open Access Journals (Sweden)

    Bram Bonné

    2017-07-01

    Full Text Available Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the participants’ devices connect to and the connections made by apps on these devices, for a period of 30 days. Afterwards, participants are surveyed about their awareness and privacy sensitiveness. We show that while a higher expertise in computer networks corresponds to more awareness about the connections made by apps, neither this expertise nor the actual privacy stance of the participant translates to better security habits. Moreover, participants in general were unaware about a significant part of connections made by apps on their devices, a matter that is worsened by the fact that one third of Wi-Fi networks that participants connect to do not have any security enabled. Based on our results, we provide recommendations to network providers, developers and users on how to improve Wi-Fi security for mobile devices.

  3. 3G, 4G and beyond bringing networks, devices and the web together

    CERN Document Server

    Sauter, Martin

    2012-01-01

    Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile devices, voice and multimedia services and the mobile web 2.0.  Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.  It discusses how these elements strongly influence each other and how network ca

  4. Efficient Closed-Loop Schemes for MIMO-OFDM-Based WLANs

    Directory of Open Access Journals (Sweden)

    Jiang Yi

    2006-01-01

    Full Text Available The single-input single-output (SISO orthogonal frequency-division multiplexing (OFDM systems for wireless local area networks (WLAN defined by the IEEE 802.11a standard can support data rates up to 54 Mbps. In this paper, we consider deploying two transmit and two receive antennas to increase the data rate up to 108 Mbps. Applying our recent multiple-input multiple-output (MIMO transceiver designs, that is, the geometric mean decomposition (GMD and the uniform channel decomposition (UCD schemes, we propose simple and efficient closed-loop MIMO-OFDM designs for much improved performance, compared to the standard singular value decomposition (SVD based schemes as well as the open-loop V-BLAST (vertical Bell Labs layered space-time based counterparts. In the explicit feedback mode, precoder feedback is needed for the proposed schemes. We show that the overhead of feedback can be made very moderate by using a vector quantization method. In the time-division duplex (TDD mode where the channel reciprocity is exploited, our schemes turn out to be robust against the mismatch between the uplink and downlink channels. The advantages of our schemes are demonstrated via extensive numerical examples.

  5. Ultrawideband Vivaldi Antenna for DVB-T, WLAN, and WiMAX Applications

    Directory of Open Access Journals (Sweden)

    Dalia M. Elsheakh

    2014-01-01

    Full Text Available Compact Vivaldi patch antenna with a parasitic meander line is presented in this paper. A PIN diode switch is used to connect and disconnect ultrahigh frequency band (UHF with ultrawide bandwidth (UWB. The operating frequencies can be switched among different services, depending on the switching states (ON/OFF to add the lower band when required. This antenna is suitable for portable DVB-T which extended from 450 MHz to 850 MHz receiver applications and the WLAN (Wireless Local Area Network IEEE 802.11b,g (5.1–5.8 GHz frequency bands and WiMAX band (3.3–3.8 GHz. The measured reflection coefficient of the proposed antenna is compared with the simulated one; good agreement is observed. Also, simulated radiation pattern of the antenna is presented. All simulations are carried out using the EM commercial simulator, high frequency structure simulator (HFSS ver.13.

  6. COMPACT DUAL-BAND INVERTED L SHAPED MONOPOLE ANTENNA FOR WLAN APPLICATIONS

    Directory of Open Access Journals (Sweden)

    K Sumathi

    2015-12-01

    Full Text Available A highly compact and an optimized design of an Inverted L shaped printed monopole antenna with a simple compact ground plane is proposed. To make the designed antenna suitable for implantation it is embedded in FR-4 substrate and is presented. The antenna is designed for dual-band operation at 2.4GHz and 5.2GHz. It is suitable for Wireless Local Area Network (WLAN applications with return loss (S11 < -10dB. The antenna has two different resonant current paths that support two resonances at 2.44GHz and 5.18GHz (forming an F-shaped structure. The size of the antenna is 32.5mm × 19.6mm × 1.6mm. The antenna design is simulated using the tool Advanced Design System (ADS 2014. This antenna design has good return loss and radiation characteristics in both the required frequency bands. The radiation pattern obtained from the proposed antenna is an Omni directional radiation pattern in the E and H plane over the frequency ranges 2.4GHz and 5.2GHz.

  7. Modified Cooperative Access with Relay’s Data (MCARD based Directional Antenna for multi-rate WLANs

    Directory of Open Access Journals (Sweden)

    Ahmed Magdy

    2014-03-01

    Full Text Available In this paper, for multi-rate wireless local area networks (WLANs, a modified protocol in Medium Access Control (MAC, called Modified Cooperative Access with Relay’s Data (MCARD based Directional Antenna using half wave length dipole in Uniform Circular Array (UCA topology is proposed. MCARD gives remote stations chance to send their information by using intermediate stations (relays to Access Point (AP at a higher data rate based practical antenna. As can be seen under MCARD, a relay station transmits its information before forwarding information from the source station because it uses directional antenna. Analytical results and simulations show that MCARD can significantly improve system quality of service (QOS in terms of throughput under different channel conditions.

  8. Coordination Protocols for a Reliable Sensor, Actuator, and Device Network (SADN

    Directory of Open Access Journals (Sweden)

    Keiji Ozaki

    2008-01-01

    Full Text Available A sensor, actuator, and device network (SADN is composed of three types of nodes, which are sensor, actuator, and actuation device nodes. Sensor nodes and actuator nodes are interconnected in wireless networks as discussed in wireless sensor and actuator networks (WSANs. Actuator nodes and device nodes are interconnected in types of networks, i.e. wireless and wired network. Sensor nodes sense an physical event and send sensed values of the event to actuator nodes. An actuator node makes a decision on proper actions on receipt of sensed values and then issue the action requests to the device nodes. A device node really acts to the physical world. For example, moves a robot arms by performing the action on receipt of the action request. Messages may be lost and nodes may be faulty. Especially, messages are lost due to noise and collision in a wireless network. We propose a fully redundant model for an SADN where each of sensor, actuator, and device functions is replicated in multiple nodes and each of sensor-actuator and actuator-device communication is realized in many-to-many type of communication protocols. Even if some number of nodes are faulty, the other nodes can perform requested tasks. Here, each sensor node sends sensed values to multiple actuator nodes and each actuator node receives sensed values from multiple sensor nodes. While multiple actuator nodes communicate with multiple replica nodes of a device. Even if messages are lost and some number of nodes are faulty, device nodes can surely receive action requests required for sensed values and the actions are performed. In this paper, we discuss a type of semi-passive coordination (SPC protocol of multiple actuator nodes for multiple sensor nodes. We discuss a type of active coordination protocol for multiple actuator nodes and multiple actuation device nodes. We evaluate the SPC protocol for the sensor-actuator coordination in terms of the number of messages exchanged among

  9. Coexistence of IEEE 802.11b/g WLANs and IEEE 802.15.4 WSNs: Modeling and Protocol Enhancements

    OpenAIRE

    Yuan, W.

    2011-01-01

    As an emerging short-range wireless technology, IEEE 802.15.4/ZigBee Wireless Sensor Networks (WSNs) are increasingly used in the fields of home control, industrial control, consumer electronics, energy management, building automation, telecom services, personal healthcare, etc. IEEE 802.15.4/Zig-Bee WSNs share the same 2.4 GHz license-free Industrial, Scientific, and Medical (ISM) band with many other wireless systems such as IEEE 802.11b/g WLANs, Bluetooth, cordless phones, etc. Due to the ...

  10. Wireless Network of Collaborative Physiological Signal Devices in a U-Healthcare System

    Science.gov (United States)

    Jung, Joonyoung; Kim, Daeyoung

    We designed and implemented collaborative physiological signal devices in a u-healthcare(ubiquitous healthcare) system. In this system, wireless body area network (WBAN) such as ZigBee is used to communicate between physiological signal devices and the mobile system. WBAN device needs a specific function for ubiquitous healthcare application. We show several collaborative physiological devices and propose WBAN mechanism such as a fast scanning algorithm, a dynamic discovery and installation mechanism, a reliable data transmission, a device access control for security, and a healthcare profile for u-healthcare system.

  11. An Interference Mitigation Scheme of Device-to-Device Communications for Sensor Networks Underlying LTE-A.

    Science.gov (United States)

    Kim, Jeehyeong; Karim, Nzabanita Abdoul; Cho, Sunghyun

    2017-05-10

    Device-to-Device (D2D) communication technology has become a key factor in wireless sensor networks to form autonomous communication links among sensor nodes. Many research results for D2D have been presented to resolve different technical issues of D2D. Nevertheless, the previous works have not resolved the shortage of data rate and limited coverage of wireless sensor networks. Due to bandwidth shortages and limited communication coverage, 3rd Generation Partnership Project (3GPP) has introduced a new Device-to-Device (D2D) communication technique underlying cellular networks, which can improve spectral efficiencies by enabling the direct communication of devices in proximity without passing through enhanced-NodeB (eNB). However, to enable D2D communication in a cellular network presents a challenge with regard to radio resource management since D2D links reuse the uplink radio resources of cellular users and it can cause interference to the receiving channels of D2D user equipment (DUE). In this paper, a hybrid mechanism is proposed that uses Fractional Frequency Reuse (FFR) and Almost Blank Sub-frame (ABS) schemes to handle inter-cell interference caused by cellular user equipments (CUEs) to D2D receivers (DUE-Rxs), reusing the same resources at the cell edge area. In our case, DUE-Rxs are considered as victim nodes and CUEs as aggressor nodes, since our primary target is to minimize inter-cell interference in order to increase the signal to interference and noise ratio (SINR) of the target DUE-Rx at the cell edge area. The numerical results show that the interference level of the target D2D receiver (DUE-Rx) decreases significantly compared to the conventional FFR at the cell edge. In addition, the system throughput of the proposed scheme can be increased up to 60% compared to the conventional FFR.

  12. Remote discovery and management of end-user devices in heterogeneous private networks

    NARCIS (Netherlands)

    Delphinanto, A.; Hillen, B.A.G.; Passchier, I.; Schoonhoven, B.H.A. van; Hartog, F.T.H. den

    2009-01-01

    End-to-end broadband service delivery requires remote management of devices in the home network, beyond the home gateway (HG). The service provider can only put limited requirements to these of-the-shelf devices, and therefore has to make intelligent use of their given control and management

  13. Concept for trusted personal devices in a mobile and networked environment

    NARCIS (Netherlands)

    Bormann, Frank C.; Manteau, Laurent; Linke, Andreas; Pailles, Jean C.; van Dijk, Johannes A.G.M.

    2006-01-01

    In this article we present a concept for Trusted Personal Devices, which are intended to be the common platform for the next generation of Smart Cards and other secure devices in mobile and networked environments. The concept is based on a classification of technical profiles for different potential

  14. Service and device discovery of nodes in a wireless sensor network

    NARCIS (Netherlands)

    Östmark, Å.; Lindgren, P.; van Halteren, Aart; Meppelink, L.

    2006-01-01

    Emerging wireless communication standards and more capable sensors and actuators have pushed further development of wireless sensor networks. Deploying a large number of sensor nodes requires a high-level framework enabling the devices to present themselves and the resources they hold. The device

  15. Twiddlenet: Metadata Tagging and Data Dissemination in Mobile Device Networks

    Science.gov (United States)

    2007-09-01

    and video. Preference was given to devices capable of generating these types of files; currently these are primarily smartphones or PDA’s. Metadata...implemented using a variety of iPaq and other PDA’s and smartphones . The applications are written in C#, and generally designed to be run on devices...34Providing HTTP Access to Web Servers Rinning," Nokia ., Tech. Rep. NRC-TR-2006-005, 2006. 71 INITIAL DISTRIBUTION LIST 1. Defense

  16. Shipboard Calibration Network Extension Utilizing COTS Products

    Science.gov (United States)

    2014-09-01

    are generated by TCP when performing congestion control . TCP performs congestion control in the network, as defined in RFC 2581, to mitigate the...Available: https://www.wireshark.org/about.html. [22] Network Working Group. (1999, April). TCP congestion control . [Online]. Available: http...Identification TCP Transport Control Protocol VNC Virtual Network Computing WLAN Wireless Local Area Network xvi THIS PAGE INTENTIONALLY

  17. 75 FR 14170 - Medical Device Epidemiology Network: Developing Partnership Between the Center for Devices and...

    Science.gov (United States)

    2010-03-24

    ... Between the Center for Devices and Radiological Health and Academia; Public Workshop AGENCY: Food and Drug... the Center for Devices and Radiological Health and Academia.'' The purpose of the public workshop is to facilitate discussion among FDA and academic researchers with expertise in epidemiology and health...

  18. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  19. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  20. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers

    OpenAIRE

    Tesfaye, Mussie

    2012-01-01

    This is a master’s thesis project entitled “Secure reprogramming of network connected devices”. The thesis begins by providing some background information to enable the reader to understand the current vulnerabilities of network-connected devices, specifically with regard to cyber security and data integrity. Today supervisory control and data acquisition systems utilizing network connected programmable logic controllers are widely used in many industries and critical infrastructures. These n...

  1. Regenerable Photovoltaic Devices with a Hydrogel-Embedded Microvascular Network

    Science.gov (United States)

    Koo, Hyung-Jun; Velev, Orlin D.

    2013-01-01

    Light-driven degradation of photoactive molecules could be one of the major obstacles to stable long term operation of organic dye-based solar light harvesting devices. One solution to this problem may be mimicking the regeneration functionality of a plant leaf. We report an organic dye photovoltaic system that has been endowed with such microfluidic regeneration functionality. A hydrogel medium with embedded channels allows rapid and uniform supply of photoactive reagents by a convection-diffusion mechanism. A washing-activation cycle enables reliable replacement of the organic component in a dye-sensitized photovoltaic system. Repetitive restoration of photovoltaic performance after intensive device degradation is demonstrated. PMID:23912814

  2. 97 Medical Apparatuses tested at the Academic Medical Center (AMC) Amsterdam for interference by WLAN/WiFi signals

    NARCIS (Netherlands)

    Hensbroek, R.

    2009-01-01

    This research describes the influence of WLAN 1 signals on medical apparatuses in the Academic Medical Center (AMC) Amsterdam. The results in this report were obtained by testing medical equipment with WLAN signals. A comparable research was reported earlier. See TNO report KvL/P&Z 2007.117 dated

  3. Security Frameworks for Machine-to-Machine Devices and Networks

    Science.gov (United States)

    Demblewski, Michael

    Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.

  4. Real time network traffic monitoring for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    A wireless local area network (WLAN) is an important type of wireless networks which connotes different wireless nodes in a local area network. WLANs suffer from important problems such as network load balancing, large amount of energy, and load of sampling. This paper presents a new networking traffic approach based on Compressed Sensing (CS) for improving the quality of WLANs. The proposed architecture allows reducing Data Delay Probability (DDP) to 15%, which is a good record for WLANs. The proposed architecture is increased Data Throughput (DT) to 22 % and Signal to Noise (S/N) ratio to 17 %, which provide a good background for establishing high qualified local area networks. This architecture enables continuous data acquisition and compression of WLAN's signals that are suitable for a variety of other wireless networking applications. At the transmitter side of each wireless node, an analog-CS framework is applied at the sensing step before analog to digital converter in order to generate the compressed version of the input signal. At the receiver side of wireless node, a reconstruction algorithm is applied in order to reconstruct the original signals from the compressed signals with high probability and enough accuracy. The proposed algorithm out-performs existing algorithms by achieving a good level of Quality of Service (QoS). This ability allows reducing 15 % of Bit Error Rate (BER) at each wireless node.

  5. Wireless Charger Networking for Mobile Devices: Fundamentals, Standards, and Applications

    OpenAIRE

    Lu, Xiao; Niyato, Dusit; Wang, Ping; Kim, Dong In; Han, Zhu

    2014-01-01

    Wireless charging is a technique of transmitting power through an air gap to an electrical device for the purpose of energy replenishment. Recently, the wireless charging technology has been significantly advanced in terms of efficiency and functionality. This article first presents an overview and fundamentals of wireless charging. We then provide the review of standards, i.e., Qi and Alliance for Wireless Power (A4WP), and highlight on their communication protocols. Next, we propose a novel...

  6. A Categorized Resource Sharing Mechanism for Device-to-Device Communications in Cellular Networks

    OpenAIRE

    Jie Chen; Chang Liu; Husheng Li; Xulong Li; Shaoqian Li

    2016-01-01

    Device-to-Device (D2D) communications are considered one of the key technologies for 5G wireless communication systems. In this paper, a resource sharing mechanism, which applies different policies for different cases (thus being categorized), is proposed. In this scheme, all D2D pairs are divided into three groups by comparing the minimum transmit power with the maximum transmit power of each cellular UE. The proposed mechanism enables multiple D2D pairs in the second group to share the reso...

  7. Dual Y-Shaped Monopole Antenna for Dual-Band WLAN/WiMAX Operations

    Directory of Open Access Journals (Sweden)

    Huiqing Zhai

    2014-01-01

    Full Text Available A dual-band design of monopole antenna with two coupled Y-shaped strips for WLAN/WiMAX applications is presented. By the introduction of dual Y-shaped strips, two separated impedance bandwidths of 22.4% (3.28~4.10 GHz and 19.2% (4.90~5.94 GHz can be obtained to meet the specifications of the WLAN/WiMAX communication band applications. The proposed antenna is successfully simulated, designed, and measured, demonstrating the matched impedance and good radiation characteristics with an overall dimension of 17.7×26×1 mm3.

  8. Conceptual Design of a Nano-Networking Device

    Directory of Open Access Journals (Sweden)

    Sebastian Canovas-Carrasco

    2016-12-01

    Full Text Available Nanotechnology is an emerging scientific area whose advances, among many others, have a positive direct impact on the miniaturization of electronics. This unique technology enables the possibility to design and build electronic components as well as complete devices (called nanomachines or nanodevices at the nano scale. A nanodevice is expected to be an essential element able to operate in a nanonetwork, where a huge number of them would coordinate to acquire data, process the information gathered, and wirelessly transmit those data to end-points providing innovative services in many key scenarios, such as the human body or the environment. This paper is aimed at studying the feasibility of this type of device by carefully examining their main component parts, namely the nanoprocessor, nanomemory, nanoantenna, and nanogenerator. To this end, a thorough state-of-the-art review is conveyed to discuss, substantiate, and select the most suitable current technology (commercial or pre-commercial for each component. Then, we further contribute by developing a complete conceptual nanodevice layout taking into consideration its ultra-small size (similar to a blood cell and its very restricted capabilities (e.g., processing, memory storage, telecommunication, and energy management. The required resources as well as the power consumption are realistically estimated.

  9. Impact of stand-by energy losses in electronic devices on smart network performance

    Directory of Open Access Journals (Sweden)

    Mandić-Lukić Jasmina S.

    2012-01-01

    Full Text Available Limited energy resources and environmental concerns due to ever increasing energy consumption, more and more emphasis is being put on energy savings. Smart networks are promoted worldwide as a powerful tool used to improve the energy efficiency through consumption management, as well as to enable the distributed power generation, primarily based on renewable energy sources, to be optimally explored. To make it possible for the smart networks to function, a large number of electronic devices is needed to operate or to be in their stand-by mode. The consumption of these devices is added to the consumption of many other electronic devices already in use in households and offices, thus giving rise to the overall power consumption and threatening to counteract the primary function of smart networks. This paper addresses the consumption of particular electronic devices, with an emphasis placed on their thermal losses when in stand-by mode and their total share in the overall power consumption in certain countries. The thermal losses of electronic devices in their stand-by mode are usually neglected, but it seems theoretically possible that a massive increase in their number can impact net performance of the future smart networks considerably so that above an optimum level of energy savings achieved by their penetration, total consumption begins to increase. Based on the current stand-by energy losses from the existing electronic devices, we propose that the future penetration of smart networks be optimized taking also into account losses from their own electronic devices, required to operate in stand-by mode.

  10. Practical RSA-PAKE for Low-Power Device in Imbalanced Wireless Networks

    OpenAIRE

    Taek-Young Youn; Sewon Lee; Seok Hie Hong; Young-Ho Park

    2014-01-01

    For enhancing the security of ubiquitous communication, we have to consider three keywords: mobility, wireless, and low computing capability. In this paper, we study one of suitable security protocols for the ubiquitous communication environment. We discuss RSA-based password-authenticated key exchange (RSA-PAKE) protocols for imbalanced wireless networks where a party uses a low-power device to communicate with another party equipped with a powerful computing device. For imbalanced wireless ...

  11. Millimeter-Wave Wireless LAN and Its Extension toward 5G Heterogeneous Networks

    Science.gov (United States)

    Sakaguchi, Kei; Mohamed, Ehab Mahmoud; Kusano, Hideyuki; Mizukami, Makoto; Miyamoto, Shinichi; Rezagah, Roya E.; Takinami, Koji; Takahashi, Kazuaki; Shirakata, Naganori; Peng, Hailan; Yamamoto, Toshiaki; Nanba, Shinobu

    Millimeter-wave (mmw) frequency bands, especially 60 GHz unlicensed band, are considered as a promising solution for gigabit short range wireless communication systems. IEEE standard 802.11ad, also known as WiGig, is standardized for the usage of the 60 GHz unlicensed band for wireless local area networks (WLANs). By using this mmw WLAN, multi-Gbps rate can be achieved to support bandwidth-intensive multimedia applications. Exhaustive search along with beamforming (BF) is usually used to overcome 60 GHz channel propagation loss and accomplish data transmissions in such mmw WLANs. Because of its short range transmission with a high susceptibility to path blocking, multiple number of mmw access points (APs) should be used to fully cover a typical target environment for future high capacity multi-Gbps WLANs. Therefore, coordination among mmw APs is highly needed to overcome packet collisions resulting from un-coordinated exhaustive search BF and to increase the total capacity of mmw WLANs. In this paper, we firstly give the current status of mmw WLANs with our developed WiGig AP prototype. Then, we highlight the great need for coordinated transmissions among mmw APs as a key enabler for future high capacity mmw WLANs. Two different types of coordinated mmw WLAN architecture are introduced. One is the distributed antenna type architecture to realize centralized coordination, while the other is an autonomous coordination with the assistance of legacy Wi-Fi signaling. Moreover, two heterogeneous network (HetNet) architectures are also introduced to efficiently extend the coordinated mmw WLANs to be used for future 5th Generation (5G) cellular networks.

  12. Monitoring and Transmission via Wireless Network for an Assistive Device.

    Science.gov (United States)

    Chang, Yi-Chu; Chen, Chiun-Fan; Lin, Hua-Sheng; Chong, Fok-Ching; Luh, Jer-Junn; Lai, Jin-Shin

    2005-01-01

    Owing to the increasing number of disabled individuals, technical aids are acting more aggressively in the era of modern medicine. The M3S (Multiple Master Multiple Slave) system developed for the physically challenged, utilizes intelligent transmission and integration mechanisms to arrange all hooked-up devices with proper control. To overcome certain limitations of the system (e.g. distance), an RF (Radio Frequency) wireless module would be in charge of the wireless communication between a remote bus and a local bus. It is demonstrated here as assistance for parking assistive vehicles (e.g. powered wheelchair) located in a remote region, which also includes monitoring and usage of accessorial data transmissions shown in our man-machine interface.

  13. Redirecting a client device from a first gateway to a second gateway for accessing a network node function

    NARCIS (Netherlands)

    Strijkers, R.J.; Norp, A.H.J.

    2014-01-01

    The present invention enables a network operator to select a gateway that provides desirable operational parameters to access a network node function in a network node requested by a client. A network service provider detects what service a client device is requesting or using and selects a gateway

  14. Zeitgesteuerte und selbstorganisierende Fahrzeug-zu-Fahrzeug-Kommunikation auf Basis von Ad-hoc-WLAN

    Science.gov (United States)

    Munstermann, Marco; Heitmann, Hans Heinrich

    Da das Basisprotokoll (CSMA/CA) des WLAN-Standards nicht in der Lage ist, der geforderten Aufgabenstellung gerecht zu werden, muss ein zuverlässiges, fehlertolerantes, faires und skalierbares Protokoll entwickelt werden. Zudem sollte es sich durch eine hohe Verfügbarkeit, eine bestimmbare Aktualisierungsrate und definierte Latenzzeiten auszeichnen.

  15. Analysis of a polling system modeling QoS differentiation in WLANs

    NARCIS (Netherlands)

    Coenen, Tom Johannes Maria; van den Berg, Hans Leo; Boucherie, Richardus J.

    2008-01-01

    This paper investigates a polling system with a random polling scheme, a 1-limited service discipline and deterministic service requirement modeling WLANs with QoS differentation capability. The system contains high and low priority queues that are distinguished via the probability of being served

  16. The Networked Naturalist - Mobile devices for Citizen Science

    Science.gov (United States)

    Estrin, D.; Graham, E. A.

    2010-12-01

    Citizen science projects engage individual volunteers or groups to observe, measure, and contribute data to scientific studies. CENS is developing mobile phone and web-based tools for formal and informal observation of ecosystems. We are collaborating with national environmental education campaigns, such as Project BudBurst, and with the National Park Service to increase participation in citizen scientist campaigns and to support park service personnel in day to day data gathering. The overarching goals of the Networked Naturalist set of projects are to enhance participatory learning experiences through citizen science campaigns and to facilitate scientific and environmental data collection. Our experience with volunteers at UCLA and at the National Park Service has demonstrated that mobile phones are an efficient, effective and engaging method for collecting environmental and location data and hold great potential for both raising public awareness of environmental issues and collecting data that is valuable for both ecosystem management and research. CENS is an NSF-funded Science and Technology Center and this project represents collaboration among ecologists, computer scientist, and statisticians. Our mobile applications are free for download on Android and iPhone App stores and the source code is made available through open source licenses.

  17. Combined Resource Allocation System for Device-to-Device Communication towards LTE Networks

    Directory of Open Access Journals (Sweden)

    Abbas Fakhar

    2016-01-01

    Full Text Available The LTE networks are being developed to grant mobile broadband services in the fourth generation (4G systems and allow operators to use spectrum more efficiently.D2D communication is a promising technique to provide wireless services and enhance spectrum exploitation in the LTE Heterogeneous Networks (HetNets.D2D communication in HetNets allows users to communicate with each other directly by reusing the resources when communicating via the base stations. But during the downlink period, both the D2D receiver and the Heterogeneous Users equipment’s (HUE experience interference caused by resource allocation. In this article, we identify and analyze the interference problem of HetNets caused by D2D transmitter during download. We propose a combined resource allocation and resource reuse method for LTE HetNets, where resource allocation to HUEs is employed on the basis of comparative fair algorithm and resource reuse to D2D users is employed on acquisitive empirical algorithm. This approach evaluates whether D2D mode is suitable or not by path loss evaluation, after that decreases the interference to HUE by selection of the minimum channel gain between HUE and D2D transmitter each time to mitigate interference. Our simulation results show that the efficiency and throughput of HetNets is improved by using the proposed method.

  18. Unique device identifiers for coronary stent postmarket surveillance and research: a report from the Food and Drug Administration Medical Device Epidemiology Network Unique Device Identifier demonstration.

    Science.gov (United States)

    Tcheng, James E; Crowley, Jay; Tomes, Madris; Reed, Terrie L; Dudas, Joseph M; Thompson, Kweli P; Garratt, Kirk N; Drozda, Joseph P

    2014-10-01

    Although electronic product identification in the consumer sector is ubiquitous, unique identification of medical devices is just being implemented in 2014. To evaluate unique device identifiers (UDIs) in health care, the US Food and Drug Administration (FDA) funded the Medical Device Epidemiology Network initiative, including a demonstration of the implementation of coronary stent UDI data in the information systems of a multihospital system (Mercy Health). This report describes the first phase of the demonstration. An expert panel of interventional cardiologists nominated by the American College of Cardiology and the Society for Cardiovascular Angiography and Interventions was convened with representatives of industry, health system members of the Healthcare Transformation Group, the American College of Cardiology National Cardiovascular Data Registry, and FDA to articulate concepts needed to best use UDI-associated data. The expert panel identified 3: (1) use cases for UDI-associated data (eg, research), (2) a supplemental data set of clinically relevant attributes (eg, stent dimensions), and (3) governance and administrative principles for the authoritative management of these data. Eighteen use cases were identified, encompassing clinical care, supply chain management, consumer information, research, regulatory, and surveillance domains. In addition to the attributes of the FDA Global Unique Device Identification Database, 9 additional coronary stent-specific attributes were required to address use case requirements. Recommendations regarding governance were elucidated as foundational principles for UDI-associated data management. This process for identifying requisite extensions to support the effective use of UDI-associated data should be generalizable. Implementation of a UDI system for medical devices must anticipate both global and device-specific information. Copyright © 2014 Mosby, Inc. All rights reserved.

  19. Narrating Networks : Exploring the affordances of networks as storytelling devices in journalism

    NARCIS (Netherlands)

    Bounegru, Liliana; Venturini, Tommaso; Gray, Jonathan; Jacomy, Mathieu

    2017-01-01

    Networks have become the de facto diagram of the Big Data age (try searching Google Images for [big data AND visualisation] and see). The concept of networks has become central to many fields of human inquiry and is said to revolutionise everything from medicine to markets to military intelligence.

  20. Response of asymmetric carbon nanotube network devices to sub-terahertz and terahertz radiation

    Energy Technology Data Exchange (ETDEWEB)

    Gayduchenko, I., E-mail: igorandg@gmail.com, E-mail: gefedorov@mail.ru [Physics Department, Moscow State Pedagogical University, Moscow 119991 (Russian Federation); National Research Centre “Kurchatov Institute,” Moscow 123128 (Russian Federation); Kardakova, A.; Voronov, B.; Finkel, M. [Physics Department, Moscow State Pedagogical University, Moscow 119991 (Russian Federation); Fedorov, G., E-mail: igorandg@gmail.com, E-mail: gefedorov@mail.ru [Physics Department, Moscow State Pedagogical University, Moscow 119991 (Russian Federation); Moscow Institute of Physics and Technology (State University), Dolgoprudny 141700 (Russian Federation); Jiménez, D. [Departament d' Enginyeria Electrònica, Escola d' Enginyeria, Universitat Autònoma de Barcelona, 08193 Bellaterra (Spain); Morozov, S. [Moscow Institute of Physics and Technology (State University), Dolgoprudny 141700 (Russian Federation); Presniakov, M. [National Research Centre “Kurchatov Institute,” Moscow 123128 (Russian Federation); Goltsman, G. [Physics Department, Moscow State Pedagogical University, Moscow 119991 (Russian Federation); Moscow Institute of Electronics and Mathematics, National Research University Higher School of Economics, Moscow 109028 (Russian Federation)

    2015-11-21

    Demand for efficient terahertz radiation detectors resulted in intensive study of the asymmetric carbon nanostructures as a possible solution for that problem. It was maintained that photothermoelectric effect under certain conditions results in strong response of such devices to terahertz radiation even at room temperature. In this work, we investigate different mechanisms underlying the response of asymmetric carbon nanotube (CNT) based devices to sub-terahertz and terahertz radiation. Our structures are formed with CNT networks instead of individual CNTs so that effects probed are more generic and not caused by peculiarities of an individual nanoscale object. We conclude that the DC voltage response observed in our structures is not only thermal in origin. So called diode-type response caused by asymmetry of the device IV characteristic turns out to be dominant at room temperature. Quantitative analysis provides further routes for the optimization of the device configuration, which may result in appearance of novel terahertz radiation detectors.

  1. Using Automated Learning Devices for Monkeys (ALDM) to study social networks.

    Science.gov (United States)

    Claidière, Nicolas; Gullstrand, Julie; Latouche, Aurélien; Fagot, Joël

    2017-02-01

    Social network analysis has become a prominent tool to study animal social life, and there is an increasing need to develop new systems to collect social information automatically, systematically, and reliably. Here we explore the use of a freely accessible Automated Learning Device for Monkeys (ALDM) to collect such social information on a group of 22 captive baboons (Papio papio). We compared the social network obtained from the co-presence of the baboons in ten ALDM testing booths to the social network obtained through standard behavioral observation techniques. The results show that the co-presence network accurately reflects the social organization of the group, and also indicate under which conditions the co-presence network is most informative. In particular, the best correlation between the two networks was obtained with a minimum of 40 days of computer records and for individuals with at least 500 records per day. We also show through random permutation tests that the observed correlations go beyond what would be observed by simple synchronous activity, to reflect a preferential choice of closely located testing booths. The use of automatized cognitive testing therefore presents a new way of obtaining a large and regular amount of social information that is necessary to develop social network analysis. It also opens the possibility of studying dynamic changes in network structure with time and in relation to the cognitive performance of individuals.

  2. Device-Relaying in Cellular D2D Networks: A Fairness Perspective

    KAUST Repository

    Chaaban, Anas

    2015-10-24

    Device-to-Device (D2D) communication is envisioned to play a key role in 5G networks as a technique for meeting the demand for high data rates. In a cellular network, D2D allows not only direct communication between users, but also device relaying. In this paper, a simple instance of device-relaying is investigated, and its impact on fairness among users is studied. Namely, a cellular network consisting of two D2D-enabled users and a base-station (BS) is considered. Thus, the users who want to establish communication with the BS can act as relays for each other’s signals. While this problem is traditionally considered in the literature as a multiple-access channel with cooperation in the uplink, and a broadcast channel with cooperation in the downlink, we propose a different treatment of the problem as a multi-way channel. A simple communication scheme is proposed, and is shown to achieve significant gain in terms of fairness (measured by the symmetric rate supported) in comparison to the aforementioned traditional treatment.

  3. Measurement-Device-Independent Quantum Key Distribution over Untrustful Metropolitan Network

    Directory of Open Access Journals (Sweden)

    Yan-Lin Tang

    2016-03-01

    Full Text Available Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays. The security critically relies on the accountability of the trusted relays, which will break down if the relay is dishonest or compromised. Here, we construct a measurement-device-independent quantum key distribution (MDIQKD network in a star topology over a 200-square-kilometer metropolitan area, which is secure against untrustful relays and against all detection attacks. In the field test, our system continuously runs through one week with a secure key rate 10 times larger than previous results. Our results demonstrate that the MDIQKD network, combining the best of both worlds—security and practicality, constitutes an appealing solution to secure metropolitan communications.

  4. The optimal number, type and location of devices in automation of electrical distribution networks

    Directory of Open Access Journals (Sweden)

    Popović Željko N.

    2015-01-01

    Full Text Available This paper presents the mixed integer linear programming based model for determining optimal number, type and location of remotely controlled and supervised devices in distribution networks in the presence of distributed generators. The proposed model takes into consideration a number of different devices simultaneously (remotely controlled circuit breakers/reclosers, sectionalizing switches, remotely supervised and local fault passage indicators along with the following: expected outage cost to consumers and producers due to momentary and long-term interruptions, automated device expenses (capital investment, installation, and annual operation and maintenance costs, number and expenses of crews involved in the isolation and restoration process. Furthermore, the other possible benefits of each of automated device are also taken into account (e.g., benefits due to decreasing the cost of switching operations in normal conditions. The obtained numerical results emphasize the importance of consideration of different types of automation devices simultaneously. They also show that the proposed approach have a potential to improve the process of determining of the best automation strategy in real life distribution networks.

  5. Real-time network traffic classification technique for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.

  6. QNAP 1263U Network Attached Storage (NAS)/ Storage Area Network (SAN) Device Users Guide

    Science.gov (United States)

    2016-11-01

    speed of the network itself. Many standards are in place for transferring data, including more standard ones such as File Transfer Protocol and Server ...Mapping the Network Drive 4 5.1 Windows 7 4 5.2 Windows 10 6 6. Connecting to the iSCSI on the NAS 6 7. Adding a New IQN to iSCSI ACL 7 8... Adding a New LUN 9 9. Finding an Initiator IQN for ACL 11 10. Virtualization Station 12 11. Code 12 11.1 iscsi setup.bat 13 11.2 reconnect

  7. FDTD assessment of human exposure to electromagnetic fields from WiFi and bluetooth devices in some operating situations.

    Science.gov (United States)

    Martínez-Búrdalo, M; Martín, A; Sanchis, A; Villar, R

    2009-02-01

    In this work, the numerical dosimetry in human exposure to the electromagnetic fields from antennas of wireless devices, such as those of wireless local area networks (WLAN) access points or phone and computer peripherals with Bluetooth antennas, is analyzed with the objective of assessing guidelines compliance. Several geometrical configurations are considered to simulate possible exposure situations of a person to the fields from WLAN or Bluetooth antennas operating at 2400 MHz. The exposure to radiation from two sources of different frequencies when using a 1800 MHz GSM mobile phone connected via Bluetooth with a hands-free car kit is also considered. The finite-difference time-domain (FDTD) method is used to calculate electric and magnetic field values in the vicinity of the antennas and specific absorption rates (SAR) in a high-resolution model of the human head and torso, to be compared with the limits from the guidelines (reference levels and basic restrictions, respectively). Results show that the exposure levels in worst-case situations studied are lower than those obtained when analyzing the exposure to mobile phones, as could be expected because of the low power of the signals and the distance between the human and the antennas, with both field and SAR values being far below the limits established by the guidelines, even when considering the combined exposure to both a GSM and a Bluetooth antenna. Copyright 2008 Wiley-Liss, Inc.

  8. Frequency of Internet, Social Network and Mobile Devices use in Prospective Teachers from Faculty of Education

    Directory of Open Access Journals (Sweden)

    Murat Tezer

    2017-11-01

    Full Text Available The basic aim of this study was to determine the relationship between university students’ frequency of internet use, duration of internet connection, environments that they connect to the internet, duration use of mobile devices, frequency of social networking leisure activities and internet addiction levels. The participants included a total of 363 university students of whom 255 were female and 108 were male. Quantitative research methods were used in this study. A survey was developed by the researchers and administered to the students. Based on statistical analysis; it was revealed that the frequency of internet use was every day throughout the week, students frequently stayed connected to the internet at home with their computers and the frequency of mobile devices and social network use was found as “Always”. In addition, university students stated that they connected to the internet in their leisure time.

  9. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    Science.gov (United States)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  10. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Directory of Open Access Journals (Sweden)

    Tayfun Gokmen

    2017-10-01

    Full Text Available In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU devices to convolutional neural networks (CNNs. We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  11. Hybrid Spintronic-CMOS Spiking Neural Network with On-Chip Learning: Devices, Circuits, and Systems

    Science.gov (United States)

    Sengupta, Abhronil; Banerjee, Aparajita; Roy, Kaushik

    2016-12-01

    Over the past decade, spiking neural networks (SNNs) have emerged as one of the popular architectures to emulate the brain. In SNNs, information is temporally encoded and communication between neurons is accomplished by means of spikes. In such networks, spike-timing-dependent plasticity mechanisms require the online programing of synapses based on the temporal information of spikes transmitted by spiking neurons. In this work, we propose a spintronic synapse with decoupled spike-transmission and programing-current paths. The spintronic synapse consists of a ferromagnet-heavy-metal heterostructure where the programing current through the heavy metal generates spin-orbit torque to modulate the device conductance. Low programing energy and fast programing times demonstrate the efficacy of the proposed device as a nanoelectronic synapse. We perform a simulation study based on an experimentally benchmarked device-simulation framework to demonstrate the interfacing of such spintronic synapses with CMOS neurons and learning circuits operating in the transistor subthreshold region to form a network of spiking neurons that can be utilized for pattern-recognition problems.

  12. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Science.gov (United States)

    Gokmen, Tayfun; Onen, Murat; Haensch, Wilfried

    2017-01-01

    In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN) in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU) devices to convolutional neural networks (CNNs). We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  13. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices.

    Science.gov (United States)

    Gokmen, Tayfun; Onen, Murat; Haensch, Wilfried

    2017-01-01

    In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN) in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU) devices to convolutional neural networks (CNNs). We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  14. Enhanced Handover Decision Algorithm in Heterogeneous Wireless Network.

    Science.gov (United States)

    Abdullah, Radhwan Mohamed; Zukarnain, Zuriati Ahmad

    2017-07-14

    Transferring a huge amount of data between different network locations over the network links depends on the network's traffic capacity and data rate. Traditionally, a mobile device may be moved to achieve the operations of vertical handover, considering only one criterion, that is the Received Signal Strength (RSS). The use of a single criterion may cause service interruption, an unbalanced network load and an inefficient vertical handover. In this paper, we propose an enhanced vertical handover decision algorithm based on multiple criteria in the heterogeneous wireless network. The algorithm consists of three technology interfaces: Long-Term Evolution (LTE), Worldwide interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN). It also employs three types of vertical handover decision algorithms: equal priority, mobile priority and network priority. The simulation results illustrate that the three types of decision algorithms outperform the traditional network decision algorithm in terms of handover number probability and the handover failure probability. In addition, it is noticed that the network priority handover decision algorithm produces better results compared to the equal priority and the mobile priority handover decision algorithm. Finally, the simulation results are validated by the analytical model.

  15. A Novel Hammer-Shaped UWB Antenna with Triple Notched-Band for Rejecting RLS, WLAN and XSCS bands

    Directory of Open Access Journals (Sweden)

    H. S. Mewara

    2017-10-01

    Full Text Available A novel hammer-shaped UWB printed antenna with triple notched stop bands is presented and fabricated on FR-4 substrate with size of 40×40×1.6 mm3. The proposed antenna is composed of hammer-shaped patch with C-shaped slot, U-shaped slot on feed line, and inverted stepped notch and bevel edges with pair of L-shaped slots in partial ground plane. The fabricated antenna is tested and obtained impedance bandwidth 2.89 ̶ 11.6 GHz with three notched stop bands 3.15 ̶ 3.7 GHz, 5.45 ̶ 6.8 GHz, and 7.5 ̶  8.8 GHz, for radiolocation system (RLS, wireless local area networks (WLAN, and X-band satellite communication system (XSCS bands, respectively. Moreover, the antenna result shows omnidirectional radiation pattern, average gain of 3.10 dBi over the whole UWB band except at the notched frequency bands.

  16. Design and Analysis of Printed Yagi-Uda Antenna and Two-Element Array for WLAN Applications

    Directory of Open Access Journals (Sweden)

    Cai Run-Nan

    2012-01-01

    Full Text Available A printed director antenna with compact structure is proposed. The antenna is fed by a balanced microstrip-slotline and makes good use of space to reduce feeding network area and the size of antenna. According to the simulation results of CST MICROWAVE STUDIO software, broadband characteristics and directional radiation properties of the antenna are explained. The operating bandwidth is 1.8 GHz–3.5 GHz with reflection coefficient less than −10 dB. Antenna gain in band can achieve 4.5–6.8 dBi, and the overall size of antenna is smaller than 0.34λ0×0.58λ0. Then the antenna is developed to a two-element antenna array, working frequency and relative bandwidth of which are 2.15–2.87 GHz and 28.7%, respectively. Compared with antenna unit, the gain of the antenna array has increased by 2 dB. Thus the proposed antenna has characteristics of compact structure, relatively small size, and wideband, and it can be widely used in PCS/UMTS/WLAN/ WiMAX fields.

  17. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  18. Green Small Cell Operation of Ultra-Dense Networks Using Device Assistance

    Directory of Open Access Journals (Sweden)

    Gilsoo Lee

    2016-12-01

    Full Text Available As higher performance is demanded in 5G networks, energy consumption in wireless networks increases along with the advances of various technologies, so enhancing energy efficiency also becomes an important goal to implement 5G wireless networks. In this paper, we study the energy efficiency maximization problem focused on finding a suitable set of turned-on small cell access points (APs. Finding the suitable on/off states of APs is challenging since the APs can be deployed by users while centralized network planning is not always possible. Therefore, when APs in small cells are randomly deployed and thus redundant in many cases, a mechanism of dynamic AP turning-on/off is required. We propose a device-assisted framework that exploits feedback messages from the user equipment (UE. To solve the problem, we apply an optimization method using belief propagation (BP on a factor graph. Then, we propose a family of online algorithms inspired by BP, called DANCE, that requires low computational complexity. We perform numerical simulations, and the extensive simulations confirm that BP enhances energy efficiency significantly. Furthermore, simple, but practical DANCE exhibits close performance to BP and also better performance than other popular existing methods. Specifically, in a small-sized network, BP enhances energy efficiency 129%. Furthermore, in ultra-dense networks, DANCE algorithms successfully achieve orders of magnitude higher energy efficiency than that of the baseline.

  19. Continuous-variable Measurement-device-independent Quantum Relay Network with Phase-sensitive Amplifiers

    Science.gov (United States)

    Li, Fei; Zhao, Wei; Guo, Ying

    2017-09-01

    Continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is now heading towards solving the practical problem of implementing scalable quantum networks. In this paper, we show that a solution can come from deploying an optical amplifier in the CV-MDI system, aiming to establish a high-rate quantum network. We suggest an improved CV-MDI protocol using the EPR states coupled with optical amplifiers. It can implement a practical quantum network scheme, where the legal participants create the secret correlations by using EPR states connecting to an untrusted relay via insecure links and applying the multi-entangled Greenberger-Horne-Zeilinger (GHZ) state analysis at relay station. Despite the possibility that the relay could be completely tampered with and imperfect links are subject to the powerful attacks, the legal participants are still able to extract a secret key from network communication. The numerical simulation indicates that the quantum network communication can be achieved in an asymmetric scenario, fulfilling the demands of a practical quantum network. Furthermore, we show that the use of optical amplifiers can compensate the inherent imperfections and improve the secret key rate of the CV-MDI system.

  20. Modeling fiber Bragg grating device networks in photomechanical polymer optical fibers

    Science.gov (United States)

    Lanska, Joseph T.; Kuzyk, Mark G.; Sullivan, Dennis M.

    2015-09-01

    We report on the modeling of fiber Bragg grating (FBG) networks in poly(methyl methacrylate) (PMMA) polymer fibers doped with azo dyes. Our target is the development of Photomechanical Optical Devices (PODs), comprised of two FBGs in series, separated by a Fabry-Perot cavity of photomechanical material. PODs exhibit photomechanical multi-stability, with the capacity to access multiple length states for a fixed input intensity when a mechanical shock is applied. Using finite-difference time-domain (FDTD) numerical methods, we modeled the photomechanical response of both Fabry-Perot and Bragg-type PODs in a single polymer optical fiber. The polymer fiber was modeled as an instantaneous Kerr-type nonlinear χ(3) material. Our model correctly predicts the essential optical features of FBGs as well as the photomechanical multi-stability of nonlinear Fabry-Perot cavity-based PODs. Networks of PODs may provide a framework for smart shape-shifting materials and fast optical computation where the decision process is distributed over the entire network. In addition, a POD can act as memory, and its response can depend on input history. Our models inform and will accelerate targeted development of novel Bragg grating-based polymer fiber device networks for a variety of applications in optical computing and smart materials.

  1. Using smart mobile devices in social-network-based health education practice: a learning behavior analysis.

    Science.gov (United States)

    Wu, Ting-Ting

    2014-06-01

    Virtual communities provide numerous resources, immediate feedback, and information sharing, enabling people to rapidly acquire information and knowledge and supporting diverse applications that facilitate interpersonal interactions, communication, and sharing. Moreover, incorporating highly mobile and convenient devices into practice-based courses can be advantageous in learning situations. Therefore, in this study, a tablet PC and Google+ were introduced to a health education practice course to elucidate satisfaction of learning module and conditions and analyze the sequence and frequency of learning behaviors during the social-network-based learning process. According to the analytical results, social networks can improve interaction among peers and between educators and students, particularly when these networks are used to search for data, post articles, engage in discussions, and communicate. In addition, most nursing students and nursing educators expressed a positive attitude and satisfaction toward these innovative teaching methods, and looked forward to continuing the use of this learning approach. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. An Optimized 2.4GHz RF Power Amplifier Performance for WLAN System

    Science.gov (United States)

    Ali, Mohammed H.; Chakrabarty, C. K.; Abdalla, Ahmed N.; Hock, Goh C.

    2013-06-01

    Recently, the design of RF power amplifiers (PAs) for modern wireless systems are faced with a difficult tradeoff for example, cellphone; battery lifetime is largely determined by the power efficiency of the PA and high spectral efficiency which have ability to transmit data at the highest possible rate for a given channel bandwidth. This paper presents the design a multi stage class AB power Amplifier with high power added efficiency (PAE) and acceptable linearity for the WLAN applications. The open-circuited third harmonic control circuit enhances the efficiency of the PA without deteriorating the linearity of class-AB mode of the PA. The voltage and current waveforms are simulated to evaluate the appropriate operation for the modes. The effectiveness of the proposed controller has been verified by comparing proposed method with another methods using simulation study under a variety of conditions. The proposed circuit operation for a WLAN signals delivers a power-added efficiency (PAE) of 37.6% is measured at 31.6-dBm output power while dissipating 34.61 mA from a 1.8V supply. Finally, the proposed PA is show a good and acceptable result for the WLAN system.

  3. Design of Compact 4 × 4 UWB-MIMO Antenna with WLAN Band Rejection

    Directory of Open Access Journals (Sweden)

    Nguyen Khac Kiem

    2014-01-01

    Full Text Available A compact 4 × 4 UWB-MIMO antenna with rejected WLAN band employing an electromagnetic bandgap (EBG structure is presented in this paper. The MIMO antenna is electrically small (60 mm × 60 mm, printed on a FR4_epoxy substrate with the dielectric constant of 4.4 and a thickness of 1.6 mm. A mushroom-like EBG structure is used to reject the WLAN frequency at 5.5 GHz. In order to reduce the mutual coupling of the antenna elements, a stub structure acting as a bandstop filter is inserted to suppress the effect of the surface current between elements of the proposed antenna. The final design of the MIMO antenna satisfies the return loss requirement of less than −10 dB in a bandwidth ranging from 2.73 GHz to 10.68 GHz, which entirely covers UWB frequency band, which is allocated from 3.1 to 10.6 GHz. The antenna also exhibits a WLAN band-notched performance at the frequency band of 5.36–6.34 GHz while the values of all isolation coefficients are below −15 dB and the correlation coefficient of MIMO antenna is less than −28 dB over the UWB range. A good agreement between simulation and measurement is shown in this context.

  4. Design of energy conscious antenna system for WLAN frequency band

    CSIR Research Space (South Africa)

    Bembe, MJ

    2009-08-01

    Full Text Available The electronically steerable parasitic array radiator (ESPAR) antenna system is configured with one feed radiating element and N-parasitic radiating elements. The radiation pattern is electronically controlled by means of the variable devices...

  5. Flow control using audio tones in resonant microfluidic networks: towards cell-phone controlled lab-on-a-chip devices.

    Science.gov (United States)

    Phillips, Reid H; Jain, Rahil; Browning, Yoni; Shah, Rachana; Kauffman, Peter; Dinh, Doan; Lutz, Barry R

    2016-08-16

    Fluid control remains a challenge in development of portable lab-on-a-chip devices. Here, we show that microfluidic networks driven by single-frequency audio tones create resonant oscillating flow that is predicted by equivalent electrical circuit models. We fabricated microfluidic devices with fluidic resistors (R), inductors (L), and capacitors (C) to create RLC networks with band-pass resonance in the audible frequency range available on portable audio devices. Microfluidic devices were fabricated from laser-cut adhesive plastic, and a "buzzer" was glued to a diaphragm (capacitor) to integrate the actuator on the device. The AC flowrate magnitude was measured by imaging oscillation of bead tracers to allow direct comparison to the RLC circuit model across the frequency range. We present a systematic build-up from single-channel systems to multi-channel (3-channel) networks, and show that RLC circuit models predict complex frequency-dependent interactions within multi-channel networks. Finally, we show that adding flow rectifying valves to the network creates pumps that can be driven by amplified and non-amplified audio tones from common audio devices (iPod and iPhone). This work shows that RLC circuit models predict resonant flow responses in multi-channel fluidic networks as a step towards microfluidic devices controlled by audio tones.

  6. Virtual File System Mounting amp Searching With Network JVM For LAN

    Directory of Open Access Journals (Sweden)

    Nikita Kamble

    2015-08-01

    Full Text Available Computer technology has rapidly grown over past decades. Most of this can be attributed to the Internet as many computers now have a need to be networked together to establish an online connection. A local area network is a group of computers and associated devices that share a common communication line or wireless link to the service. Typically a LAN compasses computers and peripherals connected to a secure server within a small geographic area such as an office building or home computer and other mobile devices that share resources such as printer or network storage. A LAN is contrasted in principle to a wide area networkWANwhich covers a larger geographic distance and may involve leased telecom circuits while the media for LANs are locally managed. Ethernet are twisted pair cabling amp Wi-Fi are the two most common transmission technologies in use for LAN. The rise of virtualization has fueled the development of virtual LANWLANwhich allows network administrator to logically group network nodes amp partition their networks without the need for major infrastructure changes. In some situations a wireless LAN or Wi-Fi maybe preferable to a wired LAN because of its flexibility amp cost. Companies are asserting WLANs as a replacement for their wired infrastructure as the number of smart phones tablets amp other mobile devices proliferates.

  7. Wireless Indoor Location Estimation Based on Neural Network RSS Signature Recognition (LENSR)

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr; Milos Manic

    2008-06-01

    Location Based Services (LBS), context aware applications, and people and object tracking depend on the ability to locate mobile devices, also known as localization, in the wireless landscape. Localization enables a diverse set of applications that include, but are not limited to, vehicle guidance in an industrial environment, security monitoring, self-guided tours, personalized communications services, resource tracking, mobile commerce services, guiding emergency workers during fire emergencies, habitat monitoring, environmental surveillance, and receiving alerts. This paper presents a new neural network approach (LENSR) based on a competitive topological Counter Propagation Network (CPN) with k-nearest neighborhood vector mapping, for indoor location estimation based on received signal strength. The advantage of this approach is both speed and accuracy. The tested accuracy of the algorithm was 90.6% within 1 meter and 96.4% within 1.5 meters. Several approaches for location estimation using WLAN technology were reviewed for comparison of results.

  8. Energy efficiency in wireless networks

    CERN Document Server

    Jumira, Oswald

    2013-01-01

    The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network "traffic" generated over network infrastructures.This book presents state-of-the-art energy-efficient techniques, designs and implementations that pertain to wireless communication networks such as cellular networks, wireless local area networks (WLANs) and wireless ad hoc networks (WAHNs) including mobile ad hoc networks (MANETs), and wireless sensor networks (WSNs) as they are deployed across the world to facilitate "always on" reliable high-speed

  9. Soft hydrogels interpenetrating silicone--A polymer network for drug-releasing medical devices.

    Science.gov (United States)

    Steffensen, Søren L; Vestergaard, Merete H; Møller, Eva H; Groenning, Minna; Alm, Martin; Franzyk, Henrik; Nielsen, Hanne M

    2016-02-01

    Materials for the next generation of medical devices will require not only the mechanical stability of current devices, but must also possess other properties such as sustained release of drugs in a controlled manner over a prolonged period of time. This work focuses on creating such a sophisticated material by forming an interpenetrating polymer network (IPN) material through modification of silicone elastomers with a poly(2-hydroxyethyl methacrylate) (PHEMA)-based hydrogel. IPN materials with a PHEMA content in the range of 13%-38% (w/w) were synthesized by using carbon dioxide-based solvent mixtures under high pressure. These IPNs were characterized with regard to microstructure as well as ability of the hydrogel to form a surface-connected hydrophilic carrier network inside the silicone. A critical limit for hydrogel connectivity was found both via simulation and by visualization of water uptake in approximately 25% (w/w) PHEMA, indicating that entrapment of gel occurs at low gel concentrations. The optimized IPN material was loaded with the antibiotic ciprofloxacin, and the resulting drug release was shown to inhibit bacterial growth when placed on agar, thus demonstrating the potential of this IPN material for future applications in drug-releasing medical devices. © 2015 Wiley Periodicals, Inc.

  10. Distributed processing and network of data acquisition and diagnostics control for Large Helical Device (LHD)

    Energy Technology Data Exchange (ETDEWEB)

    Nakanishi, H.; Kojima, M.; Hidekuma, S. [National Inst. for Fusion Science, Toki, Gifu (Japan)

    1997-11-01

    The LHD (Large Helical Device) data processing system has been designed in order to deal with the huge amount of diagnostics data of 600-900 MB per 10-second short-pulse experiment. It prepares the first plasma experiment in March 1998. The recent increase of the data volume obliged to adopt the fully distributed system structure which uses multiple data transfer paths in parallel and separates all of the computer functions into clients and servers. The fundamental element installed for every diagnostic device consists of two kinds of server computers; the data acquisition PC/Windows NT and the real-time diagnostics control VME/VxWorks. To cope with diversified kinds of both device control channels and diagnostics data, the object-oriented method are utilized wholly for the development of this system. It not only reduces the development burden, but also widen the software portability and flexibility. 100Mbps EDDI-based fast networks will re-integrate the distributed server computers so that they can behave as one virtual macro-machine for users. Network methods applied for the LHD data processing system are completely based on the TCP/IP internet technology, and it provides the same accessibility to the remote collaborators as local participants can operate. (author)

  11. Remote management of non-TR-069 UPnP end-user devices in a private network

    NARCIS (Netherlands)

    Hillen, B.A.G.; Passchier, I.; Schoonhoven, B.H.A. van; Hartog, F.T.H. den

    2009-01-01

    End-to - end broadband service delivery requires remote management of devices in the home network, beyond the home gateway (HG). The service provider can only put limited requirements to these of-the-shelf devices, and therefore has to make intelligent use of their given control and management

  12. Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices

    Directory of Open Access Journals (Sweden)

    Andrea Baiocchi

    2015-01-01

    Full Text Available Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. On one side there is a need to maintain the logic of high level policies, which requires administrators to implement and update a large amount of filtering rules while keeping them conflict-free, that is, avoiding security inconsistencies. On the other side, traffic adaptive optimization of large rule lists is useful for general purpose computers used as filtering devices, without specific designed hardware, to face growing link speeds and to harden filtering devices against DoS and DDoS attacks. Our work joins the two issues in an innovative way and defines a traffic adaptive algorithm to find conflict-free optimized rule sets, by relying on information gathered with traffic logs. The proposed approach suits current technology architectures and exploits available features, like traffic log databases, to minimize the impact of ACO development on the packet filtering devices. We demonstrate the benefit entailed by the proposed algorithm through measurements on a test bed made up of real-life, commercial packet filtering devices.

  13. Experimental measurement-device-independent quantum digital signatures over a metropolitan network

    Science.gov (United States)

    Yin, Hua-Lei; Wang, Wei-Long; Tang, Yan-Lin; Zhao, Qi; Liu, Hui; Sun, Xiang-Xiang; Zhang, Wei-Jun; Li, Hao; Puthoor, Ittoop Vergheese; You, Li-Xing; Andersson, Erika; Wang, Zhen; Liu, Yang; Jiang, Xiao; Ma, Xiongfeng; Zhang, Qiang; Curty, Marcos; Chen, Teng-Yun; Pan, Jian-Wei

    2017-04-01

    Quantum digital signatures (QDSs) provide a means for signing electronic communications with information-theoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable against detector side-channel attacks, just like quantum key distribution. Here we exploit a measurement-device-independent (MDI) quantum network, over a metropolitan area, to perform a field test of a three-party MDI QDS scheme that is secure against any detector side-channel attack. In so doing, we are able to successfully sign a binary message with a security level of about 10-7. Remarkably, our work demonstrates the feasibility of MDI QDSs for practical applications.

  14. Integrated control of wind farms, FACTS devices and the power network using neural networks and adaptive critic designs

    Science.gov (United States)

    Qiao, Wei

    Worldwide concern about the environmental problems and a possible energy crisis has led to increasing interest in clean and renewable energy generation. Among various renewable energy sources, wind power is the most rapidly growing one. Therefore, how to provide efficient, reliable, and high-performance wind power generation and distribution has become an important and practical issue in the power industry. In addition, because of the new constraints placed by the environmental and economical factors, the trend of power system planning and operation is toward maximum utilization of the existing infrastructure with tight system operating and stability margins. This trend, together with the increased penetration of renewable energy sources, will bring new challenges to power system operation, control, stability and reliability which require innovative solutions. Flexible ac transmission system (FACTS) devices, through their fast, flexible, and effective control capability, provide one possible solution to these challenges. To fully utilize the capability of individual power system components, e.g., wind turbine generators (WTGs) and FACTS devices, their control systems must be suitably designed with high reliability. Moreover, in order to optimize local as well as system-wide performance and stability of the power system, real-time local and wide-area coordinated control is becoming an important issue. Power systems containing conventional synchronous generators, WTGs, and FACTS devices are large-scale, nonlinear, nonstationary, stochastic and complex systems distributed over large geographic areas. Traditional mathematical tools and system control techniques have limitations to control such complex systems to achieve an optimal performance. Intelligent and bio-inspired techniques, such as swarm intelligence, neural networks, and adaptive critic designs, are emerging as promising alternative technologies for power system control and performance optimization. This

  15. A cost-effective measurement-device-independent quantum key distribution system for quantum networks

    Science.gov (United States)

    Valivarthi, Raju; Zhou, Qiang; John, Caleb; Marsili, Francesco; Verma, Varun B.; Shaw, Matthew D.; Nam, Sae Woo; Oblak, Daniel; Tittel, Wolfgang

    2017-12-01

    We experimentally realize a measurement-device-independent quantum key distribution (MDI-QKD) system. It is based on cost-effective and commercially available hardware such as distributed feedback lasers and field-programmable gate arrays that enable time-bin qubit preparation and time-tagging, and active feedback systems that allow for compensation of time-varying properties of photons after transmission through deployed fiber. We examine the performance of our system, and conclude that its design does not compromise performance. Our demonstration paves the way for MDI-QKD-based quantum networks in star-type topology that extend over more than 100 km distance.

  16. Research on two-port network of wavelet transform processor using surface acoustic wavelet devices and its application.

    Science.gov (United States)

    Liu, Shoubing; Lu, Wenke; Zhu, Changchun

    2017-11-01

    The goal of this research is to study two-port network of wavelet transform processor (WTP) using surface acoustic wave (SAW) devices and its application. The motive was prompted by the inconvenience of the long research and design cycle and the huge research funding involved with traditional method in this field, which were caused by the lack of the simulation and emulation method of WTP using SAW devices. For this reason, we introduce the two-port network analysis tool, which has been widely used in the design and analysis of SAW devices with uniform interdigital transducers (IDTs). Because the admittance parameters calculation formula of the two-port network can only be used for the SAW devices with uniform IDTs, this analysis tool cannot be directly applied into the design and analysis of the processor using SAW devices, whose input interdigital transducer (IDT) is apodized weighting. Therefore, in this paper, we propose the channel segmentation method, which can convert the WTP using SAW devices into parallel channels, and also provide with the calculation formula of the number of channels, the number of finger pairs and the static capacitance of an interdigital period in each parallel channel firstly. From the parameters given above, we can calculate the admittance parameters of the two port network for each channel, so that we can obtain the admittance parameter of the two-port network of the WTP using SAW devices on the basis of the simplification rule of parallel two-port network. Through this analysis tool, not only can we get the impulse response function of the WTP using SAW devices but we can also get the matching circuit of it. Large numbers of studies show that the parameters of the two-port network obtained by this paper are consistent with those measured by network analyzer E5061A, and the impulse response function obtained by the two-port network analysis tool is also consistent with that measured by network analyzer E5061A, which can meet the

  17. Multimedia distribution using network coding on the iphone platform

    DEFF Research Database (Denmark)

    Vingelmann, Peter; Pedersen, Morten Videbæk; Fitzek, Frank

    2010-01-01

    This paper looks into the implementation details of random linear network coding on the Apple iPhone and iPod Touch mobile platforms for multimedia distribution. Previous implementations of network coding on this platform failed to achieve a throughput which is sufficient to saturate the WLAN...

  18. Fragility issues of medical video streaming over 802.11e-WLAN m-health environments.

    Science.gov (United States)

    Tan, Yow-Yiong Edwin; Philip, Nada; Istepanian, Robert H

    2006-01-01

    This paper presents some of the fragility issues of a medical video streaming over 802.11e-WLAN in m-health applications. In particular, we present a medical channel-adaptive fair allocation (MCAFA) scheme for enhanced QoS support for IEEE 802.11 (WLAN), as a modification for the standard 802.11e enhanced distributed coordination function (EDCF) is proposed for enhanced medical data performance. The medical channel-adaptive fair allocation (MCAFA) proposed extends the EDCF, by halving the contention window (CW) after zeta consecutive successful transmissions to reduce the collision probability when channel is busy. Simulation results show that MCAFA outperforms EDCF in-terms of overall performance relevant to the requirements of high throughput of medical data and video streaming traffic in 3G/WLAN wireless environments.

  19. Application of the device based on chirping of optical impulses for management of software-defined networks in dynamic mode

    Science.gov (United States)

    Vinogradova, Irina L.; Khasansin, Vadim R.; Andrianova, Anna V.; Yantilina, Liliya Z.; Vinogradov, Sergey L.

    2016-03-01

    The analysis of the influence of the physical layer concepts in optical networks on the performance of the whole network. It is concluded that the relevance of the search for new means of transmitting information on a physical level. It is proposed to use an optical chirp overhead transmission between controllers SDN. This article is devoted to research of a creation opportunity of optical neural switchboards controlled in addition by submitted optical radiation. It is supposed, that the managing radiation changes a parameter of refraction of optical environment of the device, and with it and length of a wave of information radiation. For the control by last is used multibeam interferometer. The brief estimation of technical aspects of construction of the device is carried out. The principle of using the device to an extensive network. Simulation of network performance parameters.

  20. A Ubiquitous Sensor Network Platform for Integrating Smart Devices into the Semantic Sensor Web

    Science.gov (United States)

    de Vera, David Díaz Pardo; Izquierdo, Álvaro Sigüenza; Vercher, Jesús Bernat; Gómez, Luis Alfonso Hernández

    2014-01-01

    Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN) Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted) information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs. PMID:24945678

  1. A ubiquitous sensor network platform for integrating smart devices into the semantic sensor web.

    Science.gov (United States)

    de Vera, David Díaz Pardo; Izquierdo, Alvaro Sigüenza; Vercher, Jesús Bernat; Hernández Gómez, Luis Alfonso

    2014-06-18

    Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN) Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted) information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs.

  2. A Ubiquitous Sensor Network Platform for Integrating Smart Devices into the Semantic Sensor Web

    Directory of Open Access Journals (Sweden)

    David Díaz Pardo de Vera

    2014-06-01

    Full Text Available Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs.

  3. interference effects of blue ence effects of bluetooth on wlan ence ...

    African Journals Online (AJOL)

    eobe

    technologies: Bluetooth wireless personal network (WPAN) and IEEE ... s by AFH technology. ference, Received Signal Strength, ISM devices, Access Point, Interference ed the increasing popularity .4 GHz Industrial, Scientific censed band in wireless .... bring for different applications and interference levels were discussed.

  4. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Science.gov (United States)

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  5. An optimized electronic device for solar power harvesting dedicated to wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Le Cam, Vincent; Le Maulf, Regis; Lemarchand, Laurent; Martin, William; Le Pen, Mathieu [LUNAM Univ., Bouguenais (France). IFSTTAR, MACS Dept.

    2012-07-01

    For economics as for practical reasons, this last decade, the use and dissemination of wireless sensor networks (WSN) became obvious; particularly in structural heath monitoring (SHM) use-cases where distances between sensors could be long and access to the structure quite difficult. Even if efforts are leaded to design small components and RF modules that ask for low-power, the need of an external source is often necessary. After have acquired knowledge in solar cells as in batteries technologies and methods to control charge/discharge phases as in optimizing algorithms, IFSTTAR laboratory has designed an electronic device that integrates those progress. This electronic device has a quite generic mission: for a panel of batteries chemistry (Lithium, NiMh) and a panel of solar cells sources (frome mW to some W), the system acts as an improved battery charger whatever the load ask for power. The system applies control algorithms based on battery capacity and chemistry profile. It also applies the MPPT (Maximum Power Point Tracking) algorithm. At any time, battery State Of Charge (SOC) can be requested via I2C bus as well as a warning signal is output when SOC becomes critical. Through standard pin connectors and a simple I2C interface, the system can be used by many wireless devices (sensors) that have to run autonomously. After the presentation of this system, a focus on its application on a real use-case will be given. (orig.)

  6. Dual Band Parasitic Element Patch Antenna for LTE/WLAN Applications

    OpenAIRE

    BAG Biplab; SARKAR Partha Pratim

    2017-01-01

    In this paper, a single layer coaxial fed dual band slotted microstrip antenna is proposed. The proposed antenna consists of two direct couple parasitic elements and L-shape slots on the main resonating element. Two resonant modes are excited and it covers 4G LTE and WLAN middle band. The -10dB impedance bandwidth for resonant frequency of 2.35GHz and 5.28GHz are 140MHz (2.25-2.39GHz) and 570MHz (5.18-5.75GHz), respectively. The measured VSWR at 2.35GHz is 1.27 and at 5.28GHz is 1.41. The pro...

  7. Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries

    OpenAIRE

    Niswar, Muhammad; Kashihara, Shigeru; Tsukamoto, Kazuya; Kadobayashi, Youki; Yamaguchi, Suguru

    2009-01-01

    Switching a communication path from one Access Point (AP) to another in inter-domain WLANs is a critical challenge for delay-sensitive applications such as Voice over IP (VoIP) because communication quality during handover (HO) is more likely to be deteriorated. To maintain VoIP quality during HO, we need to solve many problems. In particular, in bi-directional communication such as VoIP, an AP becomes a bottleneck with the increase of VoIP calls. As a result, packets queued in the AP buffer ...

  8. Design of Miniaturized Multiband Filters Using Zero Order Resonators for WLAN Applications

    Directory of Open Access Journals (Sweden)

    Maryam Shafiee

    2015-01-01

    Full Text Available The objective of this paper is to design miniaturized narrow- and dual-band filters for WLAN application using zero order resonators by the method of least squares. The miniaturization of the narrow-band filter is up to 70% and that of the dual-band filter is up to 64% compared to the available models in the literature. Two prototype models of the narrow-band and dual-band filters are fabricated and measured, which verify the proposed structure for the filter and its design by the presented method, using an equivalent circuit model.

  9. Design of WLAN microstrip antenna for 5.17 - 5.835 GHz

    Science.gov (United States)

    Bugaj, Jarosław; Bugaj, Marek; Wnuk, Marian

    2017-04-01

    This paper presents the project of miniaturized WLAN Antenna made in microstrip technique working at a frequency of 5.17 - 5.835 GHz in 802.11ac IEEE standard. This dual layer antenna is designed on RT/duroid 5870 ROGERS CORPORATION substrate with dielectric constant 2.33 and thickness of 3.175 mm. The antenna parameters such as return loss, VSWR, gain and directivity are simulated and optimized using commercial computer simulation technology microwave studio (CST MWS). The paper presents the results of discussed numerical analysis.

  10. GOVORNO KRMILJENJE ROLET IN PLATNA PREKO POVEZAVE WLAN V INTELIGENTNEM OKOLJU

    OpenAIRE

    Dukarić, Bojan

    2010-01-01

    V diplomski nalogi obravnavamo izvedbo sistema za govorno krmiljenje rolet in platna, kjer poteka komunikacija preko povezave WLAN med računalnikom (ali samostojnim sistemom) na eni strani in WiPort-om povezanim z mikrokrmilnikom ter ostalo elektroniko na drugi strani. Na računalniku smo uporabili razpoznavalnik govora za neodvisnega govorca ter aplikacijo napisano v programskem jeziku JAVA s pomočjo programskega okolja NetBeans. Ta aplikacija omogoča pošiljanje podatkov preko brezžične povez...

  11. FIJI: Fighting Implicit Jamming in 802.11 WLANs

    Science.gov (United States)

    Broustis, Ioannis; Pelechrinis, Konstantinos; Syrivelis, Dimitris; Krishnamurthy, Srikanth V.; Tassiulas, Leandros

    The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a low-power jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is drastically degraded. To fight against this attack, we design FIJI, a cross-layer anti-jamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer detection. It then makes decisions with regards to optimally shaping the traffic such that: (a) the clients that are not explicitly jammed are shielded from experiencing starvation and, (b) the jammed clients receive the maximum possible throughput under the given conditions. We implement FIJI in real hardware; we evaluate its efficacy through experiments on a large-scale indoor testbed, under different traffic scenarios, network densities and jammer locations. Our measurements suggest that FIJI detects such jammers in real-time and alleviates their impact by allocating the available bandwidth in a fair and efficient way.

  12. Identification of Measures and Indicators for the IT Security of Networked Medical Devices: A Delphi Study.

    Science.gov (United States)

    Leber, Stefan; Ammenwerth, Elske

    2017-01-01

    The networking of medical devices or systems in a hospital network is the foundation for modern medical diagnostics and therapy. This, however, makes possible numerous hazards that could lead to risks for patients, clinical processes or data and information. The aim of the work was to develop a catalogue of measures and indicators for the effective support of the IT risk management process in a health facility. Through a qualitative and quantitative Delphi study among 21 experts, it was possible to identify an initial 51 practice-relevant measures of IT risk management that a hospital should implement. Additionally, 27 indicators were defined which can be used to measure the impact of these measures. Of the 51 measures, 35 were seen as especially important, particularly organizational measures. Of the 27 indicators, six were seen as especially important, particularly indicators to measure networking effectiveness. The study also investigated the impact of the measures on the indicators. A case study is planned to investigate the practicability of the identified measures and indicators.

  13. Coordinated reactive power management in power networks with wind turbines and FACTS devices

    Energy Technology Data Exchange (ETDEWEB)

    Amaris, Hortensia, E-mail: hamaris@ing.uc3m.e [University Carlos III of Madrid, Electrical Engineering Department, 28911 Leganes, Madrid (Spain); Alonso, Monica, E-mail: moalonso@ing.uc3m.e [University Carlos III of Madrid, Electrical Engineering Department, 28911 Leganes, Madrid (Spain)

    2011-07-15

    Highlights: {yields} Coordinated reactive power management among variable speed wind farms and static var compensator to improve the voltage stability in the network. {yields} Optimization formulation including the reactive power capability from double-fed induction generators (from the induction machine and the grid side converter). {yields} Application of genetic algorithm in power networks with wind farms. -- Abstract: Reactive power management is a critical issue when dealing with the planning and operation of power networks with high wind energy penetration. This paper is intended to introduce a coordinated Reactive Power Planning strategy among Doubly-Fed Induction Generator (DFIG) variable speed wind turbines and Flexible AC Transmission Systems (FACTS) devices. According to this strategy, the reactive power capability from DFIG wind turbines is obtained and the limitations on deliverable power are deduced for each operation point. Furthermore, instead of using the reactive power limit as it is traditionally done, the reactive power injection from Static Var Compensator (SVC) is related to the existing physical limits of the control variables. The optimization strategy is based on genetic algorithms and includes directly in its formulation both the reactive power capability from wind turbines and the reactive power injection from SVC units. An existing 140-bus power system is used to validate the performance and effectiveness of the proposed method.

  14. Acceleration of Deep Neural Network Training with Resistive Cross-Point Devices: Design Considerations

    Directory of Open Access Journals (Sweden)

    Tayfun Gokmen

    2016-07-01

    Full Text Available In recent years, deep neural networks (DNN have demonstrated significant business impact in large scale analysis and classification tasks such as speech recognition, visual object detection, pattern extraction, etc. Training of large DNNs, however, is universally considered as time consuming and computationally intensive task that demands datacenter-scale computational resources recruited for many days. Here we propose a concept of resistive processing unit (RPU devices that can potentially accelerate DNN training by orders of magnitude while using much less power. The proposed RPU device can store and update the weight values locally thus minimizing data movement during training and allowing to fully exploit the locality and the parallelism of the training algorithm. We evaluate the effect of various RPU device features/non-idealities and system parameters on performance in order to derive the device and system level specifications for implementation of an accelerator chip for DNN training in a realistic CMOS-compatible technology. For large DNNs with about 1 billion weights this massively parallel RPU architecture can achieve acceleration factors of 30,000X compared to state-of-the-art microprocessors while providing power efficiency of 84,000 GigaOps/s/W. Problems that currently require days of training on a datacenter-size cluster with thousands of machines can be addressed within hours on a single RPU accelerator. A system consisting of a cluster of RPU accelerators will be able to tackle Big Data problems with trillions of parameters that is impossible to address today like, for example, natural speech recognition and translation between all world languages, real-time analytics on large streams of business and scientific data, integration and analysis of multimodal sensory data flows from a massive number of IoT (Internet of Things sensors.

  15. Acceleration of Deep Neural Network Training with Resistive Cross-Point Devices: Design Considerations.

    Science.gov (United States)

    Gokmen, Tayfun; Vlasov, Yurii

    2016-01-01

    In recent years, deep neural networks (DNN) have demonstrated significant business impact in large scale analysis and classification tasks such as speech recognition, visual object detection, pattern extraction, etc. Training of large DNNs, however, is universally considered as time consuming and computationally intensive task that demands datacenter-scale computational resources recruited for many days. Here we propose a concept of resistive processing unit (RPU) devices that can potentially accelerate DNN training by orders of magnitude while using much less power. The proposed RPU device can store and update the weight values locally thus minimizing data movement during training and allowing to fully exploit the locality and the parallelism of the training algorithm. We evaluate the effect of various RPU device features/non-idealities and system parameters on performance in order to derive the device and system level specifications for implementation of an accelerator chip for DNN training in a realistic CMOS-compatible technology. For large DNNs with about 1 billion weights this massively parallel RPU architecture can achieve acceleration factors of 30, 000 × compared to state-of-the-art microprocessors while providing power efficiency of 84, 000 GigaOps∕s∕W. Problems that currently require days of training on a datacenter-size cluster with thousands of machines can be addressed within hours on a single RPU accelerator. A system consisting of a cluster of RPU accelerators will be able to tackle Big Data problems with trillions of parameters that is impossible to address today like, for example, natural speech recognition and translation between all world languages, real-time analytics on large streams of business and scientific data, integration, and analysis of multimodal sensory data flows from a massive number of IoT (Internet of Things) sensors.

  16. Three-terminal ferroelectric synapse device with concurrent learning function for artificial neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Nishitani, Y.; Kaneko, Y.; Ueda, M.; Fujii, E. [Advanced Technology Research Laboratories, Panasonic Corporation, Seika, Kyoto 619-0237 (Japan); Morie, T. [Graduate School of Life Science and Systems Engineering, Kyushu Institute of Technology, Wakamatsu-ku, Kitakyushu 808-0196 (Japan)

    2012-06-15

    Spike-timing-dependent synaptic plasticity (STDP) is demonstrated in a synapse device based on a ferroelectric-gate field-effect transistor (FeFET). STDP is a key of the learning functions observed in human brains, where the synaptic weight changes only depending on the spike timing of the pre- and post-neurons. The FeFET is composed of the stacked oxide materials with ZnO/Pr(Zr,Ti)O{sub 3} (PZT)/SrRuO{sub 3}. In the FeFET, the channel conductance can be altered depending on the density of electrons induced by the polarization of PZT film, which can be controlled by applying the gate voltage in a non-volatile manner. Applying a pulse gate voltage enables the multi-valued modulation of the conductance, which is expected to be caused by a change in PZT polarization. This variation depends on the height and the duration of the pulse gate voltage. Utilizing these characteristics, symmetric and asymmetric STDP learning functions are successfully implemented in the FeFET-based synapse device by applying the non-linear pulse gate voltage generated from a set of two pulses in a sampling circuit, in which the two pulses correspond to the spikes from the pre- and post-neurons. The three-terminal structure of the synapse device enables the concurrent learning, in which the weight update can be performed without canceling signal transmission among neurons, while the neural networks using the previously reported two-terminal synapse devices need to stop signal transmission for learning.

  17. Service in power stations. Improving workflow through adoption of WLAN, RFID, and e-Procurement technologies; Service im Kraftwerk. Verbesserung der Ablaeufe durch den Einsatz von WLAN, RFID, e-Procurement

    Energy Technology Data Exchange (ETDEWEB)

    Schellenberg, N. [Siemens Power Generation L, Karlsruhe (Germany)

    2007-07-01

    WLAN, RFID and e-Procurement have revolutionized workflows in different industry branches and are here for the mainstay. The following report shows some of the current applications of these technologies today and illustrates a vision for potential application in power plant maintenance. (orig.)

  18. A Printed Monopole Antenna for Triple-Band WLAN/WiMAX Applications

    Directory of Open Access Journals (Sweden)

    Huiqing Zhai

    2015-01-01

    Full Text Available A new compact design of monopole antenna for triple-band WLAN/WiMAX applications with two band-notches based on broadband antenna is presented. By introducing a stub loaded ground and two new paper clip structures etched on radiation patch, a compact overall dimension 31 mm × 33 mm × 1 mm and three separated operating bands effectively covering 2.4/5.2/5.8 GHz WLAN bands and 2.5/3.5/5.5 GHz WiMAX bands can be achieved. Compared with familiar U type slot, the introduced compact paper clip structure can save about 37% of dimension regions, which could effectively improve efficiency of band-notch formation. Simulated and measured results demonstrate that the proposed antenna has good dipole-like radiation characteristics with appreciable gain across the operating bands. Besides, main parameters of the two etched paper clip structures are investigated to control the positions and bandwidths of the two stop-bands, respectively, on basis of which the three working bands can be adjusted independently.

  19. A Pervasive Promotion Model for Personalized Promotion Systems on Using WLAN Localization and NFC Techniques

    Directory of Open Access Journals (Sweden)

    Kam-Yiu Lam

    2015-01-01

    Full Text Available In this paper, we propose a novel pervasive business model for sales promotion in retail chain stores utilizing WLAN localization and near field communication (NFC technologies. The objectives of the model are to increase the customers’ flow of the stores and their incentives in purchasing. In the proposed model, the NFC technology is used as the first mean to motivate customers to come to the stores. Then, with the use of WLAN, the movements of the customers, who are carrying smartphones, within the stores are captured and maintained in the movement database. By interpreting the movements of customers as indicators of their interests to the displayed items, personalized promotion strategies can be formulated to increase their incentives for purchasing future items. Various issues in the application of the adopted localization scheme for locating customers in a store are discussed. To facilitate the item management and space utilization in displaying the items, we propose an enhanced R-tree for indexing the data items maintained in the movement database. Experimental results have demonstrated the effectiveness of the adopted localization scheme in supporting the proposed model.

  20. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    Energy Technology Data Exchange (ETDEWEB)

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  1. InP on SOI devices for optical communication and optical network on chip

    Science.gov (United States)

    Fedeli, J.-M.; Ben Bakir, B.; Olivier, N.; Grosse, Ph.; Grenouillet, L.; Augendre, E.; Phillippe, P.; Gilbert, K.; Bordel, D.; Harduin, J.

    2011-01-01

    For about ten years, we have been developing InP on Si devices under different projects focusing first on μlasers then on semicompact lasers. For aiming the integration on a CMOS circuit and for thermal issue, we relied on SiO2 direct bonding of InP unpatterned materials. After the chemical removal of the InP substrate, the heterostructures lie on top of silicon waveguides of an SOI wafer with a separation of about 100nm. Different lasers or photodetectors have been achieved for off-chip optical communication and for intra-chip optical communication within an optical network. For high performance computing with high speed communication between cores, we developed InP microdisk lasers that are coupled to silicon waveguide and produced 100μW of optical power and that can be directly modulated up to 5G at different wavelengths. The optical network is based on wavelength selective circuits with ring resonators. InGaAs photodetectors are evanescently coupled to the silicon waveguide with an efficiency of 0.8A/W. The fabrication has been demonstrated at 200mm wafer scale in a microelectronics clean room for CMOS compatibility. For off-chip communication, silicon on InP evanescent laser have been realized with an innovative design where the cavity is defined in silicon and the gain localized in the QW of bonded InP hererostructure. The investigated devices operate at continuous wave regime with room temperature threshold current below 100 mA, the side mode suppression ratio is as high as 20dB, and the fibercoupled output power is {7mW. Direct modulation can be achieved with already 6G operation.

  2. Squeeze-chip: a finger-controlled microfluidic flow network device and its application to biochemical assays.

    Science.gov (United States)

    Li, Wentao; Chen, Tao; Chen, Zitian; Fei, Peng; Yu, Zhilong; Pang, Yuhong; Huang, Yanyi

    2012-05-07

    We designed and fabricated a novel microfluidic device that can be operated through simple finger squeezing. On-chip microfluidic flow control is enabled through an optimized network of check-valves and squeeze-pumps. The sophisticated flow system can be easily constructed by combining a few key elements. We implemented this device to perform quantitative biochemical assays with no requirement for precision instruments.

  3. Tolerance of intrinsic device variation in fuzzy restricted Boltzmann machine network based on memristive nano-synapses

    Science.gov (United States)

    Zhang, Teng; Yin, Minghui; Lu, Xiayan; Cai, Yimao; Yang, Yuchao; Huang, Ru

    2017-06-01

    Inspired by the architecture and principle of the human brain, neuromorphic computing has attracted enormous research interest due to its potential for massively parallel and energy-efficient computing, where nanoscale memristors are considered as perfect building blocks for hardware neural networks, serving as compact, analog synapses. However, the inherent variation in memristors has been regarded as a major obstacle to their practical application in neuromorphic computing. Here, for the first time, we demonstrate that this long-standing issue can be addressed by introducing fuzziness into the neural networks. We found that the cycle-to-cycle and device-to-device conductance variations in the on and off states of Pt/TaOx/Ta memristors statistically follow Gaussian distributions, and using an experimentally verified compact synapse model based on the electrical characteristics of Pt/TaOx/Ta devices, a fuzzy restricted Boltzmann machine (FRBM) network was constructed where all the weight states were fuzzified to accommodate device stochasticity. The FRBM network has shown significantly improved tolerance to device variation, as confirmed by increased accuracy in the benchmark test of MNIST handwritten digit classifications. This study thus provides a new route towards highly robust neuromorphic computing, even if the computing elements can be stochastic and inhomogeneous.

  4. Quantum transport through complex networks - from light-harvesting proteins to semiconductor devices

    Energy Technology Data Exchange (ETDEWEB)

    Kreisbeck, Christoph

    2012-06-18

    Electron transport through small systems in semiconductor devices plays an essential role for many applications in micro-electronics. One focus of current research lies on establishing conceptually new devices based on ballistic transport in high mobility AlGaAs/AlGa samples. In the ballistic regime, the transport characteristics are determined by coherent interference effects. In order to guide experimentalists to an improved device design, the characterization and understanding of intrinsic device properties is crucial. We develop a time-dependent approach that allows us to simulate experimentally fabricated, complex devicegeometries with an extension of up to a few micrometers. Particularly, we explore the physical origin of unexpected effects that have been detected in recent experiments on transport through Aharonov-Bohm waveguide-interferometers. Such interferometers can be configured as detectors for transfer properties of embedded quantum systems. We demonstrate that a four-terminal waveguide-ring is a suitable setup for measuring the transmission phase of a harmonic quantum dot. Quantum effects are not restricted exclusively to artificial devices but have been found in biological systems as well. Pioneering experiments reveal quantum effects in light-harvesting complexes, the building blocks of photosynthesis. We discuss the Fenna-Matthews-Olson complex, which is a network of coupled bacteriochlorophylls. It acts as an energy wire in the photosynthetic apparatus of green sulfur bacteria. Recent experimental findings suggest that energy transfer takes place in the form of coherent wave-like motion, rather than through classical hopping from one bacteriochlorophyll to the next. However, the question of why and how coherent transfer emerges in light-harvesting complexes is still open. The challenge is to merge seemingly contradictory features that are observed in experiments on two-dimensional spectroscopy into a consistent theory. Here, we provide such a

  5. Modeling of frequency agile devices: development of PKI neuromodeling library based on hierarchical network structure

    Science.gov (United States)

    Sanchez, P.; Hinojosa, J.; Ruiz, R.

    2005-06-01

    Recently, neuromodeling methods of microwave devices have been developed. These methods are suitable for the model generation of novel devices. They allow fast and accurate simulations and optimizations. However, the development of libraries makes these methods to be a formidable task, since they require massive input-output data provided by an electromagnetic simulator or measurements and repeated artificial neural network (ANN) training. This paper presents a strategy reducing the cost of library development with the advantages of the neuromodeling methods: high accuracy, large range of geometrical and material parameters and reduced CPU time. The library models are developed from a set of base prior knowledge input (PKI) models, which take into account the characteristics common to all the models in the library, and high-level ANNs which give the library model outputs from base PKI models. This technique is illustrated for a microwave multiconductor tunable phase shifter using anisotropic substrates. Closed-form relationships have been developed and are presented in this paper. The results show good agreement with the expected ones.

  6. A Robust and Device-Free System for the Recognition and Classification of Elderly Activities

    Directory of Open Access Journals (Sweden)

    Fangmin Li

    2016-12-01

    Full Text Available Human activity recognition, tracking and classification is an essential trend in assisted living systems that can help support elderly people with their daily activities. Traditional activity recognition approaches depend on vision-based or sensor-based techniques. Nowadays, a novel promising technique has obtained more attention, namely device-free human activity recognition that neither requires the target object to wear or carry a device nor install cameras in a perceived area. The device-free technique for activity recognition uses only the signals of common wireless local area network (WLAN devices available everywhere. In this paper, we present a novel elderly activities recognition system by leveraging the fluctuation of the wireless signals caused by human motion. We present an efficient method to select the correct data from the Channel State Information (CSI streams that were neglected in previous approaches. We apply a Principle Component Analysis method that exposes the useful information from raw CSI. Thereafter, Forest Decision (FD is adopted to classify the proposed activities and has gained a high accuracy rate. Extensive experiments have been conducted in an indoor environment to test the feasibility of the proposed system with a total of five volunteer users. The evaluation shows that the proposed system is applicable and robust to electromagnetic noise.

  7. New Vertical Handover Method to Optimize Utilization of Wireless Local Area Network in High-Speed Environment.

    Science.gov (United States)

    Yew, Hoe Tung; Supriyanto, Eko; Satria, Muhammad Haikal; Hau, Yuan Wen

    2016-01-01

    In heterogeneous wireless networks, wireless local area network (WLAN) is highly preferred by mobile terminals (MTs) owing to its high transmission bandwidth and low access cost. However, in high-speed environment, handover from a cellular network to a WLAN cell will lead to a high number of handover failures and unnecessary handovers due to the WLAN coverage limitation and will become worse at high speed. A new vertical handover method is proposed to minimize the probability of handover failure and unnecessary handover while maximizing the usage of WLAN in high-speed environment. The simulation results show that the proposed method kept the probability of handover failure and unnecessary handover below 0.5% and 1%, respectively. Compared with previous studies, the proposed method reduced the number of handover failures and unnecessary handovers up to 80.0% and 97.7%, respectively, while the MT is highly mobile. Using the proposed prediction method, the MT can benefit high bandwidth and low network access cost from the WLAN with minimum interruption regardless of speed.

  8. New Vertical Handover Method to Optimize Utilization of Wireless Local Area Network in High-Speed Environment.

    Directory of Open Access Journals (Sweden)

    Hoe Tung Yew

    Full Text Available In heterogeneous wireless networks, wireless local area network (WLAN is highly preferred by mobile terminals (MTs owing to its high transmission bandwidth and low access cost. However, in high-speed environment, handover from a cellular network to a WLAN cell will lead to a high number of handover failures and unnecessary handovers due to the WLAN coverage limitation and will become worse at high speed. A new vertical handover method is proposed to minimize the probability of handover failure and unnecessary handover while maximizing the usage of WLAN in high-speed environment. The simulation results show that the proposed method kept the probability of handover failure and unnecessary handover below 0.5% and 1%, respectively. Compared with previous studies, the proposed method reduced the number of handover failures and unnecessary handovers up to 80.0% and 97.7%, respectively, while the MT is highly mobile. Using the proposed prediction method, the MT can benefit high bandwidth and low network access cost from the WLAN with minimum interruption regardless of speed.

  9. Engineering highly organized and aligned single walled carbon nanotube networks for electronic device applications: Interconnects, chemical sensor, and optoelectronics

    Science.gov (United States)

    Kim, Young Lae

    For 20 years, single walled carbon nanotubes (SWNTs) have been studied actively due to their unique one-dimensional nanostructure and superior electrical, thermal, and mechanical properties. For these reasons, they offer the potential to serve as building blocks for future electronic devices such as field effect transistors (FETs), electromechanical devices, and various sensors. In order to realize these applications, it is crucial to develop a simple, scalable, and reliable nanomanufacturing process that controllably places aligned SWNTs in desired locations, orientations, and dimensions. Also electronic properties (semiconducting/metallic) of SWNTs and their organized networks must be controlled for the desired performance of devices and systems. These fundamental challenges are significantly limiting the use of SWNTs for future electronic device applications. Here, we demonstrate a strategy to fabricate highly controlled micro/nanoscale SWNT network structures and present the related assembly mechanism to engineer the SWNT network topology and its electrical transport properties. A method designed to evaluate the electrical reliability of such nano- and microscale SWNT networks is also presented. Moreover, we develop and investigate a robust SWNT based multifunctional selective chemical sensor and a range of multifunctional optoelectronic switches, photo-transistors, optoelectronic logic gates and complex optoelectronic digital circuits.

  10. Wavelet-based compression with ROI coding support for mobile access to DICOM images over heterogeneous radio networks.

    Science.gov (United States)

    Maglogiannis, Ilias; Doukas, Charalampos; Kormentzas, George; Pliakas, Thomas

    2009-07-01

    Most of the commercial medical image viewers do not provide scalability in image compression and/or region of interest (ROI) encoding/decoding. Furthermore, these viewers do not take into consideration the special requirements and needs of a heterogeneous radio setting that is constituted by different access technologies [e.g., general packet radio services (GPRS)/ universal mobile telecommunications system (UMTS), wireless local area network (WLAN), and digital video broadcasting (DVB-H)]. This paper discusses a medical application that contains a viewer for digital imaging and communications in medicine (DICOM) images as a core module. The proposed application enables scalable wavelet-based compression, retrieval, and decompression of DICOM medical images and also supports ROI coding/decoding. Furthermore, the presented application is appropriate for use by mobile devices activating in heterogeneous radio settings. In this context, performance issues regarding the usage of the proposed application in the case of a prototype heterogeneous system setup are also discussed.

  11. Participative Teaching with Mobile Devices and Social Networks for K-12 Children

    Directory of Open Access Journals (Sweden)

    Livia Stefan

    2016-08-01

    Full Text Available This article details a set of participatory pedagogical experiments conducted within a research grant PN II IDEI (”Time Maps. Real communities, virtual worlds, experimented pasts” performed with the purpose of helping rural communities in identifying their cultural heritage andtransmitting it to the younger generations by means of modern IT technologies, including web 2.0. In a Danubian rural community, several points of archaeological interest (POIs were identified, which were then included in a geographic Augmented Reality application for smartphones and tablets. Subsequently, the geographic data were collected from the archaeological site by the K-12 children, under the coordination of an academic staff member of the National University of Arts in Bucharest, and stored on their devices using Google Maps. The augmented information provided onthe site was annotated and shared with other K-12 children, through different social networks sites (SNS and content postings. This first stage experiment was extended to the development of a social learning environment complementary to the educational site (www.timemaps.net to support thetransmission of several traditional technologies (textile, ceramic, glass in a collaborative manner. We consider that our experiments can significantly increase the visibility of the information pertaining to the identity of target places and communities among the younger generation. A mobile-learning paradigm, in combination with web 2.0 technologies, was the support for a distributed and low-cost platform for communication and collaboration. Social networks linked thearchaeological heritage and the academic research with the larger community of rural K-12 children. The article analyzes this platform as a solution for creating, collecting and sharingeducational content, and presents conclusions on using social media for effective blended learning and transmittal of the cultural heritage.

  12. User-Adapted Recommendation of Content on Mobile Devices Using Bayesian Networks

    Science.gov (United States)

    Iwasaki, Hirotoshi; Mizuno, Nobuhiro; Hara, Kousuke; Motomura, Yoichi

    Mobile devices, such as cellular phones and car navigation systems, are essential to daily life. People acquire necessary information and preferred content over communication networks anywhere, anytime. However, usability issues arise from the simplicity of user interfaces themselves. Thus, a recommendation of content that is adapted to a user's preference and situation will help the user select content. In this paper, we describe a method to realize such a system using Bayesian networks. This user-adapted mobile system is based on a user model that provides recommendation of content (i.e., restaurants, shops, and music that are suitable to the user and situation) and that learns incrementally based on accumulated usage history data. However, sufficient samples are not always guaranteed, since a user model would require combined dependency among users, situations, and contents. Therefore, we propose the LK method for modeling, which complements incomplete and insufficient samples using knowledge data, and CPT incremental learning for adaptation based on a small number of samples. In order to evaluate the methods proposed, we applied them to restaurant recommendations made on car navigation systems. The evaluation results confirmed that our model based on the LK method can be expected to provide better generalization performance than that of the conventional method. Furthermore, our system would require much less operation than current car navigation systems from the beginning of use. Our evaluation results also indicate that learning a user's individual preference through CPT incremental learning would be beneficial to many users, even with only a few samples. As a result, we have developed the technology of a system that becomes more adapted to a user the more it is used.

  13. An optimized analog to digital converter for WLAN analog front end

    Science.gov (United States)

    Mao, Ye; Yumei, Zhou; Bin, Wu; Jianhua, Jiang

    2012-04-01

    A 10 bit 80 MSPS analog to digital converter optimized for WLAN analog front end is presented. In contrast to conventional 1.5 bit pipeline architecture, four optimized multi-bit multiply digital to analog converter stages are implemented. An on-chip low-noise reference buffer is proposed for SoC integration purposes, and a wide-bandwidth wide swing sample and hold amplifier is also presented for achieving a good dynamic range. The converter was fabricated in 0.18 μm 1P6M CMOS technology, and the core area occupies approximately 0.85 mm2. Measured results show that with an 11 MHz input signal, it provides a 9.4 bit effective number of bits and a 72 dBc spurious frequency dynamic range when sampled at 80 MHz.

  14. Dual Band Parasitic Element Patch Antenna for LTE/WLAN Applications

    Directory of Open Access Journals (Sweden)

    BAG Biplab

    2017-05-01

    Full Text Available In this paper, a single layer coaxial fed dual band slotted microstrip antenna is proposed. The proposed antenna consists of two direct couple parasitic elements and L-shape slots on the main resonating element. Two resonant modes are excited and it covers 4G LTE and WLAN middle band. The -10dB impedance bandwidth for resonant frequency of 2.35GHz and 5.28GHz are 140MHz (2.25-2.39GHz and 570MHz (5.18-5.75GHz, respectively. The measured VSWR at 2.35GHz is 1.27 and at 5.28GHz is 1.41. The proposed antenna is simple in design and compact in size. The simulated and measured results are in good agreement.

  15. Modified Sierpinski Gasket Patch Antenna for UMTS and 2.4/5.2 WLAN

    Directory of Open Access Journals (Sweden)

    Y. E. Ali

    2013-05-01

    Full Text Available A modified Sierpinski Gasket fractal antenna for multiband application is proposed in this paper. The modified ground plane and the microstrip feed are used to obtain the wider bandwidth at the resonance frequency. The antenna is designed and printed on two layers FR-4 substrate (ϵr=4.4 and h=1.6 mm to cover the UMTS and 2.4/5.2 WLAN. The radiation pattern of the proposed antenna is similar to an omnidirectional. The proposed antenna has maximum gain of 1.88, 1.6, 4.31 dB at 2, 2.4, 5.2 GHz, respectively The properties of the antenna such as return losses, radiation pattern, input resistance and gain are determined via numerical CST Microwave Studio 2010 software.

  16. NOVEL SUPER WIDE BAND ANTENNA WITH WLAN/WiMAX BAND REJECTION AND COMPACT SIZE

    Directory of Open Access Journals (Sweden)

    Hadi Baghali

    2014-01-01

    Full Text Available A 25×25×1.6mm3 implementation of a microstrip-fed printed monopole antenna for the future UWB wireless systems application is presented. It has features of possesses band notched function (from 4.88 to 6.07GHz, extremely wide impedance bandwidth (from 2.58 to 18GHz and its compact size. By using a smooth tapering between the semi fractal-shaped patch and the half ellipse-shaped defected ground plane, the wide impedance bandwidth is achieved with ratio bandwidth larger than 6.97:1. Numerical and experimental results are in good agreement and they indicate that the proposed antenna has a measured 2:1 VSWR bandwidth of 149.8%, except the rejected WLAN band.

  17. Organizing NPD networks for high innovation performance: the case of Dutch medical devices SMEs

    NARCIS (Netherlands)

    Pullen, A.J.J.; Groen, Arend J.; de Weerd-Nederhof, Petronella C.; Fisscher, O.A.M.

    2010-01-01

    This research examines which combination of network characteristics (the network configuration) leads to high innovation performance for small and medium sized companies (SMEs). Even though research has paid significant attention to the relation between the external network and the innovation

  18. A Novel Metamaterial MIMO Antenna with High Isolation for WLAN Applications

    Directory of Open Access Journals (Sweden)

    Nguyen Khac Kiem

    2015-01-01

    Full Text Available A compact 2×2 metamaterial-MIMO antenna for WLAN applications is presented in this paper. The MIMO antenna is designed by placing side by side two single metamaterial antennas which are constructed based on the modified composite right/left-handed (CRLH model. By adding another left-handed inductor, the total left-handed inductor of the modified CRLH model is increased remarkably in comparison with that of conventional CRLH model. As a result, the proposed metamaterial antenna achieves 60% size reduction in comparison with the unloaded antenna. The MIMO antenna is electrically small (30 mm × 44 mm with an edge-to-edge separation between two antennas of 0.06λ0 at 2.4 GHz. In order to reduce the mutual coupling of the antenna, a defected ground structure (DGS is inserted to suppress the effect of surface current between elements of the proposed antenna. The final design of the MIMO antenna satisfies the return loss requirement of less than −10 dB in a bandwidth ranging from 2.38 GHz to 2.5 GHz, which entirely covers WLAN frequency band allocated from 2.4 GHz to 2.48 GHz. The antenna also shows a high isolation coefficient which is less than −35 dB over the operating frequency band. A good agreement between simulation and measurement is shown in this context.

  19. Stackelberg Game Based Power Allocation for Physical Layer Security of Device-to-device Communication Underlaying Cellular Networks

    Science.gov (United States)

    Qu, Junyue; Cai, Yueming; Wu, Dan; Chen, Hualiang

    2014-05-01

    The problem of power allocation for device-to-device (D2D) underlay communication to improve physical layer security is addressed. Specifically, to improve the secure communication of the cellular users, we introduce a Stackelberg game for allocating the power of the D2D link under a total power constraint and a rate constraint at the D2D pair. In the introduced Stackelberg game the D2D pair works as a seller and the cellular UEs work as buyers. Firstly, because the interference signals from D2D pair are unknown to both the legitimate receiver and the illegitimate eavesdropper, it is possible that a cellular UE decline to participate in the introduced Stackelberg game. So the condition under which a legitimate user will participate in the introduced Stackelberg game is discussed. Then, based on the Stackelberg game, we propose a semi-distributed power allocation algorithm, which is proved to conclude after finite-time iterations. In the end, some simulations are presented to verify the performance improvement in the physical layer security of cellular UEs using the proposed power allocation algorithm. We can determine that with the proposed algorithm, while the D2D pair's communication demand is met, the physical layer security of cellular UEs can be improved.

  20. Tissue culture on a chip: Developmental biology applications of self-organized capillary networks in microfluidic devices.

    Science.gov (United States)

    Miura, Takashi; Yokokawa, Ryuji

    2016-08-01

    Organ culture systems are used to elucidate the mechanisms of pattern formation in developmental biology. Various organ culture techniques have been used, but the lack of microcirculation in such cultures impedes the long-term maintenance of larger tissues. Recent advances in microfluidic devices now enable us to utilize self-organized perfusable capillary networks in organ cultures. In this review, we will overview past approaches to organ culture and current technical advances in microfluidic devices, and discuss possible applications of microfluidics towards the study of developmental biology. © 2016 Japanese Society of Developmental Biologists.

  1. PIYAS-Proceeding to Intelligent Service Oriented Memory Allocation for Flash Based Data Centric Sensor Devices in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sanam Shahla Rizvi

    2009-12-01

    Full Text Available Flash memory has become a more widespread storage medium for modern wireless devices because of its effective characteristics like non-volatility, small size, light weight, fast access speed, shock resistance, high reliability and low power consumption. Sensor nodes are highly resource constrained in terms of limited processing speed, runtime memory, persistent storage, communication bandwidth and finite energy. Therefore, for wireless sensor networks supporting sense, store, merge and send schemes, an efficient and reliable file system is highly required with consideration of sensor node constraints. In this paper, we propose a novel log structured external NAND flash memory based file system, called Proceeding to Intelligent service oriented memorY Allocation for flash based data centric Sensor devices in wireless sensor networks (PIYAS. This is the extended version of our previously proposed PIYA [1]. The main goals of the PIYAS scheme are to achieve instant mounting and reduced SRAM space by keeping memory mapping information to a very low size of and to provide high query response throughput by allocation of memory to the sensor data by network business rules. The scheme intelligently samples and stores the raw data and provides high in-network data availability by keeping the aggregate data for a longer period of time than any other scheme has done before. We propose effective garbage collection and wear-leveling schemes as well. The experimental results show that PIYAS is an optimized memory management scheme allowing high performance for wireless sensor networks.

  2. Multi-Radio Mobile Device in Role of Hybrid Node Between WiFi and LTE networks

    Directory of Open Access Journals (Sweden)

    Pavel Masek

    2015-05-01

    Full Text Available With the ubiquitous wireless network coverage, Machine-Type Communications (MTC is emerging to enable data transfers using devices/sensors without need for human interaction. In this paper we, we introduce a comprehensive simulation scenario for modeling and analysis for heterogeneous MTC. We demonstrate the most expected scenario of MTC communication using the IEEE 802.11 standard for direct communication between sensors and for transmitting data between individual sensor and Machine-Type Communication Gateway (MTCG. The MTCG represents the hybrid node serving as bridge between two heterogeneous networks (WiFi and LTE. Following the idea of hybrid node, two active interfaces must be implemented on this node together with mechanism for handling the incoming traffic (from WiFi network to LTE network. As a simulation tool, the Network Simulator 3 (NS-3 with implemented LTE/EPC Network Simulator (LENA framework was used. The major contribution of this paper therefore lies in the implementation of logic for interconnection of two heterogeneous networks in simulation environment NS-3.

  3. Soft hydrogels interpenetrating silicone – a polymer network for drug releasing medical devices

    DEFF Research Database (Denmark)

    Steffensen, Søren Langer; Merete H., Vestergaard,; Møller, Eva Horn

    2016-01-01

    Materials for the next generation of medical devices will require not only the mechanical stability of current devices, but must also possess other properties such as sustained release of drugs in a controlled manner over a prolonged period of time. This work focuses on creating...... the potential of this IPN material for future applications in drug-releasing medical devices....

  4. An Adaptive Fair-Distributed Scheduling Algorithm to Guarantee QoS for Both VBR and CBR Video Traffics on IEEE 802.11e WLANs

    Directory of Open Access Journals (Sweden)

    Reza Berangi

    2008-07-01

    Full Text Available Most of the centralized QoS mechanisms for WLAN MAC layer are only able to guarantee QoS parameters for CBR video traffic effectively. On the other hand, the existing distributed QoS mechanisms are only able to differentiate between various traffic streams without being able to guarantee QoS. This paper addresses these deficiencies by proposing a new distributed QoS scheme that guarantees QoS parameters such as delay and throughput for both CBR and VBR video traffics. The proposed scheme is also fair for all streams and it can adapt to the various conditions of the network. To achieve this, three fields are added to the RTS/CTS frames whose combination with the previously existing duration field of RTS/CTS frames guarantees the periodic fair adaptive access of a station to the channel. The performance of the proposed method has been evaluated with NS-2. The results showed that it outperforms IEEE 802.11e HCCA.

  5. Adaption of Cognitive Radio technology to low-cost and low-power wireless Personal Area Network devices

    DEFF Research Database (Denmark)

    Rohde, John; Toftegaard, Thomas Skjødeberg

    2011-01-01

    The application of wireless personal area network (WPAN) and simple point-to-point wireless communication devices has increased drastically both in private household and in our workspaces in general over the last decade. Combined with the fact that the total number of wireless devices...... and associated standards present in the wireless environment is experiencing an extreme growth, the frequency spectrum scarcity is exposed as a severe challenge. Setting up efficient and reliable wireless WPAN links can be challenging even today. This is especially true because of the intensive use...... discusses the challenges associated with the implementation of highly reliable low-power WPAN networks for the future and the adaption of Cognitive Radio technology as a potential solution. A brief status on the maturity of CR technology will be presented as an integral part of this discussion....

  6. Joint Optimized CPU and Networking Control Scheme for Improved Energy Efficiency in Video Streaming on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Sung-Woong Jo

    2017-01-01

    Full Text Available Video streaming service is one of the most popular applications for mobile users. However, mobile video streaming services consume a lot of energy, resulting in a reduced battery life. This is a critical problem that results in a degraded user’s quality of experience (QoE. Therefore, in this paper, a joint optimization scheme that controls both the central processing unit (CPU and wireless networking of the video streaming process for improved energy efficiency on mobile devices is proposed. For this purpose, the energy consumption of the network interface and CPU is analyzed, and based on the energy consumption profile a joint optimization problem is formulated to maximize the energy efficiency of the mobile device. The proposed algorithm adaptively adjusts the number of chunks to be downloaded and decoded in each packet. Simulation results show that the proposed algorithm can effectively improve the energy efficiency when compared with the existing algorithms.

  7. Application of Detailed Phase Comparison Protection Models for the Analysis of its Operation in Networks with Facts Devices

    Directory of Open Access Journals (Sweden)

    Ruban Nikolay Yu.

    2015-01-01

    Full Text Available The problem of relay protection misoperations in networks with FACTS devices is considered in the paper. It is offered a solution to this problem for a phase comparison protection of transmission power line through the use of its detailed model for the analysis of the functioning for a case of various normal, emergency and post-emergency modes of electric power systems. The research results of this approach are given in the paper.

  8. Proposal and Performance Evaluation of a Multicast Routing Protocol for Wireless Mesh Networks Based on Network Load

    Directory of Open Access Journals (Sweden)

    Kiyotaka Oe

    2015-01-01

    Full Text Available Wireless Mesh Networks (WMNs can provide wide range Wireless Local Area Networks (WLANs area by connecting Access Points (APs of WLANs with each other using radio communications. A routing protocol is very important to keep communication quality over radio multihop communications because radio waves are impacted much by surrounding environment. When we use multiuser shared applications like a video conference and an IP phone, it is predicted that large amount of traffic flows on network. Therefore, we should consider network loads to use these applications. In this paper, we propose a multicast routing protocol for WMNs which considers network loads and hop count. Furthermore, we evaluate performance by simulation. In the simulation results, we show that the proposed protocol has better performance than a conventional protocol (MAODV at high loaded scenario.

  9. Accuracy Enhancements for Positioning of Mobile Devices in Wireless Communication Networks

    DEFF Research Database (Denmark)

    Figueiras, Joao

    , tracking wireless devices is a challenging problem. In order to get better results, we propose a solution which restricts the movement models of the mobile devices. This restriction, by relying on the assumption that users typically move in segment-wise linear trajectories, outperforms the standard...... communication among users, cooperative positioning strategies aim at localizing devices as a group and not as individuals. In order to reach this goal it is necessary to combine measurements from two domains: device-to-device links and cellular links. Since this combination of information...... is not a straightforward task, this dissertation proposes two different solutions for solving the problem. The main approach is to use a Bayesian filtering framework design in such a way that both types of measurements can contribute in a balanced manner to a single estimation of positions for each cooperative device...

  10. Continued Development and Implementation of the Universal Network Interface Device (UNID) II, Digital Engineering Laboratory Network (DELNET) Volume 1.

    Science.gov (United States)

    1984-12-01

    Chart - , 1’: - . [ a frr-ie has been received froia aetwork then .] do if the frame is a supervisory frane then do if the sequence bit is true then...network to network then do if frane sequence bit is true then set iliput sequence bit true e set input sequence bit false build a supervisory frame...input sequence bit true ,eis a set input sequence bit false "uil a s3upervisory frame si-vve frane to loc-al buffer service local buffer pointer end end

  11. Implementing a WLAN Video Terminal Using UML and Fully Automated Design Flow

    Directory of Open Access Journals (Sweden)

    Petri Kukkala

    2007-03-01

    Full Text Available This case study presents UML-based design and implementation of a wireless video terminal on a multiprocessor system-on-chip (SoC. The terminal comprises video encoder and WLAN communications subsystems. In this paper, we present the UML models used in designing the functionality of the subsystems as well as the architecture of the terminal hardware. We use the Koski design flow and tools for fully automated implementation of the terminal on FPGA. Measurements were performed to evaluate the performance of the FPGA implementation. Currently, fully software encoder achieves the frame rate of 3.0 fps with three 50 MHz processors, which is one half of a reference C implementation. Thus, using UML and design automation reduces the performance, but we argue that this is highly accepted as we gain significant improvement in design efficiency and flexibility. The experiments with the UML-based design flow proved its suitability and competence in designing complex embedded multimedia terminals.

  12. Towards a Collision-Free WLAN: Dynamic Parameter Adjustment in CSMA/E2CA

    Directory of Open Access Journals (Sweden)

    Bellalta Boris

    2011-01-01

    Full Text Available Carrier sense multiple access with enhanced collision avoidance (CSMA/ECA is a distributed MAC protocol that allows collision-free access to the medium in WLANs. The only difference between CSMA/ECA and the well-known CSMA/CA is that the former uses a deterministic backoff after successful transmissions. Collision-free operation is reached after a transient state during which some collisions may occur. This paper shows that the duration of the transient state can be shortened by appropriately setting the contention parameters. Standard absorbing Markov chain theory is used to describe the behaviour of the system in the transient state and to predict the expected number of slots to reach the collision-free operation. The paper also introduces CSMA/E2CA, in which a deterministic backoff is used two consecutive times after a successful transmission. CSMA/E2CA converges quicker to collision-free operation and delivers higher performance than CSMA/ECA, specially in harsh wireless scenarios with high frame-error rates. The last part of the paper addresses scenarios with a large number of contenders. We suggest dynamic parameter adjustment techniques to accommodate a varying (and potentially high number of contenders. The effectiveness of these adjustments in preventing collisions is validated by means of simulation.

  13. Symmetric/Asymmetrical SIRs Dual-Band BPF Design for WLAN Applications

    Science.gov (United States)

    Ho, Min-Hua; Ho, Hao-Hung; Chen, Mingchih

    This paper presents the dual-band bandpass filters (BPFs) design composed of λ/2 and symmetrically/asymmetrically paired λ/4 stepped impedance resonators (SIRs) for the WLAN applications. The filters cover both the operating frequencies of 2.45 and 5.2GHz. The dual-coupling mechanism is used in the filter design to provide alternative routes for signals of selected frequencies. A prototype filter is composed of λ/2 and symmetrical λ/4 SIRs. The enhanced wide-stopband filter is then developed from the filter with the symmetrical λ/4 SIRs replaced by the asymmetrical ones. The asymmetrical λ/4 SIRs have their higher resonances frequencies isolated from the adjacent I/O SIRs and extend the enhanced filter an upper stopband limit beyond ten time the fundamental frequency. Also, the filter might possess a cross-coupling structure which introduces transmission zeros by the passband edges to improve the signal selectivity. The tapped-line feed is adopted in this circuit to create additional attenuation poles for improving the stopband rejection levels. Experiments are conducted to verify the circuit performance.

  14. A CPW-fed Triple-band Antenna for WLAN and WiMAX Applications

    Directory of Open Access Journals (Sweden)

    X.L.Yang

    2014-12-01

    Full Text Available In this letter, a compact printed antenna fed by coplanar waveguide for triple-band is presented. The proposed antenna consists of two rectangular metallic loops in front and a slit square ring on the backside. Tri-band has been achieved, which can be easily tuned by adjusting the sizes of the rectangles. An analysis of equal lumped circuit mechanism as well the triple band operation is provided. Key parameters to tune the resonant frequencies have been identified. The overall dimension of the proposed antenna is 30×26 mm^2. Simulated results show that the presented antenna can cover three separated impedance bandwidths of ~13% at 300 MHz (2.2–2.5 GHz, ~14% at 500 MHz (3.3–3.8 GHz, and ~15% at 800 MHz (5.1–5.9 GHz, which are well applied for both 2.4/5.2/5.8-GHz WLAN bands and 3.5/5.5-GHz WiMAX bands.

  15. Advanced Wireless Local Area Networks in the Unlicensed Sub-1GHz ISM-bands

    NARCIS (Netherlands)

    Aust, S.H.

    2014-01-01

    This dissertation addresses the challenges of wireless local area networks (WLANs) that operate in the unlicensed sub-1GHz industrial, scientific, and medical (ISM) band. Frequencies in the 900MHz spectrum enable a wider coverage due to the longer propagation characteristics of the radio waves. To

  16. Densely Integrated Photonic Devices based on Microring Resonators in Access Networks

    NARCIS (Netherlands)

    Klein, E.J.; Driessen, A.

    2007-01-01

    The application of optical fibers has led to virtually lossless point to point data links in the core network with practically unlimited bandwidth. In response to increasing bandwidth demands of consumers the optical techniques employed in these networks are now gradually extended towards the

  17. In-Line Acoustic Device Inspection of Leakage in Water Distribution Pipes Based on Wavelet and Neural Network

    Directory of Open Access Journals (Sweden)

    Dileep Kumar

    2017-01-01

    Full Text Available Traditionally permanent acoustic sensors leak detection techniques have been proven to be very effective in water distribution pipes. However, these methods need long distance deployment and proper position of sensors and cannot be implemented on underground pipelines. An inline-inspection acoustic device is developed which consists of acoustic sensors. The device will travel by the flow of water through the pipes which record all noise events and detect small leaks. However, it records all the noise events regarding background noises, but the time domain noisy acoustic signal cannot manifest complete features such as the leak flow rate which does not distinguish the leak signal and environmental disturbance. This paper presents an algorithm structure with the modularity of wavelet and neural network, which combines the capability of wavelet transform analyzing leakage signals and classification capability of artificial neural networks. This study validates that the time domain is not evident to the complete features regarding noisy leak signals and significance of selection of mother wavelet to extract the noise event features in water distribution pipes. The simulation consequences have shown that an appropriate mother wavelet has been selected and localized to extract the features of the signal with leak noise and background noise, and by neural network implementation, the method improves the classification performance of extracted features.

  18. Modeling Multistandard Wireless Networks in OPNET

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Berger, Michael Stübert; Ruepp, Sarah Renée

    2011-01-01

    Future wireless communication is emerging towards one heterogeneous platform. In this new environment wireless access will be provided by multiple radio technologies that are cooperating and complementing one another. The paper investigates the possibilities of developing such a multistandard...... system using OPNET Modeler. A network model consisting of LTE interworking with WLAN and WiMAX is considered from the radio resource management perspective. In particular, implementing a joint packet scheduler across multiple systems is discussed more in detail....

  19. INTELLIGENT VERTICAL HANDOVER FOR HETEROGONOUS NETWORKS USING FL AND ELECTRE

    OpenAIRE

    Mohammed M. Alkhawlani

    2011-01-01

    The future Heterogeneous Wireless Network (HWN) is composed of multiple Radio Access Technologies(RATs) and domains, therefore, new Radio Resource Management (RRM) schemes and mechanisms arenecessary to benefit from the individual characteristics of each RAT and to exploit the gain resultingfrom jointly considering the whole set of the available radio resources in each RAT. Vertical Handover(VHO) enables users to access several networks such as WLAN, WMAN, WPAN, and WWAN in parallel.It allows...

  20. High-performance combination method of electric network frequency and phase for audio forgery detection in battery-powered devices.

    Science.gov (United States)

    Savari, Maryam; Abdul Wahab, Ainuddin Wahid; Anuar, Nor Badrul

    2016-09-01

    Audio forgery is any act of tampering, illegal copy and fake quality in the audio in a criminal way. In the last decade, there has been increasing attention to the audio forgery detection due to a significant increase in the number of forge in different type of audio. There are a number of methods for forgery detection, which electric network frequency (ENF) is one of the powerful methods in this area for forgery detection in terms of accuracy. In spite of suitable accuracy of ENF in a majority of plug-in powered devices, the weak accuracy of ENF in audio forgery detection for battery-powered devices, especially in laptop and mobile phone, can be consider as one of the main obstacles of the ENF. To solve the ENF problem in terms of accuracy in battery-powered devices, a combination method of ENF and phase feature is proposed. From experiment conducted, ENF alone give 50% and 60% accuracy for forgery detection in mobile phone and laptop respectively, while the proposed method shows 88% and 92% accuracy respectively, for forgery detection in battery-powered devices. The results lead to higher accuracy for forgery detection with the combination of ENF and phase feature. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  1. Multi-objective optimization of pulsatile ventricular assist device hemocompatibility based on neural networks and a genetic algorithm.

    Science.gov (United States)

    Xu, Zihao; Yang, Ming; Wang, Xianghui; Wang, Zhong

    2015-08-04

    Given the benefit of pulsatile blood flow for perfusion of coronary arteries and end organs, pulsatile ventricular assist devices (VADs) are still widely used as paracorporeal mechanical circulatory support devices in clinical applications. However, poor hemocompatibility limits the service period of the VADs. Most previous improvements on VAD hemocompatibility were conducted by trial-and-error CFD analysis, which does not easily arrive at the best solution. In this paper, a multi-objective optimization method integrating neural networks and NSGA-II (Non-dominated Sorted Genetic Algorithm-II) based on FSI simulation was developed and applied to a pulsatile VAD to optimize its hemocompatibility. First, the VAD blood chamber was parameterized with the principal geometrical parameters. Three hemocompatibility indices including hemolysis, platelet activation, and platelet deposition were chosen as goal functions. The neural networks were built to fit the nonlinear relationship between goal functions and geometrical parameters. Next, a multi-objective optimization algorithm (NSGA-II) was used to search out the Pareto optimal solutions in the built neural networks. Finally, the best compromise solution was selected from the Pareto optimal solutions by a fuzzy membership approach and validated by FSI simulation. The best compromise solution simultaneously possesses an acceptable hemolysis index, platelet activation index, and platelet deposition index, and the corresponding relative errors between the indices predicted by optimization algorithm and the one calculated by FSI simulations are all less than 5%. The results suggest that the proposed multi-objective optimization method has the potential for application in optimizing pulsatile VAD hemocompatibility, and may also be applied to other blood-wetted devices.

  2. Secure and Efficient Data Transmission over Body Sensor and Wireless Networks

    Directory of Open Access Journals (Sweden)

    Challa Narasimha

    2008-01-01

    Full Text Available Abstract This paper addresses the transmission of medical and context-aware data from mobile patients to healthcare centers over heterogeneous wireless networks. A handheld device, called personal wireless hub (PWH, of each mobile patient first gathers and aggregates the vital sign and context-aware data for various telemedicine applications. PWH transmits the aggregated data to the remote healthcare center over multiple wireless interfaces such as cellular, WLAN, and WiMAX. The aggregated data contain both periodic data and those nonperiodic unpredictable emergency messages that are sporadic and delayintolerant. This paper addresses the problem of providing QoS (e.g., minimum delay, sufficient data rate, acceptable blocking, and/or dropping rate by designing a packet scheduling and channel/network allocation algorithm over wireless networks. The proposed resource-efficient QoS mechanism is simple and collaborates with an adaptive security algorithm. The QoS and security are achieved mainly with the collaboration of differentiator, delay monitor, data classifier, and scheduler modules within the PWH. This paper also discusses secure data transmission over body sensor networks by introducing key establishment and management algorithms. Simulation results show that the proposed framework achieves low-blocking probability, meets delay requirements, and provides energy-efficient secure communication for the combination of vital signs and context-aware data.

  3. Secure and Efficient Data Transmission over Body Sensor and Wireless Networks

    Directory of Open Access Journals (Sweden)

    Madhur Sikri

    2008-09-01

    Full Text Available This paper addresses the transmission of medical and context-aware data from mobile patients to healthcare centers over heterogeneous wireless networks. A handheld device, called personal wireless hub (PWH, of each mobile patient first gathers and aggregates the vital sign and context-aware data for various telemedicine applications. PWH transmits the aggregated data to the remote healthcare center over multiple wireless interfaces such as cellular, WLAN, and WiMAX. The aggregated data contain both periodic data and those nonperiodic unpredictable emergency messages that are sporadic and delayintolerant. This paper addresses the problem of providing QoS (e.g., minimum delay, sufficient data rate, acceptable blocking, and/or dropping rate by designing a packet scheduling and channel/network allocation algorithm over wireless networks. The proposed resource-efficient QoS mechanism is simple and collaborates with an adaptive security algorithm. The QoS and security are achieved mainly with the collaboration of differentiator, delay monitor, data classifier, and scheduler modules within the PWH. This paper also discusses secure data transmission over body sensor networks by introducing key establishment and management algorithms. Simulation results show that the proposed framework achieves low-blocking probability, meets delay requirements, and provides energy-efficient secure communication for the combination of vital signs and context-aware data.

  4. Experiences from Implementing a Mobile Multiplayer Real-Time Game for Wireless Networks with High Latency

    Directory of Open Access Journals (Sweden)

    Alf Inge Wang

    2009-01-01

    Full Text Available This paper describes results and experiences from designing, implementing, and testing a multiplayer real-time game over mobile networks with high latency. The paper reports on network latency and bandwidth measurements from playing the game live over GPRS, EDGE, UMTS, and WLAN using the TCP and the UDP protocols. These measurements describe the practical constraints of various wireless networks and protocols when used for mobile multiplayer game purposes. Further, the paper reports on experiences from implementing various approaches to minimize issues related to high latency. Specifically, the paper focuses on a discussion about how much of the game should run locally on the client versus on the server to minimize the load on the mobile device and obtain sufficient consistency in the game. The game was designed to reveal all kinds of implementation issues of mobile network multiplayer games. The goal of the game is for a player to push other players around and into traps where they loose their lives. The game relies heavily on collision detection between the players and game objects. The paper presents experiences from experimenting with various approaches that can be used to handle such collisions, and highlights the advantages and disadvantages of the various approaches.

  5. Optimised PDMS Tunnel Devices on MEAs Increase the Probability of Detecting Electrical Activity from Human Stem Cell-Derived Neuronal Networks.

    Science.gov (United States)

    Toivanen, Maria; Pelkonen, Anssi; Mäkinen, Meeri; Ylä-Outinen, Laura; Sukki, Lassi; Kallio, Pasi; Ristola, Mervi; Narkilahti, Susanna

    2017-01-01

    Measurement of the activity of human pluripotent stem cell (hPSC)-derived neuronal networks with microelectrode arrays (MEAs) plays an important role in functional in vitro brain modelling and in neurotoxicological screening. The previously reported hPSC-derived neuronal networks do not, however, exhibit repeatable, stable functional network characteristics similar to rodent cortical cultures, making the interpretation of results difficult. In earlier studies, microtunnels have been used both to control and guide cell growth and amplify the axonal signals of rodent neurons. The aim of the current study was to develop tunnel devices that would facilitate signalling and/or signal detection in entire hPSC-derived neuronal networks containing not only axons, but also somata and dendrites. Therefore, MEA-compatible polydimethylsiloxane (PDMS) tunnel devices with 8 different dimensions were created. The hPSC-derived neurons were cultured in the tunnel devices on MEAs, and the spontaneous electrical activity of the networks was measured for 5 weeks. Although the tunnel devices improved the signal-to-noise ratio only by 1.3-fold at best, they significantly increased the percentage of electrodes detecting neuronal activity (52-100%) compared with the controls (27%). Significantly higher spike and burst counts were also obtained using the tunnel devices. Neuronal networks inside the tunnels were amenable to pharmacological manipulation. The results suggest that tunnel devices encompassing the entire neuronal network can increase the measured spontaneous activity in hPSC-derived neuronal networks on MEAs. Therefore, they can increase the efficiency of functional studies of hPSC-derived networks on MEAs.

  6. Optimised PDMS Tunnel Devices on MEAs Increase the Probability of Detecting Electrical Activity from Human Stem Cell-Derived Neuronal Networks

    Directory of Open Access Journals (Sweden)

    Maria Toivanen

    2017-10-01

    Full Text Available Measurement of the activity of human pluripotent stem cell (hPSC-derived neuronal networks with microelectrode arrays (MEAs plays an important role in functional in vitro brain modelling and in neurotoxicological screening. The previously reported hPSC-derived neuronal networks do not, however, exhibit repeatable, stable functional network characteristics similar to rodent cortical cultures, making the interpretation of results difficult. In earlier studies, microtunnels have been used both to control and guide cell growth and amplify the axonal signals of rodent neurons. The aim of the current study was to develop tunnel devices that would facilitate signalling and/or signal detection in entire hPSC-derived neuronal networks containing not only axons, but also somata and dendrites. Therefore, MEA-compatible polydimethylsiloxane (PDMS tunnel devices with 8 different dimensions were created. The hPSC-derived neurons were cultured in the tunnel devices on MEAs, and the spontaneous electrical activity of the networks was measured for 5 weeks. Although the tunnel devices improved the signal-to-noise ratio only by 1.3-fold at best, they significantly increased the percentage of electrodes detecting neuronal activity (52–100% compared with the controls (27%. Significantly higher spike and burst counts were also obtained using the tunnel devices. Neuronal networks inside the tunnels were amenable to pharmacological manipulation. The results suggest that tunnel devices encompassing the entire neuronal network can increase the measured spontaneous activity in hPSC-derived neuronal networks on MEAs. Therefore, they can increase the efficiency of functional studies of hPSC-derived networks on MEAs.

  7. Modeling of bulk acoustic wave devices built on piezoelectric stack structures: impedance matrix analysis and network representation.

    Science.gov (United States)

    Zhang, Victor Y; Dubus, Bertrand; Lefebvre, Jean Etienne; Gryba, Tadeusz

    2008-03-01

    The fundamental electro-acoustic properties of a solid layer are deduced in terms of its impedance matrix (Z) and represented by a network for modeling the bulk acoustic wave devices built on piezoelectric stacked structures. A piezoelectric layer is described by a three-port equivalent network, a nonpiezoelectric layer, and a short- or open-circuit piezoelectric layer by a two-port one. Electrical input impedance of the resonator is derived in terms of the Z-matrix of both the piezoelectric layer and an external load, the unique expression applies whether the resonator is a mono- or electroded-layer or a solidly mounted resonator (SMR). The loading effects of Al-electrodes on the resonating frequencies of the piezoelectric ZnO-layer are analyzed. Transmission and reflection properties of Bragg mirrors are investigated along with the bulk radiation in SMR. As a synthesizing example, a coupled resonator filter (CRF) is analyzed using the associated two-port equivalent network and by calculating the power transmission to a 50Omega-load. The stacked crystal filter is naturally included in the model as a special case of CRF. Combining a comprehensive matrix analysis and an instructive network representation and setting the problem with a full vectorial formalism are peculiar features of the presented approach.

  8. New IEEE 11073 Standards for interoperable, networked Point-of-Care Medical Devices.

    Science.gov (United States)

    Kasparick, Martin; Schlichting, Stefan; Golatowski, Frank; Timmermann, Dirk

    2015-08-01

    Surgical procedures become more and more complex and the number of medical devices in an operating room (OR) increases continuously. Today's vendor-dependent solutions for integrated ORs are not able to handle this complexity. They can only form isolated solutions. Furthermore, high costs are a result of vendor-dependent approaches. Thus we present a service-oriented device communication for distributed medical systems that enables the integration and interconnection between medical devices among each other and to (medical) information systems, including plug-and-play functionality. This system will improve patient's safety by making technical complexity of a comprehensive integration manageable. It will be available as open standards that are part of the IEEE 11073 family of standards. The solution consists of a service-oriented communication technology, the so called Medical Devices Profile for Web Services (MDPWS), a Domain Information & Service Model, and a binding between the first two mechanisms. A proof of this concept has been done with demonstrators of real world OR devices.

  9. Energy efficiency in hybrid mobile and wireless networks

    Energy Technology Data Exchange (ETDEWEB)

    Ziaul Haq Abbas

    2012-07-01

    Wireless Internet access is almost pervasive nowadays, and many types of wireless networks can be used to access the Internet. However, along with this growth, there is an even greater concern about the energy consumption and efficiency of mobile devices as well as of the supporting networks, triggering the appearance of the concept of green communication. While some efforts have been made towards this direction, challenges still exist and need to be tackled from diverse perspectives. Cellular networks, WLANs, and ad hoc networks in the form of wireless mesh networks are the most popular technologies for wireless Internet access. The availability of such a variety of access networks has also paved the way to explore synergistic approaches for Internet access, leading to the concept of hybrid networks and relay communications. In addition, many mobile devices are being equipped with multiple interfaces, enabling them to operate in hybrid networks. In contrast, the improvements in the battery technology itself have not matched the pace of the emerging mobile applications. The situation becomes more sophisticated when a mobile device functions also as a relay node to forward other station's data. In the literature, energy efficiency of mobile devices has been addressed from various perspectives such as protocol-level efforts, battery management efforts, etc. However, there is little work on energy efficiency in hybrid mobile and wireless networks and devices with heterogeneous connections. For example, when there are multiple networks available to a mobile device, how to achieve optimum long-term energy consumption of such a device is an open question. Furthermore, in today's cellular networks, micro-, pico-, and femto-cells are the most popular network topologies in order to support high data rate services and high user density. With the growth of such small-cell solutions, the energy consumption of these networks is also becoming an important concern for operators

  10. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  11. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  12. A memory efficient implementation scheme of Gauss error function in a Laguerre-Volterra network for neuroprosthetic devices

    Science.gov (United States)

    Li, Will X. Y.; Cui, Ke; Zhang, Wei

    2017-04-01

    Cognitive neural prosthesis is a manmade device which can be used to restore or compensate for lost human cognitive modalities. The generalized Laguerre-Volterra (GLV) network serves as a robust mathematical underpinning for the development of such prosthetic instrument. In this paper, a hardware implementation scheme of Gauss error function for the GLV network targeting reconfigurable platforms is reported. Numerical approximations are formulated which transform the computation of nonelementary function into combinational operations of elementary functions, and memory-intensive look-up table (LUT) based approaches can therefore be circumvented. The computational precision can be made adjustable with the utilization of an error compensation scheme, which is proposed based on the experimental observation of the mathematical characteristics of the error trajectory. The precision can be further customizable by exploiting the run-time characteristics of the reconfigurable system. Compared to the polynomial expansion based implementation scheme, the utilization of slice LUTs, occupied slices, and DSP48E1s on a Xilinx XC6VLX240T field-programmable gate array has decreased by 94.2%, 94.1%, and 90.0%, respectively. While compared to the look-up table based scheme, 1.0 ×1017 bits of storage can be spared under the maximum allowable error of 1.0 ×10-3 . The proposed implementation scheme can be employed in the study of large-scale neural ensemble activity and in the design and development of neural prosthetic device.

  13. Bayesian Network Based Fault Prognosis via Bond Graph Modeling of High-Speed Railway Traction Device

    Directory of Open Access Journals (Sweden)

    Yunkai Wu

    2015-01-01

    component-level faults accurately for a high-speed railway traction system, a fault prognosis approach via Bayesian network and bond graph modeling techniques is proposed. The inherent structure of a railway traction system is represented by bond graph model, based on which a multilayer Bayesian network is developed for fault propagation analysis and fault prediction. For complete and incomplete data sets, two different parameter learning algorithms such as Bayesian estimation and expectation maximization (EM algorithm are adopted to determine the conditional probability table of the Bayesian network. The proposed prognosis approach using Pearl’s polytree propagation algorithm for joint probability reasoning can predict the failure probabilities of leaf nodes based on the current status of root nodes. Verification results in a high-speed railway traction simulation system can demonstrate the effectiveness of the proposed approach.

  14. 76 FR 17657 - Medical Device Epidemiology Network 2011: Second Annual Public Workshop

    Science.gov (United States)

    2011-03-30

    ... stakeholders to initiate development of scientific, methodology, and device-area priorities for MDEpiNet. II... stakeholders with expertise in epidemiology and health services research on issues related to the methodology... epidemiology and health services research community, and all stakeholders on issues related to the methodology...

  15. Automatic Defect Detection of Fasteners on the Catenary Support Device Using Deep Convolutional Neural Network

    NARCIS (Netherlands)

    Chen, Junwen; Liu, Zhigang; Wang, H.; Nunez Vicencio, Alfredo; Han, Zhiwei

    2017-01-01

    The excitation and vibration triggered by the long-term operation of railway vehicles inevitably result in defective states of catenary support devices. With the massive construction of high-speed electrified railways, automatic defect detection of diverse and plentiful fasteners on the catenary

  16. Prediction of Operating Characteristics of Electrotechnical Devices using Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    PASCA Alexandra

    2014-05-01

    Full Text Available The paper purpose is to emphasize the possibilities and the advantages to use the artificial intelligence techniques for operating mode prediction of electrotechnical devices. The considered application consists of the analysis of behavior of an inductive proximity sensor at variation of design parameters.

  17. In situ fabrication of macroporous polymer networks within microfluidic devices by living radical photopolymerization and leaching.

    Science.gov (United States)

    Simms, Helen M; Brotherton, Christopher M; Good, Brian T; Davis, Robert H; Anseth, Kristi S; Bowman, Christopher N

    2005-02-01

    Novel fabrication techniques and polymer systems are being explored to enable mass production of low cost microfluidic devices. In this contribution we discuss a new fabrication scheme for making microfluidic devices containing porous polymer components in situ. Contact lithography, a living radical photopolymer (LRPP) system and salt leaching were used to fabricate multilayer microfluidic devices rapidly with various channel geometries and covalently attached porous polymer plugs made of various photopolymerizable substrates. LRPP systems offer the advantages of covalent attachment of microfluidic device layers and facile surface modification via grafting. Several applications of the porous plugs are also explored, including a static mixer, a high surface area-to-volume reactor and a rapidly responding hydrogel valve. Quantitative and qualitative data show an increase in mixing of a fluorescein and a water stream for channels containing porous plugs relative to channels with no porous plugs. Confocal laser scanning microscopy images demonstrate the ability to graft a functional material onto porous plug surfaces. A reaction was carried out on the grafted pore surfaces, which resulted in fluorescent labelling of the grafted material throughout the pores of the plug. Homogenous fluorescence throughout the depth of the porous plug and along pore surfaces indicated that the porous plugs were surface modified by grafting and that reactions can be carried out on the pore surfaces. Finally, porous hydrogel valves were fabricated which swelled in response to contact with various pH solutions. Results indicate that a porous hydrogel valve will swell and close more rapidly than other valve geometries made with the same polymer formulation. The LRPP-salt leaching method provides a means for rapidly incorporating porous polymer components into microfluidic devices, which can be utilized for a variety of pertinent applications upon appropriate selection of porous plug

  18. Advancing medical device innovation through collaboration and coordination of structured data capture pilots: Report from the Medical Device Epidemiology Network (MDEpiNet) Specific, Measurable, Achievable, Results-Oriented, Time Bound (SMART) Think Tank.

    Science.gov (United States)

    Reed, Terrie L; Drozda, Joseph P; Baskin, Kevin M; Tcheng, James; Conway, Karen; Wilson, Natalia; Marinac-Dabic, Danica; Heise, Theodore; Krucoff, Mitchell W

    2017-12-01

    The Medical Device Epidemiology Network (MDEpiNet) is a public private partnership (PPP) that provides a platform for collaboration on medical device evaluation and depth of expertise for supporting pilots to capture, exchange and use device information for improving device safety and protecting public health. The MDEpiNet SMART Think Tank, held in February, 2013, sought to engage expert stakeholders who were committed to improving the capture of device data, including Unique Device Identification (UDI), in key electronic health information. Prior to the Think Tank there was limited collaboration among stakeholders beyond a few single health care organizations engaged in electronic capture and exchange of device data. The Think Tank resulted in what has become two sustainable multi-stakeholder device data capture initiatives, BUILD and VANGUARD. These initiatives continue to mature within the MDEpiNet PPP structure and are well aligned with the goals outlined in recent FDA-initiated National Medical Device Planning Board and Medical Device Registry Task Force white papers as well as the vision for the National Evaluation System for health Technology.%. Published by Elsevier Inc.

  19. Mechanically enhanced nested-network hydrogels as a coating material for biomedical devices.

    Science.gov (United States)

    Wang, Zhengmu; Zhang, Hongbin; Chu, Axel J; Jackson, John; Lin, Karen; Lim, Chinten James; Lange, Dirk; Chiao, Mu

    2018-02-12

    Well-organized composite formations such as hierarchical nested-network (NN) structure in bone tissue and reticular connective tissue present remarkable mechanical strength and play a crucial role in achieving physical and biological functions for living organisms. Inspired by these delicate microstructures in nature, an analogous scaffold of double network hydrogel was fabricated by creating a poly(2-hydroxyethyl methacrylate) (pHEMA) network in the porous structure of alginate hydrogels. The resulting hydrogel possessed hierarchical NN structure and showed significantly improved mechanical strength but still maintained high elasticity comparable to soft tissues due to a mutual strengthening effect between the two networks. The tough hydrogel is also self-lubricated, exhibiting a surface friction coefficient comparable with polydimethylsiloxane (PDMS) substrates lubricated by a commercial aqueous lubricant (K-Y Jelly) and other low surface friction hydrogels. Additional properties of this hydrogel include high hydrophilicity, good biocompatibility, tunable cell adhesion and bacterial resistance after incorporation of silver nanoparticles. Firm bonding of the hydrogel on silicone substrates could be achieved through facile chemical modification, thus enabling the use of this hydrogel as a versatile coating material for biomedical applications. In this study, we developed a tough hydrogel by crosslinking HEMA monomers in alginate hydrogels and forming a well-organized structure of hierarchical nested network (NN). Different from most reported stretchable alginate-based hydrogels, the NN hydrogel shows higher compressive strength but retains comparable softness to alginate counterparts. This work further demonstrated the good integration of the tough hydrogel with silicone substrates through chemical modification and micropillar structures. Other properties including surface friction, biocompatibility and bacterial resistance were investigated and the hydrogel shows

  20. Network Power Fault Detection

    OpenAIRE

    Siviero, Claudio

    2013-01-01

    Network power fault detection. At least one first network device is instructed to temporarily disconnect from a power supply path of a network, and at least one characteristic of the power supply path of the network is measured at a second network device connected to the network while the at least one first network device is temporarily disconnected from the network

  1. Ag/Au/Polypyrrole Core-shell Nanowire Network for Transparent, Stretchable and Flexible Supercapacitor in Wearable Energy Devices

    Science.gov (United States)

    Moon, Hyunjin; Lee, Habeom; Kwon, Jinhyeong; Suh, Young Duk; Kim, Dong Kwan; Ha, Inho; Yeo, Junyeob; Hong, Sukjoon; Ko, Seung Hwan

    2017-01-01

    Transparent and stretchable energy storage devices have attracted significant interest due to their potential to be applied to biocompatible and wearable electronics. Supercapacitors that use the reversible faradaic redox reaction of conducting polymer have a higher specific capacitance as compared with electrical double-layer capacitors. Typically, the conducting polymer electrode is fabricated through direct electropolymerization on the current collector. However, no research have been conducted on metal nanowires as current collectors for the direct electropolymerization, even though the metal nanowire network structure has proven to be superior as a transparent, flexible, and stretchable electrode platform because the conducting polymer’s redox potential for polymerization is higher than that of widely studied metal nanowires such as silver and copper. In this study, we demonstrated a highly transparent and stretchable supercapacitor by developing Ag/Au/Polypyrrole core-shell nanowire networks as electrode by coating the surface of Ag NWs with a thin layer of gold, which provide higher redox potential than the electropolymerizable monomer. The Ag/Au/Polypyrrole core-shell nanowire networks demonstrated superior mechanical stability under various mechanical bending and stretching. In addition, proposed supercapacitors showed fine optical transmittance together with fivefold improved areal capacitance compared to pristine Ag/Au core-shell nanowire mesh-based supercapacitors. PMID:28155913

  2. Ag/Au/Polypyrrole Core-shell Nanowire Network for Transparent, Stretchable and Flexible Supercapacitor in Wearable Energy Devices

    Science.gov (United States)

    Moon, Hyunjin; Lee, Habeom; Kwon, Jinhyeong; Suh, Young Duk; Kim, Dong Kwan; Ha, Inho; Yeo, Junyeob; Hong, Sukjoon; Ko, Seung Hwan

    2017-02-01

    Transparent and stretchable energy storage devices have attracted significant interest due to their potential to be applied to biocompatible and wearable electronics. Supercapacitors that use the reversible faradaic redox reaction of conducting polymer have a higher specific capacitance as compared with electrical double-layer capacitors. Typically, the conducting polymer electrode is fabricated through direct electropolymerization on the current collector. However, no research have been conducted on metal nanowires as current collectors for the direct electropolymerization, even though the metal nanowire network structure has proven to be superior as a transparent, flexible, and stretchable electrode platform because the conducting polymer’s redox potential for polymerization is higher than that of widely studied metal nanowires such as silver and copper. In this study, we demonstrated a highly transparent and stretchable supercapacitor by developing Ag/Au/Polypyrrole core-shell nanowire networks as electrode by coating the surface of Ag NWs with a thin layer of gold, which provide higher redox potential than the electropolymerizable monomer. The Ag/Au/Polypyrrole core-shell nanowire networks demonstrated superior mechanical stability under various mechanical bending and stretching. In addition, proposed supercapacitors showed fine optical transmittance together with fivefold improved areal capacitance compared to pristine Ag/Au core-shell nanowire mesh-based supercapacitors.

  3. A Novel Hybrid Intelligent Indoor Location Method for Mobile Devices by Zones Using Wi-Fi Signals

    Directory of Open Access Journals (Sweden)

    Manuel Castañón–Puga

    2015-12-01

    Full Text Available The increasing use of mobile devices in indoor spaces brings challenges to location methods. This work presents a hybrid intelligent method based on data mining and Type-2 fuzzy logic to locate mobile devices in an indoor space by zones using Wi-Fi signals from selected access points (APs. This approach takes advantage of wireless local area networks (WLANs over other types of architectures and implements the complete method in a mobile application using the developed tools. Besides, the proposed approach is validated by experimental data obtained from case studies and the cross-validation technique. For the purpose of generating the fuzzy rules that conform to the Takagi–Sugeno fuzzy system structure, a semi-supervised data mining technique called subtractive clustering is used. This algorithm finds centers of clusters from the radius map given by the collected signals from APs. Measurements of Wi-Fi signals can be noisy due to several factors mentioned in this work, so this method proposed the use of Type-2 fuzzy logic for modeling and dealing with such uncertain information.

  4. A Compact Printed Slot Antenna with High Out-of-band Rejection for WLAN/WiMAX Applications

    Directory of Open Access Journals (Sweden)

    P. Moeikham

    2016-12-01

    Full Text Available The suppression of electromagnetic interferences (EMIs caused by the out-of-band operation is required for broadband antennas. To achieve this purpose, a compact broadband printed slot antenna with build-in filters for band notching is presented. The filters, including I-shaped and inverse L-shaped narrow slits and an L-shaped conductor strip, whose lengths correspond to half wavelengths, were integrated in the proposed antenna structure. The mitigation of the EMIs at the frequency ranges of 2.7 to 3.2 GHz, 4.1 to 4.7 GHz, and over 6.1 GHz was obtained. The proposed antenna capably operated at WLAN/WiMAX frequency ranges of 2.26 to 2.68 GHz, 3.28 to 4.09 GHz, and 4.75 to 6.04 GHz. The nearly omni-directional and likely bi- directional radiation patterns were given by the proposed antenna in xz and yz planes, respectively. Therefore, this antenna is suitable for various WLAN/WiMAX applications.

  5. Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks

    Directory of Open Access Journals (Sweden)

    Blerim Rexha

    2018-02-01

    Full Text Available Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the promising biometrics-based user authentication mechanisms that has been widely available in this era of mobile computing. With a built-in camera capability on smartphones, tablets, and laptops, face authentication provides an attractive alternative of legacy passwords for its memory-less authentication process, which is so sophisticated that it can unlock the device faster than a fingerprint. Nevertheless, face authentication in the context of smartphones has proven to be vulnerable to attacks. In most current implementations, a sufficiently high-resolution face image displayed on another mobile device will be enough to circumvent security measures and bypass the authentication process. In order to prevent such bypass attacks, gesture recognition together with location is proposed to be additionally modeled. Gestures provide a faster and more convenient method of authentication compared to a complex password. The focus of this paper is to build a secure authentication system with face, location and gesture recognition as components. User gestures and location data are a sequence of time series; therefore, in this paper we propose to use unsupervised learning in the long short-term memory recurrent neural network to actively learn to recognize, group and discriminate user gestures and location. Moreover, a clustering-based technique is also implemented for recognizing gestures and location.

  6. Machine-Type-Communication (MTC) Device Grouping Algorithm for Congestion Avoidance of MTC Oriented LTE Network

    Science.gov (United States)

    Jung, Kwang-Ryul; Park, Aesoon; Lee, Sungwon

    Machine-Type-Communication (MTC) is a new paradigm in mobile wireless network domains such as Mobile WiMAX (IEEE 802.16e) and 3GPP LTE (3rd Generation Partnership Project Long Term Evolution). We explain the background for MTC environments, and its key issues. Then we focus on the uplink traffic aggressiveness characteristics in major applications such as Smart Grid. Then, we propose a new congestion avoidance algorithm to reduce the congestion of the uplink intensive applications.

  7. Application of Artificial Neural Networks in Modeling Direction Wheelchairs Using Neurosky Mindset Mobile (EEG Device

    Directory of Open Access Journals (Sweden)

    Agus Siswoyo

    2017-07-01

    Full Text Available The implementation of Artificial Neural Network in prediction the direction of electric wheelchair from brain signal input for physical mobility impairment.. The control of the wheelchair as an effort in improving disabled person life quality. The interaction from disabled person is helping in relation to social life with others. Because of the mobility impairment, the wheelchair with brain signal input is made. This wheel chair is purposed to help the disabled person and elderly for their daily activity. ANN helps to develop the mapping from input to target. ANN is developed in 3 level: input level, one hidden level, and output level (6-2-1. There are 6 signal from Neurosky Mindset sensor output, Alpha1, Alpha2, Raw signal, Total time signal, Attention Signal, and Meditation signal. The purpose of this research is to find out the output value from ANN: value in turning right, turning left, and forward. From those outputs, we can prove the relevance to the target. One of the main problem that interfering with success is the problem of proper neural network training. Arduino uno is chosen to implement the learning program algorithm because it is a popular microcontroller that is economic and efficient. The training of artificial neural network in this research uses 21 data package from raw data, Alpha1, Aplha2, Meditation data, Attention data, total time data. At the time of the test there is a value of Mean square Error(MSE at the end of training amounted to 0.92495 at epoch 9958, value a correlation coefficient of 0.92804 shows that accuracy the results of the training process good.     Keywords: Navigation, Neural network, Real-time training, Arduino

  8. International Conference on VLSI, Communication, Advanced Devices, Signals & Systems and Networking

    CERN Document Server

    Shirur, Yasha; Prasad, Rekha

    2013-01-01

    This book is a collection of papers presented by renowned researchers, keynote speakers and academicians in the International Conference on VLSI, Communication, Analog Designs, Signals and Systems, and Networking (VCASAN-2013), organized by B.N.M. Institute of Technology, Bangalore, India during July 17-19, 2013. The book provides global trends in cutting-edge technologies in electronics and communication engineering. The content of the book is useful to engineers, researchers and academicians as well as industry professionals.

  9. A novel matching network employing surface acoustic wave devices for W-CDMA power amplifiers.

    Science.gov (United States)

    Li, Honglang; He, Songbai; Hashimoto, Ken-ya; Omori, Tatsuya; Yamaguchi, Masatsune

    2006-12-22

    This paper describes a new approach of designing high Q surface acoustic wave (SAW) resonators as an inductive element in the matching network for W-CDMA power amplifiers (PAs). Spiral inductors based on CMOS/BiCMOS technologies presently possess relatively low Q (typically <10) and occupy a considerably large area. In order to break through the limitations of the spiral inductors, the authors attempt to apply higher Q and wideband SAW resonators employing Cu-grating/15 degrees YX-LiNbO(3)-substrate structure to the matching network for improved PA performance. An analysis was made on SAW resonators in detail, and an SAW resonator having a very small capacitance ratio of 3.28 and moderate Q of 147.8 was developed. After discussing the frequency dependence of the effective inductances, SAW resonators, which are used to be as inductive elements in the matching networks of PAs, were designed and fabricated. The PA including the matching circuit was simulated using the characteristics of the fabricated SAW resonators. The result showed that with better shape factor and good out-of-rejection, the SAW resonators definitely work as an inductive element and could replace widely used spiral inductors.

  10. WLAN Hot Spot services for the automotive and oil industries :a business analysis Or : "Refuel the car with petrol and information, both ways at the gas station"

    NARCIS (Netherlands)

    L-F. Pau (Louis-François); M.H.P. Oremus

    2003-01-01

    textabstractWhile you refuel for gas ,why not refuel for information or download vehicle data ? This paper analyzes in extensive detail the user segmentation by vehicle usage , service offering , and full business models from WLAN hot spot services delivered to vehicles (private, professional ,

  11. Use of Optical Storage Devices as Shared Resources in Local Area Networks

    Science.gov (United States)

    1989-09-01

    PC’s longevity is its expandability which is based upon an open architecture. The original IBM PC was introduced as a mostly empty box containing a cpu ...MS-DOS services. As introduced earlier the I/O ports are the points of interface between the central processing unit ( cpu ) and peripherals or device...O ports) as defined for the Intel 8086 family of processors (including 8086, 8088, 80286 and 80386 ). Each of these I/O ports is directly attached to

  12. Bottle-neck type of neural network as a mapping device towards food specifications.

    Science.gov (United States)

    Novic, Marjana; Groselj, Neva

    2009-09-01

    A novel methodology is proposed for food specifications associated with the origin of food. The methodology was tested on honey samples collected within the TRACE EU project. The data were sampled in various regions in Europe and analysed for the trace elements content. The sampling sites were characterized by different geological origins, such as limestone, shale, or magmatic. We have chosen 14 elements, B, Na, Mg, A, K, Ca, Mn, Co, Ni, Cu, Zn, Rb, Sr, and Ba, due to their influence on the separation of samples regarding the geology of the sampling sites. A special architecture of an error back-propagation neural network, so called bottle-neck type of neural network was used to project the data into a 2D plane. The data were fed into the 14-nodes input layer and then transferred through the 2-nodes hidden layer (compared to a bottle-neck) to the 14-nodes output layer. The two hidden nodes representing the two coordinates of the projection plane enable us to map the samples used for training of the bottle-neck network. With the knowledge about the classes of individual samples we determine the clusters in the projection plane and consequently obtain the coordinates of the centroid (gravity point) of a particular cluster. The clusters are characterized with an ellipse shape borders spanning the length of up to 3sigma in each dimension. Since the data were classified as regard to the geology, three main clusters were sought: (i) limestone, (ii) shale/mudstone/clay/loess, and (iii) acid-magmatic origin of honey samples. The novel methodology proposed for food specifications was demonstrated on a reduced set of samples, which shows good clustering of all three classes in the projection plane, and on the third class of the original data set.

  13. Ensuring Patient Safety by using Colored Petri Net Simulation in the Design of Heterogeneous, Multi-Vendor, Integrated, Life-Critical Wireless (802.x) Patient Care Device Networks.

    Science.gov (United States)

    Sloane, Elliot; Gehlot, Vijay

    2005-01-01

    Hospitals and manufacturers are designing and deploying the IEEE 802.x wireless technologies in medical devices to promote patient mobility and flexible facility use. There is little information, however, on the reliability or ultimate safety of connecting multiple wireless life-critical medical devices from multiple vendors using commercial 802.11a, 802.11b, 802.11g or pre-802.11n devices. It is believed that 802.11-type devices can introduce unintended life-threatening risks unless delivery of critical patient alarms to central monitoring systems and/or clinical personnel is assured by proper use of 802.11e Quality of Service (QoS) methods. Petri net tools can be used to simulate all possible states and transitions between devices and/or systems in a wireless device network, and can identify failure modes in advance. Colored Petri Net (CPN) tools are ideal, in fact, as they allow tracking and controlling each message in a network based on pre-selected criteria. This paper describes a research project using CPN to simulate and validate alarm integrity in a small multi-modality wireless patient monitoring system. A 20-monitor wireless patient monitoring network is created in two versions: one with non-prioritized 802.x CSM protocols and the second with simulated Quality of Service (QoS) capabilities similar to 802.11e (i.e., the second network allows message priority management.) In the standard 802.x network, dangerous heart arrhythmia and pulse oximetry alarms could not be reliably and rapidly communicated, but the second network's QoS priority management reduced that risk significantly.

  14. Barrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure

    OpenAIRE

    E.T. Tchao; Ansah, Richard Y.; Djane, Seth D.

    2017-01-01

    The adoption of Bring Your Own Device (BYOD), also known as Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP), or Bring Your Own Personal Computer (BYOPC), is a policy which allows people access to privileged resources, information and services available on the private computer network of an organization using their own personal computer devices. BYOD, since its emergence in 2009, courtesy of Intel, is now a common practice in many organizations. Academic institutions that attempt...

  15. Proposal for the award of a blanket order contract for the supply of microprocessor-based protection and control devices for the CERN HV distribution network

    CERN Document Server

    2004-01-01

    This document concerns the award of a blanket contract for the supply of microprocessor-based protection and control devices for the CERN HV distribution network. The Finance Committee is invited to agree to the negotiation of a blanket order contract with SCHNEIDER ELECTRIC (PT), the lowest technically acceptable bidder after realignment, for the supply of microprocessor-based protection and control devices for the CERN HV distribution network for a total amount of 1 900 000 euros (2 924 128 Swiss francs), subject to revision for inflation after 1 January 2007. The rate of exchange used is that stipulated in the tender

  16. Saving energy for the data collection point in WBAN network

    Science.gov (United States)

    Nguyen-Duc, Toan; Kamioka, Eiji

    2017-11-01

    Wireless sensor networking (WSN) has been rapidly developed and become essential in various domains including health care systems. Such systems use WSN to collect real-time medical sensed data, aiming at improving the patient safety. For instance, patients suffered from adverse events, i.e., cardiac or respiratory arrests, are monitored so as to prevent them from getting harm. Sensors are placed on, in or near the patients' body to continuously collect sensing data such as the electrocardiograms, blood oxygenation, breathing, and heart rate. In this case, the sensors form a subcategory of WSN called wireless body area network (WBAN). In WBAN, sensing data are sent to one or more data collection points called personal server (PS). The role of PS is important since it forwards sensed data, to a medical server via a Bluetooth/WLAN connection in real time to support storage of information and real-time diagnosis, the device can also issue a notification of an emergency status. Since PS is a battery-based device, when its battery is empty, it will disconnect the sensed medical data with the rest network. To best of our knowledge, very few studies that focus on saving energy for the PS. To this end, this work investigates the trade-off between energy consumption for wireless communication and the amount of sensing data. An energy consumption model for wireless communication has been proposed based on direct measurement using real testbed. According to our findings, it is possible to save energy for the PS by selecting suitable wireless technology to be used based on the amount of data to be transmitted.

  17. Power-Management Techniques for Wireless Sensor Networks and Similar Low-Power Communication Devices Based on Nonrechargeable Batteries

    Directory of Open Access Journals (Sweden)

    Agnelo Silva

    2012-01-01

    Full Text Available Despite the well-known advantages of communication solutions based on energy harvesting, there are scenarios where the absence of batteries (supercapacitor only or the use of rechargeable batteries is not a realistic option. Therefore, the alternative is to extend as much as possible the lifetime of primary cells (nonrechargeable batteries. By assuming low duty-cycle applications, three power-management techniques are combined in a novel way to provide an efficient energy solution for wireless sensor networks nodes or similar communication devices powered by primary cells. Accordingly, a customized node is designed and long-term experiments in laboratory and outdoors are realized. Simulated and empirical results show that the battery lifetime can be drastically enhanced. However, two trade-offs are identified: a significant increase of both data latency and hardware/software complexity. Unattended nodes deployed in outdoors under extreme temperatures, buried sensors (underground communication, and nodes embedded in the structure of buildings, bridges, and roads are some of the target scenarios for this work. Part of the provided guidelines can be used to extend the battery lifetime of communication devices in general.

  18. Virtual reality interface devices in the reorganization of neural networks in the brain of patients with neurological diseases.

    Science.gov (United States)

    Gatica-Rojas, Valeska; Méndez-Rebolledo, Guillermo

    2014-04-15

    Two key characteristics of all virtual reality applications are interaction and immersion. Systemic interaction is achieved through a variety of multisensory channels (hearing, sight, touch, and smell), permitting the user to interact with the virtual world in real time. Immersion is the degree to which a person can feel wrapped in the virtual world through a defined interface. Virtual reality interface devices such as the Nintendo® Wii and its peripheral nunchuks-balance board, head mounted displays and joystick allow interaction and immersion in unreal environments created from computer software. Virtual environments are highly interactive, generating great activation of visual, vestibular and proprioceptive systems during the execution of a video game. In addition, they are entertaining and safe for the user. Recently, incorporating therapeutic purposes in virtual reality interface devices has allowed them to be used for the rehabilitation of neurological patients, e.g., balance training in older adults and dynamic stability in healthy participants. The improvements observed in neurological diseases (chronic stroke and cerebral palsy) have been shown by changes in the reorganization of neural networks in patients' brain, along with better hand function and other skills, contributing to their quality of life. The data generated by such studies could substantially contribute to physical rehabilitation strategies.

  19. Virtual reality interface devices in the reorganization of neural networks in the brain of patients with neurological diseases

    Science.gov (United States)

    Gatica-Rojas, Valeska; Méndez-Rebolledo, Guillermo

    2014-01-01

    Two key characteristics of all virtual reality applications are interaction and immersion. Systemic interaction is achieved through a variety of multisensory channels (hearing, sight, touch, and smell), permitting the user to interact with the virtual world in real time. Immersion is the degree to which a person can feel wrapped in the virtual world through a defined interface. Virtual reality interface devices such as the Nintendo® Wii and its peripheral nunchuks-balance board, head mounted displays and joystick allow interaction and immersion in unreal environments created from computer software. Virtual environments are highly interactive, generating great activation of visual, vestibular and proprioceptive systems during the execution of a video game. In addition, they are entertaining and safe for the user. Recently, incorporating therapeutic purposes in virtual reality interface devices has allowed them to be used for the rehabilitation of neurological patients, e.g., balance training in older adults and dynamic stability in healthy participants. The improvements observed in neurological diseases (chronic stroke and cerebral palsy) have been shown by changes in the reorganization of neural networks in patients’ brain, along with better hand function and other skills, contributing to their quality of life. The data generated by such studies could substantially contribute to physical rehabilitation strategies. PMID:25206907

  20. Wearable Device-Based Gait Recognition Using Angle Embedded Gait Dynamic Images and a Convolutional Neural Network

    Directory of Open Access Journals (Sweden)

    Yongjia Zhao

    2017-02-01

    Full Text Available The widespread installation of inertial sensors in smartphones and other wearable devices provides a valuable opportunity to identify people by analyzing their gait patterns, for either cooperative or non-cooperative circumstances. However, it is still a challenging task to reliably extract discriminative features for gait recognition with noisy and complex data sequences collected from casually worn wearable devices like smartphones. To cope with this problem, we propose a novel image-based gait recognition approach using the Convolutional Neural Network (CNN without the need to manually extract discriminative features. The CNN’s input image, which is encoded straightforwardly from the inertial sensor data sequences, is called Angle Embedded Gait Dynamic Image (AE-GDI. AE-GDI is a new two-dimensional representation of gait dynamics, which is invariant to rotation and translation. The performance of the proposed approach in gait authentication and gait labeling is evaluated using two datasets: (1 the McGill University dataset, which is collected under realistic conditions; and (2 the Osaka University dataset with the largest number of subjects. Experimental results show that the proposed approach achieves competitive recognition accuracy over existing approaches and provides an effective parametric solution for identification among a large number of subjects by gait patterns.

  1. Wearable Device-Based Gait Recognition Using Angle Embedded Gait Dynamic Images and a Convolutional Neural Network.

    Science.gov (United States)

    Zhao, Yongjia; Zhou, Suiping

    2017-02-28

    The widespread installation of inertial sensors in smartphones and other wearable devices provides a valuable opportunity to identify people by analyzing their gait patterns, for either cooperative or non-cooperative circumstances. However, it is still a challenging task to reliably extract discriminative features for gait recognition with noisy and complex data sequences collected from casually worn wearable devices like smartphones. To cope with this problem, we propose a novel image-based gait recognition approach using the Convolutional Neural Network (CNN) without the need to manually extract discriminative features. The CNN's input image, which is encoded straightforwardly from the inertial sensor data sequences, is called Angle Embedded Gait Dynamic Image (AE-GDI). AE-GDI is a new two-dimensional representation of gait dynamics, which is invariant to rotation and translation. The performance of the proposed approach in gait authentication and gait labeling is evaluated using two datasets: (1) the McGill University dataset, which is collected under realistic conditions; and (2) the Osaka University dataset with the largest number of subjects. Experimental results show that the proposed approach achieves competitive recognition accuracy over existing approaches and provides an effective parametric solution for identification among a large number of subjects by gait patterns.

  2. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things.

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-09-18

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified.

  3. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Directory of Open Access Journals (Sweden)

    Lusheng Wang

    2015-09-01

    Full Text Available With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI. In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG, forming a congestion game with ICI (CGI and a congestion game with capacity (CGC. For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE. Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell is profoundly revealed, and the collapse points are identified.

  4. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified. PMID:26393617

  5. Assessment of social cognition in non-human primates using a network of computerized automated learning device (ALDM) test systems.

    Science.gov (United States)

    Fagot, Joël; Marzouki, Yousri; Huguet, Pascal; Gullstrand, Julie; Claidière, Nicolas

    2015-05-05

    Fagot & Paleressompoulle(1) and Fagot & Bonte(2) have published an automated learning device (ALDM) for the study of cognitive abilities of monkeys maintained in semi-free ranging conditions. Data accumulated during the last five years have consistently demonstrated the efficiency of this protocol to investigate individual/physical cognition in monkeys, and have further shown that this procedure reduces stress level during animal testing(3). This paper demonstrates that networks of ALDM can also be used to investigate different facets of social cognition and in-group expressed behaviors in monkeys, and describes three illustrative protocols developed for that purpose. The first study demonstrates how ethological assessments of social behavior and computerized assessments of cognitive performance could be integrated to investigate the effects of socially exhibited moods on the cognitive performance of individuals. The second study shows that batteries of ALDM running in parallel can provide unique information on the influence of the presence of others on task performance. Finally, the last study shows that networks of ALDM test units can also be used to study issues related to social transmission and cultural evolution. Combined together, these three studies demonstrate clearly that ALDM testing is a highly promising experimental tool for bridging the gap in the animal literature between research on individual cognition and research on social cognition.

  6. Reducing Communication Overhead by Scheduling TCP Transfers on Mobile Devices using Wireless Network Performance Maps

    DEFF Research Database (Denmark)

    Højgaard-Hansen, Kim; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2012-01-01

    of such performance maps. We demonstrate how the framework can be used to reduce the retransmissions and to better utilise network resources when performing TCP-based file downloads in vehicular M2M communication scenarios. The approach works on top of a standard TCP stack hence has to map identified transmission...... intervals to predicted TCP data volumes. The file download optimisation is evaluated using extensive simulations comparing the TCP scheduling approach to a normal transfer. The performance map is generated by capturing round-trip time measurements and a threshold approach for the mean value for a given area...... potential for improvement in reducing the communication overhead compared with an ordinary TCP transfer....

  7. Exquisite textiles sensors and wireless sensor network device for home health care.

    Science.gov (United States)

    Huang, Wen-Tzeng; Chen, Chin-Hsing; Chang, Yuan-Jen; Chen, You-Yin; Huang, Jung-Lin; Yang, Chang Ming; Yang, Tzu Lin

    2008-01-01

    In this study, we propose a wearing system with four sensors, ECG (electrocardiogram), three-axis accelerometer, temperature, and tight-switch, applied for remote monitoring system in home-care. The sensors ECG, measured with wearable electrodes made of the steel textile to generate the real-time heart-rate estimator, tight-switch, made of the steel textile to check whether wearing person dresses properly, accelerometer, and temperature parameters are received via the ZigBee receiver within an exquisite belt. Since the movable textile electrodes will cause of unfixed contacts when the wearing person is in motion, making the heart-rate estimation much a sophisticated work, the tight-switch sensor and FIR (Filter Impulse Response) filter technology are applied here to get the more satisfiable heart-rate. The other two bio-sensors can detect the whether fall-down or not and normal body-temperature of this wearing person. Moreover, the ZigBee device with small size, low-power consumption, and high-reliability characteristics is designed to transmit the detected bio-information from these four sensors. Therefore, the vital system embedded with the capability of real-time heart-rate estimation and transmission makes it highly suitable for applications of remote healthcare and wellness.

  8. Network design optimization of fuel cell systems and distributed energy devices.

    Energy Technology Data Exchange (ETDEWEB)

    Colella, Whitney G.

    2010-07-01

    This research explores the thermodynamics, economics, and environmental impacts of innovative, stationary, polygenerative fuel cell systems (FCSs). Each main report section is split into four subsections. The first subsection, 'Potential Greenhouse Gas (GHG) Impact of Stationary FCSs,' quantifies the degree to which GHG emissions can be reduced at a U.S. regional level with the implementation of different FCS designs. The second subsection, 'Optimizing the Design of Combined Heat and Power (CHP) FCSs,' discusses energy network optimization models that evaluate novel strategies for operating CHP FCSs so as to minimize (1) electricity and heating costs for building owners and (2) emissions of the primary GHG - carbon dioxide (CO{sub 2}). The third subsection, 'Optimizing the Design of Combined Cooling, Heating, and Electric Power (CCHP) FCSs,' is similar to the second subsection but is expanded to include capturing FCS heat with absorptive cooling cycles to produce cooling energy. The fourth subsection, - Thermodynamic and Chemical Engineering Models of CCHP FCSs,' discusses the physics and thermodynamic limits of CCHP FCSs.

  9. The optimization based dynamic and cyclic working strategies for rechargeable wireless sensor networks with multiple base stations and wireless energy transfer devices.

    Science.gov (United States)

    Ding, Xu; Han, Jianghong; Shi, Lei

    2015-03-16

    In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating "bottleneck" sensor nodes is also developed in this paper.

  10. The Optimization Based Dynamic and Cyclic Working Strategies for Rechargeable Wireless Sensor Networks with Multiple Base Stations and Wireless Energy Transfer Devices

    Science.gov (United States)

    Ding, Xu; Han, Jianghong; Shi, Lei

    2015-01-01

    In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating “bottleneck” sensor nodes is also developed in this paper. PMID:25785305

  11. Producing 3D neuronal networks in hydrogels for living bionic device interfaces.

    Science.gov (United States)

    Aregueta-Robles, Ulises A; Lim, Khoon S; Martens, Penny J; Lovell, Nigel H; Poole-Warren, Laura A; Green, Rylie

    2015-01-01

    Hydrogels hold significant promise for supporting cell based therapies in the field of bioelectrodes. It has been proposed that tissue engineering principles can be used to improve the integration of neural interfacing electrodes. Degradable hydrogels based on poly (vinyl alcohol) functionalised with tyramine (PVA-Tyr) have been shown to support covalent incorporation of non-modified tyrosine rich proteins within synthetic hydrogels. PVA-Tyr crosslinked with such proteins, were explored as a scaffold for supporting development of neural tissue in a three dimensional (3D) environment. In this study a model neural cell line (PC12) and glial accessory cell line, Schwann cell (SC) were encapsulated in PVA-Tyr crosslinked with gelatin and sericin. Specifically, this study aimed to examine the growth and function of SC and PC12 co-cultures when translated from a two dimensional (2D) environment to a 3D environment. PC12 differentiation was successfully promoted in both 2D and 3D at 25 days post-culture. SC encapsulated as a single cell line and in co-culture were able to produce both laminin and collagen-IV which are required to support neuronal development. Neurite outgrowth in the 3D environment was confirmed by immunocytochemical staining. PVA-Tyr/sericin/gelatin hydrogel showed mechanical properties similar to nerve tissue elastic modulus. It is suggested that the mechanical properties of the PVA-Tyr hydrogels with native protein components are providing with a compliant substrate that can be used to support the survival and differentiation of neural networks.

  12. IEEE 802.15.4 MAC with GTS transmission for heterogeneous devices with application to wheelchair body-area sensor networks.

    Science.gov (United States)

    Shrestha, Bharat; Hossain, Ekram; Camorlinga, Sergio

    2011-09-01

    In wireless personal area networks, such as wireless body-area sensor networks, stations or devices have different bandwidth requirements and, thus, create heterogeneous traffics. For such networks, the IEEE 802.15.4 medium access control (MAC) can be used in the beacon-enabled mode, which supports guaranteed time slot (GTS) allocation for time-critical data transmissions. This paper presents a general discrete-time Markov chain model for the IEEE 802.15.4-based networks taking into account the slotted carrier sense multiple access with collision avoidance and GTS transmission phenomena together in the heterogeneous traffic scenario and under nonsaturated condition. For this purpose, the standard GTS allocation scheme is modified. For each non-identical device, the Markov model is solved and the average service time and the service utilization factor are analyzed in the non-saturated mode. The analysis is validated by simulations using network simulator version 2.33. Also, the model is enhanced with a wireless propagation model and the performance of the MAC is evaluated in a wheelchair body-area sensor network scenario.

  13. Heating-Rate-Triggered Carbon-Nanotube-based 3-Dimensional Conducting Networks for a Highly Sensitive Noncontact Sensing Device

    KAUST Repository

    Tai, Yanlong

    2016-01-28

    Recently, flexible and transparent conductive films (TCFs) are drawing more attention for their central role in future applications of flexible electronics. Here, we report the controllable fabrication of TCFs for moisture-sensing applications based on heating-rate-triggered, 3-dimensional porous conducting networks through drop casting lithography of single-walled carbon nanotube (SWCNT)/poly(3,4-ethylenedioxythiophene)-polystyrene sulfonate (PEDOT:PSS) ink. How ink formula and baking conditions influence the self-assembled microstructure of the TCFs is discussed. The sensor presents high-performance properties, including a reasonable sheet resistance (2.1 kohm/sq), a high visible-range transmittance (>69%, PET = 90%), and good stability when subjected to cyclic loading (>1000 cycles, better than indium tin oxide film) during processing, when formulation parameters are well optimized (weight ratio of SWCNT to PEDOT:PSS: 1:0.5, SWCNT concentration: 0.3 mg/ml, and heating rate: 36 °C/minute). Moreover, the benefits of these kinds of TCFs were verified through a fully transparent, highly sensitive, rapid response, noncontact moisture-sensing device (5 × 5 sensing pixels).

  14. A Comparative Survey of Adaptive Codec Solutions for VoIP over Multirate WLANs: A Capacity versus Quality Performance Trade-Off

    Directory of Open Access Journals (Sweden)

    Sfairopoulou A

    2011-01-01

    Full Text Available In multi-rate WLANs, users can suffer transmission rate changes due to the link adaptation mechanism. This results in a variable capacity channel, which is very hostile for VoIP and can cause serious quality of service (QoS degradation in all active calls. Various codec adaptation mechanisms have been proposed as a solution to this, as well as to solve congestion problems on WLAN environments. Here, these solutions are presented, categorized according to the adaptation policy and scenario they implement, and evaluated at call-level in terms of the resulting blocking and dropping probabilities, as well as the perceived voice quality. To define a common performance metric, a new index named VGoS-factor is presented, which, by combining these capacity and quality indicators, can provide an overall view of the capacity versus quality trade-off of the proposed mechanisms and consequently help in choosing the adequate policy for each scenario.

  15. Optimized tuning of contention window for IEEE 802.11 WLAN ...

    African Journals Online (AJOL)

    In wireless networks, the size of Contention Window (CW) plays a vital role as it changes the throughput and delay of the networks considerably. The proposed Collision Ratio based BackOff (CRBO) algorithm uses collision ratio to suggest CW updation after the successful and unsuccessful transmission events. This leads ...

  16. Optimized tuning of contention window for IEEE 802.11 WLAN

    African Journals Online (AJOL)

    Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, INDIA ... Abstract. In wireless networks, the size of Contention Window (CW) plays a vital role as it changes the throughput and delay of the networks ..... Applications, IEEE/ACS International Conference, AICCSA 2008, pp.

  17. Coexistence: Threat to the Performance of Heterogeneous Network

    Science.gov (United States)

    Sharma, Neetu; Kaur, Amanpreet

    2010-11-01

    Wireless technology is gaining broad acceptance as users opt for the freedom that only wireless network can provide. Well-accepted wireless communication technologies generally operate in frequency bands that are shared among several users, often using different RF schemes. This is true in particular for WiFi, Bluetooth, and more recently ZigBee. These all three operate in the unlicensed 2.4 GHz band, also known as ISM band, which has been key to the development of a competitive and innovative market for wireless embedded devices. But, as with any resource held in common, it is crucial that those technologies coexist peacefully to allow each user of the band to fulfill its communication goals. This has led to an increase in wireless devices intended for use in IEEE 802.11 wireless local area networks (WLANs) and wireless personal area networks (WPANs), both of which support operation in the crowded 2.4-GHz industrial, scientific and medical (ISM) band. Despite efforts made by standardization bodies to ensure smooth coexistence it may occur that communication technologies transmitting for instance at very different power levels interfere with each other. In particular, it has been pointed out that ZigBee could potentially experience interference from WiFi traffic given that while both protocols can transmit on the same channel, WiFi transmissions usually occur at much higher power level. In this work, we considered a heterogeneous network and analyzed the impact of coexistence between IEEE 802.15.4 and IEEE 802.11b. To evaluate the performance of this network, measurement and simulation study are conducted and developed in the QualNet Network simulator, version 5.0.Model is analyzed for different placement models or topologies such as Random. Grid & Uniform. Performance is analyzed on the basis of characteristics such as throughput, average jitter and average end to end delay. Here, the impact of varying different antenna gain & shadowing model for this

  18. Human movement activity classification approaches that use wearable sensors and mobile devices

    Science.gov (United States)

    Kaghyan, Sahak; Sarukhanyan, Hakob; Akopian, David

    2013-03-01

    Cell phones and other mobile devices become part of human culture and change activity and lifestyle patterns. Mobile phone technology continuously evolves and incorporates more and more sensors for enabling advanced applications. Latest generations of smart phones incorporate GPS and WLAN location finding modules, vision cameras, microphones, accelerometers, temperature sensors etc. The availability of these sensors in mass-market communication devices creates exciting new opportunities for data mining applications. Particularly healthcare applications exploiting build-in sensors are very promising. This paper reviews different approaches of human activity recognition.

  19. The CTTC 5G End-to-End Experimental Platform : Integrating Heterogeneous Wireless/Optical Networks, Distributed Cloud, and IoT Devices

    OpenAIRE

    Muñóz, Raul; Mangues-Bafalluy, Josep; Vilalta, Ricard; Verikoukis, Christos; Alonso-Zarate, Jesús; Bartzoudis, Nikolaos; Georgiadis, Apostolos; Payaró, Miquel; Pérez-Neira, Ana; Casellas, Ramon; Martínez, Ricardo; Núñez-Martínez, Jose; Manuel Requena Esteso, Manuel; Pubill, David; Font-Batch, Oriol

    2016-01-01

    The Internet of Things (IoT) will facilitate a wide variety of applications in different domains, such as smart cities, smart grids, industrial automation (Industry 4.0), smart driving, assistance of the elderly, and home automation. Billions of heterogeneous smart devices with different application requirements will be connected to the networks and will generate huge aggregated volumes of data that will be processed in distributed cloud infrastructures. On the other hand, there is also a gen...

  20. Adaptive Indoor Positioning Model Based on WLAN-Fingerprinting for Dynamic and Multi-Floor Environments.

    Science.gov (United States)

    Alshami, Iyad Husni; Ahmad, Noor Azurati; Sahibuddin, Shamsul; Firdaus, Firdaus

    2017-08-05

    The Global Positioning System demonstrates the significance of Location Based Services but it cannot be used indoors due to the lack of line of sight between satellites and receivers. Indoor Positioning Systems are needed to provide indoor Location Based Services. Wireless LAN fingerprints are one of the best choices for Indoor Positioning Systems because of their low cost, and high accuracy, however they have many drawbacks: creating radio maps is time consuming, the radio maps will become outdated with any environmental change, different mobile devices read the received signal strength (RSS) differently, and peoples' presence in LOS between access points and mobile device affects the RSS. This research proposes a new Adaptive Indoor Positioning System model (called DIPS) based on: a dynamic radio map generator, RSS certainty technique and peoples' presence effect integration for dynamic and multi-floor environments. Dynamic in our context refers to the effects of people and device heterogeneity. DIPS can achieve 98% and 92% positioning accuracy for floor and room positioning, and it achieves 1.2 m for point positioning error. RSS certainty enhanced the positioning accuracy for floor and room for different mobile devices by 11% and 9%. Then by considering the peoples' presence effect, the error is reduced by 0.2 m. In comparison with other works, DIPS achieves better positioning without extra devices.

  1. Adaptive Indoor Positioning Model Based on WLAN-Fingerprinting for Dynamic and Multi-Floor Environments

    Directory of Open Access Journals (Sweden)

    Iyad Husni Alshami

    2017-08-01

    Full Text Available The Global Positioning System demonstrates the significance of Location Based Services but it cannot be used indoors due to the lack of line of sight between satellites and receivers. Indoor Positioning Systems are needed to provide indoor Location Based Services. Wireless LAN fingerprints are one of the best choices for Indoor Positioning Systems because of their low cost, and high accuracy, however they have many drawbacks: creating radio maps is time consuming, the radio maps will become outdated with any environmental change, different mobile devices read the received signal strength (RSS differently, and peoples’ presence in LOS between access points and mobile device affects the RSS. This research proposes a new Adaptive Indoor Positioning System model (called DIPS based on: a dynamic radio map generator, RSS certainty technique and peoples’ presence effect integration for dynamic and multi-floor environments. Dynamic in our context refers to the effects of people and device heterogeneity. DIPS can achieve 98% and 92% positioning accuracy for floor and room positioning, and it achieves 1.2 m for point positioning error. RSS certainty enhanced the positioning accuracy for floor and room for different mobile devices by 11% and 9%. Then by considering the peoples’ presence effect, the error is reduced by 0.2 m. In comparison with other works, DIPS achieves better positioning without extra devices.

  2. FY1998 report on a survey related to joint utilization of welfare device development data using an international network; 1998 nendo kokusai network ni yoru fukushi kiki kaihatsu data no kyodo riyo ni kansuru chosa hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    A survey was made in relation with joint utilization of welfare device development data using an international network. Developing welfare devices requires data from ergonomic and medical systems, while the cope of the objects is wide, and the kinds are various. For proliferation of welfare devices, system compatibility evaluation including that on using environment is important, including living environments that are different by countries. The present survey has identified how data for aged, handicapped and help-needing persons are accumulated and utilized in research organizations in America and Europe for both of the ergonomic and medical areas. The survey also investigated major academic societies in overseas countries, and collected database and academic network information that support the advanced research and development. At the same time, investigations were also made on organizations and corporations who are moving forward the efficient data utilization. Welfare device and service information providing systems in Japan were investigated to compare them with the trends in other countries. Conceptions and methods were compiled to utilize data internationally and jointly. Database models for device development were considered, and a proposal was made on structuring a research and development supporting database, and the operation method thereof. (NEDO)

  3. Safety first! managing risks for a daisy chain of medical devices connected to the IT-network - first experiences applying IEC 80001-1.

    Science.gov (United States)

    Ahlbrandt, Janko; Röhrig, Rainer

    2013-01-01

    The best way to ensure patient safety is to eliminate errors. To avoid errors and resulting harm from medical devices, there are rules and laws in Germany to ensure a certain quality and process [1,2]. This does not cover scenarios where devices are connected to a data network, forming a medical IT network. Arising risks need to be addressed by operating organizations, such as hospitals. International standard IEC 80001-1 offers a process for this and defines roles and responsibilities [3]. The aim of our study was to assess the application of risk management for a small initial project. We studied a daisy chain of medical devices connected to the IT network. The number of involved proprietary protocols and interface-definitions complicates the risk management, if just for the number of involved manufacturers. Identified risks could all be addressed and did not block the setup's deployment. Risk management creates an extra effort, but can reduce harm and potential financial liabilities. We can recommend starting with small projects to familiarize with the process.

  4. Network analysis of semiconducting Zn1-xCdxS based photosensitive device using impedance spectroscopy and current-voltage measurement

    Science.gov (United States)

    Datta, Joydeep; Das, Mrinmay; Dey, Arka; Halder, Soumi; Sil, Sayantan; Ray, Partha Pratim

    2017-10-01

    ZnCdS is an intermediate ternary alloy type semiconducting material which has huge tunable structural, optical and electrical properties. Here, we have synthesized Zn1-xCdxS compound and characterized its structural, optical and charge transport properties. It is seen that the particle size is greatly influenced by the amount of alloy concentration of cadmium. The performance of semiconductor device such as Schottky diode depends mainly on the charge transportation through the metal-semiconductor junction. So, we have fabricated Al/Zn1-xCdxS/ITO device and investigated the bias dependent impedance properties through equivalent circuit network analysis to study the electron lifetime and interfacial region resistance. The result of network analysis indicates that the charge transportation through Al- Zn0.6Cd0.4S is better than the other fabricated devices. For further explanation, we have studied the capacitance-voltage (C-V) characteristic under dark and current-voltage (I-V) characteristic under dark and light. We have investigated barrier height, depletion layer width and employed SCLC (space charge limited current) theory in I-V characteristics to determine mobility, transit time and diffusion length. The mobility and diffusion length for Zn0.6Cd0.4S fabricated device are derived as 23.01 m2 V-1 s-1 and 4.4 μm respectively while both the values are less for the other devices. These values are enhanced upon illumination for all the devices but superiority comes from the Al/Zn0.6Cd0.4S/ITO device and it leads us to measure the photosensitivity, responsivity, specific detectivity. As expected, the photosensing parameters are enhanced for the Zn0.6Cd0.4S fabricated device. So, this literature not only explores the metal semiconductor charge transportation using impedance spectroscopy (IS) network analysis and SCLC theory but also explain it from the structural point of view.

  5. Energy-Efficient Source Authentication for Secure Group Communication with Low-Powered Smart Devices in Hybrid Wireless/Satellite Networks

    Directory of Open Access Journals (Sweden)

    Baras JohnS

    2011-01-01

    Full Text Available We describe a new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certificate. The certificate binds the identity of a wireless smart device to the anchor element of its key chain; keys from the chain are used for computing message authentication codes (MACs on messages sourced by the device. The authentication protocol requires a centralized infrastructure in the network: we describe the protocol in a hybrid wireless network with a satellite overlay interconnecting the wireless devices. The satellite is used as the Certificate Authority (CA and also acts as the proxy for the senders in disclosing the MAC keys to the receivers. We also design a probabilistic nonrepudiation mechanism that utilizes the satellite's role as the CA and sender proxy. Through analysis, we show that the authentication protocol is secure against malicious adversaries. We also present detailed simulation results that demonstrate that the proposed protocol is much cheaper than traditional public key-based authentication technologies for metrics like processing delay, storage requirements, and energy consumption of the smart devices.

  6. Novel Adaptive QoS Framework for Integrated UMTS/WLAN Environment

    Directory of Open Access Journals (Sweden)

    T. Shuminoski

    2013-06-01

    Full Text Available Since Quality of Service (QoS provisioning for multimedia traffic in integrated Wireless and Mobile Networks is becoming an increasingly important objective, in this paper we introduce a novel concept of an adaptive QoS cross-layer framework. The Adaptive QoS framework is proven via novel simulation results in integrated environment with UMTS and IEEE 802.11 networks. The aim of our novel framework is presenting a new module that shall provide the best QoS and lower cost for a given service using one or more wireless technologies in a given time. The analysis of simulation results has shown superior performances with a high level of QoS provisioning in a variety of network conditions. The performance of Adaptive QoS algorithm is evaluated using ns-miracle augmented with our dual-mode Mobile Equipments (MEs and using statistical analysis.

  7. The Dual-Band Bandpass Filters Using Doubly Parallel-Coupled SIRs with Multiple Zeros for WLAN Applications

    Science.gov (United States)

    Ho, Min-Hua; Ho, Hao-Hung; Rao, Chen-Mao

    Two dual-band bandpass filters (BPFs) based on the doubly parallel-coupled stepped impedance resonators (SIRs) structures have been proposed in this paper. The coupled-SIRs with/without open-stub-loads are introduced in the filter design. The dual-band filters exhibiting multiple zeros design operate at 2.45/5.2-GHz for the WLAN applications. Two three-staged filters composed of four SIRs have been proposed with the tapped-line adapted in the I/O sections. A five-staged filter is constructed based on the same design principle to achieve a better band-rejection. The proposed filters have the advantages of a much wider bandwidth in both the passbands without sacrificing the passband's insertion loss and passband flatness. The design procedure for a conventional parallel-coupled microstrip lines model is still suitable to design the proposed filters. The proposed filters have achieved almost twice the band-width of a conventional parallel-coupled lines configuration under the same design parameters. The experiments have been conducted to verify filter performance. Measured results are in good agreement with the full-wave simulation results.

  8. Performance of Wireless Networks in Highly Reflective Rooms with Variable Absorption

    Science.gov (United States)

    2014-09-01

    the-shelf CSMA/CA carrier sense multiple access with collision avoidance DFT discrete Fourier transform DS direct sequence EMI electromagnetic...interference FDM frequency division multiplexing FEC forward error correction FFT fast Fourier transform FH frequency hopping GO geometrical optics...universal serial bus VHT very high throughput VoIP voice over Internet Protocol WLAN wireless local area network WMAN wireless metropolitan area

  9. SSTL Based Low Power Thermal Efficient WLAN Specific 32bit ALU Design on 28nm FPGA

    DEFF Research Database (Denmark)

    Kalia, Kartik; Pandey, Bishwajeet; Das, Teerath

    2016-01-01

    In this paper we have designed a Thermal energy efficient 32Bit ALU for network processor, the main objective of this design is to provide better thermal efficiency with respect to existing designs. For that purpose we have used six different members of SSTL I/Os standards on 28nm technology alon...

  10. Scholastic Journalism Teacher Use of Digital Devices and Social Networking Tools in a Poor, Largely Rural State

    Science.gov (United States)

    Plopper, Bruce L.; Conaway, Anne Fleming

    2013-01-01

    Research showing adolescents' ever-increasing use of digital devices, combined with calls from governmental officials to incorporate more technology into classroom activities, prompted this survey of Arkansas scholastic journalism advisers. The goal was to determine how they used digital communication devices in their teaching. Results showed lack…

  11. Impact of high power interference sources in planning and deployment of wireless sensor networks and devices in the 2.4 GHz frequency band in heterogeneous environments.

    Science.gov (United States)

    Iturri, Peio López; Nazábal, Juan Antonio; Azpilicueta, Leire; Rodriguez, Pablo; Beruete, Miguel; Fernández-Valdivielso, Carlos; Falcone, Francisco

    2012-11-12

    In this work, the impact of radiofrequency radiation leakage from microwave ovens and its effect on 802.15.4 ZigBee-compliant wireless sensor networks operating in the 2.4 GHz Industrial Scientific Medical (ISM) band is analyzed. By means of a novel radioplanning approach, based on electromagnetic field simulation of a microwave oven and determination of equivalent radiation sources applied to an in-house developed 3D ray launching algorithm, estimation of the microwave oven’s power leakage is obtained for the complete volume of an indoor scenario. The magnitude and the variable nature of the interference is analyzed and the impact in the radio link quality in operating wireless sensors is estimated and compared with radio channel measurements as well as packet measurements. The measurement results reveal the importance of selecting an adequate 802.15.4 channel, as well as the Wireless Sensor Network deployment strategy within this type of environment, in order to optimize energy consumption and increase the overall network performance. The proposed method enables one to estimate potential interference effects in devices operating within the 2.4 GHz band in the complete scenario, prior to wireless sensor network deployment, which can aid in achieving the most optimal network topology.

  12. Impact of High Power Interference Sources in Planning and Deployment of Wireless Sensor Networks and Devices in the 2.4 GHz Frequency Band in Heterogeneous Environments

    Directory of Open Access Journals (Sweden)

    Francisco Falcone

    2012-11-01

    Full Text Available In this work, the impact of radiofrequency radiation leakage from microwave ovens and its effect on 802.15.4 ZigBee-compliant wireless sensor networks operating in the 2.4 GHz Industrial Scientific Medical (ISM band is analyzed. By means of a novel radioplanning approach, based on electromagnetic field simulation of a microwave oven and determination of equivalent radiation sources applied to an in-house developed 3D ray launching algorithm, estimation of the microwave oven’s power leakage is obtained for the complete volume of an indoor scenario. The magnitude and the variable nature of the interference is analyzed and the impact in the radio link quality in operating wireless sensors is estimated and compared with radio channel measurements as well as packet measurements. The measurement results reveal the importance of selecting an adequate 802.15.4 channel, as well as the Wireless Sensor Network deployment strategy within this type of environment, in order to optimize energy consumption and increase the overall network performance. The proposed method enables one to estimate potential interference effects in devices operating within the 2.4 GHz band in the complete scenario, prior to wireless sensor network deployment, which can aid in achieving the most optimal network topology.

  13. Real-time video streaming in mobile cloud over heterogeneous wireless networks

    Science.gov (United States)

    Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos

    2012-06-01

    Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets

  14. Desien, ConstruThe design, fabrication and evaluation of egg weighing device using capacitive sensor and neural networksction and Evaluation of Egg Weighing Device Using Capacitive Sensor and Neural Networks

    Directory of Open Access Journals (Sweden)

    S Khalili

    2015-09-01

    Full Text Available Introduction: Grading agricultural products always has a particular important position for submission to domestic and overseas markets. The grading causes more profitable product ranges and customer satisfaction. Grading treatment is carried out based on various parameters such as color, ripeness level, dimensions and weight. Product weight is one of the most effective parameters in grading operation. Egg weight is directly related to the smallness and coarseness of eggs. In egg grading, the largeness value is very important in marketing. This research aimed to design, fabricate and evaluate the egg weighing system based on its dielectric properties. Materials and Methods: To perform this research, the stages of work are divided into several sections including, design and construction of the hardware section, writing code for the software section to collect data, conducting nondestructive tests and data collection, analysis of obtained data using artificial intelligence, and giving the results of analysis for device calibration of the system as the software code. The large eggs as dielectric substances cause more increase in the capacity of the capacitive sensor. Furthermore, by derivation of a relation between capacity of capacitive sensor and egg weight, one can predict the weight of the sample. A prototype unit of weighing system was designed and fabricated. The designed unit was composed of a chassis, a voltage source, a sinusoidal signal generator, a voltage measurement unit, an AVR micro controller, a COM port, a capacitive sensor, and an LCD and a keyboard. Neural network technique was used for egg weight prediction. The designed net receives 16 voltage values at different frequencies as inputs and its output is the egg weight. In order to calibrate and evaluate the weighing unit, 150 fresh egg samples were provided on egg laying day from a local poultry farm. Experiments were divided into three groups. The experiments were carried out on

  15. Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks

    OpenAIRE

    Blerim Rexha; Gresa Shala; Valon Xhafa

    2018-01-01

    Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the promising biometrics-based user authentication mechanisms that has been widely available in this era of mobile computing. With a built-in camera capa...

  16. Distributed Fair Access Point Selection for Multi-Rate IEEE 802.11 WLANs

    Science.gov (United States)

    Gong, Huazhi; Nahm, Kitae; Kim, Jongwon

    In IEEE 802.11 networks, the access point (AP) selection based on the strongest signal strength often results in the extremely unfair bandwidth allocation among mobile users (MUs). In this paper, we propose a distributed AP selection algorithm to achieve a fair bandwidth allocation for MUs. The proposed algorithm gradually balances the AP loads based on max-min fairness for the available multiple bit rate choices in a distributed manner. We analyze the stability and overhead of the proposed algorithm, and show the improvement of the fairness via computer simulation.

  17. Sucrose-based fabrication of 3D-networked, cylindrical microfluidic channels for rapid prototyping of lab-on-a-chip and vaso-mimetic devices.

    Science.gov (United States)

    Lee, Jiwon; Paek, Jungwook; Kim, Jaeyoun

    2012-08-07

    We present a new fabrication scheme for 3D-networked, cylindrical microfluidic (MF) channels based on shaping, bonding, and assembly of sucrose fibers. It is a simple, cleanroom-free, and environment-friendly method, ideal for rapid prototyping of lab-on-a-chip devices. Despite its simplicity, it can realize complex 3D MF channel architectures such as cylindrical tapers, internal loops, end-to-side junctions, tapered junctions, and stenosis. The last two will be of special use for realizing vaso-mimetic MF structures. It also enables molding with polymers incompatible with high-temperature processing.

  18. Joint interference management and resource allocation for device-to-device (D2D) communications underlying downlink/uplink decoupled (DUDe) heterogeneous networks

    KAUST Repository

    Celik, Abdulkadir

    2017-07-31

    In this paper, resource allocation and co-tier/cross-tier interference management are investigated for D2D-enabled heterogeneous networks (HetNets) where tiers 1, 2, and 3 consist of macrocells, smallcells, and D2D pairs, respectively. We first propose a D2D-enabled fractional frequency reuse scheme for uplink (UL) HetNets where macrocell subregions are preassigned to different subbands (SBs) in order to mitigate the tier-1↔tier-1 interference. Nevertheless, cell-edge macrocell user equipments (MUEs) with high transmission powers still form dead-zones for nearby smallcell UEs (SUEs) and D2D UEs (DUEs). One of the simple but yet novel means of the dead-zone alleviation is associating the cell-edge MUEs with nearby smallcells, which is also known as downlink (DL)/UL decoupling (DUDe). Subject to quality of service (QoS) requirements and power constraints, we formulate a joint SB assignment and resource block (RB) allocation optimization as a mixed integer non-linear programming (MINLP) problem to maximize the D2D sum rate and minimize the co-tier/cross-tier interference. Based on tolerable interference limit, we propose a fast yet high-performance suboptimal solution to jointly assign available SBs and RBs to smallcells. A D2D mode selection and resource allocation framework is then developed for DUEs. As traditional DL/UL Coupled (DUCo) scheme generates significant interference proportional to cellular user density and user association bias factor, results obtained from the combination of proposed methods and developed algorithms reveal the potential of DUDe for co-tier/cross-tier interference mitigation which opens more room for spectrum reuse of DUEs.

  19. Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring

    Directory of Open Access Journals (Sweden)

    Salman Ali

    2015-03-01

    Full Text Available The synergy of computational and physical network components leading to the Internet of Things, Data and Services has been made feasible by the use of Cyber Physical Systems (CPSs. CPS engineering promises to impact system condition monitoring for a diverse range of fields from healthcare, manufacturing, and transportation to aerospace and warfare. CPS for environment monitoring applications completely transforms human-to-human, human-to-machine and machine-to-machine interactions with the use of Internet Cloud. A recent trend is to gain assistance from mergers between virtual networking and physical actuation to reliably perform all conventional and complex sensing and communication tasks. Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to leverage environment, strategic and economic benefits. In this paper, we evaluate the applications and technical requirements for seamlessly integrating CPS with sensor network plane from a reliability perspective and review the strategies for communicating information between remote monitoring sites and the widely deployed sensor nodes. Related challenges and issues in network architecture design and relevant protocols are also provided with classification. This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. Network parameters like node-discovery, node-mobility, data security, link connectivity, data aggregation, information knowledge discovery and quality of service provisioning have been reviewed.

  20. Network challenges for cyber physical systems with tiny wireless devices: a case study on reliable pipeline condition monitoring.

    Science.gov (United States)

    Ali, Salman; Qaisar, Saad Bin; Saeed, Husnain; Khan, Muhammad Farhan; Naeem, Muhammad; Anpalagan, Alagan

    2015-03-25

    The synergy of computational and physical network components leading to the Internet of Things, Data and Services has been made feasible by the use of Cyber Physical Systems (CPSs). CPS engineering promises to impact system condition monitoring for a diverse range of fields from healthcare, manufacturing, and transportation to aerospace and warfare. CPS for environment monitoring applications completely transforms human-to-human, human-to-machine and machine-to-machine interactions with the use of Internet Cloud. A recent trend is to gain assistance from mergers between virtual networking and physical actuation to reliably perform all conventional and complex sensing and communication tasks. Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to leverage environment, strategic and economic benefits. In this paper, we evaluate the applications and technical requirements for seamlessly integrating CPS with sensor network plane from a reliability perspective and review the strategies for communicating information between remote monitoring sites and the widely deployed sensor nodes. Related challenges and issues in network architecture design and relevant protocols are also provided with classification. This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. Network parameters like node-discovery, node-mobility, data security, link connectivity, data aggregation, information knowledge discovery and quality of service provisioning have been reviewed.

  1. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  2. 8.64-11.62 GHz CMOS VCO and divider in a zero-IF 802.11a/b/g WLAN and Bluetooth application

    Energy Technology Data Exchange (ETDEWEB)

    Sun Yu; Mei Niansong; Lu Bo; Huang Yumei; Hong Zhiliang, E-mail: yumeihuang@fudan.edu.c [ASIC and System State Key Laboratory, Fudan University, Shanghai 201203 (China)

    2010-10-15

    A fully integrated VCO and divider implemented in SMIC 0.13-{mu}m RFCMOS 1P8M technology with a 1.2 V supply voltage is presented. The frequency of the VCO is tuning from 8.64 to 11.62 GHz while the quadrature LO signals for 802.11a WLAN in 5.8 GHz band or for 802.11b/g WLAN and Bluetooth in 2.4 GHz band can be obtained by a frequency division by 2 or 4, respectively. A 6 bit switched capacitor array is applied for precise tuning of all necessary frequency bands. The testing results show that the VCO has a phase noise of-113 dBc - 1 MHz offset from the carrier of 5.5 GHz by dividing VCO output by two and the VCO core consumes 3.72 mW. The figure-of-merit for the tuning-range (FOM{sub T}) of the VCO is -192.6 dBc/Hz. (semiconductor integrated circuits)

  3. OFDM and MC-CDMA for broadband multi-user communications WLANs and broadcasting

    CERN Document Server

    2003-01-01

    "OFDM systems have experienced increased attention in recent years and have found applications in a number of diverse areas including telephone-line based ADSL links, digital audio and video broadcasting systems, and wireless local area networks. OFDM is being considered for the next-generation of wireless systems both with and without direct sequence spreading and the resultant spreading-based multi-carrier CDMA systems have numerous attractive properties. This volume provides the reader with a broad overview of the research on OFDM systems during their 40-year history. Part I commences with an easy to read conceptual, rather than mathematical, treatment of the basic design issues of OFDM systems. The discussions gradually deepen to include adaptive single and multi-user OFDM systems invoking adaptive turbo coding. Part II introduces the taxonomy of multi-carrier CDMA systems and deals with the design of their spreading codes and the objective of minimising their crest factors. This part also compares the be...

  4. Using internet enabled mobile devices and social networking technologies to promote exercise as an intervention for young first episode psychosis patients

    Directory of Open Access Journals (Sweden)

    Sun Pamela

    2011-05-01

    Full Text Available Abstract Background Young people with first episode psychosis are at an increased risk for a range of poor health outcomes. In contrast to the growing body of evidence that suggests that exercise therapy may benefit the physical and mental health of people diagnosed with schizophrenia, there are no studies to date that have sought to extend the use of exercise therapy among patients with first episode psychosis. The aim of the study is to test the feasibility and acceptability of an exercise program that will be delivered via internet enabled mobile devices and social networking technologies among young people with first episode psychosis. Methods/Design This study is a qualitative pilot study being conducted at Orygen Youth Health Research Centre in Melbourne, Australia. Participants are young people aged 15-24 who are receiving clinical care at a specialist first episode psychosis treatment centre. Participants will also comprise young people from the general population. The exercise intervention is a 9-week running program, designed to gradually build a person's level of fitness to be able to run 5 kilometres (3 miles towards the end of the program. The program will be delivered via an internet enabled mobile device. Participants will be asked to post messages about their running experiences on the social networking website, and will also be asked to attend three face-to-face interviews. Discussion This paper describes the development of a qualitative study to pilot a running program coupled with the use of internet enabled mobile devices among young people with first episode psychosis. If the program is found to be feasible and acceptable to patients, it is hoped that further rigorous evaluations will ultimately lead to the introduction of exercise therapy as part of an evidence-based, multidisciplinary approach in routine clinical care.

  5. Virtual reality interface devices in the reorganization of neural networks in the brain of patients with neurological diseases

    OpenAIRE

    Gatica-Rojas, Valeska; Méndez-Rebolledo, Guillermo

    2014-01-01

    Two key characteristics of all virtual reality applications are interaction and immersion. Systemic interaction is achieved through a variety of multisensory channels (hearing, sight, touch, and smell), permitting the user to interact with the virtual world in real time. Immersion is the degree to which a person can feel wrapped in the virtual world through a defined interface. Virtual reality interface devices such as the Nintendo® Wii and its peripheral nunchuks-balance board, head mounted ...

  6. Wireless Network Penetration Testing and Security Auditing

    Directory of Open Access Journals (Sweden)

    Wang Shao-Long

    2016-01-01

    Full Text Available IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory environment to conduct penetration tests to confirm whether our wireless network is hackable or not. WAIDPS is configured as auditing tool to view wireless attacks, such as WEP/WPA/WPA2 cracking, rouge access points, denial of service attack. WAIDPS is designed to detect wireless intrusion with additional features. Penetration testing and auditing will mitigate the risk and threatening to protect WALN.

  7. Functional connectivity and dynamics of cortical-thalamic networks co-cultured in a dual compartment device

    Science.gov (United States)

    Kanagasabapathi, Thirukumaran T.; Massobrio, Paolo; Barone, Rocco Andrea; Tedesco, Mariateresa; Martinoia, Sergio; Wadman, Wytse J.; Decré, Michel M. J.

    2012-06-01

    Co-cultures containing dissociated cortical and thalamic cells may provide a unique model for understanding the pathophysiology in the respective neuronal sub-circuitry. In addition, developing an in vitro dissociated co-culture model offers the possibility of studying the system without influence from other neuronal sub-populations. Here we demonstrate a dual compartment system coupled to microelectrode arrays (MEAs) for co-culturing and recording spontaneous activities from neuronal sub-populations. Propagation of electrical activities between cortical and thalamic regions and their interdependence in connectivity is verified by means of a cross-correlation algorithm. We found that burst events originate in the cortical region and drive the entire cortical-thalamic network bursting behavior while mutually weak thalamic connections play a relevant role in sustaining longer burst events in cortical cells. To support these experimental findings, a neuronal network model was developed and used to investigate the interplay between network dynamics and connectivity in the cortical-thalamic system.

  8. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weijia Wang

    2014-06-01

    Full Text Available Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an effcient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable effciency features of PairHand, but enjoys the provable security in the random oracle model.

  9. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Device Status Data

    Science.gov (United States)

    2015-09-01

    Configuration 3 4.1 Status Codes 4 4.2 Request Time 5 4.3 Hydra BLOb Metadata 6 5. Data Processing 6 5.1 Hydra Data Processing Framework 6 5.1.1...statements on any database table or select the entire table at a user-specified interval. Hydra records its data in binary large object ( BLOb ...files.5 The data are organized into cuts inside the BLOb files. Typically each cut represents one poll on the network. 4. Hydra Configuration Hydra

  10. Self-organizing intelligent network of smart electrical heating devices as an alternative to traditional ways of heating

    Science.gov (United States)

    Zaslavsky, Aleksander M.; Tkachov, Viktor V.; Protsenko, Stanislav M.; Bublikov, Andrii V.; Suleimenov, Batyrbek; Orshubekov, Nurbek; Gromaszek, Konrad

    2017-08-01

    The paper considers the problem of automated decentralized distribution of the electric energy among unlimited-power electric heaters providing the given temperature distribution within the zones of monitored object heating in the context of maximum use of electric power which limiting level is time-dependent randomly. Principles of collective selforganization automata for solving the problem are analyzed. It has been shown that after all the automata make decision, equilibrium of Nash type is attained when unused power within the electric network is not more than a power of any non-energized electric heater.

  11. Multi-objective optimization framework to obtain model-based guidelines for tuning biological synthetic devices: an adaptive network case.

    Science.gov (United States)

    Boada, Yadira; Reynoso-Meza, Gilberto; Picó, Jesús; Vignoni, Alejandro

    2016-03-11

    Model based design plays a fundamental role in synthetic biology. Exploiting modularity, i.e. using biological parts and interconnecting them to build new and more complex biological circuits is one of the key issues. In this context, mathematical models have been used to generate predictions of the behavior of the designed device. Designers not only want the ability to predict the circuit behavior once all its components have been determined, but also to help on the design and selection of its biological parts, i.e. to provide guidelines for the experimental implementation. This is tantamount to obtaining proper values of the model parameters, for the circuit behavior results from the interplay between model structure and parameters tuning. However, determining crisp values for parameters of the involved parts is not a realistic approach. Uncertainty is ubiquitous to biology, and the characterization of biological parts is not exempt from it. Moreover, the desired dynamical behavior for the designed circuit usually results from a trade-off among several goals to be optimized. We propose the use of a multi-objective optimization tuning framework to get a model-based set of guidelines for the selection of the kinetic parameters required to build a biological device with desired behavior. The design criteria are encoded in the formulation of the objectives and optimization problem itself. As a result, on the one hand the designer obtains qualitative regions/intervals of values of the circuit parameters giving rise to the predefined circuit behavior; on the other hand, he obtains useful information for its guidance in the implementation process. These parameters are chosen so that they can effectively be tuned at the wet-lab, i.e. they are effective biological tuning knobs. To show the proposed approach, the methodology is applied to the design of a well known biological circuit: a genetic incoherent feed-forward circuit showing adaptive behavior. The proposed multi

  12. A reinforcement sensor embedded vertical handoff controller for vehicular heterogeneous wireless networks.

    Science.gov (United States)

    Li, Limin; Xu, Yubin; Soong, Boon-Hee; Ma, Lin

    2013-11-04

    Vehicular communication platforms that provide real-time access to wireless networks have drawn more and more attention in recent years. IEEE 802.11p is the main radio access technology that supports communication for high mobility terminals, however, due to its limited coverage, IEEE 802.11p is usually deployed by coupling with cellular networks to achieve seamless mobility. In a heterogeneous cellular/802.11p network, vehicular communication is characterized by its short time span in association with a wireless local area network (WLAN). Moreover, for the media access control (MAC) scheme used for WLAN, the network throughput dramatically decreases with increasing user quantity. In response to these compelling problems, we propose a reinforcement sensor (RFS) embedded vertical handoff control strategy to support mobility management. The RFS has online learning capability and can provide optimal handoff decisions in an adaptive fashion without prior knowledge. The algorithm integrates considerations including vehicular mobility, traffic load, handoff latency, and network status. Simulation results verify that the proposed algorithm can adaptively adjust the handoff strategy, allowing users to stay connected to the best network. Furthermore, the algorithm can ensure that RSUs are adequate, thereby guaranteeing a high quality user experience.

  13. A Reinforcement Sensor Embedded Vertical Handoff Controller for Vehicular Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Lin Ma

    2013-11-01

    Full Text Available Vehicular communication platforms that provide real-time access to wireless networks have drawn more and more attention in recent years. IEEE 802.11p is the main radio access technology that supports communication for high mobility terminals, however, due to its limited coverage, IEEE 802.11p is usually deployed by coupling with cellular networks to achieve seamless mobility. In a heterogeneous cellular/802.11p network, vehicular communication is characterized by its short time span in association with a wireless local area network (WLAN. Moreover, for the media access control (MAC scheme used for WLAN, the network throughput dramatically decreases with increasing user quantity. In response to these compelling problems, we propose a reinforcement sensor (RFS embedded vertical handoff control strategy to support mobility management. The RFS has online learning capability and can provide optimal handoff decisions in an adaptive fashion without prior knowledge. The algorithm integrates considerations including vehicular mobility, traffic load, handoff latency, and network status. Simulation results verify that the proposed algorithm can adaptively adjust the handoff strategy, allowing users to stay connected to the best network. Furthermore, the algorithm can ensure that RSUs are adequate, thereby guaranteeing a high quality user experience.

  14. A Network Selection Algorithm Considering Power Consumption in Hybrid Wireless Networks

    Science.gov (United States)

    Joe, Inwhee; Kim, Won-Tae; Hong, Seokjoon

    In this paper, we propose a novel network selection algorithm considering power consumption in hybrid wireless networks for vertical handover. CDMA, WiBro, WLAN networks are candidate networks for this selection algorithm. This algorithm is composed of the power consumption prediction algorithm and the final network selection algorithm. The power consumption prediction algorithm estimates the expected lifetime of the mobile station based on the current battery level, traffic class and power consumption for each network interface card of the mobile station. If the expected lifetime of the mobile station in a certain network is not long enough compared the handover delay, this particular network will be removed from the candidate network list, thereby preventing unnecessary handovers in the preprocessing procedure. On the other hand, the final network selection algorithm consists of AHP (Analytic Hierarchical Process) and GRA (Grey Relational Analysis). The global factors of the network selection structure are QoS, cost and lifetime. If user preference is lifetime, our selection algorithm selects the network that offers longest service duration due to low power consumption. Also, we conduct some simulations using the OPNET simulation tool. The simulation results show that the proposed algorithm provides longer lifetime in the hybrid wireless network environment.

  15. Optimization of a polymer composite employing molecular mechanic simulations and artificial neural networks for a novel intravaginal bioadhesive drug delivery device.

    Science.gov (United States)

    Ndesendo, Valence M K; Pillay, Viness; Choonara, Yahya E; du Toit, Lisa C; Kumar, Pradeep; Buchmann, Eckhart; Meyer, Leith C R; Khan, Riaz A

    2012-01-01

    This study aimed at elucidating an optimal synergistic polymer composite for achieving a desirable molecular bioadhesivity and Matrix Erosion of a bioactive-loaded Intravaginal Bioadhesive Polymeric Device (IBPD) employing Molecular Mechanic Simulations and Artificial Neural Networks (ANN). Fifteen lead caplet-shaped devices were formulated by direct compression with the model bioactives zidovudine and polystyrene sulfonate. The Matrix Erosion was analyzed in simulated vaginal fluid to assess the critical integrity. Blueprinting the molecular mechanics of bioadhesion between vaginal epithelial glycoprotein (EGP), mucin (MUC) and the IBPD were performed on HyperChem 8.0.8 software (MM+ and AMBER force fields) for the quantification and characterization of correlative molecular interactions during molecular bioadhesion. Results proved that the IBPD bioadhesivity was pivoted on the conformation, orientation, and poly(acrylic acid) (PAA) composition that interacted with EGP and MUC present on the vaginal epithelium due to heterogeneous surface residue distributions (free energy= -46.33 kcalmol(-1)). ANN sensitivity testing as a connectionist model enabled strategic polymer selection for developing an IBPD with an optimally prolonged Matrix Erosion and superior molecular bioadhesivity (ME = 1.21-7.68%; BHN = 2.687-4.981 N/mm(2)). Molecular modeling aptly supported the EGP-MUC-PAA molecular interaction at the vaginal epithelium confirming the role of PAA in bioadhesion of the IBPD once inserted into the posterior fornix of the vagina.

  16. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  17. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Luis Parrilla

    2018-01-01

    Full Text Available Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  18. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.

    Science.gov (United States)

    Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P

    2018-01-16

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  19. Subjective Evaluation of Packet Service Performance in UMTS and Heterogeneous Networks

    DEFF Research Database (Denmark)

    Teyeb, Oumer Mohammed; Sørensen, Troels Bundgaard; Mogensen, Preben

    2006-01-01

    Quality of Service (QoS) in mobile telecommunication systems is usually identified by some basic performance metrics such as delay, throughput and jitter. However, the main impact of service quality is on the end user, and as such a detailed study of service performance should involve the end user....... In this paper, such an approach is taken where subjective performance evaluation is undertaken for web browsing and video streaming services in Universal Mobile Telecommunication System (UMTS) and a heterogeneous network comprised of UMTS and Wireless LAN (WLAN). Using a real-time network emulation testbed...

  20. Network coding and evolutionary theory for performance enhancement in wireless cooperative clusters

    DEFF Research Database (Denmark)

    Militano, Leonardo; Fitzek, Frank; Iera, Antonio

    2010-01-01

    , portions of a file to be successively exchanged among all cluster members over wireless local area network (WLAN) links. Besides showing the beneficial effects of cooperation, this paper also focuses on the performance enhancement that can be achieved when using the network coding paradigm, whose...... are investigated and an ad hoc conceived Genetic Algorithm (GA) designed. Either the service time (the time needed for all nodes to receive the complete file) or the energy consumption for the nodes is used as objective function, showing in both cases the fast convergence for the algorithm that makes it preferable...

  1. Location tracking forensics on mobile devices

    Science.gov (United States)

    Sack, Stefan; Kröger, Knut; Creutzburg, Reiner

    2013-03-01

    The spread of navigation devices has increased significantly over the last 10 years. With the help of the current development of even smaller navigation receiver units it is to navigate with almost any current smart phone. Modern navigation systems are no longer limited to satellite navigation, but use current techniques, e.g. WLAN localization. Due to the increased use of navigation devices their relevance to forensic investigations has risen rapidly. Because navigation, for example with navigation equipment and smartphones, have become common place these days, also the amount of saved navigation data has risen rapidly. All of these developments lead to a necessary forensic analysis of these devices. However, there are very few current procedures for investigating of navigation devices. Navigation data is forensically interesting because by the position of the devices in most cases the location and the traveled path of the owner can be reconstructed. In this work practices for forensic analysis of navigation devices are developed. Different devices will be analyzed and it is attempted, by means of forensic procedures to restore the traveled path of the mobile device. For analysis of the various devices different software and hardware is used. There will be presented common procedures for securing and testing of mobile devices. Further there will be represented the specials in the investigation of each device. The different classes considered are GPS handhelds, mobile navigation devices and smartphones. It will be attempted, wherever possible, to read all data of the device. The aim is to restore complete histories of the navigation data and to forensically study and analyze these data. This is realized by the usage of current forensic software e.g. TomTology or Oxygen Forensic Suite. It is also attempted to use free software whenever possible. Further alternative methods are used (e.g. rooting) to access locked data of the unit. To limit the practical work the

  2. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership

    Directory of Open Access Journals (Sweden)

    Drew P. Cingel

    2014-06-01

    Full Text Available Given adolescents' heavy social media use, this study examined a number of predictors of adolescent social media use, as well as predictors of online communication practices. Using data collected from a national sample of 467 adolescents between the ages of 13 and 17, results indicate that demographics, technology access, and technology ownership are related to social media use and communication practices. Specifically, females log onto and use more constructive com-munication practices on Facebook compared to males. Additionally, adolescents who own smartphones engage in more constructive online communication practices than those who share regular cell phones or those who do not have access to a cell phone. Overall, results imply that ownership of mobile technologies, such as smartphones and iPads, may be more predictive of social networking site use and online communication practices than general ownership of technology.

  3. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership

    Directory of Open Access Journals (Sweden)

    Drew P. Cingel

    2014-01-01

    Full Text Available Given adolescents' heavy social media use, this study examined a number of predictors of adolescent social media use, as well as predictors of online communication practices. Using data collected from a national sample of 467 adolescents between the ages of 13 and 17, results indicate that demographics, technology access, and technology ownership are related to social media use and communication practices. Specifically, females log onto and use more constructive communication practices on Facebook compared to males. Additionally, adolescents who own smartphones engage in more constructive online communication practices than those who share regular cell phones or those who do not have access to a cell phone. Overall, results imply that ownership of mobile technologies, such as smartphones and iPads, may be more predictive of social networking site use and online communication practices than general ownership of technology.

  4. WLAN-salausavainten purku

    OpenAIRE

    Rikström, Jani

    2011-01-01

    Tässä opinnäytetyössä selvitetään langattomien lähiverkkoon tarjottavien suojausmenetelmien turvallisuutta ja langattoman lähiverkon tietoturvaa. Lisäksi selvitetään myös, miten eri käyttöjärjestelmät vaikuttavat salaukseen. Tutkimusympäristö rakennettiin 802.11g-standardin ympärille, koska tutkimuksessa käytetyt langattomat laitteet tukevat kyseistä standardia. Tutkimuksissa käytettiin ensisijaisesti Linux-käyttöjärjestelmää, johon asennettiin aircrack-ng-ohjelma salausavaimien selvittäm...

  5. The impact of an online social network with wireless monitoring devices on physical activity and weight loss.

    Science.gov (United States)

    Greene, Jessica; Sacks, Rebecca; Piniewski, Brigitte; Kil, David; Hahn, Jin S

    2013-07-01

    Online social networks (OSNs) are a new, promising approach for catalyzing health-related behavior change. To date, the empirical evidence on their impact has been limited. Using a randomized trial, we assessed the impact of a health-oriented OSN with accelerometer and scales on participant's physical activity, weight, and clinical indicators. A sample of 349 PeaceHealth Oregon employees and family members were randomized to the iWell OSN or a control group and followed for 6 months in 2010-2011. The iWell OSN enabled participants to connect with "friends," make public postings, view contacts' postings, set goals, download the number of their steps from an accelerometer and their weight from a scale, view trends in physical activity and weight, and compete against others in physical activity. Both control and intervention participants received traditional education material on diet and physical activity. Laboratory data on weight and clinical indicators (triglycerides, high-density lipoprotein, or low-density lipoprotein), and self-reported data on physical activity, were collected at baseline, 3 months, and 6 months. At 6 months, the intervention group increased leisure walking minutes by 164% compared with 47% in the control group. The intervention group also lost more weight than the controls (5.2 pounds compared with 1.5 pounds). There were no observed significant differences in vigorous exercise or clinical indicators between the 2 groups. Among intervention participants, greater OSN use, as measured by number of private messages sent, was associated with a greater increase in leisure walking and greater weight reduction over the study period. The study provides evidence that interventions using OSNs can successfully promote increases in physical activity and weight loss.

  6. A comparison of surgical outcomes and complications between hemostatic devices for thyroid surgery: a network meta-analysis.

    Science.gov (United States)

    Luo, Yingwei; Li, Xi; Dong, Jianwei; Sun, Weifeng

    2017-03-01

    This meta-analysis compared harmonic scalpel and LigaSure® systems with the conventional clamp-and-tie technique in thyroidectomy. Medline, Cochrane, EMBASE, and Google Scholar databases were searched until December 30, 2015. Randomized controlled studies (RCTs) or two-arm prospective studies were included. The primary outcome was operation time. The data were evaluated both by pair-wise meta-analyses and network meta-analysis within a Bayesian framework using Markov chain Monte Carlo methods. Compared with the conventional hemostasis, there was a significant reduction in operation time with harmonic scalpel (HS) and LigaSure (LS) (difference in means = -24.27 min, 95 % CI -28.11 to -20.44 min, P meta-analysis also found harmonic scalpel and LigaSure to have less operation time than the conventional hemostasis, and that harmonic scalpel was associated with a significant 9.78 min reduction in operation time than LigaSure which was not seen in pair-wise comparison. Harmonic scalpel had significantly less risk of definitive recurrent laryngeal nerve palsy, intra-operation blood loss, and post-operation bleeding than the conventional hemostasis. LigaSure was associated with significantly less intra-operative blood loss than the conventional hemostasis (P = 0.023). There was no significant difference among three different procedures in rates of transient recurrent laryngeal nerve palsy. This study found that harmonic scalpel and LigaSure decreased operation time compared with the conventional hemostasis and that harmonic scalpels was associated with the lowest operation time.

  7. A Unified NET-MAC-PHY Cross-layer Framework for Performance Evaluation of Multi-hop Ad hoc WLANs

    Directory of Open Access Journals (Sweden)

    Rachid El-Azouzi

    2014-09-01

    Full Text Available Most of the existing works have been evaluated the performance of 802.11 multihop networks by considering the MAC layer or network layer separately. Knowing the nature of the multi-hop ad hoc networks, many factors in different layers are crucial for study the performance of MANET. In this paper we present a new analytic model for evaluating average end-to-end throughput in IEEE 802.11e multihop wireless networks. In particular, we investigate an intricate interaction among PHY, MAC and Network layers. For instance, we incorporate carrier sense threshold, transmission power, contention window size, retransmissions retry limit, multi rates, routing protocols and network topology together. We build a general cross-layered framework to represent multi-hop ad hoc networks with asymmetric topology and asymmetric traffic. We develop an analytical model to predict throughput of each connection as well as stability of forwarding queues at intermediate nodes in saturated networks. To the best of our knowledge, it seems that our work is the first wherein general topology and asymmetric parameters setup are considered in PHY/MAC/Network layers. Performance of such a system is also evaluated through simulation. We show that performance measures of the MAC layer are affected by the traffic intensity of flows to be forwarded. More precisely, attempt rate and collision probability are dependent on traffic flows, topology and routing.

  8. Computer networks monitoring

    OpenAIRE

    Antončič , Polona

    2012-01-01

    The present thesis entitled Computer Networks Monitoring introduces the basics of computer networks, the aim and the computer data reclamation from networking devices, software for the system follow-up together with the case of monitoring a real network with tens of network devices. The networks represent an important part in the modern information technology and serve for the exchange of data and sources which makes their impeccability of crucial importance. Correct and efficient sys...

  9. Electronic devices and circuits

    CERN Document Server

    Pridham, Gordon John

    1972-01-01

    Electronic Devices and Circuits, Volume 3 provides a comprehensive account on electronic devices and circuits and includes introductory network theory and physics. The physics of semiconductor devices is described, along with field effect transistors, small-signal equivalent circuits of bipolar transistors, and integrated circuits. Linear and non-linear circuits as well as logic circuits are also considered. This volume is comprised of 12 chapters and begins with an analysis of the use of Laplace transforms for analysis of filter networks, followed by a discussion on the physical properties of

  10. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  11. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  12. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  13. Adaptive threshold determination for efficient channel sensing in cognitive radio network using mobile sensors

    Science.gov (United States)

    Morshed, M. N.; Khatun, S.; Kamarudin, L. M.; Aljunid, S. A.; Ahmad, R. B.; Zakaria, A.; Fakir, M. M.

    2017-03-01

    Spectrum saturation problem is a major issue in wireless communication systems all over the world. Huge number of users is joining each day to the existing fixed band frequency but the bandwidth is not increasing. These requirements demand for efficient and intelligent use of spectrum. To solve this issue, the Cognitive Radio (CR) is the best choice. Spectrum sensing of a wireless heterogeneous network is a fundamental issue to detect the presence of primary users' signals in CR networks. In order to protect primary users (PUs) from harmful interference, the spectrum sensing scheme is required to perform well even in low signal-to-noise ratio (SNR) environments. Meanwhile, the sensing period is usually required to be short enough so that secondary (unlicensed) users (SUs) can fully utilize the available spectrum. CR networks can be designed to manage the radio spectrum more efficiently by utilizing the spectrum holes in primary user's licensed frequency bands. In this paper, we have proposed an adaptive threshold detection method to detect presence of PU signal using free space path loss (FSPL) model in 2.4 GHz WLAN network. The model is designed for mobile sensors embedded in smartphones. The mobile sensors acts as SU while the existing WLAN network (channels) works as PU. The theoretical results show that the desired threshold range detection of mobile sensors mainly depends on the noise floor level of the location in consideration.

  14. SBA Network Components & Software Inventory

    Data.gov (United States)

    Small Business Administration — SBA’s Network Components & Software Inventory contains a complete inventory of all devices connected to SBA’s network including workstations, servers, routers,...

  15. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  16. Inkjet-Printed Wideband Antenna on Resin-Coated Paper Substrate for Curved Wireless Devices

    KAUST Repository

    Abutarboush, Hattan

    2015-04-28

    A low-cost, inkjet-printed multiband monopole antenna for conformal wireless applications is presented for the first time. The antenna is implemented on a low cost resin coated paper substrate which can be used for conformal devices. The antenna developed here is composed of four branch lines on the radiator and three L-shaped slots on the ground plane that help to generate multiple bands without increasing the size of the antenna. The antenna has a compact size, making it suitable for handheld and wearable wireless devices. Details of the inkjet printing fabrication processes and related issues are presented. The antennas were characterized under flat and bent conditions and the results indicate that the antennas can cover most bands for mobile and wireless applications such as PCS, UMTS, GSM1900 and WLAN

  17. A New Mechanism for Network Monitoring and Shielding in Wireless LAN

    Directory of Open Access Journals (Sweden)

    Jiujun Cheng

    2014-01-01

    Full Text Available Wireless LAN (WLAN technology is developing rapidly with the help of wireless communication technology and social demand. During the development of WLAN, the security is more and more important, and wireless monitoring and shielding are of prime importance for network security. In this paper, we have explored various security issues of IEEE 802.11 based wireless network and analyzed numerous problems in implementing the wireless monitoring and shielding system. We identify the challenges which monitoring and shielding system needs to be aware of, and then provide a feasible mechanism to avoid those challenges. We implemented an actual wireless LAN monitoring and shielding system on Maemo operating system to monitor wireless network data stream efficiently and solve the security problems of mobile users. More importantly, the system analyzes wireless network protocols efficiently and flexibly, reveals rich information of the IEEE 802.11 protocol such as traffic distribution and different IP connections, and graphically displays later. Moreover, the system running results show that the system has the capability to work stably, and accurately and analyze the wireless protocols efficiently.

  18. Design and Noise Optimization of RF Low Noise Amplifier for IEEE Standard 802.11A WLAN

    OpenAIRE

    Munish Kumar; Ravinder Kumar; Viranjay M. Srivastava

    2012-01-01

    Low noise amplifier is the front end block of radio-frequency receiver system. Its design required various characteristics such as power gain, noise figure, insertion losses and power consumption. In this paper we have proposed a single stage low noise amplifier design with high gain and low noise using inductive source degeneration topology for frequency range of 3 GHz to 7 GHz and also use the active biasing devices. A range of devices like inductors and capacitors are used to achieve 50 Ω ...

  19. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off-the-shelf ha......Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off...

  20. A Dual-Band Multiple Input Multiple Output Frequency Agile Antenna for GPSL1/Wi-Fi/WLAN2400/LTE Applications

    Directory of Open Access Journals (Sweden)

    Sajid Aqeel

    2016-01-01

    Full Text Available A novel dual-band, single element multiple input multiple output (MIMO dielectric resonator antenna (DRA with a modest frequency tuning ability is presented in this communication. The proposed antenna operates at GPS L1/Bluetooth/Wi-Fi/LTE2500/WLAN2400 frequency bands. A single dielectric resonator element is fed by two coaxial probes to excite the orthogonal modes. A couple of slots are introduced on the ground plane to improve the isolation between antenna ports. The slots also serve the purpose of reconfiguration in the lower band on placement of switches at optimized locations. The measured impedance bandwidth is 5.16% (1.41–1.49 GHz in the lower band and 26% (2.2–2.85 GHz in the higher band. The lower band reconfigures with an impedance bandwidth of 6.5% (1.55–1.65 GHz when PIN diodes are switched ON. The gain, efficiency, correlation coefficient, and diversity gain of the MIMO DRA are presented with a close agreement between simulated and measured results.

  1. A Triple-band Bandpass Filter using Tri-section Step-impedance and Capacitively Loaded Step-impedance Resonators for GSM, WiMAX, and WLAN systems

    Science.gov (United States)

    Chomtong, P.; Akkaraekthalin, P.

    2014-05-01

    This paper presents a triple-band bandpass filter for applications of GSM, WiMAX, and WLAN systems. The proposed filter comprises of the tri-section step-impedance and capacitively loaded step-impedance resonators, which are combined using the cross coupling technique. Additionally, tapered lines are used to connect at both ports of the filter in order to enhance matching for the tri-band resonant frequencies. The filter can operate at the resonant frequencies of 1.8 GHz, 3.7 GHz, and 5.5 GHz. At resonant frequencies, the measured values of S11 are -17.2 dB, -33.6 dB, and -17.9 dB, while the measured values of S21 are -2.23 dB, -2.98 dB, and -3.31 dB, respectively. Moreover, the presented filter has compact size compared with the conventional open-loop cross coupling triple band bandpass filters

  2. Análisis de seguridad de una muestra de redes WLAN en la ciudad de Tunja, Boyacá, Colombia

    Directory of Open Access Journals (Sweden)

    Julián Alberto Monsalve-Pulido

    2015-01-01

    Full Text Available Éste documento presenta resultados de un aná lisis de seguridad de redes WLAN en la ciudad de Tunja Boyacá Colombia basado en un a muestra aleatoria distribuida en toda la Ciudad. El estudio es resultado de investigación del proyecto “Diagnóstico de segurida d informática aplicado a una muestra de organizac iones de la ciudad de Tunja” financiado por la Universidad Santo Tomás Seccional Tunja. La información recolectada y analizada se obtuvo mediante las técnicas Wa rchalking y Wardriving en una representación significativa de redes inalámbricas de empre sas públicas, privadas, entidades educativas y hogares ubicados geográficamente en diferentes sectores de la ciudad. Como re sultado de la investigación se demostró di ferentes niveles de riesgo con respecto a configuraciones de tecnología de algunos dispos itivos de entidades públicas, privadas y sectores residenciales, por último se r ealizaron algunas recomendaciones y conclusiones que mej orarán el nivel de seguridad por medio de buenas prácticas a nivel de configuraci ón y uso de estas redes.

  3. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  4. Kommunikation von Risiken und Unsicherheiten der Strahlung kabelloser Netzwerke : Ergebnisse eines Gruppendelphis zur Risikokommunikation im Rahmen des EU Projektes "Sound exposure and risk assessment of wireless network devices" (SEAWIND)

    OpenAIRE

    Hilpert, Jörg; Kuhn, Rainer; Schetula, Viola; RENN Ortwin

    2013-01-01

    In dem dreijährigen EU-Projekt "Sound Exposure and Risk Assessment of Wireless Network Devices" (SEAWIND) (FP71ENV1200911) wurden die möglichen gesundheitsschädigenden Auswirkungen durch die Nutzung drahtloser Kommunikationstechnologien (z.B. GSM, UMTS, LTE, WiFi, WiMAX, RFID) - interdisziplinär erforscht. Das Projekt gliederte sich in drei Themenschwerpunkte: Mit Hilfe modernster Technologien und Messverfahren sollte die Strahlenexposition ermittelt werden (Kurzzeit- sowie Langzeitexpositio...

  5. Resource management for multimedia services in high data rate wireless networks

    CERN Document Server

    Zhang, Ruonan; Pan, Jianping

    2017-01-01

    This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

  6. Communications for Wearable Devices

    OpenAIRE

    Tabibu, Shivram

    2017-01-01

    Wearable devices are transforming computing and the human-computer interaction and they are a primary means for motion recognition of reflexive systems. We review basic wearable deployments and their open wireless communications. An algorithm that uses accelerometer data to provide a control and communication signal is described. Challenges in the further deployment of wearable device in the field of body area network and biometric verification are discussed.

  7. Radiofrequency Field Distribution Assessment in Indoor Areas Covered by Wireless Local Area Network

    Directory of Open Access Journals (Sweden)

    HELBET, R.

    2009-02-01

    Full Text Available Electromagnetic environment becomes day by day more congested. Radio communication systems in the short range are now part of everyday life, and there is a need to also assess the pollution level due to their emission if we take into account human health and protection. There is consistent scientific evidence that environmental electromagnetic field may cause undesirable biological effects or even health hazards. Present paper aims at giving a view on exposure level due to wireless local area networks (WLAN emission solely, as part of environmental radiofrequency pollution. Highly accurate measurements were made indoor by using a frequency-selective measurement system and identifying the correct settings for an error-minimum assessment. We focused on analysis of the electric flux density distribution inside a room, in the far field of the emitting antennas, in case of a single network communication channel. We analyze the influence the network configuration parameters have on the field level. Distance from the source and traffic rate are also important parameters that affect the exposure level. Our measurements indicate that in the immediate vicinity of the WLAN stations the average field may reach as much as 13% from the present accepted reference levels given in the human exposure standards.

  8. Mobile device security for dummies

    CERN Document Server

    Campagna, Rich; Krishnan, Ashwin

    2011-01-01

    The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati

  9. Fundamentals of semiconductor devices

    CERN Document Server

    Lindmayer, Joseph

    1965-01-01

    Semiconductor properties ; semiconductor junctions or diodes ; transistor fundamentals ; inhomogeneous impurity distributions, drift or graded-base transistors ; high-frequency properties of transistors ; band structure of semiconductors ; high current densities and mechanisms of carrier transport ; transistor transient response and recombination processes ; surfaces, field-effect transistors, and composite junctions ; additional semiconductor characteristics ; additional semiconductor devices and microcircuits ; more metal, insulator, and semiconductor combinations for devices ; four-pole parameters and configuration rotation ; four-poles of combined networks and devices ; equivalent circuits ; the error function and its properties ; Fermi-Dirac statistics ; useful physical constants.

  10. Insertion devices

    CERN Document Server

    Bahrdt, J

    2006-01-01

    The interaction of an insertion device with the electron beam in a storage ring is discussed. The radiation property including brightness, ux and polarization of an ideal and real planar and helical / elliptical device is described. The magnet design of planar, helical, quasiperiodic devices and of devices with a reduced on axis power density are resumed.

  11. Proxy-Based IPv6 Neighbor Discovery Scheme for Wireless LAN Based Mesh Networks

    Science.gov (United States)

    Lee, Jihoon; Jeon, Seungwoo; Kim, Jaehoon

    Multi-hop Wireless LAN-based mesh network (WMN) provides high capacity and self-configuring capabilities. Due to data forwarding and path selection based on MAC address, WMN requires additional operations to achieve global connectivity using IPv6 address. The neighbor discovery operation over WLAN mesh networks requires repeated all-node broadcasting and this gives rise to a big burden in the entire mesh networks. In this letter, we propose the proxy neighbor discovery scheme for optimized IPv6 communication over WMN to reduce network overhead and communication latency. Using simulation experiments, we show that the control overhead and communication setup latency can be significantly reduced using the proxy-based neighbor discovery mechanism.

  12. On the Selection of Guard Period and Cyclic Prefix for Beyond 4G TDD Radio Access Network

    DEFF Research Database (Denmark)

    Lähetkangas, Eeva; Pajukoski, Kari; Berardinelli, Gilberto

    2013-01-01

    in 2020, is to cope with the exponential increase of mobile data traffic. In this paper we analyze the feasibility of LTE-A and wireless local area network (WLAN) physical frames against B4G requirements and discuss how the B4G environment, radio channel properties and evolved component technology affect...... the design of the physical layer frame. We analyze the B4G physical subframe numerology including aspects such as time division duplex (TDD) switching time and cyclic prefix (CP) duration. The proposed numerology allows to design a B4G-optimized TDD physical subframe structure which further enables reaching...

  13. Device for inspection of the primary distribution networks (TM) via pulse injection; Dispositivo para inspecao de rede MT via injecao de pulso

    Energy Technology Data Exchange (ETDEWEB)

    Ortolani, Francesco; Calone, Roberto; Paulon, Pietro [Enel SpA, Roma(Italy); Leikermoser, Albert [ARS, Linz (Austria)

    2011-11-15

    This paper describes the performance, functions, and field experience with a portable instrument designed to monitor the condition of harmony, based on the pulse injection method, which still has the ability to estimate zero parameters sequence and the maximum current of ground fault, even in networks with isolated neutral. The equipment analyzes a wide range of network characteristics of clearing.

  14. An adaptive handover prediction scheme for seamless mobility based wireless networks.

    Science.gov (United States)

    Sadiq, Ali Safa; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an adaptive handover prediction (AHP) scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access points in the vicinity, and access point load, are collected and considered inputs of the fuzzy decision making system in order to select the best preferable AP around WLANs. The obtained handover decision which is based on the calculated quality cost using fuzzy inference system is also based on adaptable coefficients instead of fixed coefficients. In other words, the mean and the standard deviation of the normalized network prediction metrics of fuzzy inference system, which are collected from available WLANs are obtained adaptively. Accordingly, they are applied as statistical information to adjust or adapt the coefficients of membership functions. In addition, we propose an adjustable weight vector concept for input metrics in order to cope with the continuous, unpredictable variation in their membership degrees. Furthermore, handover decisions are performed in each MN independently after knowing RSS, direction toward APs, and AP load. Finally, performance evaluation of the proposed scheme shows its superiority compared with representatives of the prediction approaches.

  15. Neighbor Discovery Algorithm in Wireless Local Area Networks Using Multi-beam Directional Antennas

    Science.gov (United States)

    Wang, Jin; Peng, Wei; Liu, Song

    2017-10-01

    Neighbor discovery is an important step for Wireless Local Area Networks (WLAN) and the use of multi-beam directional antennas can greatly improve the network performance. However, most neighbor discovery algorithms in WLAN, based on multi-beam directional antennas, can only work effectively in synchronous system but not in asynchro-nous system. And collisions at AP remain a bottleneck for neighbor discovery. In this paper, we propose two asynchrono-us neighbor discovery algorithms: asynchronous hierarchical scanning (AHS) and asynchronous directional scanning (ADS) algorithm. Both of them are based on three-way handshaking mechanism. AHS and ADS reduce collisions at AP to have a good performance in a hierarchical way and directional way respectively. In the end, the performance of the AHS and ADS are tested on OMNeT++. Moreover, it is analyzed that different application scenarios and the factors how to affect the performance of these algorithms. The simulation results show that AHS is suitable for the densely populated scenes around AP while ADS is suitable for that most of the neighborhood nodes are far from AP.

  16. An Adaptive Handover Prediction Scheme for Seamless Mobility Based Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ali Safa Sadiq

    2014-01-01

    Full Text Available We propose an adaptive handover prediction (AHP scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access points in the vicinity, and access point load, are collected and considered inputs of the fuzzy decision making system in order to select the best preferable AP around WLANs. The obtained handover decision which is based on the calculated quality cost using fuzzy inference system is also based on adaptable coefficients instead of fixed coefficients. In other words, the mean and the standard deviation of the normalized network prediction metrics of fuzzy inference system, which are collected from available WLANs are obtained adaptively. Accordingly, they are applied as statistical information to adjust or adapt the coefficients of membership functions. In addition, we propose an adjustable weight vector concept for input metrics in order to cope with the continuous, unpredictable variation in their membership degrees. Furthermore, handover decisions are performed in each MN independently after knowing RSS, direction toward APs, and AP load. Finally, performance evaluation of the proposed scheme shows its superiority compared with representatives of the prediction approaches.

  17. Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wu Haitao

    2009-01-01

    Full Text Available We propose a MAC layer handoff mechanism for IEEE 802.11 Wireless Local Area Networks (WLAN to give benefit to bandwidth-greedy applications at STAs. The proposed mechanism determines an optimal AP with the maximum achievable throughput rather than the best signal condition by estimating the AP's bandwidth with a new on-the-fly measurement method, Transient Frame Capture (TFC, and predicting the actual throughput could be achieved at STAs. Since the TFC is employed based on the promiscuous mode of WLAN NIC, STAs can avoid the service degradation through the current associated AP. In addition, the proposed mechanism is a client-only solution which does not require any modification of network protocol on APs. To evaluate the performance of the proposed mechanism, we develop an analytic model to estimate reliable and accurate bandwidth of the AP and demonstrate through testbed measurement with various experimental study methods. We also validate the fairness of the proposed mechanism through simulation studies.

  18. Revisiting Gaussian Process Regression Modeling for Localization in Wireless Sensor Networks

    Science.gov (United States)

    Richter, Philipp; Toledano-Ayala, Manuel

    2015-01-01

    Signal strength-based positioning in wireless sensor networks is a key technology for seamless, ubiquitous localization, especially in areas where Global Navigation Satellite System (GNSS) signals propagate poorly. To enable wireless local area network (WLAN) location fingerprinting in larger areas while maintaining accuracy, methods to reduce the effort of radio map creation must be consolidated and automatized. Gaussian process regression has been applied to overcome this issue, also with auspicious results, but the fit of the model was never thoroughly assessed. Instead, most studies trained a readily available model, relying on the zero mean and squared exponential covariance function, without further scrutinization. This paper studies the Gaussian process regression model selection for WLAN fingerprinting in indoor and outdoor environments. We train several models for indoor/outdoor- and combined areas; we evaluate them quantitatively and compare them by means of adequate model measures, hence assessing the fit of these models directly. To illuminate the quality of the model fit, the residuals of the proposed model are investigated, as well. Comparative experiments on the positioning performance verify and conclude the model selection. In this way, we show that the standard model is not the most appropriate, discuss alternatives and present our best candidate. PMID:26370996

  19. Photovoltaic device

    Science.gov (United States)

    Reese, Jason A.; Keenihan, James R.; Gaston, Ryan S.; Kauffmann, Keith L.; Langmaid, Joseph A.; Lopez, Leonardo C.; Maak, Kevin D.; Mills, Michael E.; Ramesh, Narayan; Teli, Samar R.

    2015-09-01

    The present invention is premised upon an improved photovoltaic device ("PV device"), more particularly to an improved photovoltaic device (10) with a multilayered photovoltaic cell assembly (100) and a body portion (200) joined at an interface region (410) and including an intermediate layer (500), at least one interconnecting structural member (1500), relieving feature (2500), unique component geometry, or any combination thereof.

  20. Photovoltaic device

    Energy Technology Data Exchange (ETDEWEB)

    Reese, Jason A; Keenihan, James R; Gaston, Ryan S; Kauffmann, Keith L; Langmaid, Joseph A; Lopez, Leonardo; Maak, Kevin D; Mills, Michael E; Ramesh, Narayan; Teli, Samar R

    2017-03-21

    The present invention is premised upon an improved photovoltaic device ("PV device"), more particularly to an improved photovoltaic device with a multilayered photovoltaic cell assembly and a body portion joined at an interface region and including an intermediate layer, at least one interconnecting structural member, relieving feature, unique component geometry, or any combination thereof.

  1. Concentration device

    DEFF Research Database (Denmark)

    2013-01-01

    A concentration device (2) for filter filtration concentration of particles (4) from a volume of a fluid (6). The concentration device (2) comprises a filter (8) configured to filter particles (4) of a predefined size in the volume of the fluid (6). The concentration device (2) comprises...

  2. SEMICONDUCTOR INTEGRATED CIRCUITS 8.64-11.62 GHz CMOS VCO and divider in a zero-IF 802.11a/b/g WLAN and Bluetooth application

    Science.gov (United States)

    Yu, Sun; Niansong, Mei; Bo, Lu; Yumei, Huang; Zhiliang, Hong

    2010-10-01

    A fully integrated VCO and divider implemented in SMIC 0.13-μm RFCMOS 1P8M technology with a 1.2 V supply voltage is presented. The frequency of the VCO is tuning from 8.64 to 11.62 GHz while the quadrature LO signals for 802.11a WLAN in 5.8 GHz band or for 802.11b/g WLAN and Bluetooth in 2.4 GHz band can be obtained by a frequency division by 2 or 4, respectively. A 6 bit switched capacitor array is applied for precise tuning of all necessary frequency bands. The testing results show that the VCO has a phase noise of—113 dBc @ 1 MHz offset from the carrier of 5.5 GHz by dividing VCO output by two and the VCO core consumes 3.72 mW. The figure-of-merit for the tuning-range (FOMT) of the VCO is -192.6 dBc/Hz.

  3. An Indoor Pedestrian Positioning Method Using HMM with a Fuzzy Pattern Recognition Algorithm in a WLAN Fingerprint System

    Directory of Open Access Journals (Sweden)

    Yepeng Ni

    2016-09-01

    Full Text Available With the rapid development of smartphones and wireless networks, indoor location-based services have become more and more prevalent. Due to the sophisticated propagation of radio signals, the Received Signal Strength Indicator (RSSI shows a significant variation during pedestrian walking, which introduces critical errors in deterministic indoor positioning. To solve this problem, we present a novel method to improve the indoor pedestrian positioning accuracy by embedding a fuzzy pattern recognition algorithm into a Hidden Markov Model. The fuzzy pattern recognition algorithm follows the rule that the RSSI fading has a positive correlation to the distance between the measuring point and the AP location even during a dynamic positioning measurement. Through this algorithm, we use the RSSI variation trend to replace the specific RSSI value to achieve a fuzzy positioning. The transition probability of the Hidden Markov Model is trained by the fuzzy pattern recognition algorithm with pedestrian trajectories. Using the Viterbi algorithm with the trained model, we can obtain a set of hidden location states. In our experiments, we demonstrate that, compared with the deterministic pattern matching algorithm, our method can greatly improve the positioning accuracy and shows robust environmental adaptability.

  4. An Indoor Pedestrian Positioning Method Using HMM with a Fuzzy Pattern Recognition Algorithm in a WLAN Fingerprint System.

    Science.gov (United States)

    Ni, Yepeng; Liu, Jianbo; Liu, Shan; Bai, Yaxin

    2016-09-08

    With the rapid development of smartphones and wireless networks, indoor location-based services have become more and more prevalent. Due to the sophisticated propagation of radio signals, the Received Signal Strength Indicator (RSSI) shows a significant variation during pedestrian walking, which introduces critical errors in deterministic indoor positioning. To solve this problem, we present a novel method to improve the indoor pedestrian positioning accuracy by embedding a fuzzy pattern recognition algorithm into a Hidden Markov Model. The fuzzy pattern recognition algorithm follows the rule that the RSSI fading has a positive correlation to the distance between the measuring point and the AP location even during a dynamic positioning measurement. Through this algorithm, we use the RSSI variation trend to replace the specific RSSI value to achieve a fuzzy positioning. The transition probability of the Hidden Markov Model is trained by the fuzzy pattern recognition algorithm with pedestrian trajectories. Using the Viterbi algorithm with the trained model, we can obtain a set of hidden location states. In our experiments, we demonstrate that, compared with the deterministic pattern matching algorithm, our method can greatly improve the positioning accuracy and shows robust environmental adaptability.

  5. Resource management for device-to-device underlay communication

    CERN Document Server

    Song, Lingyang; Xu, Chen

    2013-01-01

    Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system capacity, it also causes interference as well as increased computation complexity to cellular networks as a result of spectrum sharing. Thus, efficient resource management must be performed to guarantee a target performance level of cellular communication.This

  6. Penetration testing using mobile devices

    CSIR Research Space (South Africa)

    Shelembe, S

    2012-10-01

    Full Text Available Slide 3 Previous/traditional methods ? Host-based vulnerability scanning ? Network based vulnerability scanning ? Application scanning ? Web Application Assessment Proxy ? CSIR 2012 Slide 4 Previous/traditional methods ? Advantage: more... Mobile Device Mobile OS Pen-testing application ? How it works Current Android hacking applications: ? WiFi Analyzer ? SpoofApp ? FaceNiff ? Penetrate Pro ? Anti-Android Network Toolkit ? ConnectBot ? Network Discovery ? Wireless Tether...

  7. Electronic devices and circuits

    CERN Document Server

    Pridham, Gordon John

    1968-01-01

    Electronic Devices and Circuits, Volume 1 deals with the design and applications of electronic devices and circuits such as passive components, diodes, triodes and transistors, rectification and power supplies, amplifying circuits, electronic instruments, and oscillators. These topics are supported with introductory network theory and physics. This volume is comprised of nine chapters and begins by explaining the operation of resistive, inductive, and capacitive elements in direct and alternating current circuits. The theory for some of the expressions quoted in later chapters is presented. Th

  8. An Indoor Positioning Technique Based on a Feed-Forward Artificial Neural Network Using Levenberg-Marquardt Learning Method

    Science.gov (United States)

    Pahlavani, P.; Gholami, A.; Azimi, S.

    2017-09-01

    This paper presents an indoor positioning technique based on a multi-layer feed-forward (MLFF) artificial neural networks (ANN). Most of the indoor received signal strength (RSS)-based WLAN positioning systems use the fingerprinting technique that can be divided into two phases: the offline (calibration) phase and the online (estimation) phase. In this paper, RSSs were collected for all references points in four directions and two periods of time (Morning and Evening). Hence, RSS readings were sampled at a regular time interval and specific orientation at each reference point. The proposed ANN based model used Levenberg-Marquardt algorithm for learning and fitting the network to the training data. This RSS readings in all references points and the known position of these references points was prepared for training phase of the proposed MLFF neural network. Eventually, the average positioning error for this network using 30% check and validation data was computed approximately 2.20 meter.

  9. Open Innovation in Practice: Goal Complementarity and Closed NPD Networks to Explain Differences in Innovation Performance for SMEs in the Medical Devices Sector

    NARCIS (Netherlands)

    Pullen, A.J.J.; de Weerd-Nederhof, Petronella C.; Groen, Arend J.; Fisscher, O.A.M.

    2012-01-01

    Cooperation with other organizations increases the innovation performance of organization, especially for small and medium-sized enterprises (SMEs) as they encounter liabilities of “smallness” (e.g., limited financial resources, and manpower). In the medical devices sector, collaboration with

  10. Cost Effective RADIUS Authentication for Wireless Clients

    Directory of Open Access Journals (Sweden)

    Alexandru ENACEANU

    2010-12-01

    Full Text Available Network administrators need to keep administrative user information for each network device, but network devices usually support only limited functions for user management. WLAN security is a modern problem that needs to be solved and it requires a lot of overhead especially when applied to corporate wireless networks. Administrators can set up a RADIUS server that uses an external database server to handle authentication, authorization, and accounting for network security issues.

  11. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  12. Securing Personal Network Clusters

    NARCIS (Netherlands)

    Jehangir, A.; Heemstra de Groot, S.M.

    2007-01-01

    A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstanding their geographic location. It aims to utilize pervasive computing to provide users with new and improved services. In this paper we propose a model for securing Personal Network clusters. Clusters

  13. QoE-Aware Device-to-Device Multimedia Communications

    Directory of Open Access Journals (Sweden)

    Liang ZHOU

    2015-08-01

    Full Text Available Multimedia services over mobile device-to-device (D2D networks has recently received considerable attention. In this scenario, each device is equipped with a cellular communication interface, as well as a D2D interface over a shared medium. In this work, we study the performance properties of the mobile D2D communications in the framework of user satisfaction, and develop a fully distributed QoE-aware multimedia communication scheme (QAMCS. Specifically, we translate the opportunistic multimedia communications issue into a stochastic optimization problem, which opens up a new degree of performance to exploit. Moreover, QAMCS is designed for a heterogeneous and dynamic environment, in which user demand, device mobility, and transmission fashion may vary across different devices and applications. Importantly, QAMCS is able to maximize the user satisfaction and only needs each device to implement its own scheme individually in the absence of a central controller.

  14. Energy Efficient Digital Networks

    Energy Technology Data Exchange (ETDEWEB)

    Lanzisera, Steven [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Brown, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-01-01

    Digital networks are the foundation of the information services, and play an expanding and indispensable role in our lives, via the Internet, email, mobile phones, etc. However, these networks consume energy, both through the direct energy use of the network interfaces and equipment that comprise the network, and in the effect they have on the operating patterns of devices connected to the network. The purpose of this research was to investigate a variety of technology and policy issues related to the energy use caused by digital networks, and to further develop several energy-efficiency technologies targeted at networks.

  15. Co-release of dicloxacillin and thioridazine from catheter material containing an interpenetrating polymer network for inhibiting device-associated Staphylococcus aureus infection

    DEFF Research Database (Denmark)

    Stenger, Michael; Klein, Kasper; Grønnemose, Rasmus B

    2016-01-01

    Approximately half of all nosocomial bloodstream infections are caused by bacterial colonization of vascular catheters. Attempts have been made to improve devices using anti-adhesive or antimicrobial coatings; however, it is often difficult to bind coatings stably to catheter materials, and the low...... to an enhanced loading capacity of DCX when co-loaded with TDZ. Lastly, the IPN catheters were tested in a novel porcine model of central venous catheter-related infection, in which drug-loaded IPN catheters were found to significantly decrease the frequency of infection....

  16. Ferroelectric devices

    CERN Document Server

    Uchino, Kenji

    2009-01-01

    Updating its bestselling predecessor, Ferroelectric Devices, Second Edition assesses the last decade of developments-and setbacks-in the commercialization of ferroelectricity. Field pioneer and esteemed author Uchino provides insight into why this relatively nascent and interdisciplinary process has failed so far without a systematic accumulation of fundamental knowledge regarding materials and device development.Filling the informational void, this collection of information reviews state-of-the-art research and development trends reflecting nano and optical technologies, environmental regulat

  17. Catalytic devices

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Ming; Zhang, Xiang

    2018-01-23

    This disclosure provides systems, methods, and apparatus related to catalytic devices. In one aspect, a device includes a substrate, an electrically insulating layer disposed on the substrate, a layer of material disposed on the electrically insulating layer, and a catalyst disposed on the layer of material. The substrate comprises an electrically conductive material. The substrate and the layer of material are electrically coupled to one another and configured to have a voltage applied across them.

  18. Cisco shuffles the WLAN deck

    National Research Council Canada - National Science Library

    Phil Hochmuth

    2005-01-01

    Cisco's $450 million buyout last week of wireless switch start-up Airespace not only represents something of an about-face for Cisco regarding wireless LAN technology, but also is the latest evidence...

  19. A forensic readiness model for Wireless Local Area Networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environments, but also as a means...

  20. Trustworthy execution on mobile devices

    CERN Document Server

    Vasudevan, Amit; Newsome, James

    2013-01-01

    This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

  1. An Efficient Channel Access Scheme for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Syed Asad Hussain

    2017-01-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs are getting more popularity due to the potential Intelligent Transport Systems (ITS technology. It provides many efficient network services such as safety warnings (collision warning, entertainment (video and voice, maps based guidance, and emergency information. VANETs most commonly use Road Side Units (RSUs and Vehicle-to-Vehicle (V2V referred to as Vehicle-to-Infrastructure (V2I mode for data accessing. IEEE 802.11p standard which was originally designed for Wireless Local Area Networks (WLANs is modified to address such type of communication. However, IEEE 802.11p uses Distributed Coordination Function (DCF for communication between wireless nodes. Therefore, it does not perform well for high mobility networks such as VANETs. Moreover, in RSU mode timely provision of data/services under high density of vehicles is challenging. In this paper, we propose a RSU-based efficient channel access scheme for VANETs under high traffic and mobility. In the proposed scheme, the contention window is dynamically varied according to the times (deadlines the vehicles are going to leave the RSU range. The vehicles with shorter time deadlines are served first and vice versa. Simulation is performed by using the Network Simulator (NS-3 v. 3.6. The simulation results show that the proposed scheme performs better in terms of throughput, backoff rate, RSU response time, and fairness.

  2. Identification device

    Science.gov (United States)

    Lin, Jian-Shian; Su, Chih-Chieh; Chou, Ta-Hsin; Wu, Mount-Learn; Lai, Chieh-Lung; Hsu, Che-Lung; Lan, Hsiao-Chin; Huang, Hung-I.; Liu, Yung-Chih; Tu, Zong-Ru; Lee, Chien-Chieh; Chang, Jenq-Yang

    2007-09-01

    In this Letter, the identification device disclosed in the present invention is comprised of: a carrier and a plurality of pseudo-pixels; wherein each of the plural pseudo-pixels is formed on the carrier and is further comprised of at least a light grating composed of a plurality of light grids. In a preferred aspect, each of the plural light grids is formed on the carrier while spacing from each other by an interval ranged between 50nm and 900nm. As the aforesaid identification device can present specific colors and patterns while it is being viewed by naked eye with respect to a specific viewing angle, the identification device is preferred for security and anti-counterfeit applications since the specific colors and patterns will become invisible when it is viewed while deviating from the specific viewing angle.

  3. Intelligent networked teleoperation control

    CERN Document Server

    Li, Zhijun; Su, Chun-Yi

    2015-01-01

    This book describes a unified framework for networked teleoperation systems involving multiple research fields: networked control systems for linear and nonlinear forms, bilateral teleoperation, trilateral teleoperation, multilateral teleoperation and cooperative teleoperation. It closely examines networked control as a field at the intersection of systems & control and robotics and presents a number of experimental case studies on testbeds for robotic systems, including networked haptic devices, robotic network systems and sensor network systems. The concepts and results outlined are easy to understand, even for readers fairly new to the subject. As such, the book offers a valuable reference work for researchers and engineers in the fields of systems & control and robotics.

  4. Magnetic resonance tracking of catheters and mechatronic devices operating in the vascular network with an embedded photovoltaic-based microelectronic circuit.

    Science.gov (United States)

    Sharafi, Azadeh; Martel, Sylvain

    2013-01-01

    Tracking of a catheter through the arterial system is critical in several medical interventions. To avoid excessive dose of x-ray irradiation, Magnetic Resonance Imaging (MRI) has been proposed. In such a case, a simple ferromagnetic sphere placed at the tip of the catheter could be used. However, due to the artifact created by the ferromagnetic core, it becomes impossible to gather an image of the tissues surrounding such a marker. Hence, in this paper we propose replacing the ferromagnetic marker with a microchip containing a coil and a photovoltaic cell. By radiating light to the photovoltaic cell, the coil generates a magnetic field which is detected as an artifact in MR images. By turning off the light, the effect of the coil is eliminated allowing images of tissues next to the marker to be taken. In this paper, simulated results based on experimental data from the preliminary designs suggest that this approach could be viable not only for catheters but also, it could potentially be used in various tools as well as mechatronic devices being moved inside the body.

  5. Low-cost computing and network communication for a point-of-care device to perform a 3-part leukocyte differential

    Science.gov (United States)

    Powless, Amy J.; Feekin, Lauren E.; Hutcheson, Joshua A.; Alapat, Daisy V.; Muldoon, Timothy J.

    2016-03-01

    Point-of-care approaches for 3-part leukocyte differentials (granulocyte, monocyte, and lymphocyte), traditionally performed using a hematology analyzer within a panel of tests called a complete blood count (CBC), are essential not only to reduce cost but to provide faster results in low resource areas. Recent developments in lab-on-a-chip devices have shown promise in reducing the size and reagents used, relating to a decrease in overall cost. Furthermore, smartphone diagnostic approaches have shown much promise in the area of point-of-care diagnostics, but the relatively high per-unit cost may limit their utility in some settings. We present here a method to reduce computing cost of a simple epi-fluorescence imaging system using a Raspberry Pi (single-board computer, Raspberry Pi to a main server and return results back to the user, exporting the bulk of the computational requirements. Six images were acquired per minute with up to 200 cells per field of view. Preliminary results showed that the differential count varied significantly in monocytes with a 1 minute time difference indicating the importance of time-gating to produce an accurate/consist differential.

  6. Device Applications of Nonlinear Dynamics

    CERN Document Server

    Baglio, Salvatore

    2006-01-01

    This edited book is devoted specifically to the applications of complex nonlinear dynamic phenomena to real systems and device applications. While in the past decades there has been significant progress in the theory of nonlinear phenomena under an assortment of system boundary conditions and preparations, there exist comparatively few devices that actually take this rich behavior into account. "Device Applications of Nonlinear Dynamics" applies and exploits this knowledge to make devices which operate more efficiently and cheaply, while affording the promise of much better performance. Given the current explosion of ideas in areas as diverse as molecular motors, nonlinear filtering theory, noise-enhanced propagation, stochastic resonance and networked systems, the time is right to integrate the progress of complex systems research into real devices.

  7. Cross-Layer Measurement on an IEEE 802.11g Wireless Network Supporting MPEG-2 Video Streaming Applications in the Presence of Interference

    Directory of Open Access Journals (Sweden)

    Alessandro Sona

    2010-01-01

    Full Text Available The performance of wireless local area networks supporting video streaming applications, based on MPEG-2 video codec, in the presence of interference is here dealt with. IEEE 802.11g standard wireless networks, that do not support QoS in according with IEEE 802.11e standard, are, in particular, accounted for and Bluetooth signals, additive white Gaussian noise, and competitive data traffic are considered as sources of interference. The goal is twofold: from one side, experimentally assessing and correlating the values that some performance metrics assume at the same time at different layers of an IEEE 802.11g WLAN delivering video streaming in the presence of in-channel interference; from the other side, deducing helpful and practical hints for designers and technicians, in order to efficiently assess and enhance the performance of an IEEE 802.11g WLAN supporting video streaming in some suitable setup conditions and in the presence of interference. To this purpose, an experimental analysis is planned following a cross-layer measurement approach, and a proper testbed within a semianechoic chamber is used. Valuable results are obtained in terms of signal-to-interference ratio, packet loss ratio, jitter, video quality, and interference data rate; helpful hints for designers and technicians are finally gained.

  8. A Middleware Based Approach to Dynamically Deploy Location Based Services onto Heterogeneous Mobile Devices Using Bluetooth in Indoor Environment

    Science.gov (United States)

    Sadhukhan, Pampa; Sen, Rijurekha; Das, Pradip K.

    Several methods for providing location based service (LBS) to mobile devices in indoor environment using wireless technologies like WLAN, RFID and Bluetooth have been proposed, implemented and evaluated. However, most of them do not focus on heterogeneity of mobile platforms, memory constraint of mobile devices, the adaptability of client or device to the new services it discovers whenever it reaches a new location. In this paper, we have proposed a Middleware based approach of LBS provision in the indoor environment, where a Bluetooth enabled Base Station (BS) detects Bluetooth enabled mobile devices and pushes a proper client application only to those devices that belong to some registered subscriber of LBS. This dynamic deployment enables the mobile clients to access any new service without having preinstalled interface to that service beforehand and thus the client's memory consumption is reduced. Our proposed work also addresses the other issues like authenticating the clients before providing them LBSs and introducing paid services. We have evaluated its performance in term of file transfer time with respect to file size and throughput with respect to distance. Experimental results on service consumption time by the mobile client for different services are also presented.

  9. An Evaluation of Hand-Force Prediction Using Artificial Neural-Network Regression Models of Surface EMG Signals for Handwear Devices

    Directory of Open Access Journals (Sweden)

    Masayuki Yokoyama

    2017-01-01

    Full Text Available Hand-force prediction is an important technology for hand-oriented user interface systems. Specifically, surface electromyography (sEMG is a promising technique for hand-force prediction, which requires a sensor with a small design space and low hardware costs. In this study, we applied several artificial neural-network (ANN regression models with different numbers of neurons and hidden layers and evaluated handgrip forces by using a dynamometer. A handwear with dry electrodes on the dorsal interosseous muscles was used for our evaluation. Eleven healthy subjects participated in our experiments. sEMG signals with six different levels of forces from 0 N to 200 N and maximum voluntary contraction (MVC are measured to train and test our ANN regression models. We evaluated three different methods (intrasession, intrasubject, and intersubject evaluation, and our experimental results show a high correlation (0.840, 0.770, and 0.789 each between the predicted forces and observed forces, which are normalized by the MVC for each subject. Our results also reveal that ANNs with deeper layers of up to four hidden layers show fewer errors in intrasession and intrasubject evaluations.

  10. Detection device

    Science.gov (United States)

    Smith, J.E.

    1981-02-27

    The present invention is directed to a detection device comprising: (1) an entrance chamber; (2) a central chamber; and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

  11. Medical Devices

    NARCIS (Netherlands)

    Verkerke, Gijsbertus Jacob; Mahieu, H.F.; Geertsema, A.A.; Hermann, I.F.; van Horn, J.R.; Hummel, J. Marjan; van Loon, J.P.; Mihaylov, D.; van der Plaats, A.; Schraffordt Koops, H.; Schutte, H.K.; Veth, R.P.H.; de Vries, M.P.; Rakhorst, G.; Shi, Donglu

    2004-01-01

    The development of new medical devices is a very time-consuming and costly process. Besides the time between the initial idea and the time that manufacturing and testing of prototypes takes place, the time needed for the development of production facilities, production of test series, marketing,

  12. Printing Device

    NARCIS (Netherlands)

    Berg, van den M.J.; Markies, P.R.; Zuilhof, H.

    2014-01-01

    An ink jetprinting device includes a pressure chamber formed by a plurality of wall segments, a first aperture extending through a wall segment and communicating with an ink jet orifice and a second aperture extending through a wall segment and communicating with an ink supply duct. The pressure

  13. Group-Orthogonal Code-Division Multiplex: A Physical-Layer Enhancement for IEEE 802.11n Networks

    Directory of Open Access Journals (Sweden)

    Felip Riera-Palou

    2010-01-01

    Full Text Available The new standard for wireless local area networks (WLANs, named IEEE 802.11n, has been recently released. This new norm builds upon and remains compatible with the previous WLANs standards IEEE 802.11a/g while it is able to achieve transmission rates of up to 600 Mbps. These increased data rates are mainly a consequence of two important new features: (1 multiple antenna technology at transmission and reception, and (2 optional doubling of the system bandwidth thanks to the availability of an additional 20 MHz band. This paper proposes the use of Group-Orthogonal Code Division Multiplex (GO-CDM as a means to improve the performance of the 802.11n standard by further exploiting the inherent frequency diversity. It is explained why GO-CDM synergistically matches with the two aforementioned new features and the performance gains it can offer under different configurations is illustrated. Furthermore, the effects that group-orthogonal has on key implementation issues such as channel estimation, carrier frequency offset, and peak-to-average power ratio (PAPR are also considered.

  14. An empirical evaluation of bufferbloat in IEEE 802.11n wireless networks

    KAUST Repository

    Showail, Ahmad

    2014-04-06

    In this paper, we analyze the impact of large, persistently-full buffers (`bufferbloat\\') on various network dynamics in IEEE 802.11n wireless networks. Bufferbloat has mostly been studied in the context of wired networks. We study the impact of bufferbloat on a variety of wireless network topologies, including wireless LAN (WLAN) and multi-hop wireless networks. Our results show that a single FTP transfer between two Linux wireless hosts can saturate the buffers in the network stack, leading to RTT delays exceeding 4.5 s in multi-hop configurations. We show that well-designed Aggregate MAC Protocol Data Unit (A-MPDU) MAC-layer frame aggregation can reduce RTT delays while simultaneously increasing network throughput. However, additional measures may still be required to meet the constraints of real-time flows (such as VoIP). Our experiments show that large buffers can deteriorate the fairness in rate allocation in parking lot based multi-hop networks.

  15. Nanophotonic Devices for Optical Interconnect

    DEFF Research Database (Denmark)

    Van Thourhout, D.; Spuesens, T.; Selvaraja, S.K.

    2010-01-01

    We review recent progress in nanophotonic devices for compact optical interconnect networks. We focus on microdisk-laser-based transmitters and discuss improved design and advanced functionality including all-optical wavelength conversion and flip-flops. Next we discuss the fabrication uniformity...

  16. Wavelength conversion devices and techniques

    DEFF Research Database (Denmark)

    Stubkjær, Kristian; Jørgensen, Carsten; Danielsen, Søren Lykke

    1996-01-01

    wavelengths in an easy way and preferably without opto-electronic conversion. Here, we will first briefly look at advantages of employing optical wavelength converters in WDM networks and next review the optical wavelength conversion devices with emphasis on recent developments....

  17. Network and Service Monitoring in Heterogeneous Home Networks

    NARCIS (Netherlands)

    Delphinanto, A.

    2012-01-01

    Home networks are becoming dynamic and technologically heterogeneous. They consist of an increasing number of devices which offer several functionalities and can be used for many different services. In the home, these devices are interconnected using a mixture of networking technologies (for

  18. Networking Technologies for Future Home Networks Using 60 GHz Radio

    NARCIS (Netherlands)

    Wang, J.

    2010-01-01

    Networking technologies have been changing the life of people in their private residential space. With the arrival of high definition (HD) multimedia services and broadband communications into the living space, future home networks are expected to support high speed device-to-device connectivity

  19. Mobile-host-centric transport protocol for wireless networks

    Science.gov (United States)

    Zhang, Liang; Shu, Yantai; Yang, Zhenyu

    2005-10-01

    Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. However, networks with wireless and other lossy links also suffer from significant non-congestion-related losses due to reasons such as bit errors and handoffs. TCP responds to all losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance in wireless and lossy networks. In case of wired-wireless interaction (WLANs), the wireless link is assumed to be the last hop where most of the loss and delay occurs. Since the mobile host is adjacent to the wireless hops, it is obviously better equipped to obtain first-hand knowledge of the wireless links. In the paper, we proposed a mobile-host-centric transport protocol called MCP (Mobile-host Control Protocol) that is like TCP in its general behavior, but allows for better congestion control and loss recovery in mobile wireless networks. The MCP shifts most transport layer control policies to the mobile host side under all cases (mobile host is a sender or receiver, fixed or mobile, and so on). Therefore, mobile stations can make better transport layer control in time based on the condition of wireless link.

  20. Dimensioning Method for Conversational Video Applications in Wireless Convergent Networks

    Directory of Open Access Journals (Sweden)

    Alonso JoséI

    2008-01-01

    Full Text Available Abstract New convergent services are becoming possible, thanks to the expansion of IP networks based on the availability of innovative advanced coding formats such as H.264, which reduce network bandwidth requirements providing good video quality, and the rapid growth in the supply of dual-mode WiFi cellular terminals. This paper provides, first, a comprehensive subject overview as several technologies are involved, such as medium access protocol in IEEE802.11, H.264 advanced video coding standards, and conversational application characterization and recommendations. Second, the paper presents a new and simple dimensioning model of conversational video over wireless LAN. WLAN is addressed under the optimal network throughput and the perspective of video quality. The maximum number of simultaneous users resulting from throughput is limited by the collisions taking place in the shared medium with the statistical contention protocol. The video quality is conditioned by the packet loss in the contention protocol. Both approaches are analyzed within the scope of the advanced video codecs used in conversational video over IP, to conclude that conversational video dimensioning based on network throughput is not enough to ensure a satisfactory user experience, and video quality has to be taken also into account. Finally, the proposed model has been applied to a real-office scenario.

  1. Dimensioning Method for Conversational Video Applications in Wireless Convergent Networks

    Directory of Open Access Journals (Sweden)

    Raquel Perez Leal

    2007-12-01

    Full Text Available New convergent services are becoming possible, thanks to the expansion of IP networks based on the availability of innovative advanced coding formats such as H.264, which reduce network bandwidth requirements providing good video quality, and the rapid growth in the supply of dual-mode WiFi cellular terminals. This paper provides, first, a comprehensive subject overview as several technologies are involved, such as medium access protocol in IEEE802.11, H.264 advanced video coding standards, and conversational application characterization and recommendations. Second, the paper presents a new and simple dimensioning model of conversational video over wireless LAN. WLAN is addressed under the optimal network throughput and the perspective of video quality. The maximum number of simultaneous users resulting from throughput is limited by the collisions taking place in the shared medium with the statistical contention protocol. The video quality is conditioned by the packet loss in the contention protocol. Both approaches are analyzed within the scope of the advanced video codecs used in conversational video over IP, to conclude that conversational video dimensioning based on network throughput is not enough to ensure a satisfactory user experience, and video quality has to be taken also into account. Finally, the proposed model has been applied to a real-office scenario.

  2. Laser device

    Science.gov (United States)

    Scott, Jill R.; Tremblay, Paul L.

    2008-08-19

    A laser device includes a virtual source configured to aim laser energy that originates from a true source. The virtual source has a vertical rotational axis during vertical motion of the virtual source and the vertical axis passes through an exit point from which the laser energy emanates independent of virtual source position. The emanating laser energy is collinear with an orientation line. The laser device includes a virtual source manipulation mechanism that positions the virtual source. The manipulation mechanism has a center of lateral pivot approximately coincident with a lateral index and a center of vertical pivot approximately coincident with a vertical index. The vertical index and lateral index intersect at an index origin. The virtual source and manipulation mechanism auto align the orientation line through the index origin during virtual source motion.

  3. "Distinvar" device

    CERN Multimedia

    CERN PhotoLab

    1965-01-01

    The alignment of one of the accelerator magnets being checked by the AR Division survey group. A "distinvar" device, invented by the group, using calibrated invar wires stretched between the fixed survey pillar (on the left) and a fixed point on the magnet. In two days it is thus possible to measure the alignment of the 100 magnets with an accuracy better than 1/10.

  4. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  5. Testing MIMO Devices Over the Air

    DEFF Research Database (Denmark)

    Nielsen, Jesper Ødum; Alrabadi, Osama; Fan, Wei

    2012-01-01

    A system for performance evaluation of LTE devices has been presented, with evaluation in both a live network and with a channel sounder. The results serve as reference for OTA evaluations in the anechoic room based on multi-probe setups.......A system for performance evaluation of LTE devices has been presented, with evaluation in both a live network and with a channel sounder. The results serve as reference for OTA evaluations in the anechoic room based on multi-probe setups....

  6. Effects of Data Frame Size Distribution on Wireless Lans | Aneke ...

    African Journals Online (AJOL)

    The continuous need to replace cables and deploy mobile devices in the communications industry has led to very active research on the utilization of wireless networks. IEEE 802.11 WLAN is known to achieve relatively small throughput performance compared to the underlying physical layer's transmission rate and this is ...

  7. RF device forensics using passband filter analysis

    Science.gov (United States)

    King-Smith, Deen; Mikkilineni, Aravind K.; Gelfand, Saul; Delp, Edward J., III

    2009-02-01

    Given the wide use of Radio Frequency (RF) devices for applications ranging from data networks to wireless sensors, it is of interest to be able to characterize individual devices to verify compliance with FCC Part 15 rules. In an effort to characterize these types of devices we have developed a system that utilizes specially designed probe signals to elicit a response from the device from which unique characteristics can be extracted. The features that uniquely characterize a device are referred to as device signatures or device fingerprints. We apply this approach to RF devices which employ different bandpass filters, and construct training based classifiers which are highly accurate. We also introduce a model-based framework for optimal detection that can be employed to obtain performance limits, and to study model mismatch and probe optimization.

  8. Understanding telecommunications networks

    CERN Document Server

    Valdar, Andy

    2017-01-01

    A telecommunications network is an electronic system of links, nodes and the controls that govern their operations to allow voice and data transfer among users and devices. This fully revised, updated and expanded second edition covers all aspects of today's networks, including how they are planned, formed and operated.

  9. Networking in Academia.

    Science.gov (United States)

    Fattig, W. Donald

    1984-01-01

    Discusses the use of microcomputers as communication devices and presents features of several national bibliographic networks, together with examples of searches for information of interest to academics. The status of electronic publishing is discussed and differences between national and local area networks are described. (Author)

  10. Porous Microfluidic Devices - Fabrication adn Applications

    NARCIS (Netherlands)

    de Jong, J.; Geerken, M.J.; Lammertink, Rob G.H.; Wessling, Matthias

    2007-01-01

    The major part of microfluidic devices nowadays consists of a dense material that defines the fluidic structure. A generic fabrication method enabling the production of completely porous micro devices with user-defined channel networks is developed. The channel walls can be used as a (selective)

  11. Web Service Architecture Framework for Embedded Devices

    Science.gov (United States)

    Yanzick, Paul David

    2009-01-01

    The use of Service Oriented Architectures, namely web services, has become a widely adopted method for transfer of data between systems across the Internet as well as the Enterprise. Adopting a similar approach to embedded devices is also starting to emerge as personal devices and sensor networks are becoming more common in the industry. This…

  12. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  13. Mobile RFID of Wireless Mesh Network for Intelligent Safety Care System

    Directory of Open Access Journals (Sweden)

    Chwen-Fu Horng

    2009-12-01

    Full Text Available This paper presents the Wi-Fi phone with RFID (Radio frequency identification of student entered the school, via Wireless Access Points (APs of school will transmit MAC address with RFID of Wi-Fi phone to Internet Data Center (IDC for server and then the message exchanged by using GSM (or 3G has been transmitted message (or mail to the mobile user of parents (or client user. The wireless access points support broadcasting multiple SSIDs, each of which can have a different set of security and network setting. The RADIUS server is used to authenticate the Wireless Access Point (AP and mobile nodes. In safety case system, we used the several authentication and encryption options for the WLAN. We will discuss the use of Wi-Fi protected Access (WPA, RFID, IP Security (IPSec, and Secure Socket Layer (SSL, and there are high Quality of service (QoS and performance.

  14. Energy efficiency in future wireless networks: cognitive radio standardization requirements

    CSIR Research Space (South Africa)

    Masonta, M

    2012-09-01

    Full Text Available Energy consumption of mobile and wireless networks and devices is significant, indirectly increasing greenhouse gas emissions and energy costs for operators. Cognitive radio (CR) solutions can save energy for such networks and devices; moreover...

  15. Adaptive Naive Bayes classification for wireless sensor networks

    NARCIS (Netherlands)

    Zwartjes, G.J.

    2017-01-01

    Wireless Sensor Networks are tiny devices equipped with sensors and wireless communication. These devices observe environments and communicatie about these observations. Machine Learning techniques are of interest for Wireless Sensor Network applications since they can reduce the amount of needed

  16. Personal Network (PN) Applications

    DEFF Research Database (Denmark)

    Prasad, Ramjee; Skouby, K.

    2005-01-01

    The applications of PN will be realised under many scenarios where users can have access to their personal network all the time. This network will enable the user to share critical information, play games, control their home remotely, etc. All this will be achieved with seamless interworking...... and handover between networks and user devices. This paper presents an array of use case scenarios that validates the ubiquitous usage of PN....

  17. Personal network (PN) applications

    DEFF Research Database (Denmark)

    Prasad, R.; Skouby, Knud Erik

    2005-01-01

    The applications of PN will be realised under many scenarios where users can have access to their personal network all the time. This network will enable the user to share critical information, play games, control their home remotely, etc. All this will be achieved with seamless interworking...... and handover between networks and user devices. This paper presents an array of use case scenarios that validates the ubiquitous usage of PN....

  18. Scalable devices

    KAUST Repository

    Krüger, Jens J.

    2014-01-01

    In computer science in general and in particular the field of high performance computing and supercomputing the term scalable plays an important role. It indicates that a piece of hardware, a concept, an algorithm, or an entire system scales with the size of the problem, i.e., it can not only be used in a very specific setting but it\\'s applicable for a wide range of problems. From small scenarios to possibly very large settings. In this spirit, there exist a number of fixed areas of research on scalability. There are works on scalable algorithms, scalable architectures but what are scalable devices? In the context of this chapter, we are interested in a whole range of display devices, ranging from small scale hardware such as tablet computers, pads, smart-phones etc. up to large tiled display walls. What interests us mostly is not so much the hardware setup but mostly the visualization algorithms behind these display systems that scale from your average smart phone up to the largest gigapixel display walls.

  19. Drugs and Devices

    Directory of Open Access Journals (Sweden)

    Gail A. Van Norman, MD

    2016-08-01

    Full Text Available The regulation of medical drugs and devices involves competing goals of assuring safety and efficacy while providing rapid movement of innovative therapies through the investigative and regulatory processes as quickly as possible. The United States and the European Union approach these challenges in different ways. Whereas the United States has always relied on a strictly centralized process through 1 agency, the Food and Drug Administration (FDA, the European Commission synchronized the regulations of 28 different countries as they combined to create the European Union. The FDA historically developed as a consumer protection agency, whereas the regulations from the European Commission arose out of a need to harmonize inter-state commercial interests while preserving national “autonomy.” Thus, whereas the FDA has the advantages of centralization and common rules, the European Union regulates medical drug and device approvals through a network of centralized and decentralized agencies throughout its member states. This study explores some of the similarities and differences in European and U.S. regulation of drugs and devices, and discusses challenges facing each.

  20. Physics of semiconductor devices

    Energy Technology Data Exchange (ETDEWEB)

    Prew, B.A.

    1975-09-01

    The properties of semiconductors which make them important in the electronic devices industry, and how these properties are controlled by doping, are described. The physics and applications of p-n and other junction devices, and of bulk effect devices are discussed. Avalanche devices, optical devices, solar cells, Schottky barriers, MOS devices, heterojunctions, photoconductors, and transferred electron devices are considered.