WorldWideScience

Sample records for selfish packet-forwarding wireless

  1. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to variation in node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated against existing beaconless position-based protocols analytically and as well by means of simulations. The proposed protocol is demonstrated in this paper to be more efficient. In particular, it is shown that for the same amount of energy the proposed protocol transports one bit from source to destination much quicker. © 2012 IEEE.

  2. Utilization of OFDM for efficient packet forwarding in wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2011-12-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the network density grows, the overhead incurred grows significantly. As such, end-to-end energy and delay performance is adversely impacted. Motivated by the need for a forwarding mechanism that is more tolerant to growth in node density, an alternative position-based protocol is proposed in this paper. The protocol is designed such that it completely eliminates the need for potential relays to undergo a relay election process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. End-to-end performance is evaluated here against existing beaconless protocols. It is demonstrated that the proposed protocol is more efficient since it is able to offer lower end-to-end delay for the same amount of energy consumption. © 2011 IEEE.

  3. Highly Efficient Multi Channel Packet Forwarding with Round Robin Intermittent Periodic Transmit for Multihop Wireless Backhaul Networks

    Science.gov (United States)

    Furukawa, Hiroshi

    2017-01-01

    Round Robin based Intermittent Periodic Transmit (RR-IPT) has been proposed which achieves highly efficient multi-hop relays in multi-hop wireless backhaul networks (MWBN) where relay nodes are 2-dimensionally deployed. This paper newly investigates multi-channel packet scheduling and forwarding scheme for RR-IPT. Downlink traffic is forwarded by RR-IPT via one of the channels, while uplink traffic and part of downlink are accommodated in the other channel. By comparing IPT and carrier sense multiple access with collision avoidance (CSMA/CA) for uplink/downlink packet forwarding channel, IPT is more effective in reducing packet loss rate whereas CSMA/CA is better in terms of system throughput and packet delay improvement. PMID:29137164

  4. Position-Based Packet Forwarding for Vehicular Ad-Hoc Networks

    OpenAIRE

    Füßler, Holger

    2007-01-01

    Mobile Ad-Hoc Networks, or MANETs, are data communication networks between (potentially) mobile computer systems equipped with wireless communication devices and — in their purest form — in complete absence of communication infrastructure. Usage scenarios for these systems include communication during disaster recovery or battlefield communications. One of the great research challenges concerning MANETs is the Packet Forwarding Problem, i.e., the question to which neighbor node a data packet ...

  5. Incentive Compatible and Globally Efficient Position Based Routing for Selfish Reverse Multicast in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sarvesh Varatharajan

    2009-10-01

    Full Text Available We consider the problem of all-to-one selfish routing in the absence of a payment scheme in wireless sensor networks, where a natural model for cost is the power required to forward, referring to the resulting game as a Locally Minimum Cost Forwarding (LMCF. Our objective is to characterize equilibria and their global costs in terms of stretch and diameter, in particular finding incentive compatible algorithms that are also close to globally optimal. We find that although social costs for equilibria of LMCF exhibit arbitrarily bad worst-case bounds and computational infeasibility of reaching optimal equilibria, there exist greedy and local incentive compatible heuristics achieving near-optimal global costs.

  6. Novel Scheme for Packet Forwarding without Header Modifications in Optical Networks

    DEFF Research Database (Denmark)

    Wessing, Henrik; Christiansen, Henrik Lehrmann; Fjelde, Tina

    2002-01-01

    We present a novel scheme for packet forwarding in optical packet-switched networks and we further demonstrate its good scalability through simulations. The scheme requires neither header modification nor any label distribution protocol, thus reducing component cost while simplifying network...

  7. Utilization of OFDM for efficient packet forwarding in wireless sensor networks

    KAUST Repository

    Bader, Ahmed; Abed-Meraim, Karim; Alouini, Mohamed-Slim

    2011-01-01

    -to-end energy and delay performance is adversely impacted. Motivated by the need for a forwarding mechanism that is more tolerant to growth in node density, an alternative position-based protocol is proposed in this paper. The protocol is designed

  8. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed; Abed-Meraim, Karim; Alouini, Mohamed-Slim

    2012-01-01

    in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus

  9. The selfish goal meets the selfish gene.

    Science.gov (United States)

    Neuberg, Steven L; Schaller, Mark

    2014-04-01

    The connection between selfish genes and selfish goals is not merely metaphorical. Many goals that shape contemporary cognition and behavior are psychological products of evolutionarily fundamental motivational systems and thus are phenotypic manifestations of genes. An evolutionary perspective can add depth and nuance to our understanding of "selfish goals" and their implications for human cognition and behavior.

  10. Goals are not selfish.

    Science.gov (United States)

    von Hippel, William; von Hippel, Frank A

    2014-04-01

    The metaphor of selfish goals is misguided. Organisms can be considered vessels that further the interests of their genes, but not vessels that further the interests of their goals. Although goals can act at cross-purposes to each other and to longevity, such trade-offs are predicted by evolutionary theory. The metaphor of selfish goals provides no purchase on this problem.

  11. Multihop Wireless Networks Opportunistic Routing

    CERN Document Server

    Zeng, Kai; Li, Ming

    2011-01-01

    This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol desig

  12. Moral actor, selfish agent.

    Science.gov (United States)

    Frimer, Jeremy A; Schaefer, Nicola K; Oakes, Harrison

    2014-05-01

    People are motivated to behave selfishly while appearing moral. This tension gives rise to 2 divergently motivated selves. The actor-the watched self-tends to be moral; the agent-the self as executor-tends to be selfish. Three studies present direct evidence of the actor's and agent's distinct motives. To recruit the self-as-actor, we asked people to rate the importance of various goals. To recruit the self-as-agent, we asked people to describe their goals verbally. In Study 1, actors claimed their goals were equally about helping the self and others (viz., moral); agents claimed their goals were primarily about helping the self (viz., selfish). This disparity was evident in both individualist and collectivist cultures, attesting to the universality of the selfish agent. Study 2 compared actors' and agents' motives to those of people role-playing highly prosocial or selfish exemplars. In content (Study 2a) and in the impressions they made on an outside observer (Study 2b), actors' motives were similar to those of the prosocial role-players, whereas agents' motives were similar to those of the selfish role-players. Study 3 accounted for the difference between the actor and agent: Participants claimed that their agent's motives were the more realistic and that their actor's motives were the more idealistic. The selfish agent/moral actor duality may account for why implicit and explicit measures of the same construct diverge, and why feeling watched brings out the better angels of human nature.

  13. Selfishness Level of Strategic Games

    NARCIS (Netherlands)

    Apt, K.R.; Schäfer, G.

    2014-01-01

    We introduce a new measure of the discrepancy in strategic games between the social welfare in a Nash equilibrium and in a social optimum, that we call selfishness level. It is the smallest fraction of the social welfare that needs to be offered to each player to achieve that a social optimum is

  14. Altruistic functions for selfish DNA.

    Science.gov (United States)

    Faulkner, Geoffrey J; Carninci, Piero

    2009-09-15

    Mammalian genomes are comprised of 30-50% transposed elements (TEs). The vast majority of these TEs are truncated and mutated fragments of retrotransposons that are no longer capable of transposition. Although initially regarded as important factors in the evolution of gene regulatory networks, TEs are now commonly perceived as neutrally evolving and non-functional genomic elements. In a major development, recent works have strongly contradicted this "selfish DNA" or "junk DNA" dogma by demonstrating that TEs use a host of novel promoters to generate RNA on a massive scale across most eukaryotic cells. This transcription frequently functions to control the expression of protein-coding genes via alternative promoters, cis regulatory non protein-coding RNAs and the formation of double stranded short RNAs. If considered in sum, these findings challenge the designation of TEs as selfish and neutrally evolving genomic elements. Here, we will expand upon these themes and discuss challenges in establishing novel TE functions in vivo.

  15. Collective intelligent wireless sensor networks

    NARCIS (Netherlands)

    Mihaylov, M.; Nowe, A.; Tuyls, K.P.; Nijholt, A.; Pantic, M.

    2008-01-01

    In this paper we apply the COllective INtelligence (COIN) framework ofWolpert et al. toWireless Sensor Networks (WSNs) with the aim to increase the autonomous lifetime of the network in a decentralized manner. COIN describes how selfish agents can learn to optimize their own performance, so that the

  16. Suicide and the selfish gene.

    Science.gov (United States)

    Satora, Leszek

    2005-01-01

    The application of an evolutionary perspective to human behaviour generates philosophical, political and scientific controversy. Modern human symbolic consciousness is not the cumulation of the long trend that natural selection would predict. The new archaeological data suggested the anatomical and behavioural innovation has been episodic and rare separated by long periods of stagnate. New behavioural mode and the new skeletal structure of modem human arose as an incidental exaptation. Additionally the genetic basis dysfunction connected with suicide behaviour and growing statistic suicide among teenager is contradictory to the theory that our behaviour are programmed in any detail by selfish genes. In this cases genetically determined suicidal behaviour should be rapidly eliminated by natural selection.

  17. Genealogical evidence for epidemics of selfish genes.

    Science.gov (United States)

    Ingvarsson, Par K; Taylor, Douglas R

    2002-08-20

    Some genetic elements spread infectiously in populations by increasing their rate of genetic transmission at the expense of other genes in the genome. These so-called selfish genetic elements comprise a substantial portion of eukaryotic genomes and have long been viewed as a potent evolutionary force. Despite this view, little is known about the evolutionary history of selfish genetic elements in natural populations, or their genetic effects on other portions of the genome. Here we use nuclear and chloroplast gene genealogies in two species of Silene to show the historical pattern of selection on a well known selfish genetic element, cytoplasmic male sterility. We provide evidence that evolution of cytoplasmic male sterility has been characterized by frequent turnovers of mutations in natural populations, thus supporting an epidemic model for the evolution of selfish genes, where new mutations repeatedly arise and rapidly sweep through populations.

  18. Genealogical evidence for epidemics of selfish genes

    OpenAIRE

    Ingvarsson, Pär K.; Taylor, Douglas R.

    2002-01-01

    Some genetic elements spread infectiously in populations by increasing their rate of genetic transmission at the expense of other genes in the genome. These so-called selfish genetic elements comprise a substantial portion of eukaryotic genomes and have long been viewed as a potent evolutionary force. Despite this view, little is known about the evolutionary history of selfish genetic elements in natural populations, or their genetic effects on other portions of the genome. Here we use nuclea...

  19. Appetite for the selfish gene.

    Science.gov (United States)

    Ostan, Iztok; Poljsak, Borut; Simcic, Marjan; Tijskens, L M M

    2010-06-01

    In developed countries, where the majority of the population has enough income to afford healthy diets, a large number of the inhabitants nevertheless choose unhealthy nutrition. WHO and FAO strategies to overcome this problem are mostly based on educational means. Implicitly, this approach is based on the presumption that the main causes of the problem are ignorance and culturally acquired bad habits. It has already been shown that wild animals, evidently acting solely on instinct without cultural effects, display tendencies that may damage their longevity: they tend to avoid healthy types of caloric restriction, prefer processed to raw food, and have an excessive intake of food stimulants and proteins when available (Ostan et al., 2009). This paper presents evidence for such nutritional patterns in humans as well and broadens the discourse to include proteins and fats and describes some human biological traits that present important differences between humans and other primates; among them are the human tendency for overeating and the inadequacy of a totally raw diet for human consumption (despite having some advantages for the human immune system). From an evolutionary perspective these strategies offer a biological advantage by enhancing the reproductive capability of the organisms, according to Dawkins' theory of the Selfish Gene. Genomic-based pleasure of such nutrition seems to be the main cause of instinctive nutritional drives. Further research on the process of food acceptance is needed to determine the role and importance of genomic-based pleasure compared to epigenetic or culture-based pleasure. Both, however, seem to be important and very stable factors in human nutritional choice and seem to prevail over conscious factors in food acceptance. Copyright 2010 Elsevier Ltd. All rights reserved.

  20. Evidence against the selfish operon theory.

    Science.gov (United States)

    Pál, Csaba; Hurst, Laurence D

    2004-06-01

    According to the selfish operon hypothesis, the clustering of genes and their subsequent organization into operons is beneficial for the constituent genes because it enables the horizontal gene transfer of weakly selected, functionally coupled genes. The majority of these are expected to be non-essential genes. From our analysis of the Escherichia coli genome, we conclude that the selfish operon hypothesis is unlikely to provide a general explanation for clustering nor can it account for the gene composition of operons. Contrary to expectations, essential genes with related functions have an especially strong tendency to cluster, even if they are not in operons. Moreover, essential genes are particularly abundant in operons.

  1. Assisted suicide of a selfish gene.

    Science.gov (United States)

    Thomson, M S; Beeman, R W

    1999-01-01

    Medea (M) factors and the hybrid incompatibility factor (H) are involved in two incompatibility systems in flour beetles that were previously thought to be independent. M factors are a novel class of selfish genes that act by maternal lethality to nonself. The H factor causes the death of hybrids with a paternally derived H gene and previously uncharacterized maternal cofactors. We now find that M factors exhibit their selfish behavior only in the absence of the H factor. Furthermore, we show that the previously uncharacterized maternal cofactors required for H-associated hybrid inviability are identical to M factors. We propose that incompatibility between H strains and M strains is due to suppression by the H factor of the self-rescuing activity of the lethal M genes. This interaction has the effect of converting M elements from selfish into self-destructive or "suicidal" genes. M factors are globally widespread, but are conspicuously absent from India, the only country where the H factor is known to occur. Such a mechanism could prevent the spread of selfish M elements by establishing an absolute barrier to hybridization in the boundary between M and non-M zones.

  2. Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Bakar, Kamalrulnizam Abu; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks. PMID:22368490

  3. Multipath routing in wireless sensor networks: survey and research challenges.

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Abu Bakar, Kamalrulnizam; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks.

  4. Selfishness and Cooperation: Challenge for Social Life

    Directory of Open Access Journals (Sweden)

    Szocik Konrad

    2017-07-01

    Full Text Available Cooperation is a great challenge for natural selection. Some scholars assume that cooperation could not evolve within the framework of natural selection. It is undeniable that natural selection, at least at the individual level, favors selfishness and defectors. Nonetheless, this selfish tendency does not necessarily imply that cooperation could not evolve by means of natural selection. In this paper, we specifically acknowledge certain basic challenges for the evolution of the human ability to cooperate at the level of large groups. In this paper, we discuss topics like the human ability for “supercooperation,” the importance of repetition and reputation, and Multilevel Selection Theory as the basic mechanisms of evolution of cooperation.

  5. A formal theory of the selfish gene.

    Science.gov (United States)

    Gardner, A; Welch, J J

    2011-08-01

    Adaptation is conventionally regarded as occurring at the level of the individual organism. In contrast, the theory of the selfish gene proposes that it is more correct to view adaptation as occurring at the level of the gene. This view has received much popular attention, yet has enjoyed only limited uptake in the primary research literature. Indeed, the idea of ascribing goals and strategies to genes has been highly controversial. Here, we develop a formal theory of the selfish gene, using optimization theory to capture the analogy of 'gene as fitness-maximizing agent' in mathematical terms. We provide formal justification for this view of adaptation by deriving mathematical correspondences that translate the optimization formalism into dynamical population genetics. We show that in the context of social interactions between genes, it is the gene's inclusive fitness that provides the appropriate maximand. Hence, genic selection can drive the evolution of altruistic genes. Finally, we use the formalism to assess the various criticisms that have been levelled at the theory of the selfish gene, dispelling some and strengthening others. © 2011 The Authors. Journal of Evolutionary Biology © 2011 European Society For Evolutionary Biology.

  6. A parasitic selfish gene that affects host promiscuity

    OpenAIRE

    Giraldo-Perez, Paulina; Goddard, Matthew R.

    2013-01-01

    Selfish genes demonstrate transmission bias and invade sexual populations despite conferring no benefit to their hosts. While the molecular genetics and evolutionary dynamics of selfish genes are reasonably well characterized, their effects on hosts are not. Homing endonuclease genes (HEGs) are one well-studied family of selfish genes that are assumed to be benign. However, we show that carrying HEGs is costly for Saccharomyces cerevisiae, demonstrating that these genetic elements are not nec...

  7. A parasitic selfish gene that affects host promiscuity.

    Science.gov (United States)

    Giraldo-Perez, Paulina; Goddard, Matthew R

    2013-11-07

    Selfish genes demonstrate transmission bias and invade sexual populations despite conferring no benefit to their hosts. While the molecular genetics and evolutionary dynamics of selfish genes are reasonably well characterized, their effects on hosts are not. Homing endonuclease genes (HEGs) are one well-studied family of selfish genes that are assumed to be benign. However, we show that carrying HEGs is costly for Saccharomyces cerevisiae, demonstrating that these genetic elements are not necessarily benign but maybe parasitic. We estimate a selective load of approximately 1-2% in 'natural' niches. The second aspect we examine is the ability of HEGs to affect hosts' sexual behaviour. As all selfish genes critically rely on sex for spread, then any selfish gene correlated with increased host sexuality will enjoy a transmission advantage. While classic parasites are known to manipulate host behaviour, we are not aware of any evidence showing a selfish gene is capable of affecting host promiscuity. The data presented here show a selfish element may increase the propensity of its eukaryote host to undergo sex and along with increased rates of non-Mendelian inheritance, this may counterbalance mitotic selective load and promote spread. Demonstration that selfish genes are correlated with increased promiscuity in eukaryotes connects with ideas suggesting that selfish genes promoted the evolution of sex initially.

  8. Game Theory for Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Shi, Hai-Yan; Wang, Wan-Liang; Kwok, Ngai-Ming; Chen, Sheng-Yong

    2012-01-01

    Game theory (GT) is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs). This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field. PMID:23012533

  9. Game Theory for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Ngai-Ming Kwok

    2012-07-01

    Full Text Available Game theory (GT is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs. This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field.

  10. Selfish brain and selfish immune system interplay: A theoretical framework for metabolic comorbidities of mood disorders.

    Science.gov (United States)

    Yamagata, Ana Sayuri; Mansur, Rodrigo Barbachan; Rizzo, Lucas Bortolotto; Rosenstock, Tatiana; McIntyre, Roger S; Brietzke, Elisa

    2017-01-01

    According to the "selfish brain" theory, the brain regulates its own energy supply influencing the peripheral metabolism and food intake according to its needs. The immune system has been likewise "selfish" due to independent energy consumption; and it may compete with the brain (another high energy-consumer) for glucose. In mood disorders, stress in mood episodes or physiological stress activate homeostasis mechanisms from the brain and the immune system to solve the imbalance. The interaction between the selfish brain and the selfish immune system may explain various conditions of medical impairment in mood disorders, such as Metabolic Syndrome (MetS), obesity, type 2 diabetes mellitus (T2DM) and immune dysregulation. The objective of this study is to comprehensively review the literature regarding the competition between the brain and the immune system for energy substrate. Targeting the energetic regulation of the brain and the immune system and their cross-talk open alternative treatments and a different approach in the study of general medical comorbidities in mood disorders, although more investigation is needed. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Ayn Rand: To be Selfish or Not to be Selfish--That is the Question

    Science.gov (United States)

    Doctor, Tyrus L.; Kritsonis, William Allan

    2009-01-01

    Ayn Rand's "The Virtue of Selfishness" (1961) is comprised of a philosophy that defies the entire premise of what our education system is and shall be built upon. The "Objectivist" perspective has depicted a clear distinction between the "Have's" and the "Have Not's" or the Bourgeoisie and Proletariat. The "Objectivist" perspective believes that…

  12. The Selfish Brain: Stress and Eating Behavior

    Directory of Open Access Journals (Sweden)

    Achim ePeters

    2011-05-01

    Full Text Available The brain occupies a special hierarchical position in human energy metabolism. If cerebral homeostasis is threatened, the brain behaves in a "selfish" manner by competing for energy resources with the body. Here we present a logistic approach, which is based on the principles of supply and demand known from economics. In this "cerebral supply chain" model, the brain constitutes the final consumer. In order to illustrate the operating mode of the cerebral supply chain, we take experimental data which allow to assess the supply, demand and need of the brain under conditions of psychosocial stress. The experimental results show that the brain under conditions of psychosocial stress actively demands energy from the body, in order to cover its increased energy needs. The data demonstrate that the stressed brain uses a mechanism referred to as "cerebral insulin suppression" to limit glucose fluxes into peripheral tissue (muscle, fat and to enhance cerebral glucose supply. Furthermore psychosocial stress elicits a marked increase in eating behavior in the post-stress phase. Subjects ingested more carbohydrates without any preference for sweet ingredients. These experimentally observed changes of cerebral demand, supply and need are integrated into a logistic framework describing the supply chain of the selfish brain.

  13. Trust framework for a secured routing in wireless sensor network

    Directory of Open Access Journals (Sweden)

    Ouassila Hoceini

    2015-11-01

    Full Text Available Traditional techniques to eliminate insider attacks developed for wired and wireless ad hoc networks are not well suited for wireless sensors networks due to their resource constraints nature. In order to protect WSNs against malicious and selfish behavior, some trust-based systems have recently been modeled. The resource efficiency and dependability of a trust system are the most fundamental requirements for any wireless sensor network (WSN. In this paper, we propose a Trust Framework for a Secured Routing in Wireless Sensor Network (TSR scheme, which works with clustered networks. This approach can effectively reduce the cost of trust evaluation and guarantee a better selection of safest paths that lead to the base station. Theoretical as well as simulation results show that our scheme requires less communication overheads and consumes less energy as compared to the current typical trust systems for WSNs. Moreover, it detects selfish and defective nodes and prevents us of insider attacks

  14. Sperm competition, immunity, selfish genes and cancer.

    Science.gov (United States)

    Lewis, Z; Price, T A R; Wedell, N

    2008-10-01

    Sperm competition is widespread and has played an important role in shaping male reproductive characters such as testis size and numbers of sperm produced, and this is reflected in the rapid evolution of many reproductive genes. Additionally, sperm competition has been implicated in the rapid evolution of seminal fluids. However, our understanding of the molecular basis of many traits thought to be important in sperm competition is rudimentary. Furthermore, links between sperm competition and a range of issues not directly related to reproduction are only just beginning to be explored. These include associations between sperm competition and selfish genes, immunity and diseases such as cancer.We briefly review these topics and suggest areas we consider worthy of additional research.

  15. Selfish Gene Algorithm Vs Genetic Algorithm: A Review

    Science.gov (United States)

    Ariff, Norharyati Md; Khalid, Noor Elaiza Abdul; Hashim, Rathiah; Noor, Noorhayati Mohamed

    2016-11-01

    Evolutionary algorithm is one of the algorithms inspired by the nature. Within little more than a decade hundreds of papers have reported successful applications of EAs. In this paper, the Selfish Gene Algorithms (SFGA), as one of the latest evolutionary algorithms (EAs) inspired from the Selfish Gene Theory which is an interpretation of Darwinian Theory ideas from the biologist Richards Dawkins on 1989. In this paper, following a brief introduction to the Selfish Gene Algorithm (SFGA), the chronology of its evolution is presented. It is the purpose of this paper is to present an overview of the concepts of Selfish Gene Algorithm (SFGA) as well as its opportunities and challenges. Accordingly, the history, step involves in the algorithm are discussed and its different applications together with an analysis of these applications are evaluated.

  16. The dynamics of maternal-effect selfish genetic elements.

    Science.gov (United States)

    Smith, N G

    1998-03-21

    Maternal-effect selfish genes such as Medea or Scat act to kill progeny that do not bear a copy of the selfish gene present in the mother. Previous models of this system allowed for two types of allele, the selfish (killer) type and the sensitive (susceptible) wild-type. These models predict that the invasion conditions of the selfish allele are quite broad and that if invasion is possible a high frequency equilibrium is to be expected. The selfish element is therefore predicted to persist. Here a hypothetical third allele that neither kills nor is killed (i.e. insensitive) is considered. Such an allele could enter a population by recombination, mutation or migration. The incorporation of this third allele profoundly affects the dynamics of the system and, under some parameter values, it is possible for the spread of the insensitive allele to lead, eventually, to the fixation of the wild-type allele (reversible evolution). This is most likely if the death of progeny provides no direct benefit to the surviving sibs (i.e. in the absence of fitness compensation), as in insects without gregarious broods. Under these circumstances the selfish element cannot spread when infinitely rare, only after having risen to some finite frequency. A fitness cost to bearing the killer allele then causes its loss. However, if fitness compensation is found (e.g. in placental mammals) the invasion of the selfish element from an infinitely low level is possible for a wide range of costs and both stable coexistences of all three alleles and limit cycles of all three are then found. It is therefore to be expected that in mammals selfish maternal-effect genes are more likely both to spread and to persist than in insects, due to their different levels of fitness compensation.

  17. Selfish cells in altruistic cell society - a theoretical oncology.

    Science.gov (United States)

    Chigira, M

    1993-09-01

    In multicellular organisms, internal evolution of individual cells is strictly forbidden and 'evolutional' DNA replication should be performed only by the sexual reproduction system. Wholistic negative control system called 'homeostasis' serves all service to germ line cells. All somatic cells are altruistic to the germ line cells. However, in malignant tumors, it seems that individual cells replicate and behave 'selfishly' and evolve against the internal microenvironment. Tumor cells only express the occult selfishness which is programmed in normal cells a priori. This phenomenon is based on the failure of identical DNA replication, and results in 'autonomy' and 'anomie' of cellular society as shown in tumor cells. Genetic programs of normal cells connote this cellular autonomy and anomie introduced by the deletion of regulators on structure genes. It is rather paradoxical that the somatic cells get their freedom from wholistic negative regulation programmed internally. However, this is not a true paradox, since multicellular organisms have clearly been evolved from 'monads' in which cells proliferate without wholistic regulation. Somatic cells revolt against germ cell DNA, called 'selfish replicator' by Dawkins. It is an inevitable destiny that the 'selfishness' coded in genome should be revenged by itself. Selfish replicator in germ cell line should be revolted by its selfishness in the expansion of somatic cells, since they have an orthogenesis to get more selfishness in order to increase their genome. Tumor heterogeneity and progression can be fully explained by this self-contradictory process which produces heterogeneous gene copies different from the original clone in the tumor, although 'selfish' gene replication is the final target of being. Furthermore, we have to discard the concept of clonality of tumor cells since genetic instability is a fundamental feature of tumors. Finally, tumor cells and proto-oncogenes can be considered as the ultimate parasite

  18. Ubiquitin--conserved protein or selfish gene?

    Science.gov (United States)

    Catic, André; Ploegh, Hidde L

    2005-11-01

    The posttranslational modifier ubiquitin is encoded by a multigene family containing three primary members, which yield the precursor protein polyubiquitin and two ubiquitin moieties, Ub(L40) and Ub(S27), that are fused to the ribosomal proteins L40 and S27, respectively. The gene encoding polyubiquitin is highly conserved and, until now, those encoding Ub(L40) and Ub(S27) have been generally considered to be equally invariant. The evolution of the ribosomal ubiquitin moieties is, however, proving to be more dynamic. It seems that the genes encoding Ub(L40) and Ub(S27) are actively maintained by homologous recombination with the invariant polyubiquitin locus. Failure to recombine leads to deterioration of the sequence of the ribosomal ubiquitin moieties in several phyla, although this deterioration is evidently constrained by the structural requirements of the ubiquitin fold. Only a few amino acids in ubiquitin are vital for its function, and we propose that conservation of all three ubiquitin genes is driven not only by functional properties of the ubiquitin protein, but also by the propensity of the polyubiquitin locus to act as a 'selfish gene'.

  19. The selfish brain: competition for energy resources.

    Science.gov (United States)

    Fehm, H L; Kern, W; Peters, A

    2006-01-01

    stimulate the activity of the PVN in a way similar to the activation by the hippocampus-amydala system. The activity of PVN is influenced by the hippocampal outflow which in turn is the consequence of a balance of low-affinity and high-affinity glucocorticoid receptors. This set-point can permanently be displaced by extreme stress situations, by starvation, exercise, hormones, drugs or by endocrine-disrupting chemicals. Disorders in the "energy on request" process will influence the allocation of energy and in so doing alter the body mass of the organism. In this "selfish brain theory" the neocortex and the limbic system play a central role in the pathogenesis of diseases, such as anorexia nervosa, obesity and diabetes mellitus type II. From these considerations it appears that the primary disturbance in obesity is a displacement of the hippocampal set-point of the system. The resulting permanent activation of the feedback system must result in a likewise permanent activation of the sympatico-adrenal system, which induces insulin resistance, hypertension and the other components of the metabolic syndrome. Available therapies for treatment of the metabolic syndrome (blockade of alpha- and beta-adrenergic receptors, insulin and insulin secretagogues) interfere with mechanisms, which must be considered compensatory. This explains why these therapies are disappointing in the long run. New therapeutic strategies based on the "selfish brain theory" will be discussed.

  20. Social Motivation: Costs and Benefits of Selfishness and Otherishness.

    Science.gov (United States)

    Crocker, Jennifer; Canevello, Amy; Brown, Ashley A

    2017-01-03

    We examine recent evidence on the consequences of selfishness and otherishness for psychological well-being, physical health, and relationships. In the first sections, we consider recent evidence regarding the costs and benefits of giving time, money, and support to others and the costs and benefits of taking or receiving those things from others. Then, because the behaviors of giving and taking can be motivated either by selfish or otherish concerns, we next consider the costs and benefits of the motivation underlying giving and taking. We also examine why and for whom selfishness and otherishness have consequences for psychological well-being, physical health, and relationships. We focus on mechanisms identified in research, including intrapsychic mechanisms such as positive and negative affect, self-esteem and self-efficacy, a sense of meaning and purpose in life, and a sense of connectedness to or isolation from others, as well as interpersonal processes such as reciprocation of support and responsiveness.

  1. A maternal-effect selfish genetic element in Caenorhabditis elegans.

    Science.gov (United States)

    Ben-David, Eyal; Burga, Alejandro; Kruglyak, Leonid

    2017-06-09

    Selfish genetic elements spread in natural populations and have an important role in genome evolution. We discovered a selfish element causing embryonic lethality in crosses between wild strains of the nematode Caenorhabditis elegans The element is made up of sup-35 , a maternal-effect toxin that kills developing embryos, and pha-1 , its zygotically expressed antidote. pha-1 has long been considered essential for pharynx development on the basis of its mutant phenotype, but this phenotype arises from a loss of suppression of sup-35 toxicity. Inactive copies of the sup-35/pha-1 element show high sequence divergence from active copies, and phylogenetic reconstruction suggests that they represent ancestral stages in the evolution of the element. Our results suggest that other essential genes identified by genetic screens may turn out to be components of selfish elements. Copyright © 2017, American Association for the Advancement of Science.

  2. Social insects: from selfish genes to self organisation and beyond

    DEFF Research Database (Denmark)

    Boomsma, Jacobus Jan; Franks, Nigel R.

    2006-01-01

    Selfish gene and self-organisation approaches have revolutionised the study of social insects and have provided unparalleled insights into the highly sophisticated nature of insect social evolution. Here, we briefly review the core programs and interfaces with communication and recognition studies...

  3. Cancer : A reproductive strategy of "ultra-selfish" genes?

    NARCIS (Netherlands)

    Schuiling, GA

    2004-01-01

    A hypothesis is presented in which the process of "malignant transformation" which ultimately results in the rapidly dividing tumor(s)(cells) causing "cancer", is regarded as an evolved reproductive strategy of "ultra-selfish" (proto-)(onco-) genes, already present in the genome, or introduced by a

  4. Cancer: a reproductive strategy of "ultra-selfish" genes?

    Science.gov (United States)

    Schuiling, G A

    2004-01-01

    A hypothesis is presented in which the process of "malignant transformation" which ultimately results in the rapidly dividing tumor(s)(cells) causing "cancer", is regarded as an evolved reproductive strategy of "ultra-selfish" (proto-)(onco-) genes, already present in the genome, or introduced by a virus.

  5. Social insects: from selfish genes to self organisation and beyond.

    Science.gov (United States)

    Boomsma, Jacobus J; Franks, Nigel R

    2006-06-01

    Selfish gene and self-organisation approaches have revolutionised the study of social insects and have provided unparalleled insights into the highly sophisticated nature of insect social evolution. Here, we briefly review the core programs and interfaces with communication and recognition studies that characterise these fields today, and offer an interdisciplinary future perspective for the study of social insect evolutionary biology.

  6. Preschoolers' group bias in punishing selfishness in the Ultimatum Game.

    Science.gov (United States)

    Wu, Zhen; Gao, Xiaohe

    2018-02-01

    Previous studies have shown that both adults and children tend to favor members of their own group and expect reciprocity of such in-group privilege. If a person is treated unfairly by an in-group member, a conflict arises between the tendency of in-group favoritism and the desire to punish violators of in-group norms. How do children solve the conflict at different points in development? We compared how preschoolers punished in-group and out-group members (marked by color preference) for selfishness in the Ultimatum Game. We found that (a) 3- to 6-year-old Chinese children rejected selfish allocations more often than fair ones, showing a robust preference for fairness; (b) 3- and 4-year-olds showed no group differences in their punishment behavior, suggesting that second-party punishment of selfishness is not biased during early childhood; (c) 5- and 6-year-old girls were more likely to punish selfishness of in-groups than of out-groups, illuminating an early sign of maintaining group-based fairness norms even at a personal cost; and (d) 5- and 6-year-old boys, however, punished in-groups and out-groups equally often and punished out-groups more often than did girls. These age and gender differences in children's punishment imply that socialization may play an important role in showing group bias when enforcing fairness norms. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Selfish goals serve more fundamental social and biological goals.

    Science.gov (United States)

    Becker, D Vaughn; Kenrick, Douglas T

    2014-04-01

    Proximate selfish goals reflect the machinations of more fundamental goals such as self-protection and reproduction. Evolutionary life history theory allows us to make predictions about which goals are prioritized over others, which stimuli release which goals, and how the stages of cognitive processing are selectively influenced to better achieve the aims of those goals.

  8. Fast Packet forwarding Engine Based on Software Circuits

    NARCIS (Netherlands)

    Makkes, M.X.; Varabanescu, A.; Laat, C. de; Meijer, R.J.

    2015-01-01

    Forwarding packets is part of the performance critical path of routing devices, and affects the network performance at any scale. This operation is typically performed by dedicated routing boxes, which are fast, but expensive and inflexible. Recent work has shown that in many cases commodity

  9. Efficient packet forwarding using cyber-security aware policies

    Science.gov (United States)

    Ros-Giralt, Jordi

    2017-10-25

    For balancing load, a forwarder can selectively direct data from the forwarder to a processor according to a loading parameter. The selective direction includes forwarding the data to the processor for processing, transforming and/or forwarding the data to another node, and dropping the data. The forwarder can also adjust the loading parameter based on, at least in part, feedback received from the processor. One or more processing elements can store values associated with one or more flows into a structure without locking the structure. The stored values can be used to determine how to direct the flows, e.g., whether to process a flow or to drop it. The structure can be used within an information channel providing feedback to a processor.

  10. Security for multi-hop wireless networks

    CERN Document Server

    Mahmoud, Mohamed M E A

    2014-01-01

    This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security

  11. Bacterial toxin-antitoxin systems: more than selfish entities?

    OpenAIRE

    Laurence Van Melderen; Manuel Saavedra De Bast

    2009-01-01

    Bacterial toxin?antitoxin (TA) systems are diverse and widespread in the prokaryotic kingdom. They are composed of closely linked genes encoding a stable toxin that can harm the host cell and its cognate labile antitoxin, which protects the host from the toxin's deleterious effect. TA systems are thought to invade bacterial genomes through horizontal gene transfer. Some TA systems might behave as selfish elements and favour their own maintenance at the expense of their host. As a consequence,...

  12. Cellular evidence for selfish spermatogonial selection in aged human testes.

    Science.gov (United States)

    Maher, G J; Goriely, A; Wilkie, A O M

    2014-05-01

    Owing to a recent trend for delayed paternity, the genomic integrity of spermatozoa of older men has become a focus of increased interest. Older fathers are at higher risk for their children to be born with several monogenic conditions collectively termed paternal age effect (PAE) disorders, which include achondroplasia, Apert syndrome and Costello syndrome. These disorders are caused by specific mutations originating almost exclusively from the male germline, in genes encoding components of the tyrosine kinase receptor/RAS/MAPK signalling pathway. These particular mutations, occurring randomly during mitotic divisions of spermatogonial stem cells (SSCs), are predicted to confer a selective/growth advantage on the mutant SSC. This selective advantage leads to a clonal expansion of the mutant cells over time, which generates mutant spermatozoa at levels significantly above the background mutation rate. This phenomenon, termed selfish spermatogonial selection, is likely to occur in all men. In rare cases, probably because of additional mutational events, selfish spermatogonial selection may lead to spermatocytic seminoma. The studies that initially predicted the clonal nature of selfish spermatogonial selection were based on DNA analysis, rather than the visualization of mutant clones in intact testes. In a recent study that aimed to identify these clones directly, we stained serial sections of fixed testes for expression of melanoma antigen family A4 (MAGEA4), a marker of spermatogonia. A subset of seminiferous tubules with an appearance and distribution compatible with the predicted mutant clones were identified. In these tubules, termed 'immunopositive tubules', there is an increased density of spermatogonia positive for markers related to selfish selection (FGFR3) and SSC self-renewal (phosphorylated AKT). Here we detail the properties of the immunopositive tubules and how they relate to the predicted mutant clones, as well as discussing the utility of

  13. Development of synthetic selfish elements based on modular nucleases in Drosophila melanogaster

    OpenAIRE

    Simoni, A; Siniscalchi, C; Chan, Y-S; Huen, DS; Russell, S; Windbichler, N; Crisanti, A

    2014-01-01

    Selfish genes are DNA elements that increase their rate of genetic transmission at the expense of other genes in the genome and can therefore quickly spread within a population. It has been suggested that selfish elements could be exploited to modify the genome of entire populations for medical and ecological applications. Here we report that transcription activator-like effector nuclease (TALEN) and zinc finger nuclease (ZFN) can be engineered into site-specific synthetic selfish elements (S...

  14. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  15. Selfish operons: the evolutionary impact of gene clustering in prokaryotes and eukaryotes.

    Science.gov (United States)

    Lawrence, J

    1999-12-01

    The Selfish Operon Model postulates that the organization of bacterial genes into operons is beneficial to the constituent genes in that proximity allows horizontal cotransfer of all genes required for a selectable phenotype; eukaryotic operons formed for very different reasons. Horizontal transfer of selfish operons most probably promotes bacterial diversification.

  16. The Price of Selfish Stackelberg Leadership in a Network Game

    OpenAIRE

    Goldberg, P. W.; Polpinit, P.

    2007-01-01

    We study a class of games in which a finite number of agents each controls a quantity of flow to be routed through a network, and are able to split their own flow between multiple paths through the network. Recent work on this model has contrasted the social cost of Nash equilibria with the best possible social cost. Here we show that additional costs are incurred in situations where a selfish ``leader'' agent allocates his flow, and then commits to that choice so that other agents are compel...

  17. Selfish DNA in protein-coding genes of Rickettsia.

    Science.gov (United States)

    Ogata, H; Audic, S; Barbe, V; Artiguenave, F; Fournier, P E; Raoult, D; Claverie, J M

    2000-10-13

    Rickettsia conorii, the aetiological agent of Mediterranean spotted fever, is an intracellular bacterium transmitted by ticks. Preliminary analyses of the nearly complete genome sequence of R. conorii have revealed 44 occurrences of a previously undescribed palindromic repeat (150 base pairs long) throughout the genome. Unexpectedly, this repeat was found inserted in-frame within 19 different R. conorii open reading frames likely to encode functional proteins. We found the same repeat in proteins of other Rickettsia species. The finding of a mobile element inserted in many unrelated genes suggests the potential role of selfish DNA in the creation of new protein sequences.

  18. Quantum selfish gene (biological evolution in terms of quantum mechanics)

    OpenAIRE

    Ozhigov, Yuri I.

    2013-01-01

    I propose to treat the biological evolution of genoms by means of quantum mechanical tools. We start with the concept of meta- gene, which specifies the "selfish gene" of R.Dawkins. Meta- gene encodes the abstract living unity, which can live relatively independently of the others, and can contain a few real creatures. Each population of living creatures we treat as the wave function on meta- genes, which module squared is the total number of creatures with the given meta-gene, and the phase ...

  19. GTRF: a game theory approach for regulating node behavior in real-time wireless sensor networks.

    Science.gov (United States)

    Lin, Chi; Wu, Guowei; Pirozmand, Poria

    2015-06-04

    The selfish behaviors of nodes (or selfish nodes) cause packet loss, network congestion or even void regions in real-time wireless sensor networks, which greatly decrease the network performance. Previous methods have focused on detecting selfish nodes or avoiding selfish behavior, but little attention has been paid to regulating selfish behavior. In this paper, a Game Theory-based Real-time & Fault-tolerant (GTRF) routing protocol is proposed. GTRF is composed of two stages. In the first stage, a game theory model named VA is developed to regulate nodes' behaviors and meanwhile balance energy cost. In the second stage, a jumping transmission method is adopted, which ensures that real-time packets can be successfully delivered to the sink before a specific deadline. We prove that GTRF theoretically meets real-time requirements with low energy cost. Finally, extensive simulations are conducted to demonstrate the performance of our scheme. Simulation results show that GTRF not only balances the energy cost of the network, but also prolongs network lifetime.

  20. Selfish prion of Rnq1 mutant in yeast.

    Science.gov (United States)

    Kurahashi, Hiroshi; Shibata, Shoichiro; Ishiwata, Masao; Nakamura, Yoshikazu

    2009-05-01

    [PIN(+)] is a prion form of Rnq1 in Saccharomyces cerevisiae and is necessary for the de novo induction of a second prion, [PSI(+)]. We previously isolated a truncated form of Rnq1, named Rnq1Delta100, as a [PSI(+)]-eliminating factor in S. cerevisiae. Rnq1Delta100 deletes the N-terminal non-prion domain of Rnq1, and eliminates [PSI(+)] in [PIN(+)] yeast. Here we found that [PIN(+)] is transmissible to Rnq1Delta100 in the absence of full-length Rnq1, forming a novel prion variant [RNQ1Delta100(+)]. [RNQ1Delta100(+)] has similar [PIN(+)] properties as it stimulates the de novo induction of [PSI(+)] and is eliminated by the null hsp104Delta mutation, but not by Hsp104 overproduction. In contrast, [RNQ1Delta100(+)] inherits the inhibitory activity and hampers the maintenance of [PSI(+)] though less efficiently than [PIN(+)] made of Rnq1-Rnq1Delta100 co-aggregates. Interestingly, [RNQ1Delta100(+)] prion was eliminated by de novo [PSI(+)] induction. Thus, the [RNQ1Delta100(+)] prion demonstrates selfish activity to eliminate a heterologous prion in S. cerevisiae, showing the first instance of a selfish prion variant in living organisms.

  1. Endoribonuclease type II toxin-antitoxin systems: functional or selfish?

    Science.gov (United States)

    Ramisetty, Bhaskar Chandra Mohan; Santhosh, Ramachandran Sarojini

    2017-07-01

    Most bacterial genomes have multiple type II toxin-antitoxin systems (TAs) that encode two proteins which are referred to as a toxin and an antitoxin. Toxins inhibit a cellular process, while the interaction of the antitoxin with the toxin attenuates the toxin's activity. Endoribonuclease-encoding TAs cleave RNA in a sequence-dependent fashion, resulting in translational inhibition. To account for their prevalence and retention by bacterial genomes, TAs are credited with clinically significant phenomena, such as bacterial programmed cell death, persistence, biofilms and anti-addiction to plasmids. However, the programmed cell death and persistence hypotheses have been challenged because of conceptual, methodological and/or strain issues. In an alternative view, chromosomal TAs seem to be retained by virtue of addiction at two levels: via a poison-antidote combination (TA proteins) and via transcriptional reprogramming of the downstream core gene (due to integration). Any perturbation in the chromosomal TA operons could cause fitness loss due to polar effects on the downstream genes and hence be detrimental under natural conditions. The endoribonucleases encoding chromosomal TAs are most likely selfish DNA as they are retained by bacterial genomes, even though TAs do not confer a direct advantage via the TA proteins. TAs are likely used by various replicons as 'genetic arms' that allow the maintenance of themselves and associated genetic elements. TAs seem to be the 'selfish arms' that make the best use of the 'arms race' between bacterial genomes and plasmids.

  2. Selfish evolution of cytonuclear hybrid incompatibility in Mimulus.

    Science.gov (United States)

    Case, Andrea L; Finseth, Findley R; Barr, Camille M; Fishman, Lila

    2016-09-14

    Intraspecific coevolution between selfish elements and suppressors may promote interspecific hybrid incompatibility, but evidence of this process is rare. Here, we use genomic data to test alternative models for the evolution of cytonuclear hybrid male sterility in Mimulus In hybrids between Iron Mountain (IM) Mimulus guttatus × Mimulus nasutus, two tightly linked M. guttatus alleles (Rf1/Rf2) each restore male fertility by suppressing a local mitochondrial male-sterility gene (IM-CMS). Unlike neutral models for the evolution of hybrid incompatibility loci, selfish evolution predicts that the Rf alleles experienced strong selection in the presence of IM-CMS. Using whole-genome sequences, we compared patterns of population-genetic variation in Rf at IM to a neighbouring population that lacks IM-CMS. Consistent with local selection in the presence of IM-CMS, the Rf region shows elevated FST, high local linkage disequilibrium and a distinct haplotype structure at IM, but not at Cone Peak (CP), suggesting a recent sweep in the presence of IM-CMS. In both populations, Rf2 exhibited lower polymorphism than other regions, but the low-diversity outliers were different between CP and IM. Our results confirm theoretical predictions of ubiquitous cytonuclear conflict in plants and provide a population-genetic mechanism for the evolution of a common form of hybrid incompatibility. © 2016 The Author(s).

  3. Evolution of discrimination in populations at equilibrium between selfishness and altruism.

    Science.gov (United States)

    Sibly, Richard M; Curnow, Robert N

    2012-11-21

    Where there is genetically based variation in selfishness and altruism, as in man, altruists with an innate ability to recognise and thereby only help their altruistic relatives may evolve. Here we use diploid population genetic models to chart the evolution of genetically-based discrimination in populations initially in stable equilibrium between altruism and selfishness. The initial stable equilibria occur because help is assumed subject to diminishing returns. Similar results were obtained whether we used a model with two independently inherited loci, one controlling altruism the other discrimination, or a one locus model with three alleles. The latter is the opposite extreme to the first model, and can be thought of as involving complete linkage between two loci on the same chromosome. The introduction of discrimination reduced the benefits obtained by selfish individuals, more so as the number of discriminators increased, and selfishness was eventually eliminated in some cases. In others selfishness persisted and the evolutionary outcome was a stable equilibrium involving selfish individuals and both discriminating and non-discriminating altruists. Heritable variation in selfishness, altruism and discrimination is predicted to be particularly evident among full sibs. The suggested coexistence of these three genetic dispositions could explain widespread interest within human social groups as to who will and who will not help others. These predictions merit experimental and observational investigation by primatologists, anthropologists and psychologists. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  5. Handbook on theoretical and algorithmic aspects of sensor, ad hoc wireless, and peer-to-peer networks

    CERN Document Server

    Wu, Jie

    2005-01-01

    PrefaceAD HOC WIRELESS NETWORKSA Modular Cross Layer Architecture for Ad Hoc Networks, M. Conti, J. Crowcroft, G. Maselli, and G. TuriRouting Scalability in MANETs, J. Eriksson, S. Krishnamurthy and M. FaloutsosUniformly Distributed Algorithm for Virtual Backbone Routing in Ad Hoc Wireless Networks, D.S. KimMaximum Necessary Hop Count for Packet Routing in MANET, X. Chen and J. ShenEfficient Strategyproof Multicast in Selfish Wireless Networks, X.-Yang LiGeocasting in Ad Hoc and Sensor Networks, I. StojmenovicTopology Control for Ad hoc Networks: Present Solutions and Open Issues, C.-C. Shen a

  6. Bacterial toxin-antitoxin systems: more than selfish entities?

    Science.gov (United States)

    Van Melderen, Laurence; Saavedra De Bast, Manuel

    2009-03-01

    Bacterial toxin-antitoxin (TA) systems are diverse and widespread in the prokaryotic kingdom. They are composed of closely linked genes encoding a stable toxin that can harm the host cell and its cognate labile antitoxin, which protects the host from the toxin's deleterious effect. TA systems are thought to invade bacterial genomes through horizontal gene transfer. Some TA systems might behave as selfish elements and favour their own maintenance at the expense of their host. As a consequence, they may contribute to the maintenance of plasmids or genomic islands, such as super-integrons, by post-segregational killing of the cell that loses these genes and so suffers the stable toxin's destructive effect. The function of the chromosomally encoded TA systems is less clear and still open to debate. This Review discusses current hypotheses regarding the biological roles of these evolutionarily successful small operons. We consider the various selective forces that could drive the maintenance of TA systems in bacterial genomes.

  7. Selfish genetic elements, genetic conflict, and evolutionary innovation.

    Science.gov (United States)

    Werren, John H

    2011-06-28

    Genomes are vulnerable to selfish genetic elements (SGEs), which enhance their own transmission relative to the rest of an individual's genome but are neutral or harmful to the individual as a whole. As a result, genetic conflict occurs between SGEs and other genetic elements in the genome. There is growing evidence that SGEs, and the resulting genetic conflict, are an important motor for evolutionary change and innovation. In this review, the kinds of SGEs and their evolutionary consequences are described, including how these elements shape basic biological features, such as genome structure and gene regulation, evolution of new genes, origin of new species, and mechanisms of sex determination and development. The dynamics of SGEs are also considered, including possible "evolutionary functions" of SGEs.

  8. On the Social Cost of Distributed Selfish Content Replication

    DEFF Research Database (Denmark)

    Pollatos, Gerasimos G.; Telelis, Orestis A.; Zissimopoulos, Vassilis

    2008-01-01

    We study distributed content replication networks formed voluntarily by selfish autonomous users, seeking access to information objects that originate form distant servers. Each user caters to minimization of its individual access cost by replicating locally (up to constrained storage capacity......) a subset of objects, and accessing the rest form the nearest possible location. We show existence of stable networks by proving existence of pure strategy Nash equilibria for a game-theoretic formulation of this situation. Social (overall) cost of stable networks is measured by the average...... or by the maximum access cost experienced by any user. We study socially most and least expensive stable networks by means of tight bounds on the ratios of the Price of Anarchy and Stability respectively. Although in the worst case the ratios may coincide, we identify cases where they differ significantly. We...

  9. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  10. PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T.V.P.Sundararajan

    2010-06-01

    Full Text Available Mobile Ad hoc Networks (MANETs rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. This paper pointed out Energy based selfish nodes (EBSN where these selfish nodes tend to use the network but do not cooperate, saving battery life for their own communications [2],[3]. We present a simulation study of the effects of Energy based selfish nodes (EBSN on DSR routing protocol and its impact over network performance in terms of throughput and delay of a mobile ad hoc network where a defined percentage of nodes were misbehaving.

  11. Exponential Reliability Coefficient based Reputation Mechanism for isolating selfish nodes in MANETs

    Directory of Open Access Journals (Sweden)

    J. Sengathir

    2015-07-01

    Full Text Available In mobile ad hoc networks, cooperation among active mobile nodes is considered to play a vital role in reliable transmission of data. But, the selfish mobile nodes present in an ad hoc environment refuse to forward neighbouring nodes’ packet for conserving its own energy. This intentional selfish behaviour drastically reduces the degree of cooperation maintained between the mobile nodes. Hence, a need arises for devising an effective mechanism which incorporates both energy efficiency and reputation into account for mitigating selfish behaviour in MANETs. In this paper, we propose an Exponential Reliability Coefficient based reputation Mechanism (ERCRM which isolates the selfish nodes from the routing path based on Exponential Reliability Coefficient (ExRC. This reliability coefficient manipulated through exponential failure rate based on moving average method highlights the most recent past behaviour of the mobile nodes for quantifying its genuineness. From the simulation results, it is evident that, the proposed ERCRM approach outperforms the existing Packet Conservation Monitoring Algorithm (PCMA and Spilt Half Reliability Coefficient based Mathematical Model (SHRCM in terms of performance evaluation metrics such as packet delivery ratio, throughput, total overhead and control overhead. Further, this ERCRM mechanism has a successful rate of 28% in isolating the selfish nodes from the routing path. Furthermore, it also aids in framing the exponential threshold point of detection as 0.4, where a maximum number of selfish nodes are identified when compared to the existing models available in the literature.

  12. Selfish genetic elements and the gene’s-eye view of evolution

    Science.gov (United States)

    2016-01-01

    During the last few decades, we have seen an explosion in the influx of details about the biology of selfish genetic elements. Ever since the early days of the field, the gene’s-eye view of Richard Dawkins, George Williams, and others, has been instrumental to make sense of new empirical observations and to the generation of new hypotheses. However, the close association between selfish genetic elements and the gene’s-eye view has not been without critics and several other conceptual frameworks have been suggested. In particular, proponents of multilevel selection models have used selfish genetic elements to criticize the gene’s-eye view. In this paper, I first trace the intertwined histories of the study of selfish genetic elements and the gene’s-eye view and then discuss how their association holds up when compared with other proposed frameworks. Next, using examples from transposable elements and the major transitions, I argue that different models highlight separate aspects of the evolution of selfish genetic elements and that the productive way forward is to maintain a plurality of perspectives. Finally, I discuss how the empirical study of selfish genetic elements has implications for other conceptual issues associated with the gene’s-eye view, such as agential thinking, adaptationism, and the role of fitness maximizing models in evolution. PMID:29491953

  13. Reproductive bribing and policing as evolutionary mechanisms for the suppression of within-group selfishness.

    Science.gov (United States)

    Reeve, H K; Keller, L

    1997-07-01

    We show that a new, simple, and robust general mechanism for the social suppression of within-group selfishness follows from Hamilton's rule applied in a multilevel selection approach to asymmetrical, two-person groups: If it pays a group member to behave selfishly (i.e., increase its share of the group's reproduction, at the expense of group productivity), then its partner will virtually always be favored to provide a reproductive "bribe" sufficient to remove the incentive for the selfish behavior. The magnitude of the bribe will vary directly with the number of offspring (or other close kin) potentially gained by the selfish individual and inversely with both the relatedness r between the interactants and the loss in group productivity because of selfishness. This bribe principle greatly extends the scope for cooperation within groups. Reproductive bribing is more likely to be favored over social policing for dominants rather than subordinates and as intragroup relatedness increases. Finally, analysis of the difference between the group optimum for an individual's behavior and the individual's inclusive fitness optimum reveals a paradoxical feedback loop by which bribing and policing, while nullifying particular selfish acts, automatically widen the separation of individual and group optima for other behaviors (i.e., resolution of one conflict intensifies others).

  14. A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Khan, Anwar; Ahmedy, Ismail; Anisi, Mohammad Hossein; Javaid, Nadeem; Ali, Ihsan; Khan, Nawsher; Alsaqer, Mohammed; Mahmood, Hasan

    2018-01-09

    Interference and energy holes formation in underwater wireless sensor networks (UWSNs) threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM) routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay.

  15. A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Anwar Khan

    2018-01-01

    Full Text Available Interference and energy holes formation in underwater wireless sensor networks (UWSNs threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay.

  16. Hierarchically Coordinated Power Management for Target Tracking in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Feng Juan

    2013-10-01

    Full Text Available Energy efficiency is very important for wireless sensor networks (WSNs since sensor nodes have a limited energy supply from a battery. So far, a lot research has focused on this issue, while less emphasis has been placed on the adaptive sleep time for each node with a consideration for the application constraints. In this paper, we propose a hierarchically coordinated power management (HCPM approach, which both addresses the energy conservation problem and reduces the packet forwarding delay for target tracking WSNs based on a virtual-grid-based network structure. We extend the network lifetime by adopting an adaptive sleep scheduling scheme that combines the local power management (PM and the adaptive coordinate PM strategies to schedule the activities of the sensor nodes at the surveillance stage. Furthermore, we propose a hierarchical structure for the tracking stage. Experimental results show that the proposed approach has a greater capability of extending the network lifetime while maintaining a short transmission delay when compared with the protocol which does not consider the application constraints in target tracking sensor networks.

  17. An Improved Forwarding of Diverse Events with Mobile Sinks in Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Raza, Waseem; Arshad, Farzana; Ahmed, Imran; Abdul, Wadood; Ghouzali, Sanaa; Niaz, Iftikhar Azim; Javaid, Nadeem

    2016-11-04

    In this paper, a novel routing strategy to cater the energy consumption and delay sensitivity issues in deep underwater wireless sensor networks is proposed. This strategy is named as ESDR: Event Segregation based Delay sensitive Routing. In this strategy sensed events are segregated on the basis of their criticality and, are forwarded to their respective destinations based on forwarding functions. These functions depend on different routing metrics like: Signal Quality Index, Localization free Signal to Noise Ratio, Energy Cost Function and Depth Dependent Function. The problem of incomparable values of previously defined forwarding functions causes uneven delays in forwarding process. Hence forwarding functions are redefined to ensure their comparable values in different depth regions. Packet forwarding strategy is based on the event segregation approach which forwards one third of the generated events (delay sensitive) to surface sinks and two third events (normal events) are forwarded to mobile sinks. Motion of mobile sinks is influenced by the relative distribution of normal nodes. We have also incorporated two different mobility patterns named as; adaptive mobility and uniform mobility for mobile sinks. The later one is implemented for collecting the packets generated by the normal nodes. These improvements ensure optimum holding time, uniform delay and in-time reporting of delay sensitive events. This scheme is compared with the existing ones and outperforms the existing schemes in terms of network lifetime, delay and throughput.

  18. Efficient Actor Recovery Paradigm for Wireless Sensor and Actor Networks.

    Science.gov (United States)

    Mahjoub, Reem K; Elleithy, Khaled

    2017-04-14

    The actor nodes are the spine of wireless sensor and actor networks (WSANs) that collaborate to perform a specific task in an unverified and uneven environment. Thus, there is a possibility of high failure rate in such unfriendly scenarios due to several factors such as power consumption of devices, electronic circuit failure, software errors in nodes or physical impairment of the actor nodes and inter-actor connectivity problem. Therefore, it is extremely important to discover the failure of a cut-vertex actor and network-disjoint in order to improve the Quality-of-Service (QoS). In this paper, we propose an Efficient Actor Recovery (EAR) paradigm to guarantee the contention-free traffic-forwarding capacity. The EAR paradigm consists of a Node Monitoring and Critical Node Detection (NMCND) algorithm that monitors the activities of the nodes to determine the critical node. In addition, it replaces the critical node with backup node prior to complete node-failure which helps balancing the network performance. The packets are handled using Network Integration and Message Forwarding (NIMF) algorithm that determines the source of forwarding the packets; either from actor or sensor. This decision-making capability of the algorithm controls the packet forwarding rate to maintain the network for a longer time. Furthermore, for handling the proper routing strategy, Priority-Based Routing for Node Failure Avoidance (PRNFA) algorithm is deployed to decide the priority of the packets to be forwarded based on the significance of information available in the packet. To validate the effectiveness of the proposed EAR paradigm, the proposed algorithms were tested using OMNET++ simulation.

  19. Preventing the impact of selfish behavior under MANET using ...

    Indian Academy of Sciences (India)

    K Rama Abirami

    2018-04-13

    Apr 13, 2018 ... On Demand Distance Vector (AODV) routing protocol and an extensive analysis on the performance of the proposed .... flexible or adaptable to network dynamics. A secure ... change credit value, (v) did not pay attention to the fairness issue in .... the simulation, the wireless channel capacity of mobile.

  20. Wireless Cybersecurity

    Science.gov (United States)

    2013-04-01

    completely change the entire landscape. For example, under the quantum computing regime, factoring prime numbers requires only polynomial time (i.e., Shor’s...AFRL-OSR-VA-TR-2013-0206 Wireless Cybersecurity Biao Chen Syracuse University April 2013 Final Report DISTRIBUTION A...19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 21-02-2013 FINAL REPORT 01-04-2009 TO 30-11-2012 Wireless Cybersecurity

  1. Genetic addiction: selfish gene's strategy for symbiosis in the genome.

    Science.gov (United States)

    Mochizuki, Atsushi; Yahara, Koji; Kobayashi, Ichizo; Iwasa, Yoh

    2006-02-01

    The evolution and maintenance of the phenomenon of postsegregational host killing or genetic addiction are paradoxical. In this phenomenon, a gene complex, once established in a genome, programs death of a host cell that has eliminated it. The intact form of the gene complex would survive in other members of the host population. It is controversial as to why these genetic elements are maintained, due to the lethal effects of host killing, or perhaps some other properties are beneficial to the host. We analyzed their population dynamics by analytical methods and computer simulations. Genetic addiction turned out to be advantageous to the gene complex in the presence of a competitor genetic element. The advantage is, however, limited in a population without spatial structure, such as that in a well-mixed liquid culture. In contrast, in a structured habitat, such as the surface of a solid medium, the addiction gene complex can increase in frequency, irrespective of its initial density. Our demonstration that genomes can evolve through acquisition of addiction genes has implications for the general question of how a genome can evolve as a community of potentially selfish genes.

  2. Invasion and persistence of a selfish gene in the Cnidaria.

    Directory of Open Access Journals (Sweden)

    Matthew R Goddard

    Full Text Available BACKGROUND: Homing endonuclease genes (HEGs are superfluous, but are capable of invading populations that mix alleles by biasing their inheritance patterns through gene conversion. One model suggests that their long-term persistence is achieved through recurrent invasion. This circumvents evolutionary degeneration, but requires reasonable rates of transfer between species to maintain purifying selection. Although HEGs are found in a variety of microbes, we found the previous discovery of this type of selfish genetic element in the mitochondria of a sea anemone surprising. METHODS/PRINCIPAL FINDINGS: We surveyed 29 species of Cnidaria for the presence of the COXI HEG. Statistical analyses provided evidence for HEG invasion. We also found that 96 individuals of Metridium senile, from five different locations in the UK, had identical HEG sequences. This lack of sequence divergence illustrates the stable nature of Anthozoan mitochondria. Our data suggests this HEG conforms to the recurrent invasion model of evolution. CONCLUSIONS: Ordinarily such low rates of HEG transfer would likely be insufficient to enable major invasion. However, the slow rate of Anthozoan mitochondrial change lengthens greatly the time to HEG degeneration: this significantly extends the periodicity of the HEG life-cycle. We suggest that a combination of very low substitution rates and rare transfers facilitated metazoan HEG invasion.

  3. Bacterial Toxin–Antitoxin Systems: More Than Selfish Entities?

    Science.gov (United States)

    Van Melderen, Laurence; Saavedra De Bast, Manuel

    2009-01-01

    Bacterial toxin–antitoxin (TA) systems are diverse and widespread in the prokaryotic kingdom. They are composed of closely linked genes encoding a stable toxin that can harm the host cell and its cognate labile antitoxin, which protects the host from the toxin's deleterious effect. TA systems are thought to invade bacterial genomes through horizontal gene transfer. Some TA systems might behave as selfish elements and favour their own maintenance at the expense of their host. As a consequence, they may contribute to the maintenance of plasmids or genomic islands, such as super-integrons, by post-segregational killing of the cell that loses these genes and so suffers the stable toxin's destructive effect. The function of the chromosomally encoded TA systems is less clear and still open to debate. This Review discusses current hypotheses regarding the biological roles of these evolutionarily successful small operons. We consider the various selective forces that could drive the maintenance of TA systems in bacterial genomes. PMID:19325885

  4. Selfish cellular networks and the evolution of complex organisms.

    Science.gov (United States)

    Kourilsky, Philippe

    2012-03-01

    Human gametogenesis takes years and involves many cellular divisions, particularly in males. Consequently, gametogenesis provides the opportunity to acquire multiple de novo mutations. A significant portion of these is likely to impact the cellular networks linking genes, proteins, RNA and metabolites, which constitute the functional units of cells. A wealth of literature shows that these individual cellular networks are complex, robust and evolvable. To some extent, they are able to monitor their own performance, and display sufficient autonomy to be termed "selfish". Their robustness is linked to quality control mechanisms which are embedded in and act upon the individual networks, thereby providing a basis for selection during gametogenesis. These selective processes are equally likely to affect cellular functions that are not gamete-specific, and the evolution of the most complex organisms, including man, is therefore likely to occur via two pathways: essential housekeeping functions would be regulated and evolve during gametogenesis within the parents before being transmitted to their progeny, while classical selection would operate on other traits of the organisms that shape their fitness with respect to the environment. Copyright © 2012 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  5. Invasion and persistence of a selfish gene in the Cnidaria.

    Science.gov (United States)

    Goddard, Matthew R; Leigh, Jessica; Roger, Andrew J; Pemberton, Andrew J

    2006-12-20

    Homing endonuclease genes (HEGs) are superfluous, but are capable of invading populations that mix alleles by biasing their inheritance patterns through gene conversion. One model suggests that their long-term persistence is achieved through recurrent invasion. This circumvents evolutionary degeneration, but requires reasonable rates of transfer between species to maintain purifying selection. Although HEGs are found in a variety of microbes, we found the previous discovery of this type of selfish genetic element in the mitochondria of a sea anemone surprising. We surveyed 29 species of Cnidaria for the presence of the COXI HEG. Statistical analyses provided evidence for HEG invasion. We also found that 96 individuals of Metridium senile, from five different locations in the UK, had identical HEG sequences. This lack of sequence divergence illustrates the stable nature of Anthozoan mitochondria. Our data suggests this HEG conforms to the recurrent invasion model of evolution. Ordinarily such low rates of HEG transfer would likely be insufficient to enable major invasion. However, the slow rate of Anthozoan mitochondrial change lengthens greatly the time to HEG degeneration: this significantly extends the periodicity of the HEG life-cycle. We suggest that a combination of very low substitution rates and rare transfers facilitated metazoan HEG invasion.

  6. Outcrossed sex allows a selfish gene to invade yeast populations.

    Science.gov (United States)

    Goddard, M R; Greig, D; Burt, A

    2001-12-22

    Homing endonuclease genes (HEGs) in eukaryotes are optional genes that have no obvious effect on host phenotype except for causing chromosomes not containing a copy of the gene to be cut, thus causing them to be inherited at a greater than Mendelian rate via gene conversion. These genes are therefore expected to increase in frequency in outcrossed populations, but not in obligately selfed populations. In order to test this idea, we compared the dynamics of the VDE HEG in six replicate outcrossed and inbred populations of yeast (Saccharomyces cerevisiae). VDE increased in frequency from 0.21 to 0.55 in four outcrossed generations, but showed no change in frequency in the inbred populations. The absence of change in the inbred populations indicates that any effect of VDE on mitotic replication rates is less than 1%. The data from the outcrossed populations best fit a model in which 82% of individuals are derived from outcrossing and VDE is inherited by 74% of the meiotic products from heterozygotes (as compared with 50% for Mendelian genes). These results empirically demonstrate how a host mating system plays a key role in determining the population dynamics of a selfish gene.

  7. Bacterial toxin-antitoxin systems: more than selfish entities?

    Directory of Open Access Journals (Sweden)

    Laurence Van Melderen

    2009-03-01

    Full Text Available Bacterial toxin-antitoxin (TA systems are diverse and widespread in the prokaryotic kingdom. They are composed of closely linked genes encoding a stable toxin that can harm the host cell and its cognate labile antitoxin, which protects the host from the toxin's deleterious effect. TA systems are thought to invade bacterial genomes through horizontal gene transfer. Some TA systems might behave as selfish elements and favour their own maintenance at the expense of their host. As a consequence, they may contribute to the maintenance of plasmids or genomic islands, such as super-integrons, by post-segregational killing of the cell that loses these genes and so suffers the stable toxin's destructive effect. The function of the chromosomally encoded TA systems is less clear and still open to debate. This Review discusses current hypotheses regarding the biological roles of these evolutionarily successful small operons. We consider the various selective forces that could drive the maintenance of TA systems in bacterial genomes.

  8. Outcrossed sex allows a selfish gene to invade yeast populations.

    Science.gov (United States)

    Goddard, M. R.; Greig, D.; Burt, A.

    2001-01-01

    Homing endonuclease genes (HEGs) in eukaryotes are optional genes that have no obvious effect on host phenotype except for causing chromosomes not containing a copy of the gene to be cut, thus causing them to be inherited at a greater than Mendelian rate via gene conversion. These genes are therefore expected to increase in frequency in outcrossed populations, but not in obligately selfed populations. In order to test this idea, we compared the dynamics of the VDE HEG in six replicate outcrossed and inbred populations of yeast (Saccharomyces cerevisiae). VDE increased in frequency from 0.21 to 0.55 in four outcrossed generations, but showed no change in frequency in the inbred populations. The absence of change in the inbred populations indicates that any effect of VDE on mitotic replication rates is less than 1%. The data from the outcrossed populations best fit a model in which 82% of individuals are derived from outcrossing and VDE is inherited by 74% of the meiotic products from heterozygotes (as compared with 50% for Mendelian genes). These results empirically demonstrate how a host mating system plays a key role in determining the population dynamics of a selfish gene. PMID:11749707

  9. Statics and Dynamics of Selfish Interactions in Distributed Service Systems.

    Directory of Open Access Journals (Sweden)

    Fabrizio Altarelli

    Full Text Available We study a class of games which models the competition among agents to access some service provided by distributed service units and which exhibits congestion and frustration phenomena when service units have limited capacity. We propose a technique, based on the cavity method of statistical physics, to characterize the full spectrum of Nash equilibria of the game. The analysis reveals a large variety of equilibria, with very different statistical properties. Natural selfish dynamics, such as best-response, usually tend to large-utility equilibria, even though those of smaller utility are exponentially more numerous. Interestingly, the latter actually can be reached by selecting the initial conditions of the best-response dynamics close to the saturation limit of the service unit capacities. We also study a more realistic stochastic variant of the game by means of a simple and effective approximation of the average over the random parameters, showing that the properties of the average-case Nash equilibria are qualitatively similar to the deterministic ones.

  10. The selfish Segregation Distorter gene complex of Drosophila melanogaster.

    Science.gov (United States)

    Larracuente, Amanda M; Presgraves, Daven C

    2012-09-01

    Segregation Distorter (SD) is an autosomal meiotic drive gene complex found worldwide in natural populations of Drosophila melanogaster. During spermatogenesis, SD induces dysfunction of SD(+) spermatids so that SD/SD(+) males sire almost exclusively SD-bearing progeny rather than the expected 1:1 Mendelian ratio. SD is thus evolutionarily "selfish," enhancing its own transmission at the expense of its bearers. Here we review the molecular and evolutionary genetics of SD. Genetic analyses show that the SD is a multilocus gene complex involving two key loci--the driver, Segregation distorter (Sd), and the target of drive, Responder (Rsp)--and at least three upward modifiers of distortion. Molecular analyses show that Sd encodes a truncated duplication of the gene RanGAP, whereas Rsp is a large pericentromeric block of satellite DNA. The Sd-RanGAP protein is enzymatically wild type but mislocalized within cells and, for reasons that remain unclear, appears to disrupt the histone-to-protamine transition in drive-sensitive spermatids bearing many Rsp satellite repeats but not drive-insensitive spermatids bearing few or no Rsp satellite repeats. Evolutionary analyses show that the Sd-RanGAP duplication arose recently within the D. melanogaster lineage, exploiting the preexisting and considerably older Rsp satellite locus. Once established, the SD haplotype collected enhancers of distortion and suppressors of recombination. Further dissection of the molecular genetic and cellular basis of SD-mediated distortion seems likely to provide insights into several important areas currently understudied, including the genetic control of spermatogenesis, the maintenance and evolution of satellite DNAs, the possible roles of small interfering RNAs in the germline, and the molecular population genetics of the interaction of genetic linkage and natural selection.

  11. Old age as a privilege of the "selfish ones".

    Science.gov (United States)

    Davidovic, Mladen; Sevo, Goran; Svorcan, Petar; Milosevic, Dragoslav P; Despotovic, Nebojsa; Erceg, Predrag

    2010-10-01

    In the past couple of centuries, scientists proposed great number of aging theories but neither of them appears to be fully satisfactory. In the statistical sense, we are dealing with an even greater challenge because large array of factors affects the aging process. Although at this point the most of these factors are well known, it is the very fact of their innumerability that complicates approaches to the issue at hand. Both in life and in medicine, the cause behind an effect can rarely be unequivocally determined. Thus, it appears that through out human history longevity has been primarily affected by eradication of diseases, especially by eradication of infectious diseases and introduction of the vaccines. For that reason, maybe we should not be referring to this issue as the «fountain of youth» but rather as the «vaccine of youth». The postulate that genetic instability is the precipitating factor both of aging and cancer has withstood many tests and keeps on being reaffirmed. For this reason, it is legitimate to pose a question of whether long-lived individuals may be those with «selfish» genes and more stable genetic material. They certainly cannot avoid aging, but aging in such individuals could be delayed due to steady character of their genome, which is less susceptible to mutations. On the population level, they constitute minority because stable genome would represent an obstacle to successful evolution of the species. If this was not the case, we might not be writing all these texts today.

  12. A Routing Strategy for Non-Cooperation Wireless Multi-Hop Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dung T. Tran

    2012-01-01

    Full Text Available Choosing routes such that the network lifetime is maximized in a wireless network with limited energy resources is a major routing problem in wireless multi-hop ad hoc networks. In this paper, we study the problem where participants are rationally selfish and non-cooperative. By selfish we designate the users who are ready to tamper with their source-routing (senders could choose intermediate nodes in the routing paths or next hop selection strategies in order to increase the total number of packets transmitted, but do not try to harm or drop packets of the other nodes. The problem therefore amounts to a non-cooperative game. In the works [2,6,19,23], the authors show that the game admits Nash equilibria [1]. Along this line, we first show that if the cost function is linear, this game has pure-strategy equilibrium flow even though participants have different demands. However, finding a Nash equilibrium for a normal game is computationally hard [9]. In this work, inspired by mixed-strategy equilibrium, we propose a simple local routing algorithm called MIxed Path Routing protocol (MiPR. Using analysis and simulations, we show that MiPR drives the system to an equilibrium state where selfish participants do not have incentive to deviate. Moreover, MiPR significantly improves the network lifetime as compared to original routing protocols.

  13. R2d2 Drives Selfish Sweeps in the House Mouse.

    Science.gov (United States)

    Didion, John P; Morgan, Andrew P; Yadgary, Liran; Bell, Timothy A; McMullan, Rachel C; Ortiz de Solorzano, Lydia; Britton-Davidian, Janice; Bult, Carol J; Campbell, Karl J; Castiglia, Riccardo; Ching, Yung-Hao; Chunco, Amanda J; Crowley, James J; Chesler, Elissa J; Förster, Daniel W; French, John E; Gabriel, Sofia I; Gatti, Daniel M; Garland, Theodore; Giagia-Athanasopoulou, Eva B; Giménez, Mabel D; Grize, Sofia A; Gündüz, İslam; Holmes, Andrew; Hauffe, Heidi C; Herman, Jeremy S; Holt, James M; Hua, Kunjie; Jolley, Wesley J; Lindholm, Anna K; López-Fuster, María J; Mitsainas, George; da Luz Mathias, Maria; McMillan, Leonard; Ramalhinho, Maria da Graça Morgado; Rehermann, Barbara; Rosshart, Stephan P; Searle, Jeremy B; Shiao, Meng-Shin; Solano, Emanuela; Svenson, Karen L; Thomas-Laemont, Patricia; Threadgill, David W; Ventura, Jacint; Weinstock, George M; Pomp, Daniel; Churchill, Gary A; Pardo-Manuel de Villena, Fernando

    2016-06-01

    A selective sweep is the result of strong positive selection driving newly occurring or standing genetic variants to fixation, and can dramatically alter the pattern and distribution of allelic diversity in a population. Population-level sequencing data have enabled discoveries of selective sweeps associated with genes involved in recent adaptations in many species. In contrast, much debate but little evidence addresses whether "selfish" genes are capable of fixation-thereby leaving signatures identical to classical selective sweeps-despite being neutral or deleterious to organismal fitness. We previously described R2d2, a large copy-number variant that causes nonrandom segregation of mouse Chromosome 2 in females due to meiotic drive. Here we show population-genetic data consistent with a selfish sweep driven by alleles of R2d2 with high copy number (R2d2(HC)) in natural populations. We replicate this finding in multiple closed breeding populations from six outbred backgrounds segregating for R2d2 alleles. We find that R2d2(HC) rapidly increases in frequency, and in most cases becomes fixed in significantly fewer generations than can be explained by genetic drift. R2d2(HC) is also associated with significantly reduced litter sizes in heterozygous mothers, making it a true selfish allele. Our data provide direct evidence of populations actively undergoing selfish sweeps, and demonstrate that meiotic drive can rapidly alter the genomic landscape in favor of mutations with neutral or even negative effects on overall Darwinian fitness. Further study will reveal the incidence of selfish sweeps, and will elucidate the relative contributions of selfish genes, adaptation and genetic drift to evolution. © The Author 2016. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution.

  14. Hop limited epidemic-like information spreading in mobile social networks with selfish nodes

    Science.gov (United States)

    Wu, Yahui; Deng, Su; Huang, Hongbin

    2013-07-01

    Similar to epidemics, information can be transmitted directly among users in mobile social networks. Different from epidemics, we can control the spreading process by adjusting the corresponding parameters (e.g., hop count) directly. This paper proposes a theoretical model to evaluate the performance of an epidemic-like spreading algorithm, in which the maximal hop count of the information is limited. In addition, our model can be used to evaluate the impact of users’ selfish behavior. Simulations show the accuracy of our theoretical model. Numerical results show that the information hop count can have an important impact. In addition, the impact of selfish behavior is related to the information hop count.

  15. Hop limited epidemic-like information spreading in mobile social networks with selfish nodes

    International Nuclear Information System (INIS)

    Wu, Yahui; Deng, Su; Huang, Hongbin

    2013-01-01

    Similar to epidemics, information can be transmitted directly among users in mobile social networks. Different from epidemics, we can control the spreading process by adjusting the corresponding parameters (e.g., hop count) directly. This paper proposes a theoretical model to evaluate the performance of an epidemic-like spreading algorithm, in which the maximal hop count of the information is limited. In addition, our model can be used to evaluate the impact of users’ selfish behavior. Simulations show the accuracy of our theoretical model. Numerical results show that the information hop count can have an important impact. In addition, the impact of selfish behavior is related to the information hop count. (paper)

  16. A Selfish Constraint Satisfaction Genetic Algorithms for Planning a Long-Distance Transportation Network

    Science.gov (United States)

    Onoyama, Takashi; Maekawa, Takuya; Kubota, Sen; Tsuruta, Setuso; Komoda, Norihisa

    To build a cooperative logistics network covering multiple enterprises, a planning method that can build a long-distance transportation network is required. Many strict constraints are imposed on this type of problem. To solve these strict-constraint problems, a selfish constraint satisfaction genetic algorithm (GA) is proposed. In this GA, each gene of an individual satisfies only its constraint selfishly, disregarding the constraints of other genes in the same individuals. Moreover, a constraint pre-checking method is also applied to improve the GA convergence speed. The experimental result shows the proposed method can obtain an accurate solution in a practical response time.

  17. A synthetic maternal-effect selfish genetic element drives population replacement in Drosophila.

    Science.gov (United States)

    Chen, Chun-Hong; Huang, Haixia; Ward, Catherine M; Su, Jessica T; Schaeffer, Lorian V; Guo, Ming; Hay, Bruce A

    2007-04-27

    One proposed strategy for controlling the transmission of insect-borne pathogens uses a drive mechanism to ensure the rapid spread of transgenes conferring disease refractoriness throughout wild populations. Here, we report the creation of maternal-effect selfish genetic elements in Drosophila that drive population replacement and are resistant to recombination-mediated dissociation of drive and disease refractoriness functions. These selfish elements use microRNA-mediated silencing of a maternally expressed gene essential for embryogenesis, which is coupled with early zygotic expression of a rescuing transgene.

  18. Confirmation of Maslow's Hypothesis of Synergy: Developing an Acceptance of Selfishness at the Workplace Scale.

    Science.gov (United States)

    Takaki, Jiro; Taniguchi, Toshiyo; Fujii, Yasuhito

    2016-04-30

    This study aimed to develop a new Acceptance of Selfishness at the Workplace Scale (ASWS) and to confirm Maslow's hypothesis of synergy: if both a sense of contribution and acceptance of selfishness at the workplace are high, workers are psychologically healthy. In a cross-sectional study with employees of three Japanese companies, 656 workers answered a self-administered questionnaire on paper completely (response rate = 66.8%). Each questionnaire was submitted to us in a sealed envelope and analyzed. The ASWS indicated high internal consistency (Cronbach's alpha = 0.86). Significant (p Maslow's hypothesis of synergy was confirmed.

  19. Popular science - common ground. A literary critique of Richard Dawkins's The Selfish Gene

    OpenAIRE

    Nilsen, Helene

    2012-01-01

    This thesis aims to perform a literary reading of Richard Dawkins's The Selfish Gene from a perspective situated outside of the 'battle of the two cultures'. Chapter 1 takes Foucault's article What is an author?" as its point of departure. After discussing how Dawkins may be seen as a reader of Darwin, I will go on to discuss Foucault's concept of the author-function, before I move on to consider some different readings of and approaches to The Selfish Gene. With reference to a polemic bet...

  20. Wireless Tots

    Science.gov (United States)

    Scott, Lee-Allison

    2003-01-01

    The first wireless technology program for preschoolers was implemented in January at the Primrose School at Bentwater in Atlanta, Georgia, a new corporate school operated by Primrose School Franchising Co. The new school serves as a testing and training facility for groundbreaking educational approaches, including emerging innovations in…

  1. Wireless Technician

    Science.gov (United States)

    Tech Directions, 2011

    2011-01-01

    One of the hottest areas in technology is invisible. Wireless communications allow people to transmit voice messages, data, and other signals through the air without physically connecting senders to receivers with cables or wires. And the technology is spreading at lightning speed. Cellular phones, personal digital assistants, and wireless…

  2. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.

    Science.gov (United States)

    Abdalzaher, Mohamed S; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel

    2016-06-29

    We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  3. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

    Directory of Open Access Journals (Sweden)

    Mohamed S. Abdalzaher

    2016-06-01

    Full Text Available We present a study of using game theory for protecting wireless sensor networks (WSNs from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  4. Neo-Darwinism, the modern synthesis and selfish genes: are they of use in physiology?

    Science.gov (United States)

    Noble, Denis

    2011-03-01

    This article argues that the gene-centric interpretations of evolution, and more particularly the selfish gene expression of those interpretations, form barriers to the integration of physiological science with evolutionary theory. A gene-centred approach analyses the relationships between genotypes and phenotypes in terms of differences (change the genotype and observe changes in phenotype). We now know that, most frequently, this does not correctly reveal the relationships because of extensive buffering by robust networks of interactions. By contrast, understanding biological function through physiological analysis requires an integrative approach in which the activity of the proteins and RNAs formed from each DNA template is analysed in networks of interactions. These networks also include components that are not specified by nuclear DNA. Inheritance is not through DNA sequences alone. The selfish gene idea is not useful in the physiological sciences, since selfishness cannot be defined as an intrinsic property of nucleotide sequences independently of gene frequency, i.e. the 'success' in the gene pool that is supposed to be attributable to the 'selfish' property. It is not a physiologically testable hypothesis.

  5. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  6. An Incentivized Approach for Fair Participation in Wireless Ad hoc Networks

    OpenAIRE

    Choudhuri, Arka Rai; S, Kalyanasundaram; Sridhar, Shriyak; B, Annappa

    2015-01-01

    In Wireless Ad hoc networks (WANETs), nodes separated by considerable distance communicate with each other by relaying their messages through other nodes. However, it might not be in the best interests of a node to forward the message of another node due to power constraints. In addition, all nodes being rational, some nodes may be selfish, i.e. they might not relay data from other nodes so as to increase their lifetime. In this paper, we present a fair and incentivized approach for participa...

  7. Selfish genetic elements favor the evolution of a distinction between soma and germline.

    Science.gov (United States)

    Johnson, Louise J

    2008-08-01

    Many multicellular organisms have evolved a dedicated germline. This can benefit the whole organism, but its advantages to genetic parasites have not been explored. Here I model the evolutionary success of a selfish element, such as a transposable element or endosymbiont, which is capable of creating or strengthening a germline-soma distinction in a primitively multicellular host, and find that it will always benefit the element to do so. Genes causing germline sequestration can therefore spread in a population even if germline sequestration is maladaptive for the host organism. Costly selfish elements are expected to survive only in sexual populations, so sexual species may experience an additional push toward germline-soma distinction, and hence toward cell differentiation and multicellularity.

  8. Selfish strategies and honest signalling: reproductive conflicts in ant queen associations

    DEFF Research Database (Denmark)

    Holman, Luke; Dreier, Stephanie; d'Ettorre, Patrizia

    2010-01-01

    Social insects offer unique opportunities to test predictions regarding the evolution of cooperation, life histories and communication. Colony founding by groups of unrelated queens, some of which are later killed, may select for selfish reproductive strategies, honest signalling and punishment....... Here, we use a brood transfer experiment to test whether cofounding queens of the ant Lasius niger 'selfishly' adjust their productivity when sharing the nest with future competitors. We simultaneously analysed queen cuticular hydrocarbon (CHC) profiles to investigate whether queens honestly signal...... correlated with reproductive maturation, and to a lesser extent with productivity; the same hydrocarbons were more abundant on queens that were not killed, suggesting that workers select productive queens using these chemical cues. Our results highlight the role of honest signalling in the evolution...

  9. The 'selfish brain' is regulated by aquaporins and autophagy under nutrient deprivation.

    Science.gov (United States)

    Ye, Qiao; Wu, Yonghong; Gao, Yan; Li, Zhihui; Li, Weiguang; Zhang, Chenggang

    2016-05-01

    The brain maintains its mass and physiological functional capacity compared with other organs under harsh conditions such as starvation, a mechanism termed the 'selfish brain' theory. To further investigate this phenomenon, mice were examined following water and/or food deprivation. Although the body weights of the mice, the weight of the organs except the brain and blood glucose levels were significantly reduced in the absence of water and/or food, the brain weight maintained its original state. Furthermore, no significant differences in the water content of the brain or its energy balance were observed when the mice were subjected to water and/or food deprivation. To further investigate the mechanism underlying the brain maintenance of water and substance homeostasis, the expression levels of aquaporins (AQPs) and autophagy‑specific protein long‑chain protein 3 (LC3) were examined. During the process of water and food deprivation, no significant differences in the transcriptional levels of AQPs were observed. However, autophagy activity levels were initially stimulated, then suppressed in a time‑dependent manner. LC3 and AQPs have important roles for the survival of the brain under conditions of food and water deprivation, which provided further understanding of the mechanism underlying the 'selfish brain' phenomenon. Although not involved in the energy regulation of the 'selfish brain', AQPs were observed to have important roles in water and food deprivation, specifically with regards to the control of water content. Additionally, the brain exhibits an 'unselfish strategy' using autophagy during water and/or food deprivation. The present study furthered current understanding of the 'selfish brain' theory, and identified additional regulating target genes of AQPs and autophagy, with the aim of providing a basis for the prevention of nutrient shortage in humans and animals.

  10. Selfish memes: An update of Richard Dawkins’ bibliometric analysis of key papers in sociobiology

    OpenAIRE

    Aaen-Stockdale, Craig

    2017-01-01

    This is an Open Access journal available from http://www.mdpi.com/ In the second edition of The Selfish Gene, Richard Dawkins included a short bibliometric analysis of key papers instrumental to the sociobiological revolution, the intention of which was to support his proposal that ideas spread within a population in an epidemiological manner. In his analysis, Dawkins primarily discussed the influence of an article by British evolutionary biologist William Donald Hamilton which had introdu...

  11. A global optimization algorithm inspired in the behavior of selfish herds.

    Science.gov (United States)

    Fausto, Fernando; Cuevas, Erik; Valdivia, Arturo; González, Adrián

    2017-10-01

    In this paper, a novel swarm optimization algorithm called the Selfish Herd Optimizer (SHO) is proposed for solving global optimization problems. SHO is based on the simulation of the widely observed selfish herd behavior manifested by individuals within a herd of animals subjected to some form of predation risk. In SHO, individuals emulate the predatory interactions between groups of prey and predators by two types of search agents: the members of a selfish herd (the prey) and a pack of hungry predators. Depending on their classification as either a prey or a predator, each individual is conducted by a set of unique evolutionary operators inspired by such prey-predator relationship. These unique traits allow SHO to improve the balance between exploration and exploitation without altering the population size. To illustrate the proficiency and robustness of the proposed method, it is compared to other well-known evolutionary optimization approaches such as Particle Swarm Optimization (PSO), Artificial Bee Colony (ABC), Firefly Algorithm (FA), Differential Evolution (DE), Genetic Algorithms (GA), Crow Search Algorithm (CSA), Dragonfly Algorithm (DA), Moth-flame Optimization Algorithm (MOA) and Sine Cosine Algorithm (SCA). The comparison examines several standard benchmark functions, commonly considered within the literature of evolutionary algorithms. The experimental results show the remarkable performance of our proposed approach against those of the other compared methods, and as such SHO is proven to be an excellent alternative to solve global optimization problems. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. The Selfish Goal: autonomously operating motivational structures as the proximate cause of human judgment and behavior.

    Science.gov (United States)

    Huang, Julie Y; Bargh, John A

    2014-04-01

    We propose the Selfish Goal model, which holds that a person's behavior is driven by psychological processes called goals that guide his or her behavior, at times in contradictory directions. Goals can operate both consciously and unconsciously, and when activated they can trigger downstream effects on a person's information processing and behavioral possibilities that promote only the attainment of goal end-states (and not necessarily the overall interests of the individual). Hence, goals influence a person as if the goals themselves were selfish and interested only in their own completion. We argue that there is an evolutionary basis to believe that conscious goals evolved from unconscious and selfish forms of pursuit. This theoretical framework predicts the existence of unconscious goal processes capable of guiding behavior in the absence of conscious awareness and control (the automaticity principle), the ability of the most motivating or active goal to constrain a person's information processing and behavior toward successful completion of that goal (the reconfiguration principle), structural similarities between conscious and unconscious goal pursuit (the similarity principle), and goal influences that produce apparent inconsistencies or counterintuitive behaviors in a person's behavior extended over time (the inconsistency principle). Thus, we argue that a person's behaviors are indirectly selected at the goal level but expressed (and comprehended) at the individual level.

  13. Development of synthetic selfish elements based on modular nucleases in Drosophila melanogaster.

    Science.gov (United States)

    Simoni, Alekos; Siniscalchi, Carla; Chan, Yuk-Sang; Huen, David S; Russell, Steven; Windbichler, Nikolai; Crisanti, Andrea

    2014-06-01

    Selfish genes are DNA elements that increase their rate of genetic transmission at the expense of other genes in the genome and can therefore quickly spread within a population. It has been suggested that selfish elements could be exploited to modify the genome of entire populations for medical and ecological applications. Here we report that transcription activator-like effector nuclease (TALEN) and zinc finger nuclease (ZFN) can be engineered into site-specific synthetic selfish elements (SSEs) and demonstrate their transmission of up to 70% in the Drosophila germline. We show here that SSEs can spread via DNA break-induced homologous recombination, a process known as 'homing' similar to that observed for homing endonuclease genes (HEGs), despite their fundamentally different modes of DNA binding and cleavage. We observed that TALEN and ZFN have a reduced capability of secondary homing compared to HEG as their repetitive structure had a negative effect on their genetic stability. The modular architecture of ZFNs and TALENs allows for the rapid design of novel SSEs against specific genomic sequences making them potentially suitable for the genetic engineering of wild-type populations of animals and plants, in applications such as gene replacement or population suppression of pest species. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.

  14. The games economists play: Why economics students behave more selfishly than other students.

    Directory of Open Access Journals (Sweden)

    Philipp Gerlach

    Full Text Available Do economics students behave more selfishly than other students? Experiments involving monetary allocations suggest so. This article investigates the underlying motives for the economic students' more selfish behavior by separating three potential explanatory mechanisms: economics students are less concerned with fairness when making allocation decisions; have a different notion of what is fair in allocations; or are more skeptical about other people's allocations, which in turn makes them less willing to comply with a shared fairness norm. The three mechanisms were tested by inviting students from various disciplines to participate in a relatively novel experimental game and asking all participants to give reasons for their choices. Compared with students of other disciplines, economics students were about equally likely to mention fairness in their comments; had a similar notion of what was fair in the situation; however, they expected lower offers, made lower offers, and were less willing to enforce compliance with a fair allocation at a cost to themselves. The economics students' lower expectations mediated their allocation decisions, suggesting that economics students behaved more selfishly because they expected others not to comply with the shared fairness norm.

  15. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  16. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  17. Wireless communication technology NFC

    OpenAIRE

    MÁROVÁ, Kateřina

    2014-01-01

    Aim of this bachelor thesis is to handle the issue of new wireless communication technology NFC (Near Field Communication) including a comparison of advantages and disadvantages of NFC with other wireless technologies (Bluetooth, Wi-Fi, etc.). NFC is a technology for wireless communications between different electronic devices, one of which is typically a mobile phone. Near Field Communication allows wireless communication at very short distance by approaching or enclosing two devices and can...

  18. Wireless steganography

    Science.gov (United States)

    Agaian, Sos S.; Akopian, David; D'Souza, Sunil

    2006-02-01

    Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on Symbian TM/Series60 TM architecture. Finally, two data hiding applications developed for Symbian TM/Series60 TM mobile phones are presented.

  19. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  20. Application of Game Theory Approaches in Routing Protocols for Wireless Networks

    Science.gov (United States)

    Javidi, Mohammad M.; Aliahmadipour, Laya

    2011-09-01

    An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.

  1. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  2. Virus world as an evolutionary network of viruses and capsidless selfish elements.

    Science.gov (United States)

    Koonin, Eugene V; Dolja, Valerian V

    2014-06-01

    Viruses were defined as one of the two principal types of organisms in the biosphere, namely, as capsid-encoding organisms in contrast to ribosome-encoding organisms, i.e., all cellular life forms. Structurally similar, apparently homologous capsids are present in a huge variety of icosahedral viruses that infect bacteria, archaea, and eukaryotes. These findings prompted the concept of the capsid as the virus "self" that defines the identity of deep, ancient viral lineages. However, several other widespread viral "hallmark genes" encode key components of the viral replication apparatus (such as polymerases and helicases) and combine with different capsid proteins, given the inherently modular character of viral evolution. Furthermore, diverse, widespread, capsidless selfish genetic elements, such as plasmids and various types of transposons, share hallmark genes with viruses. Viruses appear to have evolved from capsidless selfish elements, and vice versa, on multiple occasions during evolution. At the earliest, precellular stage of life's evolution, capsidless genetic parasites most likely emerged first and subsequently gave rise to different classes of viruses. In this review, we develop the concept of a greater virus world which forms an evolutionary network that is held together by shared conserved genes and includes both bona fide capsid-encoding viruses and different classes of capsidless replicons. Theoretical studies indicate that selfish replicons (genetic parasites) inevitably emerge in any sufficiently complex evolving ensemble of replicators. Therefore, the key signature of the greater virus world is not the presence of a capsid but rather genetic, informational parasitism itself, i.e., various degrees of reliance on the information processing systems of the host. Copyright © 2014, American Society for Microbiology. All Rights Reserved.

  3. Dopaminergic stimulation increases selfish behavior in the absence of punishment threat.

    Science.gov (United States)

    Pedroni, Andreas; Eisenegger, Christoph; Hartmann, Matthias N; Fischbacher, Urs; Knoch, Daria

    2014-01-01

    People often face decisions that pit self-interested behavior aimed at maximizing personal reward against normative behavior such as acting cooperatively, which benefits others. The threat of social sanctions for defying the fairness norm prevents people from behaving overly selfish. Thus, normative behavior is influenced by both seeking rewards and avoiding punishment. However, the neurochemical processes mediating the impact of these influences remain unknown. Several lines of evidence link the dopaminergic system to reward and punishment processing, respectively, but this evidence stems from studies in non-social contexts. The present study investigates dopaminergic drug effects on individuals' reward seeking and punishment avoidance in social interaction. Two-hundred one healthy male participants were randomly assigned to receive 300 mg of L-3,4-dihydroxyphenylalanine (L-DOPA) or a placebo before playing an economic bargaining game. This game involved two conditions, one in which unfair behavior could be punished and one in which unfair behavior could not be punished. In the absence of punishment threats, L-DOPA administration led to more selfish behavior, likely mediated through an increase in reward seeking. In contrast, L-DOPA administration had no significant effect on behavior when faced with punishment threats. The results of this study broaden the role of the dopaminergic system in reward seeking to human social interactions. We could show that even a single dose of a dopaminergic drug may bring selfish behavior to the fore, which in turn may shed new light on potential causal relationships between the dopaminergic system and norm abiding behaviors in certain clinical subpopulations.

  4. The Wireless ATM Architecture

    Directory of Open Access Journals (Sweden)

    R. Palitefka

    1998-06-01

    Full Text Available An overview of the proposed wireless ATM structure is provided. Wireless communication have been developed to a level where offered services can now be extended beyond voice and data. There are already wireless LANs, cordless systems offering data services and mobile data. Wireless LAN systems are basically planned for local, on-promises and in-house networking providing short distance radio or infrared links between computer system. The main challenge of wireless ATM is to harmonise the development of broadband wireless system with service B -ISDN/ATM and ATM LANs, and offer multimedia multiservice features for the support of time-sensitive voice communication, video, desktop multimedia applications, and LAN data traffic for the wireless user.

  5. The effect of amount and tangibility of endowment and certainty of recipients on selfishness in a modified dictator game.

    Science.gov (United States)

    Chang, Shao-Chuan; Lin, Li-Yun; Horng, Ruey-Yun; Wang, Yau-De

    2014-06-01

    Taiwanese college students (N = 101) participated in the study to examine the effects of the amount of an endowment, the tangibility of an endowment, and the certainty of the recipient on selfishness in a modified dictator game. Results showed that dictators were more selfish when allocating tangible (money) than less tangible (honor credits) endowments. Selfishness was higher when large amounts of money were involved. The certainty of the recipient was manipulated by whether the recipient was chosen and announced before or after the decision. Unexpectedly, participants were more self-interested in the certain-recipient condition than in the uncertain-recipient condition. In the honor condition, the amount of an endowment and the certainty of the recipient did not affect participants' allocations.

  6. Are happier people less judgmental of other people's selfish behaviors? Experimental survey evidence from trust and gift exchange games.

    Science.gov (United States)

    Drouvelis, Michalis; Powdthavee, Nattavudh

    2015-10-01

    What determines people's moral judgments of selfish behaviors? Here we study whether people's normative views in trust and gift exchange games, which underlie many situations of economic and social significance, are themselves functions of positive emotions. We use experimental survey methods to investigate the moral judgments of impartial observers empirically, and explore whether we could influence subsequent judgments by deliberately making some individuals happier. We find that moral judgments of selfish behaviors in the economic context depend strongly on the behavior of the interaction partner of the judged person, but their relationships are significantly moderated by an increase in happiness for the person making the judgment.

  7. Wireless mesh networks.

    Science.gov (United States)

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

  8. Social class, power, and selfishness: when and why upper and lower class individuals behave unethically.

    Science.gov (United States)

    Dubois, David; Rucker, Derek D; Galinsky, Adam D

    2015-03-01

    Are the rich more unethical than the poor? To answer this question, the current research introduces a key conceptual distinction between selfish and unethical behavior. Based on this distinction, the current article offers 2 novel findings that illuminate the relationship between social class and unethical behavior. First, the effects of social class on unethical behavior are not invariant; rather, the effects of social class are moderated by whether unethical behavior benefits the self or others. Replicating past work, social class positively predicted unethical behavior; however, this relationship was only observed when that behavior was self-beneficial. When unethical behavior was performed to benefit others, social class negatively predicted unethical behavior; lower class individuals were more likely than upper class individuals to engage in unethical behavior. Overall, social class predicts people's tendency to behave selfishly, rather than predicting unethical behavior per se. Second, individuals' sense of power drove the effects of social class on unethical behavior. Evidence for this relationship was provided in three forms. First, income, but not education level, predicted unethical behavior. Second, feelings of power mediated the effect of social class on unethical behavior, but feelings of status did not. Third, two distinct manipulations of power produced the same moderation by self-versus-other beneficiary as was found with social class. The current theoretical framework and data both synthesize and help to explain a range of findings in the social class and power literatures. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  9. Mitochondrial depolarization in yeast zygotes inhibits clonal expansion of selfish mtDNA.

    Science.gov (United States)

    Karavaeva, Iuliia E; Golyshev, Sergey A; Smirnova, Ekaterina A; Sokolov, Svyatoslav S; Severin, Fedor F; Knorre, Dmitry A

    2017-04-01

    Non-identical copies of mitochondrial DNA (mtDNA) compete with each other within a cell and the ultimate variant of mtDNA present depends on their relative replication rates. Using yeast Saccharomyces cerevisiae cells as a model, we studied the effects of mitochondrial inhibitors on the competition between wild-type mtDNA and mutant selfish mtDNA in heteroplasmic zygotes. We found that decreasing mitochondrial transmembrane potential by adding uncouplers or valinomycin changes the competition outcomes in favor of the wild-type mtDNA. This effect was significantly lower in cells with disrupted mitochondria fission or repression of the autophagy-related genes ATG8 , ATG32 or ATG33 , implying that heteroplasmic zygotes activate mitochondrial degradation in response to the depolarization. Moreover, the rate of mitochondrially targeted GFP turnover was higher in zygotes treated with uncoupler than in haploid cells or untreated zygotes. Finally, we showed that vacuoles of zygotes with uncoupler-activated autophagy contained DNA. Taken together, our data demonstrate that mitochondrial depolarization inhibits clonal expansion of selfish mtDNA and this effect depends on mitochondrial fission and autophagy. These observations suggest an activation of mitochondria quality control mechanisms in heteroplasmic yeast zygotes. © 2017. Published by The Company of Biologists Ltd.

  10. Evolutionary maintenance of selfish homing endonuclease genes in the absence of horizontal transfer.

    Science.gov (United States)

    Yahara, Koji; Fukuyo, Masaki; Sasaki, Akira; Kobayashi, Ichizo

    2009-11-03

    Homing endonuclease genes are "selfish" mobile genetic elements whose endonuclease promotes the spread of its own gene by creating a break at a specific target site and using the host machinery to repair the break by copying and inserting the gene at this site. Horizontal transfer across the boundary of a species or population within which mating takes place has been thought to be necessary for their evolutionary persistence. This is based on the assumption that they will become fixed in a host population, where opportunities of homing will disappear, and become susceptible to degeneration. To test this hypothesis, we modeled behavior of a homing endonuclease gene that moves during meiosis through double-strand break repair. We mathematically explored conditions for persistence of the homing endonuclease gene and elucidated their parameter dependence as phase diagrams. We found that, if the cost of the pseudogene is lower than that of the homing endonuclease gene, the 2 forms can persist in a population through autonomous periodic oscillation. If the cost of the pseudogene is higher, 2 types of dynamics appear that enable evolutionary persistence: bistability dependent on initial frequency or fixation irrespective of initial frequency. The prediction of long persistence in the absence of horizontal transfer was confirmed by stochastic simulations in finite populations. The average time to extinction of the endonuclease gene was found to be thousands of meiotic generations or more based on realistic parameter values. These results provide a solid theoretical basis for an understanding of these and other extremely selfish elements.

  11. Sexual selection, genetic conflict, selfish genes, and the atypical patterns of gene expression in spermatogenic cells.

    Science.gov (United States)

    Kleene, Kenneth C

    2005-01-01

    This review proposes that the peculiar patterns of gene expression in spermatogenic cells are the consequence of powerful evolutionary forces known as sexual selection. Sexual selection is generally characterized by intense competition of males for females, an enormous variety of the strategies to maximize male reproductive success, exaggerated male traits at all levels of biological organization, co-evolution of sexual traits in males and females, and conflict between the sexual advantage of the male trait and the reproductive fitness of females and the individual fitness of both sexes. In addition, spermatogenesis is afflicted by selfish genes that promote their transmission to progeny while causing deleterious effects. Sexual selection, selfish genes, and genetic conflict provide compelling explanations for many atypical features of gene expression in spermatogenic cells including the gross overexpression of certain mRNAs, transcripts encoding truncated proteins that cannot carry out basic functions of the proteins encoded by the same genes in somatic cells, the large number of gene families containing paralogous genes encoding spermatogenic cell-specific isoforms, the large number of testis-cancer-associated genes that are expressed only in spermatogenic cells and malignant cells, and the overbearing role of Sertoli cells in regulating the number and quality of spermatozoa.

  12. Site-specific selfish genes as tools for the control and genetic engineering of natural populations.

    Science.gov (United States)

    Burt, Austin

    2003-05-07

    Site-specific selfish genes exploit host functions to copy themselves into a defined target DNA sequence, and include homing endonuclease genes, group II introns and some LINE-like transposable elements. If such genes can be engineered to target new host sequences, then they can be used to manipulate natural populations, even if the number of individuals released is a small fraction of the entire population. For example, a genetic load sufficient to eradicate a population can be imposed in fewer than 20 generations, if the target is an essential host gene, the knockout is recessive and the selfish gene has an appropriate promoter. There will be selection for resistance, but several strategies are available for reducing the likelihood of it evolving. These genes may also be used to genetically engineer natural populations, by means of population-wide gene knockouts, gene replacements and genetic transformations. By targeting sex-linked loci just prior to meiosis one may skew the population sex ratio, and by changing the promoter one may limit the spread of the gene to neighbouring populations. The proposed constructs are evolutionarily stable in the face of the mutations most likely to arise during their spread, and strategies are also available for reversing the manipulations.

  13. Are maternal mitochondria the selfish entities that are masters of the cells of eukaryotic multicellular organisms?

    Science.gov (United States)

    Barlow, Peter W; Baldelli, E; Baluška, Frantisek

    2009-01-01

    The Energide concept, as well as the endosymbiotic theory of eukaryotic cell organization and evolution, proposes that present-day cells of eukaryotic organisms are mosaics of specialized and cooperating units, or organelles. Some of these units were originally free-living prokaryotes, which were engulfed during evolutionary time. Mitochondria represent one of these types of previously independent organisms, the Energide, is another type. This new perspective on the organization of the cell has been further expanded to reveal the concept of a public milieu, the cytosol, in which Energides and mitochondria live, each with their own private internal milieu. The present paper discusses how the endosymbiotic theory implicates a new hypothesis about the hierarchical and communicational organization of the integrated prokaryotic components of the eukaryotic cell and provides a new angle from which to consider the theory of evolution and its bearing upon cellular complexity. Thus, it is proposed that the “selfish gene” hypothesis of Dawkins1 is not the only possible perspective for comprehending genomic and cellular evolution. Our proposal is that maternal mitochondria are the selfish “master” entities of the eukaryotic cell with respect not only to their propagation from cell-to-cell and from generation-to-generation but also to their regulation of all other cellular functions. However, it should be recognized that the concept of “master” and “servant” cell components is a metaphor; in present-day living organisms their organellar components are considered to be interdependent and inseparable. PMID:19513277

  14. Oxytocin modulates third-party sanctioning of selfish and generous behavior within and between groups.

    Science.gov (United States)

    Daughters, Katie; Manstead, Antony S R; Ten Velden, Femke S; De Dreu, Carsten K W

    2017-03-01

    Human groups function because members trust each other and reciprocate cooperative contributions, and reward others' cooperation and punish their non-cooperation. Here we examined the possibility that such third-party punishment and reward of others' trust and reciprocation is modulated by oxytocin, a neuropeptide generally involved in social bonding and in-group (but not out-group) serving behavior. Healthy males and females (N=100) self-administered a placebo or 24 IU of oxytocin in a randomized, double-blind, between-subjects design. Participants were asked to indicate (incentivized, costly) their level of reward or punishment for in-group (outgroup) investors donating generously or fairly to in-group (outgroup) trustees, who back-transferred generously, fairly or selfishly. Punishment (reward) was higher for selfish (generous) investments and back-transfers when (i) investors were in-group rather than outgroup, and (ii) trustees were in-group rather than outgroup, especially when (iii) participants received oxytocin rather than placebo. It follows, first, that oxytocin leads individuals to ignore out-groups as long as out-group behavior is not relevant to the in-group and, second, that oxytocin contributes to creating and enforcing in-group norms of cooperation and trust. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. SPRINT-SELF: Social-Based Routing and Selfish Node Detection in Opportunistic Networks

    Directory of Open Access Journals (Sweden)

    Radu Ioan Ciobanu

    2015-01-01

    Full Text Available Since mobile devices nowadays have become ubiquitous, several types of networks formed over such devices have been proposed. One such approach is represented by opportunistic networking, which is based on a store-carry-and-forward paradigm, where nodes store data and carry it until they reach a suitable node for forwarding. The problem in such networks is how to decide what the next hop will be, since nodes do not have a global view of the network. We propose using the social network information of a node when performing routing, since a node is more likely to encounter members of its own social community than other nodes. In addition, we approximate a node’s contact as a Poisson distribution and show that we can predict its future behavior based on the contact history. Furthermore, since opportunistic network nodes may be selfish, we improve our solution by adding a selfish node detection and avoidance mechanism, which can help reduce the number of unnecessary messages sent in the network, and thus avoid congestion and decrease battery consumption. We show that our algorithm outperforms existing solutions such as BUBBLE Rap and Epidemic in terms of delivery cost and hit rate, as well as the rate of congestion introduced in the network, by testing in various realistic scenarios.

  16. Dogs’ recognition of human selfish and generous attitudes requires little but critical experience with people

    Science.gov (United States)

    Freidin, Esteban; Casanave, Emma B.

    2017-01-01

    There is some dispute regarding the role of experience in the development of dogs´ socio-cognitive abilities in their interaction with people. We sought to provide new evidence to this debate by comparing dogs with contrasting levels of experience with humans, in a task involving the discrimination of human generous and selfish attitudes. To this end, we compared the performance of adult family dogs against that of adult shelter dogs and puppies living in people´s homes. In training trials, the generous experimenter (G) signaled the bowl with food and allowed the dog to eat, whereas the selfish experimenter (S) also signaled the baited bowl, but she/he ate the food before the dog could have access to it. Then, subjects were allowed to freely choose between G and S in the choice test. The main finding was that adult subjects (both family and shelter dogs) developed a preference for G over S, but puppies did not. We conclude that the quality and/or quantity of everyday-contact with people did not affect the discrimination of human attitudes in the present protocol, but the amount of experience with people (in years) did matter. Finally, we discuss the relative role of domestication and ontogeny in the development of dogs´ socio-cognitive abilities. PMID:29045426

  17. Intelligent Wireless Sensor Network

    OpenAIRE

    Saeed, Bakhtiar I.; Mehrdadi, Bruce

    2010-01-01

    In recent years, there has been significant increase in utilisation of embedded-microcontrollers in broad range of applications extending from commercial products to industrial process system monitoring. Furthermore, improvements in speed, size and power consumption of microcontrollers with added wireless capabilities has provided new generation of applications. These include versatile and\\ud low cost solutions in wireless sensor networking applications such as wireless system monitoring and ...

  18. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  19. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  20. Confirmation of Maslow’s Hypothesis of Synergy: Developing an Acceptance of Selfishness at the Workplace Scale

    Directory of Open Access Journals (Sweden)

    Jiro Takaki

    2016-04-01

    Full Text Available This study aimed to develop a new Acceptance of Selfishness at the Workplace Scale (ASWS and to confirm Maslow’s hypothesis of synergy: if both a sense of contribution and acceptance of selfishness at the workplace are high, workers are psychologically healthy. In a cross-sectional study with employees of three Japanese companies, 656 workers answered a self-administered questionnaire on paper completely (response rate = 66.8%. Each questionnaire was submitted to us in a sealed envelope and analyzed. The ASWS indicated high internal consistency (Cronbach’s alpha = 0.86. Significant (p < 0.001 positive moderate correlations between ASWS scores and job control scores support the ASWS’s convergent and discriminant validity. Significant (p < 0.001 associations of ASWS scores with psychological distress and work engagement supported the ASWS’s criterion validity. In short, ASWS was a psychometrically satisfactory measure. Significant (p < 0.05 interactions between a sense of contribution and acceptance of selfishness at the workplace in linear regression models showed that when those two factors are low, psychological distress becomes high. However, when a sense of contribution and acceptance of selfishness are high, work engagement also becomes high. Thus, Maslow’s hypothesis of synergy was confirmed.

  1. Arms race between selfishness and policing: two-trait quantitative genetic model for caste fate conflict in eusocial Hymenoptera.

    Science.gov (United States)

    Dobata, Shigeto

    2012-12-01

    Policing against selfishness is now regarded as the main force maintaining cooperation, by reducing costly conflict in complex social systems. Although policing has been studied extensively in social insect colonies, its coevolution against selfishness has not been fully captured by previous theories. In this study, I developed a two-trait quantitative genetic model of the conflict between selfish immature females (usually larvae) and policing workers in eusocial Hymenoptera over the immatures' propensity to develop into new queens. This model allows for the analysis of coevolution between genomes expressed in immatures and workers that collectively determine the immatures' queen caste fate. The main prediction of the model is that a higher level of polyandry leads to a smaller fraction of queens produced among new females through caste fate policing. The other main prediction of the present model is that, as a result of arms race, caste fate policing by workers coevolves with exaggerated selfishness of the immatures achieving maximum potential to develop into queens. Moreover, the model can incorporate genetic correlation between traits, which has been largely unexplored in social evolution theory. This study highlights the importance of understanding social traits as influenced by the coevolution of conflicting genomes. © 2012 The Author. Evolution© 2012 The Society for the Study of Evolution.

  2. Selfish Routing

    Science.gov (United States)

    2002-05-01

    are motivated by some of the deficiencies of the traffic model defined in Chapter 2. First, net- work users can often only evaluate path latency...include edges (s, s11), (s, sk2), (t11, t), ( tk2 , t). We define latency functions on the edges of G′ as follows: (A) for edges of the form (vi, s i 2) or

  3. Selfish Little Circles: Transmission Bias and Evolution of Large Deletion-Bearing Mitochondrial DNA in Caenorhabditis briggsae Nematodes

    Science.gov (United States)

    Clark, Katie A.; Howe, Dana K.; Gafner, Kristin; Kusuma, Danika; Ping, Sita; Estes, Suzanne; Denver, Dee R.

    2012-01-01

    Selfish DNA poses a significant challenge to genome stability and organismal fitness in diverse eukaryotic lineages. Although selfish mitochondrial DNA (mtDNA) has known associations with cytoplasmic male sterility in numerous gynodioecious plant species and is manifested as petite mutants in experimental yeast lab populations, examples of selfish mtDNA in animals are less common. We analyzed the inheritance and evolution of mitochondrial DNA bearing large heteroplasmic deletions including nad5 gene sequences (nad5Δ mtDNA), in the nematode Caenorhabditis briggsae. The deletion is widespread in C. briggsae natural populations and is associated with deleterious organismal effects. We studied the inheritance patterns of nad5Δ mtDNA using eight sets of C. briggsae mutation-accumulation (MA) lines, each initiated from a different natural strain progenitor and bottlenecked as single hermaphrodites across generations. We observed a consistent and strong drive toward higher levels of deletion-bearing molecules in the heteroplasmic pool of mtDNA after ten generations of bottlenecking. Our results demonstrate a uniform transmission bias whereby nad5Δ mtDNA accumulates to higher levels relative to intact mtDNA in multiple genetically diverse natural strains of C. briggsae. We calculated an average 1% per-generation transmission bias for deletion-bearing mtDNA relative to intact genomes. Our study, coupled with known deleterious phenotypes associated with high deletion levels, shows that nad5Δ mtDNA are selfish genetic elements that have evolved in natural populations of C. briggsae, offering a powerful new system to study selfish mtDNA dynamics in metazoans. PMID:22859984

  4. Selfish little circles: transmission bias and evolution of large deletion-bearing mitochondrial DNA in Caenorhabditis briggsae nematodes.

    Directory of Open Access Journals (Sweden)

    Katie A Clark

    Full Text Available Selfish DNA poses a significant challenge to genome stability and organismal fitness in diverse eukaryotic lineages. Although selfish mitochondrial DNA (mtDNA has known associations with cytoplasmic male sterility in numerous gynodioecious plant species and is manifested as petite mutants in experimental yeast lab populations, examples of selfish mtDNA in animals are less common. We analyzed the inheritance and evolution of mitochondrial DNA bearing large heteroplasmic deletions including nad5 gene sequences (nad5Δ mtDNA, in the nematode Caenorhabditis briggsae. The deletion is widespread in C. briggsae natural populations and is associated with deleterious organismal effects. We studied the inheritance patterns of nad5Δ mtDNA using eight sets of C. briggsae mutation-accumulation (MA lines, each initiated from a different natural strain progenitor and bottlenecked as single hermaphrodites across generations. We observed a consistent and strong drive toward higher levels of deletion-bearing molecules in the heteroplasmic pool of mtDNA after ten generations of bottlenecking. Our results demonstrate a uniform transmission bias whereby nad5Δ mtDNA accumulates to higher levels relative to intact mtDNA in multiple genetically diverse natural strains of C. briggsae. We calculated an average 1% per-generation transmission bias for deletion-bearing mtDNA relative to intact genomes. Our study, coupled with known deleterious phenotypes associated with high deletion levels, shows that nad5Δ mtDNA are selfish genetic elements that have evolved in natural populations of C. briggsae, offering a powerful new system to study selfish mtDNA dynamics in metazoans.

  5. A Remote WIRELESS Facility

    Directory of Open Access Journals (Sweden)

    Kees Uiterwijk

    2007-10-01

    Full Text Available Continuing need for available distance learning facilities has led to the development of a remote lab facility focusing on wireless technology. In the field of engineering there is a student need of gaining experience in set-up, monitoring and maintenance of 802.11A/B/G based wireless LAN environments.

  6. Warming Up to Wireless

    Science.gov (United States)

    Milner, Jacob

    2005-01-01

    In districts big and small across the U.S., students, teachers, and administrators alike have come to appreciate the benefits of wireless technology. Because the technology delivers Internet signals on airborne radio frequencies, wireless networking allows users of all portable devices to move freely on a school's campus and stay connected to the…

  7. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  8. Are consumers guided by selfish or unselfish motives when they buy organic food?

    DEFF Research Database (Denmark)

    Thøgersen, John

    Organic food is produced in a way that reduces harm to the environment and respects the welfare of farm animals. Hence, buying organic food seems to be an act of ethical and environmentally responsible consumer behavior. However, it is often claimed that consumers really buy organic food...... is analyzing how the purchase of organic food relates to the individual consumer's value priorities, using a comprehensive measurement instrument for values. Following this line of reasoning, the objective of the empirical part of the paper is to answer the question whether buying organic food is related...... to selfish (self-enhancement) or unselfish (self-transcendence) values? A survey study is reported based on representative samples of 1,000 respondents from each of eight European countries. It is found that the purchase of organic food is more strongly and consistently related to self-transcendence values...

  9. Selfish play increases during high-stakes NBA games and is rewarded with more lucrative contracts.

    Science.gov (United States)

    Uhlmann, Eric Luis; Barnes, Christopher M

    2014-01-01

    High-stakes team competitions can present a social dilemma in which participants must choose between concentrating on their personal performance and assisting teammates as a means of achieving group objectives. We find that despite the seemingly strong group incentive to win the NBA title, cooperative play actually diminishes during playoff games, negatively affecting team performance. Thus team cooperation decreases in the very high stakes contexts in which it is most important to perform well together. Highlighting the mixed incentives that underlie selfish play, personal scoring is rewarded with more lucrative future contracts, whereas assisting teammates to score is associated with reduced pay due to lost opportunities for personal scoring. A combination of misaligned incentives and psychological biases in performance evaluation bring out the "I" in "team" when cooperation is most critical.

  10. The maternal-effect, selfish genetic element Medea is associated with a composite Tc1 transposon.

    Science.gov (United States)

    Lorenzen, Marcé D; Gnirke, Andreas; Margolis, Jonathan; Garnes, Jeffrey; Campbell, Margie; Stuart, Jeffrey J; Aggarwal, Rajat; Richards, Stephen; Park, Yoonseong; Beeman, Richard W

    2008-07-22

    Maternal-Effect Dominant Embryonic Arrest ("Medea") factors are selfish nuclear elements that combine maternal-lethal and zygotic-rescue activities to gain a postzygotic survival advantage. We show that Medea(1) activity in Tribolium castaneum is associated with a composite Tc1 transposon inserted just downstream of the neurotransmitter reuptake symporter bloated tubules (blot), whose Drosophila ortholog has both maternal and zygotic functions. The 21.5-kb insertion contains defective copies of elongation initiation factor-3, ATP synthase subunit C, and an RNaseD-related gene, as well as a potentially intact copy of a prokaryotic DUF1703 gene. Sequence comparisons suggest that the current distribution of Medea(1) reflects global emanation after a single transpositional event in recent evolutionary time. The Medea system in Tribolium represents an unusual type of intragenomic conflict and could provide a useful vehicle for driving desirable genes into populations.

  11. Homing endonuclease genes: the rise and fall and rise again of a selfish element.

    Science.gov (United States)

    Burt, Austin; Koufopanou, Vassiliki

    2004-12-01

    Homing endonuclease genes (HEGs) are selfish genetic elements that spread by first cleaving chromosomes that do not contain them and then getting copied across to the broken chromosome as a byproduct of the repair process. The success of this strategy will depend on the opportunities for homing--in other words, the frequency with which HEG(+) and HEG(-) chromosomes come into contact--which varies widely among host taxa. HEGs are also unusual in that the selection pressure for endonuclease function disappears if they become fixed in a population, which makes them susceptible to degeneration and imposes a need for regular horizontal transmission between species. HEGs will be selected to reduce the harm done to the host organism, and this is expected to influence the evolution of their sequence specificity and maturase functions. HEGs may also be domesticated by their hosts, and are currently being put to human uses.

  12. Humans as Superorganisms: How Microbes, Viruses, Imprinted Genes, and Other Selfish Entities Shape Our Behavior.

    Science.gov (United States)

    Kramer, Peter; Bressan, Paola

    2015-07-01

    Psychologists and psychiatrists tend to be little aware that (a) microbes in our brains and guts are capable of altering our behavior; (b) viral DNA that was incorporated into our DNA millions of years ago is implicated in mental disorders; (c) many of us carry the cells of another human in our brains; and (d) under the regulation of viruslike elements, the paternally inherited and maternally inherited copies of some genes compete for domination in the offspring, on whom they have opposite physical and behavioral effects. This article provides a broad overview, aimed at a wide readership, of the consequences of our coexistence with these selfish entities. The overarching message is that we are not unitary individuals but superorganisms, built out of both human and nonhuman elements; it is their interaction that determines who we are. © The Author(s) 2015.

  13. Selfish play increases during high-stakes NBA games and is rewarded with more lucrative contracts.

    Directory of Open Access Journals (Sweden)

    Eric Luis Uhlmann

    Full Text Available High-stakes team competitions can present a social dilemma in which participants must choose between concentrating on their personal performance and assisting teammates as a means of achieving group objectives. We find that despite the seemingly strong group incentive to win the NBA title, cooperative play actually diminishes during playoff games, negatively affecting team performance. Thus team cooperation decreases in the very high stakes contexts in which it is most important to perform well together. Highlighting the mixed incentives that underlie selfish play, personal scoring is rewarded with more lucrative future contracts, whereas assisting teammates to score is associated with reduced pay due to lost opportunities for personal scoring. A combination of misaligned incentives and psychological biases in performance evaluation bring out the "I" in "team" when cooperation is most critical.

  14. A selfish genetic element confers non-Mendelian inheritance in rice.

    Science.gov (United States)

    Yu, Xiaowen; Zhao, Zhigang; Zheng, Xiaoming; Zhou, Jiawu; Kong, Weiyi; Wang, Peiran; Bai, Wenting; Zheng, Hai; Zhang, Huan; Li, Jing; Liu, Jiafan; Wang, Qiming; Zhang, Long; Liu, Kai; Yu, Yang; Guo, Xiuping; Wang, Jiulin; Lin, Qibing; Wu, Fuqing; Ren, Yulong; Zhu, Shanshan; Zhang, Xin; Cheng, Zhijun; Lei, Cailin; Liu, Shijia; Liu, Xi; Tian, Yunlu; Jiang, Ling; Ge, Song; Wu, Chuanyin; Tao, Dayun; Wang, Haiyang; Wan, Jianmin

    2018-06-08

    Selfish genetic elements are pervasive in eukaryote genomes, but their role remains controversial. We show that qHMS7 , a major quantitative genetic locus for hybrid male sterility between wild rice ( Oryza meridionalis ) and Asian cultivated rice ( O. sativa ), contains two tightly linked genes [ Open Reading Frame 2 ( ORF2 ) and ORF3 ]. ORF2 encodes a toxic genetic element that aborts pollen in a sporophytic manner, whereas ORF3 encodes an antidote that protects pollen in a gametophytic manner. Pollens lacking ORF3 are selectively eliminated, leading to segregation distortion in the progeny. Analysis of the genetic sequence suggests that ORF3 arose first, followed by gradual functionalization of ORF2 Furthermore, this toxin-antidote system may have promoted the differentiation and/or maintained the genome stability of wild and cultivated rice. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  15. Wireless adiabatic power transfer

    International Nuclear Information System (INIS)

    Rangelov, A.A.; Suchowski, H.; Silberberg, Y.; Vitanov, N.V.

    2011-01-01

    Research highlights: → Efficient and robust mid-range wireless energy transfer between two coils. → The adiabatic energy transfer is analogous to adiabatic passage in quantum optics. → Wireless energy transfer is insensitive to any resonant constraints. → Wireless energy transfer is insensitive to noise in the neighborhood of the coils. - Abstract: We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  16. Selfish spermatogonial selection: evidence from an immunohistochemical screen in testes of elderly men.

    Directory of Open Access Journals (Sweden)

    Jasmine Lim

    Full Text Available The dominant congenital disorders Apert syndrome, achondroplasia and multiple endocrine neoplasia-caused by specific missense mutations in the FGFR2, FGFR3 and RET proteins respectively-represent classical examples of paternal age-effect mutation, a class that arises at particularly high frequencies in the sperm of older men. Previous analyses of DNA from randomly selected cadaveric testes showed that the levels of the corresponding FGFR2, FGFR3 and RET mutations exhibit very uneven spatial distributions, with localised hotspots surrounded by large mutation-negative areas. These studies imply that normal testes are mosaic for clusters of mutant cells: these clusters are predicted to have altered growth and signalling properties leading to their clonal expansion (selfish spermatogonial selection, but DNA extraction eliminates the possibility to study such processes at a tissue level. Using a panel of antibodies optimised for the detection of spermatocytic seminoma, a rare tumour of spermatogonial origin, we demonstrate that putative clonal events are frequent within normal testes of elderly men (mean age: 73.3 yrs and can be classed into two broad categories. We found numerous small (less than 200 cells cellular aggregations with distinct immunohistochemical characteristics, localised to a portion of the seminiferous tubule, which are of uncertain significance. However more infrequently we identified additional regions where entire seminiferous tubules had a circumferentially altered immunohistochemical appearance that extended through multiple serial sections that were physically contiguous (up to 1 mm in length, and exhibited enhanced staining for antibodies both to FGFR3 and a marker of downstream signal activation, pAKT. These findings support the concept that populations of spermatogonia in individual seminiferous tubules in the testes of older men are clonal mosaics with regard to their signalling properties and activation, thus fulfilling

  17. Behavior of restriction–modification systems as selfish mobile elements and their impact on genome evolution

    Science.gov (United States)

    Kobayashi, Ichizo

    2001-01-01

    Restriction–modification (RM) systems are composed of genes that encode a restriction enzyme and a modification methylase. RM systems sometimes behave as discrete units of life, like viruses and transposons. RM complexes attack invading DNA that has not been properly modified and thus may serve as a tool of defense for bacterial cells. However, any threat to their maintenance, such as a challenge by a competing genetic element (an incompatible plasmid or an allelic homologous stretch of DNA, for example) can lead to cell death through restriction breakage in the genome. This post-segregational or post-disturbance cell killing may provide the RM complexes (and any DNA linked with them) with a competitive advantage. There is evidence that they have undergone extensive horizontal transfer between genomes, as inferred from their sequence homology, codon usage bias and GC content difference. They are often linked with mobile genetic elements such as plasmids, viruses, transposons and integrons. The comparison of closely related bacterial genomes also suggests that, at times, RM genes themselves behave as mobile elements and cause genome rearrangements. Indeed some bacterial genomes that survived post-disturbance attack by an RM gene complex in the laboratory have experienced genome rearrangements. The avoidance of some restriction sites by bacterial genomes may result from selection by past restriction attacks. Both bacteriophages and bacteria also appear to use homologous recombination to cope with the selfish behavior of RM systems. RM systems compete with each other in several ways. One is competition for recognition sequences in post-segregational killing. Another is super-infection exclusion, that is, the killing of the cell carrying an RM system when it is infected with another RM system of the same regulatory specificity but of a different sequence specificity. The capacity of RM systems to act as selfish, mobile genetic elements may underlie the structure and

  18. Behavior of restriction-modification systems as selfish mobile elements and their impact on genome evolution.

    Science.gov (United States)

    Kobayashi, I

    2001-09-15

    Restriction-modification (RM) systems are composed of genes that encode a restriction enzyme and a modification methylase. RM systems sometimes behave as discrete units of life, like viruses and transposons. RM complexes attack invading DNA that has not been properly modified and thus may serve as a tool of defense for bacterial cells. However, any threat to their maintenance, such as a challenge by a competing genetic element (an incompatible plasmid or an allelic homologous stretch of DNA, for example) can lead to cell death through restriction breakage in the genome. This post-segregational or post-disturbance cell killing may provide the RM complexes (and any DNA linked with them) with a competitive advantage. There is evidence that they have undergone extensive horizontal transfer between genomes, as inferred from their sequence homology, codon usage bias and GC content difference. They are often linked with mobile genetic elements such as plasmids, viruses, transposons and integrons. The comparison of closely related bacterial genomes also suggests that, at times, RM genes themselves behave as mobile elements and cause genome rearrangements. Indeed some bacterial genomes that survived post-disturbance attack by an RM gene complex in the laboratory have experienced genome rearrangements. The avoidance of some restriction sites by bacterial genomes may result from selection by past restriction attacks. Both bacteriophages and bacteria also appear to use homologous recombination to cope with the selfish behavior of RM systems. RM systems compete with each other in several ways. One is competition for recognition sequences in post-segregational killing. Another is super-infection exclusion, that is, the killing of the cell carrying an RM system when it is infected with another RM system of the same regulatory specificity but of a different sequence specificity. The capacity of RM systems to act as selfish, mobile genetic elements may underlie the structure and

  19. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  20. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  1. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  2. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  3. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  4. Wireless radio a history

    CERN Document Server

    Coe, Lewis

    2006-01-01

    ""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.

  5. Selfish punishment with avoiding mechanism can alleviate both first-order and second-order social dilemma.

    Science.gov (United States)

    Cui, Pengbi; Wu, Zhi-Xi

    2014-11-21

    Punishment, especially selfish punishment, has recently been identified as a potent promoter in sustaining or even enhancing the cooperation among unrelated individuals. However, without other key mechanisms, the first-order social dilemma and second-order social dilemma are still two enduring conundrums in biology and the social sciences even with the presence of punishment. In the present study, we investigate a spatial evolutionary four-strategy prisoner׳s dilemma game model with avoiding mechanism, where the four strategies are cooperation, defection, altruistic and selfish punishment. By introducing the low level of random mutation of strategies, we demonstrate that the presence of selfish punishment with avoiding mechanism can alleviate the two kinds of social dilemmas for various parametrizations. In addition, we propose an extended pair approximation method, whose solutions can essentially estimate the dynamical behaviors and final evolutionary frequencies of the four strategies. At last, considering the analogy between our model and the classical Lotka-Volterra system, we introduce interaction webs based on the spatial replicator dynamics and the transformed payoff matrix to qualitatively characterize the emergent co-exist strategy phases, and its validity are supported by extensive simulations. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  7. A selfish gene chastened: Tribolium castaneum Medea M4 is silenced by a complementary gene.

    Science.gov (United States)

    Thomson, M Scott

    2014-04-01

    Maternal-effect dominant embryonic arrest (Medea) of Tribolium castaneum are autosomal factors that act maternally to cause the death of any progeny that do not inherit them. This selfish behavior is thought to result from a maternally expressed poison and zygotically expressed antidote. Medea factors and the hybrid incompatibility factor, H, have a negative interaction consistent with complementary genes of the Dobzhansky-Muller model for post-zygotic isolation. This negative interaction may result from H suppression of Medea zygotic antidote, leaving zygotes incompletely protected from maternal poison. I report here a test of the hypothesis that H also suppresses the Medea maternal poison. Viable F1 females were generated from a cross of Medea M4 strain males to H strain females. These females, heterozygous for both M4 and H, failed to express M4 maternal lethal activity when crossed to their male sibs. Transmission of non-M4 homologues from these females was confirmed using a dominant transgenic enhanced green fluorescent protein eye color marker, tightly linked in cis to M4. M4 beetles, lacking H, were selected from the F2 population. Female descendants of these clearly expressed M4 maternal lethal activity, indicating restoration of this activity after H was segregated away. I conclude that H, or a factor tightly linked to H, suppresses Medea M4 maternal poison.

  8. Visualizing the origins of selfish de novo mutations in individual seminiferous tubules of human testes.

    Science.gov (United States)

    Maher, Geoffrey J; McGowan, Simon J; Giannoulatou, Eleni; Verrill, Clare; Goriely, Anne; Wilkie, Andrew O M

    2016-03-01

    De novo point mutations arise predominantly in the male germline and increase in frequency with age, but it has not previously been possible to locate specific, identifiable mutations directly within the seminiferous tubules of human testes. Using microdissection of tubules exhibiting altered expression of the spermatogonial markers MAGEA4, FGFR3, and phospho-AKT, whole genome amplification, and DNA sequencing, we establish an in situ strategy for discovery and analysis of pathogenic de novo mutations. In 14 testes from men aged 39-90 y, we identified 11 distinct gain-of-function mutations in five genes (fibroblast growth factor receptors FGFR2 and FGFR3, tyrosine phosphatase PTPN11, and RAS oncogene homologs HRAS and KRAS) from 16 of 22 tubules analyzed; all mutations have known associations with severe diseases, ranging from congenital or perinatal lethal disorders to somatically acquired cancers. These results support proposed selfish selection of spermatogonial mutations affecting growth factor receptor-RAS signaling, highlight its prevalence in older men, and enable direct visualization of the microscopic anatomy of elongated mutant clones.

  9. Fitness effects of a selfish gene (the Mus t complex) are revealed in an ecological context.

    Science.gov (United States)

    Carroll, Lara S; Meagher, Shawn; Morrison, Linda; Penn, Dustin J; Potts, Wayne K

    2004-06-01

    In wild house mice, genes linked to the t transmission distortion complex cause meiotic drive by sabotaging wild-type gametes. The t complex is consequently inherited at frequencies higher than 90%. Yet, for unclear reasons, in wild mouse populations this selfish DNA is found at frequencies much lower than expected. Here, we examine selection on the t complex in 10 seminatural populations of wild mice based on data from 234 founders and nearly 2000 progeny. Eight of the 10 populations decreased in t frequency over one generation, and the overall frequency of t haplotypes across all 10 populations was 48.5% below expectations based on transmission distortion and 34.3% below Mendelian (or Hardy-Weinberg) expectations. Behavioral and reproductive data were collected for 10 months for each population, and microsatellite genotyping was performed on seven of the populations to determine parentage. These combined data show t-associated fitness declines in both males and females. This is the first study to show evidence for a reduction in the ability of +/t males to maintain territories. Because females tend to mate with dominant males, impairment of territorial success can explain much of the selection against t observed in our populations. In nature, selection against heterozygote carriers of the t complex helps solve the puzzlingly low t frequencies found in wild populations. This ecological approach for determining fitness consequences of genetic variants has broad application for the discovery of gene function in general.

  10. Selfish supernumerary chromosome reveals its origin as a mosaic of host genome and organellar sequences.

    Science.gov (United States)

    Martis, Mihaela Maria; Klemme, Sonja; Banaei-Moghaddam, Ali Mohammad; Blattner, Frank R; Macas, Jiří; Schmutzer, Thomas; Scholz, Uwe; Gundlach, Heidrun; Wicker, Thomas; Šimková, Hana; Novák, Petr; Neumann, Pavel; Kubaláková, Marie; Bauer, Eva; Haseneyer, Grit; Fuchs, Jörg; Doležel, Jaroslav; Stein, Nils; Mayer, Klaus F X; Houben, Andreas

    2012-08-14

    Supernumerary B chromosomes are optional additions to the basic set of A chromosomes, and occur in all eukaryotic groups. They differ from the basic complement in morphology, pairing behavior, and inheritance and are not required for normal growth and development. The current view is that B chromosomes are parasitic elements comparable to selfish DNA, like transposons. In contrast to transposons, they are autonomously inherited independent of the host genome and have their own mechanisms of mitotic or meiotic drive. Although B chromosomes were first described a century ago, little is known about their origin and molecular makeup. The widely accepted view is that they are derived from fragments of A chromosomes and/or generated in response to interspecific hybridization. Through next-generation sequencing of sorted A and B chromosomes, we show that B chromosomes of rye are rich in gene-derived sequences, allowing us to trace their origin to fragments of A chromosomes, with the largest parts corresponding to rye chromosomes 3R and 7R. Compared with A chromosomes, B chromosomes were also found to accumulate large amounts of specific repeats and insertions of organellar DNA. The origin of rye B chromosomes occurred an estimated ∼1.1-1.3 Mya, overlapping in time with the onset of the genus Secale (1.7 Mya). We propose a comprehensive model of B chromosome evolution, including its origin by recombination of several A chromosomes followed by capturing of additional A-derived and organellar sequences and amplification of B-specific repeats.

  11. Chimpanzee social intelligence: selfishness, altruism, and the mother-infant bond.

    Science.gov (United States)

    Hirata, Satoshi

    2009-01-01

    To better understand the human mind from an evolutionary perspective, a great deal of research has focused on the closest living relative of humans, the chimpanzee, using various approaches, including studies of social intelligence. Here, I review recent research related to several aspects of social intelligence, including deception, understanding of perception and intention, social learning, trading, cooperation, and regard for others. Many studies have demonstrated that chimpanzees are proficient in using their social intelligence for selfish motives to benefit from their interactions with others. In contrast, it is not yet clear whether chimpanzees engage in prosocial behaviors that benefit others; however, chimpanzee mother-infant interactions indicate the possibility of such behaviors. Therefore, I propose that chimpanzees possess rudimentary traits of human mental competence not only in terms of theory of mind in a broader sense but also in terms of prosociality involving regard for others. Mother-infant interactions appear to be particularly important to understanding the manifestation of social intelligence from an evolutionary perspective.

  12. Evolution of Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  13. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  14. Wireless communications resource management

    CERN Document Server

    Lee, B; Seo, H

    2009-01-01

    Wireless technologies continue to evolve to address the insatiable demand for faster response times, larger bandwidth, and reliable transmission. Yet as the industry moves toward the development of post 3G systems, engineers have consumed all the affordable physical layer technologies discovered to date. This has necessitated more intelligent and optimized utilization of available wireless resources. Wireless Communications Resource Managem ent, Lee, Park, and Seo cover all aspects of this critical topic, from the preliminary concepts and mathematical tools to detailed descriptions of all the resource management techniques. Readers will be able to more effectively leverage limited spectrum and maximize device battery power, as well as address channel loss, shadowing, and multipath fading phenomena.

  15. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  16. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  17. Wireless sensor platform

    Science.gov (United States)

    Joshi, Pooran C.; Killough, Stephen M.; Kuruganti, Phani Teja

    2017-08-08

    A wireless sensor platform and methods of manufacture are provided. The platform involves providing a plurality of wireless sensors, where each of the sensors is fabricated on flexible substrates using printing techniques and low temperature curing. Each of the sensors can include planar sensor elements and planar antennas defined using the printing and curing. Further, each of the sensors can include a communications system configured to encode the data from the sensors into a spread spectrum code sequence that is transmitted to a central computer(s) for use in monitoring an area associated with the sensors.

  18. Wireless Testbed Bonsai

    Science.gov (United States)

    2006-02-01

    wireless sensor device network, and a about 200 Stargate nodes higher-tier multi-hop peer- to-peer 802.11b wireless network. Leading up to the full ExScal...deployment, we conducted spatial scaling tests on our higher-tier protocols on a 7 × 7 grid of Stargates nodes 45m and with 90m separations respectively...onW and its scaled version W̃ . III. EXPERIMENTAL SETUP Description of Kansei testbed. A stargate is a single board linux-based computer [7]. It uses a

  19. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  20. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  1. Wireless optical telecommunications

    CERN Document Server

    Bouchet, Olivier

    2013-01-01

    Wireless optical communication refers to communication based on the unguided propagation of optical waves. The past 30 years have seen significant improvements in this technique - a wireless communication solution for the current millennium - that offers an alternative to radio systems; a technique that could gain attractiveness due to recent concerns regarding the potential effects of radiofrequency waves on human health.The aim of this book is to look at the free space optics that are already used for the exchange of current information; its many benefits, such as incorporating chan

  2. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  3. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  4. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  5. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  6. A family of selfish minicircular chromosomes with jumbled chloroplast gene fragments from a dinoflagellate.

    Science.gov (United States)

    Zhang, Z; Cavalier-Smith, T; Green, B R

    2001-08-01

    Chloroplast genes of several dinoflagellate species are located on unigenic DNA minicircular chromosomes. We have now completely sequenced five aberrant minicircular chromosomes from the dinoflagellate Heterocapsa triquetra. These probably nonfunctional DNA circles lack complete genes, with each being composed of several short fragments of two or three different chloroplast genes and a common conserved region with a tripartite 9G-9A-9G core like the putative replicon origin of functional single-gene circular chloroplast chromosomes. Their sequences imply that all five circles evolved by differential deletions and duplications from common ancestral circles bearing fragments of four genes: psbA, psbC, 16S rRNA, and 23S rRNA. It appears that recombination between separate unigenic chromosomes initially gave intermediate heterodimers, which were subsequently stabilized by deletions that included part or all of one putative replicon origin. We suggest that homologous recombination at the 9G-9A-9G core regions produced a psbA/psbC heterodimer which generated two distinct chimeric circles by differential deletions and duplications. A 23S/16S rRNA heterodimer more likely formed by illegitimate recombination between 16S and 23S rRNA genes. Homologous recombination between the 9G-9A-9G core regions of both heterodimers and additional differential deletions and duplications could then have yielded the other three circles. Near identity of the gene fragments and 9G-9A-9G cores, despite diverging adjacent regions, may be maintained by gene conversion. The conserved organization of the 9G-9A-9G cores alone favors the idea that they are replicon origins and suggests that they may enable the aberrant minicircles to parasitize the chloroplast's replication machinery as selfish circles.

  7. Dog's discrimination of human selfish and generous attitudes: the role of individual recognition, experience, and experimenters' gender.

    Science.gov (United States)

    Carballo, Fabricio; Freidin, Esteban; Putrino, Natalia; Shimabukuro, Carolina; Casanave, Emma; Bentosela, Mariana

    2015-01-01

    Discrimination of and memory for others' generous and selfish behaviors could be adaptive abilities in social animals. Dogs have seemingly expressed such skills in both direct and indirect interactions with humans. However, recent studies suggest that their capacity may rely on cues other than people's individual characteristics, such as the place where the person stands. Thus, the conditions under which dogs recognize individual humans when solving cooperative tasks still remains unclear. With the aim of contributing to this problem, we made dogs interact with two human experimenters, one generous (pointed towards the food, gave ostensive cues, and allowed the dog to eat it) and the other selfish (pointed towards the food, but ate it before the dog could have it). Then subjects could choose between them (studies 1-3). In study 1, dogs took several training trials to learn the discrimination between the generous and the selfish experimenters when both were of the same gender. In study 2, the discrimination was learned faster when the experimenters were of different gender as evidenced both by dogs' latencies to approach the bowl in training trials as well as by their choices in preference tests. Nevertheless, dogs did not get confused by gender when the experimenters were changed in between the training and the choice phase in study 3. We conclude that dogs spontaneously used human gender as a cue to discriminate between more and less cooperative experimenters. They also relied on some other personal feature which let them avoid being confused by gender when demonstrators were changed. We discuss these results in terms of dogs' ability to recognize individuals and the potential advantage of this skill for their lives in human environments.

  8. Dog's discrimination of human selfish and generous attitudes: the role of individual recognition, experience, and experimenters' gender.

    Directory of Open Access Journals (Sweden)

    Fabricio Carballo

    Full Text Available Discrimination of and memory for others' generous and selfish behaviors could be adaptive abilities in social animals. Dogs have seemingly expressed such skills in both direct and indirect interactions with humans. However, recent studies suggest that their capacity may rely on cues other than people's individual characteristics, such as the place where the person stands. Thus, the conditions under which dogs recognize individual humans when solving cooperative tasks still remains unclear. With the aim of contributing to this problem, we made dogs interact with two human experimenters, one generous (pointed towards the food, gave ostensive cues, and allowed the dog to eat it and the other selfish (pointed towards the food, but ate it before the dog could have it. Then subjects could choose between them (studies 1-3. In study 1, dogs took several training trials to learn the discrimination between the generous and the selfish experimenters when both were of the same gender. In study 2, the discrimination was learned faster when the experimenters were of different gender as evidenced both by dogs' latencies to approach the bowl in training trials as well as by their choices in preference tests. Nevertheless, dogs did not get confused by gender when the experimenters were changed in between the training and the choice phase in study 3. We conclude that dogs spontaneously used human gender as a cue to discriminate between more and less cooperative experimenters. They also relied on some other personal feature which let them avoid being confused by gender when demonstrators were changed. We discuss these results in terms of dogs' ability to recognize individuals and the potential advantage of this skill for their lives in human environments.

  9. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  10. Miniaturized wireless sensor network

    OpenAIRE

    Lecointre , Aubin; Dragomirescu , Daniela; Dubuc , David; Grenier , Katia; Pons , Patrick; Aubert , Hervé; Müller , A.; Berthou , Pascal; Gayraud , Thierry; Plana , Robert

    2006-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  11. Investigating Wireless Power Transfer

    Science.gov (United States)

    St. John, Stuart A.

    2017-01-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a…

  12. Future of wireless communication

    Energy Technology Data Exchange (ETDEWEB)

    Barker, M

    1996-12-31

    This document reproduces slides from a conference presentation giving an overview of current and upcoming wireless communication methods of interest to Canadian electric utilities. Both voice and data communication methods are considered, including cellular telephone, satellite communications, personal communication services, regulated licensed arrowband data systems, and integrated services.

  13. Wired vs. Wireless.

    Science.gov (United States)

    Fielding, Randall

    2000-01-01

    Presents a debate on which technology will be in tomorrow's classrooms and the pros and cons of wiring classrooms and using a wireless network. Concluding comments address the likelihood, and desirability, of placing computers throughout the entire educational process and what types of computers and capabilities are needed. (GR)

  14. Wireless Remote Control System

    Directory of Open Access Journals (Sweden)

    Adrian Tigauan

    2012-06-01

    Full Text Available This paper presents the design of a wireless remote control system based on the ZigBee communication protocol. Gathering data from sensors or performing control tasks through wireless communication is advantageous in situations in which the use of cables is impractical. An Atmega328 microcontroller (from slave device is used for gathering data from the sensors and transmitting it to a coordinator device with the help of the XBee modules. The ZigBee standard is suitable for low-cost, low-data-rate and low-power wireless networks implementations. The XBee-PRO module, designed to meet ZigBee standards, requires minimal power for reliable data exchange between devices over a distance of up to 1600m outdoors. A key component of the ZigBee protocol is the ability to support networking and this can be used in a wireless remote control system. This system may be employed e.g. to control temperature and humidity (SHT11 sensor and light intensity (TSL230 sensor levels inside a commercial greenhouse.

  15. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  16. Building the Wireless Campus

    Science.gov (United States)

    Gerraughty, James F.; Shanafelt, Michael E.

    2005-01-01

    This prototype is a continuation of a series of wireless prototypes which began in August 2001 and was reported on again in August 2002. This is the final year of this prototype. This continuation allowed Saint Francis University's Center of Excellence for Remote and Medically Under-Served Areas (CERMUSA) to refine the existing WLAN for the Saint…

  17. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  18. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  19. NASA Bluetooth Wireless Communications

    Science.gov (United States)

    Miller, Robert D.

    2007-01-01

    NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.

  20. Wireless Communications Device Wakeup Method and System

    NARCIS (Netherlands)

    Drago, S.; Sebastiano, F.; Leenaerts, D.M.W.; Breems, L.J.

    2008-01-01

    Abstract of WO 2009044368 Disclosed are wakeable wireless communications devices, and methods for waking wireless communications devices, for use in a wireless network of such devices. The devices communicate during respectively-designated timeslots according to a communications protocol. The

  1. Origin, evolution, and population genetics of the selfish Segregation Distorter gene duplication in European and African populations of Drosophila melanogaster.

    Science.gov (United States)

    Brand, Cara L; Larracuente, Amanda M; Presgraves, Daven C

    2015-05-01

    Meiotic drive elements are a special class of evolutionarily "selfish genes" that subvert Mendelian segregation to gain preferential transmission at the expense of homologous loci. Many drive elements appear to be maintained in populations as stable polymorphisms, their equilibrium frequencies determined by the balance between drive (increasing frequency) and selection (decreasing frequency). Here we show that a classic, seemingly balanced, drive system is instead characterized by frequent evolutionary turnover giving rise to dynamic, rather than stable, equilibrium frequencies. The autosomal Segregation Distorter (SD) system of the fruit fly Drosophila melanogaster is a selfish coadapted meiotic drive gene complex in which the major driver corresponds to a partial duplication of the gene Ran-GTPase activating protein (RanGAP). SD chromosomes segregate at similar, low frequencies of 1-5% in natural populations worldwide, consistent with a balanced polymorphism. Surprisingly, our population genetic analyses reveal evidence for parallel, independent selective sweeps of different SD chromosomes in populations on different continents. These findings suggest that, rather than persisting at a single stable equilibrium, SD chromosomes turn over frequently within populations. © 2015 The Author(s). Evolution published by Wiley Periodicals, Inc. on behalf of The Society for the Study of Evolution.

  2. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  3. Security For Wireless Sensor Network

    OpenAIRE

    Saurabh Singh,; Dr. Harsh Kumar Verma

    2011-01-01

    Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodescommunicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks aredeployed in hostile environments. Environmental conditions along with resource-constraints give...

  4. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  5. An Assessment of Emerging Wireless Broadband Technologies

    National Research Council Canada - National Science Library

    Fountanas, Leonidas

    2001-01-01

    ... technologies in providing broadband services today, emerging wireless broadband technologies are expected to significantly increase their market share over the next years, Deploying a wireless network...

  6. Photonics in wireless transceivers

    International Nuclear Information System (INIS)

    Bogani, A.; Ghelfi, P.

    2013-01-01

    During the last few years, the cross-fertilization between photonics and radio systems has been helping to overcome some major limitations of the classical radio technologies, setting new paradigms, and promising improved performance and new applications with strong benefits for public communications and safety. In particular, photonics-based wireless systems, albeit still at research level, are moving toward a new generation of multifunctional systems able to manage the wireless communication with several different frequencies and protocols, even simultaneously while also realizing surveillance operations. Photonics matches the new requirements of flexibility for software-defined architectures, thanks to its ultra-wide bandwidths and ease of tunability, and guarantees low footprint and weight, thanks to integrated photonic technologies. Moreover, photonics also allows increased resolution and sensitivity by means of the inherent low phase noise of lasers. (author)

  7. Wireless infrared computer control

    Science.gov (United States)

    Chen, George C.; He, Xiaofei

    2004-04-01

    Wireless mouse is not restricted by cable"s length and has advantage over its wired counterpart. However, all the mice available in the market have detection range less than 2 meters and angular coverage less than 180 degrees. Furthermore, commercial infrared mice are based on track ball and rollers to detect movements. This restricts them to be used in those occasions where users want to have dynamic movement, such as presentations and meetings etc. This paper presents our newly developed infrared wireless mouse, which has a detection range of 6 meters and angular coverage of 180 degrees. This new mouse uses buttons instead of traditional track ball and is developed to be a hand-held device like remote controller. It enables users to control cursor with a distance closed to computer and the mouse to be free from computer operation.

  8. Adaptive Wireless Transceiver, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  9. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  10. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  11. Wearable wireless photoplethysmography sensors

    Science.gov (United States)

    Spigulis, Janis; Erts, Renars; Nikiforovs, Vladimirs; Kviesis-Kipge, Edgars

    2008-04-01

    Wearable health monitoring sensors may support early detection of abnormal conditions and prevention of their consequences. Recent designs of three wireless photoplethysmography monitoring devices embedded in hat, glove and sock, and connected to PC or mobile phone by means of the Bluetooth technology, are described. First results of distant monitoring of heart rate and pulse wave transit time using the newly developed devices are presented.

  12. Wireless Cellular Mobile Communications

    OpenAIRE

    Zalud, V.

    2002-01-01

    In this article is briefly reviewed the history of wireless cellular mobile communications, examined the progress in current second generation (2G) cellular standards and discussed their migration to the third generation (3G). The European 2G cellular standard GSM and its evolution phases GPRS and EDGE are described somewhat in detail. The third generation standard UMTS taking up on GSM/GPRS core network and equipped with a new advanced access network on the basis of code division multiple ac...

  13. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  14. Green Wireless Power Transfer Networks

    NARCIS (Netherlands)

    Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.

    2016-01-01

    wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.

  15. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  16. Next Generation Intelligent Wireless Infrastructure

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg

    2010-01-01

    Given the commercial success of wireless technologies that has already taken place over the last couple of decades, with a global mobile communication penetration beyond 3 billion subscribers as well as the enormous success of wireless data communication through IEEE 802.11x and Bluetooth, people...

  17. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  18. Wireless Technology in K-12 Education

    Science.gov (United States)

    Walery, Darrell

    2004-01-01

    Many schools begin implementing wireless technology slowly by creating wireless "hotspots" on the fly. This is accomplished by putting a wireless access point on a cart along with a set of wireless laptop computers. A teacher can then wheel the cart anywhere in the school that has a network drop, plug the access point in and have an…

  19. Virophages, polintons, and transpovirons: a complex evolutionary network of diverse selfish genetic elements with different reproduction strategies.

    Science.gov (United States)

    Yutin, Natalya; Raoult, Didier; Koonin, Eugene V

    2013-05-23

    Recent advances of genomics and metagenomics reveal remarkable diversity of viruses and other selfish genetic elements. In particular, giant viruses have been shown to possess their own mobilomes that include virophages, small viruses that parasitize on giant viruses of the Mimiviridae family, and transpovirons, distinct linear plasmids. One of the virophages known as the Mavirus, a parasite of the giant Cafeteria roenbergensis virus, shares several genes with large eukaryotic self-replicating transposon of the Polinton (Maverick) family, and it has been proposed that the polintons evolved from a Mavirus-like ancestor. We performed a comprehensive phylogenomic analysis of the available genomes of virophages and traced the evolutionary connections between the virophages and other selfish genetic elements. The comparison of the gene composition and genome organization of the virophages reveals 6 conserved, core genes that are organized in partially conserved arrays. Phylogenetic analysis of those core virophage genes, for which a sufficient diversity of homologs outside the virophages was detected, including the maturation protease and the packaging ATPase, supports the monophyly of the virophages. The results of this analysis appear incompatible with the origin of polintons from a Mavirus-like agent but rather suggest that Mavirus evolved through recombination between a polinton and an unknown virus. Altogether, virophages, polintons, a distinct Tetrahymena transposable element Tlr1, transpovirons, adenoviruses, and some bacteriophages form a network of evolutionary relationships that is held together by overlapping sets of shared genes and appears to represent a distinct module in the vast total network of viruses and mobile elements. The results of the phylogenomic analysis of the virophages and related genetic elements are compatible with the concept of network-like evolution of the virus world and emphasize multiple evolutionary connections between bona fide

  20. Wireless Distributed Antenna MIMO

    DEFF Research Database (Denmark)

    2015-01-01

    The present disclosure relates to system applications of multicore optical fibers. One embodiment relates to a base transceiver station for a wireless telecommunication system comprising a plurality of antenna units arranged in a MIMO configuration and adapted for transmission and/or reception...... of radio-frequency signals, an optical transmitter in the form of an electro-optic conversion unit for each of said plurality of antenna units, each electro-optic conversion unit adapted for converting an RF signal into an optical signal, a plurality of a single core optical fibers for guiding the optical...

  1. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  2. Investigating wireless power transfer

    Science.gov (United States)

    St John, Stuart A.

    2017-09-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.

  3. Deployable wireless Fresnel lens

    Science.gov (United States)

    Kennedy, Timothy F. (Inventor); Fink, Patrick W. (Inventor); Chu, Andrew W. (Inventor); Lin, Gregory Y. (Inventor)

    2013-01-01

    Apparatus and methods for enhancing the gain of a wireless signal are provided. In at least one specific embodiment, the apparatus can include a screen comprised of one or more electrically conductive regions for reflecting electromagnetic radiation and one or more non-conductive regions for permitting electromagnetic radiation therethrough. The one or more electrically conductive regions can be disposed adjacent to at least one of the one or more non-conductive regions. The apparatus can also include a support member disposed about at least a portion of the screen. The screen can be capable of collapsing by twisting the support member in opposite screw senses to form interleaved concentric sections.

  4. Wireless Headset Communication System

    Science.gov (United States)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  5. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  6. Wireless passive radiation sensor

    Science.gov (United States)

    Pfeifer, Kent B; Rumpf, Arthur N; Yelton, William G; Limmer, Steven J

    2013-12-03

    A novel measurement technique is employed using surface acoustic wave (SAW) devices, passive RF, and radiation-sensitive films to provide a wireless passive radiation sensor that requires no batteries, outside wiring, or regular maintenance. The sensor is small (<1 cm.sup.2), physically robust, and will operate unattended for decades. In addition, the sensor can be insensitive to measurement position and read distance due to a novel self-referencing technique eliminating the need to measure absolute responses that are dependent on RF transmitter location and power.

  7. Wireless installation standard

    International Nuclear Information System (INIS)

    Lim, Hwang Bin

    2007-12-01

    This is divided six parts which are radio regulation law on securing of radio resource, use of radio resource, protection of radio resource, radio regulation enforcement ordinance with securing, distribution and assignment of radio regulation, radio regulation enforcement regulation on utility of radio resource and technical qualification examination, a wireless installation regulation of technique standard and safety facility standard, radio regulation such as certification regulation of information communicative machines and regulation of radio station on compliance of signal security, radio equipment in radio station, standard frequency station and emergency communication.

  8. Wireless Cellular Mobile Communications

    Directory of Open Access Journals (Sweden)

    V. Zalud

    2002-12-01

    Full Text Available In this article is briefly reviewed the history of wireless cellularmobile communications, examined the progress in current secondgeneration (2G cellular standards and discussed their migration to thethird generation (3G. The European 2G cellular standard GSM and itsevolution phases GPRS and EDGE are described somewhat in detail. Thethird generation standard UMTS taking up on GSM/GPRS core network andequipped with a new advanced access network on the basis of codedivision multiple access (CDMA is investigated too. A sketch of theperspective of mobile communication beyond 3G concludes this article.

  9. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  10. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  11. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  12. Household wireless electroencephalogram hat

    Science.gov (United States)

    Szu, Harold; Hsu, Charles; Moon, Gyu; Yamakawa, Takeshi; Tran, Binh

    2012-06-01

    We applied Compressive Sensing to design an affordable, convenient Brain Machine Interface (BMI) measuring the high spatial density, and real-time process of Electroencephalogram (EEG) brainwaves by a Smartphone. It is useful for therapeutic and mental health monitoring, learning disability biofeedback, handicap interfaces, and war gaming. Its spec is adequate for a biomedical laboratory, without the cables hanging over the head and tethered to a fixed computer terminal. Our improved the intrinsic signal to noise ratio (SNR) by using the non-uniform placement of the measuring electrodes to create the proximity of measurement to the source effect. We computing a spatiotemporal average the larger magnitude of EEG data centers in 0.3 second taking on tethered laboratory data, using fuzzy logic, and computing the inside brainwave sources, by Independent Component Analysis (ICA). Consequently, we can overlay them together by non-uniform electrode distribution enhancing the signal noise ratio and therefore the degree of sparseness by threshold. We overcame the conflicting requirements between a high spatial electrode density and precise temporal resolution (beyond Event Related Potential (ERP) P300 brainwave at 0.3 sec), and Smartphone wireless bottleneck of spatiotemporal throughput rate. Our main contribution in this paper is the quality and the speed of iterative compressed image recovery algorithm based on a Block Sparse Code (Baranuick et al, IEEE/IT 2008). As a result, we achieved real-time wireless dynamic measurement of EEG brainwaves, matching well with traditionally tethered high density EEG.

  13. Microwave materials for wireless applications

    CERN Document Server

    Cruickshank, David B

    2011-01-01

    This practical resource offers you an in-depth, up-to-date understanding of the use of microwave magnetic materials for cutting-edge wireless applications. The book discusses device applications used in wireless infrastructure base stations, point-to-point radio links, and a range of more specialized microwave systems. You find detailed discussions on the attributes of each family of magnetic materials with respect to specific wireless applications. Moreover, the book addresses two of the hottest topics in the field today - insertion loss and intermodulation. This comprehensive reference also

  14. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  15. Structural processing for wireless communications

    CERN Document Server

    Lu, Jianhua; Ge, Ning

    2015-01-01

    This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.

  16. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  17. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  18. Wireless Power Transfer and Data Collection in Wireless Sensor Networks

    OpenAIRE

    Li, Kai; Ni, Wei; Duan, Lingjie; Abolhasan, Mehran; Niu, Jianwei

    2017-01-01

    In a rechargeable wireless sensor network, the data packets are generated by sensor nodes at a specific data rate, and transmitted to a base station. Moreover, the base station transfers power to the nodes by using Wireless Power Transfer (WPT) to extend their battery life. However, inadequately scheduling WPT and data collection causes some of the nodes to drain their battery and have their data buffer overflow, while the other nodes waste their harvested energy, which is more than they need...

  19. Ultrasonic wireless health monitoring

    Science.gov (United States)

    Petit, Lionel; Lefeuvre, Elie; Guyomar, Daniel; Richard, Claude; Guy, Philippe; Yuse, Kaori; Monnier, Thomas

    2006-03-01

    The integration of autonomous wireless elements in health monitoring network increases the reliability by suppressing power supplies and data transmission wiring. Micro-power piezoelectric generators are an attractive alternative to primary batteries which are limited by a finite amount of energy, a limited capacity retention and a short shelf life (few years). Our goal is to implement such an energy harvesting system for powering a single AWT (Autonomous Wireless Transmitter) using our SSH (Synchronized Switch Harvesting) method. Based on a non linear process of the piezoelement voltage, this SSH method optimizes the energy extraction from the mechanical vibrations. This AWT has two main functions : The generation of an identifier code by RF transmission to the central receiver and the Lamb wave generation for the health monitoring of the host structure. A damage index is derived from the variation between the transmitted wave spectrum and a reference spectrum. The same piezoelements are used for the energy harvesting function and the Lamb wave generation, thus reducing mass and cost. A micro-controller drives the energy balance and synchronizes the functions. Such an autonomous transmitter has been evaluated on a 300x50x2 mm 3 composite cantilever beam. Four 33x11x0.3 mm 3 piezoelements are used for the energy harvesting and for the wave lamb generation. A piezoelectric sensor is placed at the free end of the beam to track the transmitted Lamb wave. In this configuration, the needed energy for the RF emission is 0.1 mJ for a 1 byte-information and the Lamb wave emission requires less than 0.1mJ. The AWT can harvested an energy quantity of approximately 20 mJ (for a 1.5 Mpa lateral stress) with a 470 μF storage capacitor. This corresponds to a power density near to 6mW/cm 3. The experimental AWT energy abilities are presented and the damage detection process is discussed. Finally, some envisaged solutions are introduced for the implementation of the required data

  20. Wireless sensor network topology control

    OpenAIRE

    Zuk, Olexandr; Romanjuk, Valeriy; Sova, Oleg

    2010-01-01

    Topology control process for the wireless sensor network is considered. In this article the use of rule base for making decision on the search of optimum network topology is offered for the realization of different aims of network management.

  1. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  2. Wireless Damage Location Sensing System

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant Douglas (Inventor)

    2012-01-01

    A wireless damage location sensing system uses a geometric-patterned wireless sensor that resonates in the presence of a time-varying magnetic field to generate a harmonic response that will experience a change when the sensor experiences a change in its geometric pattern. The sensing system also includes a magnetic field response recorder for wirelessly transmitting the time-varying magnetic field and for wirelessly detecting the harmonic response. The sensing system compares the actual harmonic response to a plurality of predetermined harmonic responses. Each predetermined harmonic response is associated with a severing of the sensor at a corresponding known location thereof so that a match between the actual harmonic response and one of the predetermined harmonic responses defines the known location of the severing that is associated therewith.

  3. Wireless sensor network adaptive cooling

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, T. [SynapSense Corp., Folsom, CA (United States)

    2009-07-01

    Options for reducing data centre cooling energy requirements and their cost savings were discussed with particular reference to a wireless control solution developed by SynapSense Corporation. The wireless sensor network reduces cooling energy use at data centres by providing improved air flow management through the installation of cold aisle containment. The use of this low cost, non-invasive wireless sensor network has reduced the cooling energy use in a data center at BC Hydro by 30 per cent. The system also reduced the server and storage fan energy by 3 per cent by maintaining inlet air temperature below ASHRAE recommended operating range. The distribution of low power, low cost wireless sensors has enabled visualization tools that are changing the way that data centres are managed. The annual savings have been estimated at 4,560,000 kWh and the annual carbon dioxide abatement is approximately 1,400 metric tons. tabs., figs.

  4. Cooperative Diversity in Wireless Networks

    Directory of Open Access Journals (Sweden)

    A. Mahmood

    2010-01-01

    Full Text Available Transmit Diversity is an effective methodology for improving the quality and reliability of a wireless network by reducingthe effects of fading. As majority of the wireless devices (i.e. mobile handsets, etc are limited to only one antenna, especiallydue to hardware constraints, size and cost factors; cooperative communication can be utilized in order to generatetransmit diversity [1]. This enables single antenna wireless devices to share their antennas during transmission in such amanner that creates a virtual MIMO (multiple-input and multiple-output system [2] [3]. In this paper, we will analyze therecent developments and trends in this promising area of wireless Ad hoc networks. The article will also discuss variousmain cooperative signaling methods and will also observe their performance.

  5. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  6. Wireless transmission of power

    International Nuclear Information System (INIS)

    Grotz, T.

    1991-01-01

    This paper reports that it has been proven by researchers that electrical energy can be propagated around the world between the surface of the Earth and the ionosphere at extremely low frequencies in what is known as the Schumann Cavity. Experiments to data have shown that electromagnetic waves with frequencies in the range of 8 Hz, the fundamental Schumann Resonance frequency, propagate with litter attenuation around the planet within the Schumann Cavity. It is the intent of this research to determine if the Schumann Cavity can be resonated, if the power that is delivered to the cavity propagated with very low losses, and if power can be extracted at other locations within the cavity. Experimental data collected and calculations made in recent years support the hypothesis that wireless power transmission is a viable and practical alternative to the present systems of power transmission

  7. Wireless power transfer system

    Science.gov (United States)

    Wu, Hunter; Sealy, Kylee; Gilchrist, Aaron

    2016-02-23

    A system includes a first stage of an inductive power transfer system with an LCL load resonant converter with a switching section, an LCL tuning circuit, and a primary receiver pad. The IPT system includes a second stage with a secondary receiver pad, a secondary resonant circuit, a secondary rectification circuit, and a secondary decoupling converter. The secondary receiver pad connects to the secondary resonant circuit. The secondary resonant circuit connects to the secondary rectification circuit. The secondary rectification circuit connects to the secondary decoupling converter. The second stage connects to a load. The load includes an energy storage element. The second stage and load are located on a vehicle and the first stage is located at a fixed location. The primary receiver pad wirelessly transfers power to the secondary receiver pad across a gap when the vehicle positions the secondary receiver pad with respect to the primary receiver pad.

  8. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  9. Wireless data link for FBTR

    International Nuclear Information System (INIS)

    Sundararajan, M.K.; Prabhakara Rao, G.; Ilango Sambasivan, S.; Swaminathan, P.; Ramakrishna, P.V.

    2004-01-01

    This paper deals with the design and development of a wireless data link for transmission of block pile signals at the Fast Breeder Test Reactor (FBTR) of Indira Gandhi Center for Atomic Research (IGCAR). This link is to establish wireless connectivity, typically at RS232C rates, over distances of the order of 50 m, and is expected to operate under electrically hostile conditions. (author)

  10. Wireless Sensor Network Safety Study

    OpenAIRE

    M.Shankar; Dr.M.Sridar; Dr.M.Rajani

    2012-01-01

    Few security mechanisms in wireless sensor networks (WSNs) have been implemented, and even fewer have been applied in real deployments. The limited resources of each sensor node makes security in WSNs hard, as the tradeoff between security and practicality must be carefully considered. These complex systems include in their design different types of information and communication technology systems, such as wireless (mesh) sensor networks, to carry out control processes in real time. This fact...

  11. Wireless data signal transmission system

    DEFF Research Database (Denmark)

    2014-01-01

    The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver.......The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver....

  12. Wireless Smart Systems Beyond RFID

    OpenAIRE

    Vermesan, Ovidiu

    2008-01-01

    It is expected that in the coming 20 years the IoT will be pervasive, and ubiquitous: smart devices, embedded in smart materials, will work in synergy to improve the quality of our lives. In this context wireless smart systems will play an essential role that is far beyond the ID information that is part of RFID devices today. Wireless Smart Systems Beyond RFID

  13. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  14. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  15. Wireless sensor network

    Science.gov (United States)

    Perotti, Jose M.; Lucena, Angel R.; Mullenix, Pamela A.; Mata, Carlos T.

    2006-05-01

    Current and future requirements of aerospace sensors and transducers demand the design and development of a new family of sensing devices, with emphasis on reduced weight, power consumption, and physical size. This new generation of sensors and transducers will possess a certain degree of intelligence in order to provide the end user with critical data in a more efficient manner. Communication between networks of traditional or next-generation sensors can be accomplished by a Wireless Sensor Network (WSN) developed by NASA's Instrumentation Branch and ASRC Aerospace Corporation at Kennedy Space Center (KSC), consisting of at least one central station and several remote stations and their associated software. The central station is application-dependent and can be implemented on different computer hardware, including industrial, handheld, or PC-104 single-board computers, on a variety of operating systems: embedded Windows, Linux, VxWorks, etc. The central stations and remote stations share a similar radio frequency (RF) core module hardware that is modular in design. The main components of the remote stations are an RF core module, a sensor interface module, batteries, and a power management module. These modules are stackable, and a common bus provides the flexibility to stack other modules for additional memory, increased processing, etc. WSN can automatically reconfigure to an alternate frequency if interference is encountered during operation. In addition, the base station will autonomously search for a remote station that was perceived to be lost, using relay stations and alternate frequencies. Several wireless remote-station types were developed and tested in the laboratory to support different sensing technologies, such as resistive temperature devices, silicon diodes, strain gauges, pressure transducers, and hydrogen leak detectors.

  16. Experience of research of valued-normative sphere of persons that accomplish felonious homicides from selfish motives

    Directory of Open Access Journals (Sweden)

    Ю. О. Оберемко

    2015-11-01

    advantage in physical force and by spontaneity of attack, they satisfy with the mercenary motives a violent way. Conclusions of the research. Investigating the valued-normative sphere of persons that accomplished felonious homicides from selfish motives, it is possible to come to the next conclusions. On the basis of empiric researches we are set reliable differences in the psychological lines of persons that accomplish felonious homicides from selfish motives and thieves. The educed deformations of valued-normative and emotionally-volitional spheres of mercenary killers predetermine the choice of violent method of laying hands on property. Low level of such volitional qualities as independence, self-control and attentiveness in a great deal explain aspiration of criminals to unite in criminal groups for the achievement of general mercenary aim.

  17. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    Science.gov (United States)

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  18. Traffic Profiling in Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Kirykos, Georgios

    2006-01-01

    .... Wireless sensor networks pose unique challenges and limitations to the traditional schemes, which are used in the other wireless networks for security protection, and are due mainly to the increased...

  19. Wireless Connectivity to ATM Communication Grid

    National Research Council Canada - National Science Library

    Rajaravivarma, Veeramuthu

    1998-01-01

    The AFOSR funds were used to purchase a 12 port Fore ATM switch, ATM network interface cards, a SUN UltraSPARC workstation, Lucent WavePoint wireless bridge, and Lucent WaveLAN wireless network interface cards...

  20. Novel Concepts of Cooperative Wireless Networking

    DEFF Research Database (Denmark)

    Zhang, Qi

    2008-01-01

    ; secondly, the increasing density of the wireless devices makes cooperation possible; last, the cost of information exchange (i.e. transmission power, transmission time, spectrum, etc.) is very low if information exchange over short-range link is needed. Cooperation changes the way of information delivery......Although wireless networks have achieved great success in the lastest two decades, the current wireless networks have difficulties to fulll users' ever-increasing expectations and needs. It is mainly due to available spectrum resource scarcity, limited battery capacity of wireless device......, unreliable wireless radio link, etc. To tackle these issues, a new telecommunication paradigm has been proposed, referred to as cooperative wireless networking [1]. The basic idea of cooperative wireless networking is that wireless devices work together to achieve their individual goals or one common goal...

  1. Energy efficiency in future wireless broadband networks

    CSIR Research Space (South Africa)

    Masonta, MT

    2012-10-01

    Full Text Available greener economy and environment. In this research, we investigate the concept of green radio communications in wireless networks and discuss approaches for energy efficient solutions in wireless broadband network deployments. These solutions include...

  2. REVIEW OF WIRELESS MIMO CHANNEL MODELS

    African Journals Online (AJOL)

    user

    MIMO wireless system, the transmitted signal interacts ... delay spread information, power delay profile, angle of arrival and ... With the advent of the MIMO wireless systems, there arose a ..... associated with channel transmission and reception.

  3. DISA Wireless E-Mail Trial

    National Research Council Canada - National Science Library

    Haney, Steven

    1997-01-01

    .... Correspondingly unique wireless modems were obtained and mated to the PCMCIA slot of notebook computers in the user/evaluation population, consisting of InfoTac and Mobedem wireless modems for use...

  4. Kali Linux wireless penetration testing beginner's guide

    CERN Document Server

    Ramachandran, Vivek

    2015-01-01

    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

  5. Wireless Physical Layer Security with CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2017-01-01

    Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users

  6. Electric Vehicle and Wireless Charging Laboratory

    Science.gov (United States)

    2018-03-23

    Wireless charging tests of electric vehicles (EV) have been conducted at the EVTC Wireless Laboratory located at the Florida Solar Energy Center, Cocoa, FL. These tests were performed to document testing protocols, evaluate standards and evaluate ope...

  7. A selfish genetic element influencing longevity correlates with reactive behavioural traits in female house mice (Mus domesticus.

    Directory of Open Access Journals (Sweden)

    Yannick Auclair

    Full Text Available According to theory in life-history and animal personality, individuals with high fitness expectations should be risk-averse, while individuals with low fitness expectations should be more bold. In female house mice, a selfish genetic element, the t haplotype, is associated with increased longevity under natural conditions, representing an appropriate case study to investigate this recent theory empirically. Following theory, females heterozygous for the t haplotype (+/t are hypothesised to express more reactive personality traits and be more shy, less explorative and less active compared to the shorter-lived homozygous wildtype females (+/+. As males of different haplotype do not differ in survival, no similar pattern is expected. We tested these predictions by quantifying boldness, exploration, activity, and energetic intake in both +/t and +/+ mice. +/t females, unlike +/+ ones, expressed some reactive-like personality traits: +/t females were less active, less prone to form an exploratory routine and tended to ingest less food. Taken together these results suggest that differences in animal personality may contribute to the survival advantage observed in +/t females but fail to provide full empirical support for recent theory.

  8. Properties and natural occurrence of maternal-effect selfish genes ('Medea' factors) in the red flour beetle, tribolium castaneum

    Science.gov (United States)

    Beeman; Friesen

    1999-05-01

    Maternally acting selfish genes, termed 'Medea' factors, were found to be widespread in wild populations of Tribolium castaneum collected in Europe, North and South America, Africa and south-east Asia, but were rare or absent in populations from Australia and the Indian subcontinent. We detected at least four distinct genetic loci in at least two different linkage groups that exhibit the Medea pattern of differential mortality of genotypes within maternal families. Although each M factor tested had similar properties of maternal lethality to larvae and zygotic self-rescue, M factors representing distinct loci did not show cross-rescue. Alleles at two of these loci, M1 and M4, were by far the most prevalent, M4 being the predominant type. M2 and M3 were each found only once, in Pakistan and Japan, respectively. Although M1 could be genetically segregated from M4 and maintained as a purified stock, the M1 factor invariably co-occurred with M4 in field populations, whereas M4 usually occurred in the absence of other Medea factors. The dominant maternal lethal action of M1 could be selectively inactivated (reverted) by gene-knockout gamma irradiation with retention of zygotic rescue activity.

  9. Novel synthetic Medea selfish genetic elements drive population replacement in Drosophila; a theoretical exploration of Medea-dependent population suppression.

    Science.gov (United States)

    Akbari, Omar S; Chen, Chun-Hong; Marshall, John M; Huang, Haixia; Antoshechkin, Igor; Hay, Bruce A

    2014-12-19

    Insects act as vectors for diseases of plants, animals, and humans. Replacement of wild insect populations with genetically modified individuals unable to transmit disease provides a potentially self-perpetuating method of disease prevention. Population replacement requires a gene drive mechanism in order to spread linked genes mediating disease refractoriness through wild populations. We previously reported the creation of synthetic Medea selfish genetic elements able to drive population replacement in Drosophila. These elements use microRNA-mediated silencing of myd88, a maternally expressed gene required for embryonic dorso-ventral pattern formation, coupled with early zygotic expression of a rescuing transgene, to bring about gene drive. Medea elements that work through additional mechanisms are needed in order to be able to carry out cycles of population replacement and/or remove existing transgenes from the population, using second-generation elements that spread while driving first-generation elements out of the population. Here we report the synthesis and population genetic behavior of two new synthetic Medea elements that drive population replacement through manipulation of signaling pathways involved in cellular blastoderm formation or Notch signaling, demonstrating that in Drosophila Medea elements can be generated through manipulation of diverse signaling pathways. We also describe the mRNA and small RNA changes in ovaries and early embryos associated from Medea-bearing females. Finally, we use modeling to illustrate how Medea elements carrying genes that result in diapause-dependent female lethality could be used to bring about population suppression.

  10. Cutting the canopy to defeat the "selfish gene"; conflicting selection pressures for the integration of phototrophy in mixotrophic protists.

    Science.gov (United States)

    Flynn, Kevin J; Hansen, Per Juel

    2013-11-01

    In strict photoautotrophs, and in many mixotrophic protists, growth at low light stimulates the increased content of photopigment. This photoacclimation further elevates cellular Chl:C content through positive feedback (self-shading), until cellular Chl:C attains a maximum (ChlC(max)). This process, driven by the "selfish gene", enhances the fitness of the individual but decreases total population growth potential through community self-shading. However, some mixotrophic protists (generalist non-constitutives; GNC-mixotrophs) acquire their photosystems ready-made from phototrophic prey but they have no regulatory control on the acquired photosystems. When light is limiting, such organisms cannot photoacclimate; their total Chl:C ratio falls as their acquired photosystems are divided amongst daughter cells and also as the photosystems fail. We show that during that process, and with the removal (consumption) of their individually more efficient phototrophic prey, there is potential for populations of GNC-mixotrophs to become more efficient at light harvesting. Through this process these organisms may retain a critical additional period of photosynthetic capacity. Together with the fact that the acquired photosystem biomass can be potentially almost entirely converted into mixotroph biomass (while chloroplasts must remain an important component of biomass in constitutive mixotrophs, with an associated investment), this may help explain the success of GNC-mixotrophs. Copyright © 2013 Elsevier GmbH. All rights reserved.

  11. Sinkhole Avoidance Routing in Wireless Sensor Networks

    Science.gov (United States)

    2011-05-09

    COVERED (From- To) 09-05-2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Sinkhole Avoidance Routing in Wireless Sensor Networks 5b . GRANT NUMBER . 5c...reliability of wireless sensor networks. 15. SUBJECT TERMS wireless sensor networks, sinkhole attack, routing protocol 16. SECURITY CLASSIFICATION...Include area code) Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std . Z39.18 1 Sinkhole Avoidance Routing in Wireless Sensor Networks MIDN 1/C

  12. Security for 5G Mobile Wireless Networks

    OpenAIRE

    Fang, Dongfeng; Qian, Yi; Qingyang Hu, Rose

    2017-01-01

    The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use ca...

  13. An Improved Wireless Battery Charging System

    OpenAIRE

    Woo-Seok Lee; Jin-Hak Kim; Shin-Young Cho; Il-Oun Lee

    2018-01-01

    This paper presents a direct wireless battery charging system. The output current of the series-series compensated wireless power transfer (SS-WPT) system is used as a current source, and the output voltage of AC-DC converter controls the current source. Therefore, the proposed wireless battery charging system needs no battery charging circuit to carry out charging profiles, and can solve space constraints and thermal problems in many battery applications. In addition, the proposed wireless b...

  14. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  15. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  16. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  17. Advanced Wireless Sensor Nodes - MSFC

    Science.gov (United States)

    Varnavas, Kosta; Richeson, Jeff

    2017-01-01

    NASA field center Marshall Space Flight Center (Huntsville, AL), has invested in advanced wireless sensor technology development. Developments for a wireless microcontroller back-end were primarily focused on the commercial Synapse Wireless family of devices. These devices have many useful features for NASA applications, good characteristics and the ability to be programmed Over-The-Air (OTA). The effort has focused on two widely used sensor types, mechanical strain gauges and thermal sensors. Mechanical strain gauges are used extensively in NASA structural testing and even on vehicle instrumentation systems. Additionally, thermal monitoring with many types of sensors is extensively used. These thermal sensors include thermocouples of all types, resistive temperature devices (RTDs), diodes and other thermal sensor types. The wireless thermal board will accommodate all of these types of sensor inputs to an analog front end. The analog front end on each of the sensors interfaces to the Synapse wireless microcontroller, based on the Atmel Atmega128 device. Once the analog sensor output data is digitized by the onboard analog to digital converter (A/D), the data is available for analysis, computation or transmission. Various hardware features allow custom embedded software to manage battery power to enhance battery life. This technology development fits nicely into using numerous additional sensor front ends, including some of the low-cost printed circuit board capacitive moisture content sensors currently being developed at Auburn University.

  18. Techniques for Wireless Applications

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-05-01

    Switching techniques have been first proposed as a spacial diversity techniques. These techniques have been shown to reduce considerably the processing load while letting multi-antenna systems achieve a specific target performance. In this thesis, we take a different look at the switching schemes by implementing them for different other wireless applications. More specifically, this thesis consists of three main parts, where the first part considers a multiuser environment and an adaptive scheduling algorithm based on the switching with post-selection scheme for statistically independent but non-identically distributed channel conditions. The performance of this switched based scheduler is investigated and a multitude of performance metrics are presented. In a second part, we propose and analyze the performance of three switched-based algorithms for interference reduction in the downlink of over-loaded femtocells. For instance, performance metrics are derived in closed-form and these metrics are used to compare these three proposed schemes. Finally in a third part, a switch based opportunistic channel access scheme is proposed for a cognitive radio system and its performance is analyzed in terms of two new proposed metrics namely the average cognitive radio access and the waiting time duration.

  19. Photonic-assisted ultrafast THz wireless access

    DEFF Research Database (Denmark)

    Yu, Xianbin; Chen, Ying; Galili, Michael

    THz technology has been considered feasible for ultrafast wireless data communi- cation, to meet the increasing demand on next-generation fast wireless access, e.g., huge data file transferring and fast mobile data stream access. This talk reviews recent progress in high-speed THz wireless...

  20. A Game Theoretic Approach for Balancing Energy Consumption in Clustered Wireless Sensor Networks.

    Science.gov (United States)

    Yang, Liu; Lu, Yinzhi; Xiong, Lian; Tao, Yang; Zhong, Yuanchang

    2017-11-17

    Clustering is an effective topology control method in wireless sensor networks (WSNs), since it can enhance the network lifetime and scalability. To prolong the network lifetime in clustered WSNs, an efficient cluster head (CH) optimization policy is essential to distribute the energy among sensor nodes. Recently, game theory has been introduced to model clustering. Each sensor node is considered as a rational and selfish player which will play a clustering game with an equilibrium strategy. Then it decides whether to act as the CH according to this strategy for a tradeoff between providing required services and energy conservation. However, how to get the equilibrium strategy while maximizing the payoff of sensor nodes has rarely been addressed to date. In this paper, we present a game theoretic approach for balancing energy consumption in clustered WSNs. With our novel payoff function, realistic sensor behaviors can be captured well. The energy heterogeneity of nodes is considered by incorporating a penalty mechanism in the payoff function, so the nodes with more energy will compete for CHs more actively. We have obtained the Nash equilibrium (NE) strategy of the clustering game through convex optimization. Specifically, each sensor node can achieve its own maximal payoff when it makes the decision according to this strategy. Through plenty of simulations, our proposed game theoretic clustering is proved to have a good energy balancing performance and consequently the network lifetime is greatly enhanced.

  1. Information Assurance in Wireless Networks

    Science.gov (United States)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  2. [Development of Bluetooth wireless sensors].

    Science.gov (United States)

    Moor, C; Schwaibold, M; Roth, H; Schöchlin, J; Bolz, A

    2002-01-01

    Wireless communication could help to overcome current obstacles in medical devices and could enable medical services to offer completely new scenarios in health care. The Bluetooth technology which is the upcoming global market leader in wireless communication turned out to be perfectly suited not only for consumer market products but also in the medical environment [1]. It offers a low power, low cost connection in the medium range of 1-100 m with a bandwidth of currently 723.2 kbaud. This paper describes the development of a wireless ECG device and a Pulse Oximeter. Equipped with a Bluetooth port, the measurement devices are enabled to transmit data between the sensor and a Bluetooth-monitor. Therefore, CSR's Bluetooth protocol embedded two-processor and embedded single-processor architecture has been used.

  3. The Wireless Nursing Call System

    DEFF Research Database (Denmark)

    Jensen, Casper Bruun

    2006-01-01

    This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight into the cha......This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight...

  4. OFDM systems for wireless communications

    CERN Document Server

    Narasimhamurthy, Adarsh

    2010-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is

  5. Artificial intelligence in wireless communications

    CERN Document Server

    Rondeau, Thomas W

    2009-01-01

    This cutting-edge resource offers practical overview of cognitive radio, a paradigm for wireless communications in which a network or a wireless node changes its transmission or reception parameters. The alteration of parameters is based on the active monitoring of several factors in the external and internal radio environment. This book offers a detailed description of cognitive radio and its individual parts. Practitioners learn how the basic processing elements and their capabilities are implemented as modular components. Moreover, the book explains how each component can be developed and t

  6. Wireless technology for ABC Assessment

    DEFF Research Database (Denmark)

    Kristensen, Margit; Kyng, Morten; Christensen, Erika Frischknecht

    are developing: A wireless biomonitoring system (WBMS), where data, collected from (injured) persons is distributed wirelessly to displays, available for any rescuer in need of accessing the data, independently of the rescuers location. A biosensor for measuring respiration sound and frequency, to give direct....... Firstly in the daily EMS work where the collected data can be available at the hospital before the victim arrives and data can be used in the before-arrival-planning process. Secondly in larger incidents with several victims where a WBMS can support rescuers at the incident site in the assessment...

  7. Wireless Augmented Reality Communication System

    Science.gov (United States)

    Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)

    2017-01-01

    A portable unit is for video communication to select a user name in a user name network. A transceiver wirelessly accesses a communication network through a wireless connection to a general purpose node coupled to the communication network. A user interface can receive user input to log on to a user name network through the communication network. The user name network has a plurality of user names, at least one of the plurality of user names is associated with a remote portable unit, logged on to the user name network and available for video communication.

  8. Coherently Enhanced Wireless Power Transfer

    OpenAIRE

    Krasnok, Alex; Baranov, Denis G.; Generalov, Andrey; Li, Sergey; Alu, Andrea

    2017-01-01

    Extraction of electromagnetic energy by an antenna from impinging external radiation is at the basis of wireless communications and power transfer (WPT). The maximum of transferred energy is ensured when the antenna is conjugately matched, i.e., when it is resonant and it has an equal coupling with free space and its load, which is not easily implemented in near-field WPT. Here, we introduce the concept of coherently enhanced wireless power transfer. We show that a principle similar to the on...

  9. Embracing interference in wireless systems

    CERN Document Server

    Gollakota, Shyamnath

    2014-01-01

    The wireless medium is a shared resource. If nearby devices transmit at thesame time, their signals interfere, resulting in a collision. In traditionalnetworks, collisions cause the loss of the transmitted information. For thisreason, wireless networks have been designed with the assumption thatinterference is intrinsically harmful and must be avoided.This book, a revised version of the author's award-winning Ph.D.dissertation, takes an alternate approach: Instead of viewing interferenceas an inherently counterproductive phenomenon that should to be avoided, wedesign practical systems that tra

  10. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  11. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  12. The wireless Web and patient care.

    Science.gov (United States)

    Bergeron, B P

    2001-01-01

    Wireless computing, when integrated with the Web, is poised to revolutionize the practice and teaching of medicine. As vendors introduce wireless Web technologies in the medical community that have been used successfully in the business and consumer markets, clinicians can expect profound increases in the amount of patient data, as well as the ease with which those data are acquired, analyzed, and disseminated. The enabling technologies involved in this transformation to the wireless Web range from the new generation of wireless PDAs, eBooks, and wireless data acquisition peripherals to new wireless network protocols. The rate-limiting step in the application of this technology in medicine is not technology per se but rather how quickly clinicians and their patients come to accept and appreciate the benefits and limitations of the application of wireless Web technology.

  13. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless......Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...

  14. Transcriptome profiling of Nasonia vitripennis testis reveals novel transcripts expressed from the selfish B chromosome, paternal sex ratio.

    Science.gov (United States)

    Akbari, Omar S; Antoshechkin, Igor; Hay, Bruce A; Ferree, Patrick M

    2013-09-04

    A widespread phenomenon in nature is sex ratio distortion of arthropod populations caused by microbial and genetic parasites. Currently little is known about how these agents alter host developmental processes to favor one sex or the other. The paternal sex ratio (PSR) chromosome is a nonessential, paternally transmitted centric fragment that segregates in natural populations of the jewel wasp, Nasonia vitripennis. To persist, PSR is thought to modify the hereditary material of the developing sperm, with the result that all nuclear DNA other than the PSR chromosome is destroyed shortly after fertilization. This results in the conversion of a fertilized embryo--normally a female--into a male, thereby insuring transmission of the "selfish" PSR chromosome, and simultaneously leading to wasp populations that are male-biased. To begin to understand this system at the mechanistic level, we carried out transcriptional profiling of testis from WT and PSR-carrying males. We identified a number of transcripts that are differentially expressed between these conditions. We also discovered nine transcripts that are uniquely expressed from the PSR chromosome. Four of these PSR-specific transcripts encode putative proteins, whereas the others have very short open reading frames and no homology to known proteins, suggesting that they are long noncoding RNAs. We propose several different models for how these transcripts could facilitate PSR-dependent effects. Our analyses also revealed 15.71 MB of novel transcribed regions in the N. vitripennis genome, thus increasing the current annotation of total transcribed regions by 53.4%. Finally, we detected expression of multiple meiosis-related genes in the wasp testis, despite the lack of conventional meiosis in the male sex.

  15. Wireless Crew Communication Feasibility Assessment

    Science.gov (United States)

    Archer, Ronald D.; Romero, Andy; Juge, David

    2016-01-01

    Ongoing discussions with crew currently onboard the ISS as well as the crew debriefs from completed ISS missions indicate that issues associated with the lack of wireless crew communication results in increased crew task completion times and lower productivity, creates cable management issues, and increases crew frustration.

  16. Consumer acceptance of wireless finance

    NARCIS (Netherlands)

    Kleijnen, M.; Wetzels, M.G.M.; Ruyter, de J.C.

    2004-01-01

    M-commerce has been heralded repeatedly as the new service frontier of the millennium. Present market reality, however, seems to be less optimistic. Therefore, the current study explores the factors contributing to the adoption of mobile services in a context of wireless finance. The technology

  17. Wireless Power for Mobile Devices

    NARCIS (Netherlands)

    Waffenschmidt, E.

    2011-01-01

    Wireless power transfer allows a convenient, easy to use battery charging of mobile phones and other mobile devices. No hassle with cables and plugs, just place the device on a pad and that’s it. Such asystem even has the potential to become a standard charging solution. Where are the limits for

  18. The distributed wireless gathering problem

    NARCIS (Netherlands)

    Bonifaci, V.; Korteweg, P.; Marchetti Spaccamela, A.; Stougie, L.

    2011-01-01

    We address the problem of data gathering in a wireless network using multi-hop communication; our main goal is the analysis of simple algorithms suitable for implementation in realistic scenarios. We study the performance of distributed algorithms, which do not use any form of local coordination,

  19. Wireless Power Transfer, New Approach

    OpenAIRE

    Dr. Fawzy Mansour Al Zoreiqat

    2016-01-01

    Many configurations representing wireless power transfer have been applied for this purpose. A simple and effective circuit is used in this research that contains components which are easily located for constructing the complete suggested configuration; we were successful in using Li Fi technology in transmitting power from one side to another through air.

  20. Socially Aware Heterogeneous Wireless Networks.

    Science.gov (United States)

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-06-11

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  1. Data centric wireless sensor networks

    NARCIS (Netherlands)

    Dulman, S.O.; Havinga, Paul J.M.

    2005-01-01

    The vision of wirteless sensing systems requires the development of devices and technologies that can be pervasive without being intrusive. The basic component of such a smart environment will be a small node with sensing and wireless communications capabilities, able to organize itself flexibly

  2. Wireless and mobile systems in telemedicine

    Directory of Open Access Journals (Sweden)

    Reza Safdari

    2012-12-01

    Full Text Available Background: It is necessary to deploy mobile and wireless systems in healthcare, because they have many benefits for healthcare systems. The objectives of this article were introducing various systems, applications, and standards of the wireless and mobile telemedicine. Material and Methods: This review study was conducted in 2010. To conduct the study, published articles in the years 2005 to 2012, in English with an emphasis on wireless and mobile technologies in health were studied. Search was done with key words include telemedicine, wireless health systems, health and telecommunications technology in databases including Pubmed, Science Direct, Google Scholar, Web of Sciences, Proquest. The collected data were analyzed. Results: Telemedicine system in the ambulance, telemedicine systems in space, telecardiology systems, EEG system, ultrasound system are some types of wireless and mobile systems in telemedicine. PDA-based mobile and wireless telemedicine application, based PDA drug application, and patient tracking application are some of wireless and mobile applications of telemedicine. The most important standards of wireless and mobile telemedicine are HL7, DICOM, SNOMed, and ICD-9-CM. Conclusion: There are many challenges in the wireless and mobile systems in telemedicine, despite the many benefits. Slow speed in sending pictures and video, lack of attention to the privacy in the design of these systems, environmental variables and the number of users during the day are some of these challenges. It is recommended to consider these challenges during the planning and designing of wireless and mobile systems in telemedicine.

  3. Energy-efficient digital and wireless IC design for wireless smart sensing

    Science.gov (United States)

    Zhou, Jun; Huang, Xiongchuan; Wang, Chao; Tae-Hyoung Kim, Tony; Lian, Yong

    2017-10-01

    Wireless smart sensing is now widely used in various applications such as health monitoring and structural monitoring. In conventional wireless sensor nodes, significant power is consumed in wirelessly transmitting the raw data. Smart sensing adds local intelligence to the sensor node and reduces the amount of wireless data transmission via on-node digital signal processing. While the total power consumption is reduced compared to conventional wireless sensing, the power consumption of the digital processing becomes as dominant as wireless data transmission. This paper reviews the state-of-the-art energy-efficient digital and wireless IC design techniques for reducing the power consumption of the wireless smart sensor node to prolong battery life and enable self-powered applications.

  4. Adaptive Naive Bayes classification for wireless sensor networks

    NARCIS (Netherlands)

    Zwartjes, G.J.

    2017-01-01

    Wireless Sensor Networks are tiny devices equipped with sensors and wireless communication. These devices observe environments and communicatie about these observations. Machine Learning techniques are of interest for Wireless Sensor Network applications since they can reduce the amount of needed

  5. Performance Analysis of IIUM Wireless Campus Network

    International Nuclear Information System (INIS)

    Latif, Suhaimi Abd; Masud, Mosharrof H; Anwar, Farhat

    2013-01-01

    International Islamic University Malaysia (IIUM) is one of the leading universities in the world in terms of quality of education that has been achieved due to providing numerous facilities including wireless services to every enrolled student. The quality of this wireless service is controlled and monitored by Information Technology Division (ITD), an ISO standardized organization under the university. This paper aims to investigate the constraints of wireless campus network of IIUM. It evaluates the performance of the IIUM wireless campus network in terms of delay, throughput and jitter. QualNet 5.2 simulator tool has employed to measure these performances of IIUM wireless campus network. The observation from the simulation result could be one of the influencing factors in improving wireless services for ITD and further improvement

  6. Wireless Technology Application to Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jeong Kweon; Jeong, See Chae; Jeong, Ki Hoon; Oh, Do Young; Kim, Jae Hack

    2009-01-01

    Wireless technologies are getting widely used in various industrial processes for equipment condition monitoring, process measurement and other applications. In case of Nuclear Power Plant (NPP), it is required to review applicability of the wireless technologies for maintaining plant reliability, preventing equipment failure, and reducing operation and maintenance costs. Remote sensors, mobile technology and two-way radio communication may satisfy these needs. The application of the state of the art wireless technologies in NPPs has been restricted because of the vulnerability for the Electromagnetic Interference and Radio Frequency Interference (EMI/RFI) and cyber security. It is expected that the wireless technologies can be applied to the nuclear industry after resolving these issues which most of the developers and vendors are aware of. This paper presents an overview and information on general wireless deployment in nuclear facilities for future application. It also introduces typical wireless plant monitoring system application in the existing NPPs

  7. Introductory survey for wireless infrared communications

    Directory of Open Access Journals (Sweden)

    Munsif Ali Jatoi

    2014-08-01

    Full Text Available Wireless infrared communications can be defined as the propagation of light waves in free space using infrared radiation whose range is 400–700 nm. This range corresponds to frequencies of hundreds of terahertz, which is high for higher data rate applications. Wireless infrared is applied for higher data rates applications such as wireless computing, wireless video and wireless multimedia communication applications. Introduced by Gfeller, this field has grown with different link configurations, improved transmitter efficiency, increased receiver responsivity and various multiple access techniques for improved quality. Errors are caused because of background light, which causes degradation overall system performance. Error correction techniques are used to remove the errors caused during transmission. This study provides a brief account on field theory used for error correction in wireless infrared systems. The results are produced in terms of bit error rate and signal-to-noise ratio for various bit lengths to show the ability of encoding and decoding algorithms.

  8. Integration of RFID and Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  9. Wireless Network Penetration Testing and Security Auditing

    Directory of Open Access Journals (Sweden)

    Wang Shao-Long

    2016-01-01

    Full Text Available IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory environment to conduct penetration tests to confirm whether our wireless network is hackable or not. WAIDPS is configured as auditing tool to view wireless attacks, such as WEP/WPA/WPA2 cracking, rouge access points, denial of service attack. WAIDPS is designed to detect wireless intrusion with additional features. Penetration testing and auditing will mitigate the risk and threatening to protect WALN.

  10. mm-Wave Hybrid Photonic Wireless Links for Ultra-High Speed Wireless Transmissions

    DEFF Research Database (Denmark)

    Rommel, Simon; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso

    Hybrid photonic-wireless transmission schemes in the mm-wave frequency range are promising candidates to enable the multi-gigabit per second data communications required from wireless and mobile networks of the 5th and future generations. Large FCC spectrum allocations for wireless transmission...

  11. Topological Analysis of Wireless Networks (TAWN)

    Science.gov (United States)

    2016-05-31

    19b. TELEPHONE NUMBER (Include area code) 31-05-2016 FINAL REPORT 12-02-2015 -- 31-05-2016 Topological Analysis of Wireless Networks (TAWN) Robinson...Release, Distribution Unlimited) N/A The goal of this project was to develop topological methods to detect and localize vulnerabilities of wireless... topology U U U UU 32 Michael Robinson 202-885-3681 Final Report: May 2016 Topological Analysis of Wireless Networks Principal Investigator: Prof. Michael

  12. Computer-Based Wireless Advertising Communication System

    Directory of Open Access Journals (Sweden)

    Anwar Al-Mofleh

    2009-10-01

    Full Text Available In this paper we developed a computer based wireless advertising communication system (CBWACS that enables the user to advertise whatever he wants from his own office to the screen in front of the customer via wireless communication system. This system consists of two PIC microcontrollers, transmitter, receiver, LCD, serial cable and antenna. The main advantages of the system are: the wireless structure and the system is less susceptible to noise and other interferences because it uses digital communication techniques.

  13. Challenging Aspects of Terahertz Terabit Wireless Communications

    DEFF Research Database (Denmark)

    Yu, Xianbin; Galili, Michael; Jepsen, Peter Uhd

    The increasing demand on fast wireless communications, e.g. huge data file transferring and mobile broadband access, has driven wireless communication systems into a path towards Terabit era. Terahertz (THz) technology is promising due to its unique features, such as unlimited bandwidth available......, in terms of THz generation and link power budget. The THz atmospheric absorption is another critical issue to limit wireless communication range....

  14. Application opportunities in wireless communications. Final report

    International Nuclear Information System (INIS)

    Abbott, R.E.; Blevins, R.P.; Olmstead, C.

    1998-07-01

    This report presents the results of examinations of wireless technologies and applications that may offer potential to utilities. Five different wireless technology areas are reviewed. Three areas--Communication Networks, Monitored Security Services, and Home Automation--potentially represent new business ventures for utilities. Two areas--Automatic Vehicle Location and Automated Field-Force Management--represent wireless applications with potential for reduced operating costs and improved customer relations

  15. Energy-efficient wireless mesh infrastructures

    OpenAIRE

    Al-Hazmi, Y.; de Meer, Hermann; Hummel, Karin Anna; Meyer, Harald; Meo, Michela; Remondo Bueno, David

    2011-01-01

    The Internet comprises access segments with wired and wireless technologies. In the future, we can expect wireless mesh infrastructures (WMIs) to proliferate in this context. Due to the relatively low energy efficiency of wireless transmission, as compared to wired transmission, energy consumption of WMIs can represent a significant part of the energy consumption of the Internet as a whole. We explore different approaches to reduce energy consumption in WMIs, taking into accoun...

  16. Wireless Multi Hop Access Networks and Protocols

    OpenAIRE

    Nilsson Plymoth, Anders

    2007-01-01

    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points t...

  17. Wireless Sensor Needs Defined by SBIR Topics

    Science.gov (United States)

    Studor, George F.

    2010-01-01

    This slide presentation reviews the needs for wireless sensor technology from various U.S. government agencies as exhibited by an analysis of Small Business Innovation Research (SBIR) solicitations. It would appear that a multi-agency group looking at overlapping wireless sensor needs and technology projects is desired. Included in this presentation is a review of the NASA SBIR process, and an examination of some of the SBIR projects from NASA, and other agencies that involve wireless sensor development

  18. Mobility needs and wireless solutions

    DEFF Research Database (Denmark)

    Saugstrup, Dan; Henten, Anders

    The main purpose of this report is to spell out a methodological approach to the analysis of user needs with respect to mobility. Furthermore, this methodological approach is used in an exemplary analysis of the relationship between user needs and technology solutions offered by different wireless...... technologies. The report is based on a research approach, emphasizing important aspects in relation to developing more user oriented mobile services and applications in a heterogeneous network environment. As a staring point, Scandinavian research within the field of social science concerning mobility...... is described and discussed. Furthermore different wireless technologies are briefly described and discussed in relation to possible transmission capacities and coverage areas. In addition to this, a preliminary framework regarding the implications of mobility on the use and development of mobile services...

  19. Optical wireless communications for micromachines

    Science.gov (United States)

    O'Brien, Dominic C.; Yuan, Wei Wen; Liu, Jing Jing; Faulkner, Grahame E.; Elston, Steve J.; Collins, Steve; Parry-Jones, Lesley A.

    2006-08-01

    A key challenge for wireless sensor networks is minimizing the energy required for network nodes to communicate with each other, and this becomes acute for self-powered devices such as 'smart dust'. Optical communications is a potentially attractive solution for such devices. The University of Oxford is currently involved in a project to build optical wireless links to smart dust. Retro-reflectors combined with liquid crystal modulators can be integrated with the micro-machine to create a low power transceiver. When illuminated from a base station a modulated beam is returned, transmitting data. Data from the base station can be transmitted using modulation of the illuminating beam and a receiver at the micro-machine. In this paper we outline the energy consumption and link budget considerations in the design of such micro-machines, and report preliminary experimental results.

  20. Wireless autonomous device data transmission

    Science.gov (United States)

    Sammel, Jr., David W. (Inventor); Cain, James T. (Inventor); Mickle, Marlin H. (Inventor); Mi, Minhong (Inventor)

    2013-01-01

    A method of communicating information from a wireless autonomous device (WAD) to a base station. The WAD has a data element having a predetermined profile having a total number of sequenced possible data element combinations. The method includes receiving at the WAD an RF profile transmitted by the base station that includes a triggering portion having a number of pulses, wherein the number is at least equal to the total number of possible data element combinations. The method further includes keeping a count of received pulses and wirelessly transmitting a piece of data, preferably one bit, to the base station when the count reaches a value equal to the stored data element's particular number in the sequence. Finally, the method includes receiving the piece of data at the base station and using the receipt thereof to determine which of the possible data element combinations the stored data element is.

  1. Biomedical Wireless Ambulatory Crew Monitor

    Science.gov (United States)

    Chmiel, Alan; Humphreys, Brad

    2009-01-01

    A compact, ambulatory biometric data acquisition system has been developed for space and commercial terrestrial use. BioWATCH (Bio medical Wireless and Ambulatory Telemetry for Crew Health) acquires signals from biomedical sensors using acquisition modules attached to a common data and power bus. Several slots allow the user to configure the unit by inserting sensor-specific modules. The data are then sent real-time from the unit over any commercially implemented wireless network including 802.11b/g, WCDMA, 3G. This system has a distributed computing hierarchy and has a common data controller on each sensor module. This allows for the modularity of the device along with the tailored ability to control the cards using a relatively small master processor. The distributed nature of this system affords the modularity, size, and power consumption that betters the current state of the art in medical ambulatory data acquisition. A new company was created to market this technology.

  2. Propagation Engineering in Wireless Communications

    CERN Document Server

    Ghasemi, Abdollah; Ghasemi, Farshid

    2012-01-01

    Wireless communications has seen explosive growth in recent decades, in a realm that is both broad and rapidly expanding to include satellite services, navigational aids, remote sensing, telemetering, audio and video broadcasting, high-speed data communications, mobile radio systems and much more. Propagation Engineering in Wireless Communications deals with the basic principles of radiowaves propagation for frequency bands used in radio-communications, offering descriptions of new achievements and newly developed propagation models. The book bridges the gap between theoretical calculations and approaches, and applied procedures needed for advanced radio links design. The primary objective of this two-volume set is to demonstrate the fundamentals, and to introduce propagation phenomena and mechanisms that engineers are likely to encounter in the design and evaluation of radio links of a given type and operating frequency. Volume one covers basic principles, along with tropospheric and ionospheric propagation,...

  3. Wireless sensor networks in chemical industry

    International Nuclear Information System (INIS)

    Minhas, A.A.; Jawad, S.

    2010-01-01

    Recent advances in wireless technology are a clear indication of the commercial promise of wireless networks. Industrial wireless sensing has now become more economical, efficient and secure as compared to traditional wired sensing. Wireless Sensor Networks (WSN) are successfully being used for process monitoring and control of many industrial plants. This paper explores how Chemical Industry in particular can benefit from the application of WSN technology. Various examples of successful implementation are cited. In order to address the industrial requirements, we propose a low power and low cost solution for process monitoring by implementing WSN. (author)

  4. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  5. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  6. EEM{sup TM} wireless supervision

    Energy Technology Data Exchange (ETDEWEB)

    Bilic, H. [Ericsson-Nikola Tesla d.d. Zagreb (Croatia)

    2000-07-01

    By adding the GSM network to the communication level of Energy Management systems, energy operating centres (EOC) can offer wireless access to the supervised equipment. Furthermore EOC can profit from rapid service development in the GSM networks. With implementation of GPRS to the GSM network EOC can instantly offer wireless access to external IP based networks such as Internet and corporate Intranets. The author describes architecture and key characteristic of Ericsson EnergyMaster{sup TM} (EEM{sup TM}) system for Energy Management, how and where to implement wireless supervision, wireless access to IP addresses and also how to implement new services provided by the GSM network. (orig.)

  7. Passive Wireless SAW Humidity Sensors, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal describes the preliminary development of passive wireless surface acoustic wave (SAW) based humidity sensors for NASA application to distributed...

  8. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    Results are reported for basic research in mobile wireless communication networks for tactical applications including investigations of new methods for error-control coding and decoding, modulation...

  9. Monitoring Churn in Wireless Networks

    Science.gov (United States)

    Holzer, Stephan; Pignolet, Yvonne Anne; Smula, Jasmin; Wattenhofer, Roger

    Wireless networks often experience a significant amount of churn, the arrival and departure of nodes. In this paper we propose a distributed algorithm for single-hop networks that detects churn and is resilient to a worst-case adversary. The nodes of the network are notified about changes quickly, in asymptotically optimal time up to an additive logarithmic overhead. We establish a trade-off between saving energy and minimizing the delay until notification for single- and multi-channel networks.

  10. Wireless Sensor Network Localisation Strategies

    OpenAIRE

    Olafsen, Håkon Kløvstad

    2007-01-01

    The recent years WSNs have had a tremendous growth in interest. Many see the huge potential in this technology and the vast possibilities with small wireless autonomous nodes. WSN nodes have a few limitations like their small size and limited power consumption. A network might exist for years without any major maintenance, putting tight restrictions on available power. The price is also an important aspect, and cheap production technologies like CMOS is preferred. The applications vary fr...

  11. The MAGCLOUD wireless sensor network

    OpenAIRE

    Cuartero Moya, Narciso; Quintana Alcaraz, Sergio

    2011-01-01

    Initially, the aim of this project consisted in manufacturing some nodes for a wireless sensor network by hand. If this document concludes that they can be properly produced in the EETAC lab, the cost of a future large deployment using raw components would be much lower than in the case of acquiring the genuine factory assembled hardware. Also, the future students involved in the process could learn many useful advanced techniques along the way. The project ended sowing a future WSN con...

  12. Wireless Power Transfer Roadway Integration

    OpenAIRE

    Gardner, Trevor

    2017-01-01

    Electric vehicles represent a major accomplishment in the energy and transportation industry. Unfortunately, they are restricted to a small travel range because of limited battery life. Successful integration of wireless power transfer (WPT) systems into the infrastructure would remove the range restrictions of EVs. To successfully integrate this technology, several requirements must be met. First, the embedment process cannot interfere with the electrical performance of the inductive power t...

  13. Inkjet printed wireless smart bandage

    KAUST Repository

    Farooqui, Muhammad Fahad; Shamim, Atif

    2016-01-01

    Chronic wounds affect millions of patients around the world and requires a major portion of health care budget for treatment. In this article, we present an unprecedented low cost continuous wireless monitoring system, realized through inkjet printing on a standard bandage strip, which can send early warnings as well as record long term wound progression data. The smart bandage can communicate upto a distance of 60 m when worn on the body.

  14. Inkjet printed wireless smart bandage

    KAUST Repository

    Farooqui, Muhammad Fahad

    2016-12-19

    Chronic wounds affect millions of patients around the world and requires a major portion of health care budget for treatment. In this article, we present an unprecedented low cost continuous wireless monitoring system, realized through inkjet printing on a standard bandage strip, which can send early warnings as well as record long term wound progression data. The smart bandage can communicate upto a distance of 60 m when worn on the body.

  15. Smartphone Household Wireless Electroencephalogram Hat

    Directory of Open Access Journals (Sweden)

    Harold Szu

    2013-01-01

    Full Text Available Rudimentary brain machine interface has existed for the gaming industry. Here, we propose a wireless, real-time, and smartphone-based electroencephalogram (EEG system for homecare applications. The system uses high-density dry electrodes and compressive sensing strategies to overcome conflicting requirements between spatial electrode density, temporal resolution, and spatiotemporal throughput rate. Spatial sparseness is addressed by close proximity between active electrodes and desired source locations and using an adaptive selection of N active among 10N passive electrodes to form m-organized random linear combinations of readouts, m≪N≪10N. Temporal sparseness is addressed via parallel frame differences in hardware. During the design phase, we took tethered laboratory EEG dataset and applied fuzzy logic to compute (a spatiotemporal average of larger magnitude EEG data centers in 0.3 second intervals and (b inside brainwave sources by Independent Component Analysis blind deconvolution without knowing the impulse response function. Our main contributions are the fidelity of quality wireless EEG data compared to original tethered data and the speed of compressive image recovery. We have compared our recovery of ill-posed inverse data against results using Block Sparse Code. Future work includes development of strategies to filter unwanted artifact from high-density EEGs (i.e., facial muscle-related events and wireless environmental electromagnetic interferences.

  16. Selfish spermatogonial selection

    DEFF Research Database (Denmark)

    Lim, Jasmine; Maher, Geoffrey J; Turner, Gareth D H

    2012-01-01

    The dominant congenital disorders Apert syndrome, achondroplasia and multiple endocrine neoplasia-caused by specific missense mutations in the FGFR2, FGFR3 and RET proteins respectively-represent classical examples of paternal age-effect mutation, a class that arises at particularly high frequenc......The dominant congenital disorders Apert syndrome, achondroplasia and multiple endocrine neoplasia-caused by specific missense mutations in the FGFR2, FGFR3 and RET proteins respectively-represent classical examples of paternal age-effect mutation, a class that arises at particularly high...

  17. Wireless sensing on surface hydrocarbon production systems

    International Nuclear Information System (INIS)

    Kane, D; McStay, D; Mulholland, J; Costello, L

    2009-01-01

    The use of wireless sensor networks for monitoring and optimising the performance of surface hydrocarbon production systems is reported. Wireless sensor networks are shown to be able to produce comprehensively instrumented XTs and other equipment that generate the data required by Intelligent Oilfield systems. The information produced by such systems information can be used for real-time operational control, production optimization and troubleshooting.

  18. European Research towards Future Wireless Communications

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee; Pedersen, Gert Frølund

    2005-01-01

    This paper presents an overview of four on-going European research projects in the field of mobile and wireless communications leading to the next generations of wireless communications. The projects started in 2004. They investigate requirements and definition of access technology, network...

  19. The Invention of the Wireless Communication Engine

    NARCIS (Netherlands)

    van der Kooij, B.J.G.

    2017-01-01

    Wireless technology, taken for granted today, was once an innovative wonder that would forever change how the world communicates. Developed by Guglielmo Marconi in the latter half of the nineteenth century, wireless telegraphy combined advancements made by Samuel Morse, William Cooke, Charles

  20. Topological properties of random wireless networks

    Indian Academy of Sciences (India)

    Wireless networks in which the node locations are random are best modelled as random geometric graphs (RGGs). In addition to their extensive application in the modelling of wireless networks, RGGs find many new applications and are being studied in their own right. In this paper we first provide a brief introduction to the ...

  1. Kali Linux wireless penetration testing essentials

    CERN Document Server

    Alamanni, Marco

    2015-01-01

    This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.

  2. Self-Similar Traffic In Wireless Networks

    OpenAIRE

    Jerjomins, R.; Petersons, E.

    2005-01-01

    Many studies have shown that traffic in Ethernet and other wired networks is self-similar. This paper reveals that wireless network traffic is also self-similar and long-range dependant by analyzing big amount of data captured from the wireless router.

  3. Wireless sensors remotely powered by RF energy

    NARCIS (Netherlands)

    Visser, Hubregt J.; Vullers, Ruud J.M.

    2012-01-01

    Wireless, radiated far-field energy is being employed for charging a battery. This battery, while being recharged, is used to power a commercially of the shelf, low power, wireless sensor node. Propagation conditions in common office and house configurations are investigated experimentally. These

  4. On the Conditional Entropy of Wireless Networks

    DEFF Research Database (Denmark)

    Coon, Justin P.; Badiu, Mihai Alin; Gündüz, Deniz

    2018-01-01

    The characterization of topological uncertainty in wireless networks using the formalism of graph entropy has received interest in the spatial networks community. In this paper, we develop lower bounds on the entropy of a wireless network by conditioning on potential network observables. Two appr...... a homogeneous binomial point process in this work) and the network topology....

  5. A guide to wireless networking by light

    Science.gov (United States)

    Haas, Harald; Chen, Cheng; O'Brien, Dominic

    2017-09-01

    The lack of wireless spectrum in the radio frequency bands has led to a rapid growth in research in wireless networking using light, known as LiFi (light fidelity). In this paper an overview of the subsystems, challenges and techniques required to achieve this is presented.

  6. Industrial wireless networking with resource constraint devices

    NARCIS (Netherlands)

    Das, Kallol

    2015-01-01

    During the last decade, wireless technologies have revolutionized the industrial automation sector by enabling wireless sensing and actuation for industrial applications. Most of these recently developed industrial standards are built on top of IEEE802.15.4 interface, which uses 2.4GHz frequency

  7. Bluetooth-based wireless sensor networks

    Science.gov (United States)

    You, Ke; Liu, Rui Qiang

    2007-11-01

    In this work a Bluetooth-based wireless sensor network is proposed. In this bluetooth-based wireless sensor networks, information-driven star topology and energy-saved mode are used, through which a blue master node can control more than seven slave node, the energy of each sensor node is reduced and secure management of each sensor node is improved.

  8. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-01-01

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless

  9. Race for the wireless robot platform

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    With the world going wireless, Norwegian energy champion Statoil Hydro is pushing forward with an unmanned, robot-operated production platform called Mesa Verde. Enlisted to solve safety and operational issues and help the oil company gain a cost edge on global competitors is an Emerson-Cisco wireless alliance itself facing stiff competition

  10. High Speed Wireless Signal Generation and Demodulation

    DEFF Research Database (Denmark)

    Caballero Jambrina, Antonio; Sambaraju, Rakesh; Zibar, Darko

    We present the experimental demonstration of high speed wireless generation, up to 40 Gb/s, in the 75-110 GHz wireless band. All-optical OFDM and photonic up-conversion are used for generation and single side-band modulation with digital coherent detection for demodulation....

  11. International Conference on Mobile and Wireless Technology

    CERN Document Server

    Wattanapongsakorn, Naruemon; Joukov, Nikolai

    2016-01-01

    This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest developments in mobile software development.

  12. Low-Power Wireless Sensor Network Infrastructures

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols...... peripherals need to by duty-cycled and the low-power wireless radios are severely influenced by the environmental effects causing bursty and unreliable wireless channels. This dissertation presents a communication stack providing services for low-power communication, secure communication, data collection......, and network management which enables construction of low-power wireless sensor network applications. More specifically, these services are designed with the extreme low-power scenarios of the SensoByg project in mind and are implemented as follows. First, low-power communication is implemented with Auto...

  13. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. wireless networked systems for communication and control applications, the bo...

  14. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  15. Capacity Analysis of Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    M. I. Gumel

    2012-06-01

    Full Text Available The next generation wireless networks experienced a great development with emergence of wireless mesh networks (WMNs, which can be regarded as a realistic solution that provides wireless broadband access. The limited available bandwidth makes capacity analysis of the network very essential. While the network offers broadband wireless access to community and enterprise users, the problems that limit the network capacity must be addressed to exploit the optimum network performance. The wireless mesh network capacity analysis shows that the throughput of each mesh node degrades in order of l/n with increasing number of nodes (n in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network.

  16. Voice Quality Estimation in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Petr Zach

    2015-01-01

    Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.

  17. Advanced Signal Processing for Wireless Multimedia Communications

    Directory of Open Access Journals (Sweden)

    Xiaodong Wang

    2000-01-01

    Full Text Available There is at present a worldwide effort to develop next-generation wireless communication systems. It is envisioned that many of the future wireless systems will incorporate considerable signal-processing intelligence in order to provide advanced services such as multimedia transmission. In general, wireless channels can be very hostile media through which to communicate, due to substantial physical impediments, primarily radio-frequency interference and time-arying nature of the channel. The need of providing universal wireless access at high data-rate (which is the aim of many merging wireless applications presents a major technical challenge, and meeting this challenge necessitates the development of advanced signal processing techniques for multiple-access communications in non-stationary interference-rich environments. In this paper, we present some key advanced signal processing methodologies that have been developed in recent years for interference suppression in wireless networks. We will focus primarily on the problem of jointly suppressing multiple-access interference (MAI and intersymbol interference (ISI, which are the limiting sources of interference for the high data-rate wireless systems being proposed for many emerging application areas, such as wireless multimedia. We first present a signal subspace approach to blind joint suppression of MAI and ISI. We then discuss a powerful iterative technique for joint interference suppression and decoding, so-called Turbo multiuser detection, that is especially useful for wireless multimedia packet communications. We also discuss space-time processing methods that employ multiple antennas for interference rejection and signal enhancement. Finally, we touch briefly on the problems of suppressing narrowband interference and impulsive ambient noise, two other sources of radio-frequency interference present in wireless multimedia networks.

  18. Wireless power transfer magnetic couplers

    Science.gov (United States)

    Wu, Hunter; Gilchrist, Aaron; Sealy, Kylee

    2016-01-19

    A magnetic coupler is disclosed for wireless power transfer systems. A ferrimagnetic component is capable of guiding a magnetic field. A wire coil is wrapped around at least a portion of the ferrimagnetic component. A screen is capable of blocking leakage magnetic fields. The screen may be positioned to cover at least one side of the ferrimagnetic component and the coil. A distance across the screen may be at least six times an air gap distance between the ferrimagnetic component and a receiving magnetic coupler.

  19. WMSA for wireless communication applications

    Energy Technology Data Exchange (ETDEWEB)

    Vats, Monika; Agarwal, Alok, E-mail: alokagarwal26@yahoo.com; Kumar, Ravindra [Dept. of Electronics & Electrical Engineering, Lingaya’s University Faridabad (India)

    2016-03-09

    Modified rectangular compact microstrip patch antenna having finite ground plane is proposed in this paper. Wideband Microstrip Antenna (WMSA) is achieved by corner cut and inserting air gaps inside the edges of the radiating patch having finite ground plane. The obtained impedance bandwidth for 10 dB return loss for the operating frequency f{sub 0} = 2.09 GHz is 28.7 % (600 MHz), which is very high as compared to the bandwidth obtained for the conventional microstrip antenna. Compactness with wide bandwidth of this antenna is practically useful for the wireless communication systems.

  20. Wireless power transfer via radiowaves

    CERN Document Server

    Shinohara , Naoki

    2014-01-01

    Recent advances in Wireless Power Transmission (WPT) technologies have enabled various engineering applications with potential product implementation. WPT can be utilized to charge batteries in various pieces of equipment without the need for a wired connection. Energy can be harvested from ambient RF and microwave radiation and 1 million kW microwaves can be transmitted from space to the ground.This book covers all the theory and technologies of WPT, such as microwave generators with semi-conductors and microwave tubes, antennas, phased arrays, beam efficiency, and rectifiers (rectenna). The

  1. Approximate Inference for Wireless Communications

    DEFF Research Database (Denmark)

    Hansen, Morten

    This thesis investigates signal processing techniques for wireless communication receivers. The aim is to improve the performance or reduce the computationally complexity of these, where the primary focus area is cellular systems such as Global System for Mobile communications (GSM) (and extensions...... to the optimal one, which usually requires an unacceptable high complexity. Some of the treated approximate methods are based on QL-factorization of the channel matrix. In the work presented in this thesis it is proven how the QL-factorization of frequency-selective channels asymptotically provides the minimum...

  2. Foundations of wireless and electronics

    CERN Document Server

    Scroggie, M G

    1984-01-01

    Foundations of Wireless and Electronics, 10th Edition covers the cathode-ray and microwave tubes; modern pulse methods; f.m. detectors; basic processes of transmission; and reception, computers, and non-sinusoidal signal amplification. The book starts by giving a general overview of a complete electronic system, electricity and circuits, capacitance, and inductance. The text also discusses alternating currents (a.c.), including the frequency and phase of a.c.; the capacitance and inductance in a.c. circuits; and the capacitance and inductance in a series. Diodes, triode, transistor equivalent

  3. The restriction-modification genes of Escherichia coli K-12 may not be selfish: they do not resist loss and are readily replaced by alleles conferring different specificities.

    Science.gov (United States)

    O'Neill, M; Chen, A; Murray, N E

    1997-12-23

    Type II restriction and modification (R-M) genes have been described as selfish because they have been shown to impose selection for the maintenance of the plasmid that encodes them. In our experiments, the type I R-M system EcoKI does not behave in the same way. The genes specifying EcoKI are, however, normally residents of the chromosome and therefore our analyses were extended to monitor the deletion of chromosomal genes rather than loss of plasmid vector. If EcoKI were to behave in the same way as the plasmid-encoded type II R-M systems, the loss of the relevant chromosomal genes by mutation or recombination should lead to cell death because the cell would become deficient in modification enzyme and the bacterial chromosome would be vulnerable to the restriction endonuclease. Our data contradict this prediction; they reveal that functional type I R-M genes in the chromosome are readily replaced by mutant alleles and by alleles encoding a type I R-M system of different specificity. The acquisition of allelic genes conferring a new sequence specificity, but not the loss of the resident genes, is dependent on the product of an unlinked gene, one predicted [Prakash-Cheng, A., Chung, S. S. & Ryu, J. (1993) Mol. Gen. Genet. 241, 491-496] to be relevant to control of expression of the genes that encode EcoKI. Our evidence suggests that not all R-M systems are evolving as "selfish" units; rather, the diversity and distribution of the family of type I enzymes we have investigated require an alternative selective pressure.

  4. Partnership Opportunities with AFRC for Wireless Systems Flight Testing

    Science.gov (United States)

    Hang, Richard

    2015-01-01

    The presentation will overview the flight test capabilities at NASA Armstrong Flight Research Center (AFRC), to open up partnership collaboration opportunities for Wireless Community to conduct flight testing of aerospace wireless technologies. Also, it will brief the current activities on wireless sensor system at AFRC through SBIR (Small Business Innovation Research) proposals, and it will show the current areas of interest on wireless technologies that AFRC would like collaborate with Wireless Community to further and testing.

  5. Distributed wireless quantum communication networks

    International Nuclear Information System (INIS)

    Yu Xu-Tao; Xu Jin; Zhang Zai-Chen

    2013-01-01

    The distributed wireless quantum communication network (DWQCN) has a distributed network topology and transmits information by quantum states. In this paper, we present the concept of the DWQCN and propose a system scheme to transfer quantum states in the DWQCN. The system scheme for transmitting information between any two nodes in the DWQCN includes a routing protocol and a scheme for transferring quantum states. The routing protocol is on-demand and the routing metric is selected based on the number of entangled particle pairs. After setting up a route, quantum teleportation and entanglement swapping are used for transferring quantum states. Entanglement swapping is achieved along with the process of routing set up and the acknowledgment packet transmission. The measurement results of each entanglement swapping are piggybacked with route reply packets or acknowledgment packets. After entanglement swapping, a direct quantum link between source and destination is set up and quantum states are transferred by quantum teleportation. Adopting this scheme, the measurement results of entanglement swapping do not need to be transmitted specially, which decreases the wireless transmission cost and transmission delay. (general)

  6. Coherently Enhanced Wireless Power Transfer

    Science.gov (United States)

    Krasnok, Alex; Baranov, Denis G.; Generalov, Andrey; Li, Sergey; Alù, Andrea

    2018-04-01

    Extraction of electromagnetic energy by an antenna from impinging external radiation is at the basis of wireless communications and wireless power transfer (WPT). The maximum of transferred energy is ensured when the antenna is conjugately matched, i.e., when it is resonant and it has an equal coupling with free space and its load. This condition, however, can be easily affected by changes in the environment, preventing optimal operation of a WPT system. Here, we introduce the concept of coherently enhanced WPT that allows us to bypass this difficulty and achieve dynamic control of power transfer. The approach relies on coherent excitation of the waveguide connected to the antenna load with a backward propagating signal of specific amplitude and phase. This signal creates a suitable interference pattern at the load resulting in a modification of the local wave impedance, which in turn enables conjugate matching and a largely increased amount of extracted energy. We develop a simple theoretical model describing this concept, demonstrate it with full-wave numerical simulations for the canonical example of a dipole antenna, and verify experimentally in both near-field and far-field regimes.

  7. Wireless Augmented Reality Prototype (WARP)

    Science.gov (United States)

    Devereaux, A. S.

    1999-01-01

    Initiated in January, 1997, under NASA's Office of Life and Microgravity Sciences and Applications, the Wireless Augmented Reality Prototype (WARP) is a means to leverage recent advances in communications, displays, imaging sensors, biosensors, voice recognition and microelectronics to develop a hands-free, tetherless system capable of real-time personal display and control of computer system resources. Using WARP, an astronaut may efficiently operate and monitor any computer-controllable activity inside or outside the vehicle or station. The WARP concept is a lightweight, unobtrusive heads-up display with a wireless wearable control unit. Connectivity to the external system is achieved through a high-rate radio link from the WARP personal unit to a base station unit installed into any system PC. The radio link has been specially engineered to operate within the high- interference, high-multipath environment of a space shuttle or space station module. Through this virtual terminal, the astronaut will be able to view and manipulate imagery, text or video, using voice commands to control the terminal operations. WARP's hands-free access to computer-based instruction texts, diagrams and checklists replaces juggling manuals and clipboards, and tetherless computer system access allows free motion throughout a cabin while monitoring and operating equipment.

  8. Evaluation of wireless Local Area Networks

    Science.gov (United States)

    McBee, Charles L.

    1993-09-01

    This thesis is an in-depth evaluation of the current wireless Local Area Network (LAN) technologies. Wireless LAN's consist of three technologies: they are infrared light, microwave, and spread spectrum. When the first wireless LAN's were introduced, they were unfavorably labeled slow, expensive, and unreliable. The wireless LAN's of today are competitively priced, more secure, easier to install, and provide equal to or greater than the data throughput of unshielded twisted pair cable. Wireless LAN's are best suited for organizations that move office staff frequently, buildings that have historical significance, or buildings that have asbestos. Additionally, an organization may realize a cost savings of between $300 to $1,200 each time a node is moved. Current wireless LAN technologies have a positive effect on LAN standards being developed by the Defense Information System Agency (DISA). DoD as a whole is beginning to focus on wireless LAN's and mobile communications. If system managers want to remain successful, they need to stay abreast of this technology.

  9. Simulation of Wireless Digital Communication Systems

    Directory of Open Access Journals (Sweden)

    A. Mohammed

    2004-12-01

    Full Text Available Due to the explosive demands for high speed wireless services, suchas wireless Internet, email and cellular video conferencing, digitalwireless communications has become one of the most exciting researchtopics in electrical and electronic engineering field. The never-endingdemand for such personal and multimedia services, however, demandstechnologies operating at higher data rates and broader bandwidths. Inaddition, the complexity of wireless communication and signalprocessing systems has grown considerably during the past decade.Therefore, powerful computer­aided techniques are required for theprocess of modeling, designing, analyzing and evaluating theperformance of digital wireless communication systems. In this paper wediscuss the basic propagation mechanisms affecting the performance ofwireless communication systems, and present a simple, powerful andefficient way to simulate digital wireless communication systems usingMatlab. The simulated results are compared with the theoreticalanalysis to validate the simulator. The simulator is useful inevaluating the performance of wireless multimedia services and theassociated signal processing structures and algorithms for current andnext generation wireless mobile communication systems.

  10. Wireless monitoring system for personal dose

    International Nuclear Information System (INIS)

    Kobayashi, Hironobu; Kawamura, Takeshi; Inoue, Takayuki

    2000-01-01

    Fuji Electric has developed a system for the higher radiation controlled area in nuclear power plants, in which exposure dose data measured on the wearer's chest, hands, and legs are transferred by wireless to the data control equipment so that the exposure dose can be controlled in real time. The system using a specified low-power radio wave causes no interference to the other types of dosimeters. The data control equipment automatically saves data received from the dosimeters and also has functions of calibration of dosimeters and maintenance of the wireless system. This paper describes the wireless monitoring system that consists of chest and parts dosimeters and data control equipment. (author)

  11. Implanted Antennas in Medical Wireless Communications

    CERN Document Server

    Rahmat-Samii, Yahya; Balanis, Constantine

    2006-01-01

    Implanted Antennas in Medical Wireless Communications summarizes the results of recent research activities on the subject of implanted antennas for medical wireless communication systems. It is anticipated that in the near future sophisticated medical devices will be implanted inside the human body for medical telemetry and telemedicine. To establish effective and efficient wireless links with these devices, it is pivotal to give special attention to antenna designs that are low profile, small, safe, and cost effective. In this book, authors Yahya Rahmat-Samii and Jaehoon Kim demonstrate how a

  12. Indoor Wireless RF Energy Transfer for Powering Wireless Sensors

    Directory of Open Access Journals (Sweden)

    H. Visser

    2012-12-01

    Full Text Available For powering wireless sensors in buildings, rechargeable batteries may be used. These batteries will be recharged remotely by dedicated RF sources. Far-field RF energy transport is known to suffer from path loss and therefore the RF power available on the rectifying antenna or rectenna will be very low. As a consequence, the RF-to-DC conversion efficiency of the rectenna will also be very low. By optimizing not only the subsystems of a rectenna but also taking the propagation channel into account and using the channel information for adapting the transmit antenna radiation pattern, the RF energy transport efficiency will be improved. The rectenna optimization, channel modeling and design of a transmit antenna are discussed.

  13. System and method for time synchronization in a wireless network

    Science.gov (United States)

    Gonia, Patrick S.; Kolavennu, Soumitri N.; Mahasenan, Arun V.; Budampati, Ramakrishna S.

    2010-03-30

    A system includes multiple wireless nodes forming a cluster in a wireless network, where each wireless node is configured to communicate and exchange data wirelessly based on a clock. One of the wireless nodes is configured to operate as a cluster master. Each of the other wireless nodes is configured to (i) receive time synchronization information from a parent node, (ii) adjust its clock based on the received time synchronization information, and (iii) broadcast time synchronization information based on the time synchronization information received by that wireless node. The time synchronization information received by each of the other wireless nodes is based on time synchronization information provided by the cluster master so that the other wireless nodes substantially synchronize their clocks with the clock of the cluster master.

  14. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    with the deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality VoIP...... communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality....... The focus of Voice over IP in Wierless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction  while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session...

  15. Wireless Sensor Networks TestBed: ASNTbed

    CSIR Research Space (South Africa)

    Dludla, AG

    2013-05-01

    Full Text Available Wireless sensor networks (WSNs) have been used in different types of applications and deployed within various environments. Simulation tools are essential for studying WSNs, especially for exploring large-scale networks. However, WSN testbeds...

  16. The art of wireless sensor networks

    CERN Document Server

    2014-01-01

    During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.   “The Art of Wireless Sensor Networks: Volume 1: Fundamentals” focuses on the fundamentals concepts in the design, analysis, and implementation of wireless sensor networks. It covers the various layers of the lifecycle of this type of network from the physical layer up to the application layer. Its rationale is that the first volume covers contemporary design issues, tools, and protocols for radio-based two-dimensional terrestrial sensor networks. All the book chapters in this volume include up-to-date research work spanning various classic facets of the physical properties and functional behavior of wireless sensor networks, including physical layer, medium access control, data routing, topology management, mobility management, localization, task management, data management, data gathering, security, middleware, sensor technology, standards, and ...

  17. Wireless communication for hearing aid system

    DEFF Research Database (Denmark)

    Nour, Baqer

    This thesis focuses on the wireless coupling between hearing aids close to a human head. Hearing aids constitute devices withadvanced technology and the wireless communication enables the introduction of a range of completely new functionalities. Such devices are small and the available power...... the ear-to-ear wireless communication channel by understanding the mechanisms that control the propagations of the signals and the losses. The second objective isto investigate the properties of magneto-dielectric materials and their potential in antenna miniaturization. There are three approaches...... to study the ear-to-ear wireless communication link; a theoretical approach models the human head asa sphere that has the electrical properties of the head, a numerical approach implements a more realistic geometry of the head, and an experimental approach measures directly the coupling between...

  18. Optical Coherent Receiver Enables THz Wireless Bridge

    DEFF Research Database (Denmark)

    Yu, Xianbin; Liu, Kexin; Zhang, Hangkai

    2016-01-01

    We experimentally demonstrated a 45 Gbit/s 400 GHz photonic wireless communication system enabled by an optical coherent receiver, which has a high potential in fast recovery of high data rate connections, for example, in disaster....

  19. Cross-Layer Wireless Resource Allocation

    National Research Council Canada - National Science Library

    Berry, Randall A; Yeh, Edmund M

    2005-01-01

    .... This bit pipe is a simple abstraction of the underlying physical and data link layers. There is growing awareness that this simple bit-pipe view is inadequate, particularly in the context of modern wireless data networks...

  20. Predictive power control in wireless sensor networks

    NARCIS (Netherlands)

    Chincoli, M.; Syed, Aly; Mocanu, D.C.; Liotta, A.

    2016-01-01

    Communications in Wireless Sensor Networks (WSNs) are affected by dynamic environments, variable signal fluctuations and interference. Thus, prompt actions are necessary to achieve dependable communications and meet quality of service requirements. To this end, the reactive algorithms used in

  1. Technical Challenges Hindering Development of Robust Wireless ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2015-12-01

    Dec 1, 2015 ... challenges remain to be resolved, in designing robust wireless networks that can deliver the performance ... demonstrated the first radio transmission from the Isle of ... distances with better quality, less power, and smaller ...

  2. Feasibility study of wireless power transmission systems

    Science.gov (United States)

    Robinson, W. J., Jr.

    1968-01-01

    Wireless microwave or laser energy transfers power from a manned earth-orbiting central station to unmanned astronomical substations. More efficient systems are required for the microwave power transmission.

  3. BLUETOOTH WIRELESS TECHNOLOGY: A MILESTONE IN ICT

    African Journals Online (AJOL)

    DJFLEX

    This article summarizes the Bluetooth technology – a type of Wireless Personal Area Network (WPAN) with emphasis ... facilitating data transmission over short distances from fixed and ... primarily designed for low power consumption, with a.

  4. Configuration of Wireless Cooperative/Sensor Networks

    National Research Council Canada - National Science Library

    Shafiee, Hamid R; Maham, B; Vazifehdan, J

    2008-01-01

    .... When employing more than one antenna at each node of a wireless network is not applicable, cooperation diversity protocols exploit the inherent spatial diversity of relay channels by allowing mobile...

  5. Wireless Integrated Network Sensors Next Generation

    National Research Council Canada - National Science Library

    Merrill, William

    2004-01-01

    ..., autonomous networking, and distributed operations for wireless networked sensor systems. Multiple types of sensor systems were developed and provided including capabilities for acoustic, seismic, passive infrared detection, and visual imaging...

  6. Structural health monitoring using wireless sensor networks

    Science.gov (United States)

    Sreevallabhan, K.; Nikhil Chand, B.; Ramasamy, Sudha

    2017-11-01

    Monitoring and analysing health of large structures like bridges, dams, buildings and heavy machinery is important for safety, economical, operational, making prior protective measures, and repair and maintenance point of view. In recent years there is growing demand for such larger structures which in turn make people focus more on safety. By using Microelectromechanical Systems (MEMS) Accelerometer we can perform Structural Health Monitoring by studying the dynamic response through measure of ambient vibrations and strong motion of such structures. By using Wireless Sensor Networks (WSN) we can embed these sensors in wireless networks which helps us to transmit data wirelessly thus we can measure the data wirelessly at any remote location. This in turn reduces heavy wiring which is a cost effective as well as time consuming process to lay those wires. In this paper we developed WSN based MEMS-accelerometer for Structural to test the results in the railway bridge near VIT University, Vellore campus.

  7. UWB Sampler for Wireless Communications and Radar

    National Research Council Canada - National Science Library

    Han, Jeongwoo; Nguyen, Cam

    2005-01-01

    An ultra wideband (UWB) sampler, realized using step recovery and Schottky diodes on coplanar waveguide, coplanar strips and slotlines, has been developed for UWB wireless communications and radar systems...

  8. Wireless Sensing Opportunities for Aerospace Applications

    Directory of Open Access Journals (Sweden)

    William Wilson

    2008-07-01

    Full Text Available Wireless sensors and sensor networks is an emerging technology area with many applications within the aerospace industry. Integrated vehicle health monitoring (IVHM of aerospace vehicles is needed to ensure the safety of the crew and the vehicle, yet often high costs, weight, size and other constraints prevent the incorporation of instrumentation onto spacecraft. This paper presents a few of the areas such as IVHM, where new wireless sensing technology is needed on both existing vehicles as well as future spacecraft. From ground tests to inflatable structures to the International Space Station, many applications could receive benefits from small, low power, wireless sensors. This paper also highlights some of the challenges that need to overcome when implementing wireless sensor networks for aerospace vehicles.

  9. VT Wireless Internet Service Providers 2006

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) The VT Wireless Internet Service Provider (ISP) dataset (WISP2006) includes polygons depicting the extent of Vermont's WISP broadband system as of...

  10. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  11. Energy-efficient wireless mesh networks

    CSIR Research Space (South Africa)

    Ntlatlapa, N

    2007-06-01

    Full Text Available This paper outlines the objectives of a recently formed research group at Meraka Institute. The authors consider application of wireless mesh networks in rural infrastructure deficient parts of the African continent where nodes operate on batteries...

  12. Secure Wireless Military Healthcare Telemedicine Enterprise System

    National Research Council Canada - National Science Library

    Lucas, Kenneth

    2003-01-01

    ...(exp TM) software and Division Tools with cross platform telemedicine systems, inclusive of computer based systems, handheld wireless PDA devices, and miniature computers, to existing DoD legacy...

  13. Secure Wireless Military Healthcare Telemedicine Enterprise System

    National Research Council Canada - National Science Library

    Lucas, Kenneth

    2002-01-01

    ...) software and Dvision Tools with cross platform telemedicine systems, inclusive of computer based systems, handheld wireless PDA devices, and miniature computers, to existing DoD legacy and developing...

  14. VT Wireless Internet Service Providers 2007

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) The VT Wireless Internet Service Provider (ISP) dataset (WISP2007) includes polygons depicting the extent of Vermont's WISP broadband system as of...

  15. Integrated Passive And Wireless Sensor

    KAUST Repository

    Li, Bodong

    2015-04-30

    A passive and wireless sensor is provided for sensing at least one of magnetic field, temperature or humidity. The sensor can provide only one of the sensing functions, individually or any combination of them simultaneously. It can be used for various applications where magnetic field changes, temperature and/or humidity need to be measured. In one or more embodiments, a surface acoustic wave (SAW) sensor is provided that can measure one or more of a magnetic field (or current that generates the magnetic field), temperature and humidity. In one or more embodiments, a magnetoimpedence (MI) sensor (for example a thin film giant magnetoimpedance (GMI) sensor), a thermally sensitive (for example a Lithium Niobite (LiNbO.sub.3)) substrate, and a humidity sensitive film (for example a hydrogel film) can be used as sensing elements.

  16. Wireless powering of e -swimmers

    Science.gov (United States)

    Roche, Jérome; Carrara, Serena; Sanchez, Julien; Lannelongue, Jérémy; Loget, Gabriel; Bouffier, Laurent; Fischer, Peer; Kuhn, Alexander

    2014-10-01

    Miniaturized structures that can move in a controlled way in solution and integrate various functionalities are attracting considerable attention due to the potential applications in fields ranging from autonomous micromotors to roving sensors. Here we introduce a concept which allows, depending on their specific design, the controlled directional motion of objects in water, combined with electronic functionalities such as the emission of light, sensing, signal conversion, treatment and transmission. The approach is based on electric field-induced polarization, which triggers different chemical reactions at the surface of the object and thereby its propulsion. This results in a localized electric current that can power in a wireless way electronic devices in water, leading to a new class of electronic swimmers (e-swimmers).

  17. Propagation engineering in wireless communications

    CERN Document Server

    Ghasemi, Abdollah; Ghasemi, Farshid

    2016-01-01

    This book covers the basic principles for understanding radio wave propagation for common frequency bands used in radio-communications. This includes achievements and developments in propagation models for wireless communication. This book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors emphasize propagation engineering by giving fundamental information and explain the use of basic principles together with technical achievements. This new edition includes additional information on radio wave propagation in guided media and technical issues for fiber optics cable networks with several examples and problems. This book also includes a solution manual - with 90 solved examples distributed throughout the chapters - and 158 problems including practical values and assumptions.

  18. Integrated Passive And Wireless Sensor

    KAUST Repository

    Li, Bodong; Kosel, Jü rgen

    2015-01-01

    A passive and wireless sensor is provided for sensing at least one of magnetic field, temperature or humidity. The sensor can provide only one of the sensing functions, individually or any combination of them simultaneously. It can be used for various applications where magnetic field changes, temperature and/or humidity need to be measured. In one or more embodiments, a surface acoustic wave (SAW) sensor is provided that can measure one or more of a magnetic field (or current that generates the magnetic field), temperature and humidity. In one or more embodiments, a magnetoimpedence (MI) sensor (for example a thin film giant magnetoimpedance (GMI) sensor), a thermally sensitive (for example a Lithium Niobite (LiNbO.sub.3)) substrate, and a humidity sensitive film (for example a hydrogel film) can be used as sensing elements.

  19. Reliability of Wireless Sensor Networks

    Science.gov (United States)

    Dâmaso, Antônio; Rosa, Nelson; Maciel, Paulo

    2014-01-01

    Wireless Sensor Networks (WSNs) consist of hundreds or thousands of sensor nodes with limited processing, storage, and battery capabilities. There are several strategies to reduce the power consumption of WSN nodes (by increasing the network lifetime) and increase the reliability of the network (by improving the WSN Quality of Service). However, there is an inherent conflict between power consumption and reliability: an increase in reliability usually leads to an increase in power consumption. For example, routing algorithms can send the same packet though different paths (multipath strategy), which it is important for reliability, but they significantly increase the WSN power consumption. In this context, this paper proposes a model for evaluating the reliability of WSNs considering the battery level as a key factor. Moreover, this model is based on routing algorithms used by WSNs. In order to evaluate the proposed models, three scenarios were considered to show the impact of the power consumption on the reliability of WSNs. PMID:25157553

  20. Wireless sensor network and monitoring for environment

    OpenAIRE

    Han, Liang

    2011-01-01

    In recent years, wireless sensor network technology is developing at a surprisingly high speed. More and more fields have started to use the wireless sensor network technology and find the advantages of WSN, such as military applications, environmental observing and forecasting system, medical care, smart home, structure monitoring. The world Environmental Summit in Copenhagen on 2010 has just concluded that environment has become the world’s main concern. But regrettably the summit did no...

  1. Knowledge Management for Wireless Grid Operation Centers

    OpenAIRE

    Bordetsky, Alex; Dolk, Daniel

    2002-01-01

    Proceedings of the 35th Hawaii International Conference on System Sciences - 2002 Our objective is to develop generalized principles for grid operations centers that can be applied to specific domains. We focus on the domain of wireless telecommunications NOCs (WNOCs) as a starting point in this process. To address this problem, we focus specifically on the knowledge requirements for service-based decision support within wireless telecommunications. We use a Mission...

  2. Probabilistic Bandwidth Assignment in Wireless Sensor Networks

    OpenAIRE

    Khan , Dawood; Nefzi , Bilel; Santinelli , Luca; Song , Ye-Qiong

    2012-01-01

    International audience; With this paper we offer an insight in designing and analyzing wireless sensor networks in a versatile manner. Our framework applies probabilistic and component-based design principles for the wireless sensor network modeling and consequently analysis; while maintaining flexibility and accuracy. In particular, we address the problem of allocating and reconfiguring the available bandwidth. The framework has been successfully implemented in IEEE 802.15.4 using an Admissi...

  3. Wireless Sensor Network –A Survey

    OpenAIRE

    Nirvika Chouhan; P.D.Vyavahare; Rekha Jain

    2013-01-01

    Wireless sensor networks are the networks consisting of large number of small and tiny sensor nodes. The nodes are supplied with limited power, memory and other resources and perform in-network processing. In this paper, various issues are discussed that actually put the limitations in the well working and the life time of the network. In Wireless sensor network, nodes should consume less power, memoryand so data aggregation should be performed. Security is another aspect which should be pres...

  4. Wireless communications networks for the smart grid

    CERN Document Server

    Ho, Quang-Dung; Rajalingham, Gowdemy; Le-Ngoc, Tho

    2014-01-01

    This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open research opportunities of the SGCN are addressed. Wireless Communications Networks for Smart Grid provi

  5. Fading and interference mitigation in wireless communications

    CERN Document Server

    Panic, Stefan; Anastasov, Jelena; Spalevic, Petar

    2013-01-01

    The rapid advancement of various wireless communication system services has created the need to analyze the possibility of their performance improvement. Introducing the basic principles of digital communications performance analysis and its mathematical formalization, Fading and Interference Mitigation in Wireless Communications will help you stay up to date with recent developments in the performance analysis of space diversity reception over fading channels in the presence of cochannel interference.The book presents a unified method for computing the performance of digital communication sys

  6. Wireless Orbiter Hang-Angle Inclinometer System

    Science.gov (United States)

    Lucena, Angel; Perotti, Jose; Green, Eric; Byon, Jonathan; Burns, Bradley; Mata, Carlos; Randazzo, John; Blalock, Norman

    2011-01-01

    A document describes a system to reliably gather the hang-angle inclination of the orbiter. The system comprises a wireless handheld master station (which contains the main station software) and a wireless remote station (which contains the inclinometer sensors, the RF transceivers, and the remote station software). The remote station is designed to provide redundancy to the system. It includes two RF transceivers, two power-management boards, and four inclinometer sensors.

  7. Self-Oscillating Wireless Power Transfer Systems

    OpenAIRE

    Tretyakov, Sergei A.; Simovski, Constantin R.; Valagiannopoulos, Constantinos A.; Ra'di, Younes

    2017-01-01

    Conventional wireless power transfer systems consist of a microwave power generator and transmitter located at one place and a microwave power receiver located at a distance. Here we show that wireless power transfer can be realized as a single distributed microwave generator with an over-the-air feedback, so that the microwave power is generated directly at the place where the energy needs to be delivered. We demonstrate that the use of this paradigm increases efficiency and dramatically red...

  8. Wireless Power Transfer Impact on Data Channel

    OpenAIRE

    Baikova, Elena N.; Valtchev, Stanimir S.; Melício, R.; Fernão Pires, V.

    2016-01-01

    Trabalho apresentado no 23rd International Symposium on Power Electronics, Electrical Drives, Automation and Motion (Speedam, 2016), 22-24 junho de 2016, Capri, Itália This paper presents measurement results and analysis of the interference produced by the high-power electromagnetic field in a wireless energy transfer system. Through this analysis it is expected to be possible to evaluate the influence of the strong electromagnetic field on the data transmission channel. The wireless power...

  9. BackTrack testing wireless network security

    CERN Document Server

    Cardwell, Kevin

    2013-01-01

    Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks.All you need is some experience with networks and computers and you will be ready to go.

  10. IMPACT OF WIRELESS TECHNOLOGIES ON HUMAN HEALTH

    OpenAIRE

    Pejnović, Natalija

    2009-01-01

    SUMMARY: This paper explores adverse impacts of wireless technologies on user health. A wide range of situations in which radiation may influence the user was investigated. Emphasis was placed on the adverse impact of non-ionizing radiation. Thermal and non-thermal effects of non-ionizing radiation were explained in accordance with the operating principle of wireless devices. It is necessary to implement appropriate forms of protection in order to eliminate health risks or reduce them to the ...

  11. Mining Behavioral Groups in Large Wireless LANs

    OpenAIRE

    Hsu, Wei-jen; Dutta, Debojyoti; Helmy, Ahmed

    2006-01-01

    One vision of future wireless networks is that they will be deeply integrated and embedded in our lives and will involve the use of personalized mobile devices. User behavior in such networks is bound to affect the network performance. It is imperative to study and characterize the fundamental structure of wireless user behavior in order to model, manage, leverage and design efficient mobile networks. It is also important to make such study as realistic as possible, based on extensive measure...

  12. Auction design for the wireless spectrum market

    CERN Document Server

    Lin, Peng; Zhang, Qian

    2014-01-01

    This Brief introduces the wireless spectrum market and discusses the current research for spectrum auctions. It covers the unique properties of spectrum auction, such as interference relationship, reusability, divisibility, composite effect and marginal effect, while also proposing how to build economic incentives into the network architecture and protocols in order to optimize the efficiency of wireless systems.Three scenarios for designing new auctions are demonstrated. First, a truthful double auction scheme for spectrum trading considering both the heterogeneous propagation properties of c

  13. Wireless Multiplexed Surface Acoustic Wave Sensors Project

    Science.gov (United States)

    Youngquist, Robert C.

    2014-01-01

    Wireless Surface Acoustic Wave (SAW) Sensor is a new technology for obtaining multiple, real-time measurements under extreme environmental conditions. This project plans to develop a wireless multiplexed sensor system that uses SAW sensors, with no batteries or semiconductors, that are passive and rugged, can operate down to cryogenic temperatures and up to hundreds of degrees C, and can be used to sense a wide variety of parameters over reasonable distances (meters).

  14. Modeling Multistandard Wireless Networks in OPNET

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Berger, Michael Stübert; Ruepp, Sarah Renée

    2011-01-01

    Future wireless communication is emerging towards one heterogeneous platform. In this new environment wireless access will be provided by multiple radio technologies that are cooperating and complementing one another. The paper investigates the possibilities of developing such a multistandard sys...... system using OPNET Modeler. A network model consisting of LTE interworking with WLAN and WiMAX is considered from the radio resource management perspective. In particular, implementing a joint packet scheduler across multiple systems is discussed more in detail....

  15. Wireless motion sensor network for monitoring motion in a process, wireless sensor node, reasoning node, and feedback and/or actuation node for such wireless motion sensor network

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Marin Perianu, Raluca; Marin Perianu, Mihai

    2010-01-01

    Wireless motion sensor network for monitoring motion in a process comprising at least one wireless sensor node for measuring at least one physical quantity related to motion or orientation, feature extraction means for deriving a feature for the measured quantities, a wireless transmitter connected

  16. Integrated Frequency Synthesis for Convergent Wireless Solutions

    CERN Document Server

    Atallah, Jad G

    2012-01-01

    This book describes the design and implementation of an electronic subsystem called the frequency synthesizer, which is a very important building block for any wireless transceiver. The discussion includes several new techniques for the design of such a subsystem which include the usage modes of the wireless device, including its support for several leading-edge wireless standards. This new perspective for designing such a demanding subsystem is based on the fact that optimizing the performance of a complete system is not always achieved by optimizing the performance of its building blocks separately.  This book provides “hands-on” examples of this sort of co-design of optimized subsystems, which can make the vision of an always-best-connected scenario a reality. Provides up-to-date design information regarding one of the most complex subsystems used in state-of-the-art wireless devices; Describes a wireless front-end solution designed to provide an always-best-connected solution, based on a wireless det...

  17. How to model wireless mesh networks topology

    International Nuclear Information System (INIS)

    Sanni, M L; Hashim, A A; Anwar, F; Ali, S; Ahmed, G S M

    2013-01-01

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  18. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  19. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  20. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  1. Airborne wireless communication systems, airborne communication methods, and communication methods

    Science.gov (United States)

    Deaton, Juan D [Menan, ID; Schmitt, Michael J [Idaho Falls, ID; Jones, Warren F [Idaho Falls, ID

    2011-12-13

    An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

  2. Wireless coexistence and interference test method for low-power wireless sensor networks

    NARCIS (Netherlands)

    Serra, R.; Nabi, Majid

    2015-01-01

    Wireless sensor networks (WSNs) are being increasingly introduced for critical applications such as safety, security and health. One the main characteristic requirements of such networks are that they should function with relative low power. Therefore the wireless links are more vulnerable.

  3. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  4. Intrusion detection and monitoring for wireless networks.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  5. OIT Wireless Telemetry for Industrial Applications

    Energy Technology Data Exchange (ETDEWEB)

    Manges, WW

    2002-09-03

    The need for advanced wireless technology has been identified in the National Research Council publication (1) ''Manufacturing Process Controls for the Industries of the Future as a Critical Technology for the Future''. The deployment challenges to be overcome in order for wireless to be a viable option include: (1) eliminating interference (assuring reliable communications); (2) easing the deployment of intelligent, wireless sensors; (3) developing reliable networks (robust architectures); (4) developing remote power (long-lasting and reliable); and (5) developing standardized communication protocols. This project demonstrated the feasibility of robust wireless sensor networks that could meet these requirements for the harsh environments common to the DOE/OIT Industries of the Future. It resulted in a wireless test bed that was demonstrated in a paper mill and a steel plant. The test bed illustrated key protocols and components that would be required in a real-life, wireless network. The technologies for low power connectivity developed and demonstrated at the plant eased fears that the radios would interfere with existing control equipment. The same direct sequence, spread spectrum (DSSS) technology that helped assure the reliability of the connection also demonstrated that wireless communication was feasible in these plants without boosting the transmitted power to dangerous levels. Our experience and research have indicated that two key parameters are of ultimate importance: (1) reliability and (2) inter-system compatibility. Reliability is the key to immediate acceptance among industrial users. The importance cannot be overstated, because users will not tolerate an unreliable information network. A longer term issue that is at least as important as the reliability of a single system is the inter-system compatibility between these wireless sensor networks and other wireless systems that are part of our industries. In the long run, the

  6. NASA Lunar Base Wireless System Propagation Analysis

    Science.gov (United States)

    Hwu, Shian U.; Upanavage, Matthew; Sham, Catherine C.

    2007-01-01

    There have been many radio wave propagation studies using both experimental and theoretical techniques over the recent years. However, most of studies have been in support of commercial cellular phone wireless applications. The signal frequencies are mostly at the commercial cellular and Personal Communications Service bands. The antenna configurations are mostly one on a high tower and one near the ground to simulate communications between a cellular base station and a mobile unit. There are great interests in wireless communication and sensor systems for NASA lunar missions because of the emerging importance of establishing permanent lunar human exploration bases. Because of the specific lunar terrain geometries and RF frequencies of interest to the NASA missions, much of the published literature for the commercial cellular and PCS bands of 900 and 1800 MHz may not be directly applicable to the lunar base wireless system and environment. There are various communication and sensor configurations required to support all elements of a lunar base. For example, the communications between astronauts, between astronauts and the lunar vehicles, between lunar vehicles and satellites on the lunar orbits. There are also various wireless sensor systems among scientific, experimental sensors and data collection ground stations. This presentation illustrates the propagation analysis of the lunar wireless communication and sensor systems taking into account the three dimensional terrain multipath effects. It is observed that the propagation characteristics are significantly affected by the presence of the lunar terrain. The obtained results indicate the lunar surface material, terrain geometry and antenna location are the important factors affecting the propagation characteristics of the lunar wireless systems. The path loss can be much more severe than the free space propagation and is greatly affected by the antenna height, surface material and operating frequency. The

  7. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  8. Green partial packet recovery in wireless sensor networks

    KAUST Repository

    Daghistani, Anas; Ben Khalifa, Abderrahman; Showail, Ahmad; Shihada, Basem

    2015-01-01

    wireless sensor motes. We propose Green-Frag, a novel adaptive partial packet recovery mechanism that is energy friendly. It can help prolonging the battery life of wireless sensor motes that are usually resource constrained. It dynamically partitions

  9. Wireless Technologies in Support of ISS Experimentation and Operations

    Science.gov (United States)

    Wagner, Raymond; Fink, Patrick

    2012-01-01

    Presentation reviews: (1) Wireless Communications (a) Internal (b) External (2) RFID (Radio Frequency Identification) (a) Existing and R&D (3) Wireless Sensor Networks (a) Existing and R&D (4) Ultra-Wide Band (UWB) (a) R&D

  10. Artificial intelligence based event detection in wireless sensor networks

    NARCIS (Netherlands)

    Bahrepour, M.

    2013-01-01

    Wireless sensor networks (WSNs) are composed of large number of small, inexpensive devices, called sensor nodes, which are equipped with sensing, processing, and communication capabilities. While traditional applications of wireless sensor networks focused on periodic monitoring, the focus of more

  11. Buffer management in wireless full-duplex systems

    KAUST Repository

    Bouacida, Nader; Showail, Ahmad; Shihada, Basem

    2015-01-01

    , we address the problem of buffer management in full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD

  12. 3D inkjet printed disposable environmental monitoring wireless sensor node

    KAUST Repository

    Farooqui, Muhammad Fahad; Shamim, Atif

    2017-01-01

    We propose a disposable, miniaturized, moveable, fully integrated 3D inkjet-printed wireless sensor node for large area environmental monitoring applications. As a proof of concept, we show the wireless sensing of temperature, humidity and H2S

  13. Resource sharing in wireless networks: The SAPHYRE approach

    NARCIS (Netherlands)

    Jorswieck, E.A.; Badia, L.; Fahldieck, T.; Gesbert, D.; Gustafsson, S.; Haardt, M.; Ho, K.-M.; Karipidis, E.; Kortke, A.; Larsson, E.G.; Mark, H.; Nawrocki, M.; Piesiewicz, R.; Römer, F.; Schubert, M.; Sykora, J.; Trommelen, P.H.; Ende, B.D. van; Zorzi, M.

    2010-01-01

    Physical resource sharing between wireless operators and service providers is necessary in order to support efficient, competitive, and innovative wireless communication markets. By sharing resources, such as spectrum or infrastructure, which are usually exclusively allocated interference is created

  14. Integrated 3d printed wireless sensing system for environmental monitoring

    KAUST Repository

    Farooqui, Muhammad Fahad; Shamim, Atif

    2017-01-01

    transmitters on a panel. The wireless sensor device may be configured to take environment measurements, such as temperature, gas, humidity, and wirelessly communicate the environment measurements to a remote computing device, in addition, the present disclosure

  15. Wireless body sensor networks for health-monitoring applications

    International Nuclear Information System (INIS)

    Hao, Yang; Foster, Robert

    2008-01-01

    Current wireless technologies, such as wireless body area networks and wireless personal area networks, provide promising applications in medical monitoring systems to measure specified physiological data and also provide location-based information, if required. With the increasing sophistication of wearable and implantable medical devices and their integration with wireless sensors, an ever-expanding range of therapeutic and diagnostic applications is being pursued by research and commercial organizations. This paper aims to provide a comprehensive review of recent developments in wireless sensor technology for monitoring behaviour related to human physiological responses. It presents background information on the use of wireless technology and sensors to develop a wireless physiological measurement system. A generic miniature platform and other available technologies for wireless sensors have been studied in terms of hardware and software structural requirements for a low-cost, low-power, non-invasive and unobtrusive system. (topical review)

  16. Passive Wireless Temperature Sensor for Harsh Environments, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless Sensor Technologies has for several years been developing a passive Wireless Temperature Sensor (WTS) for gas turbine engine and other harsh environment...

  17. Utilising artificial intelligence in software defined wireless sensor network

    CSIR Research Space (South Africa)

    Matlou, OG

    2017-10-01

    Full Text Available Software Defined Wireless Sensor Network (SDWSN) is realised by infusing Software Defined Network (SDN) model in Wireless Sensor Network (WSN), Reason for that is to overcome the challenges of WSN. Artificial Intelligence (AI) and machine learning...

  18. Towards Perpetual Energy Operation in Wireless Communication Systems

    KAUST Repository

    Benkhelifa, Fatma

    2017-01-01

    energy operation of wireless communication systems, energy harvesting (EH) from the radio frequency (RF) signals is one promising solution to make the wireless communication systems self-sustaining. Since RF signals are known to transmit information

  19. Resource slicing in virtual wireless networks: a survey

    OpenAIRE

    Richart, Matias; Baliosian De Lazzari, Javier Ernesto; Serrat Fernández, Juan; Gorricho Moreno, Juan Luis

    2016-01-01

    New architectural and design approaches for radio access networks have appeared with the introduction of network virtualization in the wireless domain. One of these approaches splits the wireless network infrastructure into isolated virtual slices under their own management, requirements, and characteristics. Despite the advances in wireless virtualization, there are still many open issues regarding the resource allocation and isolation of wireless slices. Because of the dynamics and share...

  20. Get certified a guide to wireless communication engineering technologies

    CERN Document Server

    Ahson, Syed A

    2009-01-01

    The Institute of Electrical and Electronics Engineers (IEEE) Communications Society designed the IEEE wireless communication engineering technologies (WCET) certification program to address the wireless industry's growing need for communications professionals with practical problem-solving skills in real-world situations. Individuals who achieve this prestigious certification are recognized as possessing the required knowledge, skill, and abilities to meet wireless challenges in various industry, business, corporate, and organizational settings. Presenting contributions from 50 wireless commun

  1. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  2. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  3. Next-generation wireless technologies 4G and beyond

    CERN Document Server

    Chilamkurti, Naveen; Chaouchi, Hakima

    2013-01-01

    This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet o

  4. Wireless Competition in Canada: An Assessment

    Directory of Open Access Journals (Sweden)

    Jeffrey Church

    2013-08-01

    Full Text Available If there’s one thing Canadians agree on, it’s that Canada’s wireless industry can and should be more competitive. The federal government is on side with the policy objective of having four carriers in every region and has responded with policies that provide commercial advantages to entrants. But, the rub is that there has not been a study that actually assesses the state of competition in wireless services in Canada, until now. Those in favour of policies that will promote and sustain entry point to Canada’s high average revenue per user and low wireless penetration rate (mobile connections per capita as evidence that there is insufficient competition. The difficulty is that the facts are not consistent with this simplistic analysis. Measurements of wireless penetration are skewed toward countries that maintain the Calling Party Pays Protocol and favour pay-as-you-go plans, both of which encourage inflated user counts. Canada’s participation per capita on monthly plans and minutes of voice per capita are not outliers. Moreover, in terms of smartphone adoption and smartphone data usage, Canada is a global leader, contributing to high average revenue per user. Consistent with being world leaders in the rollout of high speed wireless networks, Canada lead its peer group in capital expenditures per subscriber in 2012: the competition of importance to Canadians is not just over price, but also over the quality of wireless networks. In any event, none of the measures typically used in international comparisons are relevant to assessing the competitiveness of Canadian wireless services. The appropriate competitive analysis recognizes two relevant features of the technology of wireless services: (i high fixed and sunk capital costs; and (ii economies of scale and scope. The implications of these are that profitability requires mark ups over short run measures of cost — high gross margins — and that there will be a natural, upper limit on

  5. Battling Latency in Modern Wireless Networks

    KAUST Repository

    Showail, Ahmad

    2018-05-15

    Buffer sizing has a tremendous effect on the performance of Wi-Fi based networks. Choosing the right buffer size is challenging due to the dynamic nature of the wireless environment. Over buffering or ‘bufferbloat’ may produce unacceptable endto-end delays. On the other hand, small buffers may limit the performance gains that can be obtained with various IEEE 802.11n/ac enhancements, such as frame aggregation. We propose Wireless Queue Management (WQM), a novel, practical, and lightweight queue management scheme for wireless networks. WQM adapts the buffer size based on the wireless link characteristics and the network load. Furthermore, it accounts for aggregates length when deciding on the optimal buffer size. We evaluate WQM using our 10 nodes wireless testbed. WQM reduces the end-to-end delay by an order of magnitude compared to the default buffer size in Linux while achieving similar network throughput. Also, WQM outperforms state of the art bufferbloat solutions, namely CoDel and PIE. WQM achieves 7× less latency compared to PIE, and 2× compared to CoDel at the cost of 8% drop in goodput in the worst case. Further, WQM improves network fairness as it limits the ability of a single flow to saturate the buffers.

  6. Wireless sensor network for sodium leak detection

    International Nuclear Information System (INIS)

    Satya Murty, S.A.V.; Raj, Baldev; Sivalingam, Krishna M.; Ebenezer, Jemimah; Chandran, T.; Shanmugavel, M.; Rajan, K.K.

    2012-01-01

    Highlights: ► Early detection of sodium leak is mandatory in any reactor handling liquid sodium. ► Wireless sensor networking technology has been introduced for detecting sodium leak. ► We designed and developed a wireless sensor node in-house. ► We deployed a pilot wireless sensor network for handling nine sodium leak signals. - Abstract: To study the mechanical properties of Prototype Fast Breeder Reactor component materials under the influence of sodium, the IN Sodium Test (INSOT) facility has been erected and commissioned at Indira Gandhi Centre for Atomic Research. Sodium reacts violently with air/moisture leading to fire. Hence early detection of sodium leak if any is mandatory for such plants and almost 140 sodium leak detectors are placed throughout the loop. All these detectors are wired to the control room for data collection and monitoring. To reduce the cost, space and maintenance that are involved in cabling, the wireless sensor networking technology has been introduced in the sodium leak detection system of INSOT. This paper describes about the deployment details of the pilot wireless sensor network and the measures taken for the successful deployment.

  7. Development of Arduino based wireless control system

    Science.gov (United States)

    Sun, Zhuoxiong; Dyke, Shirley J.; Pena, Francisco; Wilbee, Alana

    2015-03-01

    Over the past few decades, considerable attention has been given to structural control systems to mitigate structural vibration under natural hazards such as earthquakes and extreme weather conditions. Traditional wired structural control systems often employ a large amount of cables for communication among sensors, controllers and actuators. In such systems, implementation of wired sensors is usually quite complicated and expensive, especially on large scale structures such as bridges and buildings. To reduce the laborious installation and maintenance cost, wireless control systems (WCSs) are considered as a novel approach for structural vibration control. In this work, a WCS is developed based on the open source Arduino platform. Low cost, low power wireless sensing and communication components are built on the Arduino platform. Structural control algorithms are embedded within the wireless sensor board for feedback control. The developed WCS is first validated through a series of tests. Next, numerical simulations are performed simulating wireless control of a 3-story shear structure equipped with a semi-active control device (MR damper). Finally, experimental studies are carried out implementing the WCS on the 3-story shear structure in the Intelligent Infrastructure Systems Lab (IISL). A hydraulic shake table is used to generate seismic ground motions. The control performance is evaluated with the impact of modeling uncertainties, measurement noises as well as time delay and data loss induced by the wireless network. The developed WCS is shown to be effective in controlling structural vibrations under several historical earthquake ground motions.

  8. Bluetooth wireless database for scoliosis clinics.

    Science.gov (United States)

    Lou, E; Fedorak, M V; Hill, D L; Raso, J V; Moreau, M J; Mahood, J K

    2003-05-01

    A database system with Bluetooth wireless connectivity has been developed so that scoliosis clinics can be run more efficiently and data can be mined for research studies without significant increases in equipment cost. The wireless database system consists of a Bluetooth-enabled laptop or PC and a Bluetooth-enabled handheld personal data assistant (PDA). Each patient has a profile in the database, which has all of his or her clinical history. Immediately prior to the examination, the orthopaedic surgeon selects a patient's profile from the database and uploads that data to the PDA over a Bluetooth wireless connection. The surgeon can view the entire clinical history of the patient while in the examination room and, at the same time, enter in any new measurements and comments from the current examination. After seeing the patient, the surgeon synchronises the newly entered information with the database wirelessly and prints a record for the chart. This combination of the database and the PDA both improves efficiency and accuracy and can save significant time, as there is less duplication of work, and no dictation is required. The equipment required to implement this solution is a Bluetooth-enabled PDA and a Bluetooth wireless transceiver for the PC or laptop.

  9. Battling Latency in Modern Wireless Networks

    KAUST Repository

    Showail, Ahmad; Shihada, Basem

    2018-01-01

    Buffer sizing has a tremendous effect on the performance of Wi-Fi based networks. Choosing the right buffer size is challenging due to the dynamic nature of the wireless environment. Over buffering or ‘bufferbloat’ may produce unacceptable endto-end delays. On the other hand, small buffers may limit the performance gains that can be obtained with various IEEE 802.11n/ac enhancements, such as frame aggregation. We propose Wireless Queue Management (WQM), a novel, practical, and lightweight queue management scheme for wireless networks. WQM adapts the buffer size based on the wireless link characteristics and the network load. Furthermore, it accounts for aggregates length when deciding on the optimal buffer size. We evaluate WQM using our 10 nodes wireless testbed. WQM reduces the end-to-end delay by an order of magnitude compared to the default buffer size in Linux while achieving similar network throughput. Also, WQM outperforms state of the art bufferbloat solutions, namely CoDel and PIE. WQM achieves 7× less latency compared to PIE, and 2× compared to CoDel at the cost of 8% drop in goodput in the worst case. Further, WQM improves network fairness as it limits the ability of a single flow to saturate the buffers.

  10. Virtual Lab for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    PICOVICI, D.

    2008-06-01

    Full Text Available This article details an experimental system developed to enhance the education and research in the area of wireless networks technologies. The system referred, as Virtual Lab (VL is primarily targeting first time users or users with limited experience in programming and using wireless sensor networks. The VL enables a set of predefined sensor networks to be remotely accessible and controlled for constructive and time-efficient experimentation. In order to facilitate the user's wireless sensor applications, the VL is using three main components: a a Virtual Lab Motes (VLM, representing the wireless sensor, b a Virtual Lab Client (VLC, representing the user's tool to interact with the VLM and c a Virtual Lab Server (VLS representing the software link between the VLM and VLC. The concept has been proven using the moteiv produced Tmote Sky modules. Initial experimental use clearly demonstrates that the VL approach reduces dramatically the learning curve involved in programming and using the associated wireless sensor nodes. In addition the VL allows the user's focus to be directed towards the experiment and not towards the software programming challenges.

  11. Wireless sensor network for monitoring soil moisture and weather conditions

    Science.gov (United States)

    A wireless sensor network (WSN) was developed and deployed in three fields to monitor soil water status and collect weather data for irrigation scheduling. The WSN consists of soil-water sensors, weather sensors, wireless data loggers, and a wireless modem. Soil-water sensors were installed at three...

  12. SystemC modelling of wireless communication channel

    Science.gov (United States)

    Conti, Massimo; Orcioni, Simone

    2011-05-01

    This paper presents the definition in SystemC of wireless channels at different levels of abstraction. The different levels of description of the wireless channel can be easily interchanged allowing the reuse of the application and baseband layers in a high level analysis of the network or in a deep analysis of the communication between the wireless devices.

  13. Distributed Estimation, Coding, and Scheduling in Wireless Visual Sensor Networks

    Science.gov (United States)

    Yu, Chao

    2013-01-01

    In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…

  14. India: a Case of Fragile Wireless Service and Technology Adoption?

    NARCIS (Netherlands)

    L-F. Pau (Louis-François); J. Motiwalla

    2007-01-01

    textabstractWireless penetration and the Indian economy have grown significantly over the past few years, but how robust and sustainable is the adoption of wireless services and products? Several papers have discussed India as a wireless service and product market, and sometimes tried to assess

  15. Sensor Fusion-based Event Detection in Wireless Sensor Networks

    NARCIS (Netherlands)

    Bahrepour, M.; Meratnia, Nirvana; Havinga, Paul J.M.

    2009-01-01

    Recently, Wireless Sensor Networks (WSN) community has witnessed an application focus shift. Although, monitoring was the initial application of wireless sensor networks, in-network data processing and (near) real-time actuation capability have made wireless sensor networks suitable candidate for

  16. Compact wideband CMOS receiver frontends for wireless communication

    NARCIS (Netherlands)

    Blaakmeer, S.C.

    2010-01-01

    Abstract Wireless communication is an integral part of our daily life, the mobile phone is an example of a very popular wireless communication device. A communication link consists of a transmitter, a receiver and the transmission medium, which air or vacuum for a wireless link. Part of the receiver

  17. Experimental Performance Analysis of Wireless Links for Healthcare ...

    African Journals Online (AJOL)

    Wireless networking is currently being deployed for various applications. However, the application of wireless networking in healthcare remains a challenge mainly because of security and reliability concerns. This paper presents experimental results of performance analysis of a wireless network for healthcare application ...

  18. Indoor optical wireless systems : technology, trends, and applications

    NARCIS (Netherlands)

    Koonen, T.

    2018-01-01

    Indoor wireless traffic is evolving at a staggering pace, and is quickly depleting radio spectrum resources. Optical wireless communication (OWC) offers powerful solutions for resolving this imminent capacity crunch of radio-based wireless networks. OWC is not intended to fully replace radio

  19. Getting ahead of the curve in wireless communications | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The demand for wireless communications is expected to increase significantly over ... would become more accessible to those without mobile phones, or Internet access. ... that will have a lasting impact on the field of wireless communications. ... problems: cooperative communication, coexistence of wireless systems, and ...

  20. Properties and natural occurrence of maternal-effect selfish genes ('Medea' factors) in the red flour beetle, Tribolium castaneum

    International Nuclear Information System (INIS)

    Beeman, R.W.; Friesen, K.S.

    1999-01-01

    Maternally acting selfish genes, termed 'Medea' factors, were found to be widespread in wild populations of Tribolium castaneum collected in Europe, North and South America, Africa and south-east Asia, but were rare or absent in populations from Australia and the Indian subcontinent. We detected at least four distinct genetic loci in at least two different linkage groups that exhibit the Medea pattern of differential mortality of genotypes within maternal families. Although each M factor tested had similar properties of maternal lethality to larvae and zygotic self-rescue, M factors representing distinct loci did not show cross-rescue. Alleles at two of these loci, M 1 and M 4 , were by far the most prevalent, M 4 being the predominant type. M 2 and M 3 were each found only once, in Pakistan and Japan, respectively. Although M 1 could be genetically segregated from M 4 and maintained as a purified stock, the M 1 factor invariably co-occurred with M 4 in field populations, whereas M 4 usually occurred in the absence of other Medea factors. The dominant maternal lethal action of M 1 could be selectively inactivated (reverted) by gene-knockout gamma irradiation with retention of zygotic rescue activity. (author)

  1. Novel Synthetic Medea selfish genetic elements drive population replacement in Drosophila, and a theoretical exploration of Medea-dependent population suppression

    Science.gov (United States)

    Akbari, Omar S.; Chen, Chun-Hong; Marshall, John M.; Huang, Haixia; Antoshechkin, Igor; Hay, Bruce A.

    2013-01-01

    Insects act as vectors for diseases of plants, animals and humans. Replacement of wild insect populations with genetically modified individuals unable to transmit disease provides a potentially self-perpetuating method of disease prevention. Population replacement requires a gene drive mechanism in order to spread linked genes mediating disease refractoriness through wild populations. We previously reported the creation of synthetic Medea selfish genetic elements able to drive population replacement in Drosophila. These elements use microRNA-mediated silencing of myd88, a maternally expressed gene required for embryonic dorso-ventral pattern formation, coupled with early zygotic expression of a rescuing transgene, to bring about gene drive. Medea elements that work through additional mechanisms are needed in order to be able to carry out cycles of population replacement and/or remove existing transgenes from the population, using second-generation elements that spread while driving first-generation elements out of the population. Here we report the synthesis and population genetic behavior of two new synthetic Medea elements that drive population replacement through manipulation of signaling pathways involved in cellular blastoderm formation or Notch signaling, demonstrating that in Drosophila Medea elements can be generated through manipulation of diverse signaling pathways. We also describe the mRNA and small RNA changes in ovaries and early embryos associated from Medea-bearing females. Finally, we use modeling to illustrate how Medea elements carrying genes that result in diapause-dependent female lethality could be used to bring about population suppression. PMID:23654248

  2. A video wireless capsule endoscopy system powered wirelessly: design, analysis and experiment

    International Nuclear Information System (INIS)

    Pan, Guobing; Chen, Jiaoliao; Xin, Wenhui; Yan, Guozheng

    2011-01-01

    Wireless capsule endoscopy (WCE), as a relatively new technology, has brought about a revolution in the diagnosis of gastrointestinal (GI) tract diseases. However, the existing WCE systems are not widely applied in clinic because of the low frame rate and low image resolution. A video WCE system based on a wireless power supply is developed in this paper. This WCE system consists of a video capsule endoscope (CE), a wireless power transmission device, a receiving box and an image processing station. Powered wirelessly, the video CE has the abilities of imaging the GI tract and transmitting the images wirelessly at a frame rate of 30 frames per second (f/s). A mathematical prototype was built to analyze the power transmission system, and some experiments were performed to test the capability of energy transferring. The results showed that the wireless electric power supply system had the ability to transfer more than 136 mW power, which was enough for the working of a video CE. In in vitro experiments, the video CE produced clear images of the small intestine of a pig with the resolution of 320 × 240, and transmitted NTSC format video outside the body. Because of the wireless power supply, the video WCE system with high frame rate and high resolution becomes feasible, and provides a novel solution for the diagnosis of the GI tract in clinic

  3. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  4. Unpowered wireless transmission of ultrasound signals

    International Nuclear Information System (INIS)

    Huang, H; Paramo, D; Deshmukh, S

    2011-01-01

    This paper presents a wireless ultrasound sensing system that uses frequency conversion to convert the ultrasound signal to a microwave signal and transmit it directly without digitization. Constructed from a few passive microwave components, the sensor is able to sense, modulate, and transmit the full waveform of ultrasound signals wirelessly without requiring any local power source. The principle of operation of the unpowered wireless ultrasound sensor is described first, and this is followed by a detailed description of the implementation of the sensor and the sensor interrogation unit using commercially available antennas and microwave components. Validation of the sensing system using an ultrasound pitch–catch system and the power analysis model of the system are also presented

  5. Stochastic Modelling of Wireless Energy Transfer

    Science.gov (United States)

    Veilleux, Shaun; Almaghasilah, Ahmed; Abedi, Ali; Wilkerson, DeLisa

    2017-01-01

    This study investigates the efficiency of a new method of powering remote sensors by the means of wireless energy transfer. The increased use of sensors for data collection comes with the inherent cost of supplying power from sources such as power cables or batteries. Wireless energy transfer technology eliminates the need for power cables or periodic battery replacement. The time and cost of setting up or expanding a sensor network will be reduced while allowing sensors to be placed in areas where running power cables or battery replacement is not feasible. This paper models wireless channels for power and data separately. Smart scheduling for the data channel is proposed to avoid transmitting data on a noisy channel where the probability of data loss is high to improve power efficiency. Analytical models have been developed and verified using simulations.

  6. Energy and bandwidth-efficient wireless transmission

    CERN Document Server

    Gao, Wei

    2017-01-01

    This book introduces key modulation and predistortion techniques for approaching energy and spectrum-efficient transmission for wireless communication systems. The book presents a combination of theoretical principles, practical implementations, and actual tests. It focuses on spectrum-efficient modulation and energy-efficient transmission techniques in the portable wireless communication systems, and introduces currently developed and designed RF transceivers in the latest wireless markets. Most materials, design examples, and design strategies used are based on the author’s two decades of work in the digital communication fields, especially in the areas of the digital modulations, demodulations, digital signal processing, and linearization of power amplifiers. The applications of these practical products and equipment cover the satellite communications on earth station systems, microwave communication systems, 2G GSM and 3G WCDMA mobile communication systems, and 802.11 WLAN systems.

  7. WIRELESS TECHNOLOGIES for LOCATION-BASED SERVICES

    Directory of Open Access Journals (Sweden)

    Dewi Wirastuti

    2012-06-01

    Full Text Available This paper presents an overview of wireless technologies that support location-based services (LBS. Satellite and cellular networks have exploited their communication infrastructure to offer LBS. The rapid deployment of mobile broadband wireless networks has offered another appealing application area. Key to the realisation of LBS is an efficient and accurate positioning technique with various methods and offering different performance levels. So far, Global Positioning System (GPS has offered the best accuracy at a low cost but it is challenged by poor indoor coverage. With the rapid deployment of broadband wireless access ubiquitously, Mobile WiMAX (Worldwide Interoperability for Microwave Access is seen as a potential positioning option for LBS. Some key features of WiMAX, i.e., broadband benefit, high speed and large coverage area; it will be exploited to provide LBS.

  8. Wireless tamper detection sensor and sensing system

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant D. (Inventor)

    2011-01-01

    A wireless tamper detection sensor is defined by a perforated electrical conductor. The conductor is shaped to form a geometric pattern between first and second ends thereof such that the conductor defines an open-circuit that can store and transfer electrical and magnetic energy. The conductor resonates in the presence of a time-varying magnetic field to generate a harmonic response. The harmonic response changes when the conductor experiences a change in its geometric pattern due to severing of the conductor along at least a portion of the perforations. A magnetic field response recorder is used to wirelessly transmit the time-varying magnetic field and wirelessly detecting the conductor's harmonic response.

  9. Wireless Sensor Networks for Ambient Assisted Living

    Directory of Open Access Journals (Sweden)

    Raúl Aquino-Santos

    2013-11-01

    Full Text Available This paper introduces wireless sensor networks for Ambient Assisted Living as a proof of concept. Our workgroup has developed an arrhythmia detection algorithm that we evaluate in a closed space using a wireless sensor network to relay the information collected to where the information can be registered, monitored and analyzed to support medical decisions by healthcare providers. The prototype we developed is then evaluated using the TelosB platform. The proposed architecture considers very specific restrictions regarding the use of wireless sensor networks in clinical situations. The seamless integration of the system architecture enables both mobile node and network configuration, thus providing the versatile and robust characteristics necessary for real-time applications in medical situations. Likewise, this system architecture efficiently permits the different components of our proposed platform to interact efficiently within the parameters of this study.

  10. Availability Issues in Wireless Visual Sensor Networks

    Science.gov (United States)

    Costa, Daniel G.; Silva, Ivanovitch; Guedes, Luiz Affonso; Vasques, Francisco; Portugal, Paulo

    2014-01-01

    Wireless visual sensor networks have been considered for a large set of monitoring applications related with surveillance, tracking and multipurpose visual monitoring. When sensors are deployed over a monitored field, permanent faults may happen during the network lifetime, reducing the monitoring quality or rendering parts or the entire network unavailable. In a different way from scalar sensor networks, camera-enabled sensors collect information following a directional sensing model, which changes the notions of vicinity and redundancy. Moreover, visual source nodes may have different relevancies for the applications, according to the monitoring requirements and cameras' poses. In this paper we discuss the most relevant availability issues related to wireless visual sensor networks, addressing availability evaluation and enhancement. Such discussions are valuable when designing, deploying and managing wireless visual sensor networks, bringing significant contributions to these networks. PMID:24526301

  11. Utility Maximization in Nonconvex Wireless Systems

    CERN Document Server

    Brehmer, Johannes

    2012-01-01

    This monograph formulates a framework for modeling and solving utility maximization problems in nonconvex wireless systems. First, a model for utility optimization in wireless systems is defined. The model is general enough to encompass a wide array of system configurations and performance objectives. Based on the general model, a set of methods for solving utility maximization problems is developed. The development is based on a careful examination of the properties that are required for the application of each method. The focus is on problems whose initial formulation does not allow for a solution by standard convex methods. Solution approaches that take into account the nonconvexities inherent to wireless systems are discussed in detail. The monograph concludes with two case studies that demonstrate the application of the proposed framework to utility maximization in multi-antenna broadcast channels.

  12. Economics and Governance of the wireless Internet

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders; Tadayoni, Reza

    barriers of entry. In this paper three issues are discussed: 1) Developments in pricing schemes for Internet interconnection and Internet access with special focus on the role of wireless access. 2) Developments in supporting infrastructures with special focus on the increasing role of wireless......The Internet has undergone a growing diversification with regard to types of users, kinds of services and use of transmission technologies and infrastructures. Today, internet services are delivered by the use of many different wired and wireless communication technologies with different technical...... capabilities and limitations, and with different techno-economic characteristics. The question is whether these trends challenge the current mode of governance for the Internet. In the early days, the Internet was considered to be open, free, competitive, with a high level of entrepreneurialism, and with low...

  13. Emulating Wired Backhaul with Wireless Network Coding

    DEFF Research Database (Denmark)

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    In this paper we address the need for wireless network densification. We propose a solution wherein the wired backhaul employed in heterogeneous cellular networks is replaced with wireless links, while maintaining the rate requirements of the uplink and downlink traffic of each user. The first...... of the two-way protocol. The transmit power is set high enough to enable successive decoding at the small cell base station where the downlink data to the user is first decoded and its contribution removed from the received signal followed by the uplink data from the user. The decoding of the second layer......, the uplink traffic to the user, remains identical to the one performed in a wired system. In the broadcast phase, the decoding of the downlink traffic can also be guaranteed to remain identical. Hence, our solution claims an emulation of a wired backhaul with wireless network coding with same performance. We...

  14. Ultra Secure High Reliability Wireless Radiation Monitor

    International Nuclear Information System (INIS)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-01-01

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data

  15. ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR

    Energy Technology Data Exchange (ETDEWEB)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-08-03

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be

  16. Energy-Harvesting Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Vuckovic, Dusan; Di Mauro, Alessio

    2012-01-01

    Energy Harvesting comprises a promising solution to one of the key problems faced by battery-powered Wireless Sensor Networks, namely the limited nature of the energy supply (finite battery capacity). By harvesting energy from the surrounding environment, the sensors can have a continuous lifetime...... Sensor Networks with energy harvesting capability....... without any needs for battery recharge or replacement. However, energy harvesting introduces a change to the fundamental principles based on which WSNs are designed and realized. In this poster we sketch some of the key research challenges as well as our ongoing work in designing and realizing Wireless...

  17. On the Conditional Entropy of Wireless Networks

    DEFF Research Database (Denmark)

    Coon, Justin P.; Badiu, Mihai Alin; Gündüz, Deniz

    2018-01-01

    The characterization of topological uncertainty in wireless networks using the formalism of graph entropy has received interest in the spatial networks community. In this paper, we develop lower bounds on the entropy of a wireless network by conditioning on potential network observables. Two...... approaches are considered: 1) conditioning on subgraphs, and 2) conditioning on node positions. The first approach is shown to yield a relatively tight bound on the network entropy. The second yields a loose bound, in general, but it provides insight into the dependence between node positions (modelled using...

  18. Stochastic petri nets for wireless networks

    CERN Document Server

    Lei, Lei; Zhong, Zhangdui

    2015-01-01

    This SpringerBrief presents research in the application of Stochastic Petri Nets (SPN) to the performance evaluation of wireless networks under bursty traffic. It covers typical Quality-of-Service performance metrics such as mean throughput, average delay and packet dropping probability. Along with an introduction of SPN basics, the authors introduce the key motivation and challenges of using SPN to analyze the resource sharing performance in wireless networks. The authors explain two powerful modeling techniques that treat the well-known state space explosion problem: model decomposition and

  19. Wireless technologies for the Construction Sector

    DEFF Research Database (Denmark)

    Heller, Alfred; Orthmann, Christian

    2014-01-01

    the building sector and is therefore used to analyse requirements for alternative technologies. The motivation of the current work is to find upcoming technologies that bring improvements into the sector, for example improved life cycle costs and energy efficiencies, increasing quality, construction...... and operation efficiency and reducing faults and losses. The paper also lays out requirements expected by the sector. It will be shown that the wireless sensor network technology is a strong competitor that may meet the requirements. By analysing the application of such technologies throughout the building...... that follow the wireless sensor network, the paper will line up the requirements that the new technology has to meet to be introduced successfully....

  20. Energy Aware Computing in Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    In this work the idea of cooperation is applied to wireless communication systems. It is generally accepted that energy consumption is a significant design constraint for mobile handheld systems. We propose a novel method of cooperative task computing by distributing tasks among terminals over...... the unreliable wireless link. Principles of multi–processor energy aware task scheduling are used exploiting performance scalable technologies such as Dynamic Voltage Scaling (DVS). We introduce a novel mechanism referred to as D2VS and here it is shown by means of simulation that savings of 40% can be achieved....

  1. RF & wireless technologies know it all

    CERN Document Server

    Fette, Bruce A; Chandra, Praphul; Dobkin, Daniel M; Bensky, Dan; Miron, Douglas B; Lide, David; Dowla, Farid; Olexa, Ron

    2007-01-01

    The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!RF (radio frequency) and wireless technologies drive communication today. This technology and its applications enable wireless phones, portable device roaming, and short-range industrial and commercial application communication such as the supply chain management wonder, RFID. Up-to-date information regarding software defined R

  2. Wireless Nanoionic-Based Radio Frequency Switch

    Science.gov (United States)

    Nessel, James A. (Inventor); Miranda, Felix A (Inventor)

    2017-01-01

    A nanoionic switch connected to one or more rectenna modules is disclosed. The rectenna module is configured to receive a wireless signal and apply a first bias to change a state of the nanoionic switch from a first state to a second state. The rectenna module can receive a second wireless signal and apply a second bias to change the nanoionic switch from the second state back to the first state. The first bias is generally opposite of the first bias. The rectenna module accordingly permits operation of the nanoionic switch without onboard power.

  3. RF microwave circuit design for wireless applications

    CERN Document Server

    Rohde, Ulrich L

    2012-01-01

    Provides researchers and engineers with a complete set of modeling, design, and implementation tools for tackling the newest IC technologies Revised and completely updated, RF/Microwave Circuit Design for Wireless Applications, Second Edition is a unique, state-of-the-art guide to wireless integrated circuit design that provides researchers and engineers with a complete set of modeling, design, and implementation tools for tackling even the newest IC technologies. It emphasizes practical design solutions for high-performance devices and circuitry, incorporating ample exa

  4. Enabling Wireless Avionics Intra-Communications

    Science.gov (United States)

    Torres, Omar; Nguyen, Truong; Mackenzie, Anne

    2016-01-01

    The Electromagnetics and Sensors Branch of NASA Langley Research Center (LaRC) is investigating the potential of an all-wireless aircraft as part of the ECON (Efficient Reconfigurable Cockpit Design and Fleet Operations using Software Intensive, Networked and Wireless Enabled Architecture) seedling proposal, which is funded by the Convergent Aeronautics Solutions (CAS) project, Transformative Aeronautics Concepts (TAC) program, and NASA Aeronautics Research Institute (NARI). The project consists of a brief effort carried out by a small team in the Electromagnetic Environment Effects (E3) laboratory with the intention of exposing some of the challenges faced by a wireless communication system inside the reflective cavity of an aircraft and to explore potential solutions that take advantage of that environment for constructive gain. The research effort was named EWAIC for "Enabling Wireless Aircraft Intra-communications." The E3 laboratory is a research facility that includes three electromagnetic reverberation chambers and equipment that allow testing and generation of test data for the investigation of wireless systems in reflective environments. Using these chambers, the EWAIC team developed a set of tests and setups that allow the intentional variation of intensity of a multipath field to reproduce the environment of the various bays and cabins of large transport aircraft. This setup, in essence, simulates an aircraft environment that allows the investigation and testing of wireless communication protocols that can effectively be used as a tool to mitigate some of the risks inherent to an aircraft wireless system for critical functions. In addition, the EWAIC team initiated the development of a computational modeling tool to illustrate the propagation of EM waves inside the reflective cabins and bays of aircraft and to obtain quantifiable information regarding the degradation of signals in aircraft subassemblies. The nose landing gear of a UAV CAD model was used

  5. Finnish perspectives of wireless in healthcare.

    Science.gov (United States)

    Alasaarela, Esko

    2009-01-01

    Wireless solutions are a good choice for healthcare development in Finland. A survey of 135 experts in Finland show that (1) the competences needed for developing wireless solutions exist (2) the Finnish healthcare system is integrated enough and (3) the technology industry in this area is too weak for global marketing. The following recommendations can be concluded: (1) Cooperate internationally (2) Develop integrated solutions and health managing concepts for the important health problems (such as diabetes), (3) Harness the healthcare system to act as a test bed for new solutions and (4) Help companies to grow and take global roles.

  6. Wireless vehicular networks for car collision avoidance

    CERN Document Server

    2013-01-01

    Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks. The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

  7. Topology Optimisation of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Thike Aye Min

    2016-01-01

    Full Text Available Wireless sensor networks are widely used in a variety of fields including industrial environments. In case of a clustered network the location of cluster head affects the reliability of the network operation. Finding of the optimum location of the cluster head, therefore, is critical for the design of a network. This paper discusses the optimisation approach, based on the brute force algorithm, in the context of topology optimisation of a cluster structure centralised wireless sensor network. Two examples are given to verify the approach that demonstrate the implementation of the brute force algorithm to find an optimum location of the cluster head.

  8. Functional Testing of Wireless Sensor Node Designs

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Madsen, Jan

    2007-01-01

    Wireless sensor networks are networked embedded computer systems with stringent power, performance, cost and form-factor requirements along with numerous other constraints related to their pervasiveness and ubiquitousness. Therefore, only a systematic design methdology coupled with an efficient...... test approach can enable their conformance to design and deployment specifications. We discuss off-line, hierarchical, functional testing of complete wireless sensor nodes containing configurable logic through a combination of FPGA-based board test and Software-Based Self-Test (SBST) techniques...

  9. Wireless Sensor Applications in Extreme Aeronautical Environments

    Science.gov (United States)

    Wilson, William C.; Atkinson, Gary M.

    2013-01-01

    NASA aeronautical programs require rigorous ground and flight testing. Many of the testing environments can be extremely harsh. These environments include cryogenic temperatures and high temperatures (greater than 1500 C). Temperature, pressure, vibration, ionizing radiation, and chemical exposure may all be part of the harsh environment found in testing. This paper presents a survey of research opportunities for universities and industry to develop new wireless sensors that address anticipated structural health monitoring (SHM) and testing needs for aeronautical vehicles. Potential applications of passive wireless sensors for ground testing and high altitude aircraft operations are presented. Some of the challenges and issues of the technology are also presented.

  10. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  11. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  12. Wireless 3D Chocolate Printer

    Directory of Open Access Journals (Sweden)

    FROILAN G. DESTREZA

    2014-02-01

    Full Text Available This study is for the BSHRM Students of Batangas State University (BatStateU ARASOF for the researchers believe that the Wireless 3D Chocolate Printer would be helpful in their degree program especially on making creative, artistic, personalized and decorative chocolate designs. The researchers used the Prototyping model as procedural method for the successful development and implementation of the hardware and software. This method has five phases which are the following: quick plan, quick design, prototype construction, delivery and feedback and communication. This study was evaluated by the BSHRM Students and the assessment of the respondents regarding the software and hardware application are all excellent in terms of Accuracy, Effecitveness, Efficiency, Maintainability, Reliability and User-friendliness. Also, the overall level of acceptability of the design project as evaluated by the respondents is excellent. With regard to the observation about the best raw material to use in 3D printing, the chocolate is good to use as the printed material is slightly distorted,durable and very easy to prepare; the icing is also good to use as the printed material is not distorted and is very durable but consumes time to prepare; the flour is not good as the printed material is distorted, not durable but it is easy to prepare. The computation of the economic viability level of 3d printer with reference to ROI is 37.14%. The recommendation of the researchers in the design project are as follows: adding a cooling system so that the raw material will be more durable, development of a more simplified version and improving the extrusion process wherein the user do not need to stop the printing process just to replace the empty syringe with a new one.

  13. Wireless energy transfer: Dielectric lens antennas for beam shaping in wireless power-transfer applications

    Science.gov (United States)

    Gonçalves, Ricardo; Carvalho, Nuno B.; Pinho, Pedro

    2017-02-01

    In the current contest of wireless systems, the last frontier remains the cut of the power cord. In that sense, the interest over wireless energy transfer technologies in the past years has grown exponentially. However, there are still many challenges to be overcome in order to enable wireless energy transfer full potential. One of the focus in the development of such systems is the design of very-high-gain, highly efficient, antennas that can compensate for the propagation loss of radio signals over the air. In this paper, we explore the design and manufacturing process of dielectric lenses, fabricated using a professional-grade desktop 3D printer. Lens antennas are used in order to increase beam efficiency and therefore maximize the efficiency of a wireless power-transfer system operating at microwave frequencies in the Ku band. Measurements of two fabricated prototypes showcase a large directivity, as predicted with simulations. xml:lang="fr"

  14. 2nd International Conference on Mobile and Wireless Technology

    CERN Document Server

    Wattanapongsakorn, Naruemon

    2015-01-01

    This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications.  The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security.   The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community.  The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software.  The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology...

  15. Using Wireless Network Coding to Replace a Wired with Wireless Backhaul

    DEFF Research Database (Denmark)

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    of wireless emulated wire (WEW), based on two-way relaying and network coding. This setup leads to a new type of broadcast problem, with decoding conditions that are specific to the requirement for equivalence to the wired backhaul. We formulate and solve the associated optimization problems. The proposed...... approach is a convincing argument that wireless backhauling solutions should be designed and optimized for two-way communication....

  16. A Power Balance Aware Wireless Charger Deployment Method for Complete Coverage in Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Tu-Liang Lin

    2016-08-01

    Full Text Available Traditional sensor nodes are usually battery powered, and the limited battery power constrains the overall lifespan of the sensors. Recently, wireless power transmission technology has been applied in wireless sensor networks (WSNs to transmit wireless power from the chargers to the sensor nodes and solve the limited battery power problem. The combination of wireless sensors and wireless chargers forms a new type of network called wireless rechargeable sensor networks (WRSNs. In this research, we focus on how to effectively deploy chargers to maximize the lifespan of a network. In WSNs, the sensor nodes near the sink consume more power than nodes far away from the sink because of frequent data forwarding. This important power unbalanced factor has not been considered, however, in previous charger deployment research. In this research, a power balance aware deployment (PBAD method is proposed to address the power unbalance in WRSNs and to design the charger deployment with maximum charging efficiency. The proposed deployment method is effectively aware of the existence of the sink node that would cause unbalanced power consumption in WRSNs. The simulation results show that the proposed PBAD algorithm performs better than other deployment methods, and fewer chargers are deployed as a result.

  17. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks.

    Science.gov (United States)

    Tu, Weijian; Xu, Xianghua; Ye, Tingcong; Cheng, Zongmao

    2017-07-04

    Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node) as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP) to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  18. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Weijian Tu

    2017-07-01

    Full Text Available Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  19. Wireless battery management control and monitoring system

    Science.gov (United States)

    Zumstein, James M.; Chang, John T.; Farmer, Joseph C.; Kovotsky, Jack; Lavietes, Anthony; Trebes, James Edward

    2018-01-16

    A battery management system using a sensor inside of the battery that sensor enables monitoring and detection of various events in the battery and transmission of a signal from the sensor through the battery casing to a control and data acquisition module by wireless transmission. The detection of threshold events in the battery enables remedial action to be taken to avoid catastrophic events.

  20. University Undergraduate Students, Perceptions of The Wireless ...

    African Journals Online (AJOL)

    The study focused on Uni versity Undergraduate students' perceptions of the use of the wireless internet of Abubakar Tafawa Balewa University, Bauchi, Nigeria. Using emperical and new field data, this exploratory study investigated the students' perceptions of internet use in relation to library use. The study adopted a ...