WorldWideScience

Sample records for selfish packet-forwarding wireless

  1. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to variation in node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated against existing beaconless position-based protocols analytically and as well by means of simulations. The proposed protocol is demonstrated in this paper to be more efficient. In particular, it is shown that for the same amount of energy the proposed protocol transports one bit from source to destination much quicker. © 2012 IEEE.

  2. Utilization of OFDM for efficient packet forwarding in wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2011-12-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the network density grows, the overhead incurred grows significantly. As such, end-to-end energy and delay performance is adversely impacted. Motivated by the need for a forwarding mechanism that is more tolerant to growth in node density, an alternative position-based protocol is proposed in this paper. The protocol is designed such that it completely eliminates the need for potential relays to undergo a relay election process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. End-to-end performance is evaluated here against existing beaconless protocols. It is demonstrated that the proposed protocol is more efficient since it is able to offer lower end-to-end delay for the same amount of energy consumption. © 2011 IEEE.

  3. Security Mechanisms with Selfish Players in Wireless Networks

    Science.gov (United States)

    Hubaux, Jean-Pierre

    It is frequently assumed that the parties involved in a security mechanism will behave according to everyone's expectation. However, some of them might be tempted to depart from the expected (or canonical) behavior, because such a deviation is more beneficial for them. As an illustration, we will consider that phenomenon in the framework of wireless networks. We will briefly introduce some basic background in game theory and provide an overview of several recent contributions to that field. Finally, we will consider two examples in more detail, namely revocation in high-mobility (or "ephemeral") networks and pseudonym change in mix zones.

  4. Incentive Compatible and Globally Efficient Position Based Routing for Selfish Reverse Multicast in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sarvesh Varatharajan

    2009-10-01

    Full Text Available We consider the problem of all-to-one selfish routing in the absence of a payment scheme in wireless sensor networks, where a natural model for cost is the power required to forward, referring to the resulting game as a Locally Minimum Cost Forwarding (LMCF. Our objective is to characterize equilibria and their global costs in terms of stretch and diameter, in particular finding incentive compatible algorithms that are also close to globally optimal. We find that although social costs for equilibria of LMCF exhibit arbitrarily bad worst-case bounds and computational infeasibility of reaching optimal equilibria, there exist greedy and local incentive compatible heuristics achieving near-optimal global costs.

  5. Packet-Forwarding Algorithm in DTN Based on the Pheromone of Destination Node

    Directory of Open Access Journals (Sweden)

    Tiezhu Li

    2016-08-01

    Full Text Available The pheromone can be used for target tracking and, consequently, for packet forwarding to the destination node in delay-tolerant networking. In this study, an initiative community model is proposed by simulating pheromone production and diffusion, which contains all of the nodes that can receive the core node pheromone. We can set the distance of the edge node to the core to be less than five hops by establishing the appropriate spread coefficient ω . Packet forwarding is then converted into the process of tracing the pheromone of the destination node. A set of simulation results shows that the proposed initiative community model can effectively increase the delivery ratio and reduce delay when the community structure is relatively stable.

  6. Moral actor, selfish agent.

    Science.gov (United States)

    Frimer, Jeremy A; Schaefer, Nicola K; Oakes, Harrison

    2014-05-01

    People are motivated to behave selfishly while appearing moral. This tension gives rise to 2 divergently motivated selves. The actor-the watched self-tends to be moral; the agent-the self as executor-tends to be selfish. Three studies present direct evidence of the actor's and agent's distinct motives. To recruit the self-as-actor, we asked people to rate the importance of various goals. To recruit the self-as-agent, we asked people to describe their goals verbally. In Study 1, actors claimed their goals were equally about helping the self and others (viz., moral); agents claimed their goals were primarily about helping the self (viz., selfish). This disparity was evident in both individualist and collectivist cultures, attesting to the universality of the selfish agent. Study 2 compared actors' and agents' motives to those of people role-playing highly prosocial or selfish exemplars. In content (Study 2a) and in the impressions they made on an outside observer (Study 2b), actors' motives were similar to those of the prosocial role-players, whereas agents' motives were similar to those of the selfish role-players. Study 3 accounted for the difference between the actor and agent: Participants claimed that their agent's motives were the more realistic and that their actor's motives were the more idealistic. The selfish agent/moral actor duality may account for why implicit and explicit measures of the same construct diverge, and why feeling watched brings out the better angels of human nature.

  7. Game-theoretic approach for improving cooperation in wireless multihop networks.

    Science.gov (United States)

    Ng, See-Kee; Seah, Winston K G

    2010-06-01

    Traditional networks are built on the assumption that network entities cooperate based on a mandatory network communication semantic to achieve desirable qualities such as efficiency and scalability. Over the years, this assumption has been eroded by the emergence of users that alter network behavior in a way to benefit themselves at the expense of others. At one extreme, a malicious user/node may eavesdrop on sensitive data or deliberately inject packets into the network to disrupt network operations. The solution to this generally lies in encryption and authentication. In contrast, a rational node acts only to achieve an outcome that he desires most. In such a case, cooperation is still achievable if the outcome is to the best interest of the node. The node misbehavior problem would be more pronounced in multihop wireless networks like mobile ad hoc and sensor networks, which are typically made up of wireless battery-powered devices that must cooperate to forward packets for one another. However, cooperation may be hard to maintain as it consumes scarce resources such as bandwidth, computational power, and battery power. This paper applies game theory to achieve collusive networking behavior in such network environments. In this paper, pricing, promiscuous listening, and mass punishments are avoided altogether. Our model builds on recent work in the field of Economics on the theory of imperfect private monitoring for the dynamic Bertrand oligopoly, and adapts it to the wireless multihop network. The model derives conditions for collusive packet forwarding, truthful routing broadcasts, and packet acknowledgments under a lossy wireless multihop environment, thus capturing many important characteristics of the network layer and link layer in one integrated analysis that has not been achieved previously. We also provide a proof of the viability of the model under a theoretical wireless environment. Finally, we show how the model can be applied to design a generic

  8. Selfish spermatogonial selection

    DEFF Research Database (Denmark)

    Lim, Jasmine; Maher, Geoffrey J; Turner, Gareth D H

    2012-01-01

    that normal testes are mosaic for clusters of mutant cells: these clusters are predicted to have altered growth and signalling properties leading to their clonal expansion (selfish spermatogonial selection), but DNA extraction eliminates the possibility to study such processes at a tissue level. Using a panel...... appearance that extended through multiple serial sections that were physically contiguous (up to 1 mm in length), and exhibited enhanced staining for antibodies both to FGFR3 and a marker of downstream signal activation, pAKT. These findings support the concept that populations of spermatogonia in individual...

  9. Stable propagation of 'selfish'genetic elements

    Indian Academy of Sciences (India)

    These elements exhibit a variety of `selfish' strategies to ensure their replication and propagation during the growth of their host cells. To establish long-term ... The 2 m plasmid of Saccharomyces cerevisiae and related yeast plasmids provide models for optimized eukaryotic selfish DNA elements. Selfish DNA elements ...

  10. Selfishness Level of Strategic Games

    NARCIS (Netherlands)

    Apt, K.R.; Schäfer, G.

    2014-01-01

    We introduce a new measure of the discrepancy in strategic games between the social welfare in a Nash equilibrium and in a social optimum, that we call selfishness level. It is the smallest fraction of the social welfare that needs to be offered to each player to achieve that a social optimum is

  11. Appetite for the selfish gene.

    Science.gov (United States)

    Ostan, Iztok; Poljsak, Borut; Simcic, Marjan; Tijskens, L M M

    2010-06-01

    In developed countries, where the majority of the population has enough income to afford healthy diets, a large number of the inhabitants nevertheless choose unhealthy nutrition. WHO and FAO strategies to overcome this problem are mostly based on educational means. Implicitly, this approach is based on the presumption that the main causes of the problem are ignorance and culturally acquired bad habits. It has already been shown that wild animals, evidently acting solely on instinct without cultural effects, display tendencies that may damage their longevity: they tend to avoid healthy types of caloric restriction, prefer processed to raw food, and have an excessive intake of food stimulants and proteins when available (Ostan et al., 2009). This paper presents evidence for such nutritional patterns in humans as well and broadens the discourse to include proteins and fats and describes some human biological traits that present important differences between humans and other primates; among them are the human tendency for overeating and the inadequacy of a totally raw diet for human consumption (despite having some advantages for the human immune system). From an evolutionary perspective these strategies offer a biological advantage by enhancing the reproductive capability of the organisms, according to Dawkins' theory of the Selfish Gene. Genomic-based pleasure of such nutrition seems to be the main cause of instinctive nutritional drives. Further research on the process of food acceptance is needed to determine the role and importance of genomic-based pleasure compared to epigenetic or culture-based pleasure. Both, however, seem to be important and very stable factors in human nutritional choice and seem to prevail over conscious factors in food acceptance. Copyright 2010 Elsevier Ltd. All rights reserved.

  12. The Selfish Brain: Stress and Eating Behavior

    OpenAIRE

    Peters, Achim; Kubera, Britta; Hubold, Christian; Langemann, Dirk

    2011-01-01

    The brain occupies a special hierarchical position in human energy metabolism. If cerebral homeostasis is threatened, the brain behaves in a "selfish" manner by competing for energy resources with the body. Here we present a logistic approach, which is based on the principles of supply and demand known from economics. In this "cerebral supply chain" model, the brain constitutes the final consumer. In order to illustrate the operating mode of the cerebral supply chain, we t...

  13. A parasitic selfish gene that affects host promiscuity

    Science.gov (United States)

    Giraldo-Perez, Paulina; Goddard, Matthew R.

    2013-01-01

    Selfish genes demonstrate transmission bias and invade sexual populations despite conferring no benefit to their hosts. While the molecular genetics and evolutionary dynamics of selfish genes are reasonably well characterized, their effects on hosts are not. Homing endonuclease genes (HEGs) are one well-studied family of selfish genes that are assumed to be benign. However, we show that carrying HEGs is costly for Saccharomyces cerevisiae, demonstrating that these genetic elements are not necessarily benign but maybe parasitic. We estimate a selective load of approximately 1–2% in ‘natural’ niches. The second aspect we examine is the ability of HEGs to affect hosts' sexual behaviour. As all selfish genes critically rely on sex for spread, then any selfish gene correlated with increased host sexuality will enjoy a transmission advantage. While classic parasites are known to manipulate host behaviour, we are not aware of any evidence showing a selfish gene is capable of affecting host promiscuity. The data presented here show a selfish element may increase the propensity of its eukaryote host to undergo sex and along with increased rates of non-Mendelian inheritance, this may counterbalance mitotic selective load and promote spread. Demonstration that selfish genes are correlated with increased promiscuity in eukaryotes connects with ideas suggesting that selfish genes promoted the evolution of sex initially. PMID:24048156

  14. COMPARISON OF NORMAL SELFISH OVERLAY NETWORK AND SELFISH OVERLAY NETWORK WITH DEPLOYMENT OF OVERLAY NODES USING FUZZY LOGIC

    OpenAIRE

    S.Prayla Shyry; V.Ramachandran

    2011-01-01

    Selfish overlay routing is the technique whereby the sender of the packet can specify the route that the packet should take through the network. Selfish overlay routing allow end users to select routes in an egocentic fashion to optimize their own performance without considering the system wide criteria which in turn cause performance degradation .The main concept behind the selfish overlay network is whenever there is a link failure the overlay nodes in the network will route the packet to t...

  15. Selfish brain and selfish immune system interplay: A theoretical framework for metabolic comorbidities of mood disorders.

    Science.gov (United States)

    Yamagata, Ana Sayuri; Mansur, Rodrigo Barbachan; Rizzo, Lucas Bortolotto; Rosenstock, Tatiana; McIntyre, Roger S; Brietzke, Elisa

    2017-01-01

    According to the "selfish brain" theory, the brain regulates its own energy supply influencing the peripheral metabolism and food intake according to its needs. The immune system has been likewise "selfish" due to independent energy consumption; and it may compete with the brain (another high energy-consumer) for glucose. In mood disorders, stress in mood episodes or physiological stress activate homeostasis mechanisms from the brain and the immune system to solve the imbalance. The interaction between the selfish brain and the selfish immune system may explain various conditions of medical impairment in mood disorders, such as Metabolic Syndrome (MetS), obesity, type 2 diabetes mellitus (T2DM) and immune dysregulation. The objective of this study is to comprehensively review the literature regarding the competition between the brain and the immune system for energy substrate. Targeting the energetic regulation of the brain and the immune system and their cross-talk open alternative treatments and a different approach in the study of general medical comorbidities in mood disorders, although more investigation is needed. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. The Selfish Brain: Stress and Eating Behavior

    Directory of Open Access Journals (Sweden)

    Achim ePeters

    2011-05-01

    Full Text Available The brain occupies a special hierarchical position in human energy metabolism. If cerebral homeostasis is threatened, the brain behaves in a "selfish" manner by competing for energy resources with the body. Here we present a logistic approach, which is based on the principles of supply and demand known from economics. In this "cerebral supply chain" model, the brain constitutes the final consumer. In order to illustrate the operating mode of the cerebral supply chain, we take experimental data which allow to assess the supply, demand and need of the brain under conditions of psychosocial stress. The experimental results show that the brain under conditions of psychosocial stress actively demands energy from the body, in order to cover its increased energy needs. The data demonstrate that the stressed brain uses a mechanism referred to as "cerebral insulin suppression" to limit glucose fluxes into peripheral tissue (muscle, fat and to enhance cerebral glucose supply. Furthermore psychosocial stress elicits a marked increase in eating behavior in the post-stress phase. Subjects ingested more carbohydrates without any preference for sweet ingredients. These experimentally observed changes of cerebral demand, supply and need are integrated into a logistic framework describing the supply chain of the selfish brain.

  17. Selfish Gene Algorithm Vs Genetic Algorithm: A Review

    Science.gov (United States)

    Ariff, Norharyati Md; Khalid, Noor Elaiza Abdul; Hashim, Rathiah; Noor, Noorhayati Mohamed

    2016-11-01

    Evolutionary algorithm is one of the algorithms inspired by the nature. Within little more than a decade hundreds of papers have reported successful applications of EAs. In this paper, the Selfish Gene Algorithms (SFGA), as one of the latest evolutionary algorithms (EAs) inspired from the Selfish Gene Theory which is an interpretation of Darwinian Theory ideas from the biologist Richards Dawkins on 1989. In this paper, following a brief introduction to the Selfish Gene Algorithm (SFGA), the chronology of its evolution is presented. It is the purpose of this paper is to present an overview of the concepts of Selfish Gene Algorithm (SFGA) as well as its opportunities and challenges. Accordingly, the history, step involves in the algorithm are discussed and its different applications together with an analysis of these applications are evaluated.

  18. Selfish cells in altruistic cell society - a theoretical oncology.

    Science.gov (United States)

    Chigira, M

    1993-09-01

    In multicellular organisms, internal evolution of individual cells is strictly forbidden and 'evolutional' DNA replication should be performed only by the sexual reproduction system. Wholistic negative control system called 'homeostasis' serves all service to germ line cells. All somatic cells are altruistic to the germ line cells. However, in malignant tumors, it seems that individual cells replicate and behave 'selfishly' and evolve against the internal microenvironment. Tumor cells only express the occult selfishness which is programmed in normal cells a priori. This phenomenon is based on the failure of identical DNA replication, and results in 'autonomy' and 'anomie' of cellular society as shown in tumor cells. Genetic programs of normal cells connote this cellular autonomy and anomie introduced by the deletion of regulators on structure genes. It is rather paradoxical that the somatic cells get their freedom from wholistic negative regulation programmed internally. However, this is not a true paradox, since multicellular organisms have clearly been evolved from 'monads' in which cells proliferate without wholistic regulation. Somatic cells revolt against germ cell DNA, called 'selfish replicator' by Dawkins. It is an inevitable destiny that the 'selfishness' coded in genome should be revenged by itself. Selfish replicator in germ cell line should be revolted by its selfishness in the expansion of somatic cells, since they have an orthogenesis to get more selfishness in order to increase their genome. Tumor heterogeneity and progression can be fully explained by this self-contradictory process which produces heterogeneous gene copies different from the original clone in the tumor, although 'selfish' gene replication is the final target of being. Furthermore, we have to discard the concept of clonality of tumor cells since genetic instability is a fundamental feature of tumors. Finally, tumor cells and proto-oncogenes can be considered as the ultimate parasite

  19. Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Bakar, Kamalrulnizam Abu; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks. PMID:22368490

  20. Multipath routing in wireless sensor networks: survey and research challenges.

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Abu Bakar, Kamalrulnizam; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks.

  1. Game Theory for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Ngai-Ming Kwok

    2012-07-01

    Full Text Available Game theory (GT is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs. This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field.

  2. Game theory for Wireless Sensor Networks: a survey.

    Science.gov (United States)

    Shi, Hai-Yan; Wang, Wan-Liang; Kwok, Ngai-Ming; Chen, Sheng-Yong

    2012-01-01

    Game theory (GT) is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs). This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field.

  3. Game Theory for Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Shi, Hai-Yan; Wang, Wan-Liang; Kwok, Ngai-Ming; Chen, Sheng-Yong

    2012-01-01

    Game theory (GT) is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs). This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field. PMID:23012533

  4. Social Motivation: Costs and Benefits of Selfishness and Otherishness.

    Science.gov (United States)

    Crocker, Jennifer; Canevello, Amy; Brown, Ashley A

    2017-01-03

    We examine recent evidence on the consequences of selfishness and otherishness for psychological well-being, physical health, and relationships. In the first sections, we consider recent evidence regarding the costs and benefits of giving time, money, and support to others and the costs and benefits of taking or receiving those things from others. Then, because the behaviors of giving and taking can be motivated either by selfish or otherish concerns, we next consider the costs and benefits of the motivation underlying giving and taking. We also examine why and for whom selfishness and otherishness have consequences for psychological well-being, physical health, and relationships. We focus on mechanisms identified in research, including intrapsychic mechanisms such as positive and negative affect, self-esteem and self-efficacy, a sense of meaning and purpose in life, and a sense of connectedness to or isolation from others, as well as interpersonal processes such as reciprocation of support and responsiveness.

  5. Trust framework for a secured routing in wireless sensor network

    Directory of Open Access Journals (Sweden)

    Ouassila Hoceini

    2015-11-01

    Full Text Available Traditional techniques to eliminate insider attacks developed for wired and wireless ad hoc networks are not well suited for wireless sensors networks due to their resource constraints nature. In order to protect WSNs against malicious and selfish behavior, some trust-based systems have recently been modeled. The resource efficiency and dependability of a trust system are the most fundamental requirements for any wireless sensor network (WSN. In this paper, we propose a Trust Framework for a Secured Routing in Wireless Sensor Network (TSR scheme, which works with clustered networks. This approach can effectively reduce the cost of trust evaluation and guarantee a better selection of safest paths that lead to the base station. Theoretical as well as simulation results show that our scheme requires less communication overheads and consumes less energy as compared to the current typical trust systems for WSNs. Moreover, it detects selfish and defective nodes and prevents us of insider attacks

  6. A deeper integration of Selfish Goal Theory and modern evolutionary psychology.

    Science.gov (United States)

    Conroy-Beam, Daniel; Buss, David M

    2014-04-01

    Conceptually integrating Selfish Goal Theory with modern evolutionary psychology amplifies theoretical power. Inconsistency, a key principle of Selfish Goal Theory, illustrates this insight. Conflicting goals of seeking sexual variety and successful mate retention furnish one example. Siblings have evolved goals to cooperate and compete, a second example. Integrating Selfish Goal Theory with evolutionary theory can explain much inconsistent goal-directed behavior.

  7. Preventing the impact of selfish behavior under MANET using ...

    Indian Academy of Sciences (India)

    K Rama Abirami

    2018-04-13

    Apr 13, 2018 ... MANET; selfish behavior; routing protocols; AODV and security. 1. Introduction. Security in MANET is a vital concern for the fundamental working of a network. Availability of network services, confidentiality and integrity of the data can be achieved only by guaranteeing the security issues have been met.

  8. Preschoolers' group bias in punishing selfishness in the Ultimatum Game.

    Science.gov (United States)

    Wu, Zhen; Gao, Xiaohe

    2018-02-01

    Previous studies have shown that both adults and children tend to favor members of their own group and expect reciprocity of such in-group privilege. If a person is treated unfairly by an in-group member, a conflict arises between the tendency of in-group favoritism and the desire to punish violators of in-group norms. How do children solve the conflict at different points in development? We compared how preschoolers punished in-group and out-group members (marked by color preference) for selfishness in the Ultimatum Game. We found that (a) 3- to 6-year-old Chinese children rejected selfish allocations more often than fair ones, showing a robust preference for fairness; (b) 3- and 4-year-olds showed no group differences in their punishment behavior, suggesting that second-party punishment of selfishness is not biased during early childhood; (c) 5- and 6-year-old girls were more likely to punish selfishness of in-groups than of out-groups, illuminating an early sign of maintaining group-based fairness norms even at a personal cost; and (d) 5- and 6-year-old boys, however, punished in-groups and out-groups equally often and punished out-groups more often than did girls. These age and gender differences in children's punishment imply that socialization may play an important role in showing group bias when enforcing fairness norms. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Selfish goals serve more fundamental social and biological goals.

    Science.gov (United States)

    Becker, D Vaughn; Kenrick, Douglas T

    2014-04-01

    Proximate selfish goals reflect the machinations of more fundamental goals such as self-protection and reproduction. Evolutionary life history theory allows us to make predictions about which goals are prioritized over others, which stimuli release which goals, and how the stages of cognitive processing are selectively influenced to better achieve the aims of those goals.

  10. On the selection and balancing of multiple selfish goals

    NARCIS (Netherlands)

    Kopetz, C.; Hofmann, W.; Wiers, R.W.H.J.

    2014-01-01

    The selfish goal metaphor is interesting and intriguing. It accounts for the idiosyncrasies and inconsistencies in peoples' goal pursuits without invoking free will, self-regulatory, or self-control failures. However, people pursue multiple goals, sometimes simultaneously. We argue that the model

  11. Quantum selfish gene (biological evolution in terms of quantum mechanics)

    OpenAIRE

    Ozhigov, Yuri I.

    2013-01-01

    I propose to treat the biological evolution of genoms by means of quantum mechanical tools. We start with the concept of meta- gene, which specifies the "selfish gene" of R.Dawkins. Meta- gene encodes the abstract living unity, which can live relatively independently of the others, and can contain a few real creatures. Each population of living creatures we treat as the wave function on meta- genes, which module squared is the total number of creatures with the given meta-gene, and the phase ...

  12. Selfish evolution of cytonuclear hybrid incompatibility in Mimulus.

    Science.gov (United States)

    Case, Andrea L; Finseth, Findley R; Barr, Camille M; Fishman, Lila

    2016-09-14

    Intraspecific coevolution between selfish elements and suppressors may promote interspecific hybrid incompatibility, but evidence of this process is rare. Here, we use genomic data to test alternative models for the evolution of cytonuclear hybrid male sterility in Mimulus In hybrids between Iron Mountain (IM) Mimulus guttatus × Mimulus nasutus, two tightly linked M. guttatus alleles (Rf1/Rf2) each restore male fertility by suppressing a local mitochondrial male-sterility gene (IM-CMS). Unlike neutral models for the evolution of hybrid incompatibility loci, selfish evolution predicts that the Rf alleles experienced strong selection in the presence of IM-CMS. Using whole-genome sequences, we compared patterns of population-genetic variation in Rf at IM to a neighbouring population that lacks IM-CMS. Consistent with local selection in the presence of IM-CMS, the Rf region shows elevated FST, high local linkage disequilibrium and a distinct haplotype structure at IM, but not at Cone Peak (CP), suggesting a recent sweep in the presence of IM-CMS. In both populations, Rf2 exhibited lower polymorphism than other regions, but the low-diversity outliers were different between CP and IM. Our results confirm theoretical predictions of ubiquitous cytonuclear conflict in plants and provide a population-genetic mechanism for the evolution of a common form of hybrid incompatibility. © 2016 The Author(s).

  13. On the Social Cost of Distributed Selfish Content Replication

    DEFF Research Database (Denmark)

    Pollatos, Gerasimos G.; Telelis, Orestis A.; Zissimopoulos, Vassilis

    2008-01-01

    ) a subset of objects, and accessing the rest form the nearest possible location. We show existence of stable networks by proving existence of pure strategy Nash equilibria for a game-theoretic formulation of this situation. Social (overall) cost of stable networks is measured by the average...... or by the maximum access cost experienced by any user. We study socially most and least expensive stable networks by means of tight bounds on the ratios of the Price of Anarchy and Stability respectively. Although in the worst case the ratios may coincide, we identify cases where they differ significantly. We......We study distributed content replication networks formed voluntarily by selfish autonomous users, seeking access to information objects that originate form distant servers. Each user caters to minimization of its individual access cost by replicating locally (up to constrained storage capacity...

  14. Evolution of discrimination in populations at equilibrium between selfishness and altruism.

    Science.gov (United States)

    Sibly, Richard M; Curnow, Robert N

    2012-11-21

    Where there is genetically based variation in selfishness and altruism, as in man, altruists with an innate ability to recognise and thereby only help their altruistic relatives may evolve. Here we use diploid population genetic models to chart the evolution of genetically-based discrimination in populations initially in stable equilibrium between altruism and selfishness. The initial stable equilibria occur because help is assumed subject to diminishing returns. Similar results were obtained whether we used a model with two independently inherited loci, one controlling altruism the other discrimination, or a one locus model with three alleles. The latter is the opposite extreme to the first model, and can be thought of as involving complete linkage between two loci on the same chromosome. The introduction of discrimination reduced the benefits obtained by selfish individuals, more so as the number of discriminators increased, and selfishness was eventually eliminated in some cases. In others selfishness persisted and the evolutionary outcome was a stable equilibrium involving selfish individuals and both discriminating and non-discriminating altruists. Heritable variation in selfishness, altruism and discrimination is predicted to be particularly evident among full sibs. The suggested coexistence of these three genetic dispositions could explain widespread interest within human social groups as to who will and who will not help others. These predictions merit experimental and observational investigation by primatologists, anthropologists and psychologists. Copyright © 2012 Elsevier Ltd. All rights reserved.

  15. Security for multi-hop wireless networks

    CERN Document Server

    Mahmoud, Mohamed M E A

    2014-01-01

    This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security

  16. Efficient packet forwarding using cyber-security aware policies

    Science.gov (United States)

    Ros-Giralt, Jordi

    2017-10-25

    For balancing load, a forwarder can selectively direct data from the forwarder to a processor according to a loading parameter. The selective direction includes forwarding the data to the processor for processing, transforming and/or forwarding the data to another node, and dropping the data. The forwarder can also adjust the loading parameter based on, at least in part, feedback received from the processor. One or more processing elements can store values associated with one or more flows into a structure without locking the structure. The stored values can be used to determine how to direct the flows, e.g., whether to process a flow or to drop it. The structure can be used within an information channel providing feedback to a processor.

  17. Sharks shape the geometry of a selfish seal herd: experimental evidence from seal decoys.

    Science.gov (United States)

    De Vos, Alta; O'Riain, M Justin

    2010-02-23

    Many animals respond to predation risk by forming groups. Evolutionary explanations for group formation in previously ungrouped, but loosely associated prey have typically evoked the selfish herd hypothesis. However, despite over 600 studies across a diverse array of taxa, the critical assumptions of this hypothesis have remained collectively untested, owing to several confounding problems in real predator-prey systems. To solve this, we manipulated the domains of danger of Cape fur seal (Arctocephalus pusillus pusillus) decoys to provide evidence that a selfish reduction in a seals' domain of danger results in a proportional reduction in its predation risk from ambush shark attacks. This behaviour confers a survival advantage to individual seals within a group and explains the evolution of selfish herds in a prey species. These findings empirically elevate Hamilton's selfish herd hypothesis to more than a 'theoretical curiosity'.

  18. Exponential Reliability Coefficient based Reputation Mechanism for isolating selfish nodes in MANETs

    Directory of Open Access Journals (Sweden)

    J. Sengathir

    2015-07-01

    Full Text Available In mobile ad hoc networks, cooperation among active mobile nodes is considered to play a vital role in reliable transmission of data. But, the selfish mobile nodes present in an ad hoc environment refuse to forward neighbouring nodes’ packet for conserving its own energy. This intentional selfish behaviour drastically reduces the degree of cooperation maintained between the mobile nodes. Hence, a need arises for devising an effective mechanism which incorporates both energy efficiency and reputation into account for mitigating selfish behaviour in MANETs. In this paper, we propose an Exponential Reliability Coefficient based reputation Mechanism (ERCRM which isolates the selfish nodes from the routing path based on Exponential Reliability Coefficient (ExRC. This reliability coefficient manipulated through exponential failure rate based on moving average method highlights the most recent past behaviour of the mobile nodes for quantifying its genuineness. From the simulation results, it is evident that, the proposed ERCRM approach outperforms the existing Packet Conservation Monitoring Algorithm (PCMA and Spilt Half Reliability Coefficient based Mathematical Model (SHRCM in terms of performance evaluation metrics such as packet delivery ratio, throughput, total overhead and control overhead. Further, this ERCRM mechanism has a successful rate of 28% in isolating the selfish nodes from the routing path. Furthermore, it also aids in framing the exponential threshold point of detection as 0.4, where a maximum number of selfish nodes are identified when compared to the existing models available in the literature.

  19. Selfish genetic elements and the gene’s-eye view of evolution

    Science.gov (United States)

    2016-01-01

    During the last few decades, we have seen an explosion in the influx of details about the biology of selfish genetic elements. Ever since the early days of the field, the gene’s-eye view of Richard Dawkins, George Williams, and others, has been instrumental to make sense of new empirical observations and to the generation of new hypotheses. However, the close association between selfish genetic elements and the gene’s-eye view has not been without critics and several other conceptual frameworks have been suggested. In particular, proponents of multilevel selection models have used selfish genetic elements to criticize the gene’s-eye view. In this paper, I first trace the intertwined histories of the study of selfish genetic elements and the gene’s-eye view and then discuss how their association holds up when compared with other proposed frameworks. Next, using examples from transposable elements and the major transitions, I argue that different models highlight separate aspects of the evolution of selfish genetic elements and that the productive way forward is to maintain a plurality of perspectives. Finally, I discuss how the empirical study of selfish genetic elements has implications for other conceptual issues associated with the gene’s-eye view, such as agential thinking, adaptationism, and the role of fitness maximizing models in evolution. PMID:29491953

  20. Reproductive bribing and policing as evolutionary mechanisms for the suppression of within-group selfishness.

    Science.gov (United States)

    Reeve, H K; Keller, L

    1997-07-01

    We show that a new, simple, and robust general mechanism for the social suppression of within-group selfishness follows from Hamilton's rule applied in a multilevel selection approach to asymmetrical, two-person groups: If it pays a group member to behave selfishly (i.e., increase its share of the group's reproduction, at the expense of group productivity), then its partner will virtually always be favored to provide a reproductive "bribe" sufficient to remove the incentive for the selfish behavior. The magnitude of the bribe will vary directly with the number of offspring (or other close kin) potentially gained by the selfish individual and inversely with both the relatedness r between the interactants and the loss in group productivity because of selfishness. This bribe principle greatly extends the scope for cooperation within groups. Reproductive bribing is more likely to be favored over social policing for dominants rather than subordinates and as intragroup relatedness increases. Finally, analysis of the difference between the group optimum for an individual's behavior and the individual's inclusive fitness optimum reveals a paradoxical feedback loop by which bribing and policing, while nullifying particular selfish acts, automatically widen the separation of individual and group optima for other behaviors (i.e., resolution of one conflict intensifies others).

  1. Statics and Dynamics of Selfish Interactions in Distributed Service Systems.

    Directory of Open Access Journals (Sweden)

    Fabrizio Altarelli

    Full Text Available We study a class of games which models the competition among agents to access some service provided by distributed service units and which exhibits congestion and frustration phenomena when service units have limited capacity. We propose a technique, based on the cavity method of statistical physics, to characterize the full spectrum of Nash equilibria of the game. The analysis reveals a large variety of equilibria, with very different statistical properties. Natural selfish dynamics, such as best-response, usually tend to large-utility equilibria, even though those of smaller utility are exponentially more numerous. Interestingly, the latter actually can be reached by selecting the initial conditions of the best-response dynamics close to the saturation limit of the service unit capacities. We also study a more realistic stochastic variant of the game by means of a simple and effective approximation of the average over the random parameters, showing that the properties of the average-case Nash equilibria are qualitatively similar to the deterministic ones.

  2. Selfish cellular networks and the evolution of complex organisms.

    Science.gov (United States)

    Kourilsky, Philippe

    2012-03-01

    Human gametogenesis takes years and involves many cellular divisions, particularly in males. Consequently, gametogenesis provides the opportunity to acquire multiple de novo mutations. A significant portion of these is likely to impact the cellular networks linking genes, proteins, RNA and metabolites, which constitute the functional units of cells. A wealth of literature shows that these individual cellular networks are complex, robust and evolvable. To some extent, they are able to monitor their own performance, and display sufficient autonomy to be termed "selfish". Their robustness is linked to quality control mechanisms which are embedded in and act upon the individual networks, thereby providing a basis for selection during gametogenesis. These selective processes are equally likely to affect cellular functions that are not gamete-specific, and the evolution of the most complex organisms, including man, is therefore likely to occur via two pathways: essential housekeeping functions would be regulated and evolve during gametogenesis within the parents before being transmitted to their progeny, while classical selection would operate on other traits of the organisms that shape their fitness with respect to the environment. Copyright © 2012 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  3. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  4. The multiple faces of the human immune system : Modern life causes low-grade inflammation and thereby provokes conflict between the selfish immune system and the selfish brain

    NARCIS (Netherlands)

    Pruimboom, Leo

    2017-01-01

    This thesis describes the multiple ways by which the human immune system can react upon direct and indirect challenges, such as infection and wounds on the one hand, and chronic stress factors, such as smoking, on the other. The human defense system exhibits a type of selfish behaviour during both

  5. GTRF: a game theory approach for regulating node behavior in real-time wireless sensor networks.

    Science.gov (United States)

    Lin, Chi; Wu, Guowei; Pirozmand, Poria

    2015-06-04

    The selfish behaviors of nodes (or selfish nodes) cause packet loss, network congestion or even void regions in real-time wireless sensor networks, which greatly decrease the network performance. Previous methods have focused on detecting selfish nodes or avoiding selfish behavior, but little attention has been paid to regulating selfish behavior. In this paper, a Game Theory-based Real-time & Fault-tolerant (GTRF) routing protocol is proposed. GTRF is composed of two stages. In the first stage, a game theory model named VA is developed to regulate nodes' behaviors and meanwhile balance energy cost. In the second stage, a jumping transmission method is adopted, which ensures that real-time packets can be successfully delivered to the sink before a specific deadline. We prove that GTRF theoretically meets real-time requirements with low energy cost. Finally, extensive simulations are conducted to demonstrate the performance of our scheme. Simulation results show that GTRF not only balances the energy cost of the network, but also prolongs network lifetime.

  6. Development of in-group favoritism in children’s third-party punishment of selfishness

    Science.gov (United States)

    Jordan, Jillian J.; McAuliffe, Katherine; Warneken, Felix

    2014-01-01

    When enforcing norms for cooperative behavior, human adults sometimes exhibit in-group bias. For example, third-party observers punish selfish behaviors committed by out-group members more harshly than similar behaviors committed by in-group members. Although evidence suggests that children begin to systematically punish selfish behavior around the age of 6 y, the development of in-group bias in their punishment remains unknown. Do children start off enforcing fairness norms impartially, or is norm enforcement biased from its emergence? How does bias change over development? Here, we created novel social groups in the laboratory and gave 6- and 8-year-olds the opportunity to engage in costly third-party punishment of selfish sharing behavior. We found that by age 6, punishment was already biased: Selfish resource allocations received more punishment when they were proposed by out-group members and when they disadvantaged in-group members. We also found that although costly punishment increased between ages 6 and 8, bias in punishment partially decreased. Although 8-y-olds also punished selfish out-group members more harshly, they were equally likely to punish on behalf of disadvantaged in-group and out-group members, perhaps reflecting efforts to enforce norms impartially. Taken together, our results suggest that norm enforcement is biased from its emergence, but that this bias can be partially overcome through developmental change. PMID:25136086

  7. Development of in-group favoritism in children's third-party punishment of selfishness.

    Science.gov (United States)

    Jordan, Jillian J; McAuliffe, Katherine; Warneken, Felix

    2014-09-02

    When enforcing norms for cooperative behavior, human adults sometimes exhibit in-group bias. For example, third-party observers punish selfish behaviors committed by out-group members more harshly than similar behaviors committed by in-group members. Although evidence suggests that children begin to systematically punish selfish behavior around the age of 6 y, the development of in-group bias in their punishment remains unknown. Do children start off enforcing fairness norms impartially, or is norm enforcement biased from its emergence? How does bias change over development? Here, we created novel social groups in the laboratory and gave 6- and 8-year-olds the opportunity to engage in costly third-party punishment of selfish sharing behavior. We found that by age 6, punishment was already biased: Selfish resource allocations received more punishment when they were proposed by out-group members and when they disadvantaged in-group members. We also found that although costly punishment increased between ages 6 and 8, bias in punishment partially decreased. Although 8-y-olds also punished selfish out-group members more harshly, they were equally likely to punish on behalf of disadvantaged in-group and out-group members, perhaps reflecting efforts to enforce norms impartially. Taken together, our results suggest that norm enforcement is biased from its emergence, but that this bias can be partially overcome through developmental change.

  8. Effect of lie labelling on children's evaluation of selfish, polite, and altruistic lies.

    Science.gov (United States)

    Cheung, Him; Chan, Yawen; Tsui, Wan Chi Gigi

    2016-09-01

    This study investigates how 5- and 6-year-olds' evaluations of selfish, polite, and altruistic lies change as a result of whether these false statements are explicitly labelled as lies. We are also interested in how interpretive theory of mind may correlate with such evaluations with and without a lie label. Our results showed that labelling lowered children's evaluations for the polite and altruistic lies, but not for the selfish lies. Interpretive theory of mind correlated positively with the evaluation difference between the polite and altruistic lies and that between the selfish and altruistic lies in the label, but not in the non-label condition. Correlation between the selfish and altruistic lies and that between the polite and altruistic lies were stronger with than without labelling, after controlling for age, and verbal and non-verbal intelligence. We conclude that lie labelling biases children towards more negative evaluations for non-selfish lies and makes them see lies of different motives as more similar. If a lie label is applied, whether lies of different motives are still evaluated differently depends on interpretive theory of mind, which reflects the child's ability to represent and allow different interpretations of an ambiguous reality. © 2016 The British Psychological Society.

  9. Handbook on theoretical and algorithmic aspects of sensor, ad hoc wireless, and peer-to-peer networks

    CERN Document Server

    Wu, Jie

    2005-01-01

    PrefaceAD HOC WIRELESS NETWORKSA Modular Cross Layer Architecture for Ad Hoc Networks, M. Conti, J. Crowcroft, G. Maselli, and G. TuriRouting Scalability in MANETs, J. Eriksson, S. Krishnamurthy and M. FaloutsosUniformly Distributed Algorithm for Virtual Backbone Routing in Ad Hoc Wireless Networks, D.S. KimMaximum Necessary Hop Count for Packet Routing in MANET, X. Chen and J. ShenEfficient Strategyproof Multicast in Selfish Wireless Networks, X.-Yang LiGeocasting in Ad Hoc and Sensor Networks, I. StojmenovicTopology Control for Ad hoc Networks: Present Solutions and Open Issues, C.-C. Shen a

  10. Efficient Detection Of Selfish Node In Manet Using A Colloborative Watchdog

    OpenAIRE

    S.Lavanyak.Pavithra; P.Prema

    2016-01-01

    Mobile ad-hoc networks(MANET) are collected many number of nodes.In a mobile ad-hoc network(MANET) undertakes that all the mobile nodes unitewillingly in order to work accurately.This is a cost –intensive action for the collaboration and particular nodes can decline to cooperate then it will prominent to a selfish node behaviour.Thus, it will utterly affect the global network performance.The watchdogs are a well-known device used for identifying a selfish node.Theprocedure perform...

  11. Hop limited epidemic-like information spreading in mobile social networks with selfish nodes

    International Nuclear Information System (INIS)

    Wu, Yahui; Deng, Su; Huang, Hongbin

    2013-01-01

    Similar to epidemics, information can be transmitted directly among users in mobile social networks. Different from epidemics, we can control the spreading process by adjusting the corresponding parameters (e.g., hop count) directly. This paper proposes a theoretical model to evaluate the performance of an epidemic-like spreading algorithm, in which the maximal hop count of the information is limited. In addition, our model can be used to evaluate the impact of users’ selfish behavior. Simulations show the accuracy of our theoretical model. Numerical results show that the information hop count can have an important impact. In addition, the impact of selfish behavior is related to the information hop count. (paper)

  12. Popular science - common ground. A literary critique of Richard Dawkins's The Selfish Gene

    OpenAIRE

    Nilsen, Helene

    2012-01-01

    This thesis aims to perform a literary reading of Richard Dawkins's The Selfish Gene from a perspective situated outside of the 'battle of the two cultures'. Chapter 1 takes Foucault's article What is an author?" as its point of departure. After discussing how Dawkins may be seen as a reader of Darwin, I will go on to discuss Foucault's concept of the author-function, before I move on to consider some different readings of and approaches to The Selfish Gene. With reference to a polemic bet...

  13. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  14. Selfish strategies and honest signalling: reproductive conflicts in ant queen associations

    DEFF Research Database (Denmark)

    Holman, Luke; Dreier, Stephanie; d'Ettorre, Patrizia

    2010-01-01

    . Here, we use a brood transfer experiment to test whether cofounding queens of the ant Lasius niger 'selfishly' adjust their productivity when sharing the nest with future competitors. We simultaneously analysed queen cuticular hydrocarbon (CHC) profiles to investigate whether queens honestly signal...

  15. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  16. A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Anwar Khan

    2018-01-01

    Full Text Available Interference and energy holes formation in underwater wireless sensor networks (UWSNs threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay.

  17. A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Khan, Anwar; Ahmedy, Ismail; Anisi, Mohammad Hossein; Javaid, Nadeem; Ali, Ihsan; Khan, Nawsher; Alsaqer, Mohammed; Mahmood, Hasan

    2018-01-09

    Interference and energy holes formation in underwater wireless sensor networks (UWSNs) threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM) routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay.

  18. Selfish memes: An update of Richard Dawkins’ bibliometric analysis of key papers in sociobiology

    OpenAIRE

    Aaen-Stockdale, Craig

    2017-01-01

    This is an Open Access journal available from http://www.mdpi.com/ In the second edition of The Selfish Gene, Richard Dawkins included a short bibliometric analysis of key papers instrumental to the sociobiological revolution, the intention of which was to support his proposal that ideas spread within a population in an epidemiological manner. In his analysis, Dawkins primarily discussed the influence of an article by British evolutionary biologist William Donald Hamilton which had introdu...

  19. A global optimization algorithm inspired in the behavior of selfish herds.

    Science.gov (United States)

    Fausto, Fernando; Cuevas, Erik; Valdivia, Arturo; González, Adrián

    2017-10-01

    In this paper, a novel swarm optimization algorithm called the Selfish Herd Optimizer (SHO) is proposed for solving global optimization problems. SHO is based on the simulation of the widely observed selfish herd behavior manifested by individuals within a herd of animals subjected to some form of predation risk. In SHO, individuals emulate the predatory interactions between groups of prey and predators by two types of search agents: the members of a selfish herd (the prey) and a pack of hungry predators. Depending on their classification as either a prey or a predator, each individual is conducted by a set of unique evolutionary operators inspired by such prey-predator relationship. These unique traits allow SHO to improve the balance between exploration and exploitation without altering the population size. To illustrate the proficiency and robustness of the proposed method, it is compared to other well-known evolutionary optimization approaches such as Particle Swarm Optimization (PSO), Artificial Bee Colony (ABC), Firefly Algorithm (FA), Differential Evolution (DE), Genetic Algorithms (GA), Crow Search Algorithm (CSA), Dragonfly Algorithm (DA), Moth-flame Optimization Algorithm (MOA) and Sine Cosine Algorithm (SCA). The comparison examines several standard benchmark functions, commonly considered within the literature of evolutionary algorithms. The experimental results show the remarkable performance of our proposed approach against those of the other compared methods, and as such SHO is proven to be an excellent alternative to solve global optimization problems. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. A Routing Strategy for Non-Cooperation Wireless Multi-Hop Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dung T. Tran

    2012-01-01

    Full Text Available Choosing routes such that the network lifetime is maximized in a wireless network with limited energy resources is a major routing problem in wireless multi-hop ad hoc networks. In this paper, we study the problem where participants are rationally selfish and non-cooperative. By selfish we designate the users who are ready to tamper with their source-routing (senders could choose intermediate nodes in the routing paths or next hop selection strategies in order to increase the total number of packets transmitted, but do not try to harm or drop packets of the other nodes. The problem therefore amounts to a non-cooperative game. In the works [2,6,19,23], the authors show that the game admits Nash equilibria [1]. Along this line, we first show that if the cost function is linear, this game has pure-strategy equilibrium flow even though participants have different demands. However, finding a Nash equilibrium for a normal game is computationally hard [9]. In this work, inspired by mixed-strategy equilibrium, we propose a simple local routing algorithm called MIxed Path Routing protocol (MiPR. Using analysis and simulations, we show that MiPR drives the system to an equilibrium state where selfish participants do not have incentive to deviate. Moreover, MiPR significantly improves the network lifetime as compared to original routing protocols.

  1. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

    Directory of Open Access Journals (Sweden)

    Mohamed S. Abdalzaher

    2016-06-01

    Full Text Available We present a study of using game theory for protecting wireless sensor networks (WSNs from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  2. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.

    Science.gov (United States)

    Abdalzaher, Mohamed S; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel

    2016-06-29

    We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  3. Virus world as an evolutionary network of viruses and capsidless selfish elements.

    Science.gov (United States)

    Koonin, Eugene V; Dolja, Valerian V

    2014-06-01

    Viruses were defined as one of the two principal types of organisms in the biosphere, namely, as capsid-encoding organisms in contrast to ribosome-encoding organisms, i.e., all cellular life forms. Structurally similar, apparently homologous capsids are present in a huge variety of icosahedral viruses that infect bacteria, archaea, and eukaryotes. These findings prompted the concept of the capsid as the virus "self" that defines the identity of deep, ancient viral lineages. However, several other widespread viral "hallmark genes" encode key components of the viral replication apparatus (such as polymerases and helicases) and combine with different capsid proteins, given the inherently modular character of viral evolution. Furthermore, diverse, widespread, capsidless selfish genetic elements, such as plasmids and various types of transposons, share hallmark genes with viruses. Viruses appear to have evolved from capsidless selfish elements, and vice versa, on multiple occasions during evolution. At the earliest, precellular stage of life's evolution, capsidless genetic parasites most likely emerged first and subsequently gave rise to different classes of viruses. In this review, we develop the concept of a greater virus world which forms an evolutionary network that is held together by shared conserved genes and includes both bona fide capsid-encoding viruses and different classes of capsidless replicons. Theoretical studies indicate that selfish replicons (genetic parasites) inevitably emerge in any sufficiently complex evolving ensemble of replicators. Therefore, the key signature of the greater virus world is not the presence of a capsid but rather genetic, informational parasitism itself, i.e., various degrees of reliance on the information processing systems of the host. Copyright © 2014, American Society for Microbiology. All Rights Reserved.

  4. The effect of amount and tangibility of endowment and certainty of recipients on selfishness in a modified dictator game.

    Science.gov (United States)

    Chang, Shao-Chuan; Lin, Li-Yun; Horng, Ruey-Yun; Wang, Yau-De

    2014-06-01

    Taiwanese college students (N = 101) participated in the study to examine the effects of the amount of an endowment, the tangibility of an endowment, and the certainty of the recipient on selfishness in a modified dictator game. Results showed that dictators were more selfish when allocating tangible (money) than less tangible (honor credits) endowments. Selfishness was higher when large amounts of money were involved. The certainty of the recipient was manipulated by whether the recipient was chosen and announced before or after the decision. Unexpectedly, participants were more self-interested in the certain-recipient condition than in the uncertain-recipient condition. In the honor condition, the amount of an endowment and the certainty of the recipient did not affect participants' allocations.

  5. Social class, power, and selfishness: when and why upper and lower class individuals behave unethically.

    Science.gov (United States)

    Dubois, David; Rucker, Derek D; Galinsky, Adam D

    2015-03-01

    Are the rich more unethical than the poor? To answer this question, the current research introduces a key conceptual distinction between selfish and unethical behavior. Based on this distinction, the current article offers 2 novel findings that illuminate the relationship between social class and unethical behavior. First, the effects of social class on unethical behavior are not invariant; rather, the effects of social class are moderated by whether unethical behavior benefits the self or others. Replicating past work, social class positively predicted unethical behavior; however, this relationship was only observed when that behavior was self-beneficial. When unethical behavior was performed to benefit others, social class negatively predicted unethical behavior; lower class individuals were more likely than upper class individuals to engage in unethical behavior. Overall, social class predicts people's tendency to behave selfishly, rather than predicting unethical behavior per se. Second, individuals' sense of power drove the effects of social class on unethical behavior. Evidence for this relationship was provided in three forms. First, income, but not education level, predicted unethical behavior. Second, feelings of power mediated the effect of social class on unethical behavior, but feelings of status did not. Third, two distinct manipulations of power produced the same moderation by self-versus-other beneficiary as was found with social class. The current theoretical framework and data both synthesize and help to explain a range of findings in the social class and power literatures. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  6. Are maternal mitochondria the selfish entities that are masters of the cells of eukaryotic multicellular organisms?

    Science.gov (United States)

    Barlow, Peter W; Baldelli, E; Baluška, Frantisek

    2009-01-01

    The Energide concept, as well as the endosymbiotic theory of eukaryotic cell organization and evolution, proposes that present-day cells of eukaryotic organisms are mosaics of specialized and cooperating units, or organelles. Some of these units were originally free-living prokaryotes, which were engulfed during evolutionary time. Mitochondria represent one of these types of previously independent organisms, the Energide, is another type. This new perspective on the organization of the cell has been further expanded to reveal the concept of a public milieu, the cytosol, in which Energides and mitochondria live, each with their own private internal milieu. The present paper discusses how the endosymbiotic theory implicates a new hypothesis about the hierarchical and communicational organization of the integrated prokaryotic components of the eukaryotic cell and provides a new angle from which to consider the theory of evolution and its bearing upon cellular complexity. Thus, it is proposed that the “selfish gene” hypothesis of Dawkins1 is not the only possible perspective for comprehending genomic and cellular evolution. Our proposal is that maternal mitochondria are the selfish “master” entities of the eukaryotic cell with respect not only to their propagation from cell-to-cell and from generation-to-generation but also to their regulation of all other cellular functions. However, it should be recognized that the concept of “master” and “servant” cell components is a metaphor; in present-day living organisms their organellar components are considered to be interdependent and inseparable. PMID:19513277

  7. Dogs’ recognition of human selfish and generous attitudes requires little but critical experience with people

    Science.gov (United States)

    Freidin, Esteban; Casanave, Emma B.

    2017-01-01

    There is some dispute regarding the role of experience in the development of dogs´ socio-cognitive abilities in their interaction with people. We sought to provide new evidence to this debate by comparing dogs with contrasting levels of experience with humans, in a task involving the discrimination of human generous and selfish attitudes. To this end, we compared the performance of adult family dogs against that of adult shelter dogs and puppies living in people´s homes. In training trials, the generous experimenter (G) signaled the bowl with food and allowed the dog to eat, whereas the selfish experimenter (S) also signaled the baited bowl, but she/he ate the food before the dog could have access to it. Then, subjects were allowed to freely choose between G and S in the choice test. The main finding was that adult subjects (both family and shelter dogs) developed a preference for G over S, but puppies did not. We conclude that the quality and/or quantity of everyday-contact with people did not affect the discrimination of human attitudes in the present protocol, but the amount of experience with people (in years) did matter. Finally, we discuss the relative role of domestication and ontogeny in the development of dogs´ socio-cognitive abilities. PMID:29045426

  8. SPRINT-SELF: Social-Based Routing and Selfish Node Detection in Opportunistic Networks

    Directory of Open Access Journals (Sweden)

    Radu Ioan Ciobanu

    2015-01-01

    Full Text Available Since mobile devices nowadays have become ubiquitous, several types of networks formed over such devices have been proposed. One such approach is represented by opportunistic networking, which is based on a store-carry-and-forward paradigm, where nodes store data and carry it until they reach a suitable node for forwarding. The problem in such networks is how to decide what the next hop will be, since nodes do not have a global view of the network. We propose using the social network information of a node when performing routing, since a node is more likely to encounter members of its own social community than other nodes. In addition, we approximate a node’s contact as a Poisson distribution and show that we can predict its future behavior based on the contact history. Furthermore, since opportunistic network nodes may be selfish, we improve our solution by adding a selfish node detection and avoidance mechanism, which can help reduce the number of unnecessary messages sent in the network, and thus avoid congestion and decrease battery consumption. We show that our algorithm outperforms existing solutions such as BUBBLE Rap and Epidemic in terms of delivery cost and hit rate, as well as the rate of congestion introduced in the network, by testing in various realistic scenarios.

  9. Oxytocin modulates third-party sanctioning of selfish and generous behavior within and between groups.

    Science.gov (United States)

    Daughters, Katie; Manstead, Antony S R; Ten Velden, Femke S; De Dreu, Carsten K W

    2017-03-01

    Human groups function because members trust each other and reciprocate cooperative contributions, and reward others' cooperation and punish their non-cooperation. Here we examined the possibility that such third-party punishment and reward of others' trust and reciprocation is modulated by oxytocin, a neuropeptide generally involved in social bonding and in-group (but not out-group) serving behavior. Healthy males and females (N=100) self-administered a placebo or 24 IU of oxytocin in a randomized, double-blind, between-subjects design. Participants were asked to indicate (incentivized, costly) their level of reward or punishment for in-group (outgroup) investors donating generously or fairly to in-group (outgroup) trustees, who back-transferred generously, fairly or selfishly. Punishment (reward) was higher for selfish (generous) investments and back-transfers when (i) investors were in-group rather than outgroup, and (ii) trustees were in-group rather than outgroup, especially when (iii) participants received oxytocin rather than placebo. It follows, first, that oxytocin leads individuals to ignore out-groups as long as out-group behavior is not relevant to the in-group and, second, that oxytocin contributes to creating and enforcing in-group norms of cooperation and trust. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  11. Selfish little circles: transmission bias and evolution of large deletion-bearing mitochondrial DNA in Caenorhabditis briggsae nematodes.

    Directory of Open Access Journals (Sweden)

    Katie A Clark

    Full Text Available Selfish DNA poses a significant challenge to genome stability and organismal fitness in diverse eukaryotic lineages. Although selfish mitochondrial DNA (mtDNA has known associations with cytoplasmic male sterility in numerous gynodioecious plant species and is manifested as petite mutants in experimental yeast lab populations, examples of selfish mtDNA in animals are less common. We analyzed the inheritance and evolution of mitochondrial DNA bearing large heteroplasmic deletions including nad5 gene sequences (nad5Δ mtDNA, in the nematode Caenorhabditis briggsae. The deletion is widespread in C. briggsae natural populations and is associated with deleterious organismal effects. We studied the inheritance patterns of nad5Δ mtDNA using eight sets of C. briggsae mutation-accumulation (MA lines, each initiated from a different natural strain progenitor and bottlenecked as single hermaphrodites across generations. We observed a consistent and strong drive toward higher levels of deletion-bearing molecules in the heteroplasmic pool of mtDNA after ten generations of bottlenecking. Our results demonstrate a uniform transmission bias whereby nad5Δ mtDNA accumulates to higher levels relative to intact mtDNA in multiple genetically diverse natural strains of C. briggsae. We calculated an average 1% per-generation transmission bias for deletion-bearing mtDNA relative to intact genomes. Our study, coupled with known deleterious phenotypes associated with high deletion levels, shows that nad5Δ mtDNA are selfish genetic elements that have evolved in natural populations of C. briggsae, offering a powerful new system to study selfish mtDNA dynamics in metazoans.

  12. Selfish play increases during high-stakes NBA games and is rewarded with more lucrative contracts.

    Science.gov (United States)

    Uhlmann, Eric Luis; Barnes, Christopher M

    2014-01-01

    High-stakes team competitions can present a social dilemma in which participants must choose between concentrating on their personal performance and assisting teammates as a means of achieving group objectives. We find that despite the seemingly strong group incentive to win the NBA title, cooperative play actually diminishes during playoff games, negatively affecting team performance. Thus team cooperation decreases in the very high stakes contexts in which it is most important to perform well together. Highlighting the mixed incentives that underlie selfish play, personal scoring is rewarded with more lucrative future contracts, whereas assisting teammates to score is associated with reduced pay due to lost opportunities for personal scoring. A combination of misaligned incentives and psychological biases in performance evaluation bring out the "I" in "team" when cooperation is most critical.

  13. Selfish play increases during high-stakes NBA games and is rewarded with more lucrative contracts.

    Directory of Open Access Journals (Sweden)

    Eric Luis Uhlmann

    Full Text Available High-stakes team competitions can present a social dilemma in which participants must choose between concentrating on their personal performance and assisting teammates as a means of achieving group objectives. We find that despite the seemingly strong group incentive to win the NBA title, cooperative play actually diminishes during playoff games, negatively affecting team performance. Thus team cooperation decreases in the very high stakes contexts in which it is most important to perform well together. Highlighting the mixed incentives that underlie selfish play, personal scoring is rewarded with more lucrative future contracts, whereas assisting teammates to score is associated with reduced pay due to lost opportunities for personal scoring. A combination of misaligned incentives and psychological biases in performance evaluation bring out the "I" in "team" when cooperation is most critical.

  14. Selfish Play Increases during High-Stakes NBA Games and Is Rewarded with More Lucrative Contracts

    Science.gov (United States)

    Uhlmann, Eric Luis; Barnes, Christopher M.

    2014-01-01

    High-stakes team competitions can present a social dilemma in which participants must choose between concentrating on their personal performance and assisting teammates as a means of achieving group objectives. We find that despite the seemingly strong group incentive to win the NBA title, cooperative play actually diminishes during playoff games, negatively affecting team performance. Thus team cooperation decreases in the very high stakes contexts in which it is most important to perform well together. Highlighting the mixed incentives that underlie selfish play, personal scoring is rewarded with more lucrative future contracts, whereas assisting teammates to score is associated with reduced pay due to lost opportunities for personal scoring. A combination of misaligned incentives and psychological biases in performance evaluation bring out the “I” in “team” when cooperation is most critical. PMID:24763384

  15. Selfish spermatogonial selection: evidence from an immunohistochemical screen in testes of elderly men.

    Directory of Open Access Journals (Sweden)

    Jasmine Lim

    Full Text Available The dominant congenital disorders Apert syndrome, achondroplasia and multiple endocrine neoplasia-caused by specific missense mutations in the FGFR2, FGFR3 and RET proteins respectively-represent classical examples of paternal age-effect mutation, a class that arises at particularly high frequencies in the sperm of older men. Previous analyses of DNA from randomly selected cadaveric testes showed that the levels of the corresponding FGFR2, FGFR3 and RET mutations exhibit very uneven spatial distributions, with localised hotspots surrounded by large mutation-negative areas. These studies imply that normal testes are mosaic for clusters of mutant cells: these clusters are predicted to have altered growth and signalling properties leading to their clonal expansion (selfish spermatogonial selection, but DNA extraction eliminates the possibility to study such processes at a tissue level. Using a panel of antibodies optimised for the detection of spermatocytic seminoma, a rare tumour of spermatogonial origin, we demonstrate that putative clonal events are frequent within normal testes of elderly men (mean age: 73.3 yrs and can be classed into two broad categories. We found numerous small (less than 200 cells cellular aggregations with distinct immunohistochemical characteristics, localised to a portion of the seminiferous tubule, which are of uncertain significance. However more infrequently we identified additional regions where entire seminiferous tubules had a circumferentially altered immunohistochemical appearance that extended through multiple serial sections that were physically contiguous (up to 1 mm in length, and exhibited enhanced staining for antibodies both to FGFR3 and a marker of downstream signal activation, pAKT. These findings support the concept that populations of spermatogonia in individual seminiferous tubules in the testes of older men are clonal mosaics with regard to their signalling properties and activation, thus fulfilling

  16. Selfish spermatogonial selection: evidence from an immunohistochemical screen in testes of elderly men.

    Science.gov (United States)

    Lim, Jasmine; Maher, Geoffrey J; Turner, Gareth D H; Dudka-Ruszkowska, Wioleta; Taylor, Stephen; Rajpert-De Meyts, Ewa; Goriely, Anne; Wilkie, Andrew O M

    2012-01-01

    The dominant congenital disorders Apert syndrome, achondroplasia and multiple endocrine neoplasia-caused by specific missense mutations in the FGFR2, FGFR3 and RET proteins respectively-represent classical examples of paternal age-effect mutation, a class that arises at particularly high frequencies in the sperm of older men. Previous analyses of DNA from randomly selected cadaveric testes showed that the levels of the corresponding FGFR2, FGFR3 and RET mutations exhibit very uneven spatial distributions, with localised hotspots surrounded by large mutation-negative areas. These studies imply that normal testes are mosaic for clusters of mutant cells: these clusters are predicted to have altered growth and signalling properties leading to their clonal expansion (selfish spermatogonial selection), but DNA extraction eliminates the possibility to study such processes at a tissue level. Using a panel of antibodies optimised for the detection of spermatocytic seminoma, a rare tumour of spermatogonial origin, we demonstrate that putative clonal events are frequent within normal testes of elderly men (mean age: 73.3 yrs) and can be classed into two broad categories. We found numerous small (less than 200 cells) cellular aggregations with distinct immunohistochemical characteristics, localised to a portion of the seminiferous tubule, which are of uncertain significance. However more infrequently we identified additional regions where entire seminiferous tubules had a circumferentially altered immunohistochemical appearance that extended through multiple serial sections that were physically contiguous (up to 1 mm in length), and exhibited enhanced staining for antibodies both to FGFR3 and a marker of downstream signal activation, pAKT. These findings support the concept that populations of spermatogonia in individual seminiferous tubules in the testes of older men are clonal mosaics with regard to their signalling properties and activation, thus fulfilling one of the

  17. A Wireless Sensor Enabled by Wireless Power

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-01-01

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network. PMID:23443370

  18. A Wireless Sensor Enabled by Wireless Power

    Directory of Open Access Journals (Sweden)

    Da-Sheng Lee

    2012-11-01

    Full Text Available Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  19. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  20. Application of Game Theory Approaches in Routing Protocols for Wireless Networks

    Science.gov (United States)

    Javidi, Mohammad M.; Aliahmadipour, Laya

    2011-09-01

    An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.

  1. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Many wireless technologies are already available for sensor applications. It is inevitable that many non-interoperable wireless technologies between 400 MHz and 5.8...

  2. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  3. Selfish punishment with avoiding mechanism can alleviate both first-order and second-order social dilemma.

    Science.gov (United States)

    Cui, Pengbi; Wu, Zhi-Xi

    2014-11-21

    Punishment, especially selfish punishment, has recently been identified as a potent promoter in sustaining or even enhancing the cooperation among unrelated individuals. However, without other key mechanisms, the first-order social dilemma and second-order social dilemma are still two enduring conundrums in biology and the social sciences even with the presence of punishment. In the present study, we investigate a spatial evolutionary four-strategy prisoner׳s dilemma game model with avoiding mechanism, where the four strategies are cooperation, defection, altruistic and selfish punishment. By introducing the low level of random mutation of strategies, we demonstrate that the presence of selfish punishment with avoiding mechanism can alleviate the two kinds of social dilemmas for various parametrizations. In addition, we propose an extended pair approximation method, whose solutions can essentially estimate the dynamical behaviors and final evolutionary frequencies of the four strategies. At last, considering the analogy between our model and the classical Lotka-Volterra system, we introduce interaction webs based on the spatial replicator dynamics and the transformed payoff matrix to qualitatively characterize the emergent co-exist strategy phases, and its validity are supported by extensive simulations. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  5. Chimpanzee social intelligence: selfishness, altruism, and the mother-infant bond.

    Science.gov (United States)

    Hirata, Satoshi

    2009-01-01

    To better understand the human mind from an evolutionary perspective, a great deal of research has focused on the closest living relative of humans, the chimpanzee, using various approaches, including studies of social intelligence. Here, I review recent research related to several aspects of social intelligence, including deception, understanding of perception and intention, social learning, trading, cooperation, and regard for others. Many studies have demonstrated that chimpanzees are proficient in using their social intelligence for selfish motives to benefit from their interactions with others. In contrast, it is not yet clear whether chimpanzees engage in prosocial behaviors that benefit others; however, chimpanzee mother-infant interactions indicate the possibility of such behaviors. Therefore, I propose that chimpanzees possess rudimentary traits of human mental competence not only in terms of theory of mind in a broader sense but also in terms of prosociality involving regard for others. Mother-infant interactions appear to be particularly important to understanding the manifestation of social intelligence from an evolutionary perspective.

  6. Detrimental effects of an autosomal selfish genetic element on sperm competitiveness in house mice.

    Science.gov (United States)

    Sutter, Andreas; Lindholm, Anna K

    2015-07-22

    Female multiple mating (polyandry) is widespread across many animal taxa and indirect genetic benefits are a major evolutionary force favouring polyandry. An incentive for polyandry arises when multiple mating leads to sperm competition that disadvantages sperm from genetically inferior mates. A reduction in genetic quality is associated with costly selfish genetic elements (SGEs), and studies in invertebrates have shown that males bearing sex ratio distorting SGEs are worse sperm competitors than wild-type males.We used a vertebrate model species to test whether females can avoid an autosomal SGE, the t haplotype, through polyandry. The t haplotype inhouse mice exhibits strong drive in t heterozygous males by affecting spermatogenesis and is associated with homozygous in utero lethality. We used controlled matings to test the effect of the t haplotype on sperm competitiveness. Regardless of mating order, t heterozygous males sired only 11% of zygotes when competing against wild-type males, suggesting a very strong effect of the t haplotype on sperm quality. We provide, to our knowledge,the first substantial evidence that polyandry ameliorates the harmful effects of an autosomal SGE arising through genetic incompatibility. We discuss potential mechanisms in our study species and the broader implications for the benefits of polyandry.

  7. Assessing the Computational Potential of the Eschaton - Testing the Selfish Biocosm Hypothesis

    Science.gov (United States)

    Gardner, J. N.

    The Selfish Biocosm (SB) hypothesis asserts that the anthropic qualities which our universe exhibits can be explained as incidental consequences of a cosmic replication cycle in which a cosmologically extended bio- sphere supplies two of the essential elements of self-replication identified by von Neumann. It was previously suggested that the hypothesis implies (1) that the emergence of life and intelligence are key epigenetic thresholds in the cosmic replication cycle, strongly favored by the physical laws and constants which prevail in our particular universe and (2) that a falsifiable implication of the hypothesis is that the emergence of increas- ingly intelligent life is a robust phenomenon, strongly favored by the natural processes of evolution which result from the interplay of those laws and constants. Here I propose a further falsifiable implication of the SB hypothesis: that there exists a plausible final state of the cosmos which exhibits maximal computational potential. This predicted final state--the Omega Point or eschaton--appears to be not inconsistent with Lloyd's description of the ultimate computational device: a computer as powerful as the laws of physics will allow.

  8. The physical constants as biosignature: an anthropic retrodiction of the Selfish Biocosm Hypothesis

    Science.gov (United States)

    Gardner, James N.

    2004-07-01

    Goal 7 of the NASA Astrobiology Roadmap states: "Determine how to recognize signatures of life on other worlds and on early Earth. Identify biosignatures that can reveal and characterize past or present life in ancient samples from Earth, extraterrestrial samples measured in situ, samples returned to Earth, remotely measured planetary atmospheres and surfaces, and other cosmic phenomena." The cryptic reference to "other cosmic phenomena" would appear to be broad enough to include the possible identification of biosignatures embedded in the dimensionless constants of physics. The existence of such a set of biosignatures - a life-friendly suite of physical constants - is a retrodiction of the Selfish Biocosm (SB) hypothesis. This hypothesis offers an alternative to the weak anthropic explanation of our indisputably life-friendly cosmos favoured by (1) an emerging alliance of M-theory-inspired cosmologists and advocates of eternal inflation like Linde and Weinberg, and (2) supporters of the quantum theory-inspired sum-over-histories cosmological model offered by Hartle and Hawking. According to the SB hypothesis, the laws and constants of physics function as the cosmic equivalent of DNA, guiding a cosmologically extended evolutionary process and providing a blueprint for the replication of new life-friendly progeny universes.

  9. Wireless physical layer security

    OpenAIRE

    Poor, H. Vincent; Schaefer, Rafael F.

    2016-01-01

    Security is a very important issue in the design and use of wireless networks. Traditional methods of providing security in such networks are impractical for some emerging types of wireless networks due to the light computational abilities of some wireless devices [such as radio-frequency identification (RFID) tags, certain sensors, etc.] or to the very large scale or loose organizational structure of some networks. Physical layer security has the potential to address these concerns by taking...

  10. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  11. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  12. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  13. Dog's discrimination of human selfish and generous attitudes: the role of individual recognition, experience, and experimenters' gender.

    Directory of Open Access Journals (Sweden)

    Fabricio Carballo

    Full Text Available Discrimination of and memory for others' generous and selfish behaviors could be adaptive abilities in social animals. Dogs have seemingly expressed such skills in both direct and indirect interactions with humans. However, recent studies suggest that their capacity may rely on cues other than people's individual characteristics, such as the place where the person stands. Thus, the conditions under which dogs recognize individual humans when solving cooperative tasks still remains unclear. With the aim of contributing to this problem, we made dogs interact with two human experimenters, one generous (pointed towards the food, gave ostensive cues, and allowed the dog to eat it and the other selfish (pointed towards the food, but ate it before the dog could have it. Then subjects could choose between them (studies 1-3. In study 1, dogs took several training trials to learn the discrimination between the generous and the selfish experimenters when both were of the same gender. In study 2, the discrimination was learned faster when the experimenters were of different gender as evidenced both by dogs' latencies to approach the bowl in training trials as well as by their choices in preference tests. Nevertheless, dogs did not get confused by gender when the experimenters were changed in between the training and the choice phase in study 3. We conclude that dogs spontaneously used human gender as a cue to discriminate between more and less cooperative experimenters. They also relied on some other personal feature which let them avoid being confused by gender when demonstrators were changed. We discuss these results in terms of dogs' ability to recognize individuals and the potential advantage of this skill for their lives in human environments.

  14. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  15. Origin, evolution, and population genetics of the selfish Segregation Distorter gene duplication in European and African populations of Drosophila melanogaster.

    Science.gov (United States)

    Brand, Cara L; Larracuente, Amanda M; Presgraves, Daven C

    2015-05-01

    Meiotic drive elements are a special class of evolutionarily "selfish genes" that subvert Mendelian segregation to gain preferential transmission at the expense of homologous loci. Many drive elements appear to be maintained in populations as stable polymorphisms, their equilibrium frequencies determined by the balance between drive (increasing frequency) and selection (decreasing frequency). Here we show that a classic, seemingly balanced, drive system is instead characterized by frequent evolutionary turnover giving rise to dynamic, rather than stable, equilibrium frequencies. The autosomal Segregation Distorter (SD) system of the fruit fly Drosophila melanogaster is a selfish coadapted meiotic drive gene complex in which the major driver corresponds to a partial duplication of the gene Ran-GTPase activating protein (RanGAP). SD chromosomes segregate at similar, low frequencies of 1-5% in natural populations worldwide, consistent with a balanced polymorphism. Surprisingly, our population genetic analyses reveal evidence for parallel, independent selective sweeps of different SD chromosomes in populations on different continents. These findings suggest that, rather than persisting at a single stable equilibrium, SD chromosomes turn over frequently within populations. © 2015 The Author(s). Evolution published by Wiley Periodicals, Inc. on behalf of The Society for the Study of Evolution.

  16. Contributions of intrinsic mutation rate and selfish selection to levels of de novo HRAS mutations in the paternal germline.

    Science.gov (United States)

    Giannoulatou, Eleni; McVean, Gilean; Taylor, Indira B; McGowan, Simon J; Maher, Geoffrey J; Iqbal, Zamin; Pfeifer, Susanne P; Turner, Isaac; Burkitt Wright, Emma M M; Shorto, Jennifer; Itani, Aysha; Turner, Karen; Gregory, Lorna; Buck, David; Rajpert-De Meyts, Ewa; Looijenga, Leendert H J; Kerr, Bronwyn; Wilkie, Andrew O M; Goriely, Anne

    2013-12-10

    The RAS proto-oncogene Harvey rat sarcoma viral oncogene homolog (HRAS) encodes a small GTPase that transduces signals from cell surface receptors to intracellular effectors to control cellular behavior. Although somatic HRAS mutations have been described in many cancers, germline mutations cause Costello syndrome (CS), a congenital disorder associated with predisposition to malignancy. Based on the epidemiology of CS and the occurrence of HRAS mutations in spermatocytic seminoma, we proposed that activating HRAS mutations become enriched in sperm through a process akin to tumorigenesis, termed selfish spermatogonial selection. To test this hypothesis, we quantified the levels, in blood and sperm samples, of HRAS mutations at the p.G12 codon and compared the results to changes at the p.A11 codon, at which activating mutations do not occur. The data strongly support the role of selection in determining HRAS mutation levels in sperm, and hence the occurrence of CS, but we also found differences from the mutation pattern in tumorigenesis. First, the relative prevalence of mutations in sperm correlates weakly with their in vitro activating properties and occurrence in cancers. Second, specific tandem base substitutions (predominantly GC>TT/AA) occur in sperm but not in cancers; genomewide analysis showed that this same mutation is also overrepresented in constitutional pathogenic and polymorphic variants, suggesting a heightened vulnerability to these mutations in the germline. We developed a statistical model to show how both intrinsic mutation rate and selfish selection contribute to the mutational burden borne by the paternal germline.

  17. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  18. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  19. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  20. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  1. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  2. Optical and wireless technologies

    CERN Document Server

    Tiwari, Manish; Singh, Ghanshyam; Minzioni, Paolo

    2018-01-01

    This book presents selected papers from 1st International Conference on Optical and Wireless Technologies, providing insights into the analytical, experimental, and developmental aspects of systems, techniques, and devices in these spheres. It explores the combined use of various optical and wireless technologies in next-generation networking applications, and discusses the latest developments in applications such as photonics, high-speed communication systems and networks, visible light communication, nanophotonics, and wireless and multiple-input-multiple-output (MIMO) systems. The book will serve as a valuable reference resource for academics and researchers across the globe.

  3. Wireless capsule endoscopy

    Science.gov (United States)

    Iddan, Gavriel; Meron, Gavriel; Glukhovsky, Arkady; Swain, Paul

    2000-05-01

    We have developed a new type of endoscopy, which for the first time allows painless endoscopic imaging of the whole of the small bowel. This procedure involves a wireless capsule endoscope and we describe here its successful testing in humans.

  4. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  5. Wireless radio a history

    CERN Document Server

    Coe, Lewis

    2006-01-01

    ""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.

  6. Wireless Networks Security

    OpenAIRE

    Jenko, Marko

    2016-01-01

    In this thesis we deal with security, penetration testing and different types of attacks on wireless networks. We theoretically familiarize with the field of wireless networks, security mechanisms and the most used security standards. Then we systematically overview the field of penetration testing. We divide the penetration testing on types and different methodologies. We explain the tasks of the provider and the subscriber in penetration testing. Description of the process of conducting the...

  7. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  8. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  9. EXPERIMENTAL PERFORMANCE ANALYSIS OF WIRELESS ...

    African Journals Online (AJOL)

    ABSTRACT. Wireless networking is currently being deployed for various applications. However, the application of wireless networking in healthcare remains a challenge mainly because of security and reliability concerns. This paper presents experimental results of performance analysis of a wireless network for healthcare ...

  10. Fiber wireless networks

    Science.gov (United States)

    Nirmalathas, A.; Bakaul, M.; Lim, C.; Novak, D.; Waterhouse, R.

    2005-11-01

    Broadband wireless networks based on a number of new frequency windows at higher microwave and millimeter-wave frequencies have been actively pursued to provide ultra-high bandwidth services over a wireless networks. These networks will have a large number of antenna base-stations with high throughput. Significant reductions in antenna base-station complexity can be achieved if most of the signal routing and switching functions centralized at a central office in the network. In such a network, fiber feed networks can be effectively deployed to provide high bandwidth interconnections between multiple antenna base-stations and the central office. With wavelength division multiplexing, efficient optical fiber feed network architectures could be realised to provide interconnection to a large number of antenna base-stations. In this paper, we present an over view of our recent research into system technologies for fiber wireless networks.

  11. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  12. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  13. Wireless communications algorithmic techniques

    CERN Document Server

    Vitetta, Giorgio; Colavolpe, Giulio; Pancaldi, Fabrizio; Martin, Philippa A

    2013-01-01

    This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It focuses on single user systems, so ignoring multiple access techniques. Moreover, emphasis is put on single-input single-output (SISO) systems, although some relevant topics about multiple-input multiple-output (MIMO) systems are also illustrated.Comprehensive wireless specific guide to algorithmic techniquesProvides a detailed analysis of channel equalization and channel coding for wi

  14. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  15. Wireless optical telecommunications

    CERN Document Server

    Bouchet, Olivier

    2013-01-01

    Wireless optical communication refers to communication based on the unguided propagation of optical waves. The past 30 years have seen significant improvements in this technique - a wireless communication solution for the current millennium - that offers an alternative to radio systems; a technique that could gain attractiveness due to recent concerns regarding the potential effects of radiofrequency waves on human health.The aim of this book is to look at the free space optics that are already used for the exchange of current information; its many benefits, such as incorporating chan

  16. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  17. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  18. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  19. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  20. Resource management in wireless networking

    CERN Document Server

    Cardei, Mihaela; Du, Ding-Zhu

    2005-01-01

    This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.Survey chapters give an excellent introduction to key topics in resource management for wireless networks, while experts will be satisfied by the technical depth of the knowledge imparted in chapters exploring hot research topics.The subject area discussed in this book is very relevant today, considering the recent remarkable growth of wireless networking and the convergence of wireless personal communications, internet technologies and real-time multimedia.This volume is a very good companion for practitioners working on implementing solutions for multimedia and Quality of Service - sensitive applications over wireless networks.Written for:Researchers, faculty members, students...

  1. Wireless Distributed Antenna MIMO

    DEFF Research Database (Denmark)

    2015-01-01

    The present disclosure relates to system applications of multicore optical fibers. One embodiment relates to a base transceiver station for a wireless telecommunication system comprising a plurality of antenna units arranged in a MIMO configuration and adapted for transmission and/or reception...

  2. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  3. Wireless Remote Control System

    Directory of Open Access Journals (Sweden)

    Adrian Tigauan

    2012-06-01

    Full Text Available This paper presents the design of a wireless remote control system based on the ZigBee communication protocol. Gathering data from sensors or performing control tasks through wireless communication is advantageous in situations in which the use of cables is impractical. An Atmega328 microcontroller (from slave device is used for gathering data from the sensors and transmitting it to a coordinator device with the help of the XBee modules. The ZigBee standard is suitable for low-cost, low-data-rate and low-power wireless networks implementations. The XBee-PRO module, designed to meet ZigBee standards, requires minimal power for reliable data exchange between devices over a distance of up to 1600m outdoors. A key component of the ZigBee protocol is the ability to support networking and this can be used in a wireless remote control system. This system may be employed e.g. to control temperature and humidity (SHT11 sensor and light intensity (TSL230 sensor levels inside a commercial greenhouse.

  4. Subsurface Wireless Sensor Networks

    Science.gov (United States)

    Niemeier, J. J.; Davies, J. L.; Kruger, A.

    2008-12-01

    Conventional thinking holds that underground- and underwater radio communication is not possible, except at very low frequencies employing very long antennas and high transmit power. However, researchers at The University of Iowa have demonstrated that using inexpensive, low-power radios, it is in fact possible to achieve reliable underground radio communication over distances of several meters. This allows for creating underground wireless sensor networks. A proof-of-concept network was established at The University of Iowa, where nodes that measure soil moisture content are buried over a 20×20 m area (up to 1 m deep). The nodes organize themselves into a wireless sensor network, reconfigure routes as radio link quality waxes and wanes, cooperate in routing data packets to a surface base station, and so on. In an agricultural research setting, an advantage of such buried wireless sensor networks is that, if nodes were buried deep enough, they may be left in place during agricultural field work. Power consumption is an important issue in wireless sensor networks. This is especially true in a buried network where battery replacement is a major undertaking. The focus of continuing research is developing methods of inductively recharging buried sensor batteries.

  5. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  6. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  7. NASA Bluetooth Wireless Communications

    Science.gov (United States)

    Miller, Robert D.

    2007-01-01

    NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.

  8. A selfish genetic element influencing longevity correlates with reactive behavioural traits in female house mice (Mus domesticus.

    Directory of Open Access Journals (Sweden)

    Yannick Auclair

    Full Text Available According to theory in life-history and animal personality, individuals with high fitness expectations should be risk-averse, while individuals with low fitness expectations should be more bold. In female house mice, a selfish genetic element, the t haplotype, is associated with increased longevity under natural conditions, representing an appropriate case study to investigate this recent theory empirically. Following theory, females heterozygous for the t haplotype (+/t are hypothesised to express more reactive personality traits and be more shy, less explorative and less active compared to the shorter-lived homozygous wildtype females (+/+. As males of different haplotype do not differ in survival, no similar pattern is expected. We tested these predictions by quantifying boldness, exploration, activity, and energetic intake in both +/t and +/+ mice. +/t females, unlike +/+ ones, expressed some reactive-like personality traits: +/t females were less active, less prone to form an exploratory routine and tended to ingest less food. Taken together these results suggest that differences in animal personality may contribute to the survival advantage observed in +/t females but fail to provide full empirical support for recent theory.

  9. R-bUCRP: A Novel Reputation-Based Uneven Clustering Routing Protocol for Cognitive Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mingchuan Zhang

    2016-01-01

    Full Text Available Energy of nodes is an important factor that affects the performance of Wireless Sensor Networks (WSNs, especially in the case of existing selfish nodes, which attracted many researchers’ attention recently. In this paper, we present a reputation-based uneven clustering routing protocol (R-bUCRP considering both energy saving and reputation assessment. In the cluster establishment phase, we adopt an uneven clustering mechanism which controls the competitive scope of cluster head candidates to save the energy of WSNs. In the cluster heads election phase, the residual energy and reputation value are used as the indexes to select the optimal cluster head, where the reputation mechanism is introduced to support reputation assessment. Simulation results show that the proposed R-bUCRP can save node energy consumption, balance network energy distribution, and prolong network lifetime.

  10. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  11. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  12. An Assessment of Emerging Wireless Broadband Technologies

    National Research Council Canada - National Science Library

    Fountanas, Leonidas

    2001-01-01

    ... technologies in providing broadband services today, emerging wireless broadband technologies are expected to significantly increase their market share over the next years, Deploying a wireless network...

  13. Wireless Sensor Portal Technology Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Recognizing the needs and challenges facing NASA Earth Science for data input, manipulation and distribution, Mobitrum is proposing a ? Wireless Sensor Portal...

  14. Adaptive Wireless Transceiver, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  15. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because....... This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  16. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  17. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless......Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because...

  18. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  19. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  20. Green Wireless Power Transfer Networks

    NARCIS (Netherlands)

    Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.

    2016-01-01

    wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.

  1. Wireless Networks: a brief introduction

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Networks: a brief introduction. Wireless communication: What? Why? How many types? What is cell? Is it different from fixed landline structure? 1G systems: FDMA/FDD and Analog FM [voice comm]. (Introduced in 1983 in Chicago by AMPS). 2G systems: 3 ...

  2. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  3. Wireless Headset Communication System

    Science.gov (United States)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  4. Investigating wireless power transfer

    Science.gov (United States)

    St John, Stuart A.

    2017-09-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.

  5. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  6. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  7. Wireless installation standard

    International Nuclear Information System (INIS)

    Lim, Hwang Bin

    2007-12-01

    This is divided six parts which are radio regulation law on securing of radio resource, use of radio resource, protection of radio resource, radio regulation enforcement ordinance with securing, distribution and assignment of radio regulation, radio regulation enforcement regulation on utility of radio resource and technical qualification examination, a wireless installation regulation of technique standard and safety facility standard, radio regulation such as certification regulation of information communicative machines and regulation of radio station on compliance of signal security, radio equipment in radio station, standard frequency station and emergency communication.

  8. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  9. Household wireless electroencephalogram hat

    Science.gov (United States)

    Szu, Harold; Hsu, Charles; Moon, Gyu; Yamakawa, Takeshi; Tran, Binh

    2012-06-01

    We applied Compressive Sensing to design an affordable, convenient Brain Machine Interface (BMI) measuring the high spatial density, and real-time process of Electroencephalogram (EEG) brainwaves by a Smartphone. It is useful for therapeutic and mental health monitoring, learning disability biofeedback, handicap interfaces, and war gaming. Its spec is adequate for a biomedical laboratory, without the cables hanging over the head and tethered to a fixed computer terminal. Our improved the intrinsic signal to noise ratio (SNR) by using the non-uniform placement of the measuring electrodes to create the proximity of measurement to the source effect. We computing a spatiotemporal average the larger magnitude of EEG data centers in 0.3 second taking on tethered laboratory data, using fuzzy logic, and computing the inside brainwave sources, by Independent Component Analysis (ICA). Consequently, we can overlay them together by non-uniform electrode distribution enhancing the signal noise ratio and therefore the degree of sparseness by threshold. We overcame the conflicting requirements between a high spatial electrode density and precise temporal resolution (beyond Event Related Potential (ERP) P300 brainwave at 0.3 sec), and Smartphone wireless bottleneck of spatiotemporal throughput rate. Our main contribution in this paper is the quality and the speed of iterative compressed image recovery algorithm based on a Block Sparse Code (Baranuick et al, IEEE/IT 2008). As a result, we achieved real-time wireless dynamic measurement of EEG brainwaves, matching well with traditionally tethered high density EEG.

  10. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  11. Structural processing for wireless communications

    CERN Document Server

    Lu, Jianhua; Ge, Ning

    2015-01-01

    This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.

  12. Radio Relays Improve Wireless Products

    Science.gov (United States)

    2009-01-01

    Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.

  13. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  14. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  15. Microwave materials for wireless applications

    CERN Document Server

    Cruickshank, David B

    2011-01-01

    This practical resource offers you an in-depth, up-to-date understanding of the use of microwave magnetic materials for cutting-edge wireless applications. The book discusses device applications used in wireless infrastructure base stations, point-to-point radio links, and a range of more specialized microwave systems. You find detailed discussions on the attributes of each family of magnetic materials with respect to specific wireless applications. Moreover, the book addresses two of the hottest topics in the field today - insertion loss and intermodulation. This comprehensive reference also

  16. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  17. Advanced Wireless Integrated Navy Network

    National Research Council Canada - National Science Library

    Stutzman, Warren; Habayeb, Rick

    2005-01-01

    Quarterly progress report No. I on AWINN hardware and software configurations of smart, wideband, multi-function antennas, secure configurable platform, close-in command and control for Sea Basing visualization of wireless...

  18. Wireless Damage Location Sensing System

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant Douglas (Inventor)

    2012-01-01

    A wireless damage location sensing system uses a geometric-patterned wireless sensor that resonates in the presence of a time-varying magnetic field to generate a harmonic response that will experience a change when the sensor experiences a change in its geometric pattern. The sensing system also includes a magnetic field response recorder for wirelessly transmitting the time-varying magnetic field and for wirelessly detecting the harmonic response. The sensing system compares the actual harmonic response to a plurality of predetermined harmonic responses. Each predetermined harmonic response is associated with a severing of the sensor at a corresponding known location thereof so that a match between the actual harmonic response and one of the predetermined harmonic responses defines the known location of the severing that is associated therewith.

  19. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  20. Wireless cortical implantable systems

    CERN Document Server

    Majidzadeh Bafar, Vahid

    2013-01-01

    Wireless Cortical Implantable Systems examines the design for data acquisition and transmission in cortical implants. The first part of the book covers existing system-level cortical implants, as well as future devices. The authors discuss the major constraints in terms of microelectronic integration. The second part of the book focuses on system-level as well as circuit and system level solutions to the development of ultra low-power and low-noise microelectronics for cortical implants. Existing solutions are presented and novel methods and solutions proposed. The third part of the book focuses on the usage of digital impulse radio ultra wide-band transmission as an efficient method to transmit cortically neural recorded data at high data-rate to the outside world. Original architectural and circuit and system solutions are discussed.

  1. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  2. Wireless Josephson amplifier

    International Nuclear Information System (INIS)

    Narla, A.; Sliwa, K. M.; Hatridge, M.; Shankar, S.; Frunzio, L.; Schoelkopf, R. J.; Devoret, M. H.

    2014-01-01

    Josephson junction parametric amplifiers are playing a crucial role in the readout chain in superconducting quantum information experiments. However, their integration with current 3D cavity implementations poses the problem of transitioning between waveguide, coax cables, and planar circuits. Moreover, Josephson amplifiers require auxiliary microwave components, like directional couplers and/or hybrids, that are sources of spurious losses and impedance mismatches that limit measurement efficiency and amplifier tunability. We have developed a wireless architecture for these parametric amplifiers that eliminates superfluous microwave components and interconnects. This greatly simplifies their assembly and integration into experiments. We present an experimental realization of such a device operating in the 9–11 GHz band with about 100 MHz of amplitude gain-bandwidth product, on par with devices mounted in conventional sample holders. The simpler impedance environment presented to the amplifier also results in increased amplifier tunability.

  3. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  4. Wireless Communications in Reverberant Environments

    Science.gov (United States)

    2015-01-01

    solutions exist which can be tailored to meet the needs nearly any wireless application. Some notable current solutions include USRPs [27] and GNURadio ...tailored to meet the needs nearly any wireless application. Some notable current solutions include USRPs [27] and GNURadio [28]. For this effort, the WARPv3...en.wikipedia.org/wiki/List of software-defined radios [27] “Ettus research.” [Online]. Available: http://www.ettus.com [28] “ Gnuradio .” [Online]. Available: http

  5. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  6. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  7. Traffic Profiling in Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Kirykos, Georgios

    2006-01-01

    .... Wireless sensor networks pose unique challenges and limitations to the traditional schemes, which are used in the other wireless networks for security protection, and are due mainly to the increased...

  8. CMOS circuits for passive wireless microsystems

    CERN Document Server

    Yuan, Fei

    2011-01-01

    Here is a comprehensive examination of CMOS circuits for passive wireless microsystems. Covers design challenges, fundamental issues of ultra-low power wireless communications, radio-frequency power harvesting, and advanced design techniques, and more.

  9. Wireless Sensor Portal Technology, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Mobitrum Corporation has demonstrated the feasibility in the Phase I of " A Wireless Sensor Portal Technology" and proposes a Phase II effort to develop a wireless...

  10. Kali Linux wireless penetration testing beginner's guide

    CERN Document Server

    Ramachandran, Vivek

    2015-01-01

    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

  11. A Game Theoretic Approach for Balancing Energy Consumption in Clustered Wireless Sensor Networks.

    Science.gov (United States)

    Yang, Liu; Lu, Yinzhi; Xiong, Lian; Tao, Yang; Zhong, Yuanchang

    2017-11-17

    Clustering is an effective topology control method in wireless sensor networks (WSNs), since it can enhance the network lifetime and scalability. To prolong the network lifetime in clustered WSNs, an efficient cluster head (CH) optimization policy is essential to distribute the energy among sensor nodes. Recently, game theory has been introduced to model clustering. Each sensor node is considered as a rational and selfish player which will play a clustering game with an equilibrium strategy. Then it decides whether to act as the CH according to this strategy for a tradeoff between providing required services and energy conservation. However, how to get the equilibrium strategy while maximizing the payoff of sensor nodes has rarely been addressed to date. In this paper, we present a game theoretic approach for balancing energy consumption in clustered WSNs. With our novel payoff function, realistic sensor behaviors can be captured well. The energy heterogeneity of nodes is considered by incorporating a penalty mechanism in the payoff function, so the nodes with more energy will compete for CHs more actively. We have obtained the Nash equilibrium (NE) strategy of the clustering game through convex optimization. Specifically, each sensor node can achieve its own maximal payoff when it makes the decision according to this strategy. Through plenty of simulations, our proposed game theoretic clustering is proved to have a good energy balancing performance and consequently the network lifetime is greatly enhanced.

  12. STUDY & SURVEY ON WIRELESS CHARGING & TECHNOLOGY

    OpenAIRE

    Harshal Sharma*

    2016-01-01

    In the modern world, we have often heard a word- wireless charging technology. Actually what is it all about? So this paper is giving you the whole package about wireless charging technology. Wireless charging is a technology through which power is transmitted through an air gap to the electrical devices for the motive of replenishment of energy. At present wireless charging techniques and development of commercial products have provided a promise to address the energy bottleneck of portable ...

  13. A Forensic Readiness Model for Wireless Networks

    OpenAIRE

    Ngobeni, Sipho; Venter, Hein; Burke, Ivan

    2010-01-01

    International audience; Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environme...

  14. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  15. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  16. Techniques for Wireless Applications

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-05-01

    Switching techniques have been first proposed as a spacial diversity techniques. These techniques have been shown to reduce considerably the processing load while letting multi-antenna systems achieve a specific target performance. In this thesis, we take a different look at the switching schemes by implementing them for different other wireless applications. More specifically, this thesis consists of three main parts, where the first part considers a multiuser environment and an adaptive scheduling algorithm based on the switching with post-selection scheme for statistically independent but non-identically distributed channel conditions. The performance of this switched based scheduler is investigated and a multitude of performance metrics are presented. In a second part, we propose and analyze the performance of three switched-based algorithms for interference reduction in the downlink of over-loaded femtocells. For instance, performance metrics are derived in closed-form and these metrics are used to compare these three proposed schemes. Finally in a third part, a switch based opportunistic channel access scheme is proposed for a cognitive radio system and its performance is analyzed in terms of two new proposed metrics namely the average cognitive radio access and the waiting time duration.

  17. Wireless capsule endo bronchoscopy

    Directory of Open Access Journals (Sweden)

    Baratz DM

    2014-03-01

    Full Text Available No abstract available. Article truncated at 150 words. Case Presentation History of Present Illness A 67 year-old man presents 10 days after swallowing a capsule endoscopy camera that was never retrieved. The wireless capsule was swallowed asymptomatically for evaluation of heme positive stools after negative upper and lower endoscopies. Patient noted that the evening after swallowing the camera he developed mild shortness of breath and cough. The cough and shortness of breath were persistent and worsened while lying down and when moving positions. He denied prior issues with swallowing or aspiration. Review of Systems Negative other than what is noted above. PMH, SH, and FH Past medical history: coronary artery disease, peripheral vascular disease, hyperlipidemia Surgical history: femoral-popliteal bypass, previous shoulder and back surgery Social history: 1 pack/day of cigarettes for 50 years, prior alcohol usage but not current, no illicit drugs Family history: no pulmonary diseases Physical Exam Vital signs: temperature 36.7º C, heart rate 86 beats per minute ...

  18. Advanced Wireless Sensor Nodes - MSFC

    Science.gov (United States)

    Varnavas, Kosta; Richeson, Jeff

    2017-01-01

    NASA field center Marshall Space Flight Center (Huntsville, AL), has invested in advanced wireless sensor technology development. Developments for a wireless microcontroller back-end were primarily focused on the commercial Synapse Wireless family of devices. These devices have many useful features for NASA applications, good characteristics and the ability to be programmed Over-The-Air (OTA). The effort has focused on two widely used sensor types, mechanical strain gauges and thermal sensors. Mechanical strain gauges are used extensively in NASA structural testing and even on vehicle instrumentation systems. Additionally, thermal monitoring with many types of sensors is extensively used. These thermal sensors include thermocouples of all types, resistive temperature devices (RTDs), diodes and other thermal sensor types. The wireless thermal board will accommodate all of these types of sensor inputs to an analog front end. The analog front end on each of the sensors interfaces to the Synapse wireless microcontroller, based on the Atmel Atmega128 device. Once the analog sensor output data is digitized by the onboard analog to digital converter (A/D), the data is available for analysis, computation or transmission. Various hardware features allow custom embedded software to manage battery power to enhance battery life. This technology development fits nicely into using numerous additional sensor front ends, including some of the low-cost printed circuit board capacitive moisture content sensors currently being developed at Auburn University.

  19. WIRELESS FIDELITY (Wi-Fi) BROADBAND NETWORK ...

    African Journals Online (AJOL)

    ES Obe

    categorized into two types: fixed and mobile wireless. The broadband fixed wireless network technologies .... 3.0 WIRELESS FIDELITYF (Wi-Fi). NETWORK IMPLEMENTATION. A Wi-Fi enabled device such as a PC, game .... Amateur radio, video senders, and cordless phones, can cause significant additional interference.

  20. WirelessHART modeling and performance evaluation

    NARCIS (Netherlands)

    Remke, Anne Katharina Ingrid; Wu, Xian

    2013-01-01

    In process industries wired supervisory and control networks are more and more replaced by wireless systems. Wireless communication inevitably introduces time delays and message losses, which may degrade the system reliability and performance. WirelessHART, as the first international standard for

  1. Wireless device monitoring systems and monitoring devices, and associated methods

    Science.gov (United States)

    McCown, Steven H; Derr, Kurt W; Rohde, Kenneth W

    2014-05-27

    Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.

  2. Impact of wireless link quality across communication layers

    OpenAIRE

    Zhou, J.

    2010-01-01

    Nowadays, wireless networks are used in most of the applications with radio technologies being used in all kinds of wireless networks. In all wireless links, the transmitted packets can be lost. How to identify the quality of a certain wireless link and achieve the best delivery performance over a certain wireless network is an open issue. In this thesis, the performance of wireless mesh network, wireless sensor network and cellular network have been investigated by the method of measurements...

  3. Wireless Augmented Reality Communication System

    Science.gov (United States)

    Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)

    2017-01-01

    A portable unit is for video communication to select a user name in a user name network. A transceiver wirelessly accesses a communication network through a wireless connection to a general purpose node coupled to the communication network. A user interface can receive user input to log on to a user name network through the communication network. The user name network has a plurality of user names, at least one of the plurality of user names is associated with a remote portable unit, logged on to the user name network and available for video communication.

  4. OFDM systems for wireless communications

    CERN Document Server

    Narasimhamurthy, Adarsh

    2010-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is

  5. Embracing interference in wireless systems

    CERN Document Server

    Gollakota, Shyamnath

    2014-01-01

    The wireless medium is a shared resource. If nearby devices transmit at thesame time, their signals interfere, resulting in a collision. In traditionalnetworks, collisions cause the loss of the transmitted information. For thisreason, wireless networks have been designed with the assumption thatinterference is intrinsically harmful and must be avoided.This book, a revised version of the author's award-winning Ph.D.dissertation, takes an alternate approach: Instead of viewing interferenceas an inherently counterproductive phenomenon that should to be avoided, wedesign practical systems that tra

  6. The Wireless Nursing Call System

    DEFF Research Database (Denmark)

    Jensen, Casper Bruun

    2006-01-01

    This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight into the cha......This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight...

  7. Artificial intelligence in wireless communications

    CERN Document Server

    Rondeau, Thomas W

    2009-01-01

    This cutting-edge resource offers practical overview of cognitive radio, a paradigm for wireless communications in which a network or a wireless node changes its transmission or reception parameters. The alteration of parameters is based on the active monitoring of several factors in the external and internal radio environment. This book offers a detailed description of cognitive radio and its individual parts. Practitioners learn how the basic processing elements and their capabilities are implemented as modular components. Moreover, the book explains how each component can be developed and t

  8. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  9. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  10. Efficient Wireless Charger Deployment for Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jehn-Ruey Jiang

    2016-08-01

    Full Text Available A wireless rechargeable sensor network (WRSN consists of sensor nodes that can harvest energy emitted from wireless chargers for refilling their batteries so that the WRSN can operate sustainably. This paper assumes wireless chargers are equipped with directional antennas, and are deployed on grid points of a fixed height to propose two heuristic algorithms solving the following wireless charger deployment optimization (WCDO problem: how to deploy as few as possible chargers to make the WRSN sustainable. Both algorithms model the charging space of chargers as a cone and calculate charging efficiency according power regression expressions complying with the Friis transmission equation. The two algorithms are the greedy cone covering (GCC algorithm and the adaptive cone covering (ACC algorithm. The GCC (respectively, ACC algorithm greedily (respectively, adaptively generates candidate cones to cover as many as possible sensor nodes. Both algorithms then greedily select the fewest number of candidate cones, each of which corresponds to the deployment of a charger, to have approximate solutions to the WCDO problem. We perform experiments, conduct simulations and do analyses for the algorithms to compare them in terms of the time complexity, the number of chargers deployed, and the execution time.

  11. Wireless Ways: Business and Personal Applications of Wireless Technology.

    Science.gov (United States)

    Chung, Joe

    2001-01-01

    Describes the Art Technology Group (ATG), an electronic business and customer management company, and the work they have done with wireless technology. Highlights include designing virtual offices and supporting the resulting virtual community; the mobility it allows; problems with bandwidth; and display issues. (LRW)

  12. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...

  13. Wireless Power for Mobile Devices

    NARCIS (Netherlands)

    Waffenschmidt, E.

    2011-01-01

    Wireless power transfer allows a convenient, easy to use battery charging of mobile phones and other mobile devices. No hassle with cables and plugs, just place the device on a pad and that’s it. Such asystem even has the potential to become a standard charging solution. Where are the limits for

  14. Socially Aware Heterogeneous Wireless Networks.

    Science.gov (United States)

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-06-11

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  15. Underwater optical wireless communication network

    Science.gov (United States)

    Arnon, Shlomi

    2010-01-01

    The growing need for underwater observation and subsea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, biogeochemical, evolutionary, and ecological changes in the sea, ocean, and lake environments, and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. Models are presented for three kinds of optical wireless communication links: (a) a line-of-sight link, (b) a modulating retroreflector link, and (c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered light it was possible to mitigate this decrease in some cases. It is concluded from the analysis that a high-data-rate underwater optical wireless network is a feasible solution for emerging applications such as UUV-to-UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  16. Data centric wireless sensor networks

    NARCIS (Netherlands)

    Dulman, S.O.; Havinga, Paul J.M.

    2005-01-01

    The vision of wirteless sensing systems requires the development of devices and technologies that can be pervasive without being intrusive. The basic component of such a smart environment will be a small node with sensing and wireless communications capabilities, able to organize itself flexibly

  17. Wireless Crew Communication Feasibility Assessment

    Science.gov (United States)

    Archer, Ronald D.; Romero, Andy; Juge, David

    2016-01-01

    Ongoing discussions with crew currently onboard the ISS as well as the crew debriefs from completed ISS missions indicate that issues associated with the lack of wireless crew communication results in increased crew task completion times and lower productivity, creates cable management issues, and increases crew frustration.

  18. Deployable Wireless Camera Penetrators

    Science.gov (United States)

    Badescu, Mircea; Jones, Jack; Sherrit, Stewart; Wu, Jiunn Jeng

    2008-01-01

    A lightweight, low-power camera dart has been designed and tested for context imaging of sampling sites and ground surveys from an aerobot or an orbiting spacecraft in a microgravity environment. The camera penetrators also can be used to image any line-of-sight surface, such as cliff walls, that is difficult to access. Tethered cameras to inspect the surfaces of planetary bodies use both power and signal transmission lines to operate. A tether adds the possibility of inadvertently anchoring the aerobot, and requires some form of station-keeping capability of the aerobot if extended examination time is required. The new camera penetrators are deployed without a tether, weigh less than 30 grams, and are disposable. They are designed to drop from any altitude with the boost in transmitting power currently demonstrated at approximately 100-m line-of-sight. The penetrators also can be deployed to monitor lander or rover operations from a distance, and can be used for surface surveys or for context information gathering from a touch-and-go sampling site. Thanks to wireless operation, the complexity of the sampling or survey mechanisms may be reduced. The penetrators may be battery powered for short-duration missions, or have solar panels for longer or intermittent duration missions. The imaging device is embedded in the penetrator, which is dropped or projected at the surface of a study site at 90 to the surface. Mirrors can be used in the design to image the ground or the horizon. Some of the camera features were tested using commercial "nanny" or "spy" camera components with the charge-coupled device (CCD) looking at a direction parallel to the ground. Figure 1 shows components of one camera that weighs less than 8 g and occupies a volume of 11 cm3. This camera could transmit a standard television signal, including sound, up to 100 m. Figure 2 shows the CAD models of a version of the penetrator. A low-volume array of such penetrator cameras could be deployed from an

  19. Wireless and mobile systems in telemedicine

    Directory of Open Access Journals (Sweden)

    Reza Safdari

    2012-12-01

    Full Text Available Background: It is necessary to deploy mobile and wireless systems in healthcare, because they have many benefits for healthcare systems. The objectives of this article were introducing various systems, applications, and standards of the wireless and mobile telemedicine. Material and Methods: This review study was conducted in 2010. To conduct the study, published articles in the years 2005 to 2012, in English with an emphasis on wireless and mobile technologies in health were studied. Search was done with key words include telemedicine, wireless health systems, health and telecommunications technology in databases including Pubmed, Science Direct, Google Scholar, Web of Sciences, Proquest. The collected data were analyzed. Results: Telemedicine system in the ambulance, telemedicine systems in space, telecardiology systems, EEG system, ultrasound system are some types of wireless and mobile systems in telemedicine. PDA-based mobile and wireless telemedicine application, based PDA drug application, and patient tracking application are some of wireless and mobile applications of telemedicine. The most important standards of wireless and mobile telemedicine are HL7, DICOM, SNOMed, and ICD-9-CM. Conclusion: There are many challenges in the wireless and mobile systems in telemedicine, despite the many benefits. Slow speed in sending pictures and video, lack of attention to the privacy in the design of these systems, environmental variables and the number of users during the day are some of these challenges. It is recommended to consider these challenges during the planning and designing of wireless and mobile systems in telemedicine.

  20. Energy-efficient digital and wireless IC design for wireless smart sensing

    Science.gov (United States)

    Zhou, Jun; Huang, Xiongchuan; Wang, Chao; Tae-Hyoung Kim, Tony; Lian, Yong

    2017-10-01

    Wireless smart sensing is now widely used in various applications such as health monitoring and structural monitoring. In conventional wireless sensor nodes, significant power is consumed in wirelessly transmitting the raw data. Smart sensing adds local intelligence to the sensor node and reduces the amount of wireless data transmission via on-node digital signal processing. While the total power consumption is reduced compared to conventional wireless sensing, the power consumption of the digital processing becomes as dominant as wireless data transmission. This paper reviews the state-of-the-art energy-efficient digital and wireless IC design techniques for reducing the power consumption of the wireless smart sensor node to prolong battery life and enable self-powered applications.

  1. Adaptive Naive Bayes classification for wireless sensor networks

    NARCIS (Netherlands)

    Zwartjes, G.J.

    2017-01-01

    Wireless Sensor Networks are tiny devices equipped with sensors and wireless communication. These devices observe environments and communicatie about these observations. Machine Learning techniques are of interest for Wireless Sensor Network applications since they can reduce the amount of needed

  2. Performance Analysis of IIUM Wireless Campus Network

    International Nuclear Information System (INIS)

    Latif, Suhaimi Abd; Masud, Mosharrof H; Anwar, Farhat

    2013-01-01

    International Islamic University Malaysia (IIUM) is one of the leading universities in the world in terms of quality of education that has been achieved due to providing numerous facilities including wireless services to every enrolled student. The quality of this wireless service is controlled and monitored by Information Technology Division (ITD), an ISO standardized organization under the university. This paper aims to investigate the constraints of wireless campus network of IIUM. It evaluates the performance of the IIUM wireless campus network in terms of delay, throughput and jitter. QualNet 5.2 simulator tool has employed to measure these performances of IIUM wireless campus network. The observation from the simulation result could be one of the influencing factors in improving wireless services for ITD and further improvement

  3. Introductory survey for wireless infrared communications

    Directory of Open Access Journals (Sweden)

    Munsif Ali Jatoi

    2014-08-01

    Full Text Available Wireless infrared communications can be defined as the propagation of light waves in free space using infrared radiation whose range is 400–700 nm. This range corresponds to frequencies of hundreds of terahertz, which is high for higher data rate applications. Wireless infrared is applied for higher data rates applications such as wireless computing, wireless video and wireless multimedia communication applications. Introduced by Gfeller, this field has grown with different link configurations, improved transmitter efficiency, increased receiver responsivity and various multiple access techniques for improved quality. Errors are caused because of background light, which causes degradation overall system performance. Error correction techniques are used to remove the errors caused during transmission. This study provides a brief account on field theory used for error correction in wireless infrared systems. The results are produced in terms of bit error rate and signal-to-noise ratio for various bit lengths to show the ability of encoding and decoding algorithms.

  4. Wireless Network Penetration Testing and Security Auditing

    Directory of Open Access Journals (Sweden)

    Wang Shao-Long

    2016-01-01

    Full Text Available IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory environment to conduct penetration tests to confirm whether our wireless network is hackable or not. WAIDPS is configured as auditing tool to view wireless attacks, such as WEP/WPA/WPA2 cracking, rouge access points, denial of service attack. WAIDPS is designed to detect wireless intrusion with additional features. Penetration testing and auditing will mitigate the risk and threatening to protect WALN.

  5. Wireless Technology Application to Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jeong Kweon; Jeong, See Chae; Jeong, Ki Hoon; Oh, Do Young; Kim, Jae Hack

    2009-01-01

    Wireless technologies are getting widely used in various industrial processes for equipment condition monitoring, process measurement and other applications. In case of Nuclear Power Plant (NPP), it is required to review applicability of the wireless technologies for maintaining plant reliability, preventing equipment failure, and reducing operation and maintenance costs. Remote sensors, mobile technology and two-way radio communication may satisfy these needs. The application of the state of the art wireless technologies in NPPs has been restricted because of the vulnerability for the Electromagnetic Interference and Radio Frequency Interference (EMI/RFI) and cyber security. It is expected that the wireless technologies can be applied to the nuclear industry after resolving these issues which most of the developers and vendors are aware of. This paper presents an overview and information on general wireless deployment in nuclear facilities for future application. It also introduces typical wireless plant monitoring system application in the existing NPPs

  6. mm-Wave Hybrid Photonic Wireless Links for Ultra-High Speed Wireless Transmissions

    DEFF Research Database (Denmark)

    Rommel, Simon; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso

    Hybrid photonic-wireless transmission schemes in the mm-wave frequency range are promising candidates to enable the multi-gigabit per second data communications required from wireless and mobile networks of the 5th and future generations. Large FCC spectrum allocations for wireless transmission...

  7. Application and promotion of wireless charging technology

    OpenAIRE

    Yan, Kaijun

    2014-01-01

    The aim of this thesis is to study wireless charging technology and analyze the application and promotion of each technology. This technology is based on Faraday’s electromagnetic in 1830s. It is not a new technology but it is developing high speed nowadays. This thesis introduces four mainstream types of wireless charging technology and three main-stream standards, and analyzes their features and development status. Wireless charging technology has been applied to some products, suc...

  8. Computer-Based Wireless Advertising Communication System

    Directory of Open Access Journals (Sweden)

    Anwar Al-Mofleh

    2009-10-01

    Full Text Available In this paper we developed a computer based wireless advertising communication system (CBWACS that enables the user to advertise whatever he wants from his own office to the screen in front of the customer via wireless communication system. This system consists of two PIC microcontrollers, transmitter, receiver, LCD, serial cable and antenna. The main advantages of the system are: the wireless structure and the system is less susceptible to noise and other interferences because it uses digital communication techniques.

  9. Application opportunities in wireless communications. Final report

    International Nuclear Information System (INIS)

    Abbott, R.E.; Blevins, R.P.; Olmstead, C.

    1998-07-01

    This report presents the results of examinations of wireless technologies and applications that may offer potential to utilities. Five different wireless technology areas are reviewed. Three areas--Communication Networks, Monitored Security Services, and Home Automation--potentially represent new business ventures for utilities. Two areas--Automatic Vehicle Location and Automated Field-Force Management--represent wireless applications with potential for reduced operating costs and improved customer relations

  10. Design and security of small wireless network

    OpenAIRE

    Žižka, Ladislav

    2012-01-01

    This thesis deals with design and security of small wireless network. Main goal of the thesis is home network design and choice of optimal solution of wireless security. The thesis has four parts. The first part describes computer networks and network components in theory. Next part deals with network design, choosing of network components and setting of them. It also describes some functionalities of alternative firmware DD-WRT. The third part presents common wireless security and network an...

  11. Feasibility and Applications of a Wireless Firewall

    OpenAIRE

    Wilhelm, Matthias

    2016-01-01

    Most of today’s wireless communication devices operate on unlicensed bands with uncoordinated spectrum access, with the consequence that RF interference and collisions are impairing the overall performance of wireless networks. In the classical design of network protocols, both packets in a collision are considered lost, such that channel access mechanisms attempt to avoid collisions proactively. However, with the current proliferation of wireless applications, e.g., WLANs, car-to-car network...

  12. Biomedical Wireless Ambulatory Crew Monitor

    Science.gov (United States)

    Chmiel, Alan; Humphreys, Brad

    2009-01-01

    A compact, ambulatory biometric data acquisition system has been developed for space and commercial terrestrial use. BioWATCH (Bio medical Wireless and Ambulatory Telemetry for Crew Health) acquires signals from biomedical sensors using acquisition modules attached to a common data and power bus. Several slots allow the user to configure the unit by inserting sensor-specific modules. The data are then sent real-time from the unit over any commercially implemented wireless network including 802.11b/g, WCDMA, 3G. This system has a distributed computing hierarchy and has a common data controller on each sensor module. This allows for the modularity of the device along with the tailored ability to control the cards using a relatively small master processor. The distributed nature of this system affords the modularity, size, and power consumption that betters the current state of the art in medical ambulatory data acquisition. A new company was created to market this technology.

  13. Wireless Augmented Reality Communication System

    Science.gov (United States)

    Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)

    2016-01-01

    The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.

  14. Propagation Engineering in Wireless Communications

    CERN Document Server

    Ghasemi, Abdollah; Ghasemi, Farshid

    2012-01-01

    Wireless communications has seen explosive growth in recent decades, in a realm that is both broad and rapidly expanding to include satellite services, navigational aids, remote sensing, telemetering, audio and video broadcasting, high-speed data communications, mobile radio systems and much more. Propagation Engineering in Wireless Communications deals with the basic principles of radiowaves propagation for frequency bands used in radio-communications, offering descriptions of new achievements and newly developed propagation models. The book bridges the gap between theoretical calculations and approaches, and applied procedures needed for advanced radio links design. The primary objective of this two-volume set is to demonstrate the fundamentals, and to introduce propagation phenomena and mechanisms that engineers are likely to encounter in the design and evaluation of radio links of a given type and operating frequency. Volume one covers basic principles, along with tropospheric and ionospheric propagation,...

  15. Mobility needs and wireless solutions

    DEFF Research Database (Denmark)

    Saugstrup, Dan; Henten, Anders

    The main purpose of this report is to spell out a methodological approach to the analysis of user needs with respect to mobility. Furthermore, this methodological approach is used in an exemplary analysis of the relationship between user needs and technology solutions offered by different wireless...... technologies. The report is based on a research approach, emphasizing important aspects in relation to developing more user oriented mobile services and applications in a heterogeneous network environment. As a staring point, Scandinavian research within the field of social science concerning mobility...... is described and discussed. Furthermore different wireless technologies are briefly described and discussed in relation to possible transmission capacities and coverage areas. In addition to this, a preliminary framework regarding the implications of mobility on the use and development of mobile services...

  16. Passive Wireless SAW Humidity Sensors, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal describes the preliminary development of passive wireless surface acoustic wave (SAW) based humidity sensors for NASA application to distributed...

  17. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  18. EEM{sup TM} wireless supervision

    Energy Technology Data Exchange (ETDEWEB)

    Bilic, H. [Ericsson-Nikola Tesla d.d. Zagreb (Croatia)

    2000-07-01

    By adding the GSM network to the communication level of Energy Management systems, energy operating centres (EOC) can offer wireless access to the supervised equipment. Furthermore EOC can profit from rapid service development in the GSM networks. With implementation of GPRS to the GSM network EOC can instantly offer wireless access to external IP based networks such as Internet and corporate Intranets. The author describes architecture and key characteristic of Ericsson EnergyMaster{sup TM} (EEM{sup TM}) system for Energy Management, how and where to implement wireless supervision, wireless access to IP addresses and also how to implement new services provided by the GSM network. (orig.)

  19. Wireless SAW Interrogator and Sensor System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless, passive, Surface Acoustic Wave (SAW), Orthogonal Frequency Coded (OFC) temperature sensors, operating in a multi-sensor environment, developed at the...

  20. Properties and natural occurrence of maternal-effect selfish genes ('Medea' factors) in the red flour beetle, Tribolium castaneum

    International Nuclear Information System (INIS)

    Beeman, R.W.; Friesen, K.S.

    1999-01-01

    Maternally acting selfish genes, termed 'Medea' factors, were found to be widespread in wild populations of Tribolium castaneum collected in Europe, North and South America, Africa and south-east Asia, but were rare or absent in populations from Australia and the Indian subcontinent. We detected at least four distinct genetic loci in at least two different linkage groups that exhibit the Medea pattern of differential mortality of genotypes within maternal families. Although each M factor tested had similar properties of maternal lethality to larvae and zygotic self-rescue, M factors representing distinct loci did not show cross-rescue. Alleles at two of these loci, M 1 and M 4 , were by far the most prevalent, M 4 being the predominant type. M 2 and M 3 were each found only once, in Pakistan and Japan, respectively. Although M 1 could be genetically segregated from M 4 and maintained as a purified stock, the M 1 factor invariably co-occurred with M 4 in field populations, whereas M 4 usually occurred in the absence of other Medea factors. The dominant maternal lethal action of M 1 could be selectively inactivated (reverted) by gene-knockout gamma irradiation with retention of zygotic rescue activity. (author)

  1. Wireless 3D Chocolate Printer

    OpenAIRE

    FROILAN G. DESTREZA; FRANCIS CARLO V. SOLLESTRE; MARJORIE V. VASQUEZ; FRANCIS B. MENDOZA

    2014-01-01

    This study is for the BSHRM Students of Batangas State University (BatStateU) ARASOF for the researchers believe that the Wireless 3D Chocolate Printer would be helpful in their degree program especially on making creative, artistic, personalized and decorative chocolate designs. The researchers used the Prototyping model as procedural method for the successful development and implementation of the hardware and software. This method has five phases which are the following: quick plan, quick d...

  2. Inkjet printed wireless smart bandage

    KAUST Repository

    Farooqui, Muhammad Fahad

    2016-12-19

    Chronic wounds affect millions of patients around the world and requires a major portion of health care budget for treatment. In this article, we present an unprecedented low cost continuous wireless monitoring system, realized through inkjet printing on a standard bandage strip, which can send early warnings as well as record long term wound progression data. The smart bandage can communicate upto a distance of 60 m when worn on the body.

  3. Smartphone Household Wireless Electroencephalogram Hat

    Directory of Open Access Journals (Sweden)

    Harold Szu

    2013-01-01

    Full Text Available Rudimentary brain machine interface has existed for the gaming industry. Here, we propose a wireless, real-time, and smartphone-based electroencephalogram (EEG system for homecare applications. The system uses high-density dry electrodes and compressive sensing strategies to overcome conflicting requirements between spatial electrode density, temporal resolution, and spatiotemporal throughput rate. Spatial sparseness is addressed by close proximity between active electrodes and desired source locations and using an adaptive selection of N active among 10N passive electrodes to form m-organized random linear combinations of readouts, m≪N≪10N. Temporal sparseness is addressed via parallel frame differences in hardware. During the design phase, we took tethered laboratory EEG dataset and applied fuzzy logic to compute (a spatiotemporal average of larger magnitude EEG data centers in 0.3 second intervals and (b inside brainwave sources by Independent Component Analysis blind deconvolution without knowing the impulse response function. Our main contributions are the fidelity of quality wireless EEG data compared to original tethered data and the speed of compressive image recovery. We have compared our recovery of ill-posed inverse data against results using Block Sparse Code. Future work includes development of strategies to filter unwanted artifact from high-density EEGs (i.e., facial muscle-related events and wireless environmental electromagnetic interferences.

  4. High Speed Wireless Signal Generation and Demodulation

    DEFF Research Database (Denmark)

    Caballero Jambrina, Antonio; Sambaraju, Rakesh; Zibar, Darko

    We present the experimental demonstration of high speed wireless generation, up to 40 Gb/s, in the 75-110 GHz wireless band. All-optical OFDM and photonic up-conversion are used for generation and single side-band modulation with digital coherent detection for demodulation....

  5. The Invention of the Wireless Communication Engine

    NARCIS (Netherlands)

    van der Kooij, B.J.G.

    2017-01-01

    Wireless technology, taken for granted today, was once an innovative wonder that would forever change how the world communicates. Developed by Guglielmo Marconi in the latter half of the nineteenth century, wireless telegraphy combined advancements made by Samuel Morse, William Cooke, Charles

  6. Home and School Technology: Wired versus Wireless.

    Science.gov (United States)

    Van Horn, Royal

    2001-01-01

    Presents results of informal research on smart homes and appliances, structured home wiring, whole-house audio/video distribution, hybrid cable, and wireless networks. Computer network wiring is tricky to install unless all-in-one jacketed cable is used. Wireless phones help installers avoid pre-wiring problems in homes and schools. (MLH)

  7. A guide to wireless networking by light

    Science.gov (United States)

    Haas, Harald; Chen, Cheng; O'Brien, Dominic

    2017-09-01

    The lack of wireless spectrum in the radio frequency bands has led to a rapid growth in research in wireless networking using light, known as LiFi (light fidelity). In this paper an overview of the subsystems, challenges and techniques required to achieve this is presented.

  8. Enabling technologies for wireless e-business

    CERN Document Server

    Kou, Weidong

    2006-01-01

    Provides a coverage of the technologies needed to make wireless e-business effective. This book offers an introduction for both self-study and taught e-business classes or commercial training in e-business and wireless technologies. It explains both industry standards and relevant academic research.

  9. International Conference on Mobile and Wireless Technology

    CERN Document Server

    Wattanapongsakorn, Naruemon; Joukov, Nikolai

    2016-01-01

    This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest developments in mobile software development.

  10. Topological properties of random wireless networks

    Indian Academy of Sciences (India)

    Wireless networks in which the node locations are random are best modelled as random geometric graphs (RGGs). In addition to their extensive application in the modelling of wireless networks, RGGs find many new applications and are being studied in their own right. In this paper we first provide a brief introduction to the ...

  11. Kali Linux wireless penetration testing essentials

    CERN Document Server

    Alamanni, Marco

    2015-01-01

    This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.

  12. Industrial wireless networking with resource constraint devices

    NARCIS (Netherlands)

    Das, Kallol

    2015-01-01

    During the last decade, wireless technologies have revolutionized the industrial automation sector by enabling wireless sensing and actuation for industrial applications. Most of these recently developed industrial standards are built on top of IEEE802.15.4 interface, which uses 2.4GHz frequency

  13. Challenging Aspects of Terahertz Terabit Wireless Communications

    DEFF Research Database (Denmark)

    Yu, Xianbin; Galili, Michael; Jepsen, Peter Uhd

    The increasing demand on fast wireless communications, e.g. huge data file transferring and mobile broadband access, has driven wireless communication systems into a path towards Terabit era. Terahertz (THz) technology is promising due to its unique features, such as unlimited bandwidth available...

  14. Interference mitigation techniques in wireless communications ...

    African Journals Online (AJOL)

    Co-Channel Interference, Intersymbol interference and fading are major impairment to the high-capacity transmission in power- and band-limited wireless communication channel. This paper presents an overview of interference mitigation techniques in wireless communications systems. Linear filtering, equalization, and ...

  15. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially with the d...... and to the discruption caused by the user mobility during the session. Voice over IP in Wireless Hetetrogeneous Networks thus investigates and proposes cross-layer techniques for realizing time-efficient control mechanisms for VoIP: signaling, mobility and security.......The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially...... with the deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality Vo...

  16. European Research towards Future Wireless Communications

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee; Pedersen, Gert Frølund

    2005-01-01

    This paper presents an overview of four on-going European research projects in the field of mobile and wireless communications leading to the next generations of wireless communications. The projects started in 2004. They investigate requirements and definition of access technology, network...... architecture, antennas and propagation, security, services, applications and socio-economic impact....

  17. Technical Challenges Hindering Development of Robust Wireless ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2015-12-01

    Dec 1, 2015 ... quality. Digital audio broadcasting is also quite popular everywhere. Wireless communications. Network operators have made significant investments in ... distributed control systems, with remote devices, sensors, and actuators linked together via wireless communication channels. Such networks are ...

  18. An Improved Wireless Battery Charging System

    Directory of Open Access Journals (Sweden)

    Woo-Seok Lee

    2018-03-01

    Full Text Available This paper presents a direct wireless battery charging system. The output current of the series-series compensated wireless power transfer (SS-WPT system is used as a current source, and the output voltage of AC-DC converter controls the current source. Therefore, the proposed wireless battery charging system needs no battery charging circuit to carry out charging profiles, and can solve space constraints and thermal problems in many battery applications. In addition, the proposed wireless battery charging system can implement easily most other charging profiles. In this paper, the proposed wireless battery charging system is implemented and the feasibility is verified experimentally according to constant-current constant-voltage charging profile or multi-step current charging profile.

  19. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. wireless networked systems for communication and control applications, the bo...

  20. Voice Quality Estimation in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Petr Zach

    2015-01-01

    Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.

  1. Advanced Signal Processing for Wireless Multimedia Communications

    Directory of Open Access Journals (Sweden)

    Xiaodong Wang

    2000-01-01

    Full Text Available There is at present a worldwide effort to develop next-generation wireless communication systems. It is envisioned that many of the future wireless systems will incorporate considerable signal-processing intelligence in order to provide advanced services such as multimedia transmission. In general, wireless channels can be very hostile media through which to communicate, due to substantial physical impediments, primarily radio-frequency interference and time-arying nature of the channel. The need of providing universal wireless access at high data-rate (which is the aim of many merging wireless applications presents a major technical challenge, and meeting this challenge necessitates the development of advanced signal processing techniques for multiple-access communications in non-stationary interference-rich environments. In this paper, we present some key advanced signal processing methodologies that have been developed in recent years for interference suppression in wireless networks. We will focus primarily on the problem of jointly suppressing multiple-access interference (MAI and intersymbol interference (ISI, which are the limiting sources of interference for the high data-rate wireless systems being proposed for many emerging application areas, such as wireless multimedia. We first present a signal subspace approach to blind joint suppression of MAI and ISI. We then discuss a powerful iterative technique for joint interference suppression and decoding, so-called Turbo multiuser detection, that is especially useful for wireless multimedia packet communications. We also discuss space-time processing methods that employ multiple antennas for interference rejection and signal enhancement. Finally, we touch briefly on the problems of suppressing narrowband interference and impulsive ambient noise, two other sources of radio-frequency interference present in wireless multimedia networks.

  2. Impact of wireless link quality across communication layers

    NARCIS (Netherlands)

    Zhou, J.

    2010-01-01

    Nowadays, wireless networks are used in most of the applications with radio technologies being used in all kinds of wireless networks. In all wireless links, the transmitted packets can be lost. How to identify the quality of a certain wireless link and achieve the best delivery performance over a

  3. Capacity Limit, Link Scheduling and Power Control in Wireless Networks

    Science.gov (United States)

    Zhou, Shan

    2013-01-01

    The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…

  4. Wireless Luminescence Integrated Sensors (WLIS)

    Energy Technology Data Exchange (ETDEWEB)

    Simpson, M.L.; Sayler, G.S. (Univ. Tennessee)

    2003-11-10

    The goal of this project was the development of a family of wireless, single-chip, luminescence-sensing devices to solve a number of difficult distributed measurement problems in areas ranging from environmental monitoring and assessment to high-throughput screening of combinatorial chemistry libraries. These wireless luminescence integrated sensors (WLIS) consist of a microluminometer, wireless data transmitter, and RF power input circuit all realized in a standard integrated circuit (IC) process with genetically engineered, whole-cell, bioluminescent bioreporters encapsulated and deposited on the IC. The end product is a family of compact, low-power, rugged, low-cost sensors. As part of this program they developed an integrated photodiode/signal-processing scheme with an rms noise level of 175 electrons/second for a 13-minute integration time, and a quantum efficiency of 66% at the 490-nm bioluminescent wavelength. this performance provided a detection limit of < 1000 photons/second. Although sol-gel has previously been used to encapsulate yeast cells, the reaction conditions necessary for polymerization (primarily low pH) have beforehand proven too harsh for bacterial cell immobilizations. Utilizing sonication methods, they have were able to initiate polymerization under pH conditions conductive to cell survival. both a toluene bioreporter (Pseudomonas putida TVA8) and a naphthalene bioreporter (Pseudomonas fluorescens HK44) were successfully encapsulated in sol-gel and shown to produce a fairly significant bioluminescent response. In addition to the previously developed naphthalene- and toluene-sensitive bioreporters, they developed a yeast-based xenoestrogen reporter. This technology has been licensed by Micro Systems Technologies, a startup company in Dayton, Ohio for applications in environmental containments monitoring, and for detecting weapons of mass destruction (i.e. homeland security).

  5. Prensa local e infraestructuras. La interesada marginación del periodismo medioambiental. Local press and infrastructures. Environmental journalism selfishly marginalization

    Directory of Open Access Journals (Sweden)

    Samuel Toledano Buendía

    Full Text Available ResumenConscientes de la dificultad para encuadrar muchas informaciones dentro de un área especializada del periodismo, este artículo analiza cómo la polémica construcción de un puerto industrial en Tenerife es abordada por el periódico de mayor difusión de la isla. A la vista de los elementos políticos, económicos, sociales y medioambientales que confluyen en el proyecto, se opta por hacer un análisis crítico del discurso, como método más adecuado para detallar los recursos del medio para trasladar al lector una realidad afín a los sectores políticos y económicos que defienden esta construcción. Se evidencia que la premeditada decisión de marginar la perspectiva medioambiental garantiza el marco idóneo para ocultar todas las manipulaciones orientadas a que la opinión pública apruebe el puerto.Palabras clavePrensa, periodismo, desarrollo, EspañaAbstractGiven that the difficulty to classify many informations in a journalism specialized area, this article analyses how a controversial industrial port project in Tenerife is covered by the island biggest selling newspaper. Considering the political, economical, social and environmental factors involved in this project, we choose a critical discourse analysis as the best methodological way to show the media resources for showing the reader a reality wanted by the political and economical sectors which support this public work. It is proved that the selfishly marginalization of the environmental perspective guaranteed the best context to hide all the manipulations created to gain the public opinion support to the port.

  6. Rapid rise and fall of selfish sex-ratio X chromosomes in Drosophila simulans: spatiotemporal analysis of phenotypic and molecular data.

    Science.gov (United States)

    Bastide, Héloïse; Cazemajor, Michel; Ogereau, David; Derome, Nicolas; Hospital, Frédéric; Montchamp-Moreau, Catherine

    2011-09-01

    Sex-ratio drive, which has been documented in several Drosophila species, is induced by X-linked segregation distorters. Contrary to Mendel's law of independent assortment, the sex-ratio chromosome (X(SR)) is inherited by more than half the offspring of carrier males, resulting in a female-biased sex ratio. This segregation advantage allows X(SR) to spread in populations, even if it is not beneficial for the carriers. In the cosmopolitan species D. simulans, the Paris sex-ratio is caused by recently emerged selfish X(SR) chromosomes. These chromosomes have triggered an intragenomic conflict, and their propagation has been halted over a large area by the evolution of complete drive suppression. Previous molecular population genetics analyses revealed a selective sweep indicating that the invasion of X(SR) chromosomes was very recent in Madagascar (likely less than 100 years ago). Here, we show that X(SR) chromosomes are now declining at this location as well as in Mayotte and Kenya. Drive suppression is complete in the three populations, which display little genetic differentiation and share swept haplotypes, attesting to a common and very recent ancestry of the X(SR) chromosomes. Patterns of DNA sequence variation also indicate a fitness cost of the segmental duplication involved in drive. The data suggest that X(SR) chromosomes started declining first on the African continent, then in Mayotte, and finally in Madagascar and strongly support a scenario of rapid cycling of X chromosomes. Once drive suppression has evolved, standard X(ST) chromosomes locally replace costly X(SR) chromosomes in a few decades.

  7. Foundations of wireless and electronics

    CERN Document Server

    Scroggie, M G

    1984-01-01

    Foundations of Wireless and Electronics, 10th Edition covers the cathode-ray and microwave tubes; modern pulse methods; f.m. detectors; basic processes of transmission; and reception, computers, and non-sinusoidal signal amplification. The book starts by giving a general overview of a complete electronic system, electricity and circuits, capacitance, and inductance. The text also discusses alternating currents (a.c.), including the frequency and phase of a.c.; the capacitance and inductance in a.c. circuits; and the capacitance and inductance in a series. Diodes, triode, transistor equivalent

  8. Wireless power transfer via radiowaves

    CERN Document Server

    Shinohara , Naoki

    2014-01-01

    Recent advances in Wireless Power Transmission (WPT) technologies have enabled various engineering applications with potential product implementation. WPT can be utilized to charge batteries in various pieces of equipment without the need for a wired connection. Energy can be harvested from ambient RF and microwave radiation and 1 million kW microwaves can be transmitted from space to the ground.This book covers all the theory and technologies of WPT, such as microwave generators with semi-conductors and microwave tubes, antennas, phased arrays, beam efficiency, and rectifiers (rectenna). The

  9. WMSA for wireless communication applications

    Energy Technology Data Exchange (ETDEWEB)

    Vats, Monika; Agarwal, Alok, E-mail: alokagarwal26@yahoo.com; Kumar, Ravindra [Dept. of Electronics & Electrical Engineering, Lingaya’s University Faridabad (India)

    2016-03-09

    Modified rectangular compact microstrip patch antenna having finite ground plane is proposed in this paper. Wideband Microstrip Antenna (WMSA) is achieved by corner cut and inserting air gaps inside the edges of the radiating patch having finite ground plane. The obtained impedance bandwidth for 10 dB return loss for the operating frequency f{sub 0} = 2.09 GHz is 28.7 % (600 MHz), which is very high as compared to the bandwidth obtained for the conventional microstrip antenna. Compactness with wide bandwidth of this antenna is practically useful for the wireless communication systems.

  10. Partnership Opportunities with AFRC for Wireless Systems Flight Testing

    Science.gov (United States)

    Hang, Richard

    2015-01-01

    The presentation will overview the flight test capabilities at NASA Armstrong Flight Research Center (AFRC), to open up partnership collaboration opportunities for Wireless Community to conduct flight testing of aerospace wireless technologies. Also, it will brief the current activities on wireless sensor system at AFRC through SBIR (Small Business Innovation Research) proposals, and it will show the current areas of interest on wireless technologies that AFRC would like collaborate with Wireless Community to further and testing.

  11. Distributed wireless quantum communication networks

    International Nuclear Information System (INIS)

    Yu Xu-Tao; Xu Jin; Zhang Zai-Chen

    2013-01-01

    The distributed wireless quantum communication network (DWQCN) has a distributed network topology and transmits information by quantum states. In this paper, we present the concept of the DWQCN and propose a system scheme to transfer quantum states in the DWQCN. The system scheme for transmitting information between any two nodes in the DWQCN includes a routing protocol and a scheme for transferring quantum states. The routing protocol is on-demand and the routing metric is selected based on the number of entangled particle pairs. After setting up a route, quantum teleportation and entanglement swapping are used for transferring quantum states. Entanglement swapping is achieved along with the process of routing set up and the acknowledgment packet transmission. The measurement results of each entanglement swapping are piggybacked with route reply packets or acknowledgment packets. After entanglement swapping, a direct quantum link between source and destination is set up and quantum states are transferred by quantum teleportation. Adopting this scheme, the measurement results of entanglement swapping do not need to be transmitted specially, which decreases the wireless transmission cost and transmission delay. (general)

  12. Coherently Enhanced Wireless Power Transfer

    Science.gov (United States)

    Krasnok, Alex; Baranov, Denis G.; Generalov, Andrey; Li, Sergey; Alù, Andrea

    2018-04-01

    Extraction of electromagnetic energy by an antenna from impinging external radiation is at the basis of wireless communications and wireless power transfer (WPT). The maximum of transferred energy is ensured when the antenna is conjugately matched, i.e., when it is resonant and it has an equal coupling with free space and its load. This condition, however, can be easily affected by changes in the environment, preventing optimal operation of a WPT system. Here, we introduce the concept of coherently enhanced WPT that allows us to bypass this difficulty and achieve dynamic control of power transfer. The approach relies on coherent excitation of the waveguide connected to the antenna load with a backward propagating signal of specific amplitude and phase. This signal creates a suitable interference pattern at the load resulting in a modification of the local wave impedance, which in turn enables conjugate matching and a largely increased amount of extracted energy. We develop a simple theoretical model describing this concept, demonstrate it with full-wave numerical simulations for the canonical example of a dipole antenna, and verify experimentally in both near-field and far-field regimes.

  13. Wireless Augmented Reality Prototype (WARP)

    Science.gov (United States)

    Devereaux, A. S.

    1999-01-01

    Initiated in January, 1997, under NASA's Office of Life and Microgravity Sciences and Applications, the Wireless Augmented Reality Prototype (WARP) is a means to leverage recent advances in communications, displays, imaging sensors, biosensors, voice recognition and microelectronics to develop a hands-free, tetherless system capable of real-time personal display and control of computer system resources. Using WARP, an astronaut may efficiently operate and monitor any computer-controllable activity inside or outside the vehicle or station. The WARP concept is a lightweight, unobtrusive heads-up display with a wireless wearable control unit. Connectivity to the external system is achieved through a high-rate radio link from the WARP personal unit to a base station unit installed into any system PC. The radio link has been specially engineered to operate within the high- interference, high-multipath environment of a space shuttle or space station module. Through this virtual terminal, the astronaut will be able to view and manipulate imagery, text or video, using voice commands to control the terminal operations. WARP's hands-free access to computer-based instruction texts, diagrams and checklists replaces juggling manuals and clipboards, and tetherless computer system access allows free motion throughout a cabin while monitoring and operating equipment.

  14. Simulation of Wireless Digital Communication Systems

    Directory of Open Access Journals (Sweden)

    A. Mohammed

    2004-12-01

    Full Text Available Due to the explosive demands for high speed wireless services, suchas wireless Internet, email and cellular video conferencing, digitalwireless communications has become one of the most exciting researchtopics in electrical and electronic engineering field. The never-endingdemand for such personal and multimedia services, however, demandstechnologies operating at higher data rates and broader bandwidths. Inaddition, the complexity of wireless communication and signalprocessing systems has grown considerably during the past decade.Therefore, powerful computer­aided techniques are required for theprocess of modeling, designing, analyzing and evaluating theperformance of digital wireless communication systems. In this paper wediscuss the basic propagation mechanisms affecting the performance ofwireless communication systems, and present a simple, powerful andefficient way to simulate digital wireless communication systems usingMatlab. The simulated results are compared with the theoreticalanalysis to validate the simulator. The simulator is useful inevaluating the performance of wireless multimedia services and theassociated signal processing structures and algorithms for current andnext generation wireless mobile communication systems.

  15. Application for Measurement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Miroslav MAHDAL

    2009-06-01

    Full Text Available This paper deals with wireless sensor networks, which are based on IEEE 802.15.4 standard. The development kit from Jennic company was used for wireless measuring of values and for creation of sensor network. For this purposes the sensor boards with wireless modules with marking JN5139 were used. These boards provide sensors (sensor of temperature, relative humidity and light sensor but also another interface, which helps to develop applications. Modules are programmed in Integrated Development Environment (IDE, which integrates C function library and C++ compiler and linker. The visualization application was created for monitoring of wireless sensor network. There is the possibility of local and wireless measurement. For creation of this application the SCADA/HMI system, Control Web 5 was used. This SCADA/HMI system enables to communicate with all wireless modules through base station (network's coordinator. The application also enables initialisation and network setting the any wireless module communicating with the base station. The advantage is the remote configuration and control of network. The application also enables the gathering, converting, viewing and archiving of incoming data from particular modules.

  16. Implanted Antennas in Medical Wireless Communications

    CERN Document Server

    Rahmat-Samii, Yahya; Balanis, Constantine

    2006-01-01

    Implanted Antennas in Medical Wireless Communications summarizes the results of recent research activities on the subject of implanted antennas for medical wireless communication systems. It is anticipated that in the near future sophisticated medical devices will be implanted inside the human body for medical telemetry and telemedicine. To establish effective and efficient wireless links with these devices, it is pivotal to give special attention to antenna designs that are low profile, small, safe, and cost effective. In this book, authors Yahya Rahmat-Samii and Jaehoon Kim demonstrate how a

  17. Wireless communication for hearing aid system

    DEFF Research Database (Denmark)

    Nour, Baqer

    This thesis focuses on the wireless coupling between hearing aids close to a human head. Hearing aids constitute devices withadvanced technology and the wireless communication enables the introduction of a range of completely new functionalities. Such devices are small and the available power...... the ear-to-ear wireless communication channel by understanding the mechanisms that control the propagations of the signals and the losses. The second objective isto investigate the properties of magneto-dielectric materials and their potential in antenna miniaturization. There are three approaches...

  18. EM threat analysis for wireless systems.

    Energy Technology Data Exchange (ETDEWEB)

    Burkholder, R. J. (Ohio State University Electroscience Laboratory); Mariano, Robert J.; Schniter, P. (Ohio State University Electroscience Laboratory); Gupta, I. J. (Ohio State University Electroscience Laboratory)

    2006-06-01

    Modern digital radio systems are complex and must be carefully designed, especially when expected to operate in harsh propagation environments. The ability to accurately predict the effects of propagation on wireless radio performance could lead to more efficient radio designs as well as the ability to perform vulnerability analyses before and after system deployment. In this report, the authors--experts in electromagnetic (EM) modeling and wireless communication theory--describe the construction of a simulation environment that is capable of quantifying the effects of wireless propagation on the performance of digital communication.

  19. Structural health monitoring using wireless sensor networks

    Science.gov (United States)

    Sreevallabhan, K.; Nikhil Chand, B.; Ramasamy, Sudha

    2017-11-01

    Monitoring and analysing health of large structures like bridges, dams, buildings and heavy machinery is important for safety, economical, operational, making prior protective measures, and repair and maintenance point of view. In recent years there is growing demand for such larger structures which in turn make people focus more on safety. By using Microelectromechanical Systems (MEMS) Accelerometer we can perform Structural Health Monitoring by studying the dynamic response through measure of ambient vibrations and strong motion of such structures. By using Wireless Sensor Networks (WSN) we can embed these sensors in wireless networks which helps us to transmit data wirelessly thus we can measure the data wirelessly at any remote location. This in turn reduces heavy wiring which is a cost effective as well as time consuming process to lay those wires. In this paper we developed WSN based MEMS-accelerometer for Structural to test the results in the railway bridge near VIT University, Vellore campus.

  20. Cross-Layer Wireless Resource Allocation

    National Research Council Canada - National Science Library

    Berry, Randall A; Yeh, Edmund M

    2005-01-01

    .... This bit pipe is a simple abstraction of the underlying physical and data link layers. There is growing awareness that this simple bit-pipe view is inadequate, particularly in the context of modern wireless data networks...

  1. Low-Power Wireless Sensor Network Infrastructures

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols...... peripherals need to by duty-cycled and the low-power wireless radios are severely influenced by the environmental effects causing bursty and unreliable wireless channels. This dissertation presents a communication stack providing services for low-power communication, secure communication, data collection...... channel. Second, secure communication is implemented with an efficient secure group communication suite including a low-overhead group key distribution scheme, distributing group keys according to the needs of the sensor nodes. Third, data collection is implemented with selective transmission which saves...

  2. VT Wireless Internet Service Providers 2007

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) The VT Wireless Internet Service Provider (ISP) dataset (WISP2007) includes polygons depicting the extent of Vermont's WISP broadband system as of...

  3. Dynamic Wireless Power Transfer - Grid Impacts Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Markel, Tony; Meintz, Andrew; Gonder, Jeff

    2015-12-04

    This presentation discusses the current status of analysis of the electricity grid impacts of a dynamic wireless power transfer system deployed to the Atlanta region on select high traffic roadway segments.

  4. Advanced Wireless Integrated Navy Network - AWINN

    National Research Council Canada - National Science Library

    Stutzman, Warren; Habayeb, Rick

    2005-01-01

    Quarterly progress report No. 2 on AWINN hardware and software configurations of smart, wideband, multi-function antennas, secure configurable platform, close-in command and control for Sea Basing visualization of wireless...

  5. Advanced Wireless Integrated Navy Network (AWINN)

    National Research Council Canada - National Science Library

    Stutzman, Warren; Habayeb, Rick

    2005-01-01

    Quarterly progress report No. 4 on AWINN hardware and software configurations of smart, wideband, multi-function antennas, secure configurable platform, close-in command and control for Sea Basing visualization of wireless...

  6. Advanced Wireless Integrated Navy Network (AWINN)

    National Research Council Canada - National Science Library

    Slutzman, Warren; Habayeb, Rick

    2006-01-01

    Quarterly progress report No. 5 on AWINN hardware and software configurations of smart, wideband, multi-function antennas, secure configurable platform, close-in command and control for Sea Basing visualization of wireless...

  7. Advanced Wireless Integrated Navy Network - AWINN

    National Research Council Canada - National Science Library

    Stutzman, Warren; Habayeb, Rick

    2005-01-01

    Quarterly progress report No. 3 on AWINN hardware and software configurations of smart, wideband, multi-function antennas, secure configurable platform, close-in command and control for Sea Basing visualization of wireless...

  8. Configuration of Wireless Cooperative/Sensor Networks

    National Research Council Canada - National Science Library

    Shafiee, Hamid R; Maham, B; Vazifehdan, J

    2008-01-01

    .... When employing more than one antenna at each node of a wireless network is not applicable, cooperation diversity protocols exploit the inherent spatial diversity of relay channels by allowing mobile...

  9. Wireless Sensing Opportunities for Aerospace Applications

    Directory of Open Access Journals (Sweden)

    William Wilson

    2008-07-01

    Full Text Available Wireless sensors and sensor networks is an emerging technology area with many applications within the aerospace industry. Integrated vehicle health monitoring (IVHM of aerospace vehicles is needed to ensure the safety of the crew and the vehicle, yet often high costs, weight, size and other constraints prevent the incorporation of instrumentation onto spacecraft. This paper presents a few of the areas such as IVHM, where new wireless sensing technology is needed on both existing vehicles as well as future spacecraft. From ground tests to inflatable structures to the International Space Station, many applications could receive benefits from small, low power, wireless sensors. This paper also highlights some of the challenges that need to overcome when implementing wireless sensor networks for aerospace vehicles.

  10. Secure Wireless Military Healthcare Telemedicine Enterprise

    National Research Council Canada - National Science Library

    Lucas, Kenneth W

    2005-01-01

    ... wireless PDA devices, and miniature computers, to existing DoD legacy and developing healthcare information systems, clinical repositories, and knowledge base systems for application at the point of care...

  11. The art of wireless sensor networks

    CERN Document Server

    2014-01-01

    During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.   “The Art of Wireless Sensor Networks: Volume 1: Fundamentals” focuses on the fundamentals concepts in the design, analysis, and implementation of wireless sensor networks. It covers the various layers of the lifecycle of this type of network from the physical layer up to the application layer. Its rationale is that the first volume covers contemporary design issues, tools, and protocols for radio-based two-dimensional terrestrial sensor networks. All the book chapters in this volume include up-to-date research work spanning various classic facets of the physical properties and functional behavior of wireless sensor networks, including physical layer, medium access control, data routing, topology management, mobility management, localization, task management, data management, data gathering, security, middleware, sensor technology, standards, and ...

  12. Energy Harvesting Wireless Strain Networks, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Prime Research LC (PPLC) and Virginia Tech (VT) propose to develop an energy harvesting wireless strain node technology that utilizes single-crystal piezoelectric...

  13. Optical Coherent Receiver Enables THz Wireless Bridge

    DEFF Research Database (Denmark)

    Yu, Xianbin; Liu, Kexin; Zhang, Hangkai

    2016-01-01

    We experimentally demonstrated a 45 Gbit/s 400 GHz photonic wireless communication system enabled by an optical coherent receiver, which has a high potential in fast recovery of high data rate connections, for example, in disaster....

  14. Wireless Crankarm Dynamometer for Cycling

    Directory of Open Access Journals (Sweden)

    Caetano Decian LAZZARI

    2011-05-01

    Full Text Available This report describes a new crankarm dynamometer designed to evaluate the strength produced by cyclists in real conditions. The dynamometer was designed to be fitted on a conventional crankset while data were transmitted via wireless communication channels available on a BluetoothTM module. Some 3D solid models were created in the SolidsWorks2010TM development environment to analyze the static and dynamic characteristics, by using the finite elements technique. Each crankset arm was used as a load cell based on strain gages configured as two Wheatstone bridges. The signals were conditioned on a printed circuit board attached directly to the structure. As a result, the load cell shows a maximum nonlinearity error between 2.1 % and 2.8 %. Some tests were performed on a cycling trainer, allowing to evaluate the system's functionality and to determine the involved forces in the crankset.

  15. Integrated Passive And Wireless Sensor

    KAUST Repository

    Li, Bodong

    2015-04-30

    A passive and wireless sensor is provided for sensing at least one of magnetic field, temperature or humidity. The sensor can provide only one of the sensing functions, individually or any combination of them simultaneously. It can be used for various applications where magnetic field changes, temperature and/or humidity need to be measured. In one or more embodiments, a surface acoustic wave (SAW) sensor is provided that can measure one or more of a magnetic field (or current that generates the magnetic field), temperature and humidity. In one or more embodiments, a magnetoimpedence (MI) sensor (for example a thin film giant magnetoimpedance (GMI) sensor), a thermally sensitive (for example a Lithium Niobite (LiNbO.sub.3)) substrate, and a humidity sensitive film (for example a hydrogel film) can be used as sensing elements.

  16. Propagation engineering in wireless communications

    CERN Document Server

    Ghasemi, Abdollah; Ghasemi, Farshid

    2016-01-01

    This book covers the basic principles for understanding radio wave propagation for common frequency bands used in radio-communications. This includes achievements and developments in propagation models for wireless communication. This book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors emphasize propagation engineering by giving fundamental information and explain the use of basic principles together with technical achievements. This new edition includes additional information on radio wave propagation in guided media and technical issues for fiber optics cable networks with several examples and problems. This book also includes a solution manual - with 90 solved examples distributed throughout the chapters - and 158 problems including practical values and assumptions.

  17. Modulation Schemes for Wireless Access

    Directory of Open Access Journals (Sweden)

    F. Vejrazka

    2000-12-01

    Full Text Available Four modulation schemes, namely minimum shift keying (MSK, Gaussianminimum shift keying (GMSK, multiamplitude minimum shift keying(MAMSK and π/4 differential quadrature phase shift keying (π/4-QPSKare described and their applicability to wireless access is discussedin the paper. Low complexity receiver structures based on differentialdetection are analysed to estimate the performance of the modulationschemes in the additive Gaussian noise and the Rayleigh and Riceenvelope fast fading channel. The bandwidth efficiency is calculated toevaluate the modulation schemes. The results show that the MAMSK schemegives the greatest bandwidth efficiency, but its performance in theRayleigh channel is rather poor. In contrast, the MSK scheme is lessbandwidth efficient, but it is more resistant to Rayleigh fading. Theperformance of π/4-QPSK signal is considerably improved by appropriateprefiltering.

  18. Reliability of Wireless Sensor Networks

    Science.gov (United States)

    Dâmaso, Antônio; Rosa, Nelson; Maciel, Paulo

    2014-01-01

    Wireless Sensor Networks (WSNs) consist of hundreds or thousands of sensor nodes with limited processing, storage, and battery capabilities. There are several strategies to reduce the power consumption of WSN nodes (by increasing the network lifetime) and increase the reliability of the network (by improving the WSN Quality of Service). However, there is an inherent conflict between power consumption and reliability: an increase in reliability usually leads to an increase in power consumption. For example, routing algorithms can send the same packet though different paths (multipath strategy), which it is important for reliability, but they significantly increase the WSN power consumption. In this context, this paper proposes a model for evaluating the reliability of WSNs considering the battery level as a key factor. Moreover, this model is based on routing algorithms used by WSNs. In order to evaluate the proposed models, three scenarios were considered to show the impact of the power consumption on the reliability of WSNs. PMID:25157553

  19. Mining Behavioral Groups in Large Wireless LANs

    OpenAIRE

    Hsu, Wei-jen; Dutta, Debojyoti; Helmy, Ahmed

    2006-01-01

    One vision of future wireless networks is that they will be deeply integrated and embedded in our lives and will involve the use of personalized mobile devices. User behavior in such networks is bound to affect the network performance. It is imperative to study and characterize the fundamental structure of wireless user behavior in order to model, manage, leverage and design efficient mobile networks. It is also important to make such study as realistic as possible, based on extensive measure...

  20. WIRELESS PHYSICAL LAYER SECURITY: PART 1

    OpenAIRE

    Saad , Walid; ZHOU , XIANGYUN; Debbah , Mérouane; Poor , H. Vincent

    2015-01-01

    This is an editorial; International audience; The ongoing paradigm shift from classical centralized wireless technologies toward distributed large-scale networks such as the Internet of Things has introduced new security challenges that cannot be fully handled via traditional cryptgraphic means. In such emerging wireless environments , devices have limited capabilities and are not controlled by a central control center; thus, the implementation of computationally expensive cryptographic techn...

  1. BackTrack testing wireless network security

    CERN Document Server

    Cardwell, Kevin

    2013-01-01

    Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks.All you need is some experience with networks and computers and you will be ready to go.

  2. Wireless communications networks for the smart grid

    CERN Document Server

    Ho, Quang-Dung; Rajalingham, Gowdemy; Le-Ngoc, Tho

    2014-01-01

    This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open research opportunities of the SGCN are addressed. Wireless Communications Networks for Smart Grid provi

  3. Probabilistic Bandwidth Assignment in Wireless Sensor Networks

    OpenAIRE

    Khan , Dawood; Nefzi , Bilel; Santinelli , Luca; Song , Ye-Qiong

    2012-01-01

    International audience; With this paper we offer an insight in designing and analyzing wireless sensor networks in a versatile manner. Our framework applies probabilistic and component-based design principles for the wireless sensor network modeling and consequently analysis; while maintaining flexibility and accuracy. In particular, we address the problem of allocating and reconfiguring the available bandwidth. The framework has been successfully implemented in IEEE 802.15.4 using an Admissi...

  4. Fading and interference mitigation in wireless communications

    CERN Document Server

    Panic, Stefan; Anastasov, Jelena; Spalevic, Petar

    2013-01-01

    The rapid advancement of various wireless communication system services has created the need to analyze the possibility of their performance improvement. Introducing the basic principles of digital communications performance analysis and its mathematical formalization, Fading and Interference Mitigation in Wireless Communications will help you stay up to date with recent developments in the performance analysis of space diversity reception over fading channels in the presence of cochannel interference.The book presents a unified method for computing the performance of digital communication sys

  5. Wireless Security Within Hastily Formed Networks

    Science.gov (United States)

    2006-09-01

    Layer 3, creates an IPSec tunnel , much like a VPN , to protect the wireless point to point link as shown above independent of the wireless...2006) say the two most popular VPN implementations, IPSec (IP Security) and SSL (Secure Sockets Layer), each have their own strengths and weaknesses...Protocol (L2TP) Layer 3 (Network Layer) • Point-to-Point Tunneling Protocol (PPTP) • IP Security ( IPSec ) Layer 7 (Applications Layer) • Secure

  6. Wireless sensor data acquisition on remote locations

    OpenAIRE

    Apat, Mark

    2010-01-01

    Systems for remote wireless acquisition of sensor data are an important field of technology which combines knowledge from computer science and electronics. Development of such systems is facilitated by wireless standards like ZigBee which improve and simplify such a development. This diploma thesis describes the design and realization of a ZigBee standard based system and the corresponding application for data acquisition and control of remote sensors. The system is capable of acquiring va...

  7. Auction design for the wireless spectrum market

    CERN Document Server

    Lin, Peng; Zhang, Qian

    2014-01-01

    This Brief introduces the wireless spectrum market and discusses the current research for spectrum auctions. It covers the unique properties of spectrum auction, such as interference relationship, reusability, divisibility, composite effect and marginal effect, while also proposing how to build economic incentives into the network architecture and protocols in order to optimize the efficiency of wireless systems.Three scenarios for designing new auctions are demonstrated. First, a truthful double auction scheme for spectrum trading considering both the heterogeneous propagation properties of c

  8. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...... be useful for practicing engineers from industry who deal with the wireless systems that are designed and analyzed with the UWB technique....

  9. Wireless motion sensor network for monitoring motion in a process, wireless sensor node, reasoning node, and feedback and/or actuation node for such wireless motion sensor network

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Marin Perianu, Raluca; Marin Perianu, Mihai

    2010-01-01

    Wireless motion sensor network for monitoring motion in a process comprising at least one wireless sensor node for measuring at least one physical quantity related to motion or orientation, feature extraction means for deriving a feature for the measured quantities, a wireless transmitter connected

  10. How to model wireless mesh networks topology

    International Nuclear Information System (INIS)

    Sanni, M L; Hashim, A A; Anwar, F; Ali, S; Ahmed, G S M

    2013-01-01

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  11. Supporting Adaptation of Wireless Communication Protocols

    Directory of Open Access Journals (Sweden)

    LACHHMAN DAS DHOMEJA

    2016-10-01

    Full Text Available Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity, Bluetooth, IrDA (Infrared, etc. In order for pervasive devices to interact with each other, they need to have matching (alike communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth from what the server has (e.g. WiFi, connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange, L2CAP (Logical Link Control and Adaptation Protocol, RFCOM (Radio Frequency Communication and WiFi protocol and can run on (J2MW (Java 2 Micro Edition enabled mobile phones which support both Bluetooth and WiFi capabilities

  12. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  13. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  14. Growth of wireless technology in healthcare institutions.

    Science.gov (United States)

    Riha, Chris

    2006-01-01

    As wireless technologies evolve and interoperate, the practical application for healthcare providers and organizations grows exponentially. By providing increased access to patient data, decision-making tools (e.g., computer aided decision systems such as ECG analysis programs), error reduction systems (i.e., pharmaceutical error prevention software), the benefits of wireless technology can be immense. However, as with all technological innovations, wireless systems must be carefully planned and managed. As the wireless spectrum becomes more crowded with both complementary and competing systems, bandwidth utilization and the potential for interference grows greatly. Clinical engineering personnel need to be actively involved in the management of wireless system management within a healthcare facility to avoid interference problems that could disrupt patient care, especially as the deployment of wireless systems expands. Additionally, public exposure to RF energy in a healthcare setting may need to be monitored and evaluated as the utilization of this energy spectrum continues to grow. All manufacturers of RF emitting devices are required to list the specific absorption rate of their specific device. However, there is no monitoring of the cumulative effect of multiple devices and systems. As of press time, this has not been an issue. But it is something to consider as we continue to find useful applications for this technology.

  15. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  16. Airborne wireless communication systems, airborne communication methods, and communication methods

    Science.gov (United States)

    Deaton, Juan D [Menan, ID; Schmitt, Michael J [Idaho Falls, ID; Jones, Warren F [Idaho Falls, ID

    2011-12-13

    An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

  17. Sex, spite, and selfish genes

    Indian Academy of Sciences (India)

    In addition, he made substantial contributions to theories on the evolution of sex, senescence, sex ratios, evolutionary game theory, mate choice, and intragenomic conflict. Nature's Oracle is the first book-length treatment of. Hamilton's life. Sociologist of science Ullica Segerstrale, author of the highly acclaimed history of the ...

  18. How Bad is Selfish Voting?

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Morgenstern, Jamie

    2013-01-01

    It is well known that strategic behavior in elections is essentially unavoidable; we therefore ask: how bad can the rational outcome be? We answer this question via the notion of the price of anarchy, using the scores of alternatives as a proxy for their quality and bounding the ratio between...

  19. Sex, spite, and selfish genes

    Indian Academy of Sciences (India)

    ously considered becoming a schoolteacher instead of going to graduate school, and that he spent a night in a Greek prison following a car accident. Segerstrale also sheds additional light on more well-described aspects of Hamilton's life, such as his strained relationship with John Maynard Smith, his love for the Amazon, ...

  20. Appetite for the Selfish Gene

    NARCIS (Netherlands)

    Iztok Ostan, I.; Borut Poljsak, B.; Simcic, M.; Tijskens, L.M.M.

    2010-01-01

    In developed countries, where the majority of the population has enough income to afford healthy diets, a large number of the inhabitants nevertheless choose unhealthy nutrition. WHO and FAO strategies to overcome this problem are mostly based on educational means. Implicitly, this approach is based

  1. Nutrition for the selfish gene

    NARCIS (Netherlands)

    Iztok Ostan, I.; Borut Poljsak, B.; Simcic, M.; Tijskens, L.M.M.

    2009-01-01

    In ethology, the science of animal behaviour, the so-called “central theorem” states that organisms are expected to behave in a way that benefits their own “inclusive fitness.” Critics of this theorem claim that there is a dichotomy or even a contradiction in each organism, involving the tendency of

  2. The embeddedness of selfish Routines

    DEFF Research Database (Denmark)

    Andersen, Poul Houman

    2001-01-01

    Routines have traditionally been seen as an organisational feature. However, like genes, routines may be carriers and initiators of organisations as well......Routines have traditionally been seen as an organisational feature. However, like genes, routines may be carriers and initiators of organisations as well...

  3. Increasing Reliability with Wireless Instrumentation Systems from Space Shuttle to 'Fly-By-Wireless'

    Science.gov (United States)

    Studor, George

    2004-01-01

    This slide presentation discusses some of the requirements to allow for "Fly by Wireless". Included in the discussion are: a review of new technologies by decades starting with the 1930's and going through the current decade, structural health monitoring, the requisite system designs, and the vision of flying by wireless.

  4. Intrusion detection and monitoring for wireless networks.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  5. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  6. OIT Wireless Telemetry for Industrial Applications

    Energy Technology Data Exchange (ETDEWEB)

    Manges, WW

    2002-09-03

    The need for advanced wireless technology has been identified in the National Research Council publication (1) ''Manufacturing Process Controls for the Industries of the Future as a Critical Technology for the Future''. The deployment challenges to be overcome in order for wireless to be a viable option include: (1) eliminating interference (assuring reliable communications); (2) easing the deployment of intelligent, wireless sensors; (3) developing reliable networks (robust architectures); (4) developing remote power (long-lasting and reliable); and (5) developing standardized communication protocols. This project demonstrated the feasibility of robust wireless sensor networks that could meet these requirements for the harsh environments common to the DOE/OIT Industries of the Future. It resulted in a wireless test bed that was demonstrated in a paper mill and a steel plant. The test bed illustrated key protocols and components that would be required in a real-life, wireless network. The technologies for low power connectivity developed and demonstrated at the plant eased fears that the radios would interfere with existing control equipment. The same direct sequence, spread spectrum (DSSS) technology that helped assure the reliability of the connection also demonstrated that wireless communication was feasible in these plants without boosting the transmitted power to dangerous levels. Our experience and research have indicated that two key parameters are of ultimate importance: (1) reliability and (2) inter-system compatibility. Reliability is the key to immediate acceptance among industrial users. The importance cannot be overstated, because users will not tolerate an unreliable information network. A longer term issue that is at least as important as the reliability of a single system is the inter-system compatibility between these wireless sensor networks and other wireless systems that are part of our industries. In the long run, the

  7. NASA Lunar Base Wireless System Propagation Analysis

    Science.gov (United States)

    Hwu, Shian U.; Upanavage, Matthew; Sham, Catherine C.

    2007-01-01

    There have been many radio wave propagation studies using both experimental and theoretical techniques over the recent years. However, most of studies have been in support of commercial cellular phone wireless applications. The signal frequencies are mostly at the commercial cellular and Personal Communications Service bands. The antenna configurations are mostly one on a high tower and one near the ground to simulate communications between a cellular base station and a mobile unit. There are great interests in wireless communication and sensor systems for NASA lunar missions because of the emerging importance of establishing permanent lunar human exploration bases. Because of the specific lunar terrain geometries and RF frequencies of interest to the NASA missions, much of the published literature for the commercial cellular and PCS bands of 900 and 1800 MHz may not be directly applicable to the lunar base wireless system and environment. There are various communication and sensor configurations required to support all elements of a lunar base. For example, the communications between astronauts, between astronauts and the lunar vehicles, between lunar vehicles and satellites on the lunar orbits. There are also various wireless sensor systems among scientific, experimental sensors and data collection ground stations. This presentation illustrates the propagation analysis of the lunar wireless communication and sensor systems taking into account the three dimensional terrain multipath effects. It is observed that the propagation characteristics are significantly affected by the presence of the lunar terrain. The obtained results indicate the lunar surface material, terrain geometry and antenna location are the important factors affecting the propagation characteristics of the lunar wireless systems. The path loss can be much more severe than the free space propagation and is greatly affected by the antenna height, surface material and operating frequency. The

  8. Wireless Roadside Inspection Proof-of-Concept Test

    Science.gov (United States)

    2009-09-01

    This project was undertaken to determine the feasibility of gathering vehicle, driver, and carrier data to be used to format and wirelessly transmit from a commercial motor vehicle a Safety Data Message Set (SDMS). The Wireless Roadside Inspection (W...

  9. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  10. Resource sharing in wireless networks: The SAPHYRE approach

    NARCIS (Netherlands)

    Jorswieck, E.A.; Badia, L.; Fahldieck, T.; Gesbert, D.; Gustafsson, S.; Haardt, M.; Ho, K.-M.; Karipidis, E.; Kortke, A.; Larsson, E.G.; Mark, H.; Nawrocki, M.; Piesiewicz, R.; Römer, F.; Schubert, M.; Sykora, J.; Trommelen, P.H.; Ende, B.D. van; Zorzi, M.

    2010-01-01

    Physical resource sharing between wireless operators and service providers is necessary in order to support efficient, competitive, and innovative wireless communication markets. By sharing resources, such as spectrum or infrastructure, which are usually exclusively allocated interference is created

  11. Passive Wireless Temperature Sensor for Harsh Environments, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless Sensor Technologies has for several years been developing a passive Wireless Temperature Sensor (WTS) for gas turbine engine and other harsh environment...

  12. Artificial intelligence based event detection in wireless sensor networks

    NARCIS (Netherlands)

    Bahrepour, M.

    2013-01-01

    Wireless sensor networks (WSNs) are composed of large number of small, inexpensive devices, called sensor nodes, which are equipped with sensing, processing, and communication capabilities. While traditional applications of wireless sensor networks focused on periodic monitoring, the focus of more

  13. Utilising artificial intelligence in software defined wireless sensor network

    CSIR Research Space (South Africa)

    Matlou, OG

    2017-10-01

    Full Text Available Software Defined Wireless Sensor Network (SDWSN) is realised by infusing Software Defined Network (SDN) model in Wireless Sensor Network (WSN), Reason for that is to overcome the challenges of WSN. Artificial Intelligence (AI) and machine learning...

  14. Wireless, Passive Encoded Saw Sensors and Communication Links - Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — The innovation proposed here is a complete, wireless remote sensing solution using passive SAW Orthogonal Frequency Coded (OFC) sensors and a wireless interrogation...

  15. A Formal Evaluation of the Security Schemes for Wireless Networks

    OpenAIRE

    Shadi R. Masadeh; Nidal Turab

    2011-01-01

    Information security is a critical issue in the wireless network, because the transmission media is open (no physical control on the air). Any wireless device equipped with wireless interface can use and share the airwave transmission medium with other users. For protection purposes, several security mechanisms have been developed over years. This paper provides systematic evaluation of different security schemes used in wireless networks: WEP, TKIP, WPA, AES and WPA2. A formal comparison is ...

  16. Java Bluetooth wireless technology for evaluating student performance in classroom

    OpenAIRE

    Davidrajuh, Reggie

    2005-01-01

    This paper focuses on the use of Java Bluetooth wireless technology for evaluation of student performance in classroom. First, an introduction to Bluetooth wireless technology is given. Second, use of Java technology for developing wireless applications is explored. Third, a framework is given for identifying the processes involved in education that can make use of mobile technology. Finally, a case study is presented on wireless classroom application for student evaluation.

  17. Extending ABB’s WirelessHART Tool

    OpenAIRE

    Zakupszki, Andras; Pichetpongsa, Nuttapon

    2013-01-01

    Within this decade, wireless technology has been used in process control in various industries. WirelessHART is one of the standards, used for creating communication networks for such purpose. Since the technology is relatively new, there are many known and unknown risks in deploying it in real life applications.ABB’s WirelessHART Tool is used for generating simulation scenarios that can be used for evaluating the performance of WirelessHART networks under different conditions.This paper desc...

  18. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  19. Next-generation wireless technologies 4G and beyond

    CERN Document Server

    Chilamkurti, Naveen; Chaouchi, Hakima

    2013-01-01

    This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet o

  20. Get certified a guide to wireless communication engineering technologies

    CERN Document Server

    Ahson, Syed A

    2009-01-01

    The Institute of Electrical and Electronics Engineers (IEEE) Communications Society designed the IEEE wireless communication engineering technologies (WCET) certification program to address the wireless industry's growing need for communications professionals with practical problem-solving skills in real-world situations. Individuals who achieve this prestigious certification are recognized as possessing the required knowledge, skill, and abilities to meet wireless challenges in various industry, business, corporate, and organizational settings. Presenting contributions from 50 wireless commun

  1. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  2. Wireless Competition in Canada: An Assessment

    Directory of Open Access Journals (Sweden)

    Jeffrey Church

    2013-08-01

    Full Text Available If there’s one thing Canadians agree on, it’s that Canada’s wireless industry can and should be more competitive. The federal government is on side with the policy objective of having four carriers in every region and has responded with policies that provide commercial advantages to entrants. But, the rub is that there has not been a study that actually assesses the state of competition in wireless services in Canada, until now. Those in favour of policies that will promote and sustain entry point to Canada’s high average revenue per user and low wireless penetration rate (mobile connections per capita as evidence that there is insufficient competition. The difficulty is that the facts are not consistent with this simplistic analysis. Measurements of wireless penetration are skewed toward countries that maintain the Calling Party Pays Protocol and favour pay-as-you-go plans, both of which encourage inflated user counts. Canada’s participation per capita on monthly plans and minutes of voice per capita are not outliers. Moreover, in terms of smartphone adoption and smartphone data usage, Canada is a global leader, contributing to high average revenue per user. Consistent with being world leaders in the rollout of high speed wireless networks, Canada lead its peer group in capital expenditures per subscriber in 2012: the competition of importance to Canadians is not just over price, but also over the quality of wireless networks. In any event, none of the measures typically used in international comparisons are relevant to assessing the competitiveness of Canadian wireless services. The appropriate competitive analysis recognizes two relevant features of the technology of wireless services: (i high fixed and sunk capital costs; and (ii economies of scale and scope. The implications of these are that profitability requires mark ups over short run measures of cost — high gross margins — and that there will be a natural, upper limit on

  3. Bluetooth wireless database for scoliosis clinics.

    Science.gov (United States)

    Lou, E; Fedorak, M V; Hill, D L; Raso, J V; Moreau, M J; Mahood, J K

    2003-05-01

    A database system with Bluetooth wireless connectivity has been developed so that scoliosis clinics can be run more efficiently and data can be mined for research studies without significant increases in equipment cost. The wireless database system consists of a Bluetooth-enabled laptop or PC and a Bluetooth-enabled handheld personal data assistant (PDA). Each patient has a profile in the database, which has all of his or her clinical history. Immediately prior to the examination, the orthopaedic surgeon selects a patient's profile from the database and uploads that data to the PDA over a Bluetooth wireless connection. The surgeon can view the entire clinical history of the patient while in the examination room and, at the same time, enter in any new measurements and comments from the current examination. After seeing the patient, the surgeon synchronises the newly entered information with the database wirelessly and prints a record for the chart. This combination of the database and the PDA both improves efficiency and accuracy and can save significant time, as there is less duplication of work, and no dictation is required. The equipment required to implement this solution is a Bluetooth-enabled PDA and a Bluetooth wireless transceiver for the PC or laptop.

  4. Wireless sensor network for monitoring soil moisture and weather conditions

    Science.gov (United States)

    A wireless sensor network (WSN) was developed and deployed in three fields to monitor soil water status and collect weather data for irrigation scheduling. The WSN consists of soil-water sensors, weather sensors, wireless data loggers, and a wireless modem. Soil-water sensors were installed at three...

  5. Distributed Estimation, Coding, and Scheduling in Wireless Visual Sensor Networks

    Science.gov (United States)

    Yu, Chao

    2013-01-01

    In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…

  6. Sensor Fusion-based Event Detection in Wireless Sensor Networks

    NARCIS (Netherlands)

    Bahrepour, M.; Meratnia, Nirvana; Havinga, Paul J.M.

    2009-01-01

    Recently, Wireless Sensor Networks (WSN) community has witnessed an application focus shift. Although, monitoring was the initial application of wireless sensor networks, in-network data processing and (near) real-time actuation capability have made wireless sensor networks suitable candidate for

  7. India: a Case of Fragile Wireless Service and Technology Adoption?

    NARCIS (Netherlands)

    L-F. Pau (Louis-François); J. Motiwalla

    2007-01-01

    textabstractWireless penetration and the Indian economy have grown significantly over the past few years, but how robust and sustainable is the adoption of wireless services and products? Several papers have discussed India as a wireless service and product market, and sometimes tried to assess

  8. Experimental Performance Analysis of Wireless Links for Healthcare ...

    African Journals Online (AJOL)

    Wireless networking is currently being deployed for various applications. However, the application of wireless networking in healthcare remains a challenge mainly because of security and reliability concerns. This paper presents experimental results of performance analysis of a wireless network for healthcare application ...

  9. Compact wideband CMOS receiver frontends for wireless communication

    NARCIS (Netherlands)

    Blaakmeer, S.C.

    2010-01-01

    Abstract Wireless communication is an integral part of our daily life, the mobile phone is an example of a very popular wireless communication device. A communication link consists of a transmitter, a receiver and the transmission medium, which air or vacuum for a wireless link. Part of the receiver

  10. Wireless Fidelity (Wi-Fi) Broadband Network Technology: An ...

    African Journals Online (AJOL)

    Wireless Fidelity (Wi-Fi) broadband network technology has made tremendous impact in the growth of broadband wireless networks. There exists today several Wi-Fi access points that allow employees, partners and customers to access corporate data from almost anywhere and anytime. Wireless broadband networks are ...

  11. Towards Ultrahigh Speed Impulse Radio THz Wireless Communications

    DEFF Research Database (Denmark)

    Yu, Xianbin; Galili, Michael; Morioka, Toshio

    2015-01-01

    THz impulse radio technologies promise a new paradigm of fast wireless access with simplified wireless reception. However, huge loss of propagating broad bandwidth THz impulse radio signals limits THz wireless transmission distance and reduces the achievable link data rates. In this paper, we...

  12. A forensic readiness model for Wireless Local Area Networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility...

  13. A video wireless capsule endoscopy system powered wirelessly: design, analysis and experiment

    Science.gov (United States)

    Pan, Guobing; Xin, Wenhui; Yan, Guozheng; Chen, Jiaoliao

    2011-06-01

    Wireless capsule endoscopy (WCE), as a relatively new technology, has brought about a revolution in the diagnosis of gastrointestinal (GI) tract diseases. However, the existing WCE systems are not widely applied in clinic because of the low frame rate and low image resolution. A video WCE system based on a wireless power supply is developed in this paper. This WCE system consists of a video capsule endoscope (CE), a wireless power transmission device, a receiving box and an image processing station. Powered wirelessly, the video CE has the abilities of imaging the GI tract and transmitting the images wirelessly at a frame rate of 30 frames per second (f/s). A mathematical prototype was built to analyze the power transmission system, and some experiments were performed to test the capability of energy transferring. The results showed that the wireless electric power supply system had the ability to transfer more than 136 mW power, which was enough for the working of a video CE. In in vitro experiments, the video CE produced clear images of the small intestine of a pig with the resolution of 320 × 240, and transmitted NTSC format video outside the body. Because of the wireless power supply, the video WCE system with high frame rate and high resolution becomes feasible, and provides a novel solution for the diagnosis of the GI tract in clinic.

  14. A video wireless capsule endoscopy system powered wirelessly: design, analysis and experiment

    International Nuclear Information System (INIS)

    Pan, Guobing; Chen, Jiaoliao; Xin, Wenhui; Yan, Guozheng

    2011-01-01

    Wireless capsule endoscopy (WCE), as a relatively new technology, has brought about a revolution in the diagnosis of gastrointestinal (GI) tract diseases. However, the existing WCE systems are not widely applied in clinic because of the low frame rate and low image resolution. A video WCE system based on a wireless power supply is developed in this paper. This WCE system consists of a video capsule endoscope (CE), a wireless power transmission device, a receiving box and an image processing station. Powered wirelessly, the video CE has the abilities of imaging the GI tract and transmitting the images wirelessly at a frame rate of 30 frames per second (f/s). A mathematical prototype was built to analyze the power transmission system, and some experiments were performed to test the capability of energy transferring. The results showed that the wireless electric power supply system had the ability to transfer more than 136 mW power, which was enough for the working of a video CE. In in vitro experiments, the video CE produced clear images of the small intestine of a pig with the resolution of 320 × 240, and transmitted NTSC format video outside the body. Because of the wireless power supply, the video WCE system with high frame rate and high resolution becomes feasible, and provides a novel solution for the diagnosis of the GI tract in clinic

  15. Energy and bandwidth-efficient wireless transmission

    CERN Document Server

    Gao, Wei

    2017-01-01

    This book introduces key modulation and predistortion techniques for approaching energy and spectrum-efficient transmission for wireless communication systems. The book presents a combination of theoretical principles, practical implementations, and actual tests. It focuses on spectrum-efficient modulation and energy-efficient transmission techniques in the portable wireless communication systems, and introduces currently developed and designed RF transceivers in the latest wireless markets. Most materials, design examples, and design strategies used are based on the author’s two decades of work in the digital communication fields, especially in the areas of the digital modulations, demodulations, digital signal processing, and linearization of power amplifiers. The applications of these practical products and equipment cover the satellite communications on earth station systems, microwave communication systems, 2G GSM and 3G WCDMA mobile communication systems, and 802.11 WLAN systems.

  16. Wireless Heart Patients and the Quantified Self

    DEFF Research Database (Denmark)

    Grew, Julie Christina; Svendsen, Mette Nordahl

    2017-01-01

    Remote monitoring of implantable cardioverter defibrillator (ICD) patients links patients wirelessly to the clinic via a box in their bedroom. The box transmits data from the ICD to a remote database accessible to clinicians without patient involvement. Data travel across time and space; clinicians...... can monitor patients from a distance and instantly know about cardiac events. Based on ethnographic fieldwork in two Danish hospitals, this article explores the configuration of the wireless ICD patient by following a number of patients through hospitalisation, implantation, in-clinic follow......-up, and remote monitoring. Wireless therapy, we argue, scripts the patient as data. In high-tech clinical encounters, data are enacted as extensions and copies of the patient, and even proxies that, in patients’ experiences, may turn into identity thieves. In illuminating the multiple positions that data take...

  17. Forecasting economic aspects of future wireless services

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders; Saugstrup, Dan

    The topic for this deliverable is to assess the future economic setup and implications of wireless services. While provision of basic wireless communication services such as voice and messaging services usually are delivered as end-to-end services by the network operator, the market for content...... based services may be delivered through collaboration between network operators and content providers. How can this market be expected to develop? Will the network operators act as system integrators connecting customers and content providers in a walled garden approach or will the market for wireless...... the market and the business models to be applied. The analysis will take current market trends as point of departure with focus on vanguard markets with respect to 3G services....

  18. Advancing Profiling Sensors with a Wireless Approach

    Science.gov (United States)

    Galvis, Alex; Russomanno, David J.

    2012-01-01

    The notion of a profiling sensor was first realized by a Near-Infrared (N-IR) retro-reflective prototype consisting of a vertical column of wired sparse detectors. This paper extends that prior work and presents a wireless version of a profiling sensor as a collection of sensor nodes. The sensor incorporates wireless sensing elements, a distributed data collection and aggregation scheme, and an enhanced classification technique. In this novel approach, a base station pre-processes the data collected from the sensor nodes and performs data re-alignment. A back-propagation neural network was also developed for the wireless version of the N-IR profiling sensor that classifies objects into the broad categories of human, animal or vehicle with an accuracy of approximately 94%. These enhancements improve deployment options as compared with the first generation of wired profiling sensors, possibly increasing the application scenarios for such sensors, including intelligent fence applications. PMID:23443371

  19. Transparent graphene microstrip filters for wireless communications

    Science.gov (United States)

    Wang, Jinchen; Guan, Yifei; Yu, Hua; Li, Na; Wang, Shuopei; Shen, Cheng; Dai, Zhijiang; Gan, Decheng; Yang, Rong; He, Songbai; Zhang, Guangyu

    2017-08-01

    A microstrip is an indispensable component for wireless communication circuits. With the development of 5G technology, optically transparent microstrip filters urgently need to be developed. In this work, we have theoretically and experimentally demonstrated the immense potential of graphene microstrips for transparent wireless communication circuits in the 5G era. Both wideband and dual-band transparent graphene microstrip filters have shown more than 80% optical transmissivity in the region from 250 nm to 2000 nm with good frequency responses. S and C band microwave signals can transmit along the graphene microstrip lines effectively while coupling excitations produce relatively large insertion losses. Our results show that transparent microstrips designed with high-quality graphene will largely scale down the size of the wireless devices and thus play an irreplaceable role in the 5G era.

  20. Economics and Governance of the wireless Internet

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders; Tadayoni, Reza

    barriers of entry. In this paper three issues are discussed: 1) Developments in pricing schemes for Internet interconnection and Internet access with special focus on the role of wireless access. 2) Developments in supporting infrastructures with special focus on the increasing role of wireless......The Internet has undergone a growing diversification with regard to types of users, kinds of services and use of transmission technologies and infrastructures. Today, internet services are delivered by the use of many different wired and wireless communication technologies with different technical...... capabilities and limitations, and with different techno-economic characteristics. The question is whether these trends challenge the current mode of governance for the Internet. In the early days, the Internet was considered to be open, free, competitive, with a high level of entrepreneurialism, and with low...

  1. Availability Issues in Wireless Visual Sensor Networks

    Science.gov (United States)

    Costa, Daniel G.; Silva, Ivanovitch; Guedes, Luiz Affonso; Vasques, Francisco; Portugal, Paulo

    2014-01-01

    Wireless visual sensor networks have been considered for a large set of monitoring applications related with surveillance, tracking and multipurpose visual monitoring. When sensors are deployed over a monitored field, permanent faults may happen during the network lifetime, reducing the monitoring quality or rendering parts or the entire network unavailable. In a different way from scalar sensor networks, camera-enabled sensors collect information following a directional sensing model, which changes the notions of vicinity and redundancy. Moreover, visual source nodes may have different relevancies for the applications, according to the monitoring requirements and cameras' poses. In this paper we discuss the most relevant availability issues related to wireless visual sensor networks, addressing availability evaluation and enhancement. Such discussions are valuable when designing, deploying and managing wireless visual sensor networks, bringing significant contributions to these networks. PMID:24526301

  2. Functional Testing of Wireless Sensor Node Designs

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Madsen, Jan

    2007-01-01

    Wireless sensor networks are networked embedded computer systems with stringent power, performance, cost and form-factor requirements along with numerous other constraints related to their pervasiveness and ubiquitousness. Therefore, only a systematic design methdology coupled with an efficient...... test approach can enable their conformance to design and deployment specifications. We discuss off-line, hierarchical, functional testing of complete wireless sensor nodes containing configurable logic through a combination of FPGA-based board test and Software-Based Self-Test (SBST) techniques....... The proposed functional test methodology has been applied to a COTS-based sensor node development platform and can be applied, in general, for testing all types of wireless sensor node designs....

  3. Routing protocols in wireless sensor networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks.

  4. Stochastic Modelling of Wireless Energy Transfer

    Science.gov (United States)

    Veilleux, Shaun; Almaghasilah, Ahmed; Abedi, Ali; Wilkerson, DeLisa

    2017-01-01

    This study investigates the efficiency of a new method of powering remote sensors by the means of wireless energy transfer. The increased use of sensors for data collection comes with the inherent cost of supplying power from sources such as power cables or batteries. Wireless energy transfer technology eliminates the need for power cables or periodic battery replacement. The time and cost of setting up or expanding a sensor network will be reduced while allowing sensors to be placed in areas where running power cables or battery replacement is not feasible. This paper models wireless channels for power and data separately. Smart scheduling for the data channel is proposed to avoid transmitting data on a noisy channel where the probability of data loss is high to improve power efficiency. Analytical models have been developed and verified using simulations.

  5. Wireless fabric patch sensors for wearable healthcare.

    Science.gov (United States)

    Yoo, Hoi-Jun; Yoo, Jerald; Yan, Long

    2010-01-01

    Two novel wireless fabric patch sensors are introduced for low energy wearable healthcare. The first is a wirelessly powered patch sensor that can be attached to a patient to capture electrocardiogram (ECG) while consuming only 12 microW. By using fabric circuit board technology, the band-aid like sensor is implemented. The second wearable cardiac heathcare sensor, fabricated in the form of 4-layer compact smart poultice type including flexible battery, can extend to monitor bio-impedance together with ECG signals at 16 different sites of the heart with 25 reconfigurable electrodes. It also provides cm-range inductive coupled remote system start-up and duty-cycled data transmission using body as communication channel for a low energy wireless interconnectivity. Both sensors exploit dry fabric electrodes to minimize skin irritation during clinical long term operation.

  6. Scheduling and congestion control for wireless internet

    CERN Document Server

    Wang, Xin

    2014-01-01

    This brief proposes that the keys to internet cross-layer optimization are the development of non-standard implicit primal-dual solvers for underlying optimization problems, and design of jointly optimal network protocols as decomposition of such solvers. Relying on this novel design-space oriented approach, the author develops joint TCP congestion control and wireless-link scheduling schemes for wireless applications over Internet with centralized and distributed (multi-hop) wireless links. Different from the existing solutions, the proposed schemes can be asynchronously implemented without message passing among network nodes; thus they are readily deployed with current infrastructure. Moreover, global convergence/stability of the proposed schemes to optimal equilibrium is established using the Lyapunov method in the network fluid model. Simulation results are provided to evaluate the proposed schemes in practical networks.

  7. Robust resource allocation in future wireless networks

    CERN Document Server

    Parsaeefard, Saeedeh; Mokari, Nader

    2017-01-01

    This book presents state-of-the-art research on robust resource allocation in current and future wireless networks. The authors describe the nominal resource allocation problems in wireless networks and explain why introducing robustness in such networks is desirable. Then, depending on the objectives of the problem, namely maximizing the social utility or the per-user utility, cooperative or competitive approaches are explained and their corresponding robust problems are considered in detail. For each approach, the costs and benefits of robust schemes are discussed and the algorithms for reducing their costs and improving their benefits are presented. Considering the fact that such problems are inherently non-convex and intractable, a taxonomy of different relaxation techniques is presented, and applications of such techniques are shown via several examples throughout the book. Finally, the authors argue that resource allocation continues to be an important issue in future wireless networks, and propose spec...

  8. Ultra Secure High Reliability Wireless Radiation Monitor

    International Nuclear Information System (INIS)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-01-01

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data

  9. ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR

    Energy Technology Data Exchange (ETDEWEB)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-08-03

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be

  10. Energy-Harvesting Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Vuckovic, Dusan; Di Mauro, Alessio

    2012-01-01

    Energy Harvesting comprises a promising solution to one of the key problems faced by battery-powered Wireless Sensor Networks, namely the limited nature of the energy supply (finite battery capacity). By harvesting energy from the surrounding environment, the sensors can have a continuous lifetime...... without any needs for battery recharge or replacement. However, energy harvesting introduces a change to the fundamental principles based on which WSNs are designed and realized. In this poster we sketch some of the key research challenges as well as our ongoing work in designing and realizing Wireless...... Sensor Networks with energy harvesting capability....

  11. Stochastic petri nets for wireless networks

    CERN Document Server

    Lei, Lei; Zhong, Zhangdui

    2015-01-01

    This SpringerBrief presents research in the application of Stochastic Petri Nets (SPN) to the performance evaluation of wireless networks under bursty traffic. It covers typical Quality-of-Service performance metrics such as mean throughput, average delay and packet dropping probability. Along with an introduction of SPN basics, the authors introduce the key motivation and challenges of using SPN to analyze the resource sharing performance in wireless networks. The authors explain two powerful modeling techniques that treat the well-known state space explosion problem: model decomposition and

  12. RF microwave circuit design for wireless applications

    CERN Document Server

    Rohde, Ulrich L

    2012-01-01

    Provides researchers and engineers with a complete set of modeling, design, and implementation tools for tackling the newest IC technologies Revised and completely updated, RF/Microwave Circuit Design for Wireless Applications, Second Edition is a unique, state-of-the-art guide to wireless integrated circuit design that provides researchers and engineers with a complete set of modeling, design, and implementation tools for tackling even the newest IC technologies. It emphasizes practical design solutions for high-performance devices and circuitry, incorporating ample exa

  13. Thermoelectric Powered High Temperature Wireless Sensing

    Science.gov (United States)

    Kucukkomurler, Ahmet

    This study describes use of a thermoelectric power converter to transform waste heat into electrical energy to power an RF receiver and transmitter, for use in harsh environment wireless temperature sensing and telemetry. The sensing and transmitting module employs a DS-1820 low power digital temperature sensor to perform temperature to voltage conversion, an ATX-34 RF transmitter, an ARX-34 RF receiver module, and a PIC16f84A microcontroller to synchronize data communication between them. The unit has been tested in a laboratory environment, and promising results have been obtained for an actual automotive wireless under hood temperature sensing and telemetry implementation.

  14. Wireless Sensor Applications in Extreme Aeronautical Environments

    Science.gov (United States)

    Wilson, William C.; Atkinson, Gary M.

    2013-01-01

    NASA aeronautical programs require rigorous ground and flight testing. Many of the testing environments can be extremely harsh. These environments include cryogenic temperatures and high temperatures (greater than 1500 C). Temperature, pressure, vibration, ionizing radiation, and chemical exposure may all be part of the harsh environment found in testing. This paper presents a survey of research opportunities for universities and industry to develop new wireless sensors that address anticipated structural health monitoring (SHM) and testing needs for aeronautical vehicles. Potential applications of passive wireless sensors for ground testing and high altitude aircraft operations are presented. Some of the challenges and issues of the technology are also presented.

  15. Wireless vehicular networks for car collision avoidance

    CERN Document Server

    2013-01-01

    Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks. The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

  16. Wireless world widens nurse call options.

    Science.gov (United States)

    Baillie, Jonathan

    2014-01-01

    With wireless technology now an integral part of all our lives, and miniaturisation of computing power having made even hand-held portable devices such as mobile phones powerful tools in their own right, HEJ editor, Jonathan Baillie, spoke to specialist in wireless nurse call systems, Courtney-Thorne, to discuss some of its key recent product innovations, and see what impact it feels developments such as 'cloud' technology will have on the bringing of more technology into the nurse call sector as 'nurse and carer tools'.

  17. On the Conditional Entropy of Wireless Networks

    DEFF Research Database (Denmark)

    Coon, Justin P.; Badiu, Mihai Alin; Gündüz, Deniz

    2018-01-01

    The characterization of topological uncertainty in wireless networks using the formalism of graph entropy has received interest in the spatial networks community. In this paper, we develop lower bounds on the entropy of a wireless network by conditioning on potential network observables. Two...... approaches are considered: 1) conditioning on subgraphs, and 2) conditioning on node positions. The first approach is shown to yield a relatively tight bound on the network entropy. The second yields a loose bound, in general, but it provides insight into the dependence between node positions (modelled using...

  18. Novel Concepts of Cooperative Wireless Networking

    DEFF Research Database (Denmark)

    Zhang, Qi

    2008-01-01

    following a common strategy. Wireless devices share their resources (i.e. radio link, antenna, battery, processing unit, etc.) during cooperation using the short-range technology as the underlying communication platform. The amount of data exchanged over the short-range link diers from application......, quality of service, and so on....... to application. In some situations the short-range communication is not used at all in case all mobile devices have a predefined mutual understanding of their cooperativeness. The main reason of cooperation is threefold: first, the limit capability of wireless devices can be virtually enhanced by cooperation...

  19. Enabling Wireless Avionics Intra-Communications

    Science.gov (United States)

    Torres, Omar; Nguyen, Truong; Mackenzie, Anne

    2016-01-01

    The Electromagnetics and Sensors Branch of NASA Langley Research Center (LaRC) is investigating the potential of an all-wireless aircraft as part of the ECON (Efficient Reconfigurable Cockpit Design and Fleet Operations using Software Intensive, Networked and Wireless Enabled Architecture) seedling proposal, which is funded by the Convergent Aeronautics Solutions (CAS) project, Transformative Aeronautics Concepts (TAC) program, and NASA Aeronautics Research Institute (NARI). The project consists of a brief effort carried out by a small team in the Electromagnetic Environment Effects (E3) laboratory with the intention of exposing some of the challenges faced by a wireless communication system inside the reflective cavity of an aircraft and to explore potential solutions that take advantage of that environment for constructive gain. The research effort was named EWAIC for "Enabling Wireless Aircraft Intra-communications." The E3 laboratory is a research facility that includes three electromagnetic reverberation chambers and equipment that allow testing and generation of test data for the investigation of wireless systems in reflective environments. Using these chambers, the EWAIC team developed a set of tests and setups that allow the intentional variation of intensity of a multipath field to reproduce the environment of the various bays and cabins of large transport aircraft. This setup, in essence, simulates an aircraft environment that allows the investigation and testing of wireless communication protocols that can effectively be used as a tool to mitigate some of the risks inherent to an aircraft wireless system for critical functions. In addition, the EWAIC team initiated the development of a computational modeling tool to illustrate the propagation of EM waves inside the reflective cabins and bays of aircraft and to obtain quantifiable information regarding the degradation of signals in aircraft subassemblies. The nose landing gear of a UAV CAD model was used

  20. Topology Optimisation of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Thike Aye Min

    2016-01-01

    Full Text Available Wireless sensor networks are widely used in a variety of fields including industrial environments. In case of a clustered network the location of cluster head affects the reliability of the network operation. Finding of the optimum location of the cluster head, therefore, is critical for the design of a network. This paper discusses the optimisation approach, based on the brute force algorithm, in the context of topology optimisation of a cluster structure centralised wireless sensor network. Two examples are given to verify the approach that demonstrate the implementation of the brute force algorithm to find an optimum location of the cluster head.

  1. RF & wireless technologies know it all

    CERN Document Server

    Fette, Bruce A; Chandra, Praphul; Dobkin, Daniel M; Bensky, Dan; Miron, Douglas B; Lide, David; Dowla, Farid; Olexa, Ron

    2007-01-01

    The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!RF (radio frequency) and wireless technologies drive communication today. This technology and its applications enable wireless phones, portable device roaming, and short-range industrial and commercial application communication such as the supply chain management wonder, RFID. Up-to-date information regarding software defined R

  2. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  3. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  4. Advances in Antenna Technology for Wireless Handheld Devices

    Directory of Open Access Journals (Sweden)

    Jaume Anguera

    2013-01-01

    Full Text Available The constant evolution of wireless handheld devices together with the apparition of multiple wireless communication systems fosters the antenna community to design new radiating and measurements systems capable of satisfying the market demands. It is an object of the present paper to provide an overview of the evolution that wireless handheld technology has experienced in the last years. In this sense, a description of the evolution of wireless handheld devices, regulations, challenges in today’s smartphones, and handset characterization is reviewed. Finally, recent advances in antenna technology for wireless handheld or portable devices are presented.

  5. Wireless 3D Chocolate Printer

    Directory of Open Access Journals (Sweden)

    FROILAN G. DESTREZA

    2014-02-01

    Full Text Available This study is for the BSHRM Students of Batangas State University (BatStateU ARASOF for the researchers believe that the Wireless 3D Chocolate Printer would be helpful in their degree program especially on making creative, artistic, personalized and decorative chocolate designs. The researchers used the Prototyping model as procedural method for the successful development and implementation of the hardware and software. This method has five phases which are the following: quick plan, quick design, prototype construction, delivery and feedback and communication. This study was evaluated by the BSHRM Students and the assessment of the respondents regarding the software and hardware application are all excellent in terms of Accuracy, Effecitveness, Efficiency, Maintainability, Reliability and User-friendliness. Also, the overall level of acceptability of the design project as evaluated by the respondents is excellent. With regard to the observation about the best raw material to use in 3D printing, the chocolate is good to use as the printed material is slightly distorted,durable and very easy to prepare; the icing is also good to use as the printed material is not distorted and is very durable but consumes time to prepare; the flour is not good as the printed material is distorted, not durable but it is easy to prepare. The computation of the economic viability level of 3d printer with reference to ROI is 37.14%. The recommendation of the researchers in the design project are as follows: adding a cooling system so that the raw material will be more durable, development of a more simplified version and improving the extrusion process wherein the user do not need to stop the printing process just to replace the empty syringe with a new one.

  6. Downlink interference suppression of 802.11ac wireless network

    Directory of Open Access Journals (Sweden)

    WANG Huan

    2016-04-01

    Full Text Available In the 802.11ac wireless local area network,wireless intelligent devices(WID need to be connected to the network through the wireless access point(AP,and other wireless APs in the downlink transmission process will cause interference to the target WID.In this paper,we propose a method based on iterative minimum mean square error interference alignment,which can suppress the interference from the other wireless APs to the target WIDs.The wireless access terminal and wireless smart devices have designed linear precode and decode respectively.Under the minimum mean square error criterion and limitation the power constraint,optimal precode and decode can be received.Simulation results show that the proposed method,when the signal to noise ratio is 5 dB,the transmission rate of the unit bandwidth transmission rate is increased by 1 bit/s compared with the traditional Max-SINR algorithm.

  7. 2nd International Conference on Mobile and Wireless Technology

    CERN Document Server

    Wattanapongsakorn, Naruemon

    2015-01-01

    This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications.  The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security.   The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community.  The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software.  The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology...

  8. Using Wireless Network Coding to Replace a Wired with Wireless Backhaul

    DEFF Research Database (Denmark)

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    of wireless emulated wire (WEW), based on two-way relaying and network coding. This setup leads to a new type of broadcast problem, with decoding conditions that are specific to the requirement for equivalence to the wired backhaul. We formulate and solve the associated optimization problems. The proposed...... approach is a convincing argument that wireless backhauling solutions should be designed and optimized for two-way communication....

  9. Drexel Goes Wireless: Leading U.S. University Creates Fully Wireless Cyber Campus

    OpenAIRE

    Blackney, Ken; Bielec, John

    2001-01-01

    In 1997 Drexel began implementing its first CyberZone -- an area of continuous wireless network connectivity. Begun as a pilot project in the central library, CyberZones quickly proved to be both popular and practical. In 2000 Drexel became the first major university to implement a campus-wide, high-speed wireless network for all indoor and outdoor areas, including public spaces such as local train platforms and nearby cafes and restaurants. This presentation describes the technical, politica...

  10. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Weijian Tu

    2017-07-01

    Full Text Available Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  11. A Power Balance Aware Wireless Charger Deployment Method for Complete Coverage in Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Tu-Liang Lin

    2016-08-01

    Full Text Available Traditional sensor nodes are usually battery powered, and the limited battery power constrains the overall lifespan of the sensors. Recently, wireless power transmission technology has been applied in wireless sensor networks (WSNs to transmit wireless power from the chargers to the sensor nodes and solve the limited battery power problem. The combination of wireless sensors and wireless chargers forms a new type of network called wireless rechargeable sensor networks (WRSNs. In this research, we focus on how to effectively deploy chargers to maximize the lifespan of a network. In WSNs, the sensor nodes near the sink consume more power than nodes far away from the sink because of frequent data forwarding. This important power unbalanced factor has not been considered, however, in previous charger deployment research. In this research, a power balance aware deployment (PBAD method is proposed to address the power unbalance in WRSNs and to design the charger deployment with maximum charging efficiency. The proposed deployment method is effectively aware of the existence of the sink node that would cause unbalanced power consumption in WRSNs. The simulation results show that the proposed PBAD algorithm performs better than other deployment methods, and fewer chargers are deployed as a result.

  12. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks.

    Science.gov (United States)

    Tu, Weijian; Xu, Xianghua; Ye, Tingcong; Cheng, Zongmao

    2017-07-04

    Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node) as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP) to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  13. Smart Systems Integration for Autonomous Wireless Communications

    NARCIS (Netherlands)

    Danesh, M.

    2012-01-01

    Integration of sensors and wireless transceivers for system networking aims at emerging applications that are highly integrated, self-powered, and low cost, relying on efficient power management schemes to prolong lifetime, thus eliminating the need for batteries as a limited primary source of

  14. Wireless Battery Management System of Electric Transport

    Science.gov (United States)

    Rahman, Ataur; Rahman, Mizanur; Rashid, Mahbubur

    2017-11-01

    Electric vehicles (EVs) are being developed and considered as the future transportation to reduce emission of toxic gas, cost and weight. The battery pack is one of the main crucial parts of the electric vehicle. The power optimization of the battery pack has been maintained by developing a two phase evaporative thermal management system which operation has been controlled by using a wireless battery management system. A large number of individual cells in a battery pack have many wire terminations that are liable for safety failure. To reduce the wiring problem, a wireless battery management system based on ZigBee communication protocol and point-to-point wireless topology has been presented. Microcontrollers and wireless modules are employed to process the information from several sensors (voltage, temperature and SOC) and transmit to the display devices respectively. The WBMS multistage charge balancing system offering more effective and efficient responses for several numbers of series connected battery cells. The concept of double tier switched capacitor converter and resonant switched capacitor converter is used for reducing the charge balancing time of the cells. The balancing result for 2 cells and 16 cells are improved by 15.12% and 25.3% respectively. The balancing results are poised to become better when the battery cells are increased.

  15. Center of Excellence in Wireless Technology Objectives

    Indian Academy of Sciences (India)

    align their pre-competitive R&D efforts. Feed Indian requirements and specifications in International wireless Standards bodies. Develop IPR suitable for inclusion in 4G standards. Focus on Indian requirements (high system capacity). Involve all IITs/IISc in the IPR-driven research effort. Early technology trials of Indian-made ...

  16. Topological properties of random wireless networks

    Indian Academy of Sciences (India)

    http://www.ias.ac.in/article/fulltext/sadh/031/02/0117-0139 ... Abstract. Wireless networks in which the node locations are random are best modelled as random geometric graphs (RGGs). ... We then discuss some asymptotic results for networks in higher dimensions when the nodes are distributed in a finite volume. Finally ...

  17. 77 FR 64446 - Wireless Microphones Proceeding

    Science.gov (United States)

    2012-10-22

    ... to balance the needs of potential new classes of wireless microphone licensees with those of other... undercut that balance by significantly reducing the amount of spectrum available for other uses, such as by..., a space capacity-rated for 3,000 people; for sports venues, a minimum of 10,000 seats for indoors...

  18. How to secure a wireless sensor network

    NARCIS (Netherlands)

    Law, Y.W.; Havinga, Paul J.M.

    2005-01-01

    The security of wireless sensor networks (WSNs) is a complex issue. While security research of WSNs is progressing at a tremendous pace, and many security techniques have been proposed, no comprehensive framework has so far emerged that attempts to tie the bits and pieces together to ease the

  19. Load balancing in integrated optical wireless networks

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars; Wong, S-W.

    2010-01-01

    In this paper, we tackle the load balancing problem in Integrated Optical Wireless Networks, where cell breathing technique is used to solve congestion by changing the coverage area of a fully loaded cell tower. Our objective is to design a load balancing mechanism which works closely with the in...

  20. Wireless battery management control and monitoring system

    Science.gov (United States)

    Zumstein, James M.; Chang, John T.; Farmer, Joseph C.; Kovotsky, Jack; Lavietes, Anthony; Trebes, James Edward

    2018-01-16

    A battery management system using a sensor inside of the battery that sensor enables monitoring and detection of various events in the battery and transmission of a signal from the sensor through the battery casing to a control and data acquisition module by wireless transmission. The detection of threshold events in the battery enables remedial action to be taken to avoid catastrophic events.

  1. REAL TIME WIRELESS AIR POLLUTION MONITORING SYSTEM

    Directory of Open Access Journals (Sweden)

    Raja Vara Prasad Y

    2011-06-01

    Full Text Available Air pollution has significant influence on the concentration of constituents in the atmosphere leading to effects like global warming and acid rains. To avoid such adverse imbalances in the nature, an air pollution monitoring system is utmost important. This paper attempts to develop an effective solution for pollution monitoring using wireless sensor networks (WSN on a real time basis namely real time wireless air pollution monitoring system. Commercially available discrete gas sensors for sensing concentration of gases like CO2, NO2, CO and O2 are calibrated using appropriate calibration technologies. These pre-calibrated gas sensors are then integrated with the wireless sensor motes for field deployment at the campus and the Hyderabad city using multi hop data aggregation algorithm. A light weight middleware and a web interface to view the live pollution data in the form of numbers and charts from the test beds was developed and made available from anywhere on the internet. Other parameters like temperature and humidity were also sensed along with gas concentrations to enable data analysis through data fusion techniques. Experimentation carried out using the developed wireless air pollution monitoring system under different physical conditions show that the system collects reliable source of real time fine-grain pollution data.

  2. Optical wireless connected objects for healthcare.

    Science.gov (United States)

    Toumieux, Pascal; Chevalier, Ludovic; Sahuguède, Stéphanie; Julien-Vergonjanne, Anne

    2015-10-01

    In this Letter the authors explore the communication capabilities of optical wireless technology for a wearable device dedicated to healthcare application. In an indoor environment sensible to electromagnetic perturbations such as a hospital, the use of optical wireless links can permit reducing the amount of radio frequencies in the patient environment. Moreover, this technology presents the advantage to be secure, low-cost and easy to deploy. On the basis of commercially available components, a custom-made wearable device is presented, which allows optical wireless transmission of accelerometer data in the context of physical activity supervision of post-stroke patients in hospital. Considering patient mobility, the experimental performance is established in terms of packet loss as a function of the number of receivers fixed to the ceiling. The results permit to conclude that optical wireless links can be used to perform such mobile remote monitoring applications. Moreover, based on the measurements obtained with one receiver, it is possible to theoretically determine the performance according to the number of receivers to be deployed.

  3. An underwater optical wireless communication network

    Science.gov (United States)

    Arnon, Shlomi

    2009-08-01

    The growing need for underwater observation and sub-sea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, bio-geochemical, evolutionary and ecological changes in the sea, ocean and lake environments and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. We present models of three kinds of optical wireless communication links a) a line-of-sight link, b) a modulating retro-reflector link and c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered lighted it was possible to mitigate this decrease in some cases. We conclude from the analysis that a high data rate underwater optical wireless network is a feasible solution for emerging applications such as UUV to UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  4. Wireless Wide Area Networks for School Districts.

    Science.gov (United States)

    Nair, Prakash

    This paper considers a basic question that many schools districts face in attempting to develop affordable, expandable district-wide computer networks that are resistant to obsolescence: Should these wide area networks (WANs) employ wireless technology, stick to venerable hard-wired solutions, or combine both. This publication explores the…

  5. Fixed Wireless may be a temporary answer

    Indian Academy of Sciences (India)

    Possible to enhance throughput by 4 with respect to Mobile Wireless. And get 8 to 10 bps / Hz / cell; Examples: BB corDECT: today provides 256/512kbps to each connection in fixed environment. Ideal for small town / rural Broadband. Fixed 802.16d/e does the same in but at much higher price-points.

  6. IPv6 for Future Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard

    2001-01-01

    The functionalities of the next generation Internet protocol, IPv6, havebecome increasingly interesting due to the current merging of the traditionalcellular mobile communications and the traditional data-communications intothe future wireless systems, as e.g., UMTS. IPv6 provides several...

  7. Wireless Sensor Networks TestBed: ASNTbed

    CSIR Research Space (South Africa)

    Dludla, AG

    2013-05-01

    Full Text Available -1 IST-Africa 2013 Conference Proceedings, Nairobi, Kenya, 29 - 31 May 2013 Wireless Sensor Networks TestBed: ASNTbed Angeline G. DLUDLA, Adnan M. ABU-MAHFOUZ, Carel P. KRUGER, John S. ISAAC Advanced Sensor Networks Research Group, CSIR Meraka...

  8. University Undergraduate Students, Perceptions of The Wireless ...

    African Journals Online (AJOL)

    The study focused on Uni versity Undergraduate students' perceptions of the use of the wireless internet of Abubakar Tafawa Balewa University, Bauchi, Nigeria. Using emperical and new field data, this exploratory study investigated the students' perceptions of internet use in relation to library use. The study adopted a ...

  9. Clock Synchronization for Multihop Wireless Sensor Networks

    Science.gov (United States)

    Solis Robles, Roberto

    2009-01-01

    In wireless sensor networks, more so generally than in other types of distributed systems, clock synchronization is crucial since by having this service available, several applications such as media access protocols, object tracking, or data fusion, would improve their performance. In this dissertation, we propose a set of algorithms to achieve…

  10. Terahertz (THz) Wireless Systems for Space Applications

    Science.gov (United States)

    Hwu, Shian U.; deSilva, Kanishka B.; Jih, Cindy T.

    2013-01-01

    NASA has been leading the Terahertz (THz) technology development for the sensors and instruments in astronomy in the past 20 years. THz technologies are expanding into much broader applications in recent years. Due to the vast available multiple gigahertz (GHz) broad bandwidths, THz radios offer the possibility for wireless transmission of high data rates. Multi-Gigabits per second (MGbps) broadband wireless access based on THz waves are closer to reality. The THz signal high atmosphere attenuation could significantly decrease the communication ranges and transmittable data rates for the ground systems. Contrary to the THz applications on the ground, the space applications in the atmosphere free environment do not suffer the atmosphere attenuation. The manufacturing technologies for the THz electronic components are advancing and maturing. There is great potential for the NASA future high data wireless applications in environments with difficult cabling and size/weight constraints. In this study, the THz wireless systems for potential space applications were investigated. The applicability of THz systems for space applications was analyzed. The link analysis indicates that MGbps data rates are achievable with compact sized high gain antennas.

  11. Experimental validation of wireless communication with chaos

    Energy Technology Data Exchange (ETDEWEB)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian [Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing, Xian University of Technology, Xian 710048 (China); Baptista, Murilo S.; Grebogi, Celso [Institute for Complex System and Mathematical Biology, SUPA, University of Aberdeen, Aberdeen AB24 3UE (United Kingdom)

    2016-08-15

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  12. Routing in Wireless Multimedia Home Networks

    NARCIS (Netherlands)

    Scholten, Johan; Jansen, P.G.; Hop, Laurens

    This paper describes an adapted version of the destination sequenced distance vector routing protocol (DSDV) which is suitable to calculate routes in a wireless ¿real-time¿ home network. The home network is based on a IEEE 802.11b ad hoc network and uses a scheduled token to enforce real-time

  13. Collaborative communication protocols for wireless sensor networks

    NARCIS (Netherlands)

    Dulman, S.O.; van Hoesel, L.F.W.; Nieberg, T.; Havinga, Paul J.M.

    In this document, the design of communication within a wireless sensor network is discussed. The resource limitations of such a network, especially in terms of energy, require an integrated approach for all (traditional) layers of communication. We present such an integrated, collaborative approach

  14. Routing in Wireless Multimedia Home Networks

    NARCIS (Netherlands)

    Scholten, Johan; Jansen, P.G.; Hop, Laurens

    This paper describes an adapted version of the destination sequenced distance vector routing protocol (DSDV) which is suitable to calculate routes in a wireless real-time home network. The home network is based on a IEEE 802.11b ad hoc network and uses a scheduled token to enforce real-time

  15. Wireless IP and building the mobile Internet

    National Research Council Canada - National Science Library

    Dixit, Sudhir; Prasad, Ramjee

    2003-01-01

    ..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...

  16. Censored cooperative positioning for dense wireless networks

    NARCIS (Netherlands)

    Das, Kallol; Wymeersch, Henk

    Cooperative positioning is an emerging topic in wireless sensor networks and navigation. It can improve the positioning accuracy and coverage in GPS-challenged conditions such as inside tunnels, in urban canyons, and indoors. Different algorithms have been proposed relying on iteratively exchanging

  17. Wireless Capsule Enteroscopy in Healthy Volunteers.

    Science.gov (United States)

    Tachecí, Ilja; Bradna, Petr; Douda, Tomáš; Baštecká, Drahomíra; Kopáčová, Marcela; Rejchrt, Stanislav; Lutonský, Martin; Soukup, Tomáš; Bureš, Jan

    The aim of our prospective study was to define endoscopy appearance of the small bowel in healthy volunteers. Forty-two healthy volunteers underwent wireless capsule endoscopy, clinical investigation, laboratory tests, and completed a health-status questionnaire. All subjects were available for a 36-month clinical follow-up. Eleven subjects (26%) had fully normal endoscopy findings. Remaining 31 persons (74%), being asymptomatic, with normal laboratory results, had some minor findings at wireless capsule endoscopy. Most of those heterogeneous findings were detected in the small intestine (27/31; 87%), like erosions and/or multiple red spots, diminutive polyps and tiny vascular lesions. During a 36-month clinical follow-up, all these 42 healthy volunteers remained asymptomatic, with fully normal laboratory control. Significant part of healthy subjects had abnormal findings at wireless capsule endoscopy. These findings had no clinical relevance, as all these persons remained fully asymptomatic during a 36-month follow-up. Such an endoscopic appearance would be previously evaluated as "pathological". This is a principal report alerting that all findings of any control group of wireless capsule endoscopic studies must be evaluated with caution.

  18. Wireless Capsule Enteroscopy in Healthy Volunteers

    Directory of Open Access Journals (Sweden)

    Ilja Tachecí

    2016-09-01

    Full Text Available Introduction: The aim of our prospective study was to define endoscopy appearance of the small bowel in healthy volunteers. Method: Forty-two healthy volunteers underwent wireless capsule endoscopy, clinical investigation, laboratory tests, and completed a health-status questionnaire. All subjects were available for a 36-month clinical follow-up. Results: Eleven subjects (26% had fully normal endoscopy findings. Remaining 31 persons (74%, being asymptomatic, with normal laboratory results, had some minor findings at wireless capsule endoscopy. Most of those heterogeneous findings were detected in the small intestine (27/31; 87%, like erosions and/or multiple red spots, diminutive polyps and tiny vascular lesions. During a 36-month clinical follow-up, all these 42 healthy volunteers remained asymptomatic, with fully normal laboratory control. Conclusions: Significant part of healthy subjects had abnormal findings at wireless capsule endoscopy. These findings had no clinical relevance, as all these persons remained fully asymptomatic during a 36-month follow-up. Such an endoscopic appearance would be previously evaluated as “pathological”. This is a principal report alerting that all findings of any control group of wireless capsule endoscopic studies must be evaluated with caution.

  19. .Net Gadgeteer Application Development Using Wireless Communications

    Directory of Open Access Journals (Sweden)

    Karla SLADKÁ

    2015-11-01

    Full Text Available The article describes the application development on Microsoft platform .NET Gadgeteer, which is part of the .NET Micro Framework. Application development is introduced to applications using ethernet network communication and wireless communication between developments boards connected with the sensor modules.

  20. Technical Challenges Hindering Development of Robust Wireless ...

    African Journals Online (AJOL)

    Wireless communications is the fastest growing sector of the communications industry and as such, it has captured the attention of the media and the imagination of the public. Cellular phones have experienced exponential growth over the last two decades, and this growth has continued unabated worldwide, with more ...

  1. Benchmarking Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    2004-01-01

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for

  2. Marginal Expense Oil Well Wireless Surveillance (MEOWWS)

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Donald G.

    2002-03-11

    The objective of this study was to identify and field test a new, low cost, wireless oil well surveillance system. A variety of suppliers and technologies were considered. One supplier and system was chosen that was low cost, new to the oil field, and successfully field tested.

  3. Energy Aware Computing in Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    the unreliable wireless link. Principles of multi–processor energy aware task scheduling are used exploiting performance scalable technologies such as Dynamic Voltage Scaling (DVS). We introduce a novel mechanism referred to as D2VS and here it is shown by means of simulation that savings of 40% can be achieved....

  4. Wireless sensor networks principles, design and applications

    CERN Document Server

    Yang, Shuang-Hua

    2014-01-01

    Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: ·         sensor node design; ·         embedded software design; ·         routing algorithms; ·         sink node positioning; ·         co-existence with other wireless systems; ·         data fusion; ·         security; ·         indoor location tracking; ·         integrating with radio-frequency identification; and ·         In...

  5. Experimental validation of wireless communication with chaos

    Science.gov (United States)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian; Baptista, Murilo S.; Grebogi, Celso

    2016-08-01

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  6. Service discovery in heterogeneous wireless networks

    NARCIS (Netherlands)

    Blangé, M.J.; Karkowski, I.P.; Vermeulen, B.C.B.

    2005-01-01

    In this paper we describe a possible solution to the problem of service discovery in heterogeneous wireless networks. This solution involves introduction of a network independent service discovery layer, with as main goal the improved robustness of applications running on top of it. A possible

  7. Free positioning for inductive wireless power system

    NARCIS (Netherlands)

    Waffenschmidt, E.

    2012-01-01

    In inductive wireless power transmission system a lateral displacement of the receiver coil to the transmitter coil leads to a change ofthe coupling factor and thus an unwanted variation of the power transfer. Here, an algorithm to determine the turn distribution to achieve homogeneous coupling

  8. TRICALCAR : Weaving Community Based Wireless Networks in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... wireless champions by facilitating the exchange of knowledge between them and with other like-minded actors in the region. The training materials and knowledge gained during the experience will be documented and made available online. The idea is to improve Internet access in rural and urban marginalized areas at ...

  9. DAWN: Dynamic Ad-hoc Wireless Network

    Science.gov (United States)

    2016-06-19

    Wireless Network 1 Introduction The network-centric battlefield includes sensors, troop carriers, unmanned air vehicle (UAV), aircraft, smart ...Bellman Control Heritage Award. • Honorary Doctorate at Technical University of Crete. • Best paper award at 2008 IEEE International Conference on Mobile Ad-hoc and Sensor Systems.

  10. Problem solving for wireless sensor networks

    CERN Document Server

    Garcia-Hernando, Ana-Belen; Lopez-Navarro, Juan-Manuel; Prayati, Aggeliki; Redondo-Lopez, Luis

    2008-01-01

    Wireless Sensor Networks (WSN) is an area of huge research interest, attracting substantial attention from industry and academia for its enormous potential and its inherent challenges. This reader-friendly text delivers a comprehensive review of the developments related to the important technological issues in WSN.

  11. Fully Passive Wireless Acquisition of Neuropotentials

    Science.gov (United States)

    Schwerdt, Helen N.

    The ability to monitor electrophysiological signals from the sentient brain is requisite to decipher its enormously complex workings and initiate remedial solutions for the vast amount of neurologically-based disorders. Despite immense advancements in creating a variety of instruments to record signals from the brain, the translation of such neurorecording instrumentation to real clinical domains places heavy demands on their safety and reliability, both of which are not entirely portrayed by presently existing implantable recording solutions. In an attempt to lower these barriers, alternative wireless radar backscattering techniques are proposed to render the technical burdens of the implant chip to entirely passive neurorecording processes that transpire in the absence of formal integrated power sources or powering schemes along with any active circuitry. These radar-like wireless backscattering mechanisms are used to conceive of fully passive neurorecording operations of an implantable microsystem. The fully passive device potentially manifests inherent advantages over current wireless implantable and wired recording systems: negligible heat dissipation to reduce risks of brain tissue damage and minimal circuitry for long term reliability as a chronic implant. Fully passive neurorecording operations are realized via intrinsic nonlinear mixing properties of the varactor diode. These mixing and recording operations are directly activated by wirelessly interrogating the fully passive device with a microwave carrier signal. This fundamental carrier signal, acquired by the implant antenna, mixes through the varactor diode along with the internal targeted neuropotential brain signals to produce higher frequency harmonics containing the targeted neuropotential signals. These harmonics are backscattered wirelessly to the external interrogator that retrieves and recovers the original neuropotential brain signal. The passive approach removes the need for internal power

  12. Implementing honeypots as part of a simple cost effective wireless intrusion detection system

    CSIR Research Space (South Africa)

    Velupillai, HM

    2007-09-01

    Full Text Available of wireless networks to implement the wired network design of a honeypot. The paper also provides a script that allows the Atheros chipset to be modified to implement multiple wireless access points on one wireless card...

  13. Wireless networking for the dental office: current wireless standards and security protocols.

    Science.gov (United States)

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  14. An 802.11 n wireless local area network transmission scheme for wireless telemedicine applications.

    Science.gov (United States)

    Lin, C F; Hung, S I; Chiang, I H

    2010-10-01

    In this paper, an 802.11 n transmission scheme is proposed for wireless telemedicine applications. IEEE 802.11n standards, a power assignment strategy, space-time block coding (STBC), and an object composition Petri net (OCPN) model are adopted. With the proposed wireless system, G.729 audio bit streams, Joint Photographic Experts Group 2000 (JPEG 2000) clinical images, and Moving Picture Experts Group 4 (MPEG-4) video bit streams achieve a transmission bit error rate (BER) of 10-7, 10-4, and 103 simultaneously. The proposed system meets the requirements prescribed for wireless telemedicine applications. An essential feature of this proposed transmission scheme is that clinical information that requires a high quality of service (QoS) is transmitted at a high power transmission rate with significant error protection. For maximizing resource utilization and minimizing the total transmission power, STBC and adaptive modulation techniques are used in the proposed 802.11 n wireless telemedicine system. Further, low power, direct mapping (DM), low-error protection scheme, and high-level modulation are adopted for messages that can tolerate a high BER. With the proposed transmission scheme, the required reliability of communication can be achieved. Our simulation results have shown that the proposed 802.11 n transmission scheme can be used for developing effective wireless telemedicine systems.

  15. Development of Wireless RFID Glove for Various Applications

    Science.gov (United States)

    Lee, Changwon; Kim, Minchul; Park, Jinwoo; Oh, Jeonghoon; Eom, Kihwan

    Radio Frequency Identification is increasingly popular technology with many applications. The majority of applications of RFID are supply-chain management. In this paper, we proposed the development of wireless RFID Glove for various applications in real life. Proposed wireless RFID glove is composed of RFID reader of 13.56 MHz and RF wireless module. Proposed Gloves were applied to two applications. First is the interactive leaning and second is Meal aid system for blind people. The experimental results confirmed good performances.

  16. Sub-Frame Crossing for Streaming Video over Wireless Networks

    OpenAIRE

    Aziz, Hussein Muzahim; Grahn, Håkan; Lundberg, Lars

    2010-01-01

    Transmitting a real time video streaming over a wireless network cannot guarantee that all the frames could be received by the mobile devices. The characteristics of a wireless network in terms of the available bandwidth, frame delay, and frame losses cannot be known in advanced. In this work, we propose a new mechanism for streaming video over a wireless channel. The proposed mechanism prevents freezing frames in the mobile devices. This is done by splitting the video frame in two sub-frames...

  17. Wireless multimedia communication systems design, analysis, and implementation

    CERN Document Server

    Rao, KR; Bakmaz, Bojan M

    2014-01-01

    Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to answer those questions by not only covering the underlying concepts involved in the design, analysis, and implementation of wireless multimedia communication systems, but also by tackling advanced topics such as mobility management, security components, and smart grids.Offering an accessible treatment

  18. Final Scientific Report - Wireless and Sensing Solutions Advancing Industrial Efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Budampati, Rama; McBrady, Adam; Nusseibeh, Fouad

    2009-09-28

    The project team's goal for the Wireless and Sensing Solution Advancing Industrial Efficiency award (DE-FC36-04GO14002) was to develop, demonstrate, and test a number of leading edge technologies that could enable the emergence of wireless sensor and sampling systems for the industrial market space. This effort combined initiatives in advanced sensor development, configurable sampling and deployment platforms, and robust wireless communications to address critical obstacles in enabling enhanced industrial efficiency.

  19. Cooperative Technique Based on Sensor Selection in Wireless Sensor Network

    OpenAIRE

    ISLAM, M. R.; KIM, J.

    2009-01-01

    An energy efficient cooperative technique is proposed for the IEEE 1451 based Wireless Sensor Networks. Selected numbers of Wireless Transducer Interface Modules (WTIMs) are used to form a Multiple Input Single Output (MISO) structure wirelessly connected with a Network Capable Application Processor (NCAP). Energy efficiency and delay of the proposed architecture are derived for different combination of cluster size and selected number of WTIMs. Optimized constellation parameters are used for...

  20. Optical Wireless Communications and Autonomous Beam Control Moving User Terminal

    OpenAIRE

    TANGTRONGBENCHASIL, Charoen; HAMADA, Yoichi; KATO, Toshihiro; NONAKA, Koji

    2007-01-01

    Optical wireless communications is a research topic of extreme interest since it offers high data rate (Gbps data rate), security, and RF interference immunity. However, optical wireless communications places severe restrictions on the communications paths; they must be direct beam connections. To increase the number of users and link robustness, optical wireless communications must be able to operate even when obstacles are placed between transmitters and receivers, so optical micro-cell (OM...

  1. Multi-Domain SDN Survivability for Agricultural Wireless Sensor Networks

    OpenAIRE

    Huang, Tao; Yan, Siyu; Yang, Fan; Liu, Jiang

    2016-01-01

    Wireless sensor networks (WSNs) have been widely applied in agriculture field; meanwhile, the advent of multi-domain software-defined networks (SDNs) have improved the wireless resource utilization rate and strengthened network management. In recent times, multi-domain SDNs have been applied to agricultural sensor networks, namely multi-domain software-defined wireless sensor networks (SDWSNs). However, when the SDNs controlling agriculture networks suddenly become unavailable, whether intra-...

  2. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  3. Patient monitoring using infrastructure-oriented wireless LANs.

    Science.gov (United States)

    Varshney, Upkar

    2006-01-01

    There is considerable interest in using wireless and mobile technologies in patient monitoring in diverse environments including hospitals and nursing homes. However, there has not been much work in determining the requirements of patient monitoring and satisfying these requirements using infrastructure-oriented wireless networks. In this paper, we derive several requirements of patient monitoring and show how infrastructure-oriented wireless LANs, such as versions of IEEE 802.11, can be used to support patient monitoring in diverse environments.

  4. Politecast - a new communication primitive for wireless sensor networks

    OpenAIRE

    Lundén, Marcus

    2010-01-01

    Wireless sensor networks have the potential for becoming a huge market. Ericsson predicts 50 billion devices interconnected to the Internet by the year 2020. Before that, the devices must be made to be able to withstand years of usage without having to change power source as that would be too costly. These devices are typically small, inexpensive and severally resource constrained. Communication is mainly wireless, and the wireless transceiver on the node is typically the most power hungry co...

  5. Wireless data transmission for high energy physics applications

    OpenAIRE

    Dittmeier, Sebastian; Brenner, Richard; Dancila, Dragos; Gustafsson, Leif; Rydberg, Anders; Yang, Shiming

    2017-01-01

    Silicon tracking detectors operated at high luminosity collider experiments pose a challenge for current and future readout systems regarding bandwidth, radiation, space and power constraints. With the latest developments in wireless communications, wireless readout systems might be an attractive alternative to commonly used wired optical and copper based readout architectures. The WADAPT group (Wireless Allowing Data and Power Transmission) has been formed to study the feasibility of wire...

  6. Optical wireless communications an emerging technology

    CERN Document Server

    Capsoni, Carlo; Ghassemlooy, Zabih; Boucouvalas, Anthony; Udvary, Eszter

    2016-01-01

    This book focuses on optical wireless communications (OWC), an emerging technology with huge potential for the provision of pervasive and reliable next-generation communications networks. It shows how the development of novel and efficient wireless technologies can contribute to a range of transmission links essential for the heterogeneous networks of the future to support various communications services and traffic patterns with ever-increasing demands for higher data-transfer rates. The book starts with a chapter reviewing the OWC field, which explains different sub-technologies (visible-light, ultraviolet (UV) and infrared (IR) communications) and introduces the spectrum of application areas (indoor, vehicular, terrestrial, underwater, intersatellite, deep space, etc.). This provides readers with the necessary background information to understand the specialist material in the main body of the book, which is in four parts. The first of these deals with propagation modelling and channel characterization of ...

  7. LiFi: transforming fibre into wireless

    Science.gov (United States)

    Yin, Liang; Islim, Mohamed Sufyan; Haas, Harald

    2017-01-01

    Light-fidelity (LiFi) uses energy-efficient light-emitting diodes (LEDs) for high-speed wireless communication, and it has a great potential to be integrated with fibre communication for future gigabit networks. However, by making fibre communication wireless, multiuser interference arises. Traditional methods use orthogonal multiple access (OMA) for interference avoidance. In this paper, multiuser interference is exploited with the use of non-orthogonal multiple access (NOMA) relying on successive interference cancellation (SIC). The residual interference due to imperfect SIC in practical scenarios is characterized with a proportional model. Results show that NOMA offers 5 -10 dB gain on the equivalent signal-to-interference-plus-noise ratio (SINR) over OMA. The bit error rate (BER) performance of direct current optical orthogonal frequency division multiplexing (DCO-OFDM) is shown to be significantly improved when SIC is used.

  8. Signal Processing for Improved Wireless Receiver Performance

    DEFF Research Database (Denmark)

    Christensen, Lars P.B.

    2007-01-01

    by allowing an increased reuse of network resources. To achieve this goal, one must first understand the nature of the problem and an introduction is therefore provided. In addition, the concept of graph-based models and approximations for wireless communications is introduced along with various Belief......This thesis is concerned with signal processing for improving the performance of wireless communication receivers for well-established cellular networks such as the GSM/EDGE and WCDMA/HSPA systems. The goal of doing so, is to improve the end-user experience and/or provide a higher system capacity...... Propagation (BP) methods for detecting the transmitted information, including the Turbo principle. Having established a framework for the research, various approximate detection schemes are discussed. First, the general form of linear detection is presented and it is argued that this may be preferable...

  9. Achieving single channel, full duplex wireless communication

    KAUST Repository

    Choi, Jung Il

    2010-01-01

    This paper discusses the design of a single channel full-duplex wireless transceiver. The design uses a combination of RF and baseband techniques to achieve full-duplexing with minimal effect on link reliability. Experiments on real nodes show the full-duplex prototype achieves median performance that is within 8% of an ideal full-duplexing system. This paper presents Antenna Cancellation, a novel technique for self-interference cancellation. In conjunction with existing RF interference cancellation and digital baseband interference cancellation, antenna cancellation achieves the amount of self-interference cancellation required for full-duplex operation. The paper also discusses potential MAC and network gains with full-duplexing. It suggests ways in which a full-duplex system can solve some important problems with existing wireless systems including hidden terminals, loss of throughput due to congestion, and large end-to-end delays. Copyright 2010 ACM.

  10. Analyzing Options for Airborne Emergency Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Michael Schmitt; Juan Deaton; Curt Papke; Shane Cherry

    2008-03-01

    In the event of large-scale natural or manmade catastrophic events, access to reliable and enduring commercial communication systems is critical. Hurricane Katrina provided a recent example of the need to ensure communications during a national emergency. To ensure that communication demands are met during these critical times, Idaho National Laboratory (INL) under the guidance of United States Strategic Command has studied infrastructure issues, concerns, and vulnerabilities associated with an airborne wireless communications capability. Such a capability could provide emergency wireless communications until public/commercial nodes can be systematically restored. This report focuses on the airborne cellular restoration concept; analyzing basic infrastructure requirements; identifying related infrastructure issues, concerns, and vulnerabilities and offers recommended solutions.

  11. Wireless data over RAM's Mobitex network

    Science.gov (United States)

    Khan, M. Mobeen

    1995-12-01

    Mobitex is a mobile data technology standard created by Eritel, now a wholly owned subsidiary of Ericsson, that has been in existence for about a decade. Originally designed as a low speed (1.2 kbps) data system with a voice dispatch overlay, it was significantly enhanced in 1990 for use in North America and the UK. The enhanced system is a data-only system using cellular architecture and multi-channel frequency reuse, store-and-forward capability, and an 8 kbps over-the-air data rate. The mission of RAM Mobile Data USA Limited Partnership ('RAM') is to provide high quality, cost efficient, wireless data communications solutions in its targeted market segments. RAM's Mobitex network is currently one of the two networks providing two way wireless data services nationwide using a long distance service provider of the customer's choice.

  12. Kilavi platform for wireless building automation

    Energy Technology Data Exchange (ETDEWEB)

    Oksa, P.; Soini, M.; Sydaenheimo, L.; Kivikoski, M. [Rauma Research Unit, Electronics Institute, Tampere University of Technology, Kalliokatu 2, 26100 Rauma (Finland)

    2008-07-01

    The focus of this paper is on building control and monitoring systems. Traditionally these systems are based on wires and cables. A wireless approach can bring benefits to system flexibility, installation (new sites and buildings under retrofit), and financial issues. This paper presents an application-specific wireless Kilavi platform developed for building control purposes. Kilavi provides the means for open standard manufacturer-independent communication between different sensors and actuators. Heating, ventilation, air-conditioning, lighting, temperature and humidity measurement, and access control appliances can interact with each other with defined Kilavi messages and functions. Linking up these appliances into a single all-inclusive building control system offers a dexterous interface for the user to control building conditions and the interesting possibility of developing novel and varied building control applications to improve energy efficiency, security and living conditions. (author)

  13. QoE management in wireless networks

    CERN Document Server

    Wang, Ying; Zhang, Ping

    2017-01-01

    This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.

  14. Fading and shadowing in wireless systems

    CERN Document Server

    Shankar, P Mohana

    2017-01-01

    This book offers a comprehensive overview of fading and shadowing in wireless channels. A number of statistical models including simple, hybrid, compound and cascaded ones are presented along with a detailed discussion of diversity techniques employed to mitigate the effects of fading and shadowing. The effects of co-channel interference before and after the implementation of diversity are also analyzed. To facilitate easy understanding of the models and the analysis, the background on probability and random variables is presented with relevant derivations of densities of the sums, products, ratios as well as order statistics of random variables. The book also provides material on digital modems of interest in wireless systems. The updated edition expands the background materials on probability by offering sections on Laplace and Mellin transforms, parameter estimation, statistical testing and receiver operating characteristics. Newer models for fading, shadowing and shadowed fading are included along with th...

  15. Photonic generation for multichannel THz wireless communication.

    Science.gov (United States)

    Shams, Haymen; Fice, Martyn J; Balakier, Katarzyna; Renaud, Cyril C; van Dijk, Frédéric; Seeds, Alwyn J

    2014-09-22

    We experimentally demonstrate photonic generation of a multichannel THz wireless signal at carrier frequency 200 GHz, with data rate up to 75 Gbps in QPSK modulation format, using an optical heterodyne technique and digital coherent detection. BER measurements were carried out for three subcarriers each modulated with 5 Gbaud QPSK or for two subcarriers modulated with 10 Gbaud QPSK, giving a total speed of 30 Gbps or 40 Gbps, respectively. The system evaluation was also performed with three subcarriers modulated with 12.5 Gbaud QPSK (75 Gbps total) without and with 40 km fibre transmission. The proposed system enhances the capacity of high-speed THz wireless transmission by using spectrally efficient modulated subcarriers spaced at the baud rate. This approach increases the overall transmission capacity and reduces the bandwidth requirement for electronic devices.

  16. Transparent data service with multiple wireless access

    Science.gov (United States)

    Dean, Richard A.; Levesque, Allen H.

    The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.

  17. Fading and Shadowing in Wireless Systems

    CERN Document Server

    Shankar, P Mohana

    2012-01-01

    In recent decades, growth in the field of wireless communications has led to an exponential rise in the number of journals catering to the research community. Still unmet, however, is the need to fully and comprehensively understand the effects of channel degradation brought on by the statistical fluctuations in the channel. These fluctuations mainly manifest as variations in signal power observed in the channel generally modeled using a variety of probability distributions, both in straight forms as well as in compound forms. While the former might explain some of the effects, it is the latter, namely, the compound models, which incorporate both short term and long term power fluctuations in the channel, explain the much more complex nature of the signals in these channels. Fading and Shadowing in Wireless Systems offers a pedagogical approach to the topic, with insight into the modeling and analysis of fading and shadowing. Beginning with statistical background and digital communications, the book is formul...

  18. Sensor Network in the Wireless UHF Band

    Science.gov (United States)

    Mariño, P.; Fontán, F. P.; Domínguez, M. A.; Otero, S.

    Biological research in agriculture needs a lot of specialized electronic sensors in order to fulfill different goals, like as: climate monitoring, soil and fruit assessment, control of insects and diseases, chemical pollutants, identification and control of weeds, crop tracking, and so on. That research must be supported by consistent biological models able to simulate diverse environmental conditions, in order to predict the right human actions before risky biological damage could be irreversible. In this paper an experimental distributed network based on climatic and biological wireless sensors is described, for providing real measurements in order to validate different biological models used for viticulture applications. Firstly the experimental network for field automatic data acquisition is presented, as a system based in a distributed process. Then, the design of the wireless network is explained in detail, with a previous discussion about the state-of-the-art, and some measurements for viticulture research are pointed out. Finally future developments and conclusions are stated.

  19. RF Transceiver Design for MIMO Wireless Communications

    CERN Document Server

    Mohammadi, Abbas

    2012-01-01

    This practical resource offers a thorough examination of RF transceiver design for MIMO communications.  Offering a practical view on MIMO wireless systems, this book extends fundamental concepts on classic wireless transceiver design techniques to MIMO transceivers. This helps reader gain a very comprehensive understanding of the subject. This in-depth volume describes many theoretical and implementation challenges on MIMO transceivers and provides the practical solutions for these issues. This comprehensive book provides thorough descriptions of MIMO theoretical concepts, MIMO single carrier and OFDM modulation, RF transceiver design concepts, power amplifier, MIMO transmitter design techniques and their RF impairments, MIMO receiver design methods, RF impairments study including nonlinearity, DC-offset, I/Q imbalance and phase noise and their compensation in OFDM and MIMO techniques. In addition, it provides the most practical techniques to realize RF front-ends in MIMO systems. This book is supported wit...

  20. Secure Wireless Sensor Networks: Problems and Solutions

    Directory of Open Access Journals (Sweden)

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  1. Wireless technology for command control and communications

    Science.gov (United States)

    Lee, C. H.

    1993-09-01

    There are many different views on exactly what is personal communication services (PCS). But the majority agree that 'integrated access,' 'personalized identification,' and 'mobile roaming' are the themes of PCS. Personalized services means that identification is not based on a terminal but instead on a person. PCS will use digital technology, standard procedures, and air interface for universal roaming. This means a tetherless connection through all the infrastructure for voice, data, image, and video services. The intensive development can be divided into the following four areas: digital cellular or digital PCS, wireless data network services (WWAN, WLAN, WPBX), land mobile radio (LMR), and mobile satellite services (MSS). These areas characterize wireless technology in their own perspectives; possible DOD applications will be discussed.

  2. Cooperative Data Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hajar Mousannif

    2012-06-01

    Full Text Available Introducing cooperation into a wireless sensor network (WSN has gained much attention in the recent few years mainly because of the significant effect it has on optimizing energy consumption and on enhancing the lifetime and the overall performance of the network. Cooperation can be exploited at different levels, ranging from a collection of nodes collaborating to forward the data they gathered from the environment towards the base station through efficient data aggregation and clustering techniques, to nodes collaborating to report events occurrences, track targets or control the topology. Motivated by a large variety of attractive wireless sensor applications, such as environmental monitoring, smart environments and healthcare applications, we survey mechanisms that take advantage of cooperation among sensor nodes in the network for the purpose of delivering information reliably and efficiently to nodes of the network that are interested in receiving it. We provide detailed overviews and highlight the importance of cooperation from different perspectives.

  3. Wireless energy transfer between anisotropic metamaterials shells

    Energy Technology Data Exchange (ETDEWEB)

    Díaz-Rubio, Ana; Carbonell, Jorge; Sánchez-Dehesa, José, E-mail: jsdehesa@upv.es

    2014-06-15

    The behavior of strongly coupled Radial Photonic Crystals shells is investigated as a potential alternative to transfer electromagnetic energy wirelessly. These sub-wavelength resonant microstructures, which are based on anisotropic metamaterials, can produce efficient coupling phenomena due to their high quality factor. A configuration of selected constitutive parameters (permittivity and permeability) is analyzed in terms of its resonant characteristics. The coupling to loss ratio between two coupled resonators is calculated as a function of distance, the maximum (in excess of 300) is obtained when the shells are separated by three times their radius. Under practical conditions an 83% of maximum power transfer has been also estimated. -- Highlights: •Anisotropic metamaterial shells exhibit high quality factors and sub-wavelength size. •Exchange of electromagnetic energy between shells with high efficiency is analyzed. •Strong coupling is supported with high wireless transfer efficiency. •End-to-end energy transfer efficiencies higher than 83% can be predicted.

  4. Lunar Wireless Power Transfer Feasibility Study

    Energy Technology Data Exchange (ETDEWEB)

    Freid, Sheldon [National Security Technologies, LLC. (NSTec), Mercury, NV (United States); Popovic, Zoya [Univ. of Colorado, Boulder, CO (United States); Beckett, David R. [Independent Consultant; Anderson, Scott R. [Independent Consultant; Mann, Diana [Independent Consultant; Walker, Stuart [Independent Consultant

    2008-03-01

    This study examines the feasibility of a multi-kilowatt wireless radio frequency (RF) power system to transfer power between lunar base facilities. Initial analyses, show that wireless power transfer (WPT) systems can be more efficient and less expensive than traditional wired approaches for certain lunar and terrestrial applications. The study includes evaluations of the fundamental limitations of lunar WPT systems, the interrelationships of possible operational parameters, and a baseline design approach for a notionial system that could be used in the near future to power remote facilities at a lunar base. Our notional system includes state-of-the-art photovoltaics (PVs), high-efficiency microwave transmitters, low-mass large-aperture high-power transmit antennas, high-efficiency large-area rectenna receiving arrays, and reconfigurable DC combining circuitry.

  5. MARGINAL EXPENSE OIL WELL WIRELESS SURVEILLANCE MEOWS

    Energy Technology Data Exchange (ETDEWEB)

    Mason M. Medizade; John R. Ridgely; Donald G. Nelson

    2004-11-01

    A marginal expense oil well wireless surveillance system to monitor system performance and production from rod-pumped wells in real time from wells operated by Vaquero Energy in the Edison Field, Main Area of Kern County in California has been successfully designed and field tested. The surveillance system includes a proprietary flow sensor, a programmable transmitting unit, a base receiver and receiving antenna, and a base station computer equipped with software to interpret the data. First, the system design is presented. Second, field data obtained from three wells is shown. Results of the study show that an effective, cost competitive, real-time wireless surveillance system can be introduced to oil fields across the United States and the world.

  6. Modular, bluetooth enabled, wireless electroencephalograph (EEG) platform.

    Science.gov (United States)

    Lovelace, Joseph A; Witt, Tyler S; Beyette, Fred R

    2013-01-01

    A design for a modular, compact, and accurate wireless electroencephalograph (EEG) system is proposed. EEG is the only non-invasive measure for neuronal function of the brain. Using a number of digital signal processing (DSP) techniques, this neuronal function can be acquired and processed into meaningful representations of brain activity. The system described here utilizes Bluetooth to wirelessly transmit the digitized brain signal for an end application use. In this way, the system is portable, and modular in terms of the device to which it can interface. Brain Computer Interface (BCI) has become a popular extension of EEG systems in modern research. This design serves as a platform for applications using BCI capability.

  7. An Algorithm of Wireless Sensor Monitoring System

    Directory of Open Access Journals (Sweden)

    Li Hongri

    2018-01-01

    Full Text Available In order to realize more intelligent storage monitoring system, the information fusion model of wireless sensor network for storage environment monitoring is studied on the basis of analyzing information fusion technology. By analyzing the structure of storage monitoring system based on wireless sensor network, a two-layer information fusion method is established. The information fusion of homogeneous sensor based on adaptive weighting and the fusion method of heterogeneous sensor based on radial basis function neural network are designed and verified. The experimental results show that the design method can fuse the storage environment information and realize the accurate identification of the environmental state. Therefore, the algorithm can effectively improve the speed of network training, and the classification effect is good. To a certain extent, it can help enterprises to establish a safe and efficient storage system, to enhance the efficiency of enterprise warehousing operations.

  8. Passive Wireless Temperature Sensors with Enhanced Sensitivity and Range, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal describes the development of a wireless multisensor system for NASA application to remote wireless sensing of temperature distributions in composite...

  9. 60 GHz Wireless Propagation Channels: Characterization, Modeling and Evaluation

    OpenAIRE

    Gustafson, Carl

    2014-01-01

    To be able to connect wirelessly to the internet is nowadays a part of everyday life and the number of wireless devices accessing wireless networks worldwide are increasing rapidly. However, with the increasing number of wireless devices and applications and the amount available bandwidth, spectrum shortage is an issue. A promising way to increase the amount of available spectrum is to utilize frequency bands in the mm-wave range of 30-300 GHz that previously have not been used for typical co...

  10. Hypergol Sensor Using Passive Wireless SAW Devices, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal describes the preliminary development of surface acoustic wave (SAW) based hypergolic fuel sensors for NASA application to distributed wireless leak...

  11. Cognitive radio wireless sensor networks: applications, challenges and research trends.

    Science.gov (United States)

    Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won

    2013-08-22

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  12. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    Directory of Open Access Journals (Sweden)

    Gyanendra Prasad Joshi

    2013-08-01

    Full Text Available A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  13. Existing PON Infrastructure Supported Hybrid Fiber-Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yu, Xianbin; Zhao, Ying; Deng, Lei

    2012-01-01

    We propose a hybrid fiber wireless sensor network based on the existing PON infrastructure. The feasibility of remote sensing and PON convergence is experimentally proven by transmitting direct-sequence spread-spectrum wireless sensing and 2.5Gbps GPON signals.......We propose a hybrid fiber wireless sensor network based on the existing PON infrastructure. The feasibility of remote sensing and PON convergence is experimentally proven by transmitting direct-sequence spread-spectrum wireless sensing and 2.5Gbps GPON signals....

  14. Ultra-Reliable Communication in 5G Wireless Systems

    DEFF Research Database (Denmark)

    Popovski, Petar

    2014-01-01

    Wireless 5G systems will not only be “4G, but faster”. One of the novel features discussed in relation to 5G is Ultra-Reliable Communication (URC), an operation mode not present in today’s wireless systems. URC refers to provision of certain level of communication service almost 100 % of the time....... Example URC applications include reliable cloud connectivity, critical connections for industrial automation and reliable wireless coordination among vehicles. This paper puts forward a systematic view on URC in 5G wireless systems. It starts by analyzing the fundamental mechanisms that constitute...

  15. Industrial and non-consumer applications of wireless sensor networks

    Science.gov (United States)

    Pentikäinen, Vesa; Heikkilä, Tapio; Määttä, Kalle; Tukeva, Pirkka; Korkalainen, Marko; Saavalainen, Pekka; Kilpeläinen, Pekka

    2008-04-01

    There is a growing potential of applications for wireless monitoring, control and instrumentation in industrial environments, construction sites and agriculture. Wireless communication technologies have clear benefits in harsh environments where traditional cables are too vulnerable or they cannot be installed permanently. Sensor networks with multiple wireless sensor nodes are needed when the size of the monitored area is large and especially in dynamic environments, like construction sites where the sensors can be installed to moving vehicles and work machines. In this paper we present results from some of our developments where short range wireless communication technologies have been applied for industrial and non-consumer monitoring applications.

  16. Wireless Monitoring of Automobile Tires for Intelligent Tires

    Directory of Open Access Journals (Sweden)

    Akira Todoroki

    2008-12-01

    Full Text Available This review discusses key technologies of intelligent tires focusing on sensors and wireless data transmission. Intelligent automobile tires, which monitor their pressure, deformation, wheel loading, friction, or tread wear, are expected to improve the reliability of tires and tire control systems. However, in installing sensors in a tire, many problems have to be considered, such as compatibility of the sensors with tire rubber, wireless transmission, and battery installments. As regards sensing, this review discusses indirect methods using existing sensors, such as that for wheel speed, and direct methods, such as surface acoustic wave sensors and piezoelectric sensors. For wireless transmission, passive wireless methods and energy harvesting are also discussed.

  17. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    National Research Council Canada - National Science Library

    Kessel, Adam; Goodwin, Shane

    2005-01-01

    The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...

  18. Attacks to Cryptography Protocols of Wireless Industrial Communication Systems

    Directory of Open Access Journals (Sweden)

    Tomas Ondrasina

    2010-01-01

    Full Text Available The paper deals with problems of safety and security principles within wireless industrial communication systems. First safety requirements to wireless industrial communication system, summarisation of attack methods and the available measures for risks elimination are described with orientation to safety critical applications. The mainly part is oriented to identification of risks and summarisation of defensive methods of wireless communication based on cryptographic techniques. Practical part the cryptoanalytic’s attacks to COTS (Commercial Off-The-Shelf wireless communications are mentioned based on the IEEE 802.11 standards.

  19. Wireless surveillance sytem for greenhouse crops

    OpenAIRE

    Cama-Pinto, Alejandro; Gil-Montoya, Francisco; Gómez-López, Julio; García-Cruz, Amos; Manzano-Agugliaro, Francisco

    2014-01-01

    The agriculture in the southeast Spain has experimented important changes in the last years due to the greenhouse crops. In this kind of crops is very important the use of advanced techniques and new technologies to improve the crop efficiency. This work presents an advanced system to monitor the variables applied on greenhouse crops. The monitoring system uses a wireless sensor network (WSN) that works with 6LoWPAN and RPL as the routing protocol. It measures humidity, temperature, light, an...

  20. Video Quality Prediction over Wireless 4G

    KAUST Repository

    Lau, Chun Pong

    2013-04-14

    In this paper, we study the problem of video quality prediction over the wireless 4G network. Video transmission data is collected from a real 4G SCM testbed for investigating factors that affect video quality. After feature transformation and selection on video and network parameters, video quality is predicted by solving as regression problem. Experimental results show that the dominated factor on video quality is the channel attenuation and video quality can be well estimated by our models with small errors.

  1. Cost Effective RADIUS Authentication for Wireless Clients

    Directory of Open Access Journals (Sweden)

    Alexandru ENACEANU

    2010-12-01

    Full Text Available Network administrators need to keep administrative user information for each network device, but network devices usually support only limited functions for user management. WLAN security is a modern problem that needs to be solved and it requires a lot of overhead especially when applied to corporate wireless networks. Administrators can set up a RADIUS server that uses an external database server to handle authentication, authorization, and accounting for network security issues.

  2. Securing a medical wireless LAN system

    OpenAIRE

    Owens, TJ; Tachakra, S; Banitsas, KA; Istepanian, RSH

    2001-01-01

    Recently the concept of MedLAN systems dedicated to application scenarios for wireless local area networks (WLAN) in hospital A&E departments has been presented. An essential element in the acceptance of the system will be reassuring all stakeholders in the system that data transmitted using the system is secure. In order for the stakeholders to be reassured technical and managerial issues have to be addressed. Technical issues to be addressed include selection of a suitable encryption algori...

  3. Troubleshooting Assistance Services in Community Wireless Networks

    Directory of Open Access Journals (Sweden)

    P. Kriz

    2012-01-01

    Full Text Available We have identified new services intended for users and administrators of community wireless networks. Troubleshooting assistance services will assist the users during solution of communication problems, gathering data for expert analysis, informing the user about the state of the network (including outages, and so forth. Network administrators will be provided with a unique tool supporting the network analysis, operation, and development. We have mainly focused on the use cases and prerequirements—the problem of topology discovery.

  4. Energy efficiency in future wireless broadband networks

    CSIR Research Space (South Africa)

    Masonta, MT

    2012-10-01

    Full Text Available , and will require unique energy efficient solutions. For instance, an MS may be battery-powered, and the relevant energy efficient solution would include switching-off the display and minimizing signalling overhead (e.g. sleep mode). Meanwhile energy efficient... solution for the BS may include the intelligent sleep mode policies when the number of users and the traffic load decreases [3]. Due to the growing demand for advanced broadband wireless technologies and services, research in green radio solutions...

  5. Data storage system for wireless sensor networks

    OpenAIRE

    Sacramento, David

    2015-01-01

    Dissertação de mestrado, Engenharia Informática, Faculdade de Ciências e Tecnologia, Universidade do Algarve, 2015 Wireless sensor networks (WSNs) are starting to have a high impact on our societies and, for next generation WSNs to become more integrated with the Internet, researchers recently proposed to embed Internet Protocol (IP) v6 into such very constrained networks. Also, Constrained Application Protocol (CoAP) and Observe have been proposed for RESTful services to be pr...

  6. Improved timing recovery in wireless mobile receivers

    CSIR Research Space (South Africa)

    Olwal, TO

    2007-06-01

    Full Text Available is critical. This is partly because timing recovery functions must follow rapid parameter changes inherent in mobile systems and partly because both bandwidth and power must be conserved in low signal to noise ratio communication channels. The ultimate goal... in low signal to noise ratios. In order to develop a bandwidth and power efficient timing recovery method for wireless mobile receivers, a raised cosine filter and a multilevel phase shift keying modulation scheme are implemented and no clock signals...

  7. An economical wireless cavity-nest viewer

    Science.gov (United States)

    Daniel P. Huebner; Sarah R. Hurteau

    2007-01-01

    Inspection of cavity nests and nest boxes is often required during studies of cavity-nesting birds, and fiberscopes and pole-mounted video cameras are sometimes used for such inspection. However, the cost of these systems may be prohibitive for some potential users. We describe a user-built, wireless cavity viewer that can be used to access cavities as high as 15 m and...

  8. Wireless LAN: 802.11b

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless LAN: 802.11b. Replacement for Ethernet. Supported data rates. Current: 11, 5.5, 2, 1 Mbps; Future: 20+ Mbps in 2.4 GHz and up to 54 Mbps in 5.7 GHz band. Range. Indoor 20 - 25 meters; Outdoor: 50 – 100 meters. Transmit power up to 100 mW.

  9. Securing wireless communications at the physical layer

    CERN Document Server

    Liu, Ruoheng

    2009-01-01

    Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validatio

  10. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  11. Wireless data transmission from inside electromagnetic fields.

    Science.gov (United States)

    Huertas, José Ignacio; Barraza, Roberto; Echeverry, Julian Mauricio

    2010-01-01

    This paper describes analytical and experimental work developed to evaluate the effects of the electromagnetic fields produced by high-voltage lines (400 kV) on wireless data transmission at the 900MHz band. In this work the source of the data transmission is located inside the electromagnetic field and the reception station is located at different distances from the power lines. Different atmospheric conditions are considered.

  12. Reactor building indoor wireless network channel quality estimation using RSSI measurement of wireless sensor network

    International Nuclear Information System (INIS)

    Merat, S.

    2008-01-01

    Expanding wireless communication network reception inside reactor buildings (RB) and service wings (SW) has always been a technical challenge for operations service team. This is driven by the volume of metal equipment inside the Reactor Buildings (RB) that blocks and somehow shields the signal throughout the link. In this study, to improve wireless reception inside the Reactor Building (RB), an experimental model using indoor localization mesh based on IEEE 802.15 is developed to implement a wireless sensor network. This experimental model estimates the distance between different nodes by measuring the RSSI (Received Signal Strength Indicator). Then by using triangulation and RSSI measurement, the validity of the estimation techniques is verified to simulate the physical environmental obstacles, which block the signal transmission. (author)

  13. Wireless Communications for Monitoring Nuclear Material Processes Part 2: Wireless In-plant Data Transmission

    International Nuclear Information System (INIS)

    Braina, F.; Goncalves, J.M.C.; Versino, C.; Heppleston, M.; Ottesen, C.; Schoeneman, B.; Tolk, K.

    2008-01-01

    The wireless transmission of data from sensors, monitoring both static and dynamic safeguards processes, is highly appealing for the simple fact that there are no wires. In a nuclear safeguards regime, this has the implied benefits of low-cost installations, versatile configurations, and the elimination of conduits to inspect. However, with the implied solutions of wireless, we are presented with a new set of problems for system implementation and operation management, in particular (1) Radio Frequency (RF) interference and (2) security in information transmission. These problems are addressable. This paper looks at the clear benefits of wireless technologies and the cautions regarding the possible pitfalls of poorly applied technology, discusses the integration of radio frequency in existing and new facilities, provides high-level considerations for information security, and reviews prospects for the future

  14. Wireless laptop-based phonocardiograph and diagnosis

    Directory of Open Access Journals (Sweden)

    Amy T. Dao

    2015-08-01

    Full Text Available Auscultation is used to evaluate heart health, and can indicate when it’s needed to refer a patient to a cardiologist. Advanced phonocardiograph (PCG signal processing algorithms are developed to assist the physician in the initial diagnosis but they are primarily designed and demonstrated with research quality equipment. Therefore, there is a need to demonstrate the applicability of those techniques with consumer grade instrument. Furthermore, routine monitoring would benefit from a wireless PCG sensor that allows continuous monitoring of cardiac signals of patients in physical activity, e.g., treadmill or weight exercise. In this work, a low-cost portable and wireless healthcare monitoring system based on PCG signal is implemented to validate and evaluate the most advanced algorithms. Off-the-shelf electronics and a notebook PC are used with MATLAB codes to record and analyze PCG signals which are collected with a notebook computer in tethered and wireless mode. Physiological parameters based on the S1 and S2 signals and MATLAB codes are demonstrated. While the prototype is based on MATLAB, the later is not an absolute requirement.

  15. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  16. Deep Space Habitat Wireless Smart Plug

    Science.gov (United States)

    Morgan, Joseph A.; Porter, Jay; Rojdev, Kristina; Carrejo, Daniel B.; Colozza, Anthony J.

    2014-01-01

    NASA has been interested in technology development for deep space exploration, and one avenue of developing these technologies is via the eXploration Habitat (X-Hab) Academic Innovation Challenge. In 2013, NASA's Deep Space Habitat (DSH) project was in need of sensors that could monitor the power consumption of various devices in the habitat with added capability to control the power to these devices for load shedding in emergency situations. Texas A&M University's Electronic Systems Engineering Technology Program (ESET) in conjunction with their Mobile Integrated Solutions Laboratory (MISL) accepted this challenge, and over the course of 2013, several undergraduate students in a Capstone design course developed five wireless DC Smart Plugs for NASA. The wireless DC Smart Plugs developed by Texas A&M in conjunction with NASA's Deep Space Habitat team is a first step in developing wireless instrumentation for future flight hardware. This paper will further discuss the X-Hab challenge and requirements set out by NASA, the detailed design and testing performed by Texas A&M, challenges faced by the team and lessons learned, and potential future work on this design.

  17. Wired and Wireless Camera Triggering with Arduino

    Science.gov (United States)

    Kauhanen, H.; Rönnholm, P.

    2017-10-01

    Synchronous triggering is an important task that allows simultaneous data capture from multiple cameras. Accurate synchronization enables 3D measurements of moving objects or from a moving platform. In this paper, we describe one wired and four wireless variations of Arduino-based low-cost remote trigger systems designed to provide a synchronous trigger signal for industrial cameras. Our wireless systems utilize 315 MHz or 434 MHz frequencies with noise filtering capacitors. In order to validate the synchronization accuracy, we developed a prototype of a rotating trigger detection system (named RoTriDeS). This system is suitable to detect the triggering accuracy of global shutter cameras. As a result, the wired system indicated an 8.91 μs mean triggering time difference between two cameras. Corresponding mean values for the four wireless triggering systems varied between 7.92 and 9.42 μs. Presented values include both camera-based and trigger-based desynchronization. Arduino-based triggering systems appeared to be feasible, and they have the potential to be extended to more complicated triggering systems.

  18. EMG amplifier with wireless data transmission

    Science.gov (United States)

    Kowalski, Grzegorz; Wildner, Krzysztof

    2017-08-01

    Wireless medical diagnostics is a trend in modern technology used in medicine. This paper presents a concept of realization, architecture of hardware and software implementation of an elecromyography signal (EMG) amplifier with wireless data transmission. This amplifier consists of three components: analogue processing of bioelectric signal module, micro-controller circuit and an application enabling data acquisition via a personal computer. The analogue bioelectric signal processing circuit receives electromyography signals from the skin surface, followed by initial analogue processing and preparation of the signals for further digital processing. The second module is a micro-controller circuit designed to wirelessly transmit the electromyography signals from the analogue signal converter to a personal computer. Its purpose is to eliminate the need for wired connections between the patient and the data logging device. The third block is a computer application designed to display the transmitted electromyography signals, as well as data capture and analysis. Its purpose is to provide a graphical representation of the collected data. The entire device has been thoroughly tested to ensure proper functioning. In use, the device displayed the captured electromyography signal from the arm of the patient. Amplitude- frequency characteristics were set in order to investigate the bandwidth and the overall gain of the device.

  19. Feasibility of retroreflective transdermal optical wireless communication.

    Science.gov (United States)

    Gil, Yotam; Rotter, Nadav; Arnon, Shlomi

    2012-06-20

    There is an increasing demand for transdermal high-data-rate communication for use with in-body devices, such as pacemakers, smart prostheses, neural signals processors at the brain interface, and cameras acting as artificial eyes as well as for collecting signals generated within the human body. Prominent requirements of these communication systems include (1) wireless modality, (2) noise immunity and (3) ultra-low-power consumption for the in-body device. Today, the common wireless methods for transdermal communication are based on communication at radio frequencies, electrical induction, or acoustic waves. In this paper, we will explore another alternative to these methods--optical wireless communication (OWC)--for which modulated light carries the information. The main advantages of OWC in transdermal communication, by comparison to the other methods, are the high data rates and immunity to external interference availed, which combine to make it a promising technology for next-generation systems. In this paper, we present a mathematical model and experimental results of measurements from direct link and retroreflection link configurations with Gallus gallus domesticus derma as the transdermal channel. The main conclusion from this work is that an OWC link is an attractive communication solution in medical applications. For a modulating retroreflective link to become a competitive solution in comparison with a direct link, low-energy-consumption modulating retroreflectors should be developed.

  20. Priority image transmission in wireless sensor networks

    International Nuclear Information System (INIS)

    Nasri, M.; Helali, A.; Sghaier, H.; Maaref, H.

    2011-01-01

    The emerging technology during the last years allowed the development of new sensors equipped with wireless communication which can be organized into a cooperative autonomous network. Some application areas for wireless sensor networks (WSNs) are home automations, health care services, military domain, and environment monitoring. The required constraints are limited capacity of processing, limited storage capability, and especially these nodes are limited in energy. In addition, such networks are tiny battery powered which their lifetime is very limited. During image processing and transmission to the destination, the lifetime of sensor network is decreased quickly due to battery and processing power constraints. Therefore, digital image transmissions are a significant challenge for image sensor based Wireless Sensor Networks (WSNs). Based on a wavelet image compression, we propose a novel, robust and energy-efficient scheme, called Priority Image Transmission (PIT) in WSN by providing various priority levels during image transmissions. Different priorities in the compressed image are considered. The information for the significant wavelet coeffcients are transmitted with higher quality assurance, whereas relatively less important coefficients are transmitted with lower overhead. Simulation results show that the proposed scheme prolongs the system lifetime and achieves higher energy efficiency in WSN with an acceptable compromise on the image quality.

  1. Wireless remote monitoring system for sleep apnea

    Science.gov (United States)

    Oh, Sechang; Kwon, Hyeokjun; Varadan, Vijay K.

    2011-04-01

    Sleep plays the important role of rejuvenating the body, especially the central nervous system. However, more than thirty million people suffer from sleep disorders and sleep deprivation. That can cause serious health consequences by increasing the risk of hypertension, diabetes, heart attack and so on. Apart from the physical health risk, sleep disorders can lead to social problems when sleep disorders are not diagnosed and treated. Currently, sleep disorders are diagnosed through sleep study in a sleep laboratory overnight. This involves large expenses in addition to the inconvenience of overnight hospitalization and disruption of daily life activities. Although some systems provide home based diagnosis, most of systems record the sleep data in a memory card, the patient has to face the inconvenience of sending the memory card to a doctor for diagnosis. To solve the problem, we propose a wireless sensor system for sleep apnea, which enables remote monitoring while the patient is at home. The system has 5 channels to measure ECG, Nasal airflow, body position, abdominal/chest efforts and oxygen saturation. A wireless transmitter unit transmits signals with Zigbee and a receiver unit which has two RF modules, Zigbee and Wi-Fi, receives signals from the transmitter unit and retransmits signals to the remote monitoring system with Zigbee and Wi-Fi, respectively. By using both Zigbee and Wi-Fi, the wireless sensor system can achieve a low power consumption and wide range coverage. The system's features are presented, as well as continuous monitoring results of vital signals.

  2. Wireless Handheld Scanners Integrated with Waste Tracking

    International Nuclear Information System (INIS)

    Anderson, Robert Stephen

    2000-01-01

    The US Department of Energy (DOE) Idaho National Engineering and Environmental Laboratory (INEEL) has embraced mobile wireless technology to help the disposition of hazardous and mixed radiological waste. The following paper describes one application the INEEL developed to increase the data accuracy and near-real time reporting requirements for waste management. With the continuous operational demands at the ''site'', it was difficult to sustain an accurate, up-to-date database required for regulatory compliance audits and reporting. Incorporating wireless mobile technology, the INEEL was able to increase the accuracy while reducing the data delay times previously encountered. Installation issues prolonged the project along with obstacles encountered with operations personnel. However, the success of this project was found in persistence and management support as well as the technology itself. Future wireless, mobile computing will continue at the INEEL for years to come based on a successful project that was able to integrate new technology to an existing waste management system with proven, increased data accuracy

  3. Wireless ZigBee home automation system

    Science.gov (United States)

    Craciunescu, Razvan; Halunga, Simona; Fratu, Octavian

    2015-02-01

    The home automation system concept existed for many years but in the last decade, due to the rapid development of sensors and wireless technologies, a large number of various such "intelligent homes" have been developed. The purpose of the present paper is to demonstrate the flexibility, reliability and affordability of home automation projects, based on a simple and affordable implementation. A wireless sensing and control system have been developed and tested, having a number of basic functionalities such as switching on/off the light according to ambient lighting and turning on/off the central heating. The system has been built around low power microcontrollers and ZigBee modems for wireless communication, using a set of Vishay 640 thermistor sensors for temperature measurements and Vishay LDR07 photo-resistor for humidity measurements. A trigger is activated when the temperature or light measurements are above/below a given threshold and a command is transmitted to the central unit through the ZigBee radio module. All the data processing is performed by a low power microcontroller both at the sensing device and at the control unit.

  4. Wireless transmission: state of research, applications, trends

    International Nuclear Information System (INIS)

    Berger, A.

    2016-01-01

    At the end of the 19th century Nikola Tesla started his work in the field of wireless energy transmission. More than 100 years after Tesla, the progress in modern semiconductor technology offer developers the possibility to realize highly efficient systems and have led to a revival of wireless energy transmission. The application ranges from the transmission of a few milliwatts in biomedical applications, over a few watts for the charging of mobile phones, to hundreds of kilowatts in the automotive sector. Depending on the used method, the possible transmission distances vary between a few centimeters up to thousands of kilometers. The physical basis of these technologies is the transmission of energy by electromagnetic waves. State-of-the-art systems use wavelengths ranging from radio waves to microwaves, to ultraviolet light. Current research focuses on optimizing transmission efficiency, increasing the possible transmission distance between transmitter and receiver, and improving spatial freedom of movement. This lecture gives an overview of the different approaches of wireless energy transmission and their physical background, the established industrial standards and the current state of research. In addition, the advantages and disadvantages of the individual methods are illustrated by selected commercial and scientific applications. (rössner) [de

  5. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  6. Wireless Power Supply via Coupled Magnetic Resonance for on-line Monitoring Wireless Sensor of High-voltage Electrical Equipment

    DEFF Research Database (Denmark)

    Xingkui, Mao; Qisheng, Huang; Yudi, Xiao

    2016-01-01

    On-line monitoring of high-voltage electrical equipment (HV-EE) aiming to detect faults effectively has become crucial to avoid serious accidents. Moreover, highly reliable power supplies are the key component for the wireless sensors equipped in such on-line monitoring systems. Therefore......, in this paper, the wireless power supply via coupled magnetic resonance (MR-WPS) is proposed for powering the wireless sensor and the associated wireless sensor solution is also proposed. The key specifications of the MR-WPS working in switchgear cabinet with a harsh operation environment are analyzed...

  7. Transmit Power Optimisation in Wireless Network

    Directory of Open Access Journals (Sweden)

    Besnik Terziu

    2011-09-01

    Full Text Available Transmit power optimisation in wireless networks based on beamforming have emerged as a promising technique to enhance the spectrum efficiency of present and future wireless communication systems. The aim of this study is to minimise the access point power consumption in cellular networks while maintaining a targeted quality of service (QoS for the mobile terminals. In this study, the targeted quality of service is delivered to a mobile station by providing a desired level of Signal to Interference and Noise Ratio (SINR. Base-stations are coordinated across multiple cells in a multi-antenna beamforming system. This study focuses on a multi-cell multi-antenna downlink scenario where each mobile user is equipped with a single antenna, but where multiple mobile users may be active simultaneously in each cell and are separated via spatial multiplexing using beamforming. The design criteria is to minimize the total weighted transmitted power across the base-stations subject to SINR constraints at the mobile users. The main contribution of this study is to define an iterative algorithm that is capable of finding the joint optimal beamformers for all basestations, based on a correlation-based channel model, the full-correlation model. Among all correlated channel models, the correlated channel model used in this study is the most accurate, giving the best performance in terms of power consumption. The environment here in this study is chosen to be Non-Light of- Sight (NLOS condition, where a signal from a wireless transmitter passes several obstructions before arriving at a wireless receiver. Moreover there are many scatterers local to the mobile, and multiple reflections can occur among them before energy arrives at the mobile. The proposed algorithm is based on uplink-downlink duality using the Lagrangian duality theory. Time-Division Duplex (TDD is chosen as the platform for this study since it has been adopted to the latest technologies in Fourth

  8. Wireless local area network. A new technology of network

    International Nuclear Information System (INIS)

    Wu Yunjun; Zhao Zongtao

    2003-01-01

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  9. The use of Wireless Sensor Network for increasing airport security

    Directory of Open Access Journals (Sweden)

    Jakub Kraus

    2013-11-01

    Full Text Available This article focuses on the use of wireless sensor networks for airport security, respectively using sensor networks as a replacement or add-on to existing security measures. The article describes the sensor network and its possible application to various airport objects and financial analysis of the perimeter security with wireless sensor network.

  10. Wireless multimedia sensor networks on reconfigurable hardware information reduction techniques

    CERN Document Server

    Ang, Li-minn; Chew, Li Wern; Yeong, Lee Seng; Chia, Wai Chong

    2013-01-01

    Traditional wireless sensor networks (WSNs) capture scalar data such as temperature, vibration, pressure, or humidity. Motivated by the success of WSNs and also with the emergence of new technology in the form of low-cost image sensors, researchers have proposed combining image and audio sensors with WSNs to form wireless multimedia sensor networks (WMSNs).

  11. Development & Implementation of Electric Tram System with Wireless Charging Technology

    Directory of Open Access Journals (Sweden)

    DongHo Cho

    2015-06-01

    Full Text Available In this paper, an electric tram system with a wireless power transfer system based on SMFIR technology is presented. The detailed technology of power-line infra, regulator, and pick-up device is described for train application, respectively. Furthermore, implementation and experimental results for wireless power transfer electric tram are presented

  12. Self Adaptive Safe Provisioning of Wireless Power Using DCOPs

    NARCIS (Netherlands)

    Leeuwen, C.J. van; Yildirim, K.S.; Pawelczak, P.

    2017-01-01

    Wireless Power Transfer (WPT) technologies aim at getting rid of cables used by consumer devices for energy provision. As long distance WPT is becoming mature, the health impact of WPT becomes increasingly important to consider. In this paper we look at how to maximize the wireless power transfer to

  13. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  14. Scalable Video Streaming in Wireless Mesh Networks for Education

    Science.gov (United States)

    Liu, Yan; Wang, Xinheng; Zhao, Liqiang

    2011-01-01

    In this paper, a video streaming system for education based on a wireless mesh network is proposed. A wireless mesh network is a self-organizing, self-managing and reliable intelligent network, which allows educators to deploy a network quickly. Video streaming plays an important role in this system for multimedia data transmission. This new…

  15. Fundamental Analysis of Extremely Fast Photonic THz Wireless Communication Systems

    DEFF Research Database (Denmark)

    Yu, Xianbin; Zhang, Xianmin

    This talk will review the recent progress on developing THz communication systems for high speed wireless access, and fundamentally analyze the realistic throughput and accessible wireless range of a THz impulse radio communication link by employing a uni-travelling photodiode (UTC-PD) as emitter...

  16. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireles...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  17. Spectral efficiency enhancement with interference cancellation for wireless relay network

    DEFF Research Database (Denmark)

    Yomo, Hiroyuki; De Carvalho, Elisabeth

    The introduction of relaying into wireless communication system for coverage enhancement can cause severe decrease of spectral efficiency due to the requirement on extra radio resource. In this paper, we propose a method to increase spectral efficiency in such a wireless relay network by employin...

  18. A tutorial survey of topics in wireless networking: Part I

    Indian Academy of Sciences (India)

    for the environment of an office building or hotel, or a large chemical factory. 3. Technical elements. In the previous section we have provided an overview of the current practice of wireless networks. We organised our presentation around a taxonomy of wireless networks shown in figure 1. Although the technologies that we ...

  19. Development & Implementation of Electric Tram System with Wireless Charging Technology

    OpenAIRE

    DongHo Cho; GuHo Jung; Uooyeol Yoon; Byungsong Lee

    2015-01-01

    In this paper, an electric tram system with a wireless power transfer system based on SMFIR technology is presented. The detailed technology of power-line infra, regulator, and pick-up device is described for train application, respectively. Furthermore, implementation and experimental results for wireless power transfer electric tram are presented

  20. Method and system for localization in a wireless network

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Dil, B.J.

    2011-01-01

    The present invention relates to a method and system for localization in wireless networks. More in particular, the present invention is relates to Received Signal Strength (RSS) based localization in wireless networks, such as localization based on Radio Interferometric Positioning (RIP). Unlike