WorldWideScience

Sample records for wireless e911 location

  1. 76 FR 47114 - Wireless E911 Location Accuracy Requirements; E911 Requirements for IP-Enabled Service Providers

    Science.gov (United States)

    2011-08-04

    .... Power and Associates, indicate that indoor wireless calls have increased dramatically in the past few... Docket No. 05-196; FCC 11-107] Wireless E911 Location Accuracy Requirements; E911 Requirements for IP... transmission is entirely over IP-based networks. By referencing E.164 telephone numbers and eliminating...

  2. 76 FR 1126 - Wireless E911 Location Accuracy Requirements; E911 Requirements for IP-Enabled Service Providers

    Science.gov (United States)

    2011-01-07

    ... Telecommunications Industry Association (TIA) (collectively, the ``Parties'') jointly filed a request to extend the... Administrators, CTIA--The Wireless Association, and the Telecommunications Industry Association, Is Granted...

  3. Wireless Damage Location Sensing System

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant Douglas (Inventor)

    2012-01-01

    A wireless damage location sensing system uses a geometric-patterned wireless sensor that resonates in the presence of a time-varying magnetic field to generate a harmonic response that will experience a change when the sensor experiences a change in its geometric pattern. The sensing system also includes a magnetic field response recorder for wirelessly transmitting the time-varying magnetic field and for wirelessly detecting the harmonic response. The sensing system compares the actual harmonic response to a plurality of predetermined harmonic responses. Each predetermined harmonic response is associated with a severing of the sensor at a corresponding known location thereof so that a match between the actual harmonic response and one of the predetermined harmonic responses defines the known location of the severing that is associated therewith.

  4. 76 FR 59916 - Interconnected VoIP Service; Wireless E911 Location Accuracy Requirements; E911 Requirements for...

    Science.gov (United States)

    2011-09-28

    ... 2010 almost all 2G and 3G handsets shipped by manufacturers were equipped with GPS-chips, by the end of...-based standard over time. We also require all Commercial Mobile Radio Service (CMRS) providers... Commercial Mobile Radio Service (CMRS) networks to comply with the handset-based location criteria...

  5. 77 FR 43536 - Wireless E911 Phase II Location Accuracy Requirements

    Science.gov (United States)

    2012-07-25

    ... neutrality. Providers deploying new CMRS networks are free to use network-based location techniques, or to... definition of covered CMRS providers in Section 20.18 and deploying networks subsequent to the effective date of the Third Report and Order that are not an expansion or upgrade of an existing CMRS network, must...

  6. 75 FR 57465 - Sunshine Act Meeting; Open Commission Meeting; Thursday, September 23, 2010

    Science.gov (United States)

    2010-09-21

    ... PUBLIC SAFETY & TITLE: Wireless HOMELAND SECURITY. E911 Location Accuracy Requirements (PS Docket No. 07... SAFETY & TITLE: Wireless HOMELAND SECURITY. E911 Location Accuracy Requirements (PS Docket No. 07- 114... bands available for unlicensed broadband wireless devices while protecting incumbent services. 2...

  7. VT E911 ESITE geocoder - address points

    Data.gov (United States)

    Vermont Center for Geographic Information — VT E911 ESITE geocoder - address points. VCGI, in collaboration with the VT E911 Board, has created a suite of geocoding services that can be used to batch geocode...

  8. Research on an estimation method of DOA for wireless location based on TD-SCDMA

    Science.gov (United States)

    Zhang, Yi; Luo, Yuan; Cheng, Shi-xin

    2004-03-01

    To meet the urgent need of personal communication and hign-speed data services,the standardization and products development for International Mobile Telecommunication-2000 (IMT-2000) have become a hot point in wordwide. The wireless location for mobile terminals has been an important research project. Unlike GPS which is located by 24 artificial satellities, it is based on the base-station of wireless cell network, and the research and development of it are correlative with IMT-2000. While the standard for the third generation mobile telecommunication (3G)-TD-SCDMA, which is proposed by China and the intellective property right of which is possessed by Chinese, is adopted by ITU-T at the first time, the research for wireless location based on TD-SCDMA has theoretic meaning, applied value and marketable foreground. First,the basic principle and method for wireless location, i.e. Direction of Angle(DOA), Time of Arrival(TOA) or Time Difference of Arrival(TDOA), hybridized location(TOA/DOA,TDOA/DOA,TDOA/DOA),etc. is introduced in the paper. So the research of DOA is very important in wireless location. Next, Main estimation methods of DOA for wireless location, i.e. ESPRIT, MUSIC, WSF, Min-norm, etc. are researched in the paper. In the end, the performances of DOA estimation for wireless location based on mobile telecommunication network are analyzed by the research of theory and simulation experiment and the contrast algorithms between and Cramer-Rao Bound. Its research results aren't only propitious to the choice of algorithms for wireless location, but also to the realization of new service of wireless location .

  9. WIRELESS TECHNOLOGIES for LOCATION-BASED SERVICES

    Directory of Open Access Journals (Sweden)

    Dewi Wirastuti

    2012-06-01

    Full Text Available This paper presents an overview of wireless technologies that support location-based services (LBS. Satellite and cellular networks have exploited their communication infrastructure to offer LBS. The rapid deployment of mobile broadband wireless networks has offered another appealing application area. Key to the realisation of LBS is an efficient and accurate positioning technique with various methods and offering different performance levels. So far, Global Positioning System (GPS has offered the best accuracy at a low cost but it is challenged by poor indoor coverage. With the rapid deployment of broadband wireless access ubiquitously, Mobile WiMAX (Worldwide Interoperability for Microwave Access is seen as a potential positioning option for LBS. Some key features of WiMAX, i.e., broadband benefit, high speed and large coverage area; it will be exploited to provide LBS.

  10. 78 FR 1799 - Next Generation 911; Text-to-911; Next Generation 911 Applications

    Science.gov (United States)

    2013-01-09

    ... they are most familiar with from everyday use. Currently, the most commonly used texting technology is Short Message Service (SMS), which is available, familiar, and widely used by virtually all wireless... emergencies; how to facilitate the long-term deployment of text-to-911; the Commission's role in deploying...

  11. 75 FR 67321 - Wireless E911 Location Accuracy Requirements; E911 Requirements for IP-Enabled Service Providers

    Science.gov (United States)

    2010-11-02

    ... the entity providing the broadband Internet connection (i.e. restaurants, coffee shops, hotels... growth in the traditional PC market.'' Similarly, the National Broadband Plan reported that the ``mobile...; and a larger screen size than a traditional handset.'' Many smartphones also have touch screens and/or...

  12. Airborne wireless communication systems, airborne communication methods, and communication methods

    Science.gov (United States)

    Deaton, Juan D [Menan, ID; Schmitt, Michael J [Idaho Falls, ID; Jones, Warren F [Idaho Falls, ID

    2011-12-13

    An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

  13. Wireless LAN security management with location detection capability in hospitals.

    Science.gov (United States)

    Tanaka, K; Atarashi, H; Yamaguchi, I; Watanabe, H; Yamamoto, R; Ohe, K

    2012-01-01

    In medical institutions, unauthorized access points and terminals obstruct the stable operation of a large-scale wireless local area network (LAN) system. By establishing a real-time monitoring method to detect such unauthorized wireless devices, we can improve the efficiency of security management. We detected unauthorized wireless devices by using a centralized wireless LAN system and a location detection system at 370 access points at the University of Tokyo Hospital. By storing the detected radio signal strength and location information in a database, we evaluated the risk level from the detection history. We also evaluated the location detection performance in our hospital ward using Wi-Fi tags. The presence of electric waves outside the hospital and those emitted from portable game machines with wireless communication capability was confirmed from the detection result. The location detection performance showed an error margin of approximately 4 m in detection accuracy and approximately 5% in false detection. Therefore, it was effective to consider the radio signal strength as both an index of likelihood at the detection location and an index for the level of risk. We determined the location of wireless devices with high accuracy by filtering the detection results on the basis of radio signal strength and detection history. Results of this study showed that it would be effective to use the developed location database containing radio signal strength and detection history for security management of wireless LAN systems and more general-purpose location detection applications.

  14. Design and implementation of location-based wireless targeted advertising

    Science.gov (United States)

    Li, Benjamin; Xu, Deyin

    2001-10-01

    As advertisements are time and location sensitive, a challenge for wireless marketing is to have advertisements delivered when and where they are most convenient. In this paper we introduce a two-stage auction model for location-based wireless targeted advertising. This system extends the notion of location-based service by using location information to target advertising, and does so specifically by enabling advertisers to specify their preferences and bid for advertisement delivery, where those preferences are then used in a subsequent automated auction of actual deliveries to wireless data users. The automated auction in the second stage is especially effective because it can use information about the individual user profile data, including customer relationship management system contents as well as location from the wireless system's location management service, including potentially location history such as current trajectory from recent history and longer-term historical trip records for that user. Through two-stage auction, real-time bidding by advertisers and matching ads contents to mobile users help advertising information reach maximal value.

  15. VT E911 Composite geocoder - uses ESITE, RDSNAME, and RDSRANGE

    Data.gov (United States)

    Vermont Center for Geographic Information — VT E911 Composite geocoder - uses ESITE, RDSNAME, and RDSRANGE. VCGI, in collaboration with the VT E911 Board, has created a suite of geocoding services that can be...

  16. VT Data - E911 Road Centerlines

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) EmergencyE911_RDS was originally derived from RDSnn (now called TransRoad_RDS). "Zero-length ranges" in the ROADS layer pertain to grand-fathered...

  17. 75 FR 70604 - Wireless E911 Location Accuracy Requirements

    Science.gov (United States)

    2010-11-18

    ... calls to 80 percent of all calls. Moreover, even after eight years, the 150 meter requirement rises only... geographic level or at the PSAP service area level. 27. Because of the geographical and topographical...

  18. 47 CFR Appendix B to Part 400 - Initial Certification for E-911 Grant Applicants

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Initial Certification for E-911 Grant... ADMINISTRATION, DEPARTMENT OF COMMERCE, AND NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION E-911 GRANT PROGRAM Pt. 400, App. B Appendix B to Part 400—Initial Certification for E-911 Grant...

  19. 47 CFR Appendix C to Part 400 - Annual Certification for E-911 Grant Recipients

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Annual Certification for E-911 Grant Recipients... ADMINISTRATION, DEPARTMENT OF COMMERCE, AND NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION E-911 GRANT PROGRAM Pt. 400, App. C Appendix C to Part 400—Annual Certification for E-911 Grant...

  20. RI E-911 Sites; e911Sites13q1

    Data.gov (United States)

    University of Rhode Island Geospatial Extension Program — These data were originally developed and designed for Rhode Island Enhanced 9-1-1 purposes only. These data represent every known building or structure in the state...

  1. RI E-911 Road Centerlines; e911Roads13q1

    Data.gov (United States)

    University of Rhode Island Geospatial Extension Program — These data were originally developed and designed for Rhode Island Enhanced 9-1-1 purposes only. These data contain street center lines and address ranges for all...

  2. RI E-911 Fire Hydrants; e911Hydrants13q1

    Data.gov (United States)

    University of Rhode Island Geospatial Extension Program — These data were originally developed and designed for Rhode Island Enhanced 9-1-1 purposes only. These data represents every known fire hydrant in the state of Rhode...

  3. Artificial Neural Network for Location Estimation in Wireless Communication Systems

    Directory of Open Access Journals (Sweden)

    Chien-Sheng Chen

    2012-03-01

    Full Text Available In a wireless communication system, wireless location is the technique used to estimate the location of a mobile station (MS. To enhance the accuracy of MS location prediction, we propose a novel algorithm that utilizes time of arrival (TOA measurements and the angle of arrival (AOA information to locate MS when three base stations (BSs are available. Artificial neural networks (ANN are widely used techniques in various areas to overcome the problem of exclusive and nonlinear relationships. When the MS is heard by only three BSs, the proposed algorithm utilizes the intersections of three TOA circles (and the AOA line, based on various neural networks, to estimate the MS location in non-line-of-sight (NLOS environments. Simulations were conducted to evaluate the performance of the algorithm for different NLOS error distributions. The numerical analysis and simulation results show that the proposed algorithms can obtain more precise location estimation under different NLOS environments.

  4. Artificial neural network for location estimation in wireless communication systems.

    Science.gov (United States)

    Chen, Chien-Sheng

    2012-01-01

    In a wireless communication system, wireless location is the technique used to estimate the location of a mobile station (MS). To enhance the accuracy of MS location prediction, we propose a novel algorithm that utilizes time of arrival (TOA) measurements and the angle of arrival (AOA) information to locate MS when three base stations (BSs) are available. Artificial neural networks (ANN) are widely used techniques in various areas to overcome the problem of exclusive and nonlinear relationships. When the MS is heard by only three BSs, the proposed algorithm utilizes the intersections of three TOA circles (and the AOA line), based on various neural networks, to estimate the MS location in non-line-of-sight (NLOS) environments. Simulations were conducted to evaluate the performance of the algorithm for different NLOS error distributions. The numerical analysis and simulation results show that the proposed algorithms can obtain more precise location estimation under different NLOS environments.

  5. Location based Network Optimizations for Mobile Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen

    selection in Wi-Fi networks and predictive handover optimization in heterogeneous wireless networks. The investigations in this work have indicated that location based network optimizations are beneficial compared to typical link measurement based approaches. Especially the knowledge of geographical...

  6. Radio frequency sensing measurements and methods for location classification in wireless networks

    Science.gov (United States)

    Maas, Dustin C.

    The wireless radio channel is typically thought of as a means to move information from transmitter to receiver, but the radio channel can also be used to detect changes in the environment of the radio link. This dissertation is focused on the measurements we can make at the physical layer of wireless networks, and how we can use those measurements to obtain information about the locations of transceivers and people. The first contribution of this work is the development and testing of an open source, 802.11b sounder and receiver, which is capable of decoding packets and using them to estimate the channel impulse response (CIR) of a radio link at a fraction of the cost of traditional channel sounders. This receiver improves on previous implementations by performing optimized matched filtering on the field-programmable gate array (FPGA) of the Universal Software Radio Peripheral (USRP), allowing it to operate at full bandwidth. The second contribution of this work is an extensive experimental evaluation of a technology called location distinction, i.e., the ability to identify changes in radio transceiver position, via CIR measurements. Previous location distinction work has focused on single-input single-output (SISO) radio links. We extend this work to the context of multiple-input multiple-output (MIMO) radio links, and study system design trade-offs which affect the performance of MIMO location distinction. The third contribution of this work introduces the "exploiting radio windows" (ERW) attack, in which an attacker outside of a building surreptitiously uses the transmissions of an otherwise secure wireless network inside of the building to infer location information about people inside the building. This is possible because of the relative transparency of external walls to radio transmissions. The final contribution of this dissertation is a feasibility study for building a rapidly deployable radio tomographic (RTI) imaging system for special operations forces

  7. A Survey of Wireless Fair Queuing Algorithms with Location-Dependent Channel Errors

    Directory of Open Access Journals (Sweden)

    Anca VARGATU

    2011-01-01

    Full Text Available The rapid development of wireless networks has brought more and more attention to topics related to fair allocation of resources, creation of suitable algorithms, taking into account the special characteristics of wireless environment and insurance fair access to the transmission channel, with delay bound and throughput guaranteed. Fair allocation of resources in wireless networks requires significant challenges, because of errors that occur only in these networks, such as location-dependent and bursty channel errors. In wireless networks, frequently happens, because interference of radio waves, that a user experiencing bad radio conditions during a period of time, not to receive resources in that period. This paper analyzes some resource allocation algorithms for wireless networks with location dependent errors, specifying the base idea for each algorithm and the way how it works. The analyzed fair queuing algorithms differ by the way they treat the following aspects: how to select the flows which should receive additional services, how to allocate these resources, which is the proportion received by error free flows and how the flows affected by errors are compensated.

  8. Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Stoleru, Radu; Stankovic, John A

    2004-01-01

    Location information is of paramount importance for Wireless Sensor Networks (WSN). The accuracy of collected data can significantly be affected by an imprecise positioning of the event of interest...

  9. Enhancing source location protection in wireless sensor networks

    Science.gov (United States)

    Chen, Juan; Lin, Zhengkui; Wu, Di; Wang, Bailing

    2015-12-01

    Wireless sensor networks are widely deployed in the internet of things to monitor valuable objects. Once the object is monitored, the sensor nearest to the object which is known as the source informs the base station about the object's information periodically. It is obvious that attackers can capture the object successfully by localizing the source. Thus, many protocols have been proposed to secure the source location. However, in this paper, we examine that typical source location protection protocols generate not only near but also highly localized phantom locations. As a result, attackers can trace the source easily from these phantom locations. To address these limitations, we propose a protocol to enhance the source location protection (SLE). With phantom locations far away from the source and widely distributed, SLE improves source location anonymity significantly. Theory analysis and simulation results show that our SLE provides strong source location privacy preservation and the average safety period increases by nearly one order of magnitude compared with existing work with low communication cost.

  10. A Generalized Framework for Modeling Next Generation 911 Implementations.

    Energy Technology Data Exchange (ETDEWEB)

    Kelic, Andjelka; Aamir, Munaf Syed; Kelic, Andjelka; Jrad, Ahmad M.; Mitchell, Roger

    2018-02-01

    This document summarizes the current state of Sandia 911 modeling capabilities and then addresses key aspects of Next Generation 911 (NG911) architectures for expansion of existing models. Analysis of three NG911 implementations was used to inform heuristics , associated key data requirements , and assumptions needed to capture NG911 architectures in the existing models . Modeling of NG911 necessitates careful consideration of its complexity and the diversity of implementations. Draft heuristics for constructing NG911 models are pres ented based on the analysis along with a summary of current challenges and ways to improve future NG911 modeling efforts . We found that NG911 relies on E nhanced 911 (E911) assets such as 911 selective routers to route calls originating from traditional tel ephony service which are a majority of 911 calls . We also found that the diversity and transitional nature of NG911 implementations necessitates significant and frequent data collection to ensure that adequate model s are available for crisis action support .

  11. Using a Wireless Electroencephalography Device to Evaluate E-Health and E-Learning Interventions.

    Science.gov (United States)

    Mailhot, Tanya; Lavoie, Patrick; Maheu-Cadotte, Marc-André; Fontaine, Guillaume; Cournoyer, Alexis; Côté, José; Dupuis, France; Karsenti, Thierry; Cossette, Sylvie

    Measuring engagement and other reactions of patients and health professionals to e-health and e-learning interventions remains a challenge for researchers. The aim of this pilot study was to assess the feasibility and acceptability of using a wireless electroencephalography (EEG) device to measure affective (anxiety, enjoyment, relaxation) and cognitive (attention, engagement, interest) reactions of patients and healthcare professionals during e-health or e-learning interventions. Using a wireless EEG device, we measured patient (n = 6) and health professional (n = 7) reactions during a 10-minute session of an e-health or e-learning intervention. The following feasibility and acceptability indicators were assessed and compared for patients and healthcare professionals: number of eligible participants who consented to participate, reasons for refusal, time to install and calibrate the wireless EEG device, number of participants who completed the full 10-minute sessions, participant comfort when wearing the device, signal quality, and number of observations obtained for each reaction. The wireless EEG readings were compared to participant self-rating of their reactions. We obtained at least 75% of possible observations for attention, engagement, enjoyment, and interest. EEG scores were similar to self-reported scores, but they varied throughout the sessions, which gave information on participants' real-time reactions to the e-health/e-learning interventions. Results on the other indicators support the feasibility and acceptability of the wireless EEG device for both patients and professionals. Using the wireless EEG device was feasible and acceptable. Future studies must examine its use in other contexts of care and explore which components of the interventions affected participant reactions by combining wireless EEG and eye tracking.

  12. QoE management in wireless networks

    CERN Document Server

    Wang, Ying; Zhang, Ping

    2017-01-01

    This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.

  13. The tracking and locating system of the mining personnel based on the Zigbee wireless network platform

    Energy Technology Data Exchange (ETDEWEB)

    Xiao-jia, Xie; Li-jun, Cheng; Yong, Wang [Chongqing University, Chongqing (China). College of Resources and Environmental Science

    2007-08-15

    By comparing the advanced Zigbee wireless network system with active RFID, the Zigbee wireless network technology was introduced into the system for tracking and locating of coal miners. The system structure and function characteristics were also introduced. This system makes it convenient to mine administrators, control room personnel and security inspectors to obtain information on the working hours and location of mine workers in the mine. 6 refs., 2 figs., 3 tabs.

  14. Probabilistic Location-based Routing Protocol for Mobile Wireless Sensor Networks with Intermittent Communication

    Directory of Open Access Journals (Sweden)

    Sho KUMAGAI

    2015-02-01

    Full Text Available In a sensor network, sensor data messages reach the nearest stationary sink node connected to the Internet by wireless multihop transmissions. Recently, various mobile sensors are available due to advances of robotics technologies and communication technologies. A location based message-by-message routing protocol, such as Geographic Distance Routing (GEDIR is suitable for such mobile wireless networks; however, it is required for each mobile wireless sensor node to know the current locations of all its neighbor nodes. On the other hand, various intermittent communication methods for a low power consumption requirement have been proposed for wireless sensor networks. Intermittent Receiver-driven Data Transmission (IRDT is one of the most efficient methods; however, it is difficult to combine the location based routing and the intermittent communication. In order to solve this problem, this paper proposes a probabilistic approach IRDT-GEDIR with the help of one of the solutions of the secretaries problem. Here, each time a neighbor sensor node wakes up from its sleep mode, an intermediate sensor node determines whether it forwards its buffered sensor data messages to it or not based on an estimation of achieved pseudo speed of the messages. Simulation experiments show that IRDT-GEDIR achieves higher pseudo speed of sensor data message transmissions and shorter transmission delay than achieves shorter transmission delay than the two naive combinations of IRDT and GEDIR in sensor networks with mobile sensor nodes and a stationary sink node. In addition, the guideline of the estimated numbers of the neighbor nodes of each intermediate sensor node is provided based on the results of the simulation experiments to apply the probabilistic approach IRDT-GEDIR.

  15. End-User Attitudes towards Location-Based Services and Future Mobile Wireless Devices: The Students’ Perspective

    Directory of Open Access Journals (Sweden)

    Bogdan Cramariuc

    2011-07-01

    Full Text Available Nowadays, location-enabled mobile phones are becoming more and more widespread. Various players in the mobile business forecast that, in the future, a significant part of total wireless revenue will come from Location-Based Services (LBS. An LBS system extracts information about the user’s geographical location and provides services based on the positioning information. A successful LBS service should create value for the end-user, by satisfying some of the users’ needs or wants, and at the same time preserving the key factors of the mobile wireless device, such as low costs, low battery consumption, and small size. From many users’ perspectives, location services and mobile location capabilities are still rather poorly known and poorly understood. The aim of this research is to investigate users’ views on the LBS, their requirements in terms of mobile device characteristics, their concerns in terms of privacy and usability, and their opinion on LBS applications that might increase the social wellbeing in the future wireless world. Our research is based on two surveys performed among 105 students (average student age: 24 years from two European technical universities. The survey questions were intended to solicit the youngsters’ views on present and future technological trends and on their perceived needs and wishes regarding Location-Based Services, with the aim of obtaining a better understanding of designer constraints when building a location receiver and generating new ideas related to potential future killer LBS applications.

  16. Detection of mobile user location on next generation wireless networks

    DEFF Research Database (Denmark)

    Schou, Saowanee; Olesen, Henning

    2005-01-01

    This paper proposes a novel conceptual mechanism for detecting the location of a mobile user on next generation wireless networks. This mechanism can provide location information of a mobile user at different levels of accuracy, by applying the movement detection mechanism of Mobile IPv6 at both...... macro- and micromobility level. In this scheme, an intradomain mobility management protocol (IDMP) is applied to manage the location of the mobile terminal. The mobile terminal needs two care-of addresses, a global care-of address (GCoA) and a local care-of address (LCoA). The current location...... of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...

  17. Location estimation in wireless sensor networks using spring-relaxation technique.

    Science.gov (United States)

    Zhang, Qing; Foh, Chuan Heng; Seet, Boon-Chong; Fong, A C M

    2010-01-01

    Accurate and low-cost autonomous self-localization is a critical requirement of various applications of a large-scale distributed wireless sensor network (WSN). Due to its massive deployment of sensors, explicit measurements based on specialized localization hardware such as the Global Positioning System (GPS) is not practical. In this paper, we propose a low-cost WSN localization solution. Our design uses received signal strength indicators for ranging, light weight distributed algorithms based on the spring-relaxation technique for location computation, and the cooperative approach to achieve certain location estimation accuracy with a low number of nodes with known locations. We provide analysis to show the suitability of the spring-relaxation technique for WSN localization with cooperative approach, and perform simulation experiments to illustrate its accuracy in localization.

  18. Voice Quality Estimation in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Petr Zach

    2015-01-01

    Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.

  19. An Object Location Detector Enabling People with Developmental Disabilities to Control Environmental Stimulation through Simple Occupational Activities with Battery-Free Wireless Mice

    Science.gov (United States)

    Shih, Ching-Hsiang

    2011-01-01

    This study assessed whether two persons with developmental disabilities would be able to actively perform simple occupational activities by controlling their favorite environmental stimulation using battery-free wireless mice with a newly developed object location detection program (OLDP, i.e., a new software program turning a battery-free…

  20. When Whereabouts is No Longer Thereabouts: Location Privacy in Wireless Networks

    OpenAIRE

    Freudiger, Julien

    2011-01-01

    Modern mobile devices are fast, programmable and feature localization and wireless capabilities. These technological advances notably facilitate mobile access to Internet, development of mobile applications and sharing of personal information, such as location information. Cell phone users can for example share their whereabouts with friends on online social networks. Following this trend, the field of ubiquitous computing foresees communication netwo...

  1. Location Estimation in Wireless Sensor Networks Using Spring-Relaxation Technique

    Directory of Open Access Journals (Sweden)

    Qing Zhang

    2010-05-01

    Full Text Available Accurate and low-cost autonomous self-localization is a critical requirement of various applications of a large-scale distributed wireless sensor network (WSN. Due to its massive deployment of sensors, explicit measurements based on specialized localization hardware such as the Global Positioning System (GPS is not practical. In this paper, we propose a low-cost WSN localization solution. Our design uses received signal strength indicators for ranging, light weight distributed algorithms based on the spring-relaxation technique for location computation, and the cooperative approach to achieve certain location estimation accuracy with a low number of nodes with known locations. We provide analysis to show the suitability of the spring-relaxation technique for WSN localization with cooperative approach, and perform simulation experiments to illustrate its accuracy in localization.

  2. E- and W-band high-capacity hybrid fiber-wireless link

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Pang, Xiaodan; Tafur Monroy, Idelfonso

    2014-01-01

    In this paper we summarize the work conducted in our group in the area of E- and W-band optical high-capacity fiber-wireless links. We present performance evaluations of E- and W-band mm-wave signal generation using photonic frequency upconversion employing both VCSELs and ECLs, along with transm...... in mobile backhaul/fronthaul applications, dense distributed antenna systems and fiber-over-radio scenarios.......In this paper we summarize the work conducted in our group in the area of E- and W-band optical high-capacity fiber-wireless links. We present performance evaluations of E- and W-band mm-wave signal generation using photonic frequency upconversion employing both VCSELs and ECLs, along...... with transmission over different type of optical fibers and for a number of values for the wireless link distance. Hybrid wireless-optical links can be composed of mature and resilient technology available off-the-shelf, and provide functionalities that can add value to optical access networks, specifically...

  3. A hybrid stochastic approach for self-location of wireless sensors in indoor environments.

    Science.gov (United States)

    Lloret, Jaime; Tomas, Jesus; Garcia, Miguel; Canovas, Alejandro

    2009-01-01

    Indoor location systems, especially those using wireless sensor networks, are used in many application areas. While the need for these systems is widely proven, there is a clear lack of accuracy. Many of the implemented applications have high errors in their location estimation because of the issues arising in the indoor environment. Two different approaches had been proposed using WLAN location systems: on the one hand, the so-called deductive methods take into account the physical properties of signal propagation. These systems require a propagation model, an environment map, and the position of the radio-stations. On the other hand, the so-called inductive methods require a previous training phase where the system learns the received signal strength (RSS) in each location. This phase can be very time consuming. This paper proposes a new stochastic approach which is based on a combination of deductive and inductive methods whereby wireless sensors could determine their positions using WLAN technology inside a floor of a building. Our goal is to reduce the training phase in an indoor environment, but, without an loss of precision. Finally, we compare the measurements taken using our proposed method in a real environment with the measurements taken by other developed systems. Comparisons between the proposed system and other hybrid methods are also provided.

  4. Head ballistocardiogram based on wireless multi-location sensors.

    Science.gov (United States)

    Onizuka, Kohei; Sodini, Charles G

    2015-08-01

    Recently a wearable BCG monitoring technique based on an accelerometer worn at the ear was demonstrated to replace a conventional bulky BCG acquisition system. In this work, a multi-location wireless vital signs monitor was developed, and at least two common acceleration vectors correlating to sitting-BCG were found in the supine position by using head PPG signal as a reference for eight healthy human subjects. The head side amplitude in the supine position is roughly proportional to the sitting amplitude that is in turn proportional to the stroke volume. Signal processing techniques to identify J-waves in a subject having small amplitude was also developed based on the two common vectors at the head side and top.

  5. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    I-Hsien Lin

    2010-08-01

    Full Text Available Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  6. Implementation and Analysis of a Wireless Sensor Network-Based Pet Location Monitoring System for Domestic Scenarios.

    Science.gov (United States)

    Aguirre, Erik; Lopez-Iturri, Peio; Azpilicueta, Leyre; Astrain, José Javier; Villadangos, Jesús; Santesteban, Daniel; Falcone, Francisco

    2016-08-30

    The flexibility of new age wireless networks and the variety of sensors to measure a high number of variables, lead to new scenarios where anything can be monitored by small electronic devices, thereby implementing Wireless Sensor Networks (WSN). Thanks to ZigBee, RFID or WiFi networks the precise location of humans or animals as well as some biological parameters can be known in real-time. However, since wireless sensors must be attached to biological tissues and they are highly dispersive, propagation of electromagnetic waves must be studied to deploy an efficient and well-working network. The main goal of this work is to study the influence of wireless channel limitations in the operation of a specific pet monitoring system, validated at physical channel as well as at functional level. In this sense, radio wave propagation produced by ZigBee devices operating at the ISM 2.4 GHz band is studied through an in-house developed 3D Ray Launching simulation tool, in order to analyze coverage/capacity relations for the optimal system selection as well as deployment strategy in terms of number of transceivers and location. Furthermore, a simplified dog model is developed for simulation code, considering not only its morphology but also its dielectric properties. Relevant wireless channel information such as power distribution, power delay profile and delay spread graphs are obtained providing an extensive wireless channel analysis. A functional dog monitoring system is presented, operating over the implemented ZigBee network and providing real time information to Android based devices. The proposed system can be scaled in order to consider different types of domestic pets as well as new user based functionalities.

  7. Implementation and Analysis of a Wireless Sensor Network-Based Pet Location Monitoring System for Domestic Scenarios

    Directory of Open Access Journals (Sweden)

    Erik Aguirre

    2016-08-01

    Full Text Available The flexibility of new age wireless networks and the variety of sensors to measure a high number of variables, lead to new scenarios where anything can be monitored by small electronic devices, thereby implementing Wireless Sensor Networks (WSN. Thanks to ZigBee, RFID or WiFi networks the precise location of humans or animals as well as some biological parameters can be known in real-time. However, since wireless sensors must be attached to biological tissues and they are highly dispersive, propagation of electromagnetic waves must be studied to deploy an efficient and well-working network. The main goal of this work is to study the influence of wireless channel limitations in the operation of a specific pet monitoring system, validated at physical channel as well as at functional level. In this sense, radio wave propagation produced by ZigBee devices operating at the ISM 2.4 GHz band is studied through an in-house developed 3D Ray Launching simulation tool, in order to analyze coverage/capacity relations for the optimal system selection as well as deployment strategy in terms of number of transceivers and location. Furthermore, a simplified dog model is developed for simulation code, considering not only its morphology but also its dielectric properties. Relevant wireless channel information such as power distribution, power delay profile and delay spread graphs are obtained providing an extensive wireless channel analysis. A functional dog monitoring system is presented, operating over the implemented ZigBee network and providing real time information to Android based devices. The proposed system can be scaled in order to consider different types of domestic pets as well as new user based functionalities.

  8. HSIP E911 Public Safety Answering Point (PSAP)

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — 911 Public Safety Answering Point (PSAP) service area boundaries in New Mexico According to the National Emergency Number Association (NENA), a Public Safety...

  9. Vermont Historical E911 RDS Archive (road centerlines)

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) Archive of past 9-1-1 data releases at rough yearly intervals chosen from availbable datasets from 1999 to present. For a historical overview on...

  10. A Hybrid Stochastic Approach for Self-Location of Wireless Sensors in Indoor Environments

    Directory of Open Access Journals (Sweden)

    Alejandro Canovas

    2009-05-01

    Full Text Available Indoor location systems, especially those using wireless sensor networks, are used in many application areas. While the need for these systems is widely proven, there is a clear lack of accuracy. Many of the implemented applications have high errors in their location estimation because of the issues arising in the indoor environment. Two different approaches had been proposed using WLAN location systems: on the one hand, the so-called deductive methods take into account the physical properties of signal propagation. These systems require a propagation model, an environment map, and the position of the radio-stations. On the other hand, the so-called inductive methods require a previous training phase where the system learns the received signal strength (RSS in each location. This phase can be very time consuming. This paper proposes a new stochastic approach which is based on a combination of deductive and inductive methods whereby wireless sensors could determine their positions using WLAN technology inside a floor of a building. Our goal is to reduce the training phase in an indoor environment, but, without an loss of precision. Finally, we compare the measurements taken using our proposed method in a real environment with the measurements taken by other developed systems. Comparisons between the proposed system and other hybrid methods are also provided.

  11. Estimating Single and Multiple Target Locations Using K-Means Clustering with Radio Tomographic Imaging in Wireless Sensor Networks

    Science.gov (United States)

    2015-03-26

    clustering is an algorithm that has been used in data mining applications such as machine learning applications , pattern recognition, hyper-spectral imagery...42 3.7.2 Application of K-means Clustering . . . . . . . . . . . . . . . . . 42 3.8 Experiment Design...Tomographic Imaging WLAN Wireless Local Area Networks WSN Wireless Sensor Network xx ESTIMATING SINGLE AND MULTIPLE TARGET LOCATIONS USING K-MEANS CLUSTERING

  12. Developing a Framework for E-Manufacturing Based on Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Xu Xi

    2013-06-01

    Full Text Available This paper analyzes the current situation of business environment and business intelligence systems integration at first. With emerging applications of internet and wireless communication technologies, e-manufacturing is focused on the use of internet, monitoring and communications technologies to make things happen collaboratively on a global basis. A wireless sensor network based data acquisition system gives enormous benefits such as ease and flexibility of deployment in addition to low maintenance and deployment costs. This paper reviews wireless sensor network and its application for e-manufacturing. To provide a dependable, non-intrusive, secure, real-time automated health monitoring, a distributed reconfigurable sensor network is introduced which consists of real and virtual sensor nodes over a communication wireless sensor network using Mica2 motes.

  13. DESIGN OF A REAL TIME REMOTE VEHICLE LOCATION SYSTEM

    Directory of Open Access Journals (Sweden)

    Ahmet Emir DİRİK

    2004-02-01

    Full Text Available In this study, a low-cost, real-time vehicle location system is developed. The vehicle location system includes three main modules, i.e. positioning, wireless communication and digital map modules. The positioning module used in location systems computes position of the mobile vehicle. These vehicle location data are transmitted through a wireless communication system to host. The host has a capability to monitor a fleet of vehicles by analyzing data collected from wireless communication system. In this project, mobile vehicle location positions can be computed in a range of 10m position error and by using these position data, its possible to monitor the fleet of mobile vehicles on a digital map in the observation and control center. In this study, vehicle analog mobile radios are used to establish wireless communication system. Thus, there is no need to use satellite or GSM systems for communication and a low-cost and high-performance vehicle location system is realized.

  14. 75 FR 29914 - Telecommunications Relay Services, Speech-to-Speech Services, E911 Requirements for IP-Enabled...

    Science.gov (United States)

    2010-05-28

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [CG Docket No. 03-123; WC Docket No. 05-196; FCC 08-275] Telecommunications Relay Services, Speech-to-Speech Services, E911 Requirements for IP... with the Commission's Telecommunications Relay Services, [[Page 29915

  15. Estimation of distributed Fermat-point location for wireless sensor networking.

    Science.gov (United States)

    Huang, Po-Hsian; Chen, Jiann-Liang; Larosa, Yanuarius Teofilus; Chiang, Tsui-Lien

    2011-01-01

    This work presents a localization scheme for use in wireless sensor networks (WSNs) that is based on a proposed connectivity-based RF localization strategy called the distributed Fermat-point location estimation algorithm (DFPLE). DFPLE applies triangle area of location estimation formed by intersections of three neighboring beacon nodes. The Fermat point is determined as the shortest path from three vertices of the triangle. The area of estimated location then refined using Fermat point to achieve minimum error in estimating sensor nodes location. DFPLE solves problems of large errors and poor performance encountered by localization schemes that are based on a bounding box algorithm. Performance analysis of a 200-node development environment reveals that, when the number of sensor nodes is below 150, the mean error decreases rapidly as the node density increases, and when the number of sensor nodes exceeds 170, the mean error remains below 1% as the node density increases. Second, when the number of beacon nodes is less than 60, normal nodes lack sufficient beacon nodes to enable their locations to be estimated. However, the mean error changes slightly as the number of beacon nodes increases above 60. Simulation results revealed that the proposed algorithm for estimating sensor positions is more accurate than existing algorithms, and improves upon conventional bounding box strategies.

  16. Accurate location estimation of moving object In Wireless Sensor network

    Directory of Open Access Journals (Sweden)

    Vinay Bhaskar Semwal

    2011-12-01

    Full Text Available One of the central issues in wirless sensor networks is track the location, of moving object which have overhead of saving data, an accurate estimation of the target location of object with energy constraint .We do not have any mechanism which control and maintain data .The wireless communication bandwidth is also very limited. Some field which is using this technique are flood and typhoon detection, forest fire detection, temperature and humidity and ones we have these information use these information back to a central air conditioning and ventilation.In this research paper, we propose protocol based on the prediction and adaptive based algorithm which is using less sensor node reduced by an accurate estimation of the target location. We had shown that our tracking method performs well in terms of energy saving regardless of mobility pattern of the mobile target. We extends the life time of network with less sensor node. Once a new object is detected, a mobile agent will be initiated to track the roaming path of the object.

  17. Wireless Indoor Location Estimation Based on Neural Network RSS Signature Recognition (LENSR)

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr; Milos Manic

    2008-06-01

    Location Based Services (LBS), context aware applications, and people and object tracking depend on the ability to locate mobile devices, also known as localization, in the wireless landscape. Localization enables a diverse set of applications that include, but are not limited to, vehicle guidance in an industrial environment, security monitoring, self-guided tours, personalized communications services, resource tracking, mobile commerce services, guiding emergency workers during fire emergencies, habitat monitoring, environmental surveillance, and receiving alerts. This paper presents a new neural network approach (LENSR) based on a competitive topological Counter Propagation Network (CPN) with k-nearest neighborhood vector mapping, for indoor location estimation based on received signal strength. The advantage of this approach is both speed and accuracy. The tested accuracy of the algorithm was 90.6% within 1 meter and 96.4% within 1.5 meters. Several approaches for location estimation using WLAN technology were reviewed for comparison of results.

  18. Estimation of Distributed Fermat-Point Location for Wireless Sensor Networking

    Directory of Open Access Journals (Sweden)

    Yanuarius Teofilus Larosa

    2011-04-01

    Full Text Available This work presents a localization scheme for use in wireless sensor networks (WSNs that is based on a proposed connectivity-based RF localization strategy called the distributed Fermat-point location estimation algorithm (DFPLE. DFPLE applies triangle area of location estimation formed by intersections of three neighboring beacon nodes. The Fermat point is determined as the shortest path from three vertices of the triangle. The area of estimated location then refined using Fermat point to achieve minimum error in estimating sensor nodes location. DFPLE solves problems of large errors and poor performance encountered by localization schemes that are based on a bounding box algorithm. Performance analysis of a 200-node development environment reveals that, when the number of sensor nodes is below 150, the mean error decreases rapidly as the node density increases, and when the number of sensor nodes exceeds 170, the mean error remains below 1% as the node density increases. Second, when the number of beacon nodes is less than 60, normal nodes lack sufficient beacon nodes to enable their locations to be estimated. However, the mean error changes slightly as the number of beacon nodes increases above 60. Simulation results revealed that the proposed algorithm for estimating sensor positions is more accurate than existing algorithms, and improves upon conventional bounding box strategies.

  19. QoE-based transmission strategies for multi-user wireless information and power transfer

    Directory of Open Access Journals (Sweden)

    Taehun Jung

    2015-12-01

    Full Text Available One solution to the problem of supplying energy to wireless networks is wireless power transfer. One such technology–electromagnetic radiation enabled wireless power transfer–will change traditional wireless networks. In this paper, we investigate a transmission strategy for multi-user wireless information and power transfer. We consider a multi-user multiple-input multiple-output (MIMO channel that includes one base station (BS and two user terminals (UT consisting of one energy harvesting (EH receiver and one information decoding (ID receiver. Our system provides transmission strategies that can be executed and implemented in practical scenarios. The paper then analyzes the rate–energy (R–E pair of our strategies and compares them to those of the theoretical optimal strategy. We furthermore propose a QoE-based mode selection algorithm by mapping the R–E pair to the utility functions.

  20. DISA Wireless E-Mail Trial

    National Research Council Canada - National Science Library

    Haney, Steven

    1997-01-01

    .... Correspondingly unique wireless modems were obtained and mated to the PCMCIA slot of notebook computers in the user/evaluation population, consisting of InfoTac and Mobedem wireless modems for use...

  1. 47 CFR 22.921 - 911 call processing procedures; 911-only calling mode.

    Science.gov (United States)

    2010-10-01

    ... programming in the mobile unit that determines the handling of a non-911 call and permit the call to be... CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.921 911 call processing procedures; 911-only calling mode. Mobile telephones manufactured after February 13, 2000 that are capable of...

  2. Design And Planning Of E- Learning EnvironmentE-Education System On Heterogeneous Wireless Network Control System

    Directory of Open Access Journals (Sweden)

    ThandarOo

    2015-06-01

    Full Text Available Abstract The purpose of this research is to provide a more efficient and effective communication method between teacher and student with the use of heterogeneous network. Moreover the effective use of heterogeneous network can be emphasized. The system of e-education can develop utilizing wireless network.The e-Education system can help students to communicate with their teacher more easily and effectively using a heterogeneous wireless network system. In this wireless network system students who are blind or dumb will also be able to communicate and learn from the teacher as normal students can do. All the devices or laptops will be connected on wireless LAN. Even when the teacher is not around he will be able to help his students with their study or give instructions easily by using the mobile phone to send text or voice signal. When the teacher sends information to the dumb student it will be converted into sign language for the student to be able to understand. When the dumb student sends the information to the teacher it will be converted into text for the teacher to understand. For the blind student text instructions from the teacher will be converted into audio signal using text-to-speech conversion.Thus the performance of heterogeneous wireless network model can evaluate by using Robust Optimization Method. Therefore the e-Education systems performance improves by evaluating Robust Optimization Method.

  3. Location-Based Self-Adaptive Routing Algorithm for Wireless Sensor Networks in Home Automation

    Directory of Open Access Journals (Sweden)

    Hong SeungHo

    2011-01-01

    Full Text Available The use of wireless sensor networks in home automation (WSNHA is attractive due to their characteristics of self-organization, high sensing fidelity, low cost, and potential for rapid deployment. Although the AODVjr routing algorithm in IEEE 802.15.4/ZigBee and other routing algorithms have been designed for wireless sensor networks, not all are suitable for WSNHA. In this paper, we propose a location-based self-adaptive routing algorithm for WSNHA called WSNHA-LBAR. It confines route discovery flooding to a cylindrical request zone, which reduces the routing overhead and decreases broadcast storm problems in the MAC layer. It also automatically adjusts the size of the request zone using a self-adaptive algorithm based on Bayes' theorem. This makes WSNHA-LBAR more adaptable to the changes of the network state and easier to implement. Simulation results show improved network reliability as well as reduced routing overhead.

  4. Location verification algorithm of wearable sensors for wireless body area networks.

    Science.gov (United States)

    Wang, Hua; Wen, Yingyou; Zhao, Dazhe

    2018-01-01

    Knowledge of the location of sensor devices is crucial for many medical applications of wireless body area networks, as wearable sensors are designed to monitor vital signs of a patient while the wearer still has the freedom of movement. However, clinicians or patients can misplace the wearable sensors, thereby causing a mismatch between their physical locations and their correct target positions. An error of more than a few centimeters raises the risk of mistreating patients. The present study aims to develop a scheme to calculate and detect the position of wearable sensors without beacon nodes. A new scheme was proposed to verify the location of wearable sensors mounted on the patient's body by inferring differences in atmospheric air pressure and received signal strength indication measurements from wearable sensors. Extensive two-sample t tests were performed to validate the proposed scheme. The proposed scheme could easily recognize a 30-cm horizontal body range and a 65-cm vertical body range to correctly perform sensor localization and limb identification. All experiments indicate that the scheme is suitable for identifying wearable sensor positions in an indoor environment.

  5. 22 CFR 911.7 - Review.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Review. 911.7 Section 911.7 Foreign Relations FOREIGN SERVICE GRIEVANCE BOARD IMPLEMENTATION DISPUTES § 911.7 Review. Resolution of disputes under this section shall not be subject to judicial review. ...

  6. Utilizing Context in Location-Aware Short-Range Wireless Communication

    Directory of Open Access Journals (Sweden)

    Vesa A. Korhonen

    2010-01-01

    Full Text Available We discuss how a short-range wireless communication service implemented for modern mobile communication devices can provide additional value for both the consumer and the service/product provider. When used as an information search tool, such systems allow services and products being promoted at the location they are available. For the customer, it may provide a “digitally augmented vision”, an enhanced view to the current environment. With data filtering and search rules, this may provide a self-manageable context, where the user's own personal environment and preferences to the features available in the current surroundings cooperate with a direct connection to the web-based social media. A preliminary design for such service is provided. The conclusion is that the method can generate additional revenue to the company and please the customers' buying process. In addition to the marketing, the principles described here are also applicable to other forms of human interaction.

  7. 29 CFR 1926.911 - Misfires.

    Science.gov (United States)

    2010-07-01

    ...) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Blasting and the Use of Explosives § 1926.911 Misfires. (a... hour. Misfires shall be handled under the direction of the person in charge of the blasting. All wires shall be carefully traced and a search made for unexploded charges. (e) No drilling, digging, or picking...

  8. 7 CFR 51.911 - Container.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Container. 51.911 Section 51.911 Agriculture... Standards for Grades of Table Grapes (European or Vinifera Type) 1 Definitions § 51.911 Container. Container... of grapes in packages containing 5 pounds or less, mean the master container in which the individual...

  9. Adaptive Square-Shaped Trajectory-Based Service Location Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hwa-Jung Lim

    2010-04-01

    Full Text Available In this paper we propose an adaptive square-shaped trajectory (ASST-based service location method to ensure load scalability in wireless sensor networks. This first establishes a square-shaped trajectory over the nodes that surround a target point computed by the hash function and any user can access it, using the hash. Both the width and the size of the trajectory are dynamically adjustable, depending on the number of queries made to the service information on the trajectory. The number of sensor nodes on the trajectory varies in proportion to the changing trajectory shape, allowing high loads to be distributed around the hot spot area.

  10. 31 CFR 91.1 - Authority.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Authority. 91.1 Section 91.1 Money... THE BUREAU OF THE MINT BUILDINGS AND GROUNDS § 91.1 Authority. The regulations in this part governing....S. Bullion Depository, West Point, New York; are promulgated pursuant to the authority vested in the...

  11. Location Planning for Dynamic Wireless Charging Systems for Electric Airport Passenger Buses

    Directory of Open Access Journals (Sweden)

    Stefan Helber

    2018-01-01

    Full Text Available The majority of the ground vehicles operating on the airside parts of commercial airports are currently powered by diesel engines. These include vehicles such as apron buses, fuel trucks, and aircraft tractors. Hence, these vehicles contribute to the overall CO 2 emissions of the aviation transport system and thus negatively influence its environmental footprint. To reduce this damaging environmental impact, these vehicles could potentially be electrified with on-board batteries as their energy sources. However, the conductive charging of such vehicles via stationary cable connections is rather time-consuming. A dynamic wireless charging system to supply public transportation passenger buses with electric energy while in motion has recently been installed on the Korea Advanced Institute of Science and Technology (KAIST campus and in the Korean city of Gumi. In this paper, we study configuration problems related to the use of this technology to make airport operations more environmentally sustainable. We concentrate on the power supply for apron buses and analyze the location planning problems related to the distribution of the required power supply and the wireless charging units in the apron road system. To this end, we develop a formal optimization model and discuss the first numerical results.

  12. 7 CFR 28.911 - Review classification.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Review classification. 28.911 Section 28.911... REGULATIONS COTTON CLASSING, TESTING, AND STANDARDS Cotton Classification and Market News Service for Producers Classification § 28.911 Review classification. (a) A producer may request one review...

  13. Distributed Topological Convex Hull Estimation of Event Region in Wireless Sensor Networks without Location Information

    NARCIS (Netherlands)

    Guo, Peng; Cao, Jiannong; Zhang, Kui

    2015-01-01

    In critical event (e.g., fire or gas) monitoring applications of wireless sensor networks (WSNs), convex hull of the event region is an efficient tool in handling the usual tasks like event report, routes reconstruction and human motion planning. Existing works on estimating convex hull of event

  14. 42 CFR 9.11 - Animal transport.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Animal transport. 9.11 Section 9.11 Public Health... CHIMPANZEES HELD IN THE FEDERALLY SUPPORTED SANCTUARY SYSTEM § 9.11 Animal transport. The transportation of... and Regulations and the International Air Transport Association (IATA) Live Animal Regulations and...

  15. Wireless powering of e -swimmers

    Science.gov (United States)

    Roche, Jérome; Carrara, Serena; Sanchez, Julien; Lannelongue, Jérémy; Loget, Gabriel; Bouffier, Laurent; Fischer, Peer; Kuhn, Alexander

    2014-10-01

    Miniaturized structures that can move in a controlled way in solution and integrate various functionalities are attracting considerable attention due to the potential applications in fields ranging from autonomous micromotors to roving sensors. Here we introduce a concept which allows, depending on their specific design, the controlled directional motion of objects in water, combined with electronic functionalities such as the emission of light, sensing, signal conversion, treatment and transmission. The approach is based on electric field-induced polarization, which triggers different chemical reactions at the surface of the object and thereby its propulsion. This results in a localized electric current that can power in a wireless way electronic devices in water, leading to a new class of electronic swimmers (e-swimmers).

  16. Wrox SharePoint 2010 SharePoint911 three-pack

    CERN Document Server

    Klindt, Todd; Mason, Jennifer; Rogers, Laura; Drisgill, Randy; Ross, John; Riemann, Larry; Perran, Amanda; Perran, Shane; Sanford, Jacob J; Stubbs, Paul; Caravajal, Steve

    2012-01-01

    The Wrox SharePoint 2010 SharePoint911 Three-Pack combines the contents of three full e-books written by the experts from SharePoint911.  That's over 1800 pages of hands-on advice from Todd Klindt, Shane Young, Laura Rogers, Randy Drisgill, Jennifer Mason, John Ross, and Larry Riemann, among others. In Beginning SharePoint 2010: Building Business Solutions with SharePoint (ISBN 978-0-470-61789-2) by Amanda Perran, Shane Perran, Jennifer Mason, and Laura Rogers, readers learn the core concepts, terminology, and features of SharePoint 2010. In Professiona

  17. An improved broadband E patch microstrip antenna for wireless communications

    Science.gov (United States)

    Bzeih, Amer; Chahine, Soubhi Abou; Kabalan, Karim Y.; El-Hajj, Ali; Chehab, Ali

    2007-12-01

    A broadband probe-fed microstrip antenna with E-shaped patch on a single-layer air substrate is investigated. Bandwidth enhancement of the antenna is achieved by inserting two parallel slots into its radiating patch. The effects of the antenna parameters are analyzed, and their optimal values for broadband operation are obtained. The design parameters are formulated as a function of the center frequency, and the empirical equations are validated by simulation. A 51.5% enhanced E patch antenna for modern wireless communications (Personal Communications Service, Digital Cellular System, Universal Mobile Telecommunications System, Wireless Local Area Network 802.11 b/g, and Bluetooth) is designed, simulated, fabricated, and measured. A comparison between simulated and measured results is presented, and it showed satisfactory agreement. Moreover, the effect of incorporating more parallel slots into the radiating patch is investigated. The antenna is designed and simulated for different scenarios (four slots, six slots, and eight slots), where a bandwidth of 57% is achieved in the eight-slot design.

  18. On-line structural damage localization and quantification using wireless sensors

    International Nuclear Information System (INIS)

    Hsu, Ting-Yu; Huang, Shieh-Kung; Lu, Kung-Chung; Loh, Chin-Hsiung; Wang, Yang; Lynch, Jerome Peter

    2011-01-01

    In this paper, a wireless sensing system is designed to realize on-line damage localization and quantification of a structure using a frequency response function change method (FRFCM). Data interrogation algorithms are embedded in the computational core of the wireless sensing units to extract the necessary structural features, i.e. the frequency spectrum segments around eigenfrequencies, automatically from measured structural response for the FRFCM. Instead of the raw time history of the structural response, the extracted compact structural features are transmitted to the host computer. As a result, with less data transmitted from the wireless sensors, the energy consumed by the wireless transmission is reduced. To validate the performance of the proposed wireless sensing system, a six-story steel building with replaceable bracings in each story is instrumented with the wireless sensors for on-line damage detection during shaking table tests. The accuracy of the damage detection results using the wireless sensing system is verified through comparison with the results calculated from data recorded of a traditional wired monitoring system. The results demonstrate that, by taking advantage of collocated computing resources in wireless sensors, the proposed wireless sensing system can locate and quantify damage with acceptable accuracy and moderate energy efficiency

  19. Location of terminals in a communications network

    DEFF Research Database (Denmark)

    2015-01-01

    A method (400, 500) of identifying nodes in a communications network is disclosed, the nodes being for use in locating wireless terminals within the network based upon reports from the wireless terminals of transmissions received from the nodes. The method (400, 500) comprises prioritising...... combinations of nodes in which at least three nodes are located around a reference node in a configuration satisfying similarity criteria to an idealised star configuration, wherein an idealised star configuration comprises three nodes evenly angularly distributed around, and at the same distance from......, a reference node. Also disclosed is a method (100, 200) for locating a plurality of wireless terminals in a communications network, the network comprising a plurality of network nodes at known locations, wherein the nodes emit wireless transmissions in an unsynchronised manner, such that a time difference...

  20. ePave: A Self-Powered Wireless Sensor for Smart and Autonomous Pavement.

    Science.gov (United States)

    Xiao, Jian; Zou, Xiang; Xu, Wenyao

    2017-09-26

    "Smart Pavement" is an emerging infrastructure for various on-road applications in transportation and road engineering. However, existing road monitoring solutions demand a certain periodic maintenance effort due to battery life limits in the sensor systems. To this end, we present an end-to-end self-powered wireless sensor-ePave-to facilitate smart and autonomous pavements. The ePave system includes a self-power module, an ultra-low-power sensor system, a wireless transmission module and a built-in power management module. First, we performed an empirical study to characterize the piezoelectric module in order to optimize energy-harvesting efficiency. Second, we developed an integrated sensor system with the optimized energy harvester. An adaptive power knob is designated to adjust the power consumption according to energy budgeting. Finally, we intensively evaluated the ePave system in real-world applications to examine the system's performance and explore the trade-off.

  1. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  2. 29 CFR 780.911 - Preparation for transportation.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Preparation for transportation. 780.911 Section 780.911... Employment in Fruit and Vegetable Harvest Transportation; Exemption From Overtime Pay Requirements Under Section 13(b)(16) Exempt Operations on Fruits Or Vegetables § 780.911 Preparation for transportation. The...

  3. A Real-Time De-Noising Algorithm for E-Noses in a Wireless Sensor Network

    Science.gov (United States)

    Qu, Jianfeng; Chai, Yi; Yang, Simon X.

    2009-01-01

    A wireless e-nose network system is developed for the special purpose of monitoring odorant gases and accurately estimating odor strength in and around livestock farms. This system is to simultaneously acquire accurate odor strength values remotely at various locations, where each node is an e-nose that includes four metal-oxide semiconductor (MOS) gas sensors. A modified Kalman filtering technique is proposed for collecting raw data and de-noising based on the output noise characteristics of those gas sensors. The measurement noise variance is obtained in real time by data analysis using the proposed slip windows average method. The optimal system noise variance of the filter is obtained by using the experiments data. The Kalman filter theory on how to acquire MOS gas sensors data is discussed. Simulation results demonstrate that the proposed method can adjust the Kalman filter parameters and significantly reduce the noise from the gas sensors. PMID:22399946

  4. A Real-Time De-Noising Algorithm for E-Noses in a Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Yi Chai

    2009-02-01

    Full Text Available A wireless e-nose network system is developed for the special purpose of monitoring odorant gases and accurately estimating odor strength in and around livestock farms. This system is to simultaneously acquire accurate odor strength values remotely at various locations, where each node is an e-nose that includes four metal-oxide semiconductor (MOS gas sensors. A modified Kalman filtering technique is proposed for collecting raw data and de-noising based on the output noise characteristics of those gas sensors. The measurement noise variance is obtained in real time by data analysis using the proposed slip windows average method. The optimal system noise variance of the filter is obtained by using the experiments data. The Kalman filter theory on how to acquire MOS gas sensors data is discussed. Simulation results demonstrate that the proposed method can adjust the Kalman filter parameters and significantly reduce the noise from the gas sensors.

  5. Electric Vehicle and Wireless Charging Laboratory

    Science.gov (United States)

    2018-03-23

    Wireless charging tests of electric vehicles (EV) have been conducted at the EVTC Wireless Laboratory located at the Florida Solar Energy Center, Cocoa, FL. These tests were performed to document testing protocols, evaluate standards and evaluate ope...

  6. Children's Fears: A Pre-9/11 and Post-9/11 Comparison Using the American Fear Survey Schedule for Children

    Science.gov (United States)

    Burnham, Joy J.

    2007-01-01

    Children are influenced by the salient events surrounding them (e.g., 9/11 terrorist attacks, Hurricane Katrina, massacre at Virginia Tech). In this study, the author examined fears of children and adolescents in Grades 2-12 in a pre-and post-September 11, 2001, comparison using the American Fear Survey Schedule for Children (FSSC-AM; J. J.…

  7. HTCRL: A Range-Free Location Algorithm Based on Homothetic Triangle Cyclic Refinement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Dan Zhang

    2017-03-01

    Full Text Available Wireless sensor networks (WSN have become a significant technology in recent years. They can be widely used in many applications. WSNs consist of a large number of sensor nodes and each of them is energy-constrained and low-power dissipation. Most of the sensor nodes are tiny sensors with small memories and do not acquire their own locations. This means determining the locations of the unknown sensor nodes is one of the key issues in WSN. In this paper, an improved APIT algorithm HTCRL (Homothetic Triangle Cyclic Refinement Location is proposed, which is based on the principle of the homothetic triangle. It adopts perpendicular median surface cutting to narrow down target area in order to decrease the average localization error rate. It reduces the probability of misjudgment by adding the conditions of judgment. It can get a relatively high accuracy compared with the typical APIT algorithm without any additional hardware equipment or increasing the communication overhead.

  8. Wireless Sensor Network Handles Image Data

    Science.gov (United States)

    2008-01-01

    To relay data from remote locations for NASA s Earth sciences research, Goddard Space Flight Center contributed to the development of "microservers" (wireless sensor network nodes), which are now used commercially as a quick and affordable means to capture and distribute geographical information, including rich sets of aerial and street-level imagery. NASA began this work out of a necessity for real-time recovery of remote sensor data. These microservers work much like a wireless office network, relaying information between devices. The key difference, however, is that instead of linking workstations within one office, the interconnected microservers operate miles away from one another. This attribute traces back to the technology s original use: The microservers were originally designed for seismology on remote glaciers and ice streams in Alaska, Greenland, and Antarctica-acquiring, storing, and relaying data wirelessly between ground sensors. The microservers boast three key attributes. First, a researcher in the field can establish a "managed network" of microservers and rapidly see the data streams (recovered wirelessly) on a field computer. This rapid feedback permits the researcher to reconfigure the network for different purposes over the course of a field campaign. Second, through careful power management, the microservers can dwell unsupervised in the field for up to 2 years, collecting tremendous amounts of data at a research location. The third attribute is the exciting potential to deploy a microserver network that works in synchrony with robotic explorers (e.g., providing ground truth validation for satellites, supporting rovers as they traverse the local environment). Managed networks of remote microservers that relay data unsupervised for up to 2 years can drastically reduce the costs of field instrumentation and data rec

  9. Information Sharing from 9-1-1 Centers

    Science.gov (United States)

    2014-09-01

    Police Chief, 2014, http://www.policechiefmagazine.org/ magazine /index.cfm?fuseaction=display_arch&article_id=1199&issue _id=62007. 2 “9-1-1 History...Homeland Security Magazine ,51 discusses the pros and cons of using social media to 49 Jennifer E...Information Dilemmas in Biotechnology : Organizational Boundaries As Trust Production, NBER WorkingPaper No. 5199, National Bureau of Economic

  10. 13 CFR 120.911 - Land contributions.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Land contributions. 120.911 Section 120.911 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Development... Project Property) previously acquired by the Borrower. [68 FR 57987, Oct. 7, 2003] ...

  11. Self-Oscillating Wireless Power Transfer Systems

    OpenAIRE

    Tretyakov, Sergei A.; Simovski, Constantin R.; Valagiannopoulos, Constantinos A.; Ra'di, Younes

    2017-01-01

    Conventional wireless power transfer systems consist of a microwave power generator and transmitter located at one place and a microwave power receiver located at a distance. Here we show that wireless power transfer can be realized as a single distributed microwave generator with an over-the-air feedback, so that the microwave power is generated directly at the place where the energy needs to be delivered. We demonstrate that the use of this paradigm increases efficiency and dramatically red...

  12. Hybrid nanogenerators for low frequency vibration energy harvesting and self-powered wireless locating

    Science.gov (United States)

    Yuan, Ying; Zhang, Hulin; Wang, Jie; Xie, Yuhang; Khan, Saeed Ahmed; Jin, Long; Yan, Zhuocheng; Huang, Long; Pan, Taisong; Yang, Weiqing; Lin, Yuan

    2018-01-01

    Hybrid energy harvesters based on different physical effects is fascinating, but a rational design for multiple energy harvesting is challenging. In this work, a spring-magnet oscillator-based triboelectric-electromagnetic generator (EMG) with a solar cell cap is proposed. A power was produced by a triboelectric nanogenerator (TENG) and an EMG independently or simultaneously by using a shared spring-magnet oscillator. The oscillator configuration enables versatile energy harvesting with the excellent size scalability and self-packaged structure which can perform well at low frequency ranging from 3.5 to 5 Hz. The solar cell cap mounted above the oscillator can harvest solar energy. Under vibrations at the frequency of 4 Hz, the TENG and the EMG produced maximum output power of 5.46 nW cm-3 and 378.79 μW cm-3, respectively. The generated electricity by the hybrid nanogenerator can be stored in a capacitor or Li-ion battery, which is capable of powering a wireless locator for real-time locating data reporting to a personal cell phone. The light-weight and handy hybrid nanogenerator can directly light a caution light or play as a portable flashlight by shaking hands at night.

  13. 12 CFR 9.11 - Investment of fiduciary funds.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Investment of fiduciary funds. 9.11 Section 9.11 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FIDUCIARY ACTIVITIES OF NATIONAL BANKS Regulations § 9.11 Investment of fiduciary funds. A national bank shall invest funds of a...

  14. LEA: An Algorithm to Estimate the Level of Location Exposure in Infrastructure-Based Wireless Networks

    Directory of Open Access Journals (Sweden)

    Francisco Garcia

    2017-01-01

    Full Text Available Location privacy in wireless networks is nowadays a major concern. This is due to the fact that the mere fact of transmitting may allow a network to pinpoint a mobile node. We consider that a first step to protect a mobile node in this situation is to provide it with the means to quantify how accurately a network establishes its position. To achieve this end, we introduce the location-exposure algorithm (LEA, which runs on the mobile terminal only and whose operation consists of two steps. In the first step, LEA discovers the positions of nearby network nodes and uses this information to emulate how they estimate the position of the mobile node. In the second step, it quantifies the level of exposure by computing the distance between the position estimated in the first step and its true position. We refer to these steps as a location-exposure problem. We tested our proposal with simulations and testbed experiments. These results show the ability of LEA to reproduce the location of the mobile node, as seen by the network, and to quantify the level of exposure. This knowledge can help the mobile user decide which actions should be performed before transmitting.

  15. A novel power efficient location-based cooperative routing with transmission power-upper-limit for wireless sensor networks.

    Science.gov (United States)

    Shi, Juanfei; Calveras, Anna; Cheng, Ye; Liu, Kai

    2013-05-15

    The extensive usage of wireless sensor networks (WSNs) has led to the development of many power- and energy-efficient routing protocols. Cooperative routing in WSNs can improve performance in these types of networks. In this paper we discuss the existing proposals and we propose a routing algorithm for wireless sensor networks called Power Efficient Location-based Cooperative Routing with Transmission Power-upper-limit (PELCR-TP). The algorithm is based on the principle of minimum link power and aims to take advantage of nodes cooperation to make the link work well in WSNs with a low transmission power. In the proposed scheme, with a determined transmission power upper limit, nodes find the most appropriate next nodes and single-relay nodes with the proposed algorithm. Moreover, this proposal subtly avoids non-working nodes, because we add a Bad nodes Avoidance Strategy (BAS). Simulation results show that the proposed algorithm with BAS can significantly improve the performance in reducing the overall link power, enhancing the transmission success rate and decreasing the retransmission rate.

  16. A Novel Power Efficient Location-Based Cooperative Routing with Transmission Power-Upper-Limit for Wireless Sensor Networks

    Science.gov (United States)

    Shi, Juanfei; Calveras, Anna; Cheng, Ye; Liu, Kai

    2013-01-01

    The extensive usage of wireless sensor networks (WSNs) has led to the development of many power- and energy-efficient routing protocols. Cooperative routing in WSNs can improve performance in these types of networks. In this paper we discuss the existing proposals and we propose a routing algorithm for wireless sensor networks called Power Efficient Location-based Cooperative Routing with Transmission Power-upper-limit (PELCR-TP). The algorithm is based on the principle of minimum link power and aims to take advantage of nodes cooperation to make the link work well in WSNs with a low transmission power. In the proposed scheme, with a determined transmission power upper limit, nodes find the most appropriate next nodes and single-relay nodes with the proposed algorithm. Moreover, this proposal subtly avoids non-working nodes, because we add a Bad nodes Avoidance Strategy (BAS). Simulation results show that the proposed algorithm with BAS can significantly improve the performance in reducing the overall link power, enhancing the transmission success rate and decreasing the retransmission rate. PMID:23676625

  17. Dynamic Contention Window Control Scheme in IEEE 802.11e EDCA-Based Wireless LANs

    Science.gov (United States)

    Abeysekera, B. A. Hirantha Sithira; Matsuda, Takahiro; Takine, Tetsuya

    In the IEEE 802.11 MAC protocol, access points (APs) are given the same priority as wireless terminals in terms of acquiring the wireless link, even though they aggregate several downlink flows. This feature leads to a serious throughput degradation of downlink flows, compared with uplink flows. In this paper, we propose a dynamic contention window control scheme for the IEEE 802.11e EDCA-based wireless LANs, in order to achieve fairness between uplink and downlink TCP flows while guaranteeing QoS requirements for real-time traffic. The proposed scheme first determines the minimum contention window size in the best-effort access category at APs, based on the number of TCP flows. It then determines the minimum and maximum contention window sizes in higher priority access categories, such as voice and video, so as to guarantee QoS requirements for these real-time traffic. Note that the proposed scheme does not require any modification to the MAC protocol at wireless terminals. Through simulation experiments, we show the effectiveness of the proposed scheme.

  18. Application opportunities in wireless communications. Final report

    International Nuclear Information System (INIS)

    Abbott, R.E.; Blevins, R.P.; Olmstead, C.

    1998-07-01

    This report presents the results of examinations of wireless technologies and applications that may offer potential to utilities. Five different wireless technology areas are reviewed. Three areas--Communication Networks, Monitored Security Services, and Home Automation--potentially represent new business ventures for utilities. Two areas--Automatic Vehicle Location and Automated Field-Force Management--represent wireless applications with potential for reduced operating costs and improved customer relations

  19. 15 CFR 911.8 - Technical requirements.

    Science.gov (United States)

    2010-01-01

    ... PROCEDURES CONCERNING USE OF THE NOAA SPACE-BASED DATA COLLECTION SYSTEMS § 911.8 Technical requirements. (a) All platform operators of the NOAA DCS must use a data collection platform radio set whose technical... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Technical requirements. 911.8 Section...

  20. Topology Optimisation of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Thike Aye Min

    2016-01-01

    Full Text Available Wireless sensor networks are widely used in a variety of fields including industrial environments. In case of a clustered network the location of cluster head affects the reliability of the network operation. Finding of the optimum location of the cluster head, therefore, is critical for the design of a network. This paper discusses the optimisation approach, based on the brute force algorithm, in the context of topology optimisation of a cluster structure centralised wireless sensor network. Two examples are given to verify the approach that demonstrate the implementation of the brute force algorithm to find an optimum location of the cluster head.

  1. Full-duplex bidirectional transmission of 10-Gb/s millimeter-wave QPSK signal in E-band optical wireless link.

    Science.gov (United States)

    Fang, Yuan; Yu, Jianjun; Chi, Nan; Xiao, Jiangnan

    2014-01-27

    We experimentally demonstrated full-duplex bidirectional transmission of 10-Gb/s millimeter-wave (mm-wave) quadrature phase shift keying (QPSK) signal in E-band (71-76 GHz and 81-86 GHz) optical wireless link. Single-mode fibers (SMF) are connected at both sides of the antenna for uplink and downlink which realize 40-km SMF and 2-m wireless link for bidirectional transmission simultaneously. We utilized multi-level modulation format and coherent detection in such E-band optical wireless link for the first time. Mm-wave QPSK signal is generated by photonic technique to increase spectrum efficiency and received signal is coherently detected to improve receiver sensitivity. After the coherent detection, digital signal processing is utilized to compensate impairments of devices and transmission link.

  2. An InP HBT sub-harmonic mixer for E-band wireless communication

    DEFF Research Database (Denmark)

    Johansen, Tom Keinicke; Krozer, Viktor

    2010-01-01

    This paper reports on a novel balanced HBT subharmonic mixer (SHM) for E-band wireless communication. An LO spiral type Marchand balun is integrated with the SHM. The SHM has been fabricated in a InP double heterojunction bipolar transistor (DHBT) circuit-oriented technology with fT /fmax = 180GHz...

  3. Socially Aware Heterogeneous Wireless Networks.

    Science.gov (United States)

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-06-11

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  4. Introduction to Mobile Trajectory Based Services: A New Direction in Mobile Location Based Services

    Science.gov (United States)

    Khokhar, Sarfraz; Nilsson, Arne A.

    The mandate of E911 gave birth to the idea of Location Based Services (LBS) capitalizing on the knowledge of the mobile location. The underlying estimated location is a feasible area. There is yet another class of mobile services that could be based on the mobility profiling of a mobile user. The mobility profile of a mobile user is a set of the routine trajectories of his or her travel paths. We called such services as Mobile Trajectory Based Services (MTBS). This paper introduces MTBS and functional architecture of an MTBS system. Suitability of different location estimation technologies for MTBS has been discussed and supported with simulation results.

  5. Assisting People with Disabilities in Actively Performing Designated Occupational Activities with Battery-Free Wireless Mice to Control Environmental Stimulation

    Science.gov (United States)

    Shih, Ching-Hsiang

    2013-01-01

    The latest researches use software technology (OLDP, object location detection programs) to turn a commercial high-technology product, i.e. a battery-free wireless mouse, into a high performance/precise object location detector to detect whether or not an object has been placed in the designated location. The preferred environmental stimulation is…

  6. Topological properties of random wireless networks

    Indian Academy of Sciences (India)

    Wireless networks in which the node locations are random are best modelled as random geometric graphs (RGGs). In addition to their extensive application in the modelling of wireless networks, RGGs find many new applications and are being studied in their own right. In this paper we first provide a brief introduction to the ...

  7. Portevin-Le Chatelier effect in an E911 creep resistant steel with 3%Co additives

    International Nuclear Information System (INIS)

    Kipelova, A; Kaibyshev, R; Skorobogatykh, V; Schenkova, I

    2010-01-01

    The effect of tempering temperature on mechanical properties of an E911+3%Co creep resistant steel was investigated. The mechanical tensile tests were carried out at temperatures from 298 to 1073 K and at strain rates varying from 2.1 x 10 -5 s -1 to 2.1 x 10 -1 s -1 . The Portevin-Le Chatelier (PLC) effect was found in the temperature range of 473 to 623 K. Various attributes of dynamic strain aging (DSA) like serrated flow with an acoustic emission were observed. With increasing temperature the ultimate tensile strength (UTS) and the yield strength (YS) increased while the ductility decreased. The dependences of the critical plastic strain on strain rate and temperature exhibited 'inverse' behavior that was associated with concentrated solid solution in the DSA regime.

  8. Investigation of interference in multiple-input multiple-output wireless transmission at W band for an optical wireless integration system.

    Science.gov (United States)

    Li, Xinying; Yu, Jianjun; Dong, Ze; Zhang, Junwen; Chi, Nan; Yu, Jianguo

    2013-03-01

    We experimentally investigate the interference in multiple-input multiple-output (MIMO) wireless transmission by adjusting the relative locations of horn antennas (HAs) in a 100 GHz optical wireless integration system, which can deliver a 50 Gb/s polarization-division-multiplexing quadrature-phase-shift-keying signal over 80 km single-mode fiber-28 and a 2×2 MIMO wireless link. For the parallel 2×2 MIMO wireless link, each receiver HA can only get wireless power from the corresponding transmitter HA, while for the crossover ones, the receiver HA can get wireless power from two transmitter HAs. At the wireless receiver, polarization demultiplexing is realized by the constant modulus algorithm (CMA) in the digital-signal-processing part. Compared to the parallel case, wireless interference causes about 2 dB optical signal-to-noise ratio penalty at a bit-error ratio (BER) of 3.8×10(-3) for the crossover cases if similar CMA taps are employed. The increase in CMA tap length can reduce wireless interference and improve BER performance. Furthermore, more CMA taps should be adopted to overcome the severe wireless interference when two pairs of transmitter and receiver HAs have different wireless distances.

  9. Development of an Indoor Location Based Service Test Bed and Geographic Information System with a Wireless Sensor Network

    Science.gov (United States)

    Jan, Shau-Shiun; Hsu, Li-Ta; Tsai, Wen-Ming

    2010-01-01

    In order to provide the seamless navigation and positioning services for indoor environments, an indoor location based service (LBS) test bed is developed to integrate the indoor positioning system and the indoor three-dimensional (3D) geographic information system (GIS). A wireless sensor network (WSN) is used in the developed indoor positioning system. Considering the power consumption, in this paper the ZigBee radio is used as the wireless protocol, and the received signal strength (RSS) fingerprinting positioning method is applied as the primary indoor positioning algorithm. The matching processes of the user location include the nearest neighbor (NN) algorithm, the K-weighted nearest neighbors (KWNN) algorithm, and the probabilistic approach. To enhance the positioning accuracy for the dynamic user, the particle filter is used to improve the positioning performance. As part of this research, a 3D indoor GIS is developed to be used with the indoor positioning system. This involved using the computer-aided design (CAD) software and the virtual reality markup language (VRML) to implement a prototype indoor LBS test bed. Thus, a rapid and practical procedure for constructing a 3D indoor GIS is proposed, and this GIS is easy to update and maintenance for users. The building of the Department of Aeronautics and Astronautics at National Cheng Kung University in Taiwan is used as an example to assess the performance of various algorithms for the indoor positioning system. PMID:22319282

  10. Development of an Indoor Location Based Service Test Bed and Geographic Information System with a Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Shau-Shiun Jan

    2010-03-01

    Full Text Available In order to provide the seamless navigation and positioning services for indoor environments, an indoor location based service (LBS test bed is developed to integrate the indoor positioning system and the indoor three-dimensional (3D geographic information system (GIS. A wireless sensor network (WSN is used in the developed indoor positioning system. Considering the power consumption, in this paper the ZigBee radio is used as the wireless protocol, and the received signal strength (RSS fingerprinting positioning method is applied as the primary indoor positioning algorithm. The matching processes of the user location include the nearest neighbor (NN algorithm, the K-weighted nearest neighbors (KWNN algorithm, and the probabilistic approach. To enhance the positioning accuracy for the dynamic user, the particle filter is used to improve the positioning performance. As part of this research, a 3D indoor GIS is developed to be used with the indoor positioning system. This involved using the computer-aided design (CAD software and the virtual reality markup language (VRML to implement a prototype indoor LBS test bed. Thus, a rapid and practical procedure for constructing a 3D indoor GIS is proposed, and this GIS is easy to update and maintenance for users. The building of the Department of Aeronautics and Astronautics at National Cheng Kung University in Taiwan is used as an example to assess the performance of various algorithms for the indoor positioning system.

  11. Wireless Cybersecurity

    Science.gov (United States)

    2013-04-01

    completely change the entire landscape. For example, under the quantum computing regime, factoring prime numbers requires only polynomial time (i.e., Shor’s...AFRL-OSR-VA-TR-2013-0206 Wireless Cybersecurity Biao Chen Syracuse University April 2013 Final Report DISTRIBUTION A...19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 21-02-2013 FINAL REPORT 01-04-2009 TO 30-11-2012 Wireless Cybersecurity

  12. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  13. Photonic-assisted ultrafast THz wireless access

    DEFF Research Database (Denmark)

    Yu, Xianbin; Chen, Ying; Galili, Michael

    THz technology has been considered feasible for ultrafast wireless data communi- cation, to meet the increasing demand on next-generation fast wireless access, e.g., huge data file transferring and fast mobile data stream access. This talk reviews recent progress in high-speed THz wireless...

  14. Wireless Sensor Networks and Real-Time Locating Systems to Fight against Maritime Piracy

    Directory of Open Access Journals (Sweden)

    Óscar García

    2012-06-01

    Full Text Available There is a wide range of military and civil applications where Wireless Sensor Networks (WSNs and Multi-Agent Systems (MASs can be used for providing context-awareness for troops and special corps. On the one hand, WSNs comprise an ideal technology to develop Real-Time Locating Systems (RTLSs aimed at indoor environments, where existing global navigation satellite systems do not work properly. On the other hand, agent-based architectures allow building autonomous and robust systems that are capable of working on highly dynamic scenarios. This paper presents two piracy scenarios where the n-Core platform can be applied. n-Core is a hardware and software platform intended for developing and deploying easily and quickly a wide variety of WSNs applications based on the ZigBee standard. In the first scenario a RTLS is deployed to support boarding and rescue operations. In the second scenario a multi-agent system is proposed to detect the unloading of illegal traffic of merchandise at ports.

  15. Wireless body sensor networks for health-monitoring applications

    International Nuclear Information System (INIS)

    Hao, Yang; Foster, Robert

    2008-01-01

    Current wireless technologies, such as wireless body area networks and wireless personal area networks, provide promising applications in medical monitoring systems to measure specified physiological data and also provide location-based information, if required. With the increasing sophistication of wearable and implantable medical devices and their integration with wireless sensors, an ever-expanding range of therapeutic and diagnostic applications is being pursued by research and commercial organizations. This paper aims to provide a comprehensive review of recent developments in wireless sensor technology for monitoring behaviour related to human physiological responses. It presents background information on the use of wireless technology and sensors to develop a wireless physiological measurement system. A generic miniature platform and other available technologies for wireless sensors have been studied in terms of hardware and software structural requirements for a low-cost, low-power, non-invasive and unobtrusive system. (topical review)

  16. Addressing the Influence of Hidden State on Wireless Network Optimizations using Performance Maps

    DEFF Research Database (Denmark)

    Højgaard-Hansen, Kim; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2015-01-01

    be used to optimize the use of the wireless net- work by predicting future network performance and scheduling the net- work communication for certain applications on mobile devices. However, other important factors influence the performance of the wireless communication such as changes in the propagation...... environment and resource sharing. In this work we extend the framework of performance maps for wireless networks by introducing network state as an abstraction for all other factors than location that influence the performance. Since network state might not always be directly observable the framework......Performance of wireless connectivity for network client devices is location dependent. It has been shown that it can be beneficial to collect network performance metrics along with location information to generate maps of the location dependent network performance. These performance maps can...

  17. Parenting and Temperament Prior to September 11, 2001, and Parenting Specific to 9/11 as Predictors of Children's Posttraumatic Stress Symptoms Following 9/11

    Science.gov (United States)

    Wilson, Anna C.; Lengua, Liliana J.; Meltzoff, Andrew N.; Smith, Kimberly A.

    2010-01-01

    Parenting is related to children's adjustment, but little research has examined the role of parenting in children's responses to disasters. This study describes parenting responses specific to the 9/11 terrorist attacks and examines pre-9/11 parenting, child temperament, and 9/11-specific parenting as predictors of children's posttraumatic stress…

  18. Blogging 9/11 and Memory Discourse

    Directory of Open Access Journals (Sweden)

    Maria Cristina Paganoni

    2011-09-01

    This article highlights a few of the salient discursive and linguistic patterns that recur in the 9/11 narratives that have multiplied online on several dedicated websites and investigates the evolution of 9/11 cultural memory practices, torn between the discourse of the unrepresentable and the imperative to remember. It claims that blogging 9/11, immediately after the attacks and over the years, well illustrates how the logic of memory and its interpretation of the past follow different criteria from history writing. It shows how memorialization practices, dictated by the fear of forgetting the vanishing present, contribute to that excess of memory that lies at the core of the instability and mutual competition of sources retrieved on the Internet and that might ultimately lead to a rethinking of what is the contribution of collective memory to historiography.

  19. Smartphone Household Wireless Electroencephalogram Hat

    Directory of Open Access Journals (Sweden)

    Harold Szu

    2013-01-01

    Full Text Available Rudimentary brain machine interface has existed for the gaming industry. Here, we propose a wireless, real-time, and smartphone-based electroencephalogram (EEG system for homecare applications. The system uses high-density dry electrodes and compressive sensing strategies to overcome conflicting requirements between spatial electrode density, temporal resolution, and spatiotemporal throughput rate. Spatial sparseness is addressed by close proximity between active electrodes and desired source locations and using an adaptive selection of N active among 10N passive electrodes to form m-organized random linear combinations of readouts, m≪N≪10N. Temporal sparseness is addressed via parallel frame differences in hardware. During the design phase, we took tethered laboratory EEG dataset and applied fuzzy logic to compute (a spatiotemporal average of larger magnitude EEG data centers in 0.3 second intervals and (b inside brainwave sources by Independent Component Analysis blind deconvolution without knowing the impulse response function. Our main contributions are the fidelity of quality wireless EEG data compared to original tethered data and the speed of compressive image recovery. We have compared our recovery of ill-posed inverse data against results using Block Sparse Code. Future work includes development of strategies to filter unwanted artifact from high-density EEGs (i.e., facial muscle-related events and wireless environmental electromagnetic interferences.

  20. Novel Concepts of Cooperative Wireless Networking

    DEFF Research Database (Denmark)

    Zhang, Qi

    2008-01-01

    ; secondly, the increasing density of the wireless devices makes cooperation possible; last, the cost of information exchange (i.e. transmission power, transmission time, spectrum, etc.) is very low if information exchange over short-range link is needed. Cooperation changes the way of information delivery......Although wireless networks have achieved great success in the lastest two decades, the current wireless networks have difficulties to fulll users' ever-increasing expectations and needs. It is mainly due to available spectrum resource scarcity, limited battery capacity of wireless device......, unreliable wireless radio link, etc. To tackle these issues, a new telecommunication paradigm has been proposed, referred to as cooperative wireless networking [1]. The basic idea of cooperative wireless networking is that wireless devices work together to achieve their individual goals or one common goal...

  1. Location aware event driven multipath routing in Wireless Sensor Networks: Agent based approach

    Directory of Open Access Journals (Sweden)

    A.V. Sutagundar

    2013-03-01

    Full Text Available Wireless Sensor Networks (WSNs demand reliable and energy efficient paths for critical information delivery to sink node from an event occurrence node. Multipath routing facilitates reliable data delivery in case of critical information. This paper proposes an event triggered multipath routing in WSNs by employing a set of static and mobile agents. Every sensor node is assumed to know the location information of the sink node and itself. The proposed scheme works as follows: (1 Event node computes the arbitrary midpoint between an event node and the sink node by using location information. (2 Event node establishes a shortest path from itself to the sink node through the reference axis by using a mobile agent with the help of location information; the mobile agent collects the connectivity information and other parameters of all the nodes on the way and provides the information to the sink node. (3 Event node finds the arbitrary location of the special (middle intermediate nodes (above/below reference axis by using the midpoint location information given in step 1. (4 Mobile agent clones from the event node and the clones carry the event type and discover the path passing through special intermediate nodes; the path above/below reference axis looks like an arc. While migrating from one sensor node to another along the traversed path, each mobile agent gathers the node information (such as node id, location information, residual energy, available bandwidth, and neighbors connectivity and delivers to the sink node. (5 The sink node constructs a partial topology, connecting event and sink node by using the connectivity information delivered by the mobile agents. Using the partial topology information, sink node finds the multipath and path weight factor by using link efficiency, energy ratio, and hop distance. (6 The sink node selects the number of paths among the available paths based upon the criticalness of an event, and (7 if the event is non

  2. Power Amplifier Design for E-band Wireless System Communications

    DEFF Research Database (Denmark)

    Hadziabdic, Dzenan; Krozer, Viktor; Johansen, Tom Keinicke

    2008-01-01

    E-band wireless communications will become important as the microwave backhaul for high-speed data transmission. One of the most critical components is the front-end power amplifier in this system. The paper analyzes different technologies with potential in the E-band frequency range and present...... a power amplifier design satisfying the E-band system specifications. The designed power amplifier achieves a maximum output power of ges 20 dBm with a state-of-the-art power-added efficiency of 15%. The power is realized using InP DHBT technology. To the best of our knowledge it is the highest output...... power and efficiency reported for an InP HBT power amplifier in this frequency range. The predicted power-added efficiency is higher than that of power amplifiers based on SiGe HBT and GaAs pHEMT technologies. The design shows the capabilities of InP DHBT for power amplifier applications...

  3. Dare We Not Teach 9/11 yet Advocate Citizenship Education?

    Science.gov (United States)

    Waterson, Robert A.; Haas, Mary E.

    2011-01-01

    The authors advocate for systematic teaching of 9/11 within the social studies curriculum (K-16). The examination of the issues and impact of 9/11 illustrate the power of civic education in a democracy. Illustrated are the key concepts and associated issues and values of 9/11 with the National Council for the Social Studies curriculum standards.…

  4. Muslims in Pre- and Post-9/11 Contexts

    Directory of Open Access Journals (Sweden)

    Md Abu Shahid Abdullah

    2015-07-01

    Full Text Available Muslims have never ceased to be important for the West and have been depicted in vilifying and stereotypical manners in western literature and films. However, after the tragic event of 9/11, a dramatic change has been observed in the world’s focus towards Muslims. Although stereotypes and discriminatory actions were nothing new to Muslims, the post-9/11 backlash was absolutely terrible and heartbreaking. People have started to consider Muslims either terrorists or sympathetic to terrorists, and they have been suspected and distrusted. Lots of books, articles and films have depicted Muslims in a derogatory and extreme manner. Pre-9/11 Hollywood movies True Lies and The Siege explicitly show the stereotypical attitude of the West to Muslims while post-9/11 novels like The Reluctant Fundamentalist by Mohsin Hamid and Once in a Promised Land by Laila Halaby depict the plight and predicament of Muslims in America. The article aims to depict the stereotypical, vilifying and antagonistic attitudes of the West to Arabs and Muslims in both pre- and post- 9/11 era. It also aims to prove that the depiction is highly motivated by the media, western authorities and the West’s desire for social, cultural and political dominance over the East. Keywords: Orientalism, Others, Terrorism, Media

  5. The wireless Web and patient care.

    Science.gov (United States)

    Bergeron, B P

    2001-01-01

    Wireless computing, when integrated with the Web, is poised to revolutionize the practice and teaching of medicine. As vendors introduce wireless Web technologies in the medical community that have been used successfully in the business and consumer markets, clinicians can expect profound increases in the amount of patient data, as well as the ease with which those data are acquired, analyzed, and disseminated. The enabling technologies involved in this transformation to the wireless Web range from the new generation of wireless PDAs, eBooks, and wireless data acquisition peripherals to new wireless network protocols. The rate-limiting step in the application of this technology in medicine is not technology per se but rather how quickly clinicians and their patients come to accept and appreciate the benefits and limitations of the application of wireless Web technology.

  6. Novel Navigation Algorithm for Wireless Sensor Networks without Information of Locations

    NARCIS (Netherlands)

    Guo, Peng; Jiang, Tao; Yi, Youwen; Zhang, Qian; Zhang, Kui

    2011-01-01

    In this paper, we propose a novel algorithm of distributed navigation for people to escape from critical event region in wireless sensor networks (WSNs). Unlike existing works, the scenario discussed in the paper has no goal or exit as guidance, leading to a big challenge for the navigation problem.

  7. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  8. Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks

    OpenAIRE

    de Paz Santana, Juan F.; Tapia Martínez, Dante I.; Alonso Rincón, Ricardo S.; Pinzón, Cristian; Bajo Pérez, Javier; Corchado Rodríguez, Juan M.

    2017-01-01

    Wireless sensor networks (WSNs) have become much more relevant in recent years, mainly because they can be used in a wide diversity of applications. Real-time locating systems (RTLSs) are one of the most promising applications based on WSNs and represent a currently growing market. Specifically, WSNs are an ideal alternative to develop RTLSs aimed at indoor environments where existing global navigation satellite systems, such as the global positioning system, do not work correctly due to the ...

  9. Low-profile wireless passive resonators for sensing

    Energy Technology Data Exchange (ETDEWEB)

    Gong, Xun; An, Linan

    2017-04-04

    A resonator for sensing a physical or an environmental parameter includes a support having a top surface that provides a ground plane, and a polymer-derived ceramic (PDC) element positioned on the top surface including a PDC layer, and a metal patch on the PDC layer. The metal patch is electrically isolated from all surrounding structure, and the resonator has a resonant frequency that changes as a function of the physical or environmental parameter. A system for wirelessly sensing a physical or environmental parameter includes at least one resonator and a wireless RF reader located remotely from the resonator for transmitting a wide-band RF interrogation signal that excites the resonator. The wireless RF reader detects a sensing signal retransmitted by the resonator and includes a processor for determining the physical or environmental parameter at the location of the resonator from the sensing signal.

  10. Presentations of the PTAC wireless, telecommunications and e-business technology conference

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    This conference was attended by experts in the telecommunications industry who demonstrated how the petroleum industry can reduce costs and improve profitability through innovative wireless, telecommunications and e-business technology solutions. The conference was divided into two main sessions, featuring field operation presentations and head office presentations. Current technologies and success stories and challenges were presented for exploration, drilling, completions and production operations. The conference featured 16 presentations, of which 12 have been indexed separately for inclusion in this database. refs., tabs., figs.

  11. Anthology and Absence: The Post-9/11 Anthologizing Impulse

    OpenAIRE

    Lovering Rounds, Anne

    2015-01-01

    The decade after the attacks of 9/11 and the fall of the World Trade Center saw a proliferation of New York-themed literary anthologies from a wide range of publishers. With titles like Poetry After 9/11, Manhattan Sonnet, Poems of New York, Writing New York, and I Speak of the City, these texts variously reflect upon their own post-9/11 plurivocality as preservative, regenerative, and reconstructive. However, the work of such anthologies is more complex than filling with plurivocality the ph...

  12. An Indoor Location-Based Control System Using Bluetooth Beacons for IoT Systems

    OpenAIRE

    Jun-Ho Huh; Kyungryong Seo

    2017-01-01

    The indoor location-based control system estimates the indoor position of a user to provide the service he/she requires. The major elements involved in the system are the localization server, service-provision client, user application positioning technology. The localization server controls access of terminal devices (e.g., Smart Phones and other wireless devices) to determine their locations within a specified space first and then the service-provision client initiates required services such...

  13. Wireless technology for ABC Assessment

    DEFF Research Database (Denmark)

    Kristensen, Margit; Kyng, Morten; Christensen, Erika Frischknecht

    are developing: A wireless biomonitoring system (WBMS), where data, collected from (injured) persons is distributed wirelessly to displays, available for any rescuer in need of accessing the data, independently of the rescuers location. A biosensor for measuring respiration sound and frequency, to give direct....... Firstly in the daily EMS work where the collected data can be available at the hospital before the victim arrives and data can be used in the before-arrival-planning process. Secondly in larger incidents with several victims where a WBMS can support rescuers at the incident site in the assessment...

  14. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  15. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-01-01

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless

  16. Magnetically coupled resonance wireless charging technology principles and transfer mechanisms

    Science.gov (United States)

    Zhou, Jiehua; Wan, Jian; Ma, Yinping

    2017-05-01

    With the tenure of Electric-Vehicle rising around the world, the charging methods have been paid more and more attention, the current charging mode mainly has the charging posts and battery swapping station. The construction of the charging pile or battery swapping station not only require lots of manpower, material costs but the bare conductor is also easy to generate electric spark hidden safety problems, still occupies large space. Compared with the wired charging, wireless charging mode is flexible, unlimited space and location factors and charging for vehicle safety and quickly. It complements the traditional charging methods in adaptability and the independent charge deficiencies. So the researching the wireless charging system have an important practical significance and application value. In this paper, wireless charging system designed is divided into three parts: the primary side, secondary side and resonant coupling. The main function of the primary side is to generate high-frequency alternating current, so selecting CLASS-E amplifier inverter structure through the research on full bridge, half-bridge and power amplification circuit. Addition, the wireless charging system is susceptible to outside interference, frequency drift phenomenon. Combined with the wireless energy transmission characteristics, resonant parts adopt resonant coupling energy transmission scheme and the Series-Series coupling compensation structure. For the electric vehicle charging power and voltage requirements, the main circuit is a full bridge inverter and Boost circuit used as the secondary side.

  17. Electrodynamic Wireless Power Transmission to Rotating Magnet Receivers

    International Nuclear Information System (INIS)

    Garraud, A; Jimenez, J D; Garraud, N; Arnold, D P

    2014-01-01

    This paper presents an approach for electrodynamic wireless power transmission (EWPT) using a synchronously rotating magnet located in a 3.2 cm 3 receiver. We demonstrate wireless power transmission up to 99 mW (power density equal to 31 mW/cm 3 ) over a 5-cm distance and 5 mW over a 20-cm distance. The maximum operational frequency, and hence maximal output power, is constrained by the magnetic field amplitude. A quadratic relationship is found between the maximal output power and the magnetic field. We also demonstrate simultaneous, power transmission to multiple receivers positioned at different locations

  18. Active damage localization for plate-like structures using wireless sensors and a distributed algorithm

    International Nuclear Information System (INIS)

    Liu, L; Yuan, F G

    2008-01-01

    Wireless structural health monitoring (SHM) systems have emerged as a promising technology for robust and cost-effective structural monitoring. However, the applications of wireless sensors on active diagnosis for structural health monitoring (SHM) have not been extensively investigated. Due to limited energy sources, battery-powered wireless sensors can only perform limited functions and are expected to operate at a low duty cycle. Conventional designs are not suitable for sensing high frequency signals, e.g. in the ultrasonic frequency range. More importantly, algorithms to detect structural damage with a vast amount of data usually require considerable processing and communication time and result in unaffordable power consumption for wireless sensors. In this study, an energy-efficient wireless sensor for supporting high frequency signals and a distributed damage localization algorithm for plate-like structures are proposed, discussed and validated to supplement recent advances made for active sensing-based SHM. First, the power consumption of a wireless sensor is discussed and identified. Then the design of a wireless sensor for active diagnosis using piezoelectric sensors is introduced. The newly developed wireless sensor utilizes an optimized combination of field programmable gate array (FPGA) and conventional microcontroller to address the tradeoff between power consumption and speed requirement. The proposed damage localization algorithm, based on an energy decay model, enables wireless sensors to be practically used in active diagnosis. The power consumption for data communication can be minimized while the power budget for data processing can still be affordable for a battery-powered wireless sensor. The Levenberg–Marquardt method is employed in a mains-powered sensor node or PC to locate damage. Experimental results and discussion on the improvement of power efficiency are given

  19. A Wireless Location System in LTE Networks

    OpenAIRE

    Liu, Qi; Hu, Rongyi; Liu, Shan

    2017-01-01

    Personal location technologies are becoming important with the rapid development of Mobile Internet services. In traditional cellular networks, the key problems of user location technologies are high-precision synchronization among different base stations, inflexible processing resources, and low accuracy positioning, especially for indoor environment. In this paper, a new LTE location system in Centralized Radio Access Network (C-RAN) is proposed, which makes channel and location measurement...

  20. Localization in Wireless Networks Foundations and Applications

    CERN Document Server

    Sanford, Jessica Feng; Slijepcevic, Sasha

    2012-01-01

    In a computational tour-de-force, this volume wipes away a host of problems related to location discovery in wireless ad-hoc sensor networks. WASNs have recognized potential in many applications that are location-dependent, yet are heavily constrained by factors such as cost and energy consumption. Their “ad-hoc” nature, with direct rather than mediated connections between a network of wireless devices, adds another layer of difficulty.   Basing this work entirely on data-driven, coordinated algorithms, the authors' aim is to present location discovery techniques that are highly accurate—and which fit user criteria. The research deploys nonparametric statistical methods and relies on the concept of joint probability to construct error (including location error) models and environmental field models. It also addresses system issues such as the broadcast and scheduling of the beacon. Reporting an impressive accuracy gain of almost 17 percent, and organized in a clear, sequential manner, this book represe...

  1. Design of a Child Localization System on RFID and Wireless Sensor Networks

    OpenAIRE

    Chen, Chao

    2010-01-01

    Radio Frequency Identification (RFID) and wireless sensor networks are wireless technologies that rapidly emerge and show great potential. Combining RFID and wireless sensor networks provides a cost-efficient way to expand the RFID system's range and to enable an RFID system in areas without a network infrastructure. These two technologies are employed to build a wireless localization system in a children's theme park. The main purpose of this child localization system is to track and locate ...

  2. Blind source extraction for a combined fixed and wireless sensor network

    NARCIS (Netherlands)

    Bloemendal, B.B.A.J.; Laar, van de J.; Sommen, P.C.W.

    2012-01-01

    The emergence of wireless microphones in everyday life creates opportunities to exploit spatial diversity when using fixed microphone arrays combined with these wireless microphones. Traditional array signal processing (ASP) techniques are not suitable for such a scenario since the locations of the

  3. Cooperative Diversity in Wireless Networks

    Directory of Open Access Journals (Sweden)

    A. Mahmood

    2010-01-01

    Full Text Available Transmit Diversity is an effective methodology for improving the quality and reliability of a wireless network by reducingthe effects of fading. As majority of the wireless devices (i.e. mobile handsets, etc are limited to only one antenna, especiallydue to hardware constraints, size and cost factors; cooperative communication can be utilized in order to generatetransmit diversity [1]. This enables single antenna wireless devices to share their antennas during transmission in such amanner that creates a virtual MIMO (multiple-input and multiple-output system [2] [3]. In this paper, we will analyze therecent developments and trends in this promising area of wireless Ad hoc networks. The article will also discuss variousmain cooperative signaling methods and will also observe their performance.

  4. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  5. Challenging Aspects of Terahertz Terabit Wireless Communications

    DEFF Research Database (Denmark)

    Yu, Xianbin; Galili, Michael; Jepsen, Peter Uhd

    The increasing demand on fast wireless communications, e.g. huge data file transferring and mobile broadband access, has driven wireless communication systems into a path towards Terabit era. Terahertz (THz) technology is promising due to its unique features, such as unlimited bandwidth available......, in terms of THz generation and link power budget. The THz atmospheric absorption is another critical issue to limit wireless communication range....

  6. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  7. Investigation of the performance of EOTD for GSM users in telematics applications

    Science.gov (United States)

    Sharawi, Mohammad S.; Aloi, Daniel N.

    2003-08-01

    Location-based services have been standardized for incorporation into 3rd generation wireless communications as a result of the Federal Communications Commission"s (FCC) mandate on wireless carriers to provide automatic location information (ALI) during emergency911 calls. This mandate has driven the wireless carriers to explore terrestrial, satellite, and hybrid based location technology solutions. This paper presents a communications model that investigates the position accuracyof a Global Standard Mobile (GSM) phone employing the enhanced observed time difference (EOTD) location technology. The EOTD positioning technique requires the mobile station (MS) to detect signals from at least three base stations (BS). This studyassumes the three BSs are synchronized in time. For a given BS geometry with respect to the MS, a Monte Carlo simulation was performed to assess the two-dimensional position accuracyof the MS in Rayleigh and Ricean fading channels. In each channel, a Monte Carlo simulation was performed for a good and a bad BS-to-MS geometry. The paper concludes with a list of pros/cons of implementing EOTD as a location technologyenabler in telematics applications.

  8. A functional polymorphism in a serotonin transporter gene (5-HTTLPR) interacts with 9/11 to predict gun-carrying behavior.

    Science.gov (United States)

    Barnes, J C; Beaver, Kevin M; Boutwell, Brian B

    2013-01-01

    On September 11, 2001, one of the deadliest terrorist attacks in US history took place on American soil and people around the world were impacted in myriad ways. Building on prior literature which suggests individuals are more likely to purchase a gun for self-protection if they are fearful of being victimized, the authors hypothesized that the terrorist attacks of 9/11 would lead to an increase in gun carrying among US residents. At the same time, a line of research has shown that a polymorphism in the 5-HTT gene (i.e., 5-HTTLPR) interacts with environmental stressors to predict a range of psychopathologies and behaviors. Thus, it was hypothesized that 9/11 and 5-HTTLPR would interact to predict gun carrying. The results supported both hypotheses by revealing a positive association between 9/11 and gun carrying (b = .426, odds ratio = 1.531, standard error for b = .194, z = 2.196, p = .028) in the full sample of respondents (n = 15,052) and a statistically significant interaction between 9/11 and 5-HTTLPR in the prediction of gun carrying (b = -1.519, odds ratio = .219, standard error for b = .703, z = -2.161, p = .031) in the genetic subsample of respondents (n = 2,350). This is one of the first studies to find an association between 9/11 and gun carrying and, more importantly, is the first study to report a gene-environment interaction (GxE) between a measured gene and a terrorist attack.

  9. Experiment of Wireless Sensor Network to Monitor Field Data

    Directory of Open Access Journals (Sweden)

    Kwang Sik Kim

    2009-08-01

    Full Text Available Recently the mobile wireless network has been drastically enhanced and one of the most efficient ways to realize the ubiquitous network will be to develop the converged network by integrating the mobile wireless network with other IP fixed network like NGN (Next Generation Network. So in this paper the term of the wireless ubiquitous network is used to describe this approach. In this paper, first, the wireless ubiquitous network architecture is described based on IMS which has been standardized by 3GPP (3rd Generation Partnership Program. Next, the field data collection system to match the satellite data using location information is proposed based on the concept of the wireless ubiquitous network architecture. The purpose of the proposed system is to provide more accurate analyzing method with the researchers in the remote sensing area.

  10. Energy-Efficient Querying of Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Mann, Christopher R

    2007-01-01

    Due to the distributed nature of information collection in wireless sensor networks and the inherent limitations of the component devices, the ability to store, locate, and retrieve data and services...

  11. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Science.gov (United States)

    2010-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  12. Effect of two 12-minute culturally targeted films on intent to call 911 for stroke.

    Science.gov (United States)

    Williams, Olajide; Leighton-Herrmann, Ellyn; DeSorbo, Alexandra; Eimicke, Joseph; Abel-Bey, Amparo; Valdez, Lenfis; Noble, James; Gordillo, Madeleine; Ravenell, Joseph; Ramirez, Mildred; Teresi, Jeanne A; Jean-Louis, Girardin; Ogedegbe, Gbenga

    2016-05-24

    We assessed the behavioral effect of two 12-minute culturally targeted stroke films on immediately calling 911 for suspected stroke among black and Hispanic participants using a quasi-experimental pretest-posttest design. We enrolled 102 adult churchgoers (60 black and 42 Hispanic) into a single viewing of one of the 2 stroke films-a Gospel musical (English) or Telenovela (Spanish). We measured intent to immediately call 911 using the validated 28-item Stroke Action Test in English and Spanish, along with related variables, before and immediately after the intervention. Data were analyzed using repeated-measures analysis of variance. An increase in intent to call 911 was seen immediately following the single viewing. Higher self-efficacy for calling 911 was associated with intent to call 911 among Hispanic but not black participants. A composite measure of barriers to calling 911 was not associated with intent to call 911 in either group. A significant association was found between higher stroke symptom knowledge and intent to call 911 at baseline, but not immediately following the intervention. No sex associations were found; however, being older was associated with greater intent to call 911. The majority of participants would strongly recommend the films to others. One participant appropriately called 911 for a real-life stroke event. Narrative communication in the form of tailored short films may improve intent to call 911 for stroke among the black and Hispanic population. © 2016 American Academy of Neurology.

  13. NASA Bluetooth Wireless Communications

    Science.gov (United States)

    Miller, Robert D.

    2007-01-01

    NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.

  14. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  15. eWALL Innovation for Smart e-Health Monitoring Devices

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Kyriazakos, Sofoklis

    2017-01-01

    E-health environments should be designed to provide personalized services and applications to their primary users (i.e. the patients) by breaking the barrier of technology acceptance and addressing their daily needs, under strict regulation and security constraints. A typical scenario would employ...... wireless and wired sensors and local or cloud-based processing units to collect, process, store and communicate data related to the patients’ needs and condition. E-health devices can be located on the patients’ bodies or immediate environments to monitor and interact with the patients, while they perform...

  16. Structural health monitoring using wireless sensor networks

    Science.gov (United States)

    Sreevallabhan, K.; Nikhil Chand, B.; Ramasamy, Sudha

    2017-11-01

    Monitoring and analysing health of large structures like bridges, dams, buildings and heavy machinery is important for safety, economical, operational, making prior protective measures, and repair and maintenance point of view. In recent years there is growing demand for such larger structures which in turn make people focus more on safety. By using Microelectromechanical Systems (MEMS) Accelerometer we can perform Structural Health Monitoring by studying the dynamic response through measure of ambient vibrations and strong motion of such structures. By using Wireless Sensor Networks (WSN) we can embed these sensors in wireless networks which helps us to transmit data wirelessly thus we can measure the data wirelessly at any remote location. This in turn reduces heavy wiring which is a cost effective as well as time consuming process to lay those wires. In this paper we developed WSN based MEMS-accelerometer for Structural to test the results in the railway bridge near VIT University, Vellore campus.

  17. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks.

    Science.gov (United States)

    Tu, Weijian; Xu, Xianghua; Ye, Tingcong; Cheng, Zongmao

    2017-07-04

    Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node) as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP) to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  18. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Weijian Tu

    2017-07-01

    Full Text Available Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  19. A Model for QoS - Aware Wireless Communication in Hospitals.

    Science.gov (United States)

    Alavikia, Zahra; Khadivi, Pejman; Hashemi, Masoud Reza

    2012-01-01

    In the recent decade, research regarding wireless applications in electronic health (e-Health) services has been increasing. The main benefits of using wireless technologies in e-Health applications are simple communications, fast delivery of medical information, reducing treatment cost and also reducing the medical workers' error rate. However, using wireless communications in sensitive healthcare environment raises electromagnetic interference (EMI). One of the most effective methods to avoid the EMI problem is power management. To this end, some of methods have been proposed in the literature to reduce EMI effects in health care environments. However, using these methods may result in nonaccurate interference avoidance and also may increase network complexity. To overcome these problems, we introduce two approaches based on per-user location and hospital sectoring for power management in sensitive healthcare environments. Although reducing transmission power could avoid EMI, it causes a number of successful message deliveries to the access point to decrease and, hence, the quality of service requirements cannot be meet. In this paper, we propose the use of relays for decreasing the probability of outage in the aforementioned scenario. Relay placement is the main factor to enjoy the usefulness of relay station benefits in the network and, therefore, we use the genetic algorithm to compute the optimum positions of a fixed number of relays. We have considered delay and maximum blind point coverage as two main criteria in relay station problem. The performance of the proposed method in outage reduction is investigated through simulations.

  20. Latency and Jitter Analysis for IEEE 802.11e Wireless LANs

    Directory of Open Access Journals (Sweden)

    Sungkwan Youm

    2013-01-01

    Full Text Available This paper presents a numerical analysis of latency and jitter for IEEE 802.11e wireless local area networks (WLANs in a saturation condition, by using a Markov model. We use this model to explicate how the enhanced distributed coordination function (EDCF differentiates classes of service and to characterize the probability distribution of the medium access control (MAC layer packet latency and jitter, on which the quality of the voice over Internet protocol (VoIP calls is dependent. From the proposed analytic model, we can estimate the available number of nodes determining the system performance, in order to satisfy user demands on the latency and jitter.

  1. A passive wireless ultrasound pitch–catch system

    International Nuclear Information System (INIS)

    Zahedi, F; Yao, J; Huang, H

    2015-01-01

    This paper exploits amplitude modulation and demodulation to achieve a passive wireless ultrasound pitch–catch system consisting of a wireless interrogator and a combination of a wireless actuator and a sensor mounted on a structure. The wireless interrogator operates in two modes, i.e. the generation and sensing modes. At the generation mode, the interrogator transmits two microwave signals; one is amplitude modulated with the ultrasound excitation signal while the other is a continuous-wave carrier signal. Once received by the wireless actuator, the amplitude modulated signal is demodulated using the carrier signal to recover the ultrasound excitation signal, which is then supplied to a piezoelectric wafer actuator for ultrasound generation. Subsequently, the interrogator is switched to the sensing mode by transmitting a carrier signal with a different frequency. Once received by the wireless sensor, this carrier signal is modulated with the ultrasound sensing signal acquired by the piezoelectric wafer sensor to produce an amplitude modulated microwave signal, which can then be wirelessly transmitted and demodulated by the interrogator to recover the original ultrasound sensing signal. The principle and implementation of the wireless ultrasound pitch–catch system as well as the data processing of the wirelessly received sensing signal are described. Experiment results validating wireless ultrasound generation and sensing from a distance of 0.5 m are presented. (paper)

  2. Jammer Localization Using Wireless Devices with Mitigation by Self-Configuration.

    Directory of Open Access Journals (Sweden)

    Qazi Mamoon Ashraf

    Full Text Available Communication abilities of a wireless network decrease significantly in the presence of a jammer. This paper presents a reactive technique, to detect and locate the position of a jammer using a distributed collection of wireless sensor devices. We employ the theory of autonomic computing as a framework to design the same. Upon detection of a jammer, the affected nodes self-configure their power consumption which stops unnecessary waste of battery resources. The scheme then proceeds to determine the approximate location of the jammer by analysing the location of active nodes as well as the affected nodes. This is done by employing a circular curve fitting algorithm. Results indicate a high degree of accuracy in localizing a jammer has been achieved.

  3. Monitoring and Modeling Temperature Variations Inside Silage Stack Using Novel Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Green, Ole; Shahrak Nadimi, Esmaeil; Blanes-Vidal, Victoria

    2009-01-01

    the sensor nodes were successfully delivered to the gateway. The reliable performance of the network confirmed the correct choice of network characteristics (i.e., frequency range of 433 MHz, a handshaking communication protocol and 10 mW transmission power). The designed sensor housings were capable......Abstract: By monitoring silage temperature at different locations inside silage stacks, it is possible to detect any significant increases in temperature occurring during silage decomposition. The objectives of this study were: (1) to develop novel noninvasive wireless sensor nodes for measuring...... the temperature inside silage stacks; (2) to design a suitable sensor protection housing that prevents physical and chemical damage to the sensor; and (3) to mathematically model temperature variations inside a silage stack, using system identification techniques. The designed wireless nodes were used to monitor...

  4. Monitoring and modeling temperature variations inside silage stacks using novel wireless sensor networks

    DEFF Research Database (Denmark)

    Green, O.; Nadimi, E.S.; Blanes-Vidal, V.

    2009-01-01

    the sensor nodes were successfully delivered to the gateway. The reliable performance of the network confirmed the correct choice of network characteristics (i.e., frequency range of 433 MHz, a handshaking communication protocol, and 10 mW transmission power). The designed sensor housings were capable......By monitoring silage temperature at different locations inside silage stacks, it is possible to detect any significant increases in temperature occurring during silage decomposition. The objectives of this study were: (1) to develop novel noninvasive wireless sensor nodes for measuring...... the temperature inside silage stacks; (2) to design a suitable sensor protection housing that prevents physical and chemical damage to the sensor: and (3) to mathematically model temperature variations inside a silage stack, using system identification techniques. The designed wireless nodes were used to monitor...

  5. A Survey on Wireless Transmitter Localization Using Signal Strength Measurements

    Directory of Open Access Journals (Sweden)

    Henri Nurminen

    2017-01-01

    Full Text Available Knowledge of deployed transmitters’ (Tx locations in a wireless network improves many aspects of network management. Operators and building administrators are interested in locating unknown Txs for optimizing new Tx placement, detecting and removing unauthorized Txs, selecting the nearest Tx to offload traffic onto it, and constructing radio maps for indoor and outdoor navigation. This survey provides a comprehensive review of existing algorithms that estimate the location of a wireless Tx given a set of observations with the received signal strength indication. Algorithms that require the observations to be location-tagged are suitable for outdoor mapping or small-scale indoor mapping, while algorithms that allow most observations to be unlocated trade off some accuracy to enable large-scale crowdsourcing. This article presents empirical evaluation of the algorithms using numerical simulations and real-world Bluetooth Low Energy data.

  6. Wireless Remote Control System

    Directory of Open Access Journals (Sweden)

    Adrian Tigauan

    2012-06-01

    Full Text Available This paper presents the design of a wireless remote control system based on the ZigBee communication protocol. Gathering data from sensors or performing control tasks through wireless communication is advantageous in situations in which the use of cables is impractical. An Atmega328 microcontroller (from slave device is used for gathering data from the sensors and transmitting it to a coordinator device with the help of the XBee modules. The ZigBee standard is suitable for low-cost, low-data-rate and low-power wireless networks implementations. The XBee-PRO module, designed to meet ZigBee standards, requires minimal power for reliable data exchange between devices over a distance of up to 1600m outdoors. A key component of the ZigBee protocol is the ability to support networking and this can be used in a wireless remote control system. This system may be employed e.g. to control temperature and humidity (SHT11 sensor and light intensity (TSL230 sensor levels inside a commercial greenhouse.

  7. [The Development of Information Centralization and Management Integration System for Monitors Based on Wireless Sensor Network].

    Science.gov (United States)

    Xu, Xiu; Zhang, Honglei; Li, Yiming; Li, Bin

    2015-07-01

    Developed the information centralization and management integration system for monitors of different brands and models with wireless sensor network technologies such as wireless location and wireless communication, based on the existing wireless network. With adaptive implementation and low cost, the system which possesses the advantages of real-time, efficiency and elaboration is able to collect status and data of the monitors, locate the monitors, and provide services with web server, video server and locating server via local network. Using an intranet computer, the clinical and device management staffs can access the status and parameters of monitors. Applications of this system provide convenience and save human resource for clinical departments, as well as promote the efficiency, accuracy and elaboration for the device management. The successful achievement of this system provides solution for integrated and elaborated management of the mobile devices including ventilator and infusion pump.

  8. 26 CFR 1.911-5 - Special rules for married couples.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 10 2010-04-01 2010-04-01 false Special rules for married couples. 1.911-5... TAX (CONTINUED) INCOME TAXES Earned Income of Citizens Or Residents of United States § 1.911-5 Special... residing together. If the spouses reside together, and file a joint return, they may compute their housing...

  9. System of wireless base stations employing shadow prices for power load balancing

    NARCIS (Netherlands)

    2011-01-01

    In one aspect, a system is provided. In one embodiment, the system includes a plurality of wireless base stations that are located in a contiguous spatial coverage region of a cellular communication system. Each wireless base station that is configured to generate a coverage pilot beam to enable

  10. 15 CFR 911.1 - Purpose.

    Science.gov (United States)

    2010-01-01

    ... OF THE NOAA SPACE-BASED DATA COLLECTION SYSTEMS § 911.1 Purpose. These regulations set forth the procedural, informational and technical requirements for use of the NOAA Data Collection Systems (DCS). In... agreement to operate data collection platforms pursuant to these regulations does not affect related...

  11. WHERE2 Location Aided Communications

    DEFF Research Database (Denmark)

    Dammann, Armin; Agapiou, George; Brunel, Loïc

    2013-01-01

    This paper presents an overview of preliminary results of investigations within the WHERE2 Project on identifying promising avenues for location aided enhancements to wireless communication systems. The wide ranging contributions are organized according to the following targeted systems: cellular...

  12. Wireless Power Transfer, New Approach

    OpenAIRE

    Dr. Fawzy Mansour Al Zoreiqat

    2016-01-01

    Many configurations representing wireless power transfer have been applied for this purpose. A simple and effective circuit is used in this research that contains components which are easily located for constructing the complete suggested configuration; we were successful in using Li Fi technology in transmitting power from one side to another through air.

  13. The Prospects of Ultra-Broadband THz Wireless Communications

    DEFF Research Database (Denmark)

    Yu, Xianbin; Chen, Ying; Galili, Michael

    2014-01-01

    Wireless communications have entered into a path towards Terabit era, to accommodate the increasing demands on fast wireless access, e.g. huge data file transferring and fast mobile data access. Terahertz (THz) technology is considered feasible to carry ultrafast data signals, as it offers up...... to a few THz bandwidths. This paper overviews the prospects of Tbit/s wireless data rate and their potential applications. Technically, this talk reviews the key technologies and challenges to achieve an ultrafast wireless system operating in the THz frequency band, from viewpoint of communication......, in terms of ultrafast THz generation/THz detection and link power budget....

  14. Design and Optimisation Problems in Wireless Sensor Networks

    Indian Academy of Sciences (India)

    Premkumar Karumbu,1.05 ECE,,+91-9448227167

    2010-11-14

    Nov 14, 2010 ... Wireless Networks of Multifunction Smart Sensors (WSNs). A smart sensor ... Energy and environment management networks in large buildings. Emerging ISA ... Monitoring mobile patients in hospitals and homes. Locating ...

  15. Track classification within wireless sensor network

    Science.gov (United States)

    Doumerc, Robin; Pannetier, Benjamin; Moras, Julien; Dezert, Jean; Canevet, Loic

    2017-05-01

    In this paper, we present our study on track classification by taking into account environmental information and target estimated states. The tracker uses several motion model adapted to different target dynamics (pedestrian, ground vehicle and SUAV, i.e. small unmanned aerial vehicle) and works in centralized architecture. The main idea is to explore both: classification given by heterogeneous sensors and classification obtained with our fusion module. The fusion module, presented in his paper, provides a class on each track according to track location, velocity and associated uncertainty. To model the likelihood on each class, a fuzzy approach is used considering constraints on target capability to move in the environment. Then the evidential reasoning approach based on Dempster-Shafer Theory (DST) is used to perform a time integration of this classifier output. The fusion rules are tested and compared on real data obtained with our wireless sensor network.In order to handle realistic ground target tracking scenarios, we use an autonomous smart computer deposited in the surveillance area. After the calibration step of the heterogeneous sensor network, our system is able to handle real data from a wireless ground sensor network. The performance of this system is evaluated in a real exercise for intelligence operation ("hunter hunt" scenario).

  16. Anonymous authentication and location privacy preserving schemes for LTE-A networks

    Directory of Open Access Journals (Sweden)

    Zaher Jabr Haddad

    2017-11-01

    Full Text Available Long Term Evaluation Advanced (LTE-A is the third generation partnership project for cellular network that allows subscribers to roam into networks (i.e., the Internet and wireless connections using spacial purpose base-stations, such as wireless access points and home node B. In such LTE-A based networks, neither base-stations, nor the Internet and wireless connections are trusted because base-stations are operated by un-trusted subscribers. Attackers may exploit these vulnerabilities to violate the privacy of the LTE-A subscribers. On the other hand, the tradeoff between privacy and authentication is another challenge in such networks. Therefore, in this paper, we propose two anonymous authentication schemes based on one-time pseudonymes and Schnorr Zero Knowledge Protocols. Instead of the international mobile subscriber identity, these schemes enable the user equipment, base-stations and mobility management entity to mutually authenticate each others and update the location of the user equipment without evolving the home subscriber server. The security analysis demonstrate that the proposed schemes thwart security and privacy attacks, such as malicious, international mobile subscriber identity catching, and tracking attacks. Additionally, our proposed schemes preserve the location privacy of user equipment since no entity except the mobility management entity and Gate-Way Mobile Location Center can link between the pseudonymes and the international mobile subscriber identity. Also attackers have no knowledge about international mobile subscriber identity. Hence, the proposed schemes achieve backward/forward secrecy. Furthermore, the performance evaluation shows that the proposed handover schemes impose a small overhead on the mobile nodes and it has smaller computation and communication overheads than those in other schemes.

  17. Wireless data transmission from inside electromagnetic fields.

    Science.gov (United States)

    Huertas, José Ignacio; Barraza, Roberto; Echeverry, Julian Mauricio

    2010-01-01

    This paper describes analytical and experimental work developed to evaluate the effects of the electromagnetic fields produced by high-voltage lines (400 kV) on wireless data transmission at the 900MHz band. In this work the source of the data transmission is located inside the electromagnetic field and the reception station is located at different distances from the power lines. Different atmospheric conditions are considered.

  18. Feasibility of a wireless gammar probe in radioguided surgery

    Energy Technology Data Exchange (ETDEWEB)

    Park, Hye Min; Kim, Jeong Ho; Park, Chan Jong; Joo, Koan Sik [Dept. of Physics, University of Myongji, Seoul (Korea, Republic of)

    2016-04-15

    Nuclear medicine is divided into two major domains: diagnosis and therapy. Nuclear medicine diagnostic procedures are used for determining and evaluating the physiological, chemical, endocrinal, and metabolic conditions of organs or tissues. Tumors can be diagnosed based on the images provided by the associated machinery; after diagnosis, sometimes these tumors can be surgically removed. Currently, to help guide the surgeon to the exact location of the tumor site, the use of intraoperative probes has steadily gained popularity. These probes allow the physician to locate the tumor on the basis of the higher uptake of the preoperatively injected radio pharmaceutical within the site, as compared to the surrounding tissue. Direct detection offers very good energy resolution, but the detection efficiency is low; on the other hand, indirect detection presents high efficiency and low energy resolution. For this reason, the use of both detectors is recommended for obtaining an accurate localization of the diagnostic and therapeutic fields. In the literature, there are several works that aim to develop a suitable probe that presents such characteristics (i.e., good resolution, high detection efficiency, as well as the capacity for miniaturization). In this study, a wireless gamma probe is designed for the detection of tumors of the tissue surface using a silicon photomultiplier (SiPM) and a cerium-doped gadolinium aluminum gallium garnet (Ce:GAGG) scintillator. Our experiments demonstrate the feasibility of wireless diagnostics, as well as the suitable energy resolution and spatial resolution. The system developed based on the results of this study is expected to perform intraoperative or diagnostic evaluations of residual lesions (or the absence thereof) and its quantitative distribution in the affected area, thus contributing to wireless diagnostics and screening systems.

  19. 75 FR 67362 - Notice of Public Information Collection(s) Being Submitted for Review and Approval to the Office...

    Science.gov (United States)

    2010-11-02

    ... or other forms of information technology. The FCC may not conduct or sponsor a collection of... by wireless carriers that chose to implement E911 service using a handset- based technology. The... granted. Further, carriers should undertake concrete steps necessary to come as close as possible to full...

  20. 50 CFR 2.2 - Locations of regional offices.

    Science.gov (United States)

    2010-10-01

    ... Federal Complex, 911 N.E. 11th Avenue, Portland, Oregon 97232. (b) Albuquerque Regional Office (Region 2... Carolina, South Carolina and Tennessee; the Commonwealth of Puerto Rico; and the Virgin Islands and...

  1. Two-Step Fair Scheduling of Continuous Media Streams over Error-Prone Wireless Channels

    Science.gov (United States)

    Oh, Soohyun; Lee, Jin Wook; Park, Taejoon; Jo, Tae-Chang

    In wireless cellular networks, streaming of continuous media (with strict QoS requirements) over wireless links is challenging due to their inherent unreliability characterized by location-dependent, bursty errors. To address this challenge, we present a two-step scheduling algorithm for a base station to provide streaming of continuous media to wireless clients over the error-prone wireless links. The proposed algorithm is capable of minimizing the packet loss rate of individual clients in the presence of error bursts, by transmitting packets in the round-robin manner and also adopting a mechanism for channel prediction and swapping.

  2. Wireless Sensor Networks Framework for Indoor Temperature Regulation

    DEFF Research Database (Denmark)

    Stojkoska, Biljana; Popovska Avramova, Andrijana

    2013-01-01

    Wireless Sensor Networks take a major part in our everyday lives by enhancing systems for home automation, health-care, temperature control, energy consumption monitoring etc. In this paper we focus on a system used for temperature regulation for homes, educational, industrial, commercial premises...... etc. We propose a framework for indoor regulation and optimization of temperature using wireless sensor networks based on ZigBee. Methods for optimal temperature regulation are suggested and discussed. The framework is based on methods that provide energy savings by reducing the amount of data...... transmissions through prediction methods. Additionally the framework explores techniques for localization, such that the location of the nodes is used for optimization of the temperature settings. Information on node location is used to provide the most optimal tradeo between the time it takes to reach...

  3. Automated mode shape estimation in agent-based wireless sensor networks

    Science.gov (United States)

    Zimmerman, Andrew T.; Lynch, Jerome P.

    2010-04-01

    Recent advances in wireless sensing technology have made it possible to deploy dense networks of sensing transducers within large structural systems. Because these networks leverage the embedded computing power and agent-based abilities integral to many wireless sensing devices, it is possible to analyze sensor data autonomously and in-network. In this study, market-based techniques are used to autonomously estimate mode shapes within a network of agent-based wireless sensors. Specifically, recent work in both decentralized Frequency Domain Decomposition and market-based resource allocation is leveraged to create a mode shape estimation algorithm derived from free-market principles. This algorithm allows an agent-based wireless sensor network to autonomously shift emphasis between improving mode shape accuracy and limiting the consumption of certain scarce network resources: processing time, storage capacity, and power consumption. The developed algorithm is validated by successfully estimating mode shapes using a network of wireless sensor prototypes deployed on the mezzanine balcony of Hill Auditorium, located on the University of Michigan campus.

  4. Handoff Between a Wireless Local Area Network (WLAN and a Wide Area Network (UMTS

    Directory of Open Access Journals (Sweden)

    J. Sánchez–García

    2009-04-01

    Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.

  5. Coherently Enhanced Wireless Power Transfer

    OpenAIRE

    Krasnok, Alex; Baranov, Denis G.; Generalov, Andrey; Li, Sergey; Alu, Andrea

    2017-01-01

    Extraction of electromagnetic energy by an antenna from impinging external radiation is at the basis of wireless communications and power transfer (WPT). The maximum of transferred energy is ensured when the antenna is conjugately matched, i.e., when it is resonant and it has an equal coupling with free space and its load, which is not easily implemented in near-field WPT. Here, we introduce the concept of coherently enhanced wireless power transfer. We show that a principle similar to the on...

  6. 25 CFR 11.911 - Appeal.

    Science.gov (United States)

    2010-04-01

    ... AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Children's Court § 11.911 Appeal. (a) For purposes of appeal, a record of the proceedings shall be made... the party seeking the appeal. (b) Any party to a children's court hearing may appeal a final order or...

  7. Energy Aware Clustering Algorithms for Wireless Sensor Networks

    Science.gov (United States)

    Rakhshan, Noushin; Rafsanjani, Marjan Kuchaki; Liu, Chenglian

    2011-09-01

    The sensor nodes deployed in wireless sensor networks (WSNs) are extremely power constrained, so maximizing the lifetime of the entire networks is mainly considered in the design. In wireless sensor networks, hierarchical network structures have the advantage of providing scalable and energy efficient solutions. In this paper, we investigate different clustering algorithms for WSNs and also compare these clustering algorithms based on metrics such as clustering distribution, cluster's load balancing, Cluster Head's (CH) selection strategy, CH's role rotation, node mobility, clusters overlapping, intra-cluster communications, reliability, security and location awareness.

  8. Predictors of Obesity and Physical Health Complaints Among 911 Telecommunicators

    OpenAIRE

    Michelle M. Lilly; Melissa J. London; Mary C. Mercer

    2016-01-01

    Background: This study aims to: (1) examine rates of obesity and physical health complaints among 911 telecommunicators; and (2) document the role of emotion dysregulation, psychological inflexibility, duty-related distress and dissociation, and psychopathology in predicting obesity and physical health complaints in this population. Methods: The sample consisted of 911 telecommunicators from across the country (N = 758). Participants completed an online survey assessing their mental and ph...

  9. Rethinking Indoor Localization Solutions Towards the Future of Mobile Location-Based Services

    Science.gov (United States)

    Guney, C.

    2017-11-01

    Satellite navigation systems with GNSS-enabled devices, such as smartphones, car navigation systems, have changed the way users travel in outdoor environment. GNSS is generally not well suited for indoor location and navigation because of two reasons: First, GNSS does not provide a high level of accuracy although indoor applications need higher accuracies. Secondly, poor coverage of satellite signals for indoor environments decreases its accuracy. So rather than using GNSS satellites within closed environments, existing indoor navigation solutions rely heavily on installed sensor networks. There is a high demand for accurate positioning in wireless networks in GNSS-denied environments. However, current wireless indoor positioning systems cannot satisfy the challenging needs of indoor location-aware applications. Nevertheless, access to a user's location indoors is increasingly important in the development of context-aware applications that increases business efficiency. In this study, how can the current wireless location sensing systems be tailored and integrated for specific applications, like smart cities/grids/buildings/cars and IoT applications, in GNSS-deprived areas.

  10. RETHINKING INDOOR LOCALIZATION SOLUTIONS TOWARDS THE FUTURE OF MOBILE LOCATION-BASED SERVICES

    Directory of Open Access Journals (Sweden)

    C. Guney

    2017-11-01

    Full Text Available Satellite navigation systems with GNSS-enabled devices, such as smartphones, car navigation systems, have changed the way users travel in outdoor environment. GNSS is generally not well suited for indoor location and navigation because of two reasons: First, GNSS does not provide a high level of accuracy although indoor applications need higher accuracies. Secondly, poor coverage of satellite signals for indoor environments decreases its accuracy. So rather than using GNSS satellites within closed environments, existing indoor navigation solutions rely heavily on installed sensor networks. There is a high demand for accurate positioning in wireless networks in GNSS-denied environments. However, current wireless indoor positioning systems cannot satisfy the challenging needs of indoor location-aware applications. Nevertheless, access to a user’s location indoors is increasingly important in the development of context-aware applications that increases business efficiency. In this study, how can the current wireless location sensing systems be tailored and integrated for specific applications, like smart cities/grids/buildings/cars and IoT applications, in GNSS-deprived areas.

  11. Energy-efficient digital and wireless IC design for wireless smart sensing

    Science.gov (United States)

    Zhou, Jun; Huang, Xiongchuan; Wang, Chao; Tae-Hyoung Kim, Tony; Lian, Yong

    2017-10-01

    Wireless smart sensing is now widely used in various applications such as health monitoring and structural monitoring. In conventional wireless sensor nodes, significant power is consumed in wirelessly transmitting the raw data. Smart sensing adds local intelligence to the sensor node and reduces the amount of wireless data transmission via on-node digital signal processing. While the total power consumption is reduced compared to conventional wireless sensing, the power consumption of the digital processing becomes as dominant as wireless data transmission. This paper reviews the state-of-the-art energy-efficient digital and wireless IC design techniques for reducing the power consumption of the wireless smart sensor node to prolong battery life and enable self-powered applications.

  12. 78 FR 21879 - Improving 9-1-1 Reliability; Reliability and Continuity of Communications Networks, Including...

    Science.gov (United States)

    2013-04-12

    ... action in the following areas: (1) 9-1-1 circuit auditing; (2) 9-1-1 service provider central office... remedial actions have these service providers taken, particularly with respect to critical circuit auditing... best practices, what assurances can 9-1-1 service providers make to ensure rigorous implementation on a...

  13. From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

    Directory of Open Access Journals (Sweden)

    Tieming Chen

    2016-01-01

    Full Text Available Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN and wireless body area networks (WBAN, formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN.

  14. A Research of RSSI-AM Localization Algorithm Based on Data Encryption in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wang Wei

    2014-07-01

    Full Text Available In practical application of wireless sensor networks, because of open environment, signal is easy to be attacked and traditional RSSI location technology produces errors. By analyzing the location modal of RSSI, this paper proposes a new encryption modulation algorithm: RSSI-AM, which is unlike most approaches. The location algorithm has the following advantages: simple calculation, strong security, powerful anti-interference ability and no hardware expansion required. Besides, the simulation experiment shows the location precision of ranging method based on RSSI-AM has obvious improvement compared with traditional algorithm. It can be used in the environment of wireless sensor network nodes with low cost and performance of hardware.

  15. 36 CFR 9.11 - Reclamation requirements.

    Science.gov (United States)

    2010-07-01

    ... MINERALS MANAGEMENT Mining and Mining Claims § 9.11 Reclamation requirements. (a) As contemporaneously as... within the time specified in an approved mining reclamation plan, unless a longer period is authorized in... topsoil necessary for vegetative restoration; and (vi) Reestablishing native vegetative communities. (b...

  16. 14 CFR 121.911 - Indoctrination curriculum.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Indoctrination curriculum. 121.911 Section... Indoctrination curriculum. Each indoctrination curriculum must include the following: (a) For newly hired persons being trained under an AQP: The certificate holder's policies and operating practices and general...

  17. Performance evaluation of spatial vector routing protocol for wireless sensor networks

    International Nuclear Information System (INIS)

    Baloch, J.; Jokhio, I.

    2012-01-01

    WSNs (Wireless Sensor Networks) is an emerging area of research. Researchers worldwide are working on the issues faced by sensor nodes. Communication has been a major issue in wireless networks and the problem is manifolds in WSN s because of the limited resources. The routing protocol in such networks plays a pivotal role, as an effective routing protocol could significantly reduce the energy consumed in transmitting and receiving data packets throughout a network. In this paper the performance of SVR (Spatial Vector Routing) an energy efficient, location aware routing protocol is compared with the existing location aware protocols. The results from the simulation trials show the performance of SVR. (author)

  18. Performance Evaluation of Spatial Vector Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-10-01

    Full Text Available WSNs (Wireless Sensor Networks is an emerging area of research. Researchers worldwide are working on the issues faced by sensor nodes. Communication has been a major issue in wireless networks and the problem is manifolds in WSNs because of the limited resources. The routing protocol in such networks plays a pivotal role, as an effective routing protocol could significantly reduce the energy consumed in transmitting and receiving data packets throughout a network. In this paper the performance of SVR (Spatial Vector Routing an energy efficient, location aware routing protocol is compared with the existing location aware protocols. The results from the simulation trials show the performance of SVR.

  19. A Hybrid DV-Hop Algorithm Using RSSI for Localization in Large-Scale Wireless Sensor Networks.

    Science.gov (United States)

    Cheikhrouhou, Omar; M Bhatti, Ghulam; Alroobaea, Roobaea

    2018-05-08

    With the increasing realization of the Internet-of-Things (IoT) and rapid proliferation of wireless sensor networks (WSN), estimating the location of wireless sensor nodes is emerging as an important issue. Traditional ranging based localization algorithms use triangulation for estimating the physical location of only those wireless nodes that are within one-hop distance from the anchor nodes. Multi-hop localization algorithms, on the other hand, aim at localizing the wireless nodes that can physically be residing at multiple hops away from anchor nodes. These latter algorithms have attracted a growing interest from research community due to the smaller number of required anchor nodes. One such algorithm, known as DV-Hop (Distance Vector Hop), has gained popularity due to its simplicity and lower cost. However, DV-Hop suffers from reduced accuracy due to the fact that it exploits only the network topology (i.e., number of hops to anchors) rather than the distances between pairs of nodes. In this paper, we propose an enhanced DV-Hop localization algorithm that also uses the RSSI values associated with links between one-hop neighbors. Moreover, we exploit already localized nodes by promoting them to become additional anchor nodes. Our simulations have shown that the proposed algorithm significantly outperforms the original DV-Hop localization algorithm and two of its recently published variants, namely RSSI Auxiliary Ranging and the Selective 3-Anchor DV-hop algorithm. More precisely, in some scenarios, the proposed algorithm improves the localization accuracy by almost 95%, 90% and 70% as compared to the basic DV-Hop, Selective 3-Anchor, and RSSI DV-Hop algorithms, respectively.

  20. Location-Aware Cross-Layer Design Using Overlay Watermarks

    Directory of Open Access Journals (Sweden)

    Paul Ho

    2007-04-01

    Full Text Available A new orthogonal frequency division multiplexing (OFDM system embedded with overlay watermarks for location-aware cross-layer design is proposed in this paper. One major advantage of the proposed system is the multiple functionalities the overlay watermark provides, which includes a cross-layer signaling interface, a transceiver identification for position-aware routing, as well as its basic role as a training sequence for channel estimation. Wireless terminals are typically battery powered and have limited wireless communication bandwidth. Therefore, efficient collaborative signal processing algorithms that consume less energy for computation and less bandwidth for communication are needed. Transceiver aware of its location can also improve the routing efficiency by selective flooding or selective forwarding data only in the desired direction, since in most cases the location of a wireless host is unknown. In the proposed OFDM system, location information of a mobile for efficient routing can be easily derived when a unique watermark is associated with each individual transceiver. In addition, cross-layer signaling and other interlayer interactive information can be exchanged with a new data pipe created by modulating the overlay watermarks. We also study the channel estimation and watermark removal techniques at the physical layer for the proposed overlay OFDM. Our channel estimator iteratively estimates the channel impulse response and the combined signal vector from the overlay OFDM signal. Cross-layer design that leads to low-power consumption and more efficient routing is investigated.

  1. SHER: A Colored Petri Net Based Random Mobility Model for Wireless Communications

    Science.gov (United States)

    Khan, Naeem Akhtar; Ahmad, Farooq; Khan, Sher Afzal

    2015-01-01

    In wireless network research, simulation is the most imperative technique to investigate the network’s behavior and validation. Wireless networks typically consist of mobile hosts; therefore, the degree of validation is influenced by the underlying mobility model, and synthetic models are implemented in simulators because real life traces are not widely available. In wireless communications, mobility is an integral part while the key role of a mobility model is to mimic the real life traveling patterns to study. The performance of routing protocols and mobility management strategies e.g. paging, registration and handoff is highly dependent to the selected mobility model. In this paper, we devise and evaluate the Show Home and Exclusive Regions (SHER), a novel two-dimensional (2-D) Colored Petri net (CPN) based formal random mobility model, which exhibits sociological behavior of a user. The model captures hotspots where a user frequently visits and spends time. Our solution eliminates six key issues of the random mobility models, i.e., sudden stops, memoryless movements, border effect, temporal dependency of velocity, pause time dependency, and speed decay in a single model. The proposed model is able to predict the future location of a mobile user and ultimately improves the performance of wireless communication networks. The model follows a uniform nodal distribution and is a mini simulator, which exhibits interesting mobility patterns. The model is also helpful to those who are not familiar with the formal modeling, and users can extract meaningful information with a single mouse-click. It is noteworthy that capturing dynamic mobility patterns through CPN is the most challenging and virulent activity of the presented research. Statistical and reachability analysis techniques are presented to elucidate and validate the performance of our proposed mobility model. The state space methods allow us to algorithmically derive the system behavior and rectify the

  2. Recent development in wireless sensor and ad-hoc networks

    CERN Document Server

    Li, Xiaolong; Yang, Yeon-Mo

    2015-01-01

    Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of ‘anytime, anywhere communications’. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based C...

  3. Ultralow-Energy Wireless Smart-Scales System with Micropower Generator

    Science.gov (United States)

    Kitamura, Kazuma; Yano, Hironori; Mochizuki, Misako; Takano, Tomoaki; Yamauchi, Hironori; Douseki, Takakuni

    A wireless smart-scales system with a face recognition function has been developed as an application for wireless sensor networks. The face recognition employs a wireless camera; and the system automatically identifies a person and stores the weights of all the people that use the system on a server. Two key ultralow-energy circuit techniques were devised for the smart scales. One is a nearly-zero-standby-current circuit that combines a mechanical switch and an electrical CPU-controlled power switch; it reduces the standby power dissipation of the CPU from 1.5 mW to less than 0.1 μW. The other is a super-intermittently-operating circuit with a power-switch transistor and a small resistance; it suppresses the energy dissipation of the wireless camera to just 1/4 of the total energy dissipation. Furthermore, an electromechanical micropower generator with electromagnetic induction further reduces the energy dissipation. It is located under the scales and supplies a power of 75 mW during one second.

  4. A hybrid nested partitions algorithm for banking facility location problems

    KAUST Repository

    Xia, Li; Yin, Wenjun; Dong, Jin; Wu, Teresa; Xie, Ming; Zhao, Yanjia

    2010-01-01

    The facility location problem has been studied in many industries including banking network, chain stores, and wireless network. Maximal covering location problem (MCLP) is a general model for this type of problems. Motivated by a real-world banking

  5. Intrusion detection and monitoring for wireless networks.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  6. Recent Advances in Wireless Indoor Localization Techniques and System

    Directory of Open Access Journals (Sweden)

    Zahid Farid

    2013-01-01

    Full Text Available The advances in localization based technologies and the increasing importance of ubiquitous computing and context-dependent information have led to a growing business interest in location-based applications and services. Today, most application requirements are locating or real-time tracking of physical belongings inside buildings accurately; thus, the demand for indoor localization services has become a key prerequisite in some markets. Moreover, indoor localization technologies address the inadequacy of global positioning system inside a closed environment, like buildings. Based on this, though, this paper aims to provide the reader with a review of the recent advances in wireless indoor localization techniques and system to deliver a better understanding of state-of-the-art technologies and motivate new research efforts in this promising field. For this purpose, existing wireless localization position system and location estimation schemes are reviewed, as we also compare the related techniques and systems along with a conclusion and future trends.

  7. A Model for QoS – Aware Wireless Communication in Hospitals

    Science.gov (United States)

    Alavikia, Zahra; Khadivi, Pejman; Hashemi, Masoud Reza

    2012-01-01

    In the recent decade, research regarding wireless applications in electronic health (e-Health) services has been increasing. The main benefits of using wireless technologies in e-Health applications are simple communications, fast delivery of medical information, reducing treatment cost and also reducing the medical workers’ error rate. However, using wireless communications in sensitive healthcare environment raises electromagnetic interference (EMI). One of the most effective methods to avoid the EMI problem is power management. To this end, some of methods have been proposed in the literature to reduce EMI effects in health care environments. However, using these methods may result in nonaccurate interference avoidance and also may increase network complexity. To overcome these problems, we introduce two approaches based on per-user location and hospital sectoring for power management in sensitive healthcare environments. Although reducing transmission power could avoid EMI, it causes a number of successful message deliveries to the access point to decrease and, hence, the quality of service requirements cannot be meet. In this paper, we propose the use of relays for decreasing the probability of outage in the aforementioned scenario. Relay placement is the main factor to enjoy the usefulness of relay station benefits in the network and, therefore, we use the genetic algorithm to compute the optimum positions of a fixed number of relays. We have considered delay and maximum blind point coverage as two main criteria in relay station problem. The performance of the proposed method in outage reduction is investigated through simulations. PMID:23493832

  8. Indoor Location Fingerprinting with Heterogeneous Clients

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2011-01-01

    Heterogeneous wireless clients measure signal strength differently. This is a fundamental problem for indoor location fingerprinting, and it has a high impact on the positioning accuracy. Mapping-based solutions have been presented that require manual and error-prone calibration for each new clie...

  9. Radio frequency propagation model and fading of wireless signal at 2.4 GHz in an underground coal mine

    OpenAIRE

    Patri, A.; Nimaje, D. S.

    2015-01-01

    Wireless sensor networks and wireless communication systems have become indispensable in underground mines. Wireless sensor networks are being used for better real-time data acquisition from ground monitoring devices, gas sensors, and mining equipment, whereas wireless communication systems are needed for locating and communicating with workers. Conventional methods like wireline communication have proved to be ineffective in the event of mine hazards such as roof falls, fires etc. Before imp...

  10. a Uav Based 3-D Positioning Framework for Detecting Locations of Buried Persons in Collapsed Disaster Area

    Science.gov (United States)

    Moon, H.; Kim, C.; Lee, W.

    2016-06-01

    Regarding spatial location positioning, indoor location positioning theories based on wireless communication techniques such as Wi-Fi, beacon, UWB and Bluetooth has widely been developing across the world. These techniques are mainly focusing on spatial location detection of customers using fixed wireless APs and unique Tags in the indoor environment. Besides, since existing detection equipment and techniques using ultrasound or sound etc. to detect buried persons and identify survival status for them cause 2nd damages on the collapsed debris for rescuers. In addition, it might take time to check the buried persons. However, the collapsed disaster sites should consider both outdoor and indoor environments because empty spaces under collapsed debris exists. In order to detect buried persons from the empty spaces, we should collect wireless signals with Wi-Fi from their mobile phone. Basically, the Wi-Fi signal measure 2-D location. However, since the buried persons have Z value with burial depth, we also should collect barometer sensor data from their mobile phones in order to measure Z values according to weather conditions. Specially, for quick accessibility to the disaster area, a drone (UAV; Unmanned Arial Vehicle) system, which is equipped with a wireless detection module, was introduced. Using these framework, this study aims to provide the rescuers with effective rescue information by calculating 3-D location for buried persons based on the wireless and barometer sensor fusion.

  11. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  12. A Silicon Carbide Wireless Temperature Sensing System for High Temperature Applications

    Science.gov (United States)

    Yang, Jie

    2013-01-01

    In this article, an extreme environment-capable temperature sensing system based on state-of-art silicon carbide (SiC) wireless electronics is presented. In conjunction with a Pt-Pb thermocouple, the SiC wireless sensor suite is operable at 450 °C while under centrifugal load greater than 1,000 g. This SiC wireless temperature sensing system is designed to be non-intrusively embedded inside the gas turbine generators, acquiring the temperature information of critical components such as turbine blades, and wirelessly transmitting the information to the receiver located outside the turbine engine. A prototype system was developed and verified up to 450 °C through high temperature lab testing. The combination of the extreme temperature SiC wireless telemetry technology and integrated harsh environment sensors will allow for condition-based in-situ maintenance of power generators and aircraft turbines in field operation, and can be applied in many other industries requiring extreme environment monitoring and maintenance. PMID:23377189

  13. Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network

    Science.gov (United States)

    Tolentino, Randy S.; Lee, Kijeong; Kim, Yong-Tae; Park, Gil-Cheol

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide unlimited future potentials most especially in healthcare systems. RFID is used to detect presence and location of objects while WSN is used to sense and monitor the environment. Integrating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. However, there isn't any flexible and robust communication infrastructure to integrate these devices into an emergency care setting. An efficient wireless communication substrate for medical devices that addresses ad hoc or fixed network formation, naming and discovery, transmission efficiency of data, data security and authentication, as well as filtration and aggregation of vital sign data need to be study and analyze. This paper proposed an efficient next generation architecture for RFID-based medical service management system in WSN that possesses the essential elements of each future medical application that are integrated with existing medical practices and technologies in real-time, remote monitoring, in giving medication, and patient status tracking assisted by embedded wearable wireless sensors which are integrated in wireless sensor network.

  14. A Review of Various Security Protocols in Wireless Sensor Network

    OpenAIRE

    Anupma Sangwan; Deepti Sindhu; Kulbir Singh

    2011-01-01

    Sensor networks are highly distributed networks of small, lightweight wireless sensor nodes, deployed in large numbers to monitor the environment or system by the measurement of physical parameters such as temperature, pressure, or relative humidity, sound, vibration, motion or pollutants, at different locations. A WSN [1] is composed of a large number of low-cost sensor nodes (SNs) and one or several base stations (BS) or destination nodes. SNs are typically small wireless devices with limit...

  15. Gas Detection Instrument Based on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    ANSONG FENG

    2013-06-01

    Full Text Available The wireless sensor network is used to simulate poisonous gas generating system in the Fire-Fighting Simulated Training System. In the paper, we use the wireless signal to simulate the poisonous gas source and use received signal strength indicator (RSSI to simulate the distance between the fireman and the gas source. The gas detection instrument samples the temperature and sphygmus of the trainee and uses the wireless signal as poisonous gas signal. When the trainee enters into the poisonous gas area, the gas detection instrument warns with sound and light and sends the type, density value, the location of the poisonous gas and vital signs of the trainee to host. The paper discusses the software and hardware design of the gas detection instrument. The system has been used to the several of Fire-Fighting training systems.

  16. A fully integrated wireless system for intracranial direct cortical stimulation, real-time electrocorticography data transmission, and smart cage for wireless battery recharge.

    Science.gov (United States)

    Piangerelli, Marco; Ciavarro, Marco; Paris, Antonino; Marchetti, Stefano; Cristiani, Paolo; Puttilli, Cosimo; Torres, Napoleon; Benabid, Alim Louis; Romanelli, Pantaleo

    2014-01-01

    Wireless transmission of cortical signals is an essential step to improve the safety of epilepsy procedures requiring seizure focus localization and to provide chronic recording of brain activity for Brain Computer Interface (BCI) applications. Our group developed a fully implantable and externally rechargeable device, able to provide wireless electrocorticographic (ECoG) recording and cortical stimulation (CS). The first prototype of a wireless multi-channel very low power ECoG system was custom-designed to be implanted on non-human primates. The device, named ECOGIW-16E, is housed in a compact hermetically sealed Polyether ether ketone (PEEK) enclosure, allowing seamless battery recharge. ECOGIW-16E is recharged in a wireless fashion using a special cage designed to facilitate the recharge process in monkeys and developed in accordance with guidelines for accommodation of animals by Council of Europe (ETS123). The inductively recharging cage is made up of nylon and provides a thoroughly novel experimental setting on freely moving animals. The combination of wireless cable-free ECoG and external seamless battery recharge solves the problems and shortcomings caused by the presence of cables leaving the skull, providing a safer and easier way to monitor patients and to perform ECoG recording on primates. Data transmission exploits the newly available Medical Implant Communication Service band (MICS): 402-405 MHz. ECOGIW-16E was implanted over the left sensorimotor cortex of a macaca fascicularis to assess the feasibility of wireless ECoG monitoring and brain mapping through CS. With this device, we were able to record the everyday life ECoG signal from a monkey and to deliver focal brain stimulation with movement elicitation.

  17. A Fully-Integrated Wireless System for Intracranial Direct Cortical Stimulation, Real-Time Electrocorticography Data Trasmission and Smart Cage for Wireless Battery Recharge

    Directory of Open Access Journals (Sweden)

    Marco ePiangerelli

    2014-08-01

    Full Text Available Wireless transmission of cortical signals is an essential step to improve the safety of epilepsy procedures requiring seizure focus localization and to provide chronic recording of brain activity for Brain Computer Interface(BCI applications .Our group developed a fully implantable and externally rechargeable device, able to provide wireless electrocorticographic (ECoG recording and cortical stimulation (CS. The first prototype of a wireless multi-channel very low power ECoG system was custom-designed to be implanted on non-human primates. The device,named ECOGIW-16E, is housed in a compact hermetically sealed Polyether ether ketone (PEEK enclosure, allowing seamless battery recharge. ECOGIW-16E is recharged in a wireless fashion using a special cage designed to facilitate the recharge process in monkeys and , developed in accordance with guidelines for accommodation of animals by Council of Europe (ETS123. The inductively recharging cage is made of nylon and provides a thoroughly novel experimental setting on freely moving animals. The combination of wireless cable-free ECoG and external seamless battery recharge solve the problems and shortcomings caused by the presence of cables leaving the skull,providing a safer and easier way to monitor patients and to perform ECoG recording on primates. Data transmission exploits the newly available Medical Implant Communication Service band (MICS: 402-405 MHz. ECOGW-16E was implanted over the left sensorimotor cortex of a macaca fascicularis to assess the feasibility of wireless ECoG monitoring and brain mapping through CS. With this device we were able to record the everyday life ECoG signal from a monkey and to deliver focal brain stimulation with movement elicitation.

  18. RSSI BASED LOCATION ESTIMATION IN A WI-FI ENVIRONMENT: AN EXPERIMENTAL STUDY

    Directory of Open Access Journals (Sweden)

    M. Ganesh Madhan

    2014-12-01

    Full Text Available In real life situations, location estimation of moving objects, armed personnel are of great importance. In this paper, we have attempted to locate targets which are mobile in a Wi-Fi environment. Radio Frequency (RF localization techniques based on Received Signal Strength Indication (RSSI algorithms are used. This study utilises Wireless Mon tool, software to provide complete technical information regarding received signal strength obtained from different wireless access points available in a campus Wi-Fi environment, considered for the study. All simulations have been done in MATLAB. The target location estimated by this approach agrees well with the actual GPS data.

  19. Redundancy reduction in wireless sensor networks via centrality metrics

    NARCIS (Netherlands)

    Mocanu, D.C.; Torres Vega, M.; Liotta, A.; Cui, P.; Aggarwal, C.; Zhou, Z.-H.; Tuzhilin, A.; Xiong, H.; Wu, X.

    2015-01-01

    The advances in wireless communications, together with the need of sensing and controlling various nature or human made systems in a large number of points (e.g. smart traffic control, environmental monitoring), lead to the emergence of Wireless Sensor Networks (WSN) as a powerful tool to fulfill

  20. Documenting Horror: The Use of Sound in Non-Fiction 9/11 Films

    Directory of Open Access Journals (Sweden)

    Jesse Schlotterbeck

    2011-09-01

    Full Text Available While conventional 9/11 documentaries focus on the most known and visible images of the attack, three films that work against this tendency, 9/11 (2002, 11'09''01 - September 11 (2002 and Fahrenheit 9/11 (2004, avoid the television news coverage of the towers and portray the attacks primarily through sound. These films avoid or scantly interject the too familiar footage, working instead with the audio track’s ability to convey the horrors of the event.  By emphasizing sound, these films address a challenge familiar to documentary studies: how to appropriately represent a historical event whose tragic scale makes aesthetic representation questionable.

  1. viewshed analysis of federal university of technology yola, wireless ...

    African Journals Online (AJOL)

    BARTH EKWUEME

    This requires careful network design and planning for ... of optimal sites for wireless network communication facilities for ... thereby causing the radio waves to change course. Davin ... range of applications such as location of security towers,.

  2. Wireless networks of opportunity in support of secure field operations

    Science.gov (United States)

    Stehle, Roy H.; Lewis, Mark

    1997-02-01

    Under funding from the Defense Advanced Research Projects Agency (DARPA) for joint military and law enforcement technologies, demonstrations of secure information transfer in support of law enforcement and military operations other than war, using wireless and wired technology, were held in September 1996 at several locations in the United States. In this paper, the network architecture, protocols, and equipment supporting the demonstration's scenarios are presented, together with initial results, including lessons learned and desired system enhancements. Wireless networks of opportunity encompassed in-building (wireless-LAN), campus-wide (Metricom Inc.), metropolitan (AMPS cellular, CDPD), and national (one- and two-way satellite) systems. Evolving DARPA-sponsored packet radio technology was incorporated. All data was encrypted, using multilevel information system security initiative (MISSI)FORTEZZA technology, for carriage over unsecured and unclassified commercial networks. The identification and authentication process inherent in the security system permitted logging for database accesses and provided an audit trail useful in evidence gathering. Wireless and wireline communications support, to and between modeled crisis management centers, was demonstrated. Mechanisms for the guarded transport of data through the secret-high military tactical Internet were included, to support joint law enforcement and crisis management missions. A secure World Wide Web (WWW) browser forms the primary, user-friendly interface for information retrieval and submission. The WWW pages were structured to be sensitive to the bandwidth, error rate, and cost of the communications medium in use (e.g., the use of and resolution for graphical data). Both still and motion compressed video were demonstrated, along with secure voice transmission from laptop computers in the field. Issues of network bandwidth, airtime costs, and deployment status are discussed.

  3. Wireless mesh networks.

    Science.gov (United States)

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

  4. Mobile location services for the next generation wireless network

    DEFF Research Database (Denmark)

    Schou, Saowanee

    2008-01-01

    Mobile location services exploit mobile location technologies for determining where a mobile user is geographically located. This information can then be used for providing location-specific content to the mobile user. The mobile location services can be used, for example, for finding points...... of interest, getting weather information, and tracking the whereabouts of a child. Mobile location services gained a great deal of interest in 2000, and they were envisioned by the business players in the mobile service market as one of the few service categories where the mobile users would be willing to pay...... for the usage. Since 2000, we have seen countless mobile location services commercially deployed in different parts of the world, and the services have been adopted more enthusiastically by the mobile users in Asia, especially in Japan and South Korea, compared to other parts of the world. However, the overall...

  5. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Van Leeuwen, Brian P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Eldridge, John M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approach that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.

  6. Optimum wireless sensor deployment scheme for structural health monitoring: a simulation study

    International Nuclear Information System (INIS)

    Liu, Chengyin; Fang, Kun; Teng, Jun

    2015-01-01

    With the rapid advancements in smart sensing technology and wireless communication technology, the wireless sensor network (WSN) offers an alternative solution to structural health monitoring (SHM). In WSNs, dense deployment of wireless nodes aids the identification of structural dynamic characteristics, while data transmission is a significant issue since wireless channels typically have a lower bandwidth and a limited power supply. This paper provides a wireless sensor deployment optimization scheme for SHM, in terms of both energy consumption and modal identification accuracy. A spherical energy model is established to formulate the energy consumption within a WSN. The optimal number of sensors and their locations are obtained through solving a multi-objective function with weighting factors on energy consumption and modal identification accuracy using a genetic algorithm (GA). Simulation and comparison results with traditional sensor deployment methods demonstrate the efficiency of the proposed optimization scheme. (paper)

  7. Aesthetic Appreciation, Ethics, and 9/11

    Directory of Open Access Journals (Sweden)

    Emmanouil Aretoulakis

    2008-01-01

    Full Text Available There have been numerous critical articles on what really happened on the otherwise beautiful morning of 11 September 2001. Beyond doubt, the bulk of the critical responses to the terrorist attacks focused on the ethical and humanitarian, or rather the unethical and inhumane implications of the atrocious act, leaving no room for any philosophical reflection on the potential assessment or reception of the event from the perspective of art and aesthetics. The few years that have gone by since 2001 have provided us with some a sense of emotional detachment from the horror of that day, a detachment that may have awakened our aesthetic and artistic instincts with regard to the attacks themselves as well as their visual representation. Chronological distance renders an unprejudiced and independent stance more possible now than ever. It also allows us to reconsider our initial politically correct and ethically justified repulsion of the efforts made by a few artists to aestheticize 9/11. Such repulsion, however, was associated with the delusion that by denouncing aesthetics we were really securing the prevalence of politics, morality and ethical responsibility in a terror-afflicted society. My point in this paper is that there is a need for aesthetic appreciation when contemplating a violent event such as the 9/11 terrorist attacks. What is more, appreciation of the beautiful, even in case of a 9/11, seems necessary because it is a key to establishing an ethical stance towards terror, life, and art. It should be stressed that independent aesthetic experience is not important in itself but is a means of cultivating an authentic moral and ethical judgment.

  8. 17 CFR 9.11 - Form, contents and delivery of notice of disciplinary or access denial action.

    Science.gov (United States)

    2010-04-01

    ... notice of disciplinary or access denial action. 9.11 Section 9.11 Commodity and Securities Exchanges... OTHER ADVERSE ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.11 Form, contents and delivery of notice of disciplinary or access denial action. (a) When required...

  9. Joint sensor placement and power rating selection in energy harvesting wireless sensor networks

    KAUST Repository

    Bushnaq, Osama M.

    2017-11-02

    In this paper, the focus is on optimal sensor placement and power rating selection for parameter estimation in wireless sensor networks (WSNs). We take into account the amount of energy harvested by the sensing nodes, communication link quality, and the observation accuracy at the sensor level. In particular, the aim is to reconstruct the estimation parameter with minimum error at a fusion center under a system budget constraint. To achieve this goal, a subset of sensing locations is selected from a large pool of candidate sensing locations. Furthermore, the type of sensor to be placed at those locations is selected from a given set of sensor types (e.g., sensors with different power ratings). We further investigate whether it is better to install a large number of cheap sensors, a few expensive sensors or a combination of different sensor types at the optimal locations.

  10. TCPL: A Defense against wormhole attacks in wireless sensor networks

    International Nuclear Information System (INIS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-01-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  11. Implementation of mobile ip smooth handoff in wireless networks

    International Nuclear Information System (INIS)

    Kayastha, M.; Chowdhry, B.S.; Memon, A.R.

    2002-01-01

    This paper describes implementation of mobile IP services in two separate wireless LANs based on IEEE 802.11b standards, located in two distant buildings of a university campus. The purpose of the project was to achieve smooth hand-off when a mobile node moves between the two LANs. During our experimentation we have identified some of the limitation of IEEE 802.11b that affects mobile 1P smooth hand off. We have also proposed an algorithm to solve this problem when the mobility is within a limited number of separate wireless LANs. (author)

  12. Use of consumer wireless devices by South Africans with severe communication disability.

    Science.gov (United States)

    Bornman, Juan; Bryen, Diane Nelson; Moolman, Enid; Morris, John

    2016-01-01

    Advancements in wireless technology (e.g. cell phones and tablets) have opened new communication opportunities and environments for individuals with severe communication disabilities. The advancement of these technologies poses challenges to ensuring that these individuals enjoy equal access to this increasingly essential technology. However, a paucity of research exists. To describe the nature and frequency with which South African adults with severe communication disabilities have access to and use wireless devices, as well as the types of activities for which wireless devices are used. Survey research was conducted with 30 individuals who use augmentative and alternative communication (AAC) technology using the Survey of User Needs Questionnaire developed in the United States, and localized to the South African context. All participants, despite their limited education, unemployment and low economic status, owned and/or used mainstream wireless devices. Slightly more than half of the participants (53.3%) needed adaptations to their wireless devices. Advantages of using wireless devices were highlighted, including connecting with others (through using text messaging, social networking, making plans with others, sharing photos and videos with friends), for leisure activities (e.g. listening to music, watching videos, playing games), and for safety purposes (e.g. to navigate when lost, using the device when in trouble and needing immediate assistance). These wireless devices offer substantial benefits and opportunities to individuals with disabilities who rely on AAC in terms of independence, social participation, education and safety/security. However, they still do not enjoy equal opportunity to access and use wireless devices relative to the non-disabled population.

  13. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  14. A Comparative Study of Wireless Sensor Networks and Their Routing Protocols

    OpenAIRE

    Subhajit Pal; Debnath Bhattacharyya; Tai-hoon Kim

    2010-01-01

    Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs). Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and comp...

  15. Energy harvesting for wireless sensors by using piezoelectric transducers

    Energy Technology Data Exchange (ETDEWEB)

    Duerager, Christian [Empa, Swiss Federal Laboratories for Materials Science and Technology, Duebendorf (Switzerland)

    2012-07-01

    Wireless sensor technology, which integrates transducers, measurement electronics and wireless communication, has become increasingly vital in structural health monitoring (SHM) applications. Compared to traditional wired systems, wireless solutions reduce the installation time and costs and are not subjected to breakage caused by harsh weather conditions or other extreme events. Because of the low installation costs, wireless sensor networks allow the deployment of a big number of wireless sensor nodes on the structures. Moreover, the nodes can be placed on particularly critical components of the structure difficult to reach by wires. In most of the cases the power supply are conventional batteries, which could be a problem because of their finite life span. Furthermore, in the case of wireless sensor nodes located on structures, it is often advantageous to embed them, which makes an access impossible. Therefore, if a method of obtaining the untapped energy surrounding these sensors was implemented, significant life could be added to the power supply. Various approaches to energy harvesting and energy storage are discussed and limitations associated with the current technology are addressed. In this paper we first discuss the research that has been performed in the area of energy harvesting for wireless sensor technologies by using the ambient vibration energy. In many cases the energy produced by the ambient vibrations is far too small to directly power a wireless sensor node. Therefore, in a second step we discuss the development process for an electronic energy harvesting circuit optimized for piezoelectric transducers. In the last part of this paper an experiment with different piezoelectric transducers and their applicability for energy harvesting applications on vibrating structures will be discussed. (orig.)

  16. A Comparative Study of Wireless Sensor Networks and Their Routing Protocols

    Directory of Open Access Journals (Sweden)

    Subhajit Pal

    2010-11-01

    Full Text Available Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs. Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  17. Performance and efficiency. The flat-six engines in the new Porsche 911 Carrera; Performance und Effizienz. Die Boxermotoren im neuen Porsche 911 Carrera

    Energy Technology Data Exchange (ETDEWEB)

    Wasserbaech, Thomas; Kerkau, Martin; Bofinger, Gerd; Baumann, Markus; Kerner, Joerg; Neusser, Heinz-Jakob [Dr.-Ing. h.c. F. Porsche AG, Weissach (Germany)

    2012-11-01

    At 48 years of age, the new Porsche 911 Carrera is younger than ever. The completely redeveloped generation of the Sports Car icon has raised the bar for performance and efficiency even higher. All versions boast fuel consumption of less than ten litres per 100 kilometres. Fuel consumption and emissions are reduced by up to 16 percent compared with the predecessor. A significant contribution to this is made by the extensively optimised flat-six engines. The performance of the 3.8-litre engine in the 911 Carrera S was increased to 400 hp through further dethrottling of the intake section and the exhaust system in conjunction with optimisation of the combustion process, while consumption was reduced by 15 percent through use of the Porsche Doppelkupplung (PDK). The displacement of the 3.4-litre engine of the 911 Carrera was reduced compared with its predecessor. In this case also, engine power and acceleration values were further increased while reducing fuel consumption by 16 percent. To enhance the emotiveness of the driving experience, the revving ability of the flat engines was further improved by reducing the rotating masses and the maximum engine speed was increased to 7,800 rpm. In combination with the new 7-speed manual transmission and the Porsche Doppelkupplung (PDK), specific functions were developed which acoustically highlight the spontaneous response of the engine to the accelerator pedal and gearshift command, making the new 911 Carrera much more emotive. Auto Start Stop, coasting, thermal management, vehicle electrical system recuperation and friction-reduction measures simultaneously improve efficiency. (orig.)

  18. Wireless Communication over Time-Varying Channels With Limited Feedback

    NARCIS (Netherlands)

    Simon, C.

    2011-01-01

    The number of deployed wireless communication systems has grown rapidly in the last years. Their popularity is mainly due to the effortlessness with which the systems can be deployed. Further, the new generation of wireless systems, e.g., 802.11n, starts to close the performance gap to their wired

  19. A UAV BASED 3-D POSITIONING FRAMEWORK FOR DETECTING LOCATIONS OF BURIED PERSONS IN COLLAPSED DISASTER AREA

    Directory of Open Access Journals (Sweden)

    H. Moon

    2016-06-01

    Full Text Available Regarding spatial location positioning, indoor location positioning theories based on wireless communication techniques such as Wi-Fi, beacon, UWB and Bluetooth has widely been developing across the world. These techniques are mainly focusing on spatial location detection of customers using fixed wireless APs and unique Tags in the indoor environment. Besides, since existing detection equipment and techniques using ultrasound or sound etc. to detect buried persons and identify survival status for them cause 2nd damages on the collapsed debris for rescuers. In addition, it might take time to check the buried persons. However, the collapsed disaster sites should consider both outdoor and indoor environments because empty spaces under collapsed debris exists. In order to detect buried persons from the empty spaces, we should collect wireless signals with Wi-Fi from their mobile phone. Basically, the Wi-Fi signal measure 2-D location. However, since the buried persons have Z value with burial depth, we also should collect barometer sensor data from their mobile phones in order to measure Z values according to weather conditions. Specially, for quick accessibility to the disaster area, a drone (UAV; Unmanned Arial Vehicle system, which is equipped with a wireless detection module, was introduced. Using these framework, this study aims to provide the rescuers with effective rescue information by calculating 3-D location for buried persons based on the wireless and barometer sensor fusion.

  20. High capacity hybrid optical fiber-wireless links in 75–300GHz band

    DEFF Research Database (Denmark)

    Cavalcante, Lucas Costa Pereira; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso

    2014-01-01

    Seamless convergence of fiber-optic and the wireless networks is of great interest for enabling transparent delivery of broadband services to users in different locations, including both metropolitan and rural areas. Current demand of bandwidth by end-users, especially using mobile devices......, is seeding the need to use bands located at the millimeter-wave region (30–300 GHz), mainly because of its inherent broadband nature. In our lab, we have conducted extensive research on high-speed photonic-wireless links in the W-band (75–110GHz). In this paper, we will present our latest findings...

  1. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  2. Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zahariadis Theodore

    2010-01-01

    Full Text Available Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN, which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks.

  3. Wireless sensor networks principles, design and applications

    CERN Document Server

    Yang, Shuang-Hua

    2014-01-01

    Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: ·         sensor node design; ·         embedded software design; ·         routing algorithms; ·         sink node positioning; ·         co-existence with other wireless systems; ·         data fusion; ·         security; ·         indoor location tracking; ·         integrating with radio-frequency identification; and ·         In...

  4. Digital Video Imagery and Wireless Communications for Land-Based Reconnaissance Missions

    National Research Council Canada - National Science Library

    Munroe, James

    1999-01-01

    .... This thesis explores, analyzes, and performs a proof-of-concept implementation for a real-time digital video reconnaissance system from forward locations to the rear using wireless communication...

  5. Low-power wireless micromanometer system for acute and chronic bladder-pressure monitoring.

    Science.gov (United States)

    Majerus, Steve J A; Fletter, Paul C; Damaser, Margot S; Garverick, Steven L

    2011-03-01

    This letter describes the design, fabrication, and testing of a wireless bladder-pressure-sensing system for chronic, point-of-care applications, such as urodynamics or closed-loop neuromodulation. The system consists of a miniature implantable device and an external RF receiver and wireless battery charger. The implant is small enough to be cystoscopically implanted within the bladder wall, where it is securely held and shielded from the urine stream. The implant consists of a custom application-specific integrated circuit (ASIC), a pressure transducer, a rechargeable battery, and wireless telemetry and recharging antennas. The ASIC includes instrumentation, wireless transmission, and power-management circuitry, and on an average draws less than 9 μA from the 3.6-V battery. The battery charge can be wirelessly replenished with daily 6-h recharge periods that can occur during the periods of sleep. Acute in vivo evaluation of the pressure-sensing system in canine models has demonstrated that the system can accurately capture lumen pressure from a submucosal implant location.

  6. Adaptive Wavelet Coding Applied in a Wireless Control System.

    Science.gov (United States)

    Gama, Felipe O S; Silveira, Luiz F Q; Salazar, Andrés O

    2017-12-13

    Wireless control systems can sense, control and act on the information exchanged between the wireless sensor nodes in a control loop. However, the exchanged information becomes susceptible to the degenerative effects produced by the multipath propagation. In order to minimize the destructive effects characteristic of wireless channels, several techniques have been investigated recently. Among them, wavelet coding is a good alternative for wireless communications for its robustness to the effects of multipath and its low computational complexity. This work proposes an adaptive wavelet coding whose parameters of code rate and signal constellation can vary according to the fading level and evaluates the use of this transmission system in a control loop implemented by wireless sensor nodes. The performance of the adaptive system was evaluated in terms of bit error rate (BER) versus E b / N 0 and spectral efficiency, considering a time-varying channel with flat Rayleigh fading, and in terms of processing overhead on a control system with wireless communication. The results obtained through computational simulations and experimental tests show performance gains obtained by insertion of the adaptive wavelet coding in a control loop with nodes interconnected by wireless link. These results enable the use of this technique in a wireless link control loop.

  7. Adaptive Wavelet Coding Applied in a Wireless Control System

    Directory of Open Access Journals (Sweden)

    Felipe O. S. Gama

    2017-12-01

    Full Text Available Wireless control systems can sense, control and act on the information exchanged between the wireless sensor nodes in a control loop. However, the exchanged information becomes susceptible to the degenerative effects produced by the multipath propagation. In order to minimize the destructive effects characteristic of wireless channels, several techniques have been investigated recently. Among them, wavelet coding is a good alternative for wireless communications for its robustness to the effects of multipath and its low computational complexity. This work proposes an adaptive wavelet coding whose parameters of code rate and signal constellation can vary according to the fading level and evaluates the use of this transmission system in a control loop implemented by wireless sensor nodes. The performance of the adaptive system was evaluated in terms of bit error rate (BER versus E b / N 0 and spectral efficiency, considering a time-varying channel with flat Rayleigh fading, and in terms of processing overhead on a control system with wireless communication. The results obtained through computational simulations and experimental tests show performance gains obtained by insertion of the adaptive wavelet coding in a control loop with nodes interconnected by wireless link. These results enable the use of this technique in a wireless link control loop.

  8. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  9. Enabling Wireless Avionics Intra-Communications

    Science.gov (United States)

    Torres, Omar; Nguyen, Truong; Mackenzie, Anne

    2016-01-01

    The Electromagnetics and Sensors Branch of NASA Langley Research Center (LaRC) is investigating the potential of an all-wireless aircraft as part of the ECON (Efficient Reconfigurable Cockpit Design and Fleet Operations using Software Intensive, Networked and Wireless Enabled Architecture) seedling proposal, which is funded by the Convergent Aeronautics Solutions (CAS) project, Transformative Aeronautics Concepts (TAC) program, and NASA Aeronautics Research Institute (NARI). The project consists of a brief effort carried out by a small team in the Electromagnetic Environment Effects (E3) laboratory with the intention of exposing some of the challenges faced by a wireless communication system inside the reflective cavity of an aircraft and to explore potential solutions that take advantage of that environment for constructive gain. The research effort was named EWAIC for "Enabling Wireless Aircraft Intra-communications." The E3 laboratory is a research facility that includes three electromagnetic reverberation chambers and equipment that allow testing and generation of test data for the investigation of wireless systems in reflective environments. Using these chambers, the EWAIC team developed a set of tests and setups that allow the intentional variation of intensity of a multipath field to reproduce the environment of the various bays and cabins of large transport aircraft. This setup, in essence, simulates an aircraft environment that allows the investigation and testing of wireless communication protocols that can effectively be used as a tool to mitigate some of the risks inherent to an aircraft wireless system for critical functions. In addition, the EWAIC team initiated the development of a computational modeling tool to illustrate the propagation of EM waves inside the reflective cabins and bays of aircraft and to obtain quantifiable information regarding the degradation of signals in aircraft subassemblies. The nose landing gear of a UAV CAD model was used

  10. A decentralized receptance-based damage detection strategy for wireless smart sensors

    International Nuclear Information System (INIS)

    Jang, Shinae; Spencer Jr, Billie F; Sim, Sung-Han

    2012-01-01

    Various structural health monitoring strategies have been proposed recently that can be implemented in the decentralized computing environment intrinsic to wireless smart sensor networks (WSSN). Many are based on changes in the experimentally determined flexibility matrix for the structure under consideration. However, the flexibility matrix contains only static information; much richer information is available by considering the dynamic flexibility, or receptance, of the structure. Recently, the stochastic dynamic damage locating vector (SDDLV) method was proposed based on changes of dynamic flexibility matrices employing centrally collected output-only measurements. This paper investigates the potential of the SDDLV method for implementation on a network of wireless smart sensors, where a decentralized, hierarchical, in-network processing approach is used to address issues of scalability of the SDDLV algorithm. Two approaches to aggregate results are proposed that provide robust estimates of damage locations. The efficacy of the developed strategy is first verified using wired sensors emulating a wireless sensor network. Subsequently, the decentralized damage detection strategy is implemented on MEMSIC’s Imote2 smart sensor platform and validated experimentally on a laboratory scale truss bridge. (paper)

  11. Joint sensor location/power rating optimization for temporally-correlated source estimation

    KAUST Repository

    Bushnaq, Osama M.; Chaaban, Anas; Al-Naffouri, Tareq Y.

    2017-01-01

    via wireless AWGN channel. In addition to selecting the optimal sensing location, the sensor type to be placed in these locations is selected from a pool of T sensor types such that different sensor types have different power ratings and costs

  12. Postdisaster Psychological Intervention since 9/11

    Science.gov (United States)

    Watson, Patricia J.; Brymer, Melissa J.; Bonanno, George A.

    2011-01-01

    A wealth of research and experience after 9/11 has led to the development of evidence-based and evidence-informed guidelines and strategies to support the design and implementation of public mental health programs after terrorism and disaster. This article reviews advances that have been made in a variety of areas, including development of…

  13. Use of consumer wireless devices by South Africans with severe communication disability

    Directory of Open Access Journals (Sweden)

    Juan Bornman

    2016-02-01

    Full Text Available Background: Advancements in wireless technology (e.g. cell phones and tablets have opened new communication opportunities and environments for individuals with severe communication disabilities. The advancement of these technologies poses challenges to ensuring that these individuals enjoy equal access to this increasingly essential technology. However, a paucity of research exists. Objectives: To describe the nature and frequency with which South African adults with severe communication disabilities have access to and use wireless devices, as well as the types of activities for which wireless devices are used. Method: Survey research was conducted with 30 individuals who use augmentative and alternative communication (AAC technology using the Survey of User Needs Questionnaire developed in the United States, and localized to the South African context. Results: All participants, despite their limited education, unemployment and low economic status, owned and/or used mainstream wireless devices. Slightly more than half of the participants (53.3% needed adaptations to their wireless devices. Advantages of using wireless devices were highlighted, including connecting with others (through using text messaging, social networking, making plans with others, sharing photos and videos with friends, for leisure activities (e.g. listening to music, watching videos, playing games, and for safety purposes (e.g. to navigate when lost, using the device when in trouble and needing immediate assistance. Conclusion: These wireless devices offer substantial benefits and opportunities to individuals with disabilities who rely on AAC in terms of independence, social participation, education and safety/security. However, they still do not enjoy equal opportunity to access and use wireless devices relative to the non-disabled population.

  14. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message...... from a location it will evolve to a network distribution depending on whether nodes at other locations receive the message or not. Mobility of locations is not arbitrary but guarded by a probabilistic mobility function (PMF) and we also define the notion of a weak bisimulation given a PMF...

  15. 47 CFR 0.408 - OMB control numbers and expiration dates assigned pursuant to the Paperwork Reduction Act of 1995.

    Science.gov (United States)

    2010-10-01

    ... Development of SMR Systems in the 800 MHz Frequency Band 01/31/10 3060-0308 Sec. 90.505 04/30/10 3060-0310 FCC... Wireless E911 Coordination Initiative Letter 10/31/10 3060-1061 Earth Stations on Board Vessels (ESVs) 04.... 15.117 09/30/10 3060-1101 Children's Television Requests for Preemption Flexibility 06/30/10 3060...

  16. Indoor Positioning with Radio Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    . A promising indoor positioning technique is radio-based location ngerprinting, having the major advantage of exploiting already existing radio infrastructures, like IEEE 802.11 or GSM, which avoids extra deployment costs and eort. The research goal of this thesis is to address the limitations of current...... indoor location ngerprinting systems. In particular the aim is to advance location ngerprinting techniques for the challenges of handling heterogeneous clients, scalability to many clients, and interference between communication and positioning. The wireless clients used for location ngerprinting...... are heterogeneous even when only considering clients for the same technology. The heterogeneity is due to dierent radios, antennas, and rmwares causing measurements for location ngerprinting not to be directly comparable among clients. Heterogeneity is a challenge for location ngerprinting because it severely...

  17. Development and application of a modified wireless tracer for disaster prevention

    Science.gov (United States)

    Chung Yang, Han; Su, Chih Chiang

    2016-04-01

    Typhoon-induced flooding causes water overflow in a river channel, which results in general and bridge scour and soil erosion, thus leading to bridge failure, debris flow and landslide collapse. Therefore, dynamic measurement technology should be developed to assess scour in channels and landslide as a disaster-prevention measure against bridge failure and debris flow. This paper presents a wireless tracer that enables monitoring general scour in river channels and soil erosion in hillsides. The wireless tracer comprises a wireless high-power radio modem, various electronic components, and a self-designed printed circuit board that are all combined with a 9-V battery pack and an auto switch. The entire device is sealed in a jar by silicon. After it was modified, the wireless tracer underwent the following tests for practical applications: power continuation and durability, water penetration, and signal transmission during floating. A regression correlation between the wireless tracer's transmission signal and distance was also established. This device can be embedded at any location where scouring is monitored, and, in contrast to its counterparts that detect scour depth by identifying and analyzing received signals, it enables real-time observation of the scouring process. In summary, the wireless tracer developed in this study provides a dynamic technology for real-time monitoring of scouring (or erosion) and forecasting of landslide hazards. Keywords: wireless tracer; scour; real-time monitoring; landslide hazard.

  18. Wireless sensor placement for structural monitoring using information-fusing firefly algorithm

    Science.gov (United States)

    Zhou, Guang-Dong; Yi, Ting-Hua; Xie, Mei-Xi; Li, Hong-Nan

    2017-10-01

    Wireless sensor networks (WSNs) are promising technology in structural health monitoring (SHM) applications for their low cost and high efficiency. The limited wireless sensors and restricted power resources in WSNs highlight the significance of optimal wireless sensor placement (OWSP) during designing SHM systems to enable the most useful information to be captured and to achieve the longest network lifetime. This paper presents a holistic approach, including an optimization criterion and a solution algorithm, for optimally deploying self-organizing multi-hop WSNs on large-scale structures. The combination of information effectiveness represented by the modal independence and the network performance specified by the network connectivity and network lifetime is first formulated to evaluate the performance of wireless sensor configurations. Then, an information-fusing firefly algorithm (IFFA) is developed to solve the OWSP problem. The step sizes drawn from a Lévy distribution are adopted to drive fireflies toward brighter individuals. Following the movement with Lévy flights, information about the contributions of wireless sensors to the objective function as carried by the fireflies is fused and applied to move inferior wireless sensors to better locations. The reliability of the proposed approach is verified via a numerical example on a long-span suspension bridge. The results demonstrate that the evaluation criterion provides a good performance metric of wireless sensor configurations, and the IFFA outperforms the simple discrete firefly algorithm.

  19. A Novel IEEE 802.15.4e DSME MAC for Wireless Sensor Networks.

    Science.gov (United States)

    Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin

    2017-01-16

    IEEE 802.15.4e standard proposes Deterministic and Synchronous Multichannel Extension (DSME) mode for wireless sensor networks (WSNs) to support industrial, commercial and health care applications. In this paper, a new channel access scheme and beacon scheduling schemes are designed for the IEEE 802.15.4e enabled WSNs in star topology to reduce the network discovery time and energy consumption. In addition, a new dynamic guaranteed retransmission slot allocation scheme is designed for devices with the failure Guaranteed Time Slot (GTS) transmission to reduce the retransmission delay. To evaluate our schemes, analytical models are designed to analyze the performance of WSNs in terms of reliability, delay, throughput and energy consumption. Our schemes are validated with simulation and analytical results and are observed that simulation results well match with the analytical one. The evaluated results of our designed schemes can improve the reliability, throughput, delay, and energy consumptions significantly.

  20. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    Science.gov (United States)

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  1. NASA Lunar Base Wireless System Propagation Analysis

    Science.gov (United States)

    Hwu, Shian U.; Upanavage, Matthew; Sham, Catherine C.

    2007-01-01

    There have been many radio wave propagation studies using both experimental and theoretical techniques over the recent years. However, most of studies have been in support of commercial cellular phone wireless applications. The signal frequencies are mostly at the commercial cellular and Personal Communications Service bands. The antenna configurations are mostly one on a high tower and one near the ground to simulate communications between a cellular base station and a mobile unit. There are great interests in wireless communication and sensor systems for NASA lunar missions because of the emerging importance of establishing permanent lunar human exploration bases. Because of the specific lunar terrain geometries and RF frequencies of interest to the NASA missions, much of the published literature for the commercial cellular and PCS bands of 900 and 1800 MHz may not be directly applicable to the lunar base wireless system and environment. There are various communication and sensor configurations required to support all elements of a lunar base. For example, the communications between astronauts, between astronauts and the lunar vehicles, between lunar vehicles and satellites on the lunar orbits. There are also various wireless sensor systems among scientific, experimental sensors and data collection ground stations. This presentation illustrates the propagation analysis of the lunar wireless communication and sensor systems taking into account the three dimensional terrain multipath effects. It is observed that the propagation characteristics are significantly affected by the presence of the lunar terrain. The obtained results indicate the lunar surface material, terrain geometry and antenna location are the important factors affecting the propagation characteristics of the lunar wireless systems. The path loss can be much more severe than the free space propagation and is greatly affected by the antenna height, surface material and operating frequency. The

  2. Sensible interventions: Cultural resistance post-9/11

    NARCIS (Netherlands)

    Chao, J.

    2013-01-01

    'Sensible interventions: Cultural resistance post-9/11' is anchored in the September 11, 2001 terrorist attacks in America and their cultural legacies, most prominently in the forms of cultural resistance. By investigating a multimedia assemblage of creative objects - hip hop album, TV sit-com,

  3. Video-based measurements for wireless capsule endoscope tracking

    International Nuclear Information System (INIS)

    Spyrou, Evaggelos; Iakovidis, Dimitris K

    2014-01-01

    The wireless capsule endoscope is a swallowable medical device equipped with a miniature camera enabling the visual examination of the gastrointestinal (GI) tract. It wirelessly transmits thousands of images to an external video recording system, while its location and orientation are being tracked approximately by external sensor arrays. In this paper we investigate a video-based approach to tracking the capsule endoscope without requiring any external equipment. The proposed method involves extraction of speeded up robust features from video frames, registration of consecutive frames based on the random sample consensus algorithm, and estimation of the displacement and rotation of interest points within these frames. The results obtained by the application of this method on wireless capsule endoscopy videos indicate its effectiveness and improved performance over the state of the art. The findings of this research pave the way for a cost-effective localization and travel distance measurement of capsule endoscopes in the GI tract, which could contribute in the planning of more accurate surgical interventions. (paper)

  4. Video-based measurements for wireless capsule endoscope tracking

    Science.gov (United States)

    Spyrou, Evaggelos; Iakovidis, Dimitris K.

    2014-01-01

    The wireless capsule endoscope is a swallowable medical device equipped with a miniature camera enabling the visual examination of the gastrointestinal (GI) tract. It wirelessly transmits thousands of images to an external video recording system, while its location and orientation are being tracked approximately by external sensor arrays. In this paper we investigate a video-based approach to tracking the capsule endoscope without requiring any external equipment. The proposed method involves extraction of speeded up robust features from video frames, registration of consecutive frames based on the random sample consensus algorithm, and estimation of the displacement and rotation of interest points within these frames. The results obtained by the application of this method on wireless capsule endoscopy videos indicate its effectiveness and improved performance over the state of the art. The findings of this research pave the way for a cost-effective localization and travel distance measurement of capsule endoscopes in the GI tract, which could contribute in the planning of more accurate surgical interventions.

  5. Joint sensor location/power rating optimization for temporally-correlated source estimation

    KAUST Repository

    Bushnaq, Osama M.

    2017-12-22

    The optimal sensor selection for scalar state parameter estimation in wireless sensor networks is studied in the paper. A subset of N candidate sensing locations is selected to measure a state parameter and send the observation to a fusion center via wireless AWGN channel. In addition to selecting the optimal sensing location, the sensor type to be placed in these locations is selected from a pool of T sensor types such that different sensor types have different power ratings and costs. The sensor transmission power is limited based on the amount of energy harvested at the sensing location and the type of the sensor. The Kalman filter is used to efficiently obtain the MMSE estimator at the fusion center. Sensors are selected such that the MMSE estimator error is minimized subject to a prescribed system budget. This goal is achieved using convex relaxation and greedy algorithm approaches.

  6. Wireless power pad with local power activation for portable devices

    NARCIS (Netherlands)

    Waffenschmidt, E.; Zheglov, V.

    2007-01-01

    Wireless power transfer by magnetic induction offers a simple to use way to recharge mobile devices like e.g. mobile phone, music players or medical sensors. As shown by a previous report and an existing Power Pad demonstrator, wireless inductive power transfer is possible with a good power

  7. Developing wireless sensor networks for monitoring crop canopy temperature using a moving sprinkler system as a platform

    Science.gov (United States)

    The objectives of this study were to characterize wireless sensor nodes that we developed in terms of power consumption and functionality, and compare the performance of mesh and non-mesh wireless sensor networks (WSNs) comprised mainly of infrared thermometer thermocouples located on a center pivot...

  8. Localization and Communication for UWB-based Wireless Sensor Networks

    NARCIS (Netherlands)

    Wang, Y.

    2011-01-01

    The great demand for location-aware wireless sensor networks (WSNs) motivates the research in this thesis. The unique characteristics of WSNs impose numerous challenges on localization and communication. In this thesis, we handle some key challenges and provide affordable solutions. Impulse radio

  9. Wireless power transfer system

    Science.gov (United States)

    Wu, Hunter; Sealy, Kylee; Gilchrist, Aaron

    2016-02-23

    A system includes a first stage of an inductive power transfer system with an LCL load resonant converter with a switching section, an LCL tuning circuit, and a primary receiver pad. The IPT system includes a second stage with a secondary receiver pad, a secondary resonant circuit, a secondary rectification circuit, and a secondary decoupling converter. The secondary receiver pad connects to the secondary resonant circuit. The secondary resonant circuit connects to the secondary rectification circuit. The secondary rectification circuit connects to the secondary decoupling converter. The second stage connects to a load. The load includes an energy storage element. The second stage and load are located on a vehicle and the first stage is located at a fixed location. The primary receiver pad wirelessly transfers power to the secondary receiver pad across a gap when the vehicle positions the secondary receiver pad with respect to the primary receiver pad.

  10. A novel PON based UMTS broadband wireless access network architecture with an algorithm to guarantee end to end QoS

    Science.gov (United States)

    Sana, Ajaz; Hussain, Shahab; Ali, Mohammed A.; Ahmed, Samir

    2007-09-01

    In this paper we proposes a novel Passive Optical Network (PON) based broadband wireless access network architecture to provide multimedia services (video telephony, video streaming, mobile TV, mobile emails etc) to mobile users. In the conventional wireless access networks, the base stations (Node B) and Radio Network Controllers (RNC) are connected by point to point T1/E1 lines (Iub interface). The T1/E1 lines are expensive and add up to operating costs. Also the resources (transceivers and T1/E1) are designed for peak hours traffic, so most of the time the dedicated resources are idle and wasted. Further more the T1/E1 lines are not capable of supporting bandwidth (BW) required by next generation wireless multimedia services proposed by High Speed Packet Access (HSPA, Rel.5) for Universal Mobile Telecommunications System (UMTS) and Evolution Data only (EV-DO) for Code Division Multiple Access 2000 (CDMA2000). The proposed PON based back haul can provide Giga bit data rates and Iub interface can be dynamically shared by Node Bs. The BW is dynamically allocated and the unused BW from lightly loaded Node Bs is assigned to heavily loaded Node Bs. We also propose a novel algorithm to provide end to end Quality of Service (QoS) (between RNC and user equipment).The algorithm provides QoS bounds in the wired domain as well as in wireless domain with compensation for wireless link errors. Because of the air interface there can be certain times when the user equipment (UE) is unable to communicate with Node B (usually referred to as link error). Since the link errors are bursty and location dependent. For a proposed approach, the scheduler at the Node B maps priorities and weights for QoS into wireless MAC. The compensations for errored links is provided by the swapping of services between the active users and the user data is divided into flows, with flows allowed to lag or lead. The algorithm guarantees (1)delay and throughput for error-free flows,(2)short term fairness

  11. KeyWare: an open wireless distributed computing environment

    Science.gov (United States)

    Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir

    1995-12-01

    Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.

  12. Wireless passive radiation sensor

    Science.gov (United States)

    Pfeifer, Kent B; Rumpf, Arthur N; Yelton, William G; Limmer, Steven J

    2013-12-03

    A novel measurement technique is employed using surface acoustic wave (SAW) devices, passive RF, and radiation-sensitive films to provide a wireless passive radiation sensor that requires no batteries, outside wiring, or regular maintenance. The sensor is small (<1 cm.sup.2), physically robust, and will operate unattended for decades. In addition, the sensor can be insensitive to measurement position and read distance due to a novel self-referencing technique eliminating the need to measure absolute responses that are dependent on RF transmitter location and power.

  13. The Wireless ATM Architecture

    Directory of Open Access Journals (Sweden)

    R. Palitefka

    1998-06-01

    Full Text Available An overview of the proposed wireless ATM structure is provided. Wireless communication have been developed to a level where offered services can now be extended beyond voice and data. There are already wireless LANs, cordless systems offering data services and mobile data. Wireless LAN systems are basically planned for local, on-promises and in-house networking providing short distance radio or infrared links between computer system. The main challenge of wireless ATM is to harmonise the development of broadband wireless system with service B -ISDN/ATM and ATM LANs, and offer multimedia multiservice features for the support of time-sensitive voice communication, video, desktop multimedia applications, and LAN data traffic for the wireless user.

  14. Radio Frequency Propagation Model and Fading of Wireless Signal at 2.4 GHz in Underground Coal Mine

    OpenAIRE

    Patri, Ashutosh; Nimaje, Devidas S.

    2015-01-01

    Deployment of wireless sensor networks and wireless communication systems have become indispensable for better real-time data acquisition from ground monitoring devices, gas sensors, and equipment used in underground mines as well as in locating the miners, since conventional methods like use of wireline communication are rendered ineffective in the event of mine hazards such as roof-falls, fire hazard etc. Before implementation of any wireless system, the variable path loss indices for diffe...

  15. Challenge Study: A Project-Based Learning on a Wireless Communication System at Technical High School

    Science.gov (United States)

    Terasawa, Ikuo

    2016-01-01

    The challenge study is a project based learning curriculum at Technical High School aimed at the construction of a wireless communication system. The first period was engineering issues in the construction of an artificial satellite and the second period was a positional locating system based on the general purpose wire-less device--ZigBee device.…

  16. Radiation area monitoring by wireless-communicating area monitor with surveillance camera

    International Nuclear Information System (INIS)

    Shimura, Mitsuo; Kobayashi, Hiromitsu; Kitahara, Hideki; Kobayashi, Hironobu; Okamoto, Shinji

    2004-01-01

    Aiming at a dose reduction and a work efficiency improvement for nuclear power plants that have high dose regions, we have developed our system of wireless-communicating Area Monitor with Surveillance Camera, and have performed an on-site test. Now we are implementing this Area Monitor with Surveillance Camera for a use as a TV camera in the controlled-area, which enables a personal computer to simultaneously display two or more dose values and site live images on the screen. For the radiation detector of this Area Monitor System, our wireless-communicating dosimeter is utilized. Image data are transmitted via a wireless Local Area Network (LAN). As a test result, image transmission of a maximum of 20 frames per second has been realized, which shows that this concept is a practical application. Remote-site monitoring also has been realized from an office desk located within the non-controlled area, adopting a Japan's wireless phone system, PHS (Personal Handy Phone) for the transmission interface. (author)

  17. Wireless guided wave and impedance measurement using laser and piezoelectric transducers

    International Nuclear Information System (INIS)

    Park, Hyun-Jun; Sohn, Hoon; Yun, Chung-Bang; Chung, Joseph; Lee, Michael M S

    2012-01-01

    Guided-wave- and impedance-based structural health monitoring (SHM) techniques have gained much attention due to their high sensitivity to small defects. One of the popular devices commonly used for guided wave and impedance measurements is a lead zirconate titanate (PZT) transducer. This study proposes a new wireless scheme where the power and data required for PZT excitation and sensing are transmitted via laser. First, a modulated laser beam is wirelessly transmitted to the photodiode connected to a PZT on a structure. Then, the photodiode converts the laser light into an electric signal, and it is applied to the PZT for excitation. The corresponding responses, impedance at the same PZT or guided waves at another PZT, are measured, re-converted into laser light, and wirelessly transmitted back to the other photodiode located in the data interrogator for signal processing. The feasibility of the proposed wireless guided wave and impedance measurement schemes has been examined through circuit analyses and experimentally investigated in a laboratory setup. (paper)

  18. Scalable Coverage Maintenance for Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jun Lu

    2007-06-01

    Full Text Available Owing to numerous potential applications, wireless sensor networks have been attracting significant research effort recently. The critical challenge that wireless sensor networks often face is to sustain long-term operation on limited battery energy. Coverage maintenance schemes can effectively prolong network lifetime by selecting and employing a subset of sensors in the network to provide sufficient sensing coverage over a target region. We envision future wireless sensor networks composed of a vast number of miniaturized sensors in exceedingly high density. Therefore, the key issue of coverage maintenance for future sensor networks is the scalability to sensor deployment density. In this paper, we propose a novel coverage maintenance scheme, scalable coverage maintenance (SCOM, which is scalable to sensor deployment density in terms of communication overhead (i.e., number of transmitted and received beacons and computational complexity (i.e., time and space complexity. In addition, SCOM achieves high energy efficiency and load balancing over different sensors. We have validated our claims through both analysis and simulations.

  19. Novel Congestion-Free Alternate Routing Path Scheme using Stackelberg Game Theory Model in Wireless Networks

    Directory of Open Access Journals (Sweden)

    P. Chitra

    2017-04-01

    Full Text Available Recently, wireless network technologies were designed for most of the applications. Congestion raised in the wireless network degrades the performance and reduces the throughput. Congestion-free network is quit essen- tial in the transport layer to prevent performance degradation in a wireless network. Game theory is a branch of applied mathematics and applied sciences that used in wireless network, political science, biology, computer science, philosophy and economics. e great challenges of wireless network are their congestion by various factors. E ective congestion-free alternate path routing is pretty essential to increase network performance. Stackelberg game theory model is currently employed as an e ective tool to design and formulate conges- tion issues in wireless networks. is work uses a Stackelberg game to design alternate path model to avoid congestion. In this game, leaders and followers are selected to select an alternate routing path. e correlated equilibrium is used in Stackelberg game for making better decision between non-cooperation and cooperation. Congestion was continuously monitored to increase the throughput in the network. Simulation results show that the proposed scheme could extensively improve the network performance by reducing congestion with the help of Stackelberg game and thereby enhance throughput.

  20. Interface air pour systèmes de navigation en bande S : étude détaillée des signaux OFDM

    OpenAIRE

    Thevenon , Paul

    2010-01-01

    Positioning in urban or indoor environment is a hot topic, either due to regulations such as the E911 requiring US mobile telecommunication operators to be able to locate their subscribers in case of emergency, or due to the market development, with the extension of location - based services targeting the mass market concentrated in metropolitan areas. In urban or indoor areas, it is generally recognized that satellite - based positioning systems are not suitable (alone) to provide a continuo...

  1. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  2. Building a sustainable research & HCD eco-system: Case study of two wireless communication eco systems

    CSIR Research Space (South Africa)

    Mekuria, F

    2013-05-01

    Full Text Available Sensor Networks (M2M, Energy Efficient & Smart Adhoc Sensor Networks) (Emerging) Energy & Spectrum Efficient Wireless Mesh Network (Existing) Next Generation Wireless Networking (e.g. White Spaces, Femto-cells, Cellular ± 4G, LTE, WiMAX) (Co... applications, M2M and the Internet of Things, (3) wireless cognitive radio network laboratory for spectrum and energy efficient network development, (4) Future wireless cellular networking research with MIMO based LTE applications. The wireless mesh...

  3. Wireless system controlling of electromagnetic wave distribution in nuclear power plant use

    International Nuclear Information System (INIS)

    Kuroda, Hidehiko; Kume, Naoto; Oshima, Tomomi; Takakura, Kei; Oda, Naotaka; Hasegawa, Takeshi; Odanaka, Shigeru

    2017-01-01

    Recently, wireless technologies have rapidly spread by cellular phones, smartphones and tablet devices. Wireless systems in the nuclear power plant are expected to bring various advantages such as shortening of the inspection time, online monitoring, remote control and cable reduction, etc. However, wireless systems have hardly applied to the nuclear power plant, from the point of security and electromagnetic interference (EMI). We propose a new wireless system controlling automatically electromagnetic wave distribution. In our wireless system, the transmitter / receiver modules automatically measure the wave strength and adjust the power and directivity of the wave, resulting in wireless communication only in target zones, i.e. non-influence to safety-related instruments and non-leakage of information. We will present the algorithm of the electromagnetic wave controlling and experimental results about the proposed system. (author)

  4. Autonomous solutions for powering wireless sensor nodes in rivers

    Science.gov (United States)

    Kamenar, E.; Maćešić, S.; Gregov, G.; Blažević, D.; Zelenika, S.; Marković, K.; Glažar, V.

    2015-05-01

    There is an evident need for monitoring pollutants and/or other conditions in river flows via wireless sensor networks. In a typical wireless sensor network topography, a series of sensor nodes is to be deployed in the environment, all wirelessly connected to each other and/or their gateways. Each sensor node is composed of active electronic devices that have to be constantly powered. In general, batteries can be used for this purpose, but problems may occur when they have to be replaced. In the case of large networks, when sensor nodes can be placed in hardly accessible locations, energy harvesting can thus be a viable powering solution. The possibility to use three different small-scale river flow energy harvesting principles is hence thoroughly studied in this work: a miniaturized underwater turbine, a so-called `piezoelectric eel' and a hybrid turbine solution coupled with a rigid piezoelectric beam. The first two concepts are then validated experimentally in laboratory as well as in real river conditions. The concept of the miniaturised hydro-generator is finally embedded into the actual wireless sensor node system and its functionality is confirmed.

  5. A Trace-Driven Analysis of Wireless Group Communication Mechanisms

    Directory of Open Access Journals (Sweden)

    Surendar Chandra

    2012-08-01

    Full Text Available Wireless access is increasingly ubiquitous while mobile devices that use them are resource rich. These trends allow wireless users to collaborate with each other. We investigate various group communication paradigms that underly collaboration applications. We synthesize durations when members collaborate using wireless device availability traces. Wireless users operate from a variety of locations. Hence, we analyzed the behavior of wireless users in universities, corporations, conference venues, and city-wide hotspots. We show that the availability durations are longer in corporations followed by university and then in hotspots. The number of simultaneously available wireless users is small in all the scenarios. The session lengths are becoming smaller while the durations between sessions are becoming larger. We observed user churn in all the scenarios. We show that synchronous mechanisms require less effort to maintain update synchronicity among the group members. However, distributed mechanisms require a large number of replicas in order to propagate updates among the users. For asynchronous mechanisms, we show that pull-based mechanisms naturally randomize the times when updates are propagated and thus achieve better performance than push based mechanisms.We develop an adaptive approach that customizes the update frequency using the last session duration and show that this mechanism exhibits good performance when the required update frequency intervals are large. We also show that for a given number of gossips, it is preferable to propagate updates to all available nodes rather than increasing the frequency while correspondingly reducing the number of nodes to propagate updates.We develop a middleware to illustrate the practicality of our approach.

  6. Research on quality metrics of wireless adaptive video streaming

    Science.gov (United States)

    Li, Xuefei

    2018-04-01

    With the development of wireless networks and intelligent terminals, video traffic has increased dramatically. Adaptive video streaming has become one of the most promising video transmission technologies. For this type of service, a good QoS (Quality of Service) of wireless network does not always guarantee that all customers have good experience. Thus, new quality metrics have been widely studies recently. Taking this into account, the objective of this paper is to investigate the quality metrics of wireless adaptive video streaming. In this paper, a wireless video streaming simulation platform with DASH mechanism and multi-rate video generator is established. Based on this platform, PSNR model, SSIM model and Quality Level model are implemented. Quality Level Model considers the QoE (Quality of Experience) factors such as image quality, stalling and switching frequency while PSNR Model and SSIM Model mainly consider the quality of the video. To evaluate the performance of these QoE models, three performance metrics (SROCC, PLCC and RMSE) which are used to make a comparison of subjective and predicted MOS (Mean Opinion Score) are calculated. From these performance metrics, the monotonicity, linearity and accuracy of these quality metrics can be observed.

  7. The revelation(s of Asher Levi: An iconographic literacy event as a tool for the exploration of fragmented selves in new literacies studies after 9/11

    Directory of Open Access Journals (Sweden)

    Jeanine M. Staples

    2011-10-01

    Full Text Available This article considers the dynamics of an iconographic literacy event that functions as a tool for explorations of literacy practices and fragmented selves, particularly in relationship to the literate lives of marginalized individuals in the post 9/11 era. The author examines what happened when a group of 10 African American women in an urban area employed new literacies in the teaching/learning spaces of their personal lives (i.e. individual homes, familiar eateries, communicative digital technologies to explore and respond to stories in post 9/11 popular culture narratives. The study employed ethnographic methods (interviews, journaling, email and instant message writing and critical observations with members of the inquiry over the course of two years. The author investigated critically the meeting of biography, fiction and autoethnography as a literacy event used to couch the literacies and fragmented selves of these women in the post 9/11 era. Findings regarding the nature of their post 9/11 literacies, as expressed through fragmented selves, are shared, along with implications for new literacies research and teaching. Findings show that the women’s post 9/11 literacies include a range and variation of critical sensibilities that include, but are not limited to, multiple levels of sociolinguistic integration, sociocultural criticality and heightened awarenesses.

  8. Wireless network system based multi-non-invasive sensors for smart home

    Science.gov (United States)

    Issa Ahmed, Rudhwan

    There are several techniques that have been implemented for smart homes usage; however, most of these techniques are limited to a few sensors. Many of these methods neither meet the needs of the user nor are cost-effective. This thesis discusses the design, development, and implementation of a wireless network system, based on multi-non-invasive sensors for smart home environments. This system has the potential to be used as a means to accurately, and remotely, determine the activities of daily living by continuously monitoring relatively simple parameters that measure the interaction between users and their surrounding environment. We designed and developed a prototype system to meet the specific needs of the elderly population. Unlike audio-video based health monitoring systems (which have associated problems such as the encroachment of privacy), the developed system's distinct features ensure privacy and are almost invisible to the occupants, thus increasing the acceptance levels of this system in household environments. The developed system not only achieved high levels of accuracy, but it is also portable, easy to use, cost-effective, and requires low data rates and less power compared to other wireless devices such as Wi-Fi, Bluetooth, wireless USB, Ultra wideband (UWB), or Infrared (IR) wireless. Field testing of the prototype system was conducted at different locations inside and outside of the Minto Building (Centre for Advanced Studies in Engineering at Carleton University) as well as other locations, such as the washroom, kitchen, and living room of a prototype apartment. The main goal of the testing was to determine the range of the prototype system and the functionality of each sensor in different environments. After it was verified that the system operated well in all of the tested environments, data were then collected at the different locations for analysis and interpretation in order to identify the activities of daily living of an occupant.

  9. Itaallane Giulietto Chiesa - 9/11 tabulõhkuja / Ivari Vee

    Index Scriptorium Estoniae

    Vee, Ivari

    2008-01-01

    Itaalia publitsist ja politoloog ning Europarlamendi saadik Giulietto Chiesa kohtus Tallinnas ajakirjanike ja teiste huvilistega ning tutvustas oma raamatut "Zero" ning selle ainetel valminud filmi "9/11. Uurimine nullist"

  10. Aporia e trauma na crise de significados do Onze de Setembro Aporia and trauma in the crisis of meanings of 9/11

    Directory of Open Access Journals (Sweden)

    Erica Simone Almeida Resende

    2010-06-01

    Full Text Available Recorrendo a conceitos e a teorias que relacionam significados, representações, memória e trauma, destacaremos como os acontecimentos de Onze de Setembro foram capazes de desestabilizar representações e significados, quebrar a linha da História, subverter sentidos, romper percepções espaço-temporais e abalar as grades de inteligibilidade que permitiam que os americanos dessem sentido à realidade e a si próprios. Nosso objetivo é compreender como representações mudas e hiper-reais dos eventos de 2001 provocaram uma situação de falha de linguagem, o que teria resultado em um momento de aporia. Arguiremos que o Onze de Setembro, devido à dificuldade de significação, encontrar-se-ia no cerne de um trauma nos imaginários coletivos americanos.Employing concepts and theories that relate meanings, representations, memory and trauma, we attempt to show how the 9/11 events have been able to disstabilize representations and meanings, break the line of History, subvert senses, bend space-time perceptions, and shake the grids of intelligibility that had allowed Americans to make sense of reality and of themselves. Our aim is to understand how mute and hiperreal representations of the events of 2001 provoked a situation where language failed, producing a moment of aporia. We will then argue that 11/9, due the difficulty of its signification, sits at the heart of a trauma in the American collective imaginaries.

  11. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  12. Troubles musculo-squelettiques chez les téléopérateurs des centres d’urgence 911, des contraintes physiques aux contraintes psychosociales Musculoskeletal disorders in 911 emergency call centre agents, from physical constraints to psychosocial constraints Lesiones músculo esqueléticas en tele-operadores de centros de urgencia 911, de las dificultades físicas à las dificultades psico-sociales

    Directory of Open Access Journals (Sweden)

    Georges Toulouse

    2009-11-01

    Full Text Available À la demande de l’Association paritaire pour la santé et sécurité du travail secteur « affaires municipales » du Québec (APSAM, une programmation de recherche thématique a été élaborée dans le but d’intervenir pour réduire la prévalence des troubles musculo-squelettiques et de santé psychologique affectant les téléopérateurs des centres d’urgence 911. Cet article présente une première étude dont l’objectif est de décrire la prévalence et d’identifier les problématiques sous-jacentes à la présence de troubles musculo-squelettiques. La méthodologie adoptée comporte l’administration de questionnaires, la réalisation d’observations et d’entrevues ouvertes dans cinq centres d’urgence 911. Les résultats montrent des taux de prévalence de troubles musculo-squelettiques beaucoup plus élevés que ceux d’un échantillon représentatif de travailleurs et travailleuses québécois. L’analyse des résultats statistiques à la lumière des observations et des entrevues ouvertes a permis de préciser les problématiques sous-jacentes afin de développer un projet d’intervention.At the request of the Association paritaire pour la santé et sécurité du travail secteur “affaires municipales” du Québec (APSAM, joint sector-based occupational health and safety association, municipal affairs, a thematic research program was developed so that action could be taken to reduce the prevalence of musculoskeletal and psychological health disorders affecting 911 emergency call centre agents. This article presents an initial study whose objective was to describe the prevalence of musculoskeletal disorders and to identify their underlying issues. The adopted methodology involved the administration of questionnaires, observations, and open-ended interviews in five 911 emergency call centres. The results show musculoskeletal disorder prevalence rates much higher than those of a representative sample of Qu

  13. An efficient distributed localisation algorithm for wireless sensor networks: based on smart reference-selection method

    CSIR Research Space (South Africa)

    Abu-Mahfouz, Adnan M

    2013-05-01

    Full Text Available Determining the location of nodes is a key part of wireless sensor networks (WSNs). Many WSN applications require knowledge of nodes’ locations to perform their functions successfully. Several localisation algorithms rely on using all or most...

  14. Wireless power transmission using ultrasonic guided waves

    International Nuclear Information System (INIS)

    Kural, A; Pullin, R; Featherston, C; Holford, K; Paget, C

    2011-01-01

    The unavailability of suitable power supply at desired locations is currently an important obstacle in the development of distributed, wireless sensor networks for applications such as structural health monitoring of aircraft. Proposed solutions range from improved batteries to energy harvesting from vibration, temperature gradients and other sources. A novel approach is being investigated at Cardiff University School of Engineering in cooperation with Airbus. It aims to utilise ultrasonic guided Lamb waves to transmit energy through the aircraft skin. A vibration generator is to be placed in a location where electricity supply is readily available. Ultrasonic waves generated by this device will travel through the aircraft structure to a receiver in a remote wireless sensor node. The receiver will convert the mechanical vibration of the ultrasonic waves back to electricity, which will be used to power the sensor node. This paper describes the measurement and modelling of the interference pattern which emerges when Lamb waves are transmitted continuously as in this power transmission application. The discovered features of the pattern, such as a large signal amplitude variation and a relatively high frequency, are presented and their importance for the development of a power transmission system is discussed.

  15. Wireless power transmission using ultrasonic guided waves

    Energy Technology Data Exchange (ETDEWEB)

    Kural, A; Pullin, R; Featherston, C; Holford, K [School of Engineering, Cardiff University, Queens Buildings, The Parade, Cardiff CF24 2AA (United Kingdom); Paget, C, E-mail: kurala@cardiff.ac.uk [Airbus Operations Ltd, New Filton Road, BS99 7AR Bristol (United Kingdom)

    2011-07-19

    The unavailability of suitable power supply at desired locations is currently an important obstacle in the development of distributed, wireless sensor networks for applications such as structural health monitoring of aircraft. Proposed solutions range from improved batteries to energy harvesting from vibration, temperature gradients and other sources. A novel approach is being investigated at Cardiff University School of Engineering in cooperation with Airbus. It aims to utilise ultrasonic guided Lamb waves to transmit energy through the aircraft skin. A vibration generator is to be placed in a location where electricity supply is readily available. Ultrasonic waves generated by this device will travel through the aircraft structure to a receiver in a remote wireless sensor node. The receiver will convert the mechanical vibration of the ultrasonic waves back to electricity, which will be used to power the sensor node. This paper describes the measurement and modelling of the interference pattern which emerges when Lamb waves are transmitted continuously as in this power transmission application. The discovered features of the pattern, such as a large signal amplitude variation and a relatively high frequency, are presented and their importance for the development of a power transmission system is discussed.

  16. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  17. Location-assured, multifactor authentication on smartphones via LTE communication

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  18. Wireless power delivery for retinal prostheses.

    Science.gov (United States)

    Ng, David C; Williams, Chris E; Allen, Penny J; Bai, Shun; Boyd, Clive S; Meffin, Hamish; Halpern, Mark E; Skafidas, Efstratios

    2011-01-01

    Delivering power to an implanted device located deep inside the body is not trivial. This problem is made more challenging if the implanted device is in constant motion. This paper describes two methods of transferring power wirelessly by means of magnetic induction coupling. In the first method, a pair of transmit and receive coils is used for power transfer over a large distance (compared to their diameter). In the second method, an intermediate pair of coils is inserted in between transmit and receive coils. Comparison between the power transfer efficiency with and without the intermediate coils shows power transfer efficiency to be 11.5 % and 8.8 %, respectively. The latter method is especially suitable for powering implanted devices in the eye due to immunity to movements of the eye and ease of surgery. Using this method, we have demonstrated wireless power delivery into an animal eye.

  19. Ultra Secure High Reliability Wireless Radiation Monitor

    International Nuclear Information System (INIS)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-01-01

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data

  20. ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR

    Energy Technology Data Exchange (ETDEWEB)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-08-03

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be

  1. Wireless Sensor Network for Radiometric Detection and Assessment of Partial Discharge in High-Voltage Equipment

    Science.gov (United States)

    Upton, D. W.; Saeed, B. I.; Mather, P. J.; Lazaridis, P. I.; Vieira, M. F. Q.; Atkinson, R. C.; Tachtatzis, C.; Garcia, M. S.; Judd, M. D.; Glover, I. A.

    2018-03-01

    Monitoring of partial discharge (PD) activity within high-voltage electrical environments is increasingly used for the assessment of insulation condition. Traditional measurement techniques employ technologies that either require off-line installation or have high power consumption and are hence costly. A wireless sensor network is proposed that utilizes only received signal strength to locate areas of PD activity within a high-voltage electricity substation. The network comprises low-power and low-cost radiometric sensor nodes which receive the radiation propagated from a source of PD. Results are reported from several empirical tests performed within a large indoor environment and a substation environment using a network of nine sensor nodes. A portable PD source emulator was placed at multiple locations within the network. Signal strength measured by the nodes is reported via WirelessHART to a data collection hub where it is processed using a location algorithm. The results obtained place the measured location within 2 m of the actual source location.

  2. Excluding Ethical Issues from U.S. History Textbooks: 911 and the War on Terror

    Science.gov (United States)

    Romanowski, Michael H.

    2009-01-01

    This research study examined nine secondary American history textbooks regarding their treatment of 9/11 and related events. The analysis centered on both the knowledge included and excluded from the discussion in each book. Particular attention was given to the moral and ethical issues relevant to 9/11. Findings show that textbooks vary in their…

  3. Statistical, Spatial and Temporal Mapping of 911 Emergencies in Ecuador

    Directory of Open Access Journals (Sweden)

    Danilo Corral-De-Witt

    2018-01-01

    Full Text Available A public safety answering point (PSAP receives alerts and attends to emergencies that occur in its responsibility area. The analysis of the events related to a PSAP can give us relevant information in order to manage them and to improve the performance of the first response institutions (FRIs associated to every PSAP. However, current emergency systems are growing dramatically in terms of information heterogeneity and the volume of attended requests. In this work, we propose a system for statistical, spatial, and temporal analysis of incidences registered in a PSAP by using simple, yet robust and compact, event representations. The selected and designed temporal analysis tools include seasonal representations and nonparametric confidence intervals (CIs, which dissociate the main seasonal components and the transients. The spatial analysis tools include a straightforward event location over Google Maps and the detection of heat zones by means of bidimensional geographic Parzen windows with automatic width control in terms of the scales and the number of events in the region of interest. Finally, statistical representations are used for jointly analyzing temporal and spatial data in terms of the “time–space slices”. We analyzed the total number of emergencies that were attended during 2014 by seven FRIs articulated in a PSAP at the Ecuadorian 911 Integrated Security Service. Characteristic weekly patterns were observed in institutions such as the police, health, and transit services, whereas annual patterns were observed in firefighter events. Spatial and spatiotemporal analysis showed some expected patterns together with nontrivial differences among different services, to be taken into account for resource management. The proposed analysis allows for a flexible analysis by combining statistical, spatial and temporal information, and it provides 911 service managers with useful and operative information.

  4. Data Center Equipment Location and Monitoring System

    DEFF Research Database (Denmark)

    2013-01-01

    Abstract: Data center equipment location systems include hardware and software to provide information on the location, monitoring, and security of servers and other equipment in equipment racks. The systems provide a wired alternative to the wireless RFID tag system by using electronic ID tags...... connected to each piece of equipment, each electronic ID tag connected directly by wires to an equipment rack controller on the equipment rack. The equipment rack controllers link to a central control computer that provides an operator ...

  5. The Talk of the Town: 9/11, the Lost Image, and the Machiavellian Moment

    Directory of Open Access Journals (Sweden)

    Dan Fleming

    2011-01-01

    Full Text Available A “lost” 9/11 photograph re-surfaced publicly in 2005/2006 and triggered some revealing debate in the United States about what 9/11 images “should” show. The paper unpacks the image and some key responses to it in order to describe a contemporary “Machiavellian moment” in which civic humanist ideals turn out to deny a reality that the image briefly hinted at, a reality recovered in the paper via discussion of a YouTube commentary thread concerned with a 9/11 “tribute” mashup video derived from comic books. Contrasting the latter with “proper” debate in The New Yorker and elsewhere, the paper argues for the necessity of hearing a different conversation that is discernibly “out there”. The result of doing so will be a better understanding of the materialization of affect in images and speech acts. It is argued that this will help us better grasp the nature of the “hot cognitions” that focus around a major event such as 9/11 and the ways in which those are mediated.

  6. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  7. mm-Wave Hybrid Photonic Wireless Links for Ultra-High Speed Wireless Transmissions

    DEFF Research Database (Denmark)

    Rommel, Simon; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso

    Hybrid photonic-wireless transmission schemes in the mm-wave frequency range are promising candidates to enable the multi-gigabit per second data communications required from wireless and mobile networks of the 5th and future generations. Large FCC spectrum allocations for wireless transmission...

  8. Mobile location with NLOS identification and mitigation based on modified Kalman filtering.

    Science.gov (United States)

    Ke, Wei; Wu, Lenan

    2011-01-01

    In order to enhance accuracy and reliability of wireless location in the mixed line-of-sight (LOS) and non-line-of-sight (NLOS) environments, a robust mobile location algorithm is presented to track the position of a mobile node (MN). An extended Kalman filter (EKF) modified in the updating phase is utilized to reduce the NLOS error in rough wireless environments, in which the NLOS bias contained in each measurement range is estimated directly by the constrained optimization method. To identify the change of channel situation between NLOS and LOS, a low complexity identification method based on innovation vectors is proposed. Numerical results illustrate that the location errors of the proposed algorithm are all significantly smaller than those of the iterated NLOS EKF algorithm and the conventional EKF algorithm in different LOS/NLOS conditions. Moreover, this location method does not require any statistical distribution knowledge of the NLOS error. In addition, complexity experiments suggest that this algorithm supports real-time applications.

  9. Academic Freedom in America after 9/11

    Science.gov (United States)

    Wilson, John K.

    2005-01-01

    College campuses around the country reacted to the September 11, 2001, terrorist acts with rallies, vigils, discussions, and a wide range of debates about the causes and cures for terrorism. Yet the story told about academia in the media was often quite different. Conservatives claimed that the reaction to 9/11 in academia was another example of…

  10. DSTiPE Algorithm for Fuzzy Spatio-Temporal Risk Calculation in Wireless Environments

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr; Milos Manic

    2008-09-01

    Time and location data play a very significant role in a variety of factory automation scenarios, such as automated vehicles and robots, their navigation, tracking, and monitoring, to services of optimization and security. In addition, pervasive wireless capabilities combined with time and location information are enabling new applications in areas such as transportation systems, health care, elder care, military, emergency response, critical infrastructure, and law enforcement. A person/object in proximity to certain areas for specific durations of time may pose a risk hazard either to themselves, others, or the environment. This paper presents a novel fuzzy based spatio-temporal risk calculation DSTiPE method that an object with wireless communications presents to the environment. The presented Matlab based application for fuzzy spatio-temporal risk cluster extraction is verified on a diagonal vehicle movement example.

  11. Automated wireless monitoring system for cable tension using smart sensors

    Science.gov (United States)

    Sim, Sung-Han; Li, Jian; Jo, Hongki; Park, Jongwoong; Cho, Soojin; Spencer, Billie F.; Yun, Chung-Bang

    2013-04-01

    Cables are critical load carrying members of cable-stayed bridges; monitoring tension forces of the cables provides valuable information for SHM of the cable-stayed bridges. Monitoring systems for the cable tension can be efficiently realized using wireless smart sensors in conjunction with vibration-based cable tension estimation approaches. This study develops an automated cable tension monitoring system using MEMSIC's Imote2 smart sensors. An embedded data processing strategy is implemented on the Imote2-based wireless sensor network to calculate cable tensions using a vibration-based method, significantly reducing the wireless data transmission and associated power consumption. The autonomous operation of the monitoring system is achieved by AutoMonitor, a high-level coordinator application provided by the Illinois SHM Project Services Toolsuite. The monitoring system also features power harvesting enabled by solar panels attached to each sensor node and AutoMonitor for charging control. The proposed wireless system has been deployed on the Jindo Bridge, a cable-stayed bridge located in South Korea. Tension forces are autonomously monitored for 12 cables in the east, land side of the bridge, proving the validity and potential of the presented tension monitoring system for real-world applications.

  12. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    Science.gov (United States)

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  13. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2012-02-01

    Full Text Available A wireless medical sensor network (WMSN can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1 a two-factor (i.e., password and smartcard professional authentication; (2 mutual authentication between the professional and the medical sensor; (3 symmetric encryption/decryption for providing message confidentiality; (4 establishment of a secure session key at the end of authentication; and (5 professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost. Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  14. Passive wireless sensor systems can recognize activites of daily living.

    Science.gov (United States)

    Urwyler, Prabitha; Stucki, Reto; Muri, Rene; Mosimann, Urs P; Nef, Tobias

    2015-08-01

    The ability to determine what activity of daily living a person performs is of interest in many application domains. It is possible to determine the physical and cognitive capabilities of the elderly by inferring what activities they perform in their houses. Our primary aim was to establish a proof of concept that a wireless sensor system can monitor and record physical activity and these data can be modeled to predict activities of daily living. The secondary aim was to determine the optimal placement of the sensor boxes for detecting activities in a room. A wireless sensor system was set up in a laboratory kitchen. The ten healthy participants were requested to make tea following a defined sequence of tasks. Data were collected from the eight wireless sensor boxes placed in specific places in the test kitchen and analyzed to detect the sequences of tasks performed by the participants. These sequence of tasks were trained and tested using the Markov Model. Data analysis focused on the reliability of the system and the integrity of the collected data. The sequence of tasks were successfully recognized for all subjects and the averaged data pattern of tasks sequences between the subjects had a high correlation. Analysis of the data collected indicates that sensors placed in different locations are capable of recognizing activities, with the movement detection sensor contributing the most to detection of tasks. The central top of the room with no obstruction of view was considered to be the best location to record data for activity detection. Wireless sensor systems show much promise as easily deployable to monitor and recognize activities of daily living.

  15. Evaluating ALWadHA for providing secure localisation for wireless sensor networks

    CSIR Research Space (South Africa)

    Abu-Mahfouz, Adnan M

    2013-09-01

    Full Text Available secure localisation algorithms that are able to work in a hostile environment. An attacker could compromise, or masquerade as, a beacon node and send incorrect location information. Localisation in a hostile environment is a critical problem in wireless...

  16. The Effect of 9/11 on the Heritability of Political Trust.

    Science.gov (United States)

    Ojeda, Christopher

    2016-02-01

    Following the attacks of September 11, 2001, a rally effect led to a precipitous rise in political trust. However, the increase in political trust concealed a simultaneous decline among a smaller portion of the population. This paper examines the psychological mechanisms underlying these heterogeneous attitudes towards government and shows that a biosocial model best explains the observed patterns of response. The interplay of genetic and environmental factors of political trust reveals the stable but dynamic nature of heritability: genetic influences of political trust increased immediately following 9/11 but quickly decayed to pre-9/11 levels.

  17. A wireless smart sensor network for automated monitoring of cable tension

    International Nuclear Information System (INIS)

    Sim, Sung-Han; Cho, Soojin; Li, Jian; Jo, Hongki; Park, Jong-Woong; Jung, Hyung-Jo; Spencer Jr, Billie F

    2014-01-01

    As cables are primary load carrying members in cable-stayed bridges, monitoring the tension forces of the cables provides valuable information regarding structural soundness. Incorporating wireless smart sensors with vibration-based tension estimation methods provides an efficient means of autonomous long-term monitoring of cable tensions. This study develops a wireless cable tension monitoring system using MEMSIC’s Imote2 smart sensors. The monitoring system features autonomous operation, sustainable energy harvesting and power consumption, and remote access using the internet. To obtain the tension force, an in-network data processing strategy associated with the vibration-based tension estimation method is implemented on the Imote2-based sensor network, significantly reducing the wireless data transmission and the power consumption. The proposed monitoring system has been deployed and validated on the Jindo Bridge, a cable-stayed bridge located in South Korea. (paper)

  18. A wireless smart sensor network for automated monitoring of cable tension

    Science.gov (United States)

    Sim, Sung-Han; Li, Jian; Jo, Hongki; Park, Jong-Woong; Cho, Soojin; Spencer, Billie F., Jr.; Jung, Hyung-Jo

    2014-02-01

    As cables are primary load carrying members in cable-stayed bridges, monitoring the tension forces of the cables provides valuable information regarding structural soundness. Incorporating wireless smart sensors with vibration-based tension estimation methods provides an efficient means of autonomous long-term monitoring of cable tensions. This study develops a wireless cable tension monitoring system using MEMSIC’s Imote2 smart sensors. The monitoring system features autonomous operation, sustainable energy harvesting and power consumption, and remote access using the internet. To obtain the tension force, an in-network data processing strategy associated with the vibration-based tension estimation method is implemented on the Imote2-based sensor network, significantly reducing the wireless data transmission and the power consumption. The proposed monitoring system has been deployed and validated on the Jindo Bridge, a cable-stayed bridge located in South Korea.

  19. Spatial Air Index Based on Largest Empty Rectangles for Non-Flat Wireless Broadcast in Pervasive Computing

    Directory of Open Access Journals (Sweden)

    Jun-Hong Shen

    2016-11-01

    Full Text Available In pervasive computing, location-based services (LBSs are valuable for mobile clients based on their current locations. LBSs use spatial window queries to enable useful applications for mobile clients. Based on skewed access patterns of mobile clients, non-flat wireless broadcast has been shown to efficiently disseminate spatial objects to mobile clients. In this paper, we consider a scenario in which spatial objects are broadcast to mobile clients over a wireless channel in a non-flat broadcast manner to process window queries. For such a scenario, we propose an efficient spatial air index method to handle window query access in non-flat wireless broadcast environments. The concept of largest empty rectangles is used to avoid unnecessary examination of the broadcast content, thus reducing the processing time for window queries. Simulation results show that the proposed spatial air index method outperforms the existing methods under various settings.

  20. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    Science.gov (United States)

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  1. Wireless adiabatic power transfer

    International Nuclear Information System (INIS)

    Rangelov, A.A.; Suchowski, H.; Silberberg, Y.; Vitanov, N.V.

    2011-01-01

    Research highlights: → Efficient and robust mid-range wireless energy transfer between two coils. → The adiabatic energy transfer is analogous to adiabatic passage in quantum optics. → Wireless energy transfer is insensitive to any resonant constraints. → Wireless energy transfer is insensitive to noise in the neighborhood of the coils. - Abstract: We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  2. Development and Successful Application of a Tree Movement Energy Harvesting Device, to Power a Wireless Sensor Node

    Directory of Open Access Journals (Sweden)

    Chris Knight

    2012-09-01

    Full Text Available Wireless sensor networks are becoming increasingly more common as a means to sense, measure, record and transmit data for scientific and engineering evaluation, remotely and autonomously. Usually, remotely located sensor nodes are powered by batteries which are recharged by solar or wind energy harvesters. Sometimes nodes are located in areas where these forms of energy harvesting are not possible due to local conditions, such as under the canopy of a forest. This article outlines the design and testing of a device capable of harvesting energy from tree movement, and shows the device powering a wireless sensor node continuously. The device uses the force and displacement of the movement of a tree trunk (of a 6 m tall tree to drive an electromagnetic generator that recharges a nickel metal hydride battery. The battery stores the energy from which a ~0.5 mW wireless sensor node is powered continuously. This demonstrated method of energy harvesting may allow the placement and powering of nodes in locations previously not possible.

  3. Wireless communication technology NFC

    OpenAIRE

    MÁROVÁ, Kateřina

    2014-01-01

    Aim of this bachelor thesis is to handle the issue of new wireless communication technology NFC (Near Field Communication) including a comparison of advantages and disadvantages of NFC with other wireless technologies (Bluetooth, Wi-Fi, etc.). NFC is a technology for wireless communications between different electronic devices, one of which is typically a mobile phone. Near Field Communication allows wireless communication at very short distance by approaching or enclosing two devices and can...

  4. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  5. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  6. Online vehicle and atmospheric pollution monitoring using GIS and wireless sensor networks

    International Nuclear Information System (INIS)

    Cordova-Lopez, L E; Mason, A; Cullen, J D; Shaw, A; Al-Shamma'a, A I

    2007-01-01

    A Geographical Information System (GIS) is a computer system designed to integrate, store, edit, analyse, share and display geographically referenced data. A wireless sensor network (WSN) is a wireless network of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions. This paper presents the integration of these two technologies to create a system able to detect measure and transmit information regarding the presence and quantities of internal combustion derived pollution and the geographical location in real time with the aim of creating pollution maps in urban environments

  7. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  8. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  9. Wireless Sensor Networks - Node Localization for Various Industry Problems

    International Nuclear Information System (INIS)

    Derr, Kurt; Manic, Milos

    2015-01-01

    Fast, effective monitoring following airborne releases of toxic substances is critical to mitigate risks to threatened population areas. Wireless sensor nodes at fixed predetermined locations may monitor such airborne releases and provide early warnings to the public. A challenging algorithmic problem is determining the locations to place these sensor nodes while meeting several criteria: 1) provide complete coverage of the domain, and 2) create a topology with problem dependent node densities, while 3) minimizing the number of sensor nodes. This manuscript presents a novel approach to determining optimal sensor placement, Advancing Front mEsh generation with Constrained dElaunay Triangulation and Smoothing (AFECETS) that addresses these criteria. A unique aspect of AFECETS is the ability to determine wireless sensor node locations for areas of high interest (hospitals, schools, high population density areas) that require higher density of nodes for monitoring environmental conditions, a feature that is difficult to find in other research work. The AFECETS algorithm was tested on several arbitrary shaped domains. AFECETS simulation results show that the algorithm 1) provides significant reduction in the number of nodes, in some cases over 40%, compared to an advancing front mesh generation algorithm, 2) maintains and improves optimal spacing between nodes, and 3) produces simulation run times suitable for real-time applications

  10. Underwater fiber-wireless communication with a passive front end

    Science.gov (United States)

    Xu, Jing; Sun, Bin; Lyu, Weichao; Kong, Meiwei; Sarwar, Rohail; Han, Jun; Zhang, Wei; Deng, Ning

    2017-11-01

    We propose and experimentally demonstrate a novel concept on underwater fiber-wireless (Fi-Wi) communication system with a fully passive wireless front end. A low-cost step-index (SI) plastic optical fiber (POF) together with a passive collimating lens at the front end composes the underwater Fi-Wi architecture. We have achieved a 1.71-Gb/s transmission at a mean BER of 4.97 × 10-3 (1.30 × 10-3 when using power loading) over a 50-m SI-POF and 2-m underwater wireless channel using orthogonal frequency division multiplexing (OFDM). Although the wireless part is very short, it actually plays a crucial role in practical underwater implementation, especially in deep sea. Compared with the wired solution (e.g. using a 52-m POF cable without the UWOC part), the proposed underwater Fi-Wi scheme can save optical wet-mate connectors that are sophisticated, very expensive and difficult to install in deep ocean. By combining high-capacity robust POF with the mobility and ubiquity of underwater wireless optical communication (UWOC), the proposed underwater Fi-Wi technology will find wide application in ocean exploration.

  11. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  12. An RSS based location estimation technique for cognitive relay networks

    KAUST Repository

    Qaraqe, Khalid A.; Hussain, Syed Imtiaz; Ç elebi, Hasari Burak; Abdallah, Mohamed M.; Alouini, Mohamed-Slim

    2010-01-01

    In this paper, a received signal strength (RSS) based location estimation method is proposed for a cooperative wireless relay network where the relay is a cognitive radio. We propose a method for the considered cognitive relay network to determine

  13. Propagation Characterization Based on Geographic Location Variation for 5G Small Cells

    Directory of Open Access Journals (Sweden)

    Byung-Jin Lee

    2017-01-01

    Full Text Available Developments in next-generation wireless transmission technology and efficient frequency-use research are based on understanding the characteristics of the exact radio channel. With regard to developments in next-generation mobile communication systems, performance verification of the development system is essential, for which it is necessary to estimate the exact wireless-space channel. This paper presents results of the analysis of radio propagation characteristics based on location variation in outdoor environments for small-cell 5th generation (5G mobile systems. Changes due to variation in location were measured using a channel sounder in a microcell environment with a 0.5 km radius in Korea. In order to analyze the propagation characteristics, the best distribution model reflecting the characteristics of the locations was derived. A comparison between actual measurements and three-dimensional ray-tracing simulation results confirmed the validity of the measurement result.

  14. On the Design of Energy-Efficient Location Tracking Mechanism in Location-Aware Computing

    Directory of Open Access Journals (Sweden)

    MoonBae Song

    2005-01-01

    Full Text Available The battery, in contrast to other hardware, is not governed by Moore's Law. In location-aware computing, power is a very limited resource. As a consequence, recently, a number of promising techniques in various layers have been proposed to reduce the energy consumption. The paper considers the problem of minimizing the energy used to track the location of mobile user over a wireless link in mobile computing. Energy-efficient location update protocol can be done by reducing the number of location update messages as possible and switching off as long as possible. This can be achieved by the concept of mobility-awareness we propose. For this purpose, this paper proposes a novel mobility model, called state-based mobility model (SMM to provide more generalized framework for both describing the mobility and updating location information of complexly moving objects. We also introduce the state-based location update protocol (SLUP based on this mobility model. An extensive experiment on various synthetic datasets shows that the proposed method improves the energy efficiency by 2 ∼ 3 times with the additional 10% of imprecision cost.

  15. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  16. Internal model control for industrial wireless plant using WirelessHART hardware-in-the-loop simulator.

    Science.gov (United States)

    Tran, Chung Duc; Ibrahim, Rosdiazli; Asirvadam, Vijanth Sagayan; Saad, Nordin; Sabo Miya, Hassan

    2018-04-01

    The emergence of wireless technologies such as WirelessHART and ISA100 Wireless for deployment at industrial process plants has urged the need for research and development in wireless control. This is in view of the fact that the recent application is mainly in monitoring domain due to lack of confidence in control aspect. WirelessHART has an edge over its counterpart as it is based on the successful Wired HART protocol with over 30 million devices as of 2009. Recent works on control have primarily focused on maintaining the traditional PID control structure which is proven not adequate for the wireless environment. In contrast, Internal Model Control (IMC), a promising technique for delay compensation, disturbance rejection and setpoint tracking has not been investigated in the context of WirelessHART. Therefore, this paper discusses the control design using IMC approach with a focus on wireless processes. The simulation and experimental results using real-time WirelessHART hardware-in-the-loop simulator (WH-HILS) indicate that the proposed approach is more robust to delay variation of the network than the PID. Copyright © 2017. Published by Elsevier Ltd.

  17. Protocol: a multi-level intervention program to reduce stress in 9-1-1 telecommunicators.

    Science.gov (United States)

    Meischke, Hendrika; Lilly, Michelle; Beaton, Randal; Calhoun, Rebecca; Tu, Ann; Stangenes, Scott; Painter, Ian; Revere, Debra; Baseman, Janet

    2018-05-02

    Nationwide, emergency response systems depend on 9-1-1 telecommunicators to prioritize, triage, and dispatch assistance to those in distress. 9-1-1 call center telecommunicators (TCs) are challenged by acute and chronic workplace stressors: tense interactions with citizen callers in crisis; overtime; shift-work; ever-changing technologies; and negative work culture, including co-worker conflict. This workforce is also subject to routine exposures to secondary traumatization while handling calls involving emergency situations and while making time urgent, high stake decisions over the phone. Our study aims to test the effectiveness of a multi-part intervention to reduce stress in 9-1-1 TCs through an online mindfulness training and a toolkit containing workplace stressor reduction resources. The study employs a randomized controlled trial design with three data collection points. The multi-part intervention includes an individual-level online mindfulness training and a call center-level organizational stress reduction toolkit. 160 TCs will be recruited from 9-1-1 call centers, complete a baseline survey at enrollment, and are randomly assigned to an intervention or a control group. Intervention group participants will start a 7-week online mindfulness training developed in-house and tailored to 9-1-1 TCs and their call center environment; control participants will be "waitlisted" and start the training after the study period ends. Following the intervention group's completion of the mindfulness training, all participants complete a second survey. Next, the online toolkit with call-center wide stress reduction resources is made available to managers of all participating call centers. After 3 months, a third survey will be completed by all participants. The primary outcome is 9-1-1 TCs' self-reported symptoms of stress at three time points as measured by the C-SOSI (Calgary Symptoms of Stress Inventory). Secondary outcomes will include: perceptions of social work

  18. Bluetooth enables in-door mobile location services

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    Several technologies can be applied to enable mobile location services, but most of them suffer from limited accuracy and availability. GPS can solve the problem of determining the location of users in most outdoor situations, but an end-user position inside a building cannot be pinpointed. Other...... mobile location techniques can also provide the user's position, but the accuracy is rather low. In order to improve the accuracy and make location-based services really attractive, existing approaches must be supplemented by new technologies. Wireless short-range technologies like Bluetooth could...... be candidates for solving these problems. This paper shows that Bluetooth can act as a key enabler of mobile location services in an in-door environment. The advantage of Bluetooth technology is, that it can provide rather precise location data inside a building or hotspot area, while the Bluetooth terminal...

  19. Energy-autonomous wireless sensor nodes for automotive applications, powered by thermoelectric energy harvesting

    International Nuclear Information System (INIS)

    Mehne, P.; Lickert, F.; Bäumker, E.; Kroener, M.; Woias, P.

    2016-01-01

    In this paper we will first present the measurement of temperatures on different positions at a diesel-powered car. As a result, several locations are identified as suitable to implement a wireless sensor node powered by thermal energy harvesting. Based on the data gained a thermoelectric generator (TEG) has been selected, and measurements of energy generation have been performed. Further, a complete energy-autonomous wireless sensor node was designed, including the TEG with its mounting bracket, an electronic power management, and a Bluetooth Low Energy (BLE) sensor node. Based on temperature differences from -10 K up to 75.3 K occurring in test drives, a low power set up was chosen to achieve a system startup time below 10 minutes and to ensure service even under difficult ambient conditions, like high ambient temperatures or a slow movement of the car in stocking traffic. 2 minutes after starting the engine a power about of 10 mW is available from the chosen TEG, and in peak the power exceeds 1 W. In a 50 minute test drive it was possible to generate 650 J of energy. This information was used to develop the complete system, demonstrating the opportunity to deploy energy-autonomous wireless sensor nodes in a car, e.g. for exhaust gas monitoring. The system is used to gather sensor data, like temperature and humidity, and transmits data successfully via BLE to a prepared main node based on a Raspberry Pi. (paper)

  20. Energy-autonomous wireless sensor nodes for automotive applications, powered by thermoelectric energy harvesting

    Science.gov (United States)

    Mehne, P.; Lickert, F.; Bäumker, E.; Kroener, M.; Woias, P.

    2016-11-01

    In this paper we will first present the measurement of temperatures on different positions at a diesel-powered car. As a result, several locations are identified as suitable to implement a wireless sensor node powered by thermal energy harvesting. Based on the data gained a thermoelectric generator (TEG) has been selected, and measurements of energy generation have been performed. Further, a complete energy-autonomous wireless sensor node was designed, including the TEG with its mounting bracket, an electronic power management, and a Bluetooth Low Energy (BLE) sensor node. Based on temperature differences from -10 K up to 75.3 K occurring in test drives, a low power set up was chosen to achieve a system startup time below 10 minutes and to ensure service even under difficult ambient conditions, like high ambient temperatures or a slow movement of the car in stocking traffic. 2 minutes after starting the engine a power about of 10 mW is available from the chosen TEG, and in peak the power exceeds 1 W. In a 50 minute test drive it was possible to generate 650 J of energy. This information was used to develop the complete system, demonstrating the opportunity to deploy energy-autonomous wireless sensor nodes in a car, e.g. for exhaust gas monitoring. The system is used to gather sensor data, like temperature and humidity, and transmits data successfully via BLE to a prepared main node based on a Raspberry Pi.

  1. Application of Wireless Sensor Networks for Indoor Temperature Regulation

    DEFF Research Database (Denmark)

    Stojkoska, Biljana Risteska; Popovska Avramova, Andrijana; Chatzimisios, Periklis

    2014-01-01

    Wireless sensor networks take a major part in our everyday lives by enhancing systems for home automation, healthcare, temperature control, energy consumption monitoring, and so forth. In this paper we focus on a system used for temperature regulation for residential, educational, industrial...... energy savings by reducing the amount of data transmissions through the network. Furthermore, the framework explores techniques for localization, such that the location of the nodes can be used by algorithms that regulate temperature settings......., and commercial premises, and so forth. We propose a framework for indoor temperature regulation and optimization using wireless sensor networks based on ZigBee platform. This paper considers architectural design of the system, as well as implementation guidelines. The proposed system favors methods that provide...

  2. A video wireless capsule endoscopy system powered wirelessly: design, analysis and experiment

    International Nuclear Information System (INIS)

    Pan, Guobing; Chen, Jiaoliao; Xin, Wenhui; Yan, Guozheng

    2011-01-01

    Wireless capsule endoscopy (WCE), as a relatively new technology, has brought about a revolution in the diagnosis of gastrointestinal (GI) tract diseases. However, the existing WCE systems are not widely applied in clinic because of the low frame rate and low image resolution. A video WCE system based on a wireless power supply is developed in this paper. This WCE system consists of a video capsule endoscope (CE), a wireless power transmission device, a receiving box and an image processing station. Powered wirelessly, the video CE has the abilities of imaging the GI tract and transmitting the images wirelessly at a frame rate of 30 frames per second (f/s). A mathematical prototype was built to analyze the power transmission system, and some experiments were performed to test the capability of energy transferring. The results showed that the wireless electric power supply system had the ability to transfer more than 136 mW power, which was enough for the working of a video CE. In in vitro experiments, the video CE produced clear images of the small intestine of a pig with the resolution of 320 × 240, and transmitted NTSC format video outside the body. Because of the wireless power supply, the video WCE system with high frame rate and high resolution becomes feasible, and provides a novel solution for the diagnosis of the GI tract in clinic

  3. Secure Your Wireless Network: Going Wireless Comes with Its Own Special Set of Security Concerns

    Science.gov (United States)

    Bloomquist, Jane; Musa, Atif

    2004-01-01

    Imagine a completely wireless school, an open network in which all students and staff can roam around using laptops or handheld computers to browse the Internet, access files and applications on the school server, and communicate with each other and the world via e-mail. It's a great picture--and at some schools the future is already here. But…

  4. Energy harvesting for autonomous wireless sensor networks

    NARCIS (Netherlands)

    Vullers, R.J.M.; van Schaijk, R.T.F.; Visser, H.J.; Penders, J.; Van Hoof, C.

    2010-01-01

    Wireless sensor nodes (WSNs) are employed today in many different application areas, ranging from health and lifestyle to automotive, smart building, predictive maintenance (e.g., of machines and infrastructure), and active RFID tags. Currently these devices have limited lifetimes, however, since

  5. Framing the Tenth Anniversary of 9/11:  A Comparison of CNN and Phoenix TV commemorative websites

    OpenAIRE

    Zhuang, Yuxi

    2013-01-01

    It has been more than ten years since the 9/11 attacks in 2001, but the events related to the attacks are still a focus for the whole world. This study examined the news coverage of the 9/11 tenth anniversary from Phoenix TV and CNN, which are among the most influential news media in China and the U.S., respectively. A systematic content analysis was performed using latest news, opinion articles, photographs, and videos as classified by CNN and Phoenix TV on their commemorative 9/11 tenth ann...

  6. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  7. Design and optimization of wireless sensor networks for localization and tracking

    OpenAIRE

    Pino Povedano, Sara

    2016-01-01

    Knowledge of the position of nodes in a WSN is crucial in most wireless sensor network (WSN) applications. The gathered information needs to be associated with a particular location in a specific time instant in order to appropiately control de surveillance area. Moreover, WSNs may be used for tracking certain objects in monitoring applications, which also requires the incorporation of location information of the sensor nodes into the tracking algorithms. These requisites ma...

  8. Papers of the PTAC wireless, telecommunications and e-business forum : using wireless, SCADA, and well data life cycle management technology to boost productivity and reduce costs in the upstream oil and gas industry

    International Nuclear Information System (INIS)

    2004-01-01

    The main focus of this forum was the use of wireless, telecommunications and e-business as a means of improving efficiency and productivity in the upstream oil and gas industry. The use of new communications technologies in asset monitoring and business performance was discussed, as well as industrial automation and wireless connectivity in conjunction with Supervisory Control and Data Acquisition (SCADA) systems. New technologies in the areas of maintenance and decision support and synergy integration were introduced. New health, safety and environmental performance tools were presented. Issues concerning secure communications and document exchange expenses were also introduced, as well as different methods of closing data gaps between joint interest partners. Specific tools and software concerning compliance management with web-based and remote field data capture technology were discussed, as well as the collection and display of well-site data using newly developed BlueGauge technology. Eleven papers were presented in this forum, of which three were catalogued separately for inclusion in this database. tabs., figs

  9. Papers of the PTAC wireless, telecommunications and e-business forum : using wireless, SCADA, and well data life cycle management technology to boost productivity and reduce costs in the upstream oil and gas industry

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    The main focus of this forum was the use of wireless, telecommunications and e-business as a means of improving efficiency and productivity in the upstream oil and gas industry. The use of new communications technologies in asset monitoring and business performance was discussed, as well as industrial automation and wireless connectivity in conjunction with Supervisory Control and Data Acquisition (SCADA) systems. New technologies in the areas of maintenance and decision support and synergy integration were introduced. New health, safety and environmental performance tools were presented. Issues concerning secure communications and document exchange expenses were also introduced, as well as different methods of closing data gaps between joint interest partners. Specific tools and software concerning compliance management with web-based and remote field data capture technology were discussed, as well as the collection and display of well-site data using newly developed BlueGauge technology. Eleven papers were presented in this forum, of which three were catalogued separately for inclusion in this database. tabs., figs.

  10. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prasan Kumar Sahoo

    2012-09-01

    Full Text Available Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.

  11. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    Science.gov (United States)

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734

  12. Efficient security mechanisms for mHealth applications using wireless body sensor networks.

    Science.gov (United States)

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.

  13. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  14. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  15. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  16. The Oprahfication of 9/11: September 11, the war in Iraq, and The Oprah Winfrey show

    NARCIS (Netherlands)

    Kooijman, J.; Cotten, T.T.; Springer, K.

    2010-01-01

    This chapter discusses how The Oprah Winfrey Show presented the aftermath of 9/11 and the pending war in Iraq in its episodes. It shows that in "The Oprahfication of 9/11," the show’s discourse on terrorism and war "transform[ed] possible feelings of fear, anger, anxiety, and grief into acts of

  17. Least Squares Neural Network-Based Wireless E-Nose System Using an SnO₂ Sensor Array.

    Science.gov (United States)

    Shahid, Areej; Choi, Jong-Hyeok; Rana, Abu Ul Hassan Sarwar; Kim, Hyun-Seok

    2018-05-06

    Over the last few decades, the development of the electronic nose (E-nose) for detection and quantification of dangerous and odorless gases, such as methane (CH₄) and carbon monoxide (CO), using an array of SnO₂ gas sensors has attracted considerable attention. This paper addresses sensor cross sensitivity by developing a classifier and estimator using an artificial neural network (ANN) and least squares regression (LSR), respectively. Initially, the ANN was implemented using a feedforward pattern recognition algorithm to learn the collective behavior of an array as the signature of a particular gas. In the second phase, the classified gas was quantified by minimizing the mean square error using LSR. The combined approach produced 98.7% recognition probability, with 95.5 and 94.4% estimated gas concentration accuracies for CH₄ and CO, respectively. The classifier and estimator parameters were deployed in a remote microcontroller for the actualization of a wireless E-nose system.

  18. Towards a Wireless and Low-Power Infrastructure for Representing Information Based on E-Paper Displays

    Directory of Open Access Journals (Sweden)

    Diego Sánchez-de-Rivera

    2017-01-01

    Full Text Available There has been much interest in replacing traditional information supports with more technological solutions in recent years. New technologies which allow paper-like perception with minimal power needs have emerged as low-power wireless scenarios. A priority for these new supports is to create the architecture for a scalable solution which maintains minimal power requirements. The retail industry demands a new information infrastructure that improves customer and employee satisfaction. In this work, authors propose an information provision architecture based on E-Paper and carry out an experiment where different smart labeling architectures based on Paper, E-Paper, LED liquid crystal display (LCD and Dot-matrix LCD were tested in order to determine which is best suited for a real labeling environment. Enclosed in a research project called SMARKET, the authors pilot-tested the work in a real supermarket, having the opportunity to survey employees and customers about satisfaction and frustration with the use of the architectures proposed in this research work.

  19. Energy-efficient data collection in wireless sensor networks with time constraints

    NARCIS (Netherlands)

    Mitici, M.A.; Goseling, Jasper; de Graaf, Maurits; Boucherie, Richardus J.

    We consider the problem of retrieving a reliable estimate of an attribute from a wireless sensor network within a fixed time window and with minimum energy consumption for the sensors. The sensors are located in the plane according to some random spatial process. They perform energy harvesting and

  20. Energy-delay trade-off of wireless data collection in the plane

    NARCIS (Netherlands)

    Mitici, M.A.; Goseling, Jasper; de Graaf, Maurits; Boucherie, Richardus J.

    2014-01-01

    We analyze the Pareto front of the delay of collecting data from wireless devices located in the plane according to a Poisson process and the energy needed by the devices to transmit their observations. Fundamental bounds on the energy-delay trade-off over the space of all achievable scheduling

  1. Development of a Wireless System for Monitoring and Control of a Wind Turbine

    Directory of Open Access Journals (Sweden)

    Cristhian M. Durán-Acevedo

    2013-11-01

    Full Text Available This article presents the use of a wireless communication technology through the ZigBee protocol, by implementing XBee S2B. Wireless communication was implemented on a wind turbine prototype (i.e. wind power generation in order to controlling variables automatically, such as: Direction of the wind, temperature, humidity and velocity engine. The XBee were conditioned using a Mega ADK Arduino card, which the signals generated were acquired by several sensors and subsequently sent wirelessly. The programming and monitoring of Arduino module with each of the variables was performed through Labview software. The study was also conducted in order to explore new technologies for wireless communication, which is useful in interoperable systems to monitor, control and automate different processes. As a result, the performance test with the wireless system was stable and data transmission was reliable.

  2. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  3. Analysis of In-Route Wireless Charging for the Shuttle System at Zion National Park

    Energy Technology Data Exchange (ETDEWEB)

    Meintz, Andrew; Prohaska, Robert; Konan, Arnaud; Ragatz, Adam; Markel, Tony; Kelly, Ken

    2016-10-05

    System right-sizing is critical to implementation of wireless power transfer (WPT) for electric vehicles (EVs). This study will analyze potential WPT scenarios for the electrification of shuttle buses at Zion National Park utilizing a modelling tool developed by NREL called WPTSim. This tool uses second-by-second speed, location, and road grade data from the conventional shuttles in operation to simulate the incorporation of WPT at fine granularity. Vehicle power and state of charge are simulated over the drive cycle to evaluate potential system designs. The required battery capacity is determined based on the rated power at a variable number of charging locations. The outcome of this work is an analysis of the design tradeoffs for the electrification of the shuttle fleet with wireless charging versus conventional overnight charging.

  4. Analysis of In-Route Wireless Charging for the Shuttle System at Zion National Park

    Energy Technology Data Exchange (ETDEWEB)

    Meintz, Andrew; Prohaska, Robert; Konan, Arnaud; Ragatz, Adam; Markel, Tony; Kelly, Ken

    2016-12-08

    System right-sizing is critical to implementation of wireless power transfer (WPT) for electric vehicles. This study will analyze potential WPT scenarios for the electrification of shuttle buses at Zion National Park utilizing a modelling tool developed by the National Renewable Energy Laboratory called WPTSim. This tool uses second-by-second speed, location, and road grade data from the conventional shuttles in operation to simulate the incorporation of WPT at fine granularity. Vehicle power and state of charge are simulated over the drive cycle to evaluate potential system designs. The required battery capacity is determined based on the rated power at a variable number of charging locations. The outcome of this work is an analysis of the design tradeoffs for the electrification of the shuttle fleet with wireless charging versus conventional overnight charging.

  5. Driving deaths and injuries post-9/11

    Directory of Open Access Journals (Sweden)

    Deonandan R

    2011-12-01

    Full Text Available Raywat Deonandan, Amber BackwellInterdisciplinary School of Health Sciences, Faculty of Health Sciences, University of Ottawa, Ottawa, ON, CanadaObjectives: In the days immediately following the terror attacks of 9/11, thousands of Americans chose to drive rather than to fly. We analyzed highway accident data to determine whether or not the number of fatalities and injuries following 9/11 differed from those in the same time period in 2000 and 2002.Methods: Motor crash data from the National Highway Traffic Safety Administration's Fatality Analysis Reporting System were analyzed to determine the numbers and rates of fatalities and injuries nationally and in selected states for the 20 days after September 11, in each of 2000, 2001, and 2002.Results: While the fatality rate did not change appreciably, the number of less severe injuries was statistically higher in 2001 than in 2000, both nationally and in New York State.Conclusions: The fear of terror attacks may have compelled Americans to drive instead of fly. They were thus exposed to the heightened risk of injury and death posed by driving. The need for public health to manage risk perception and communication is thus heightened in an era of global fear and terrorism.Keywords: public health, traffic, injuries, epidemiology

  6. Wireless Data Acquisition of Transient Signals for Mobile Spectrometry Applications.

    Science.gov (United States)

    Trzcinski, Peter; Weagant, Scott; Karanassios, Vassili

    2016-05-01

    Wireless data acquisition using smartphones or handhelds offers increased mobility, it provides reduced size and weight, it has low electrical power requirements, and (in some cases) it has an ability to access the internet. Thus, it is well suited for mobile spectrometry applications using miniaturized, field-portable spectrometers, or detectors for chemical analysis in the field (i.e., on-site). There are four main wireless communications standards that can be used for wireless data acquisition, namely ZigBee, Bluetooth, Wi-Fi, and UWB (ultra-wide band). These are briefly reviewed and are evaluated for applicability to data acquisition of transient signals (i.e., time-domain) in the field (i.e., on-site) from a miniaturized, field-portable photomultiplier tube detector and from a photodiode array detector installed in a miniaturized, field-portable fiber optic spectrometer. These are two of the most widely used detectors for optical measurements in the ultraviolet-visible range of the spectrum. A miniaturized, 3D-printed, battery-operated microplasma-on-a-chip was used for generation of transient optical emission signals. Elemental analysis from liquid microsamples, a microplasma, and a handheld or a smartphone will be used as examples. Development and potential applicability of wireless data acquisition of transient optical emission signals for taking part of the lab to the sample types of mobile, field-portable spectrometry applications will be discussed. The examples presented are drawn from past and ongoing work in the authors' laboratory. A handheld or a smartphone were used as the mobile computing devices of choice. © The Author(s) 2016.

  7. Industrial wireless monitoring with energy-harvesting devices

    NARCIS (Netherlands)

    Brian Blake, M.; Das, Kallol; Zand, P.; Havinga, Paul J.M.

    Vibration monitoring and analysis techniques are used increasingly for predictive maintenance. While traditional vibration monitoring relies on wired sensor networks, recent industrial technologies such as WirelessHART, ISA100.11a, and IEEE802.15.4e have brought a paradigm shift in the automation

  8. Towards Location Based QoS-Aware Network Selection Mechanism for the Nomadic Mobile Services

    NARCIS (Netherlands)

    Pawar, P.; van Beijnum, Bernhard J.F.; Wac, K.E.; Hermens, Hermanus J.; Konstantas, D.

    The advances in the area of location based computing will soon make it feasible to predict the availability of wireless networks and their application level Quality of Service (QoS) characteristics along the location and time dimensions. Such predictions are referred to as QoS predictions which are

  9. Statistical-QoS Guaranteed Energy Efficiency Optimization for Energy Harvesting Wireless Sensor Networks.

    Science.gov (United States)

    Gao, Ya; Cheng, Wenchi; Zhang, Hailin

    2017-08-23

    Energy harvesting, which offers a never-ending energy supply, has emerged as a prominent technology to prolong the lifetime and reduce costs for the battery-powered wireless sensor networks. However, how to improve the energy efficiency while guaranteeing the quality of service (QoS) for energy harvesting based wireless sensor networks is still an open problem. In this paper, we develop statistical delay-bounded QoS-driven power control policies to maximize the effective energy efficiency (EEE), which is defined as the spectrum efficiency under given specified QoS constraints per unit harvested energy, for energy harvesting based wireless sensor networks. For the battery-infinite wireless sensor networks, our developed QoS-driven power control policy converges to the Energy harvesting Water Filling (E-WF) scheme and the Energy harvesting Channel Inversion (E-CI) scheme under the very loose and stringent QoS constraints, respectively. For the battery-finite wireless sensor networks, our developed QoS-driven power control policy becomes the Truncated energy harvesting Water Filling (T-WF) scheme and the Truncated energy harvesting Channel Inversion (T-CI) scheme under the very loose and stringent QoS constraints, respectively. Furthermore, we evaluate the outage probabilities to theoretically analyze the performance of our developed QoS-driven power control policies. The obtained numerical results validate our analysis and show that our developed optimal power control policies can optimize the EEE over energy harvesting based wireless sensor networks.

  10. Joint Power Charging and Routing in Wireless Rechargeable Sensor Networks.

    Science.gov (United States)

    Jia, Jie; Chen, Jian; Deng, Yansha; Wang, Xingwei; Aghvami, Abdol-Hamid

    2017-10-09

    The development of wireless power transfer (WPT) technology has inspired the transition from traditional battery-based wireless sensor networks (WSNs) towards wireless rechargeable sensor networks (WRSNs). While extensive efforts have been made to improve charging efficiency, little has been done for routing optimization. In this work, we present a joint optimization model to maximize both charging efficiency and routing structure. By analyzing the structure of the optimization model, we first decompose the problem and propose a heuristic algorithm to find the optimal charging efficiency for the predefined routing tree. Furthermore, by coding the many-to-one communication topology as an individual, we further propose to apply a genetic algorithm (GA) for the joint optimization of both routing and charging. The genetic operations, including tree-based recombination and mutation, are proposed to obtain a fast convergence. Our simulation results show that the heuristic algorithm reduces the number of resident locations and the total moving distance. We also show that our proposed algorithm achieves a higher charging efficiency compared with existing algorithms.

  11. Automatic Mitigation of Sensor Variations for Signal Strength Based Location Systems

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2006-01-01

    n the area of pervasive computing a key concept is context-awareness. One type of context information is location information of wireless network clients. Research in indoor localization of wireless network clients based on signal strength is receiving a lot of attention. However, not much...... of this research is directed towards handling the issue of adapting a signal strength based indoor localization system to the hardware and software of a specific wireless network client, be it a tag, PDA or laptop. Therefore current indoor localization systems need to be manually adapted to work optimally...... with specific hardware and software. A second problem is that for a specific hardware there will be more than one driver available and they will have different properties when used for localization. Therefore the contribution of this paper is twofold. First, an automatic system for evaluating the fitness...

  12. Intelligent Wireless Sensor Network

    OpenAIRE

    Saeed, Bakhtiar I.; Mehrdadi, Bruce

    2010-01-01

    In recent years, there has been significant increase in utilisation of embedded-microcontrollers in broad range of applications extending from commercial products to industrial process system monitoring. Furthermore, improvements in speed, size and power consumption of microcontrollers with added wireless capabilities has provided new generation of applications. These include versatile and\\ud low cost solutions in wireless sensor networking applications such as wireless system monitoring and ...

  13. Deep Space Habitat Wireless Smart Plug

    Science.gov (United States)

    Morgan, Joseph A.; Porter, Jay; Rojdev, Kristina; Carrejo, Daniel B.; Colozza, Anthony J.

    2014-01-01

    NASA has been interested in technology development for deep space exploration, and one avenue of developing these technologies is via the eXploration Habitat (X-Hab) Academic Innovation Challenge. In 2013, NASA's Deep Space Habitat (DSH) project was in need of sensors that could monitor the power consumption of various devices in the habitat with added capability to control the power to these devices for load shedding in emergency situations. Texas A&M University's Electronic Systems Engineering Technology Program (ESET) in conjunction with their Mobile Integrated Solutions Laboratory (MISL) accepted this challenge, and over the course of 2013, several undergraduate students in a Capstone design course developed five wireless DC Smart Plugs for NASA. The wireless DC Smart Plugs developed by Texas A&M in conjunction with NASA's Deep Space Habitat team is a first step in developing wireless instrumentation for future flight hardware. This paper will further discuss the X-Hab challenge and requirements set out by NASA, the detailed design and testing performed by Texas A&M, challenges faced by the team and lessons learned, and potential future work on this design.

  14. Predictors of Obesity and Physical Health Complaints Among 911 Telecommunicators.

    Science.gov (United States)

    Lilly, Michelle M; London, Melissa J; Mercer, Mary C

    2016-03-01

    This study aims to: (1) examine rates of obesity and physical health complaints among 911 telecommunicators; and (2) document the role of emotion dysregulation, psychological inflexibility, duty-related distress and dissociation, and psychopathology in predicting obesity and physical health complaints in this population. The sample consisted of 911 telecommunicators from across the country (N = 758). Participants completed an online survey assessing their mental and physical health functioning. A total of 82.5% of the sample reported a body mass index that fell within the overweight or obese category and an average of 17 physical health complaints within the past month. Peritraumatic reactions (distress and dissociation), emotion dysregulation, and psychological inflexibility had effects on physical health largely through psychopathology (alcohol abuse, post-traumatic stress disorder, and depression). Development of adapted prevention and intervention efforts with this population is needed.

  15. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    Science.gov (United States)

    Deen, David A.; Osinsky, Andrei; Miller, Ross

    2014-03-01

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection.

  16. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    International Nuclear Information System (INIS)

    Deen, David A.; Osinsky, Andrei; Miller, Ross

    2014-01-01

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection

  17. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    Energy Technology Data Exchange (ETDEWEB)

    Deen, David A.; Osinsky, Andrei; Miller, Ross [Agnitron Technology Incorporated, Eden Prairie, Minnesota 55346 (United States)

    2014-03-03

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection.

  18. The undersampled wireless acoustic sensor network scenario: some preliminary results and open research issues

    NARCIS (Netherlands)

    Sommen, P.C.W.; Janse, K.

    2009-01-01

    Advances in hardware technology pave the way to small, low power wireless sensor devices, such as wireless microphones. This makes it possible to use a large number, i.e. thousands, of microphones at positions where it is not feasible to put wired microphones, creating an enormous potential for

  19. GPS-Free Localization Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2010-06-01

    Full Text Available Localization is one of the most fundamental problems in wireless sensor networks, since the locations of the sensor nodes are critical to both network operations and most application level tasks. A GPS-free localization scheme for wireless sensor networks is presented in this paper. First, we develop a standardized clustering-based approach for the local coordinate system formation wherein a multiplication factor is introduced to regulate the number of master and slave nodes and the degree of connectivity among master nodes. Second, using homogeneous coordinates, we derive a transformation matrix between two Cartesian coordinate systems to efficiently merge them into a global coordinate system and effectively overcome the flip ambiguity problem. The algorithm operates asynchronously without a centralized controller; and does not require that the location of the sensors be known a priori. A set of parameter-setting guidelines for the proposed algorithm is derived based on a probability model and the energy requirements are also investigated. A simulation analysis on a specific numerical example is conducted to validate the mathematical analytical results. We also compare the performance of the proposed algorithm under a variety multiplication factor, node density and node communication radius scenario. Experiments show that our algorithm outperforms existing mechanisms in terms of accuracy and convergence time.

  20. Post-9/11 drug- and alcohol- related hospitalizations among World Trade Center Health Registry enrollees, 2003-2010.

    Science.gov (United States)

    Hirst, Andrew; Miller-Archie, Sara A; Welch, Alice E; Li, Jiehui; Brackbill, Robert M

    2018-06-01

    To describe patterns of drug- and alcohol-related hospitalizations among persons exposed to the 2001 World Trade Center (WTC) terrorist attacks and to assess whether 9/11-related exposures or post-9/11 post-traumatic stress disorder (PTSD) were associated with increased odds of hospitalization. Data for adult enrollees in the WTC Health Registry, a prospective cohort study, were linked to New York State (NYS) administrative hospitalization data to identify alcohol- and drug-related hospitalizations from enrollment to December 31, 2010. Logistic regression was used to analyze the associations between substance use-related hospitalization, 9/11-related exposure and PTSD. Of 41,176 NYS resident enrollees, we identified 626 (1.5%) who had at least one alcohol- or drug-related hospitalization; 53.4% (n = 591) of these hospitalizations were for alcohol only diagnoses and 46.6% (n = 515) were drug-related. Witnessing ≥3 traumatic events on 9/11 was significantly associated with having a drug-related hospitalization (AOR 1.4, 95% CI = [1.1, 1.9]). PTSD was significantly associated with both having a drug-related hospitalization as well as an alcohol only-related hospitalization. (AOR 2.6, 95% CI = [2.0, 3.3], AOR 1.8, 95% CI = [1.4, 2.3], respectively). Witnessing traumatic events and having PTSD were independently associated with substance use-related hospitalizations. Targeting people who witnessed traumatic events on 9/11 and/or who have PTSD for substance use- treatment could reduce alcohol and drug-related hospitalizations connected to 9/11. Copyright © 2018 The Authors. Published by Elsevier B.V. All rights reserved.

  1. Frequency selective surface based passive wireless sensor for structural health monitoring

    International Nuclear Information System (INIS)

    Jang, Sang-Dong; Kang, Byung-Woo; Kim, Jaehwan

    2013-01-01

    Wireless sensor networks or ubiquitous sensor networks are a promising technology giving useful information to people. In particular, the chipless passive wireless sensor is one of the most important developments in wireless sensor technology because it is compact and does not need a battery or chip for the sensor operation. So it has many possibilities for use in various types of sensor system with economical efficiency and robustness in harsh environmental conditions. This sensor uses an electromagnetic resonance frequency or phase angle shift associated with a geometrical change of the sensor tag or an impedance change of the sensor. In this paper, a chipless passive wireless structural health monitoring (SHM) sensor is made using a frequency selective surface (FSS). The cross type FSS is introduced, and its SHM principle is explained. The electromagnetic characteristics of the FSS are simulated in terms of transmission and reflection coefficients using simulation software, and an experimental verification is conducted. The electromagnetic characteristic change of the FSS in the presence of mechanical strain or a structural crack is investigated by means of simulation and experiment. Since large-area structures can be covered by deploying FSS, it is possible to detect the location of any cracks. (paper)

  2. MIMO Terminal Performance Evaluation with a Novel Wireless Cable Method

    DEFF Research Database (Denmark)

    Fan, Wei; Kyösti, Pekka; Hentilä, Lassi

    2017-01-01

    chamber, which might be impractical and expensive. In this paper, a novel wireless cable method is proposed and experimentally validated. By recording the average power (i.e. reference signal received power (RSRP) in the LTE) per DUT antenna port and selecting optimal complex weights at the channel...... emulator output ports, a wireless cable connection can be achieved. The proposed method can be executed in a small RF shielded anechoic box, and offers low system cost, high measurement reliability and repeatability....

  3. Damage localization using a power-efficient distributed on-board signal processing algorithm in a wireless sensor network

    International Nuclear Information System (INIS)

    Liu, Lei; Liu, Shuntao; Yuan, Fuh-Gwo

    2012-01-01

    A distributed on-board algorithm that is embedded and executed within a group of wireless sensors to locate structural damages in isotropic plates is presented. The algorithm is based on an energy-decay model of Lamb waves and singular value decomposition (SVD) to determine damage locations. A sensor group consists of a small number of sensors, each of which independently collects wave signals and evaluates wave energy upon an external triggering signal sent from a base station. The energy values, usually a few bytes in length, are then sent to the base station to determine the presence and location of damages. In comparison with traditional centralized approaches in which whole datasets are required to be transmitted, the proposed algorithm yields much less wireless communication traffic, yet with a modest amount of computation required within sensors. Experiments have shown that the algorithm is robust to locate damage for isotropic plate structures and is very power efficient, with more than an order-of-magnitude power saving

  4. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  5. Multi-carrier transmission for hybrid radio frequency with optical wireless communications

    Science.gov (United States)

    Wang, Gang; Chen, Genshe; Shen, Dan; Pham, Khanh; Blasch, Erik; Nguyen, Tien M.

    2015-05-01

    Radio frequency (RF) wireless communication is reaching its capacity to support large data rate transmissions due to hardware constraints (e.g., silicon processes), software strategies (e.g., information theory), and consumer desire for timely large file exchanges (e.g., big data and mobile cloud computing). A high transmission rate performance must keep pace with the generated huge volumes of data for real-time processing. Integrated RF and optical wireless communications (RF/OWC) could be the next generation transmission technology to satisfy both the increased data rate exchange and the communications constraints. However, with the promising benefits of RF/OWC, challenges remain to fully develop hybrid RF with wireless optical communications such as uniform waveform design for information transmission and detection. In this paper, an orthogonal frequency division multiplexing (OFDM) transmission scheme, which widely employed in RF communications, is developed for optical communications. The traditional high peak-to-average power ratio (PAPR) in OFDM is reduced to improve system performance. The proposed multi-carrier waveform is evaluated with a frequency-selective fading channel. The results demonstrate that bit error rate (BER) performance of our proposed optical OFDM transmission technique outperforms the traditional OWC on-off keying (OOK) transmission scheme.

  6. Design of a TDOA location engine and development of a location system based on chirp spread spectrum.

    Science.gov (United States)

    Wang, Rui-Rong; Yu, Xiao-Qing; Zheng, Shu-Wang; Ye, Yang

    2016-01-01

    Location based services (LBS) provided by wireless sensor networks have garnered a great deal of attention from researchers and developers in recent years. Chirp spread spectrum (CSS) signaling formatting with time difference of arrival (TDOA) ranging technology is an effective LBS technique in regards to positioning accuracy, cost, and power consumption. The design and implementation of the location engine and location management based on TDOA location algorithms were the focus of this study; as the core of the system, the location engine was designed as a series of location algorithms and smoothing algorithms. To enhance the location accuracy, a Kalman filter algorithm and moving weighted average technique were respectively applied to smooth the TDOA range measurements and location results, which are calculated by the cooperation of a Kalman TDOA algorithm and a Taylor TDOA algorithm. The location management server, the information center of the system, was designed with Data Server and Mclient. To evaluate the performance of the location algorithms and the stability of the system software, we used a Nanotron nanoLOC Development Kit 3.0 to conduct indoor and outdoor location experiments. The results indicated that the location system runs stably with high accuracy at absolute error below 0.6 m.

  7. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  8. ``Low Power Wireless Technologies: An Approach to Medical Applications''

    Science.gov (United States)

    Bellido O., Francisco J.; González R., Miguel; Moreno M., Antonio; de La Cruz F, José Luis

    Wireless communication supposed a great both -quantitative and qualitative, jump in the management of the information, allowing the access and interchange of it without the need of a physical cable connection. The wireless transmission of voice and information has remained in constant evolution, arising new standards like BluetoothTM, WibreeTM or ZigbeeTM developed under the IEEE 802.15 norm. These newest wireless technologies are oriented to systems of communication of short-medium distance and optimized for a low cost and minor consume, becoming recognized as a flexible and reliable medium for data communications across a broad range of applications due to the potential that the wireless networks presents to operate in demanding environments providing clear advantages in cost, size, power, flexibility, and distributed intelligence. About the medical applications, the remote health or telecare (also called eHealth) is getting a bigger place into the manufacturers and medical companies, in order to incorporate products for assisted living and remote monitoring of health parameteres. At this point, the IEEE 1073, Personal Health Devices Working Group, stablish the framework for these kind of applications. Particularly, the 1073.3.X describes the physical and transport layers, where the new ultra low power short range wireless technologies can play a big role, providing solutions that allow the design of products which are particularly appropriate for monitor people’s health with interoperability requirements.

  9. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhaoming Lu

    2016-01-01

    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  10. A Secure Framework for Location Verification in Pervasive Computing

    Science.gov (United States)

    Liu, Dawei; Lee, Moon-Chuen; Wu, Dan

    The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.

  11. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  12. Wireless Technology in K-12 Education

    Science.gov (United States)

    Walery, Darrell

    2004-01-01

    Many schools begin implementing wireless technology slowly by creating wireless "hotspots" on the fly. This is accomplished by putting a wireless access point on a cart along with a set of wireless laptop computers. A teacher can then wheel the cart anywhere in the school that has a network drop, plug the access point in and have an…

  13. Training Post-9/11 Police Officers with a Counter-Terrorism Reality-Based Training Model: A Case Study

    Science.gov (United States)

    Biddle, Christopher J.

    2013-01-01

    The purpose of this qualitative holistic multiple-case study was to identify the optimal theoretical approach for a Counter-Terrorism Reality-Based Training (CTRBT) model to train post-9/11 police officers to perform effectively in their counter-terrorism assignments. Post-9/11 police officers assigned to counter-terrorism duties are not trained…

  14. Geocoding rural addresses in a community contaminated by PFOA: a comparison of methods

    Directory of Open Access Journals (Sweden)

    Gallagher Lisa G

    2010-04-01

    Full Text Available Abstract Background Location is often an important component of exposure assessment, and positional errors in geocoding may result in exposure misclassification. In rural areas, successful geocoding to a street address is limited by rural route boxes. Communities have assigned physical street addresses to rural route boxes as part of E911 readdressing projects for improved emergency response. Our study compared automated and E911 methods for recovering and geocoding valid street addresses and assessed the impact of positional errors on exposure classification. Methods The current study is a secondary analysis of existing data that included 135 addresses self-reported by participants of a rural community study who were exposed via public drinking water to perfluorooctanoate (PFOA released from a DuPont facility in Parkersburg, West Virginia. We converted pre-E911 to post-E911 addresses using two methods: automated ZP4 address-correction software with the U.S. Postal Service LACS database and E911 data provided by Wood County, West Virginia. Addresses were geocoded using TeleAtlas, an online commercial service, and ArcView with StreetMap Premium North America NAVTEQ 2008 enhanced street dataset. We calculated positional errors using GPS measurements collected at each address and assessed exposure based on geocoded location in relation to public water pipes. Results The county E911 data converted 89% of the eligible addresses compared to 35% by ZP4 LACS. ArcView/NAVTEQ geocoded more addresses (n = 130 and with smaller median distance between geocodes and GPS coordinates (39 meters than TeleAtlas (n = 85, 188 meters. Without E911 address conversion, 25% of the geocodes would have been more than 1000 meters from the true location. Positional errors in TeleAtlas geocoding resulted in exposure misclassification of seven addresses whereas ArcView/NAVTEQ methods did not misclassify any addresses. Conclusions Although the study was limited by small

  15. Geocoding rural addresses in a community contaminated by PFOA: a comparison of methods.

    Science.gov (United States)

    Vieira, Verónica M; Howard, Gregory J; Gallagher, Lisa G; Fletcher, Tony

    2010-04-21

    Location is often an important component of exposure assessment, and positional errors in geocoding may result in exposure misclassification. In rural areas, successful geocoding to a street address is limited by rural route boxes. Communities have assigned physical street addresses to rural route boxes as part of E911 readdressing projects for improved emergency response. Our study compared automated and E911 methods for recovering and geocoding valid street addresses and assessed the impact of positional errors on exposure classification. The current study is a secondary analysis of existing data that included 135 addresses self-reported by participants of a rural community study who were exposed via public drinking water to perfluorooctanoate (PFOA) released from a DuPont facility in Parkersburg, West Virginia. We converted pre-E911 to post-E911 addresses using two methods: automated ZP4 address-correction software with the U.S. Postal Service LACS database and E911 data provided by Wood County, West Virginia. Addresses were geocoded using TeleAtlas, an online commercial service, and ArcView with StreetMap Premium North America NAVTEQ 2008 enhanced street dataset. We calculated positional errors using GPS measurements collected at each address and assessed exposure based on geocoded location in relation to public water pipes. The county E911 data converted 89% of the eligible addresses compared to 35% by ZP4 LACS. ArcView/NAVTEQ geocoded more addresses (n = 130) and with smaller median distance between geocodes and GPS coordinates (39 meters) than TeleAtlas (n = 85, 188 meters). Without E911 address conversion, 25% of the geocodes would have been more than 1000 meters from the true location. Positional errors in TeleAtlas geocoding resulted in exposure misclassification of seven addresses whereas ArcView/NAVTEQ methods did not misclassify any addresses. Although the study was limited by small numbers, our results suggest that the use of county E911 data in rural

  16. Wireless and mobile systems in telemedicine

    Directory of Open Access Journals (Sweden)

    Reza Safdari

    2012-12-01

    Full Text Available Background: It is necessary to deploy mobile and wireless systems in healthcare, because they have many benefits for healthcare systems. The objectives of this article were introducing various systems, applications, and standards of the wireless and mobile telemedicine. Material and Methods: This review study was conducted in 2010. To conduct the study, published articles in the years 2005 to 2012, in English with an emphasis on wireless and mobile technologies in health were studied. Search was done with key words include telemedicine, wireless health systems, health and telecommunications technology in databases including Pubmed, Science Direct, Google Scholar, Web of Sciences, Proquest. The collected data were analyzed. Results: Telemedicine system in the ambulance, telemedicine systems in space, telecardiology systems, EEG system, ultrasound system are some types of wireless and mobile systems in telemedicine. PDA-based mobile and wireless telemedicine application, based PDA drug application, and patient tracking application are some of wireless and mobile applications of telemedicine. The most important standards of wireless and mobile telemedicine are HL7, DICOM, SNOMed, and ICD-9-CM. Conclusion: There are many challenges in the wireless and mobile systems in telemedicine, despite the many benefits. Slow speed in sending pictures and video, lack of attention to the privacy in the design of these systems, environmental variables and the number of users during the day are some of these challenges. It is recommended to consider these challenges during the planning and designing of wireless and mobile systems in telemedicine.

  17. Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    R Regin

    2015-12-01

    Full Text Available Location privacy measures need to be developed to prevent the opponent from determining the physical locations of source sensors and sinks. An opponent can easily intercept network traffic due to the use of a broadcast medium for routing packets and get detailed information such as packet transmission time and frequency to perform traffic analysis and infer the locations of monitored objects and data sinks. On the other hand, sensors usually have limited processing speed and energy supplies. It is very expensive to apply traditional anonymous communication techniques for hiding the communication between sensor nodes and sinks. The existing source-location privacy protects the location of monitored objects to increase the number of messages sent by the source before the object is located by the attacker. The flooding technique has the source node send each packet through numerous paths to a sink making it difficult for an opponent to trace the source. The locations of sinks can be protected from a local eavesdropper by hashing the ID field in the packet header. But opponent can track sinks by carrying out time correlation and rate monitoring attacks. Besides protection some source nodes are transferring relatively large amounts of data in existing system. As a result, these nodes run out of battery faster due to improper position of nodes and sinks. Thus in the proposed system the sinks should be located as optimally as possible to reduce traffic flow and energy consumption for sensor nodes. Hence Sink placement problem is resolved for minimizing the delay as well as maximizing the lifetime of a WSN. Thus proposed system is efficient in terms of overhead and functionality when compared to existing system.

  18. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2018-01-01

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  19. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir

    2018-02-28

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  20. OCP: Opportunistic Carrier Prediction for Wireless Networks

    Science.gov (United States)

    2008-08-01

    Many protocols have been proposed for medium access control in wireless networks. MACA [13], MACAW [3], and FAMA [8] are the earlier proposals for...world performance of carrier sense. In Proceedings of ACM SIGCOMM E-WIND Workshop, 2005. [13] P. Karn. MACA : A new channel access method for packet radio

  1. Evaluation of wireless Local Area Networks

    Science.gov (United States)

    McBee, Charles L.

    1993-09-01

    This thesis is an in-depth evaluation of the current wireless Local Area Network (LAN) technologies. Wireless LAN's consist of three technologies: they are infrared light, microwave, and spread spectrum. When the first wireless LAN's were introduced, they were unfavorably labeled slow, expensive, and unreliable. The wireless LAN's of today are competitively priced, more secure, easier to install, and provide equal to or greater than the data throughput of unshielded twisted pair cable. Wireless LAN's are best suited for organizations that move office staff frequently, buildings that have historical significance, or buildings that have asbestos. Additionally, an organization may realize a cost savings of between $300 to $1,200 each time a node is moved. Current wireless LAN technologies have a positive effect on LAN standards being developed by the Defense Information System Agency (DISA). DoD as a whole is beginning to focus on wireless LAN's and mobile communications. If system managers want to remain successful, they need to stay abreast of this technology.

  2. Simulation of Wireless Digital Communication Systems

    Directory of Open Access Journals (Sweden)

    A. Mohammed

    2004-12-01

    Full Text Available Due to the explosive demands for high speed wireless services, suchas wireless Internet, email and cellular video conferencing, digitalwireless communications has become one of the most exciting researchtopics in electrical and electronic engineering field. The never-endingdemand for such personal and multimedia services, however, demandstechnologies operating at higher data rates and broader bandwidths. Inaddition, the complexity of wireless communication and signalprocessing systems has grown considerably during the past decade.Therefore, powerful computer­aided techniques are required for theprocess of modeling, designing, analyzing and evaluating theperformance of digital wireless communication systems. In this paper wediscuss the basic propagation mechanisms affecting the performance ofwireless communication systems, and present a simple, powerful andefficient way to simulate digital wireless communication systems usingMatlab. The simulated results are compared with the theoreticalanalysis to validate the simulator. The simulator is useful inevaluating the performance of wireless multimedia services and theassociated signal processing structures and algorithms for current andnext generation wireless mobile communication systems.

  3. securitisation: the case of post-9/11 united states africa policy

    African Journals Online (AJOL)

    Tarryn

    Using the Copenhagen School's securitisation theory, we investigate the interaction .... help explain why post 9/11 changes in US Africa policy took place. .... African condition.39 In addition, the Center for Strategic and International Studies.

  4. Energy Efficient Data Transmission for Sensors with Wireless Charging.

    Science.gov (United States)

    Fang, Xiaolin; Luo, Junzhou; Wu, Weiwei; Gao, Hong

    2018-02-08

    This paper studies the problem of maximizing the energy utilization for data transmission in sensors with periodical wireless charging process while taking into account the thermal effect. Two classes of problems are analyzed: one is the case that wireless charging can process for only a limited period of time, and the other is the case that wireless charging can process for a long enough time. Algorithms are proposed to solve the problems and analysis of these algorithms are also provided. For the first problem, three subproblems are studied, and, for the general problem, we give an algorithm that can derive a performance bound of ( 1 - 1 2 m ) ( O P T - E ) compared to an optimal solution. In addition, for the second problem, we provide an algorithm with 2 m 2 m - 1 O P T + 1 performance bound for the general problem. Simulations confirm the analysis of the algorithms.

  5. Applying an intelligent and automated emissions measurement system to characterize the RF environment for supporting wireless technologies

    International Nuclear Information System (INIS)

    Keebler, P. F.; Phipps, K. O.

    2006-01-01

    The use of wireless technologies in commercial and industrial facilities has grown significantly in the past several years. New applications of wireless technologies with increasing frequency and varying radiated power are being developed everyday. Wireless application specialists and end users have already identified several sources of electromagnetic interference (EMI) in these facilities. Interference has been reported between wireless devices and between these devices and other types of electronic equipment either using frequencies in the unlicensed wireless spectrum or equipment that may generate undesired man-made noise in this spectrum. Facilities that are not using the wireless band should verify the spectral quality of that band and the electromagnetic compatibility (EMC) integrity of safety-related power and signal cables before installing wireless technologies. With the introduction of new wireless devices in the same electromagnetic space where analog and digital I and C systems and cables must co-exist, the ability of facility managers to manage their spectra will dictate the degree of interference between wireless devices and other electronic equipment. Because of the unknowns associated with interference with analog and digital I and C systems in the wireless band, nuclear power plants have been slow to introduce wireless technologies in plant areas. With the application of newly developed advanced radiated emissions measurement systems that can record, process, and analyze radiated and conducted emissions in a cost-effective manner, facility managers can more reliably characterize potential locations for wireless technologies, including potential coupling effects with safety-related power and signal cables, with increased confidence that the risks associated with creating an interference can be significantly reduced. This paper will present an effective philosophy already being used in other mission-critical applications for managing EMC, an

  6. Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yen-Chieh Ouyang

    2010-02-01

    Full Text Available This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks. The algorithm operates without a centralized controller, operates asynchronously, and does not require that the location of the sensors be known a priori. Based on the cluster-based topology, secure hierarchical communication protocols and dynamic quarantine strategies are introduced to defend against spam attacks, since this type of attacks can exhaust the energy of sensor nodes and will shorten the lifetime of a sensor network drastically. By adjusting the threshold of infected percentage of the cluster coverage, our scheme can dynamically coordinate the proportion of the quarantine region and adaptively achieve the cluster control and the neighborhood control of attacks. Simulation results show that the proposed approach is feasible and cost effective for wireless sensor networks.

  7. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  8. Wireless coexistence and interference test method for low-power wireless sensor networks

    NARCIS (Netherlands)

    Serra, R.; Nabi, Majid

    2015-01-01

    Wireless sensor networks (WSNs) are being increasingly introduced for critical applications such as safety, security and health. One the main characteristic requirements of such networks are that they should function with relative low power. Therefore the wireless links are more vulnerable.

  9. Industrial Wireless Sensors: A User's Perspective on the Impact of Standards on Wide-spread Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Taft, Cyrus W. [Taft Engineering, Inc.; Manges, Wayne W [ORNL; Sorge, John N [Southern Company Services, Inc.

    2012-01-01

    The role of wireless sensing technologies in industrial instrumentation will undoubtedly become more important in the years ahead. . Deployment of such instrumentation in an industrial setting with its heightened security and robustness criteria hinges on user acceptance of verified performance as well as meeting cost requirements. Today, industrial users face many choices when specifying a wireless sensor network, including radio performance, battery life, interoperability, security, and standards compliance. The potential market for industrial wireless sensors is literally millions of wireless instruments and it is imperative that accurate information for applying the technology to real-world applications be available to the end-user so that they can make informed deployment decisions. The majority of industrial wireless automation designs now being deployed or being considered for deployment are based on three different standards . The HART Communications Foundation s WirelessHART (IEC 62591), the International Society of Automation s ISA100.11a, and the offering from the Industrial Wireless Alliance of China known as WIA-PA (IEC 62601). Aside from these industrial automation standards, users must also be cognizant of the underlying wireless network standards IEEE 802.11, IEEE 802.15.4, and IEEE 802.15.3a and their interactions with the three principal industrial automation protocols mentioned previously. The crucial questions being asked by end users revolve around sensor network performance, interoperability, reliability, and security. This paper will discuss potential wireless sensor applications in power plants, barriers to the acceptance of wireless technology, concerns related to standards, and provide an end user prospective on the issues affecting wide-spread deployment of wireless sensors. Finally, the authors conclude with a discussion of a recommended path forward including how standards organizations can better facilitate end user decision making and

  10. Location Is Everything: The Use and Marketing of Reference E-Mail

    Science.gov (United States)

    Collins, Susan L.

    2006-01-01

    Reference e-mail continues to be a vital reference service. This article studies the trends in reference e-mail use over an eight year period. Usage statistics are analyzed particularly in light of the marketing of the service via changes in the location of the service on the official university libraries' Web pages. Included are recommendations…

  11. How wireless remote technology reduces cost, boosts productivity and improves safety in upstream oil and gas operations

    Energy Technology Data Exchange (ETDEWEB)

    Wommack, K. [Viatran, Edmonton, AB (Canada)

    2009-09-15

    This article demonstrated how wireless communications can help oil and gas producers obtain the most current information on the status of their operations to help optimize operations and protect workers and equipment. Wireless communication can provide benefits at nearly every phase of upstream production. When combined with pressure, temperature, flow, level and other sensing devices, wireless communications provide an effective and economical way to deliver data on well or pipeline operations to site managers; optimize well-production, minimize workovers and prevent blowdowns at the wellhead; track oil and water production; measure differential pressure, line pressure and line temperature; and monitor the motorized choke and control valve position. Wireless technology offers significant savings through improved maintenance efficiency. With wireless systems in remote locations, there are seldom problems in the transmission path. Wireless technology makes it much easier and affordable to manage well operations from a safe distance. By eliminating the need for wires in a fracing operation, wireless can help fracing companies maintain a safe operating distance from their target wells, and move operations from well to well with ease. A wireless communication system for transmitting process data from field sensors to a field processing device consists of radio transmitters, a communications gateway and a user interface. The communications hub receives encrypted messages from the remote devices and transmits them to a flow computer, SCADA system, or Distributed Control System. Data is then transmitted to a central office. 1 fig.

  12. Convergencia de sistemas de comunicación ópticos e inalámbricos (Converged wireless and optical communication systems)

    DEFF Research Database (Denmark)

    Tafur Monroy, Idelfonso; Guerrero Gonzalez, Neil; Caballero Jambrina, Antonio

    2009-01-01

    Users of tele-information services are demanding instant access, everywhere and anytime. Wireless communication systems offers mobility and flexibility while optical fiber based systems offer large bandwidth, secure and lower power consumption for transport of tele-communication signals. None...... of the two technologies separately can satisfy the demands of user for ubiquitous and affordable access to information services. Converged optical and wireless systems offer a solution that combines the best of both technologies. This article review the trends in converged optical-wireless communication...... systems and outline the role that photonic technologies is playing in making the vision of a converged network a reality....

  13. Acemind new indoor full duplex optical wireless communication prototype

    Science.gov (United States)

    Bouchet, Olivier; Perrufel, Micheline; Topsu, Suat; Guan, Hongyu

    2016-09-01

    For over a century and Mr. Guglielmo Marconi invention, systems using radio waves have controlled over wireless telecommunication solutions; from Amplitude Modulation (AM) radio products to satellite communications for instance. But beyond an increasingly negative opinion face to radio waves and radio spectrum availability more and more reduced; there is an unprecedented opportunity with LED installation in displays and lighting to provide optical wireless communication solutions. As a result, technologically mature solutions are already commercially available for services such as Location Based Services (LBS), broadcast diffusion or Intelligent Transport Services (ITS). Pending finalization of the standard review process IEEE 802.15.7 r1, our paper presents the results of the European collaborative project named "ACEMIND". It offers an indoor bilateral optical wireless communication prototype having the following characteristics: use of the existing electrical infrastructure, through judicious combination with Light Fidelity (LiFi), Power Line Communication (PLC) and Ethernet to reduce the implementation cost. We propose a bilateral optical wireless communication even when the light is switched off by using Visible Light Communication (VLC) and Infra-Red Communication (IRC) combined to a remote optical switch. Dimensionally optimized LiFi module is presented in order to offer the possibility for integration inside a laptop. Finally, there is operational mechanism implementation such as OFDM/DMT to increase throughput. After the introduction, we will present the results of a market study from Orange Labs customers about their opinion on LiFi components. Then we will detail the LiFi prototype, from the physical layer aspect to MAC layer before concluding on commercial development prospects.

  14. Legal Aspects of a Location-Based Mobile Advertising Platform

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix; Gidofalvi, Gyozo

    2008-01-01

    Recent advances in communication and information technology, such as the increasing accuracy of GPS technology and the miniaturization of wireless communication devices pave the road for Location-Based Services. Among these services, mobile advertising is predicted to represent a high yield revenue...... stream. In this article the possibilities of using a location-aware mobile messenger for the purpose of mobile advertising will be introduced. However, mobile advertising may become an extremely intrusive practice if the user's privacy is not taken in account. The objective of this article is therefore...

  15. Handbook of sensor networks compact wireless and wired sensing systems

    CERN Document Server

    Ilyas, Mohammad

    2004-01-01

    INTRODUCTION Opportunities and Challenges in Wireless Sensor Networks, M. Haenggi, Next Generation Technologies to Enable Sensor Networks, J. I.  Goodman, A. I. Reuther, and D. R. Martinez Sensor Networks Management, L. B. Ruiz, J. M. Nogueira, and A. A. F. Loureiro Models for Programmability in Sensor Networks, A. Boulis Miniaturizing Sensor Networks with MEMS, Brett Warneke A Taxonomy of Routing Techniques in Wireless Sensor Networks, J. N. Al-Karaki and A. E. Kamal Artificial Perceptual Systems, A. Loutfi, M. Lindquist, and P. Wide APPLICATIONS Sensor Network Architecture and Appl

  16. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless......Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...

  17. Opportunities and Challenges for Near-Field Wireless Power Transfer: A Review

    Directory of Open Access Journals (Sweden)

    Aqeel Mahmood Jawad

    2017-07-01

    Full Text Available Traditional power supply cords have become less important because they prevent large-scale utilization and mobility. In addition, the use of batteries as a substitute for power cords is not an optimal solution because batteries have a short lifetime, thereby increasing the cost, weight, and ecological footprint of the hardware implementation. Their recharging or replacement is impractical and incurs operational costs. Recent progress has allowed electromagnetic wave energy to be transferred from power sources (i.e., transmitters to destinations (i.e., receivers wirelessly, the so-called wireless power transfer (WPT technique. New developments in WPT technique motivate new avenues of research in different applications. Recently, WPT has been used in mobile phones, electric vehicles, medical implants, wireless sensor network, unmanned aerial vehicles, and so on. This review highlights up-to-date studies that are specific to near-field WPT, which include the classification, comparison, and potential applications of these techniques in the real world. In addition, limitations and challenges of these techniques are highlighted at the end of the article.

  18. Communications issues for international radioactive materials transport, Post 9/11

    Energy Technology Data Exchange (ETDEWEB)

    Brown, A.A. [International Transport, BNFL, Warrington, Cheshire (United Kingdom); Hartenstein, M. [Transport External Affairs, Marketing, Sales and Projects Div., Cogema Logistics, Saint Quentin en Yvelines (France); Nawano, M. [Transport Headquarters, Overseas Reprocessing Committee, Tokyo (Japan)

    2004-07-01

    The terrorist attacks of September 11{sup th} 2001 in New York and Washington (9/11) have increased government, public and media concern over terrorist attacks in general and attack on transport systems in particular. Antinuclear groups have increasingly made unsubstantiated claims about the terrorist threat to Radioactive Materials Transport and the consequences of such a threat being realised. At the same time, the international and national security regulations relating to Nuclear Materials Transport have been reviewed and tightened since 9/11. These changes have in some cases restricted the information that can be made publicly available. It is against this background that the Industry must operate and seek to inform the public through its communications activities whilst remaining within the new security framework of security regulations. These activities must necessarily provide sufficient information to counter the incorrect claims made by opponents, allay fears of the public as far as possible and provide factual and scientifically rigorous data without compromising security.

  19. Communications issues for international radioactive materials transport, Post 9/11

    International Nuclear Information System (INIS)

    Brown, A.A.; Hartenstein, M.; Nawano, M.

    2004-01-01

    The terrorist attacks of September 11 th 2001 in New York and Washington (9/11) have increased government, public and media concern over terrorist attacks in general and attack on transport systems in particular. Antinuclear groups have increasingly made unsubstantiated claims about the terrorist threat to Radioactive Materials Transport and the consequences of such a threat being realised. At the same time, the international and national security regulations relating to Nuclear Materials Transport have been reviewed and tightened since 9/11. These changes have in some cases restricted the information that can be made publicly available. It is against this background that the Industry must operate and seek to inform the public through its communications activities whilst remaining within the new security framework of security regulations. These activities must necessarily provide sufficient information to counter the incorrect claims made by opponents, allay fears of the public as far as possible and provide factual and scientifically rigorous data without compromising security

  20. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  1. Wi-GIM system: a new wireless sensor network (WSN) for accurate ground instability monitoring

    Science.gov (United States)

    Mucchi, Lorenzo; Trippi, Federico; Schina, Rosa; Fornaciai, Alessandro; Gigli, Giovanni; Nannipieri, Luca; Favalli, Massimiliano; Marturia Alavedra, Jordi; Intrieri, Emanuele; Agostini, Andrea; Carnevale, Ennio; Bertolini, Giovanni; Pizziolo, Marco; Casagli, Nicola

    2016-04-01

    Landslides are among the most serious and common geologic hazards around the world. Their impact on human life is expected to increase in the next future as a consequence of human-induced climate change as well as the population growth in proximity of unstable slopes. Therefore, developing better performing technologies for monitoring landslides and providing local authorities with new instruments able to help them in the decision making process, is becoming more and more important. The recent progresses in Information and Communication Technologies (ICT) allow us to extend the use of wireless technologies in landslide monitoring. In particular, the developments in electronics components have permitted to lower the price of the sensors and, at the same time, to actuate more efficient wireless communications. In this work we present a new wireless sensor network (WSN) system, designed and developed for landslide monitoring in the framework of EU Wireless Sensor Network for Ground Instability Monitoring - Wi-GIM project (LIFE12 ENV/IT/001033). We show the preliminary performance of the Wi-GIM system after the first period of monitoring on the active Roncovetro Landslide and on a large subsiding area in the neighbourhood of Sallent village. The Roncovetro landslide is located in the province of Reggio Emilia (Italy) and moved an inferred volume of about 3 million cubic meters. Sallent village is located at the centre of the Catalan evaporitic basin in Spain. The Wi-GIM WSN monitoring system consists of three levels: 1) Master/Gateway level coordinates the WSN and performs data aggregation and local storage; 2) Master/Server level takes care of acquiring and storing data on a remote server; 3) Nodes level that is based on a mesh of peripheral nodes, each consisting in a sensor board equipped with sensors and wireless module. The nodes are located in the landslide ground perimeter and are able to create an ad-hoc WSN. The location of each sensor on the ground is

  2. UD-WCMA: An Energy Estimation and Forecast Scheme for Solar Powered Wireless Sensor Networks

    KAUST Repository

    Dehwah, Ahmad H.; Elmetennani, Shahrazed; Claudel, Christian

    2017-01-01

    -WCMA) to estimate and predict the variations of the solar power in a wireless sensor network. The presented approach combines the information from the real-time measurement data and a set of stored profiles representing the energy patterns in the WSNs location

  3. Securitisation: The case of post-9/11 United States Africa policy ...

    African Journals Online (AJOL)

    ): weak states were believed to pose an existential threat to the US. American aid to Africa consequently more than tripled in the years following 9/11. Using the Copenhagen School's securitisation theory, we investigate the interaction between ...

  4. Less wireless costs : optimizing firms aim to cut wireless service bills

    International Nuclear Information System (INIS)

    Mahony, J.

    2006-01-01

    The Calgary-based firm Alliance is offering optimized billing to oil companies, many of which spend more than $100,000 a month on wireless services for devices such as cellular telephones, pagers and Blackberries. In particular, Alliance is focusing on cutting the cost of wireless for corporate clients by analyzing client-usage patterns and choosing the most cost-efficient rate plans offered by the telecoms. Alliance suggests that do-it-yourself optimization is too complex for the average user, given the very large choice of rate plans. Using algorithms, Alliance software goes through all the wireless service contract options from the telecoms to choose the best plan for a company's needs. Optimizers claim their clients will see significant savings on wireless, in the order to 20 to 50 per cent. This article presented a brief case history of a successful optimization plan for Nabors Canada LP. Alliance allows its clients to view their billing information on their web-based server. Call records can be viewed by device or company division. 1 ref., 1 fig

  5. Examining the Fundamental Obstructs of Adopting Cloud Computing for 9-1-1 Dispatch Centers in the USA

    Science.gov (United States)

    Osman, Abdulaziz

    2016-01-01

    The purpose of this research study was to examine the unknown fears of embracing cloud computing which stretches across measurements like fear of change from leaders and the complexity of the technology in 9-1-1 dispatch centers in USA. The problem that was addressed in the study was that many 9-1-1 dispatch centers in USA are still using old…

  6. Fixed Wireless may be a temporary answer

    Indian Academy of Sciences (India)

    Possible to enhance throughput by 4 with respect to Mobile Wireless. And get 8 to 10 bps / Hz / cell; Examples: BB corDECT: today provides 256/512kbps to each connection in fixed environment. Ideal for small town / rural Broadband. Fixed 802.16d/e does the same in but at much higher price-points.

  7. Wireless motion sensor network for monitoring motion in a process, wireless sensor node, reasoning node, and feedback and/or actuation node for such wireless motion sensor network

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Marin Perianu, Raluca; Marin Perianu, Mihai

    2010-01-01

    Wireless motion sensor network for monitoring motion in a process comprising at least one wireless sensor node for measuring at least one physical quantity related to motion or orientation, feature extraction means for deriving a feature for the measured quantities, a wireless transmitter connected

  8. Robust optical wireless links over turbulent media using diversity solutions

    Science.gov (United States)

    Moradi, Hassan

    Free-space optic (FSO) technology, i.e., optical wireless communication (OWC), is widely recognized as superior to radio frequency (RF) in many aspects. Visible and invisible optical wireless links solve first/last mile connectivity problems and provide secure, jam-free communication. FSO is license-free and delivers high-speed data rates in the order of Gigabits. Its advantages have fostered significant research efforts aimed at utilizing optical wireless communication, e.g. visible light communication (VLC), for high-speed, secure, indoor communication under the IEEE 802.15.7 standard. However, conventional optical wireless links demand precise optical alignment and suffer from atmospheric turbulence. When compared with RF, they suffer a low degree of reliability and lack robustness. Pointing errors cause optical transceiver misalignment, adversely affecting system reliability. Furthermore, atmospheric turbulence causes irradiance fluctuations and beam broadening of transmitted light. Innovative solutions to overcome limitations on the exploitation of high-speed optical wireless links are greatly needed. Spatial diversity is known to improve RF wireless communication systems. Similar diversity approaches can be adapted for FSO systems to improve its reliability and robustness; however, careful diversity design is needed since FSO apertures typically remain unbalanced as a result of FSO system sensitivity to misalignment. Conventional diversity combining schemes require persistent aperture monitoring and repetitive switching, thus increasing FSO implementation complexities. Furthermore, current RF diversity combining schemes may not be optimized to address the issue of unbalanced FSO receiving apertures. This dissertation investigates two efficient diversity combining schemes for multi-receiving FSO systems: switched diversity combining and generalized selection combining. Both can be exploited to reduce complexity and improve combining efficiency. Unlike maximum

  9. EEM{sup TM} wireless supervision

    Energy Technology Data Exchange (ETDEWEB)

    Bilic, H. [Ericsson-Nikola Tesla d.d. Zagreb (Croatia)

    2000-07-01

    By adding the GSM network to the communication level of Energy Management systems, energy operating centres (EOC) can offer wireless access to the supervised equipment. Furthermore EOC can profit from rapid service development in the GSM networks. With implementation of GPRS to the GSM network EOC can instantly offer wireless access to external IP based networks such as Internet and corporate Intranets. The author describes architecture and key characteristic of Ericsson EnergyMaster{sup TM} (EEM{sup TM}) system for Energy Management, how and where to implement wireless supervision, wireless access to IP addresses and also how to implement new services provided by the GSM network. (orig.)

  10. Response of Caenorhabditis elegans to wireless devices radiation exposure.

    Science.gov (United States)

    Fasseas, Michael K; Fragopoulou, Adamantia F; Manta, Areti K; Skouroliakou, Aikaterini; Vekrellis, Konstantinos; Margaritis, Lukas H; Syntichaki, Popi

    2015-03-01

    To examine the impact of electromagnetic radiation, produced by GSM (Global System for Mobile communications) mobile phones, Wi-Fi (Wireless-Fidelity) routers and wireless DECT (Digital Enhanced Cordless Telecommunications) phones, on the nematode Caenorhabditis elegans. We exposed synchronized populations, of different developmental stages, to these wireless devices at E-field levels below ICNIRP's (International Commission on Non-Ionizing Radiation Protection) guidelines for various lengths of time. WT (wild-type) and aging- or stress-sensitive mutant worms were examined for changes in growth, fertility, lifespan, chemotaxis, short-term memory, increased ROS (Reactive Oxygen Species) production and apoptosis by using fluorescent marker genes or qRT-PCR (quantitative Reverse Transcription-Polymerase Chain Reaction). No statistically significant differences were found between the exposed and the sham/control animals in any of the experiments concerning lifespan, fertility, growth, memory, ROS, apoptosis or gene expression. The worm appears to be robust to this form of (pulsed) radiation, at least under the exposure conditions used.

  11. Secure Intra-Body Wireless Communications (SIWiC) System Project

    Science.gov (United States)

    Ahmad, Aftab; Doggett, Terrence P.

    2011-01-01

    SIWiC System is a project to investigate, design and implement future wireless networks of implantable sensors in the body. This futuristic project is designed to make use of the emerging and yet-to-emerge technologies, including ultra-wide band (UWB) for wireless communications, smart implantable sensors, ultra low power networking protocols, security and privacy for bandwidth and power deficient devices and quantum computing. Progress in each of these fronts is hindered by the needs of breakthrough. But, as we will see in this paper, these major challenges are being met or will be met in near future. SIWiC system is a network of in-situ wireless devices that are implanted to coordinate sensed data inside the body, such as symptoms monitoring collected internally, or biometric data collected of an outside object from within the intra-body network. One node has the capability of communicating outside the body to send data or alarm to a relevant authority, e.g., a remote physician.

  12. Assisting Patients with Disabilities to Actively Perform Occupational Activities Using Battery-Free Wireless Mice to Control Environmental Stimulation

    Science.gov (United States)

    Shih, Ching-Hsiang; Wang, Shu-Hui; Chang, Man-Ling; Kung, Ssu-Yun

    2012-01-01

    The latest studies have adopted software technology to turn the battery-free wireless mouse into a high performance object location detector using a newly developed object location detection program (OLDP). This study extended OLDP functionality to assess whether two patients recovering from cerebral vascular accidents would be able to actively…

  13. Frequent binge drinking five to six years after exposure to 9/11: Findings from the World Trade Center Health Registry

    Science.gov (United States)

    Welch, Alice E.; Caramanica, Kimberly; Maslow, Carey B.; Cone, James E.; Farfel, Mark R.; Keyes, Katherine M.; Stellman, Steven D.; Hasin, Deborah S.

    2014-01-01

    Background Exposure to 9/11 may have considerable long-term impact on health behaviors, including increased alcohol consumption. We examined the association between frequent binge drinking, posttraumatic stress disorder (PTSD), and number of 9/11-specific experiences among World Trade Center Health Registry (Registry) enrollees five-to-six years after 9/11. Methods Participants included 41,284 lower Manhattan residents, workers, passers-by, and rescue/recovery workers aged 18 or older without a pre-9/11 PTSD diagnosis who completed Wave 1 (2003–2004) and Wave 2 (2006–2007) interviews. Frequent binge drinking was defined as consuming five or more drinks on five or more occasions in the prior 30 days at Wave 2. Probable PTSD was defined as scoring 44 or greater on the PTSD Checklist. 9/11 exposure was measured as the sum of 12 experiences and grouped as none/low (0–1), medium (2–3), high (4–5) and very high (6+). Results Frequent binge drinking was significantly associated with increasing 9/11 exposure and PTSD. Those with very high and high exposures had a higher prevalence of frequent binge drinking (13.7% and 9.8%, respectively) than those with medium and low exposures (7.5% and 4.4%, respectively). Upon stratification, very high and high exposures were associated with frequent binge drinking in both the PTSD and no PTSD subgroups. Conclusions Our findings suggest that 9/11 exposure had an impact on frequent binge drinking five-to-six years later among Registry enrollees. Understanding the effects of traumatic exposure on alcohol use is important to identify risk factors for post-disaster alcohol misuse, inform policy, and improve post-disaster psychological and alcohol screening and counseling. PMID:24831753

  14. An Improved Wireless Battery Charging System

    OpenAIRE

    Woo-Seok Lee; Jin-Hak Kim; Shin-Young Cho; Il-Oun Lee

    2018-01-01

    This paper presents a direct wireless battery charging system. The output current of the series-series compensated wireless power transfer (SS-WPT) system is used as a current source, and the output voltage of AC-DC converter controls the current source. Therefore, the proposed wireless battery charging system needs no battery charging circuit to carry out charging profiles, and can solve space constraints and thermal problems in many battery applications. In addition, the proposed wireless b...

  15. Conceptual service architecture for adaptive mobile location services

    DEFF Research Database (Denmark)

    Schou, Saowanee

    2008-01-01

    This paper presents a conceptual service architecture for adaptive mobile location services designed to be used on the next generation wireless network. The developed service architecture consists of a set of concepts, principles, rules and guidelines for constructing, deploying, and operating...... the mobile location services. The service architecture identifies the components required to build the mobile location services and describes how these components are combined and how they should interact. As a means of exploring the developed conceptual service architecture, an illustrative case study...... of a new-concept tracking service is chosen to demonstrate the applicability of the architecture. Through the case study, the service request and response processes will be illustrated. New possible service functions provided by the developed service architecture will be examined and discussed...

  16. Comorbidity amplifies the effects of post-9/11 posttraumatic stress disorder trajectories on health-related quality of life.

    Science.gov (United States)

    Li, Jiehui; Zweig, Kimberly Caramanica; Brackbill, Robert M; Farfel, Mark R; Cone, James E

    2018-03-01

    The present study aims to examine the impact of physical and mental health comorbidities on the association between post-9/11 posttraumatic stress disorder (PTSD) trajectories over 10 years and health-related quality of life (HRQOL) among 9/11-exposed persons. 30,002 responding adult World Trade Center Health Registry enrollees reporting no pre-9/11 PTSD were studied. PTSD trajectories (chronic, delayed, remitted, no PTSD) were defined based on a 17-item PTSD Checklist-Specific to 9/11 across three waves of survey data. Three indicators of poor HRQOL were defined based on CDC HRQOL-4 measures. We computed age-adjusted prevalence of physical and mental health comorbidity (depression/anxiety) by PTSD trajectory and used modified Poisson regression to assess the effect of PTSD trajectory on poor HRQOL prevalence, accounting for comorbidity. Age-adjusted prevalence of overall comorbid conditions was 95.8 and 61.4% among the chronic and no-PTSD groups, respectively. Associations between 9/11-related PTSD trajectories and poor HRQOL were significant and became greater when comorbidity was included. Adjusted prevalence ratios were elevated for fair/poor health status (APR 7.3, 95% CI 6.5, 8.2), ≥ 14 unhealthy days (4.7; 95% CI 4.4, 5.1), and ≥ 14 activity limitation days during the last 30 days (9.6; 95% CI 8.1, 11.4) in the chronic PTSD group with physical and mental health comorbidity compared to those without PTSD and comorbidity; similar associations were observed for delayed PTSD. Ten years post-9/11 physical and mental health comorbidities have a substantial impact on the PTSD trajectories and HRQOL association. The need for early identification and treatment of PTSD and comorbidity should be emphasized to potentially improve HRQOL.

  17. Determining Methane Leak Locations and Rates with a Wireless Network Composed of Low-Cost, Printed Sensors

    Science.gov (United States)

    Smith, C. J.; Kim, B.; Zhang, Y.; Ng, T. N.; Beck, V.; Ganguli, A.; Saha, B.; Daniel, G.; Lee, J.; Whiting, G.; Meyyappan, M.; Schwartz, D. E.

    2015-12-01

    We will present our progress on the development of a wireless sensor network that will determine the source and rate of detected methane leaks. The targeted leak detection threshold is 2 g/min with a rate estimation error of 20% and localization error of 1 m within an outdoor area of 100 m2. The network itself is composed of low-cost, high-performance sensor nodes based on printed nanomaterials with expected sensitivity below 1 ppmv methane. High sensitivity to methane is achieved by modifying high surface-area-to-volume-ratio single-walled carbon nanotubes (SWNTs) with materials that adsorb methane molecules. Because the modified SWNTs are not perfectly selective to methane, the sensor nodes contain arrays of variously-modified SWNTs to build diversity of response towards gases with adsorption affinity. Methane selectivity is achieved through advanced pattern-matching algorithms of the array's ensemble response. The system is low power and designed to operate for a year on a single small battery. The SWNT sensing elements consume only microwatts. The largest power consumer is the wireless communication, which provides robust, real-time measurement data. Methane leak localization and rate estimation will be performed by machine-learning algorithms built with the aid of computational fluid dynamics simulations of gas plume formation. This sensor system can be broadly applied at gas wells, distribution systems, refineries, and other downstream facilities. It also can be utilized for industrial and residential safety applications, and adapted to other gases and gas combinations.

  18. Wireless microwave acoustic sensor system for condition monitoring in power plant environments

    Energy Technology Data Exchange (ETDEWEB)

    Pereira da Cunha, Mauricio [Univ. of Maine, Orno, ME (United States)

    2017-03-30

    This project successfully demonstrated novel wireless microwave acoustic temperature and pressure sensors that can be embedded into equipment and structures located in fossil fuel power plant environments to monitor the condition of components such as steam headers, re-heat lines, water walls, burner tubes, and power turbines. The wireless microwave acoustic sensor technology researched and developed through a collaborative partnership between the University of Maine and Environetix Technologies Corporation can provide a revolutionary impact in the power industry since it is anticipated that the wireless sensors will deliver reliable real-time sensing information in harsh power plant conditions that involve temperatures up to 1100oC and pressures up to 750 psi. The work involved the research and development of novel high temperature harsh environment thin film electrodes, piezoelectric smart microwave acoustic sensing elements, sensor encapsulation materials that were engineered to function over long times up to 1100oC, and a radio-frequency (RF) wireless interrogation electronics unit that are located both inside and outside the high temperature harsh environment. The UMaine / Environetix team have interacted with diverse power plant facilities, and identified as a testbed a local power generation facility, which burns municipal solid waste (MSW), the Penobscot Energy Recovery Company (PERC), Orrington, Maine. In this facility Environetix / UMaine successfully implemented and tested multiple wireless temperature sensor systems within the harsh-environment of the economizer chamber and at the boiler tubes, transferring the developed technology to the power plant environment to perform real-time sensor monitoring experiments under typical operating conditions, as initially targeted in the project. The wireless microwave acoustic sensor technology developed under this project for power plant applications offers several significant advantages including wireless

  19. Seals monitoring systems using wireless communications

    International Nuclear Information System (INIS)

    Hermand, Guillaume; Bertrand, Johan; Farhoud, Radwan; Suzuki, Kei; ETO, Jiro; Tanabe, Hiromi; Takamura, Hisashi; Suyama, Yasuhiro

    2012-01-01

    Document available in extended abstract form only. Wireless monitoring based on electromagnetic waves is a promising application for deep geological nuclear waste repositories. It should allow data transmission without installing wires across the various seals (disposal cell plugs, gallery plugs, shaft plugs). Developments of the wireless system (e.g. transmitter and receiver) are in progress in order to fit the repository requirements. A common research program has been elaborated by RWMC and Andra. The present work aims at developing the wireless monitoring technology to intermediate level waste (ILW) disposal facilities concept. In this concept, ILW packages will be emplaced in disposal cells with concrete liner. After the operational phase, the cells will be backfilled with sealing material. In practice, this work demonstrates the feasibility of adapting and optimizing the wireless transmission system for specific repository cases. After preliminary transmission studies, it was decided to make a representative test in situ of a wireless transmission through the clay from a sealed side to an accessible side of the repository. In order to reduce the attenuation of magnetic flux caused by steel components between the transmitter and the receiver, the receiving antenna is installed in a dedicated borehole (drilled from the accessible side). Two types of reception antennas have been designed. According to its coil orientation, type A antenna measures the electromagnetic wave perpendicular to the borehole axis. On the other hand, type B antenna with a coil set in-line with the tubular casing, measures the electromagnetic wave parallel to the borehole axis. The outside cylinder (pressure tight case) is made of PVC considering the attenuation of electromagnetic flux. According to the direction of electromagnetic flux and position of the boreholes in the final repository design, type A or type B will be chosen. For the 'representative' test, a borehole, TSF1002 has been

  20. Talk is cheap: Wireless communications changing the oilpatch

    Energy Technology Data Exchange (ETDEWEB)

    Stastny, P.

    2004-03-01

    The role of cellular phones and satellite phones in the oil and natural gas industry in Canada is discussed. Cellular phones are particularly well adapted to the remote environment in which much of the industry is situated. Satellite phones are less common but they are used to fill in the gaps where cellular networks are not available. In such situations the field worker is equipped with two phones, a cellular phone and a satellite phone, each with its own number, or he carries a Globalstar phone, which combines both under operating modes using the same telephone number. The most cost-effective communication in remote areas relies on a three-watt analog booster that connects to a cell phone; a digital three-watt booster is not far down the road as the ultimate means of communication in remote environments, particularly for handling data. The digital cellular network can reach a maximum threshold of 80,000 baud (versus only 9,600 baud for analog). The demand for wireless services for wireless e-mail and Web-assisted GPS position location applications, and the sheer number of people with cellular phones are the most significant drivers of the push towards digital networks. Digital picture cell phones are also likely to find applications in troubleshooting and other areas of the oilpatch. In some areas however, satellite phones may be the only option. The low earth orbit (LEO) Globalstar is a particularly good example of satellite phone systems; it offers significant advantages in terms of voice quality, with practically limitless geographic coverage. By contrast, GEO (Geostationary Earth Orbit) systems are better suited to handling high-speed data, television transmission and other wideband applications.

  1. Engagement in Trauma-Specific CBT for Youth Post-9/11

    Science.gov (United States)

    Rodriguez, James; Hoagwood, Kimberly Eaton; Gopalan, Geetha; Olin, Serene; McKay, Mary M.; Marcus, Sue M.; Radigan, Marleen; Chung, Michelle; Legerski, Joanna

    2013-01-01

    Treatment participation was examined among youth enrolled in an evaluation of cognitive behavioral therapy (CBT) for trauma following the 9/11 World Trade Center disaster. Staff at nine agencies serving a predominantly low-income, ethnically diverse population were trained to deliver CBT and structured engagement strategies. A total of 445 youth…

  2. Multichannel magnetic resonance sounding with wirelessly operated coils

    DEFF Research Database (Denmark)

    Bahner, Klaus Günter; Larsen, Jakob Juul; Auken, Esben

    improvements in noise reduction can be expected. We present and discuss a design study of an MRS receiver system using wireless reference channels. The design is based on using as many standard components as possible e.g. GPS disciplined oscillators for time synchronization and WiFi for communication between...

  3. Multichannel signal enhancement using a remote wireless microphone

    NARCIS (Netherlands)

    Bloemendal, Brian; Van De Laar, Jakob; Sommen, Piet

    2012-01-01

    A novel approach to multichannel signal enhancement is presented that exploits data from a remote wireless microphone (RWM). This RWM is placed near an interfering source and transmits only autocorrelation data of its observations to a host, i.e., not the entire signal. The host has access to the

  4. Security For Wireless Sensor Network

    OpenAIRE

    Saurabh Singh,; Dr. Harsh Kumar Verma

    2011-01-01

    Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodescommunicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks aredeployed in hostile environments. Environmental conditions along with resource-constraints give...

  5. Wireless power transfer inspired by the modern trends in electromagnetics

    Science.gov (United States)

    Song, Mingzhao; Belov, Pavel; Kapitanova, Polina

    2017-06-01

    Since the beginning of the 20th century, researchers have been looking for an effective way to transfer power without wired connections, but the wireless power transfer technology started to attract extensive interest from the industry side only in 2007 when the first smartphone was released and a consumer electronics revolution was triggered. Currently, the modern technology of wireless power transfer already has a rich research and development history as well as outstanding advances in commercialization. This review is focused on the description of distinctive implementations of this technology inspired by the modern trends in electrodynamics. We compare the performances of the power transfer systems based on three kinds of resonators, i.e., metallic coil resonators, dielectric resonators, and cavity mode resonators. We argue that metamaterials and meta-atoms are powerful tools to improve the functionalities and to obtain novel properties of the systems. We review different approaches to enhance the functionality of the wireless power transfer systems including control of the power transfer path and increase of the operation range and efficiency. Various applications of wireless power transfer are discussed and currently available standards are reviewed.

  6. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  7. On the Geometrical Characteristics of Three-Dimensional Wireless Ad Hoc Networks and Their Applications

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available In a wireless ad hoc network, messages are transmitted, received, and forwarded in a finite geometrical region and the transmission of messages is highly dependent on the locations of the nodes. Therefore the study of geometrical relationship between nodes in wireless ad hoc networks is of fundamental importance in the network architecture design and performance evaluation. However, most previous works concentrated on the networks deployed in the two-dimensional region or in the infinite three-dimensional space, while in many cases wireless ad hoc networks are deployed in the finite three-dimensional space. In this paper, we analyze the geometrical characteristics of the three-dimensional wireless ad hoc network in a finite space in the framework of random graph and deduce an expression to calculate the distance probability distribution between network nodes that are independently and uniformly distributed in a finite cuboid space. Based on the theoretical result, we present some meaningful results on the finite three-dimensional network performance, including the node degree and the max-flow capacity. Furthermore, we investigate some approximation properties of the distance probability distribution function derived in the paper.

  8. Survey of a fusion technology for wireless PEC with energy harvesting in nuclear industry

    International Nuclear Information System (INIS)

    Lee, Jae Cheol; Choi, Yoo Rark

    2008-01-01

    The wireless sensor network has a power-supply problem by constitution. Large amount of sensors are used in wireless networks and each sensor needs energy source for its operation. The life of a battery used in a sensor is finite. When a battery went out, we must exchange it with new one. But the number of sensors used in the wireless network is too numerous, so it is somewhat terrible job to exchange the exhausted batteries with new ones. Various researches have been executed to solve this problem. The mainstreams of them are energy efficiency and energy harvesting. The protocols such as flat-based routing, hierarchical-based routing, location-based routing and MAC protocol have been developed and applied to sensor networks for energy efficiency. But energy harvesting methods can be a ultimate solution. Energy harvesting is the process for capturing and storing of energies. A variety of different sources exist for harvesting energy, such as solar power, thermal energy, wind energy, salinity gradients and kinetic energy. We described an energy harvesting technology and a wireless pulsed eddy currents(PEC) inspection based on it

  9. Power-Efficient Beacon Recognition Method Based on Periodic Wake-Up for Industrial Wireless Devices.

    Science.gov (United States)

    Song, Soonyong; Lee, Donghun; Jang, Ingook; Choi, Jinchul; Son, Youngsung

    2018-04-17

    Energy harvester-integrated wireless devices are attractive for generating semi-permanent power from wasted energy in industrial environments. The energy-harvesting wireless devices may have difficulty in their communication with access points due to insufficient power supply for beacon recognition during network initialization. In this manuscript, we propose a novel method of beacon recognition based on wake-up control to reduce instantaneous power consumption in the initialization procedure. The proposed method applies a moving window for the periodic wake-up of the wireless devices. For unsynchronized wireless devices, beacons are always located in the same positions within each beacon interval even though the starting offsets are unknown. Using these characteristics, the moving window checks the existence of the beacon associated withspecified resources in a beacon interval, checks again for neighboring resources at the next beacon interval, and so on. This method can reduce instantaneous power and generates a surplus of charging time. Thus, the proposed method alleviates the problems of power insufficiency in the network initialization. The feasibility of the proposed method is evaluated using computer simulations of power shortage in various energy-harvesting conditions.

  10. Introductory survey for wireless infrared communications

    Directory of Open Access Journals (Sweden)

    Munsif Ali Jatoi

    2014-08-01

    Full Text Available Wireless infrared communications can be defined as the propagation of light waves in free space using infrared radiation whose range is 400–700 nm. This range corresponds to frequencies of hundreds of terahertz, which is high for higher data rate applications. Wireless infrared is applied for higher data rates applications such as wireless computing, wireless video and wireless multimedia communication applications. Introduced by Gfeller, this field has grown with different link configurations, improved transmitter efficiency, increased receiver responsivity and various multiple access techniques for improved quality. Errors are caused because of background light, which causes degradation overall system performance. Error correction techniques are used to remove the errors caused during transmission. This study provides a brief account on field theory used for error correction in wireless infrared systems. The results are produced in terms of bit error rate and signal-to-noise ratio for various bit lengths to show the ability of encoding and decoding algorithms.

  11. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  12. OIT Wireless Telemetry for Industrial Applications

    Energy Technology Data Exchange (ETDEWEB)

    Manges, WW

    2002-09-03

    The need for advanced wireless technology has been identified in the National Research Council publication (1) ''Manufacturing Process Controls for the Industries of the Future as a Critical Technology for the Future''. The deployment challenges to be overcome in order for wireless to be a viable option include: (1) eliminating interference (assuring reliable communications); (2) easing the deployment of intelligent, wireless sensors; (3) developing reliable networks (robust architectures); (4) developing remote power (long-lasting and reliable); and (5) developing standardized communication protocols. This project demonstrated the feasibility of robust wireless sensor networks that could meet these requirements for the harsh environments common to the DOE/OIT Industries of the Future. It resulted in a wireless test bed that was demonstrated in a paper mill and a steel plant. The test bed illustrated key protocols and components that would be required in a real-life, wireless network. The technologies for low power connectivity developed and demonstrated at the plant eased fears that the radios would interfere with existing control equipment. The same direct sequence, spread spectrum (DSSS) technology that helped assure the reliability of the connection also demonstrated that wireless communication was feasible in these plants without boosting the transmitted power to dangerous levels. Our experience and research have indicated that two key parameters are of ultimate importance: (1) reliability and (2) inter-system compatibility. Reliability is the key to immediate acceptance among industrial users. The importance cannot be overstated, because users will not tolerate an unreliable information network. A longer term issue that is at least as important as the reliability of a single system is the inter-system compatibility between these wireless sensor networks and other wireless systems that are part of our industries. In the long run, the

  13. Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues

    National Research Council Canada - National Science Library

    Morgan, Daniel; Krouse, William

    2005-01-01

    In its final report, the 9/11 Commission concluded that funding and completing a "biometric entry-exit screening system" for travelers to and from the United States is essential to U.S. national security...

  14. Portable emergency telemedicine system over wireless broadband and 3G networks.

    Science.gov (United States)

    Hong, SungHye; Kim, SangYong; Kim, JungChae; Lim, DongKyu; Jung, SeokMyung; Kim, DongKeun; Yoo, Sun K

    2009-01-01

    The telemedicine system aims at monitoring patients remotely without limit in time and space. However the existing telemedicine systems exchange medical information simply in a specified location. Due to increasing speed in processing data and expanding bandwidth of wireless networks, it is possible to perform telemedicine services on personal digital assistants (PDA). In this paper, a telemedicine system on PDA was developed using wideband mobile networks such as Wi-Fi, HSDPA, and WiBro for high speed bandwidths. This system enables to utilize and exchange variety and reliable patient information of video, biosignals, chatting messages, and triage data. By measuring bandwidths of individual data of the system over wireless networks, and evaluating the performance of this system using PDA, we demonstrated the feasibility of the designed portable emergency telemedicine system.

  15. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  16. Evolution of Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  17. Performance Measurement of Location Enabled e-Government Processes: A Use Case on Traffic Safety Monitoring

    Science.gov (United States)

    Vandenbroucke, D.; Vancauwenberghe, G.

    2016-12-01

    The European Union Location Framework (EULF), as part of the Interoperable Solutions for European Public Administrations (ISA) Programme of the EU (EC DG DIGIT), aims to enhance the interactions between governments, businesses and citizens by embedding location information into e-Government processes. The challenge remains to find scientific sound and at the same time practicable approaches to estimate or measure the impact of location enablement of e-Government processes on the performance of the processes. A method has been defined to estimate process performance in terms of variables describing the efficiency, effectiveness, as well as the quality of the output of the work processes. A series of use cases have been identified, corresponding to existing e-Government work processes in which location information could bring added value. In a first step, the processes are described by means of BPMN (Business Process Model and Notation) to better understand the process steps, the actors involved, the spatial data flows, as well as the required input and the generated output. In a second step the processes are assessed in terms of the (sub-optimal) use of location information and the potential enhancement of the process by better integrating location information and services. The process performance is measured ex ante (before using location enabled e-Government services) and ex-post (after the integration of such services) in order to estimate and measure the impact of location information. The paper describes the method for performance measurement and highlights how the method is applied to one use case, i.e. the process of traffic safety monitoring. The use case is analysed and assessed in terms of location enablement and its potential impact on process performance. The results of applying the methodology on the use case revealed that performance is highly impacted by factors such as the way location information is collected, managed and shared throughout the

  18. Electromagnetic Interference Analysis of Cabinet for Wireless HART Communication

    International Nuclear Information System (INIS)

    Choo, Jaeyul; Jeong, Sang Yong; Kim, Hyung Tae; Yu, Yeong Jin; Park, Hyun Shin; Jeong, Choong Heui

    2015-01-01

    Among the protocols of the wireless communication, the wireless HART communication using the carrier frequency of 2.4 GHz has attracted a lot of interest due to the convenient monitoring and measurement of the variables of nuclear power plants. However the application of the wireless communication to nuclear power plants poses an ongoing challenge due to the unwanted electromagnetic interference (EMI) caused by wireless devices, which would cause the detrimental malfunctioning to adjacent equipment. Especially the EMI problem in the cabinet containing digital instrument and control (I and C) devices is crucial to safety functions and should thus be treated electromagnetically before the use of the wireless communication in nuclear power plants is approved. The mode-matching method has been widely used in electromagnetic analysis due to the reduced computing time by the fast convergence in series solutions. Inspired by this, we perform the electromagnetic scattering analyses of an open cabinet using the modematching method. The resulting information of the electric (E) and magnetic (H) fields enables us to estimate how much the digital I and C in the cabinet is influenced by the external electromagnetic source. The mode-matching method was applied to the scattering analysis of the open cabinet for the digital I and C in nuclear power plants. The mathematical expressions with the unknown modal coefficients for electromagnetic field distributions were formulated based on Helmholtz's equation in conjunction with both the separation of variables and the Fourier transforms. We then determined the modal coefficients from the boundary conditions for electric and magnetic field continuities

  19. Electromagnetic Interference Analysis of Cabinet for Wireless HART Communication

    Energy Technology Data Exchange (ETDEWEB)

    Choo, Jaeyul; Jeong, Sang Yong; Kim, Hyung Tae; Yu, Yeong Jin; Park, Hyun Shin; Jeong, Choong Heui [Korea Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-10-15

    Among the protocols of the wireless communication, the wireless HART communication using the carrier frequency of 2.4 GHz has attracted a lot of interest due to the convenient monitoring and measurement of the variables of nuclear power plants. However the application of the wireless communication to nuclear power plants poses an ongoing challenge due to the unwanted electromagnetic interference (EMI) caused by wireless devices, which would cause the detrimental malfunctioning to adjacent equipment. Especially the EMI problem in the cabinet containing digital instrument and control (I and C) devices is crucial to safety functions and should thus be treated electromagnetically before the use of the wireless communication in nuclear power plants is approved. The mode-matching method has been widely used in electromagnetic analysis due to the reduced computing time by the fast convergence in series solutions. Inspired by this, we perform the electromagnetic scattering analyses of an open cabinet using the modematching method. The resulting information of the electric (E) and magnetic (H) fields enables us to estimate how much the digital I and C in the cabinet is influenced by the external electromagnetic source. The mode-matching method was applied to the scattering analysis of the open cabinet for the digital I and C in nuclear power plants. The mathematical expressions with the unknown modal coefficients for electromagnetic field distributions were formulated based on Helmholtz's equation in conjunction with both the separation of variables and the Fourier transforms. We then determined the modal coefficients from the boundary conditions for electric and magnetic field continuities.

  20. Energy-efficient wireless mesh infrastructures

    OpenAIRE

    Al-Hazmi, Y.; de Meer, Hermann; Hummel, Karin Anna; Meyer, Harald; Meo, Michela; Remondo Bueno, David

    2011-01-01

    The Internet comprises access segments with wired and wireless technologies. In the future, we can expect wireless mesh infrastructures (WMIs) to proliferate in this context. Due to the relatively low energy efficiency of wireless transmission, as compared to wired transmission, energy consumption of WMIs can represent a significant part of the energy consumption of the Internet as a whole. We explore different approaches to reduce energy consumption in WMIs, taking into accoun...

  1. Research on the Application of Wireless Network in Collecting Road Traffic Information

    Institute of Scientific and Technical Information of China (English)

    DU Hui-jiang

    2015-01-01

    Due to the characteristics of variability and dispersion in traffic information, to get the reliable real-time traffic information has been a bottleneck in the development of intelligent transportation systems. However, with the development of wireless network technology and mobile Internet, the mobile phones are rapidly developed and more popular, so it is possible to get road traffic information by locating the mobile phones in vehicles. The system structure for the road traffic information collection is designed based on wireless network and mobile phones in vehicles, and the vehicle recognition and its information computation methods are given and discussed. Also the simulation is done for vehicle recognition and computation based on fuzzy cluster analysis method and the results are obtained and analyzed.

  2. Real-Time Alpine Measurement System Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sami A. Malek

    2017-11-01

    Full Text Available Monitoring the snow pack is crucial for many stakeholders, whether for hydro-power optimization, water management or flood control. Traditional forecasting relies on regression methods, which often results in snow melt runoff predictions of low accuracy in non-average years. Existing ground-based real-time measurement systems do not cover enough physiographic variability and are mostly installed at low elevations. We present the hardware and software design of a state-of-the-art distributed Wireless Sensor Network (WSN-based autonomous measurement system with real-time remote data transmission that gathers data of snow depth, air temperature, air relative humidity, soil moisture, soil temperature, and solar radiation in physiographically representative locations. Elevation, aspect, slope and vegetation are used to select network locations, and distribute sensors throughout a given network location, since they govern snow pack variability at various scales. Three WSNs were installed in the Sierra Nevada of Northern California throughout the North Fork of the Feather River, upstream of the Oroville dam and multiple powerhouses along the river. The WSNs gathered hydrologic variables and network health statistics throughout the 2017 water year, one of northern Sierra’s wettest years on record. These networks leverage an ultra-low-power wireless technology to interconnect their components and offer recovery features, resilience to data loss due to weather and wildlife disturbances and real-time topological visualizations of the network health. Data show considerable spatial variability of snow depth, even within a 1 km 2 network location. Combined with existing systems, these WSNs can better detect precipitation timing and phase in, monitor sub-daily dynamics of infiltration and surface runoff during precipitation or snow melt, and inform hydro power managers about actual ablation and end-of-season date across the landscape.

  3. Real-Time Alpine Measurement System Using Wireless Sensor Networks.

    Science.gov (United States)

    Malek, Sami A; Avanzi, Francesco; Brun-Laguna, Keoma; Maurer, Tessa; Oroza, Carlos A; Hartsough, Peter C; Watteyne, Thomas; Glaser, Steven D

    2017-11-09

    Monitoring the snow pack is crucial for many stakeholders, whether for hydro-power optimization, water management or flood control. Traditional forecasting relies on regression methods, which often results in snow melt runoff predictions of low accuracy in non-average years. Existing ground-based real-time measurement systems do not cover enough physiographic variability and are mostly installed at low elevations. We present the hardware and software design of a state-of-the-art distributed Wireless Sensor Network (WSN)-based autonomous measurement system with real-time remote data transmission that gathers data of snow depth, air temperature, air relative humidity, soil moisture, soil temperature, and solar radiation in physiographically representative locations. Elevation, aspect, slope and vegetation are used to select network locations, and distribute sensors throughout a given network location, since they govern snow pack variability at various scales. Three WSNs were installed in the Sierra Nevada of Northern California throughout the North Fork of the Feather River, upstream of the Oroville dam and multiple powerhouses along the river. The WSNs gathered hydrologic variables and network health statistics throughout the 2017 water year, one of northern Sierra's wettest years on record. These networks leverage an ultra-low-power wireless technology to interconnect their components and offer recovery features, resilience to data loss due to weather and wildlife disturbances and real-time topological visualizations of the network health. Data show considerable spatial variability of snow depth, even within a 1 km 2 network location. Combined with existing systems, these WSNs can better detect precipitation timing and phase in, monitor sub-daily dynamics of infiltration and surface runoff during precipitation or snow melt, and inform hydro power managers about actual ablation and end-of-season date across the landscape.

  4. Performance Analysis of IIUM Wireless Campus Network

    International Nuclear Information System (INIS)

    Latif, Suhaimi Abd; Masud, Mosharrof H; Anwar, Farhat

    2013-01-01

    International Islamic University Malaysia (IIUM) is one of the leading universities in the world in terms of quality of education that has been achieved due to providing numerous facilities including wireless services to every enrolled student. The quality of this wireless service is controlled and monitored by Information Technology Division (ITD), an ISO standardized organization under the university. This paper aims to investigate the constraints of wireless campus network of IIUM. It evaluates the performance of the IIUM wireless campus network in terms of delay, throughput and jitter. QualNet 5.2 simulator tool has employed to measure these performances of IIUM wireless campus network. The observation from the simulation result could be one of the influencing factors in improving wireless services for ITD and further improvement

  5. Integration of RFID and Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  6. Assessing the benefits of the integration of location information in e-Government

    Science.gov (United States)

    Vandenbroucke, D.; Vancauwenberghe, G.; Crompvoets, J.

    2014-12-01

    Over the past years more and more geospatial data have been made readily accessible for different user communities as part of government efforts to set-up Spatial Data Infrastructures. As a result users from different sectors can search, find and bind spatial information and combine it with their own data resources and applications. However, too often, spatial data applications and services remain organised as separate silos, not well integrated in the business processes they are supposed to support. The European Union Location Framework (EULF), as part of the Interoperability Solutions for European Public Administrations (ISA) Programme of the EU (EC-DG DIGIT), aims to improve the integration of location information in e-Government processes through a better policy and strategy alignment, and through the improved legal, organisational, semantic and technical interoperability of data and systems. The EULF seeks to enhance interactions between Governments, Businesses and Citizens with location information and location enabled services and to make them part of the more generic ICT infrastructures of public administrations. One of the challenges that arise in this context is to describe, estimate or measure the benefits and added value of this integration of location information in e-Government. In the context of the EULF several existing approaches to assess the benefits of spatially enabled services and applications in e-Government have been studied. Two examples will be presented, one from Denmark, the other from Abu Dhabi. Both served as input to the approach developed for the EULF. A concrete case to estimate benefits at service and process level will be given with the aim to respond questions such as "which indicators can be used and how to measure them", "how can process owners collect the necessary information", "how to solve the benefits attribute question" and "how to extrapolate findings from one level of analysis to another"?

  7. Developing a New Wireless Sensor Network Platform and Its Application in Precision Agriculture

    Science.gov (United States)

    Aquino-Santos, Raúl; González-Potes, Apolinar; Edwards-Block, Arthur; Virgen-Ortiz, Raúl Alejandro

    2011-01-01

    Wireless sensor networks are gaining greater attention from the research community and industrial professionals because these small pieces of “smart dust” offer great advantages due to their small size, low power consumption, easy integration and support for “green” applications. Green applications are considered a hot topic in intelligent environments, ubiquitous and pervasive computing. This work evaluates a new wireless sensor network platform and its application in precision agriculture, including its embedded operating system and its routing algorithm. To validate the technological platform and the embedded operating system, two different routing strategies were compared: hierarchical and flat. Both of these routing algorithms were tested in a small-scale network applied to a watermelon field. However, we strongly believe that this technological platform can be also applied to precision agriculture because it incorporates a modified version of LORA-CBF, a wireless location-based routing algorithm that uses cluster-based flooding. Cluster-based flooding addresses the scalability concerns of wireless sensor networks, while the modified LORA-CBF routing algorithm includes a metric to monitor residual battery energy. Furthermore, results show that the modified version of LORA-CBF functions well with both the flat and hierarchical algorithms, although it functions better with the flat algorithm in a small-scale agricultural network. PMID:22346622

  8. Developing a new wireless sensor network platform and its application in precision agriculture.

    Science.gov (United States)

    Aquino-Santos, Raúl; González-Potes, Apolinar; Edwards-Block, Arthur; Virgen-Ortiz, Raúl Alejandro

    2011-01-01

    Wireless sensor networks are gaining greater attention from the research community and industrial professionals because these small pieces of "smart dust" offer great advantages due to their small size, low power consumption, easy integration and support for "green" applications. Green applications are considered a hot topic in intelligent environments, ubiquitous and pervasive computing. This work evaluates a new wireless sensor network platform and its application in precision agriculture, including its embedded operating system and its routing algorithm. To validate the technological platform and the embedded operating system, two different routing strategies were compared: hierarchical and flat. Both of these routing algorithms were tested in a small-scale network applied to a watermelon field. However, we strongly believe that this technological platform can be also applied to precision agriculture because it incorporates a modified version of LORA-CBF, a wireless location-based routing algorithm that uses cluster-based flooding. Cluster-based flooding addresses the scalability concerns of wireless sensor networks, while the modified LORA-CBF routing algorithm includes a metric to monitor residual battery energy. Furthermore, results show that the modified version of LORA-CBF functions well with both the flat and hierarchical algorithms, although it functions better with the flat algorithm in a small-scale agricultural network.

  9. Using Wireless Network Coding to Replace a Wired with Wireless Backhaul

    DEFF Research Database (Denmark)

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    of wireless emulated wire (WEW), based on two-way relaying and network coding. This setup leads to a new type of broadcast problem, with decoding conditions that are specific to the requirement for equivalence to the wired backhaul. We formulate and solve the associated optimization problems. The proposed...... approach is a convincing argument that wireless backhauling solutions should be designed and optimized for two-way communication....

  10. Interference Effects Redress over Power-Efficient Wireless-Friendly Mesh Networks for Ubiquitous Sensor Communications across Smart Cities.

    Science.gov (United States)

    Santana, Jose; Marrero, Domingo; Macías, Elsa; Mena, Vicente; Suárez, Álvaro

    2017-07-21

    Ubiquitous sensing allows smart cities to take control of many parameters (e.g., road traffic, air or noise pollution levels, etc.). An inexpensive Wireless Mesh Network can be used as an efficient way to transport sensed data. When that mesh is autonomously powered (e.g., solar powered), it constitutes an ideal portable network system which can be deployed when needed. Nevertheless, its power consumption must be restrained to extend its operational cycle and for preserving the environment. To this end, our strategy fosters wireless interface deactivation among nodes which do not participate in any route. As we show, this contributes to a significant power saving for the mesh. Furthermore, our strategy is wireless-friendly, meaning that it gives priority to deactivation of nodes receiving (and also causing) interferences from (to) the rest of the smart city. We also show that a routing protocol can adapt to this strategy in which certain nodes deactivate their own wireless interfaces.

  11. Impact of Locality on Location Aware Unit Disk Graphs

    Directory of Open Access Journals (Sweden)

    Evangelos Kranakis

    2008-09-01

    Full Text Available Due to their importance for studies oi wireless networks, recent years have seen a surge of activity on the design of local algorithms for the solution of a variety of network tasks. We study the behaviour of algorithms with very low localities. Despite of this restriction we propose local constant ratio approximation algorithms for solving minimum dominating and connected dominating set, maximum independent set and minimum vertex cover in location aware Unit Disk Graphs. We also prove the first ever lower bounds for local algorithms for these problems with a given locality in the location aware setting.

  12. Cyber Insurance for Heterogeneous Wireless Networks

    OpenAIRE

    Lu, Xiao; Niyato, Dusit; Jiang, Hai; Wang, Ping; Poor, H. Vincent

    2017-01-01

    Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume. Nowadays, users rely heavily on HWNs for ubiquitous network access that contains valuable and critical information such as financial transactions, e-health, and public safety. Cyber risks, representing one of the most significant threats to network security an...

  13. Indoor Positioning System Using Depth Maps and Wireless Networks

    Directory of Open Access Journals (Sweden)

    Jaime Duque Domingo

    2016-01-01

    Full Text Available This work presents a new Indoor Positioning System (IPS based on the combination of WiFi Positioning System (WPS and depth maps, for estimating the location of people. The combination of both technologies improves the efficiency of existing methods, based uniquely on wireless positioning techniques. While other positioning systems force users to wear special devices, the system proposed in this paper just requires the use of smartphones, besides the installation of RGB-D sensors in the sensing area. Furthermore, the system is not intrusive, being not necessary to know people’s identity. The paper exposes the method developed for putting together and exploiting both types of sensory information with positioning purposes: the measurements of the level of the signal received from different access points (APs of the wireless network and the depth maps provided by the RGB-D cameras. The obtained results show a significant improvement in terms of positioning with respect to common WiFi-based systems.

  14. Low-Power Wireless Sensor Networks Protocols, Services and Applications

    CERN Document Server

    Suhonen, Jukka; Kaseva, Ville; Hämäläinen, Timo D; Hännikäinen, Marko

    2012-01-01

    Wireless sensor network (WSN) is an ad-hoc network technology comprising even thousands of autonomic and self-organizing nodes that combine environmental sensing, data processing, and wireless networking. The applications for sensor networks range from home and industrial environments to military uses. Unlike the traditional computer networks, a WSN is application-oriented and deployed for a specific task. WSNs are data centric, which means that messages are not send to individual nodes but to geographical locations or regions based on the data content. A WSN node is typically battery powered and characterized by extremely small size and low cost. As a result, the processing power, memory, and energy resources of an individual sensor node are limited. However, the feasibility of a WSN lies on the collaboration between the nodes. A reference WSN node comprises a Micro-Controller Unit (MCU) having few Million Instructions Per Second (MIPS) processing speed, tens of kilobytes program memory, few kilobytes data m...

  15. Interactive computation of coverage regions for indoor wireless communication

    Science.gov (United States)

    Abbott, A. Lynn; Bhat, Nitin; Rappaport, Theodore S.

    1995-12-01

    This paper describes a system which assists in the strategic placement of rf base stations within buildings. Known as the site modeling tool (SMT), this system allows the user to display graphical floor plans and to select base station transceiver parameters, including location and orientation, interactively. The system then computes and highlights estimated coverage regions for each transceiver, enabling the user to assess the total coverage within the building. For single-floor operation, the user can choose between distance-dependent and partition- dependent path-loss models. Similar path-loss models are also available for the case of multiple floors. This paper describes the method used by the system to estimate coverage for both directional and omnidirectional antennas. The site modeling tool is intended to be simple to use by individuals who are not experts at wireless communication system design, and is expected to be very useful in the specification of indoor wireless systems.

  16. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  17. Issues in implementing services for a wireless web-enabled digital camera

    Science.gov (United States)

    Venkataraman, Shyam; Sampat, Nitin; Fisher, Yoram; Canosa, John; Noel, Nicholas

    2001-05-01

    The competition in the exploding digital photography market has caused vendors to explore new ways to increase their return on investment. A common view among industry analysts is that increasingly it will be services provided by these cameras, and not the cameras themselves, that will provide the revenue stream. These services will be coupled to e- Appliance based Communities. In addition, the rapidly increasing need to upload images to the Internet for photo- finishing services as well as the need to download software upgrades to the camera is driving many camera OEMs to evaluate the benefits of using the wireless web to extend their enterprise systems. Currently, creating a viable e- appliance such as a digital camera coupled with a wireless web service requires more than just a competency in product development. This paper will evaluate the system implications in the deployment of recurring revenue services and enterprise connectivity of a wireless, web-enabled digital camera. These include, among other things, an architectural design approach for services such as device management, synchronization, billing, connectivity, security, etc. Such an evaluation will assist, we hope, anyone designing or connecting a digital camera to the enterprise systems.

  18. Automated Vehicle Location (AVL) for Road Condition Reporting

    OpenAIRE

    McCullouch, Bob G.; Leung, Michelle; Kang, Wonjin

    2009-01-01

    This project developed an AVL system for INDOT that utilized the statewide wireless network, SAFE-T. This option was chosen after doing a cost analysis of commercial AVL systems that use cellular data communications. The system developed provides real time information collected during snow and ice removal. Information includes weather and road conditions, truck speed, amount of chemicals spread, time, location, plow position, and road temperature. This information is displayed on INDOT GIS ma...

  19. Low-Power Wireless Sensor Network Infrastructures

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols...... peripherals need to by duty-cycled and the low-power wireless radios are severely influenced by the environmental effects causing bursty and unreliable wireless channels. This dissertation presents a communication stack providing services for low-power communication, secure communication, data collection......, and network management which enables construction of low-power wireless sensor network applications. More specifically, these services are designed with the extreme low-power scenarios of the SensoByg project in mind and are implemented as follows. First, low-power communication is implemented with Auto...

  20. Capacity Analysis of Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    M. I. Gumel

    2012-06-01

    Full Text Available The next generation wireless networks experienced a great development with emergence of wireless mesh networks (WMNs, which can be regarded as a realistic solution that provides wireless broadband access. The limited available bandwidth makes capacity analysis of the network very essential. While the network offers broadband wireless access to community and enterprise users, the problems that limit the network capacity must be addressed to exploit the optimum network performance. The wireless mesh network capacity analysis shows that the throughput of each mesh node degrades in order of l/n with increasing number of nodes (n in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network.

  1. Evaluation of Deployment Challenges of Wireless Sensor Networks at Signalized Intersections

    Directory of Open Access Journals (Sweden)

    Leyre Azpilicueta

    2016-07-01

    Full Text Available With the growing demand of Intelligent Transportation Systems (ITS for safer and more efficient transportation, research on and development of such vehicular communication systems have increased considerably in the last years. The use of wireless networks in vehicular environments has grown exponentially. However, it is highly important to analyze radio propagation prior to the deployment of a wireless sensor network in such complex scenarios. In this work, the radio wave characterization for ISM 2.4 GHz and 5 GHz Wireless Sensor Networks (WSNs deployed taking advantage of the existence of traffic light infrastructure has been assessed. By means of an in-house developed 3D ray launching algorithm, the impact of topology as well as urban morphology of the environment has been analyzed, emulating the realistic operation in the framework of the scenario. The complexity of the scenario, which is an intersection city area with traffic lights, vehicles, people, buildings, vegetation and urban environment, makes necessary the channel characterization with accurate models before the deployment of wireless networks. A measurement campaign has been conducted emulating the interaction of the system, in the vicinity of pedestrians as well as nearby vehicles. A real time interactive application has been developed and tested in order to visualize and monitor traffic as well as pedestrian user location and behavior. Results show that the use of deterministic tools in WSN deployment can aid in providing optimal layouts in terms of coverage, capacity and energy efficiency of the network.

  2. An RSS based location estimation technique for cognitive relay networks

    KAUST Repository

    Qaraqe, Khalid A.

    2010-11-01

    In this paper, a received signal strength (RSS) based location estimation method is proposed for a cooperative wireless relay network where the relay is a cognitive radio. We propose a method for the considered cognitive relay network to determine the location of the source using the direct and the relayed signal at the destination. We derive the Cramer-Rao lower bound (CRLB) expressions separately for x and y coordinates of the location estimate. We analyze the effects of cognitive behaviour of the relay on the performance of the proposed method. We also discuss and quantify the reliability of the location estimate using the proposed technique if the source is not stationary. The overall performance of the proposed method is presented through simulations. ©2010 IEEE.

  3. P2P Data Management in Mobile Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Nida Sahar Sayeda

    2013-04-01

    Full Text Available The rapid growth in wireless technologies has made wireless communication an important source for transporting data across different domains. In the same way, there are possibilities of many potential applications that can be deployed using WSNs (Wireless Sensor Networks. However, very limited applications are deployed in real life due to the uncertainty and dynamics of the environment and scare resources. This makes data management in WSN a challenging area to find an approach that suits its characteristics. Currently, the trend is to find efficient data management schemes using evolving technologies, i.e. P2P (Peer-to-Peer systems. Many P2P approaches have been applied in WSNs to carry out the data management due to similarities between WSN and P2P. With the similarities, there are differences too that makes P2P protocols inefficient in WSNs. Furthermore, to increase the efficiency and to exploit the delay tolerant nature of WSNs, where ever possible, the mobile WSNs are gaining importance. Thus, creating a three dimensional problem space to consider, i.e. mobility, WSNs and P2P. In this paper, an efficient algorithm is proposed for data management using P2P techniques for mobile WSNs. The real world implementation and deployment of proposed algorithm is also presented

  4. A Survey of Wireless Communications for the Electric Power System

    Energy Technology Data Exchange (ETDEWEB)

    Akyol, Bora A.; Kirkham, Harold; Clements, Samuel L.; Hadley, Mark D.

    2010-01-27

    A key mission of the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability (OE) is to enhance the security and reliability of the nation’s energy infrastructure. Improving the security of control systems, which enable the automated control of our energy production and distribution, is critical for protecting the energy infrastructure and the integral function that it serves in our lives. The DOE-OE Control Systems Security Program provides research and development to help the energy industry actively pursue advanced security solutions for control systems. The focus of this report is analyzing how, where, and what type of wireless communications are suitable for deployment in the electric power system and to inform implementers of their options in wireless technologies. The discussions in this report are applicable to enhancing both the communications infrastructure of the current electric power system and new smart system deployments. The work described in this report includes a survey of the following wireless technologies: • IEEE 802.16 d and e (WiMAX) • IEEE 802.11 (Wi-Fi) family of a, b, g, n, and s • Wireless sensor protocols that use parts of the IEEE 802.15.4 specification: WirelessHART, International Society of Automation (ISA) 100.11a, and Zigbee • The 2, 3, and 4 generation (G )cellular technologies of GPRS/EDGE/1xRTT, HSPA/EVDO, and Long-Term Evolution (LTE)/HSPA+UMTS.

  5. Impact of a half-space interface on the wireless link between tiny sensor nodes

    NARCIS (Netherlands)

    Penkin, D.; Janssen, G.; Yarovoy, A.

    2014-01-01

    The power budget of a wireless link between two electrically small sensor nodes located close to an interface between two media is studied. The model includes both the propagation channel losses and input impedance of the radio frequency antennas. It is shown that a highly inductive half-space

  6. Cognitive Security of Wireless Communication Systems in the Physical Layer

    Directory of Open Access Journals (Sweden)

    Mustafa Harun Yılmaz

    2017-01-01

    Full Text Available While the wireless communication systems provide the means of connectivity nearly everywhere and all the time, communication security requires more attention. Even though current efforts provide solutions to specific problems under given circumstances, these methods are neither adaptive nor flexible enough to provide security under the dynamic conditions which make the security breaches an important concern. In this paper, a cognitive security (CS concept for wireless communication systems in the physical layer is proposed with the aim of providing a comprehensive solution to wireless security problems. The proposed method will enable the comprehensive security to ensure a robust and reliable communication in the existence of adversaries by providing adaptive security solutions in the communication systems by exploiting the physical layer security from different perspective. The adaptiveness relies on the fact that radio adapts its propagation characteristics to satisfy secure communication based on specific conditions which are given as user density, application specific adaptation, and location within CS concept. Thus, instead of providing any type of new security mechanism, it is proposed that radio can take the necessary precautions based on these conditions before the attacks occur. Various access scenarios are investigated to enable the CS while considering these conditions.

  7. A Mobility-aware Broadcasting Infrastructure for a Wireless Internet with Hotspots

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, Henk; Eertink, E.H.; Widya, I.A.; Huizer, E.; Kermani, P.

    In this paper, we consider the problem of adaptively delivering live multimedia broadcasts (e.g., for applications such as TV, radio, or e-cinema) to a potentially large number of mobile hosts that roam about in a wireless internet with hotspots. We take a user-oriented approach based on an

  8. Wireless networking for the dental office: current wireless standards and security protocols.

    Science.gov (United States)

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  9. Opportunistic Wireless Charging System Design for an On-Demand Shuttle Service

    Energy Technology Data Exchange (ETDEWEB)

    Meintz, Andrew; Doubleday, Kate; Markel, Tony

    2016-06-29

    System right-sizing is critical to the implementation of in-motion wireless power transfer (WPT) for electric vehicles. This study evaluates potential system designs for an on-demand employee shuttle by determining the required battery size based on the rated power at a variable number of charging locations. Vehicle power and state of charge are simulated over the drive cycle, based on position and velocity data at every second from the existing shuttle. Adding just one WPT location can halve the battery size. Many configurations are capable of self-sustaining with WPT, while others benefit from supplemental stationary charging.

  10. Wireless Power Transfer and Data Collection in Wireless Sensor Networks

    OpenAIRE

    Li, Kai; Ni, Wei; Duan, Lingjie; Abolhasan, Mehran; Niu, Jianwei

    2017-01-01

    In a rechargeable wireless sensor network, the data packets are generated by sensor nodes at a specific data rate, and transmitted to a base station. Moreover, the base station transfers power to the nodes by using Wireless Power Transfer (WPT) to extend their battery life. However, inadequately scheduling WPT and data collection causes some of the nodes to drain their battery and have their data buffer overflow, while the other nodes waste their harvested energy, which is more than they need...

  11. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  12. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  13. Wireless Power Supply via Coupled Magnetic Resonance for on-line Monitoring Wireless Sensor of High-voltage Electrical Equipment

    DEFF Research Database (Denmark)

    Xingkui, Mao; Qisheng, Huang; Yudi, Xiao

    2016-01-01

    On-line monitoring of high-voltage electrical equipment (HV-EE) aiming to detect faults effectively has become crucial to avoid serious accidents. Moreover, highly reliable power supplies are the key component for the wireless sensors equipped in such on-line monitoring systems. Therefore......, in this paper, the wireless power supply via coupled magnetic resonance (MR-WPS) is proposed for powering the wireless sensor and the associated wireless sensor solution is also proposed. The key specifications of the MR-WPS working in switchgear cabinet with a harsh operation environment are analyzed...... power is able to be delivered to the wireless sensor through the designed MR-WPS, and therefore the theoretical analysis and design is verified....

  14. 15 CFR 911.5 - NOAA Data Collection Systems Use Agreements.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false NOAA Data Collection Systems Use... POLICIES AND PROCEDURES CONCERNING USE OF THE NOAA SPACE-BASED DATA COLLECTION SYSTEMS § 911.5 NOAA Data Collection Systems Use Agreements. (a)(1) In order to use a NOAA DCS, each user must have an agreement with...

  15. Structural processing for wireless communications

    CERN Document Server

    Lu, Jianhua; Ge, Ning

    2015-01-01

    This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.

  16. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  17. Wireless sensor networks in chemical industry

    International Nuclear Information System (INIS)

    Minhas, A.A.; Jawad, S.

    2010-01-01

    Recent advances in wireless technology are a clear indication of the commercial promise of wireless networks. Industrial wireless sensing has now become more economical, efficient and secure as compared to traditional wired sensing. Wireless Sensor Networks (WSN) are successfully being used for process monitoring and control of many industrial plants. This paper explores how Chemical Industry in particular can benefit from the application of WSN technology. Various examples of successful implementation are cited. In order to address the industrial requirements, we propose a low power and low cost solution for process monitoring by implementing WSN. (author)

  18. Entropy Rate of Time-Varying Wireless Networks

    DEFF Research Database (Denmark)

    Cika, Arta; Badiu, Mihai Alin; Coon, Justin P.

    2018-01-01

    In this paper, we present a detailed framework to analyze the evolution of the random topology of a time-varying wireless network via the information theoretic notion of entropy rate. We consider a propagation channel varying over time with random node positions in a closed space and Rayleigh...... fading affecting the connections between nodes. The existence of an edge between two nodes at given locations is modeled by a Markov chain, enabling memory effects in network dynamics. We then derive a lower and an upper bound on the entropy rate of the spatiotemporal network. The entropy rate measures...

  19. Warming Up to Wireless

    Science.gov (United States)

    Milner, Jacob

    2005-01-01

    In districts big and small across the U.S., students, teachers, and administrators alike have come to appreciate the benefits of wireless technology. Because the technology delivers Internet signals on airborne radio frequencies, wireless networking allows users of all portable devices to move freely on a school's campus and stay connected to the…

  20. A Remote WIRELESS Facility

    Directory of Open Access Journals (Sweden)

    Kees Uiterwijk

    2007-10-01

    Full Text Available Continuing need for available distance learning facilities has led to the development of a remote lab facility focusing on wireless technology. In the field of engineering there is a student need of gaining experience in set-up, monitoring and maintenance of 802.11A/B/G based wireless LAN environments.