WorldWideScience

Sample records for wireless home mesh

  1. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  2. How to model wireless mesh networks topology

    International Nuclear Information System (INIS)

    Sanni, M L; Hashim, A A; Anwar, F; Ali, S; Ahmed, G S M

    2013-01-01

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  3. Scalable Video Streaming in Wireless Mesh Networks for Education

    Science.gov (United States)

    Liu, Yan; Wang, Xinheng; Zhao, Liqiang

    2011-01-01

    In this paper, a video streaming system for education based on a wireless mesh network is proposed. A wireless mesh network is a self-organizing, self-managing and reliable intelligent network, which allows educators to deploy a network quickly. Video streaming plays an important role in this system for multimedia data transmission. This new…

  4. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because....... This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  5. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless......Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because...

  6. Expected Transmission Energy Route Metric for Wireless Mesh Senor Networks

    Directory of Open Access Journals (Sweden)

    YanLiang Jin

    2011-01-01

    Full Text Available Mesh is a network topology that achieves high throughput and stable intercommunication. With great potential, it is expected to be the key architecture of future networks. Wireless sensor networks are an active research area with numerous workshops and conferences arranged each year. The overall performance of a WSN highly depends on the energy consumption of the network. This paper designs a new routing metric for wireless mesh sensor networks. Results from simulation experiments reveal that the new metric algorithm improves the energy balance of the whole network and extends the lifetime of wireless mesh sensor networks (WMSNs.

  7. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  8. Smart-Home Architecture Based on Bluetooth mesh Technology

    Science.gov (United States)

    Wan, Qing; Liu, Jianghua

    2018-03-01

    This paper describes the smart home network system based on Nordic nrf52832 device. Nrf52832 is new generation RF SOC device focus on sensor monitor and low power Bluetooth connection applications. In this smart home system, we set up a self-organizing network system which consists of one control node and a lot of monitor nodes. The control node manages the whole network works; the monitor nodes collect the sensor information such as light intensity, temperature, humidity, PM2.5, etc. Then update to the control node by Bluetooth mesh network. The design results show that the Bluetooth mesh wireless network system is flexible and construction cost is low, which is suitable for the communication characteristics of a smart home network. We believe it will be wildly used in the future.

  9. Performance of the hybrid wireless mesh protocol for wireless mesh networks

    DEFF Research Database (Denmark)

    Boye, Magnus; Staalhagen, Lars

    2010-01-01

    . These challenges must first be overcome before satisfactory network stability and throughput can be achieved. This paper studies the performance of the Hybrid Wireless Mesh Protocol, the proposed routing protocol for the upcoming IEEE 802.11s standard. HWMP supports two modes of path selection: reactive...... and proactive. Two scenarios of different node density are considered for both path selection modes. The results presented in this paper are based on a simulation model of the HWMP specification in the IEEE 802.11s draft 4.0 implemented in OPNET Modeler....

  10. Fair packet scheduling in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2014-02-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs. TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed with the transmission only if it receives a sufficient number of grant control messages from these neighbors. A grant message indicates that the associated data packet has the lowest timestamp of all the packets pending transmission at the local transmit queue. We demonstrate that a loose ordering of timestamps among neighboring nodes is sufficient for enforcing local fairness, subsequently leading to flow rate fairness in a multi-hop WMN. We show that TMAC can be implemented using the control frames in IEEE 802.11, and thus can be easily integrated in existing 802.11-based WMNs. Our simulation results show that TMAC achieves excellent resource allocation fairness while maintaining over 90% of maximum link capacity across a large number of topologies.

  11. Capacity analysis of wireless mesh networks | Gumel | Nigerian ...

    African Journals Online (AJOL)

    ... number of nodes (n) in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network. Key words: Wireless mesh network (WMN), Adhoc network, Network capacity analysis, Bottleneck collision domain, Medium access control ...

  12. Sending policies in dynamic wireless mesh using network coding

    DEFF Research Database (Denmark)

    Pandi, Sreekrishna; Fitzek, Frank; Pihl, Jeppe

    2015-01-01

    This paper demonstrates the quick prototyping capabilities of the Python-Kodo library for network coding based performance evaluation and investigates the problem of data redundancy in a network coded wireless mesh with opportunistic overhearing. By means of several wireless meshed architectures...... of appropriate relays. Finally, various sending policies that can be employed by the nodes in order to improve the overall transmission efficiency in a dynamic wireless mesh network are discussed and their performance is analysed on the constructed simulation setup....... simulated on the constructed test-bed, the advantage of network coding over state of the art routing schemes and the challenges of this new technology are shown. By providing maximum control of the network coding parameters and the simulation environment to the user, the test-bed facilitates quick...

  13. Design and implementation of a topology control scheme for wireless mesh networks

    CSIR Research Space (South Africa)

    Mudali, P

    2009-09-01

    Full Text Available The Wireless Mesh Network (WMN) backbone is usually comprised of stationary nodes but the transient nature of wireless links results in changing network topologies. Topology Control (TC) aims to preserve network connectivity in ad hoc and mesh...

  14. Towards Blockchain-enabled Wireless Mesh Networks

    OpenAIRE

    Selimi, Mennan; Kabbinale, Aniruddh Rao; Ali, Anwaar; Navarro, Leandro; Sathiaseelan, Arjuna

    2018-01-01

    Recently, mesh networking and blockchain are two of the hottest technologies in the telecommunications industry. Combining both can reformulate internet access and make connecting to the Internet not only easy, but affordable too. Hyperledger Fabric (HLF) is a blockchain framework implementation and one of the Hyperledger projects hosted by The Linux Foundation. We evaluate HLF in a real production mesh network and in the laboratory, quantify its performance, bottlenecks and limitations of th...

  15. Challenges in Second-Generation Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Pescapé Antonio

    2008-01-01

    Full Text Available Wireless mesh networks have the potential to provide ubiquitous high-speed Internet access at low costs. The good news is that initial deployments of WiFi meshes show the feasibility of providing ubiquitous Internet connectivity. However, their performance is far below the necessary and achievable limit. Moreover, users' subscription in the existing meshes is dismal even though the technical challenges to get connectivity are low. This paper provides an overview of the current status of mesh networks' deployment, and highlights the technical, economical, and social challenges that need to be addressed in the next years. As a proof-of-principle study, we discuss the above-mentioned challenges with reference to three real networks: (i MagNets, an operator-driven planned two-tier mesh network; (ii Berlin Freifunk network as a pure community-driven single-tier network; (iii Weimar Freifunk network, also a community-driven but two-tier network.

  16. Challenges in Second-Generation Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Thomas Huehn

    2008-10-01

    Full Text Available Wireless mesh networks have the potential to provide ubiquitous high-speed Internet access at low costs. The good news is that initial deployments of WiFi meshes show the feasibility of providing ubiquitous Internet connectivity. However, their performance is far below the necessary and achievable limit. Moreover, users' subscription in the existing meshes is dismal even though the technical challenges to get connectivity are low. This paper provides an overview of the current status of mesh networks' deployment, and highlights the technical, economical, and social challenges that need to be addressed in the next years. As a proof-of-principle study, we discuss the above-mentioned challenges with reference to three real networks: (i MagNets, an operator-driven planned two-tier mesh network; (ii Berlin Freifunk network as a pure community-driven single-tier network; (iii Weimar Freifunk network, also a community-driven but two-tier network.

  17. Energy efficient topology for Wireless Mesh Networks | Negash ...

    African Journals Online (AJOL)

    We analyze the power control problem using coalition formation game theory employing utilities based on the coverage areas of the access points by associating a cost function with the utility as the payoff of the coalition members. Our work focuses on the access layer of a wireless mesh local area network. We show that by ...

  18. Worlds largest particle physics laboratory selects Proxim Wireless Mesh

    CERN Multimedia

    2007-01-01

    "Proxim Wireless has announced that the European Organization for Nuclear Research (CERN), the world's largest particle physics laboratory and the birthplace of the World Wide Web, is using it's ORiNOCO AP-4000 mesh access points to extend the range of the laboratory's Wi-Fi network and to provide continuous monitoring of the lab's calorimeters" (1/2 page)

  19. Resource optimization scheme for multimedia-enabled wireless mesh networks.

    Science.gov (United States)

    Ali, Amjad; Ahmed, Muhammad Ejaz; Piran, Md Jalil; Suh, Doug Young

    2014-08-08

    Wireless mesh networking is a promising technology that can support numerous multimedia applications. Multimedia applications have stringent quality of service (QoS) requirements, i.e., bandwidth, delay, jitter, and packet loss ratio. Enabling such QoS-demanding applications over wireless mesh networks (WMNs) require QoS provisioning routing protocols that lead to the network resource underutilization problem. Moreover, random topology deployment leads to have some unused network resources. Therefore, resource optimization is one of the most critical design issues in multi-hop, multi-radio WMNs enabled with multimedia applications. Resource optimization has been studied extensively in the literature for wireless Ad Hoc and sensor networks, but existing studies have not considered resource underutilization issues caused by QoS provisioning routing and random topology deployment. Finding a QoS-provisioned path in wireless mesh networks is an NP complete problem. In this paper, we propose a novel Integer Linear Programming (ILP) optimization model to reconstruct the optimal connected mesh backbone topology with a minimum number of links and relay nodes which satisfies the given end-to-end QoS demands for multimedia traffic and identification of extra resources, while maintaining redundancy. We further propose a polynomial time heuristic algorithm called Link and Node Removal Considering Residual Capacity and Traffic Demands (LNR-RCTD). Simulation studies prove that our heuristic algorithm provides near-optimal results and saves about 20% of resources from being wasted by QoS provisioning routing and random topology deployment.

  20. Home and School Technology: Wired versus Wireless.

    Science.gov (United States)

    Van Horn, Royal

    2001-01-01

    Presents results of informal research on smart homes and appliances, structured home wiring, whole-house audio/video distribution, hybrid cable, and wireless networks. Computer network wiring is tricky to install unless all-in-one jacketed cable is used. Wireless phones help installers avoid pre-wiring problems in homes and schools. (MLH)

  1. Wireless experiments on a Motorola mesh testbed.

    Energy Technology Data Exchange (ETDEWEB)

    Riblett, Loren E., Jr.; Wiseman, James M.; Witzke, Edward L.

    2010-06-01

    Motomesh is a Motorola product that performs mesh networking at both the client and access point levels and allows broadband mobile data connections with or between clients moving at vehicular speeds. Sandia National aboratories has extensive experience with this product and its predecessors in infrastructure-less mobile environments. This report documents experiments, which characterize certain aspects of how the Motomesh network performs when obile units are added to a fixed network infrastructure.

  2. 802.11s Wireless Mesh Network Visualization Application

    Science.gov (United States)

    Mauldin, James Alexander

    2014-01-01

    Results of past experimentation at NASA Johnson Space Center showed that the IEEE 802.11s standard has better performance than the widely implemented alternative protocol B.A.T.M.A.N (Better Approach to Mobile Ad hoc Networking). 802.11s is now formally incorporated into the Wi- Fi 802.11-2012 standard, which specifies a hybrid wireless mesh networking protocol (HWMP). In order to quickly analyze changes to the routing algorithm and to support optimizing the mesh network behavior for our intended application a visualization tool was developed by modifying and integrating open source tools.

  3. Secure Multicast Routing Algorithm for Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Rakesh Matam

    2016-01-01

    Full Text Available Multicast is an indispensable communication technique in wireless mesh network (WMN. Many applications in WMN including multicast TV, audio and video conferencing, and multiplayer social gaming use multicast transmission. On the other hand, security in multicast transmissions is crucial, without which the network services are significantly disrupted. Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. Moreover, existing secure routing protocols assume that adversarial nodes cannot share an out-of-band communication channel which rules out the possibility of wormhole attack. In this paper, we propose SEMRAW (SEcure Multicast Routing Algorithm for Wireless mesh network that is resistant against all known active threats including wormhole attack. SEMRAW employs digital signatures to prevent a malicious node from gaining illegitimate access to the message contents. Security of SEMRAW is evaluated using the simulation paradigm approach.

  4. Comparison of routing metrics for wireless mesh networks

    CSIR Research Space (South Africa)

    Nxumalo, SL

    2011-09-01

    Full Text Available Tel: +27359026706, Fax: +27359026569 and Meraka Institute Council for Scientific and Industrial Research email: {slnxumalo, profmatthewo, pmudali, sakhilemichael}@gmail.com; NNtlatlapa@csir.co.za id36983125 pdfMachine by Broadgun Software - a... 563- 581. [4]Nxumalo S.L, Ntlatlapa, N, Mudali, P, Adigun, M.O. 2009. Performance Evaluation of Routing Metrics for Wireless Mesh Networks. In Procedings of South African Telecommunication Networks and Applications...

  5. Context-Based Topology Control for Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Pragasen Mudali

    2016-01-01

    Full Text Available Topology Control has been shown to provide several benefits to wireless ad hoc and mesh networks. However these benefits have largely been demonstrated using simulation-based evaluations. In this paper, we demonstrate the negative impact that the PlainTC Topology Control prototype has on topology stability. This instability is found to be caused by the large number of transceiver power adjustments undertaken by the prototype. A context-based solution is offered to reduce the number of transceiver power adjustments undertaken without sacrificing the cumulative transceiver power savings and spatial reuse advantages gained from employing Topology Control in an infrastructure wireless mesh network. We propose the context-based PlainTC+ prototype and show that incorporating context information in the transceiver power adjustment process significantly reduces topology instability. In addition, improvements to network performance arising from the improved topology stability are also observed. Future plans to add real-time context-awareness to PlainTC+ will have the scheme being prototyped in a software-defined wireless mesh network test-bed being planned.

  6. Deflating link buffers in a wireless mesh network

    KAUST Repository

    Jamshaid, Kamran

    2014-05-01

    We analyze the problem of buffer sizing for backlogged TCP flows in 802.11-based wireless mesh networks. Our objective is to maintain high network utilization while providing low queueing delays. Unlike wired networks where a single link buffer feeds a bottleneck link, the radio spectral resource in a mesh network is shared among a set of contending mesh routers. We account for this by formulating the buffer size problem as sizing a collective buffer distributed over a set of interfering nodes. In this paper we propose mechanisms for sizing and distributing this collective buffer among the mesh nodes constituting the network bottleneck. Our mechanism factors in the network topology and wireless link rates, improving on pre-set buffer allocations that cannot optimally work across the range of configurations achievable with 802.11 radios. We evaluate our mechanisms using simulations as well as experiments on a testbed. Our results show that we can reduce the RTT of a flow by 6× or more, at the cost of less than 10% drop in end-to-end flow throughput.

  7. Dynamic Resource Management in 802.11 Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    George Athanasiou

    2012-01-01

    Full Text Available The association/handoff procedures are important components in a balanced operation of 802.11-based wireless mesh networks. In this paper, we introduce the concept of cooperative association where the stations (STA can share useful information in order to improve the performance of the association/reassociation procedures. Furthermore, in this work we introduce a load balancing mechanism that can be applied in mesh networks. This mechanism operates in a cross-layer manner taking into account uplink and downlink channel information, routing information, and congestion-based information. Our load balancing mechanism is based on a fairness index that is measured at each access point (AP neighborhood. This index reflects the way the communication load is shared in the neighboring APs. The iterative heuristic algorithms that we propose controls the communication load of each mesh AP in a distributed manner. We evaluate the performance of our mechanisms through OPNET simulations.

  8. Network preservation through a topology control algorithm for wireless mesh networks

    CSIR Research Space (South Africa)

    Aron, FO

    2008-09-01

    Full Text Available Wireless mesh networks (WMNs) is becoming a promising new technology for extending coverage to farflung rural areas. This it achieves by linking the various wireless LANS (WLANs) in distant locations thus providing a vital mode complimentary...

  9. Construct mine environment monitoring system based on wireless mesh network

    Science.gov (United States)

    Chen, Xin; Ge, Gengyu; Liu, Yinmei; Cheng, Aimin; Wu, Jun; Fu, Jun

    2018-04-01

    The system uses wireless Mesh network as a network transmission medium, and strive to establish an effective and reliable underground environment monitoring system. The system combines wireless network technology and embedded technology to monitor the internal data collected in the mine and send it to the processing center for analysis and environmental assessment. The system can be divided into two parts: the main control network module and the data acquisition terminal, and the SPI bus technology is used for mutual communication between them. Multi-channel acquisition and control interface design Data acquisition and control terminal in the analog signal acquisition module, digital signal acquisition module, and digital signal output module. The main control network module running Linux operating system, in which the transplant SPI driver, USB card driver and AODV routing protocol. As a result, the internal data collection and reporting of the mine are realized.

  10. A Novel Approach to Fair Routing in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Määttä Juho

    2009-01-01

    Full Text Available Multiradio wireless mesh network (WMN is a feasible choice for several applications, as routers with multiple network interface cards have become cheaper. Routing in any network has a great impact on the overall network performance, thus a routing protocol or algorithm for WMN should be carefully designed taking into account the specific characteristics of the network. In addition, in wireless networks, serious unfairness can occur between users if the issue is not addressed in the network protocols or algorithms. In this paper, we are proposing a novel centralized routing algorithm, called Subscriber Aware Fair Routing in WMN (SAFARI, for multiradio WMN that assures fairness, leads to a feasible scheduling, and does not collapse the aggregate network throughput with a strict fairness criterion. We show that our protocol is feasible and practical, and exhaustive simulations show that the performance is improved compared to traditional routing algorithms.

  11. An Analysis of Network and Sensor Performance Within IEEE 802.X Wireless MESH Networks in the Tactical Network Topology (TNT)

    National Research Council Canada - National Science Library

    Davis, Joseph A., Sr

    2005-01-01

    ....x wireless MESH networks within a DoD Tactical network environment. Multiple sensor configurations operating with wireless MESH network technologies will be researched and analyzed for performance in expeditionary environment situations...

  12. Mobility based multicast routing in wireless mesh networks

    Science.gov (United States)

    Jain, Sanjeev; Tripathi, Vijay S.; Tiwari, Sudarshan

    2013-01-01

    There exist two fundamental approaches to multicast routing namely minimum cost trees and shortest path trees. The (MCT's) minimum cost tree is one which connects receiver and sources by providing a minimum number of transmissions (MNTs) the MNTs approach is generally used for energy constraint sensor and mobile ad hoc networks. In this paper we have considered node mobility and try to find out simulation based comparison of the (SPT's) shortest path tree, (MST's) minimum steiner trees and minimum number of transmission trees in wireless mesh networks by using the performance metrics like as an end to end delay, average jitter, throughput and packet delivery ratio, average unicast packet delivery ratio, etc. We have also evaluated multicast performance in the small and large wireless mesh networks. In case of multicast performance in the small networks we have found that when the traffic load is moderate or high the SPTs outperform the MSTs and MNTs in all cases. The SPTs have lowest end to end delay and average jitter in almost all cases. In case of multicast performance in the large network we have seen that the MSTs provide minimum total edge cost and minimum number of transmissions. We have also found that the one drawback of SPTs, when the group size is large and rate of multicast sending is high SPTs causes more packet losses to other flows as MCTs.

  13. Routing in Wireless Multimedia Home Networks

    NARCIS (Netherlands)

    Scholten, Johan; Jansen, P.G.; Hop, Laurens

    This paper describes an adapted version of the destination sequenced distance vector routing protocol (DSDV) which is suitable to calculate routes in a wireless ¿real-time¿ home network. The home network is based on a IEEE 802.11b ad hoc network and uses a scheduled token to enforce real-time

  14. Routing in Wireless Multimedia Home Networks

    NARCIS (Netherlands)

    Scholten, Johan; Jansen, P.G.; Hop, Laurens

    This paper describes an adapted version of the destination sequenced distance vector routing protocol (DSDV) which is suitable to calculate routes in a wireless real-time home network. The home network is based on a IEEE 802.11b ad hoc network and uses a scheduled token to enforce real-time

  15. Adaptive and ubiquitous video streaming over Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Malik Mubashir Hassan

    2016-10-01

    Full Text Available In recent years, with the dramatic improvement on scalability of H.264/MPEG-4 standard and growing demand for new multimedia services have spurred the research on scalable video streaming over wireless networks in both industry and academia. Video streaming applications are increasingly being deployed in Wireless Mesh Networks (WMNs. However, robust streaming of video over WMNs poses many challenges due to varying nature of wireless networks. Bit-errors, packet-losses and burst-packet-losses are very common in such type of networks, which severely influence the perceived video quality at receiving end. Therefore, a carefully-designed error recovery scheme must be employed. In this paper, we propose an interactive and ubiquitous video streaming scheme for Scalable Video Coding (SVC based video streaming over WMNs towards heterogeneous receivers. Intelligently taking the benefit of path diversity, the proposed scheme initially calculates the quality of all candidate paths and then based on quality of path it decides adaptively the size and level of error protection for all packets in order to combat the effect of losses on perceived quality of reconstructed video at receiving end. Our experimental results show that the proposed streaming approach can react to varying channel conditions with less degradation in video quality.

  16. On the Packet Loss Correlation in Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Cabrera Guerrero, Juan Alberto; Roetter, Daniel Enrique Lucani

    2014-01-01

    State-of-the-art analysis and protocols in wireless mesh networks typically assume an independent packet loss channel for each receiver of a transmission. Although this is usually transparent for single-path protocol design, this assumption may severely degrade the performance of opportunistic and....../or multi-path routing approaches as well as network coding (NC) subgraph selection problems (routing in NC). This paper proposes simple channel models to incorporate the effect of correlation between receivers in a parametric fashion and supports them with a measurement campaign that leverages various...... commercial devices and network conditions. Finally, we illustrate the effect of correlation in the design and performance of the PlayNCool network coding protocol introduced by the authors in prior work. Our results show that the modified PlayNCool protocol decreases the overhead by a factor of 2.5x....

  17. Buffer Sizing in 802.11 Wireless Mesh Networks

    KAUST Repository

    Jamshaid, Kamran

    2011-10-01

    We analyze the problem of buffer sizing for TCP flows in 802.11-based Wireless Mesh Networks. Our objective is to maintain high network utilization while providing low queueing delays. The problem is complicated by the time-varying capacity of the wireless channel as well as the random access mechanism of 802.11 MAC protocol. While arbitrarily large buffers can maintain high network utilization, this results in large queueing delays. Such delays may affect TCP stability characteristics, and also increase queueing delays for other flows (including real-time flows) sharing the buffer. In this paper we propose sizing link buffers collectively for a set of nodes within mutual interference range called the \\'collision domain\\'. We aim to provide a buffer just large enough to saturate the available capacity of the bottleneck collision domain that limits the carrying capacity of the network. This neighborhood buffer is distributed over multiple nodes that constitute the network bottleneck; a transmission by any of these nodes fully utilizes the available spectral resource for the duration of the transmission. We show that sizing routing buffers collectively for this bottleneck allows us to have small buffers (as low as 2 - 3 packets) at individual nodes without any significant loss in network utilization. We propose heuristics to determine these buffer sizes in WMNs. Our results show that we can reduce the end-to-end delays by 6× to 10× at the cost of losing roughly 5% of the network capacity achievable with large buffers.

  18. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  19. Almost optimal distributed M2M multicasting in wireless mesh networks

    DEFF Research Database (Denmark)

    Xin, Qin; Manne, Fredrik; Zhang, Yan

    2012-01-01

    Wireless Mesh Networking (WMN) is an emerging communication paradigm to enable resilient, cost-efficient and reliable services for the future-generation wireless networks. In this paper, we study the problem of multipoint-to- multipoint (M2M) multicasting in a WMN which aims to use the minimum...... number of time slots to exchange messages among a group of k mesh nodes in a multi-hop WMN with n mesh nodes. We study the M2M multicasting problem in a distributed environment where each participant only knows that there are k participants and it does not know who are other k-1 participants among n mesh...

  20. Performance of Implementation IBR-DTN and Batman-Adv Routing Protocol in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Herman Yuliandoko

    2016-03-01

    Full Text Available Wireless mesh networks is a network which has high mobility and flexibility network. In Wireless mesh networks nodes are free to move and able to automatically build a network connection with other nodes. High mobility, heterogeneous condition and intermittent network connectivity cause data packets drop during wireless communication and it becomes a problem in the wireless mesh networks. This condition can happen because wireless mesh networks use connectionless networking type such as IP protocol which it is not tolerant to delay. To solve this condition it is needed a technology to keep data packets when the network is disconnect. Delay tolerant technology is a technology that provides store and forward mechanism and it can prevent packet data dropping during communication. In our research, we proposed a test bed wireless mesh networks implementation by using proactive routing protocol and combining with delay tolerant technology. We used Batman-adv routing protocol and IBR-DTN on our research. We measured some particular performance aspect of networking such as packet loss, delay, and throughput of the network. We identified that delay tolerant could keep packet data from dropping better than current wireless mesh networks in the intermittent network condition. We also proved that IBR-DTN and Batman-adv could run together on the wireless mesh networks. In The experiment throughput test result of IBR-DTN was higher than Current TCP on the LoS (Line of Side and on environment with obstacle. Keywords: Delay Tolerant, IBR-DTN, Wireless Mesh, Batman-adv, Performance

  1. Heterogeneous Wireless Mesh Network Technology Evaluation for Space Proximity and Surface Applications

    Science.gov (United States)

    DeCristofaro, Michael A.; Lansdowne, Chatwin A.; Schlesinger, Adam M.

    2014-01-01

    NASA has identified standardized wireless mesh networking as a key technology for future human and robotic space exploration. Wireless mesh networks enable rapid deployment, provide coverage in undeveloped regions. Mesh networks are also self-healing, resilient, and extensible, qualities not found in traditional infrastructure-based networks. Mesh networks can offer lower size, weight, and power (SWaP) than overlapped infrastructure-perapplication. To better understand the maturity, characteristics and capability of the technology, we developed an 802.11 mesh network consisting of a combination of heterogeneous commercial off-the-shelf devices and opensource firmware and software packages. Various streaming applications were operated over the mesh network, including voice and video, and performance measurements were made under different operating scenarios. During the testing several issues with the currently implemented mesh network technology were identified and outlined for future work.

  2. Dynamic channel assignment scheme for multi-radio wireless mesh networks

    CSIR Research Space (South Africa)

    Kareem, TR

    2008-09-01

    Full Text Available This paper investigates the challenges involve in designing a dynamic channel assignment (DCA) scheme for wireless mesh networks, particularly for multi-radio systems. It motivates the need for fast switching and process coordination modules...

  3. A new cognitive radio based admission control method for wireless mesh networks

    Science.gov (United States)

    Wang, Jing; Li, Fangfang

    2011-10-01

    In this paper, we address the problem of supporting applications with high bandwidth requirements in Wireless Mesh Networks (WMN) and develop a Markov analytic framework to study the important performance measures experienced by SUs in a cognitive radio (CR) based wireless mesh network. Specifically, we study the blocking and forced termination probabilities and throughput of secondary users under systems with/without spectrum handoff and channel reservation. Based on this framework, a novel dynamic cognitive channel access control algorithm for wireless mesh networks is proposed in order to maintain given quality of service (QoS) requirements. Simulation and analysis results show that our proposed dynamic cognitive channel access control algorithm can maximize the throughput while keeping forced termination and blocking probabilities of SUs' requests under the desired constraints, which providing a solution to improve load balance among multipath in wireless mesh networks.

  4. TMAC: Timestamp-Ordered MAC Protocol for Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2011-05-01

    Wireless Mesh Networks (WMNs) have emerged to meet a need for a self-organized and self-configured multi-hop wireless network infrastructure. Low cost infrastructure and ease of deployment have made WMNs an attractive technology for last mile access. However, 802.11 based WMNs are subject to serious fairness issues. With backlogged TCP traffic, nodes which are two or more hops away from the gateway are subject to starvation, while the one-hop away node saturates the channel with its own local traffic. We study the interactions of TCP and IEEE 802.11 MAC in WMNs to aid us in understanding and overcoming the unfairness problem. We propose a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically derive the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs via a manipulative per-node scheduling mechanism which takes advantage of the age of each packet as a priority metric. Simulation is conducted to validate our model and to illustrate the fairness characteristics of TMAC. Our results show that TMAC achieves excellent resource allocation fairness while maintaining above 90% of maximum link capacity in parking lot and large grid topologies. Our work illuminates the factors affecting TCP fairness in WMNs. Our theoretical and empirical findings can be used in future research to develop more fairness-aware protocols for WMNs.

  5. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Science.gov (United States)

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  6. Energy optimization based path selection algorithm for IEEE 802.11s wireless mesh networks

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2011-09-01

    Full Text Available It is everyone’s dream to have network connectivity anywhere at all times. This dream can only be realized provided there are feasible solutions that are put in place for the next generation of wireless works. Wireless Mesh Networks (WMNs...

  7. Method and apparatus to enhance routing protocols in wireless mesh networks

    DEFF Research Database (Denmark)

    2014-01-01

    A protocol for use in wireless mesh networks (PlayNCool) uses helper nodes to improve data flow in the network. The protocol is compatible with traditional mesh network routing algorithms. Techniques, systems, devices, and circuits for implementing the protocol are described....

  8. Wireless ZigBee home automation system

    Science.gov (United States)

    Craciunescu, Razvan; Halunga, Simona; Fratu, Octavian

    2015-02-01

    The home automation system concept existed for many years but in the last decade, due to the rapid development of sensors and wireless technologies, a large number of various such "intelligent homes" have been developed. The purpose of the present paper is to demonstrate the flexibility, reliability and affordability of home automation projects, based on a simple and affordable implementation. A wireless sensing and control system have been developed and tested, having a number of basic functionalities such as switching on/off the light according to ambient lighting and turning on/off the central heating. The system has been built around low power microcontrollers and ZigBee modems for wireless communication, using a set of Vishay 640 thermistor sensors for temperature measurements and Vishay LDR07 photo-resistor for humidity measurements. A trigger is activated when the temperature or light measurements are above/below a given threshold and a command is transmitted to the central unit through the ZigBee radio module. All the data processing is performed by a low power microcontroller both at the sensing device and at the control unit.

  9. IEEE 802.11s Wireless Mesh Networks: Challenges and Perspectives

    Science.gov (United States)

    Sgora, Aggeliki; Vergados, Dimitris D.; Chatzimisios, Periklis

    A promising solution for wireless environments is the wireless mesh technology that envisages supplementing wired infrastructure with a wireless backbone for providing Internet connectivity to mobile nodes (MNs) or users in residential areas and offices. The IEEE 802.11 TGs has started to work in developing a mesh standard for local area wireless networks. Although a lot of progress has been made and a few new drafts have been released recently, there exist many issues that demand enhanced or even new solutions to 802.11s mesh networking. This paper aims to overview the latest version of the IEEE 802.11s protocol (Draft 2.02), especially the MAC and routing layers, and to point out the challenges that these networks have to overcome in these layers.

  10. Design and Analysis of a Dynamic Mobility Management Scheme for Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Abhishek Majumder

    2013-01-01

    Full Text Available Seamless mobility management of the mesh clients (MCs in wireless mesh network (WMN has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO, mesh mobility management (M3, and wireless mesh mobility management (WMM have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC’s session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO, M3, and WMM with respect to total cost.

  11. Design and analysis of a dynamic mobility management scheme for wireless mesh network.

    Science.gov (United States)

    Majumder, Abhishek; Roy, Sudipta

    2013-01-01

    Seamless mobility management of the mesh clients (MCs) in wireless mesh network (WMN) has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO), mesh mobility management (M(3)), and wireless mesh mobility management (WMM) have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR) based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC's session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO, M(3), and WMM with respect to total cost.

  12. Wireless Mesh Networks to Support Video Surveillance: Architecture, Protocol, and Implementation Issues

    Directory of Open Access Journals (Sweden)

    Francesco Licandro

    2007-03-01

    Full Text Available Current video-surveillance systems typically consist of many video sources distributed over a wide area, transmitting live video streams to a central location for processing and monitoring. The target of this paper is to present an experience of implementation of a large-scale video-surveillance system based on a wireless mesh network infrastructure, discussing architecture, protocol, and implementation issues. More specifically, the paper proposes an architecture for a video-surveillance system, and mainly centers its focus on the routing protocol to be used in the wireless mesh network, evaluating its impact on performance at the receiver side. A wireless mesh network was chosen to support a video-surveillance application in order to reduce the overall system costs and increase scalability and performance. The paper analyzes the performance of the network in order to choose design parameters that will achieve the best trade-off between video encoding quality and the network traffic generated.

  13. Wireless Mesh Networks to Support Video Surveillance: Architecture, Protocol, and Implementation Issues

    Directory of Open Access Journals (Sweden)

    Licandro Francesco

    2007-01-01

    Full Text Available Current video-surveillance systems typically consist of many video sources distributed over a wide area, transmitting live video streams to a central location for processing and monitoring. The target of this paper is to present an experience of implementation of a large-scale video-surveillance system based on a wireless mesh network infrastructure, discussing architecture, protocol, and implementation issues. More specifically, the paper proposes an architecture for a video-surveillance system, and mainly centers its focus on the routing protocol to be used in the wireless mesh network, evaluating its impact on performance at the receiver side. A wireless mesh network was chosen to support a video-surveillance application in order to reduce the overall system costs and increase scalability and performance. The paper analyzes the performance of the network in order to choose design parameters that will achieve the best trade-off between video encoding quality and the network traffic generated.

  14. The Village Telco project: a reliable and practical wireless mesh telephony infrastructure

    Directory of Open Access Journals (Sweden)

    Gardner-Stephen Paul

    2011-01-01

    Full Text Available Abstract VoIP (Voice over IP over mesh networks could be a potential solution to the high cost of making phone calls in most parts of Africa. The Village Telco (VT is an easy to use and scalable VoIP over meshed WLAN (Wireless Local Area Network telephone infrastructure. It uses a mesh network of mesh potatoes to form a peer-to-peer network to relay telephone calls without landlines or cell phone towers. This paper discusses the Village Telco infrastructure, how it addresses the numerous difficulties associated with wireless mesh networks, and its efficient deployment for VoIP services in some communities around the globe. The paper also presents the architecture and functions of a mesh potato and a novel combined analog telephone adapter (ATA and WiFi access point that routes calls. Lastly, the paper presents the results of preliminary tests that have been conducted on a mesh potato. The preliminary results indicate very good performance and user acceptance of the mesh potatoes. The results proved that the infrastructure is deployable in severe and under-resourced environments as a means to make cheap phone calls and render Internet and IP-based services. As a result, the VT project contributes to bridging the digital divide in developing areas.

  15. PlayNCool: Opportunistic Network Coding for Local Optimization of Routing in Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Pedersen, Morten Videbæk

    2013-01-01

    This paper introduces PlayNCool, an opportunistic protocol with local optimization based on network coding to increase the throughput of a wireless mesh network (WMN). PlayNCool aims to enhance current routing protocols by (i) allowing random linear network coding transmissions end-to-end, (ii...... in large scale mesh networks. We show that PlayNCool can provide gains of more than 3x in individual links, which translates into a large end-to-end throughput improvement, and that it provides higher gains when more nodes in the network contend for the channel at the MAC layer, making it particularly...... relevant for dense mesh networks....

  16. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-01-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  17. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-08-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  18. Multiple-state based power control for multi-radio multi-channel wireless mesh networks

    CSIR Research Space (South Africa)

    Olwal, TO

    2009-01-01

    Full Text Available Multi-Radio Multi-Channel (MRMC) systems are key to power control problems in wireless mesh networks (WMNs). In this paper, we present asynchronous multiple-state based power control for MRMC WMNs. First, WMN is represented as a set of disjoint...

  19. Numerical study of propagation effects in a wireless mesh test bed

    CSIR Research Space (South Africa)

    Lysko, AA

    2008-07-01

    Full Text Available The present layout of the indoor wireless mesh network test-bed build at the Meraka Institute is introduced. This is followed by a description of a numerical electromagnetic model for the complete test-bed, including the coupling and diffraction...

  20. On the Feasibility of Wireless Multimedia Sensor Networks over IEEE 802.15.5 Mesh Topologies

    Directory of Open Access Journals (Sweden)

    Antonio-Javier Garcia-Sanchez

    2016-05-01

    Full Text Available Wireless Multimedia Sensor Networks (WMSNs are a special type of Wireless Sensor Network (WSN where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload nodes located within radio communication range of the data collection unit or data sink. The battery life of these nodes is therefore reduced considerably, requiring frequent battery replacement work to extend the operational life of the WSN system. In a wireless sensor network with mesh topology, any node may act as a forwarder node, thereby enabling multiple routing paths toward any other node or collection unit. In addition, mesh topologies have proven advantages, such as data transmission reliability, network robustness against node failures, and potential reduction in energy consumption. This work studies the feasibility of implementing WMSNs in mesh topologies and their limitations by means of exhaustive computer simulation experiments. To this end, a module developed for the Synchronous Energy Saving (SES mode of the IEEE 802.15.5 mesh standard has been integrated with multimedia tools to thoroughly test video sequences encoded using H.264 in mesh networks.

  1. On the Feasibility of Wireless Multimedia Sensor Networks over IEEE 802.15.5 Mesh Topologies.

    Science.gov (United States)

    Garcia-Sanchez, Antonio-Javier; Losilla, Fernando; Rodenas-Herraiz, David; Cruz-Martinez, Felipe; Garcia-Sanchez, Felipe

    2016-05-05

    Wireless Multimedia Sensor Networks (WMSNs) are a special type of Wireless Sensor Network (WSN) where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload nodes located within radio communication range of the data collection unit or data sink. The battery life of these nodes is therefore reduced considerably, requiring frequent battery replacement work to extend the operational life of the WSN system. In a wireless sensor network with mesh topology, any node may act as a forwarder node, thereby enabling multiple routing paths toward any other node or collection unit. In addition, mesh topologies have proven advantages, such as data transmission reliability, network robustness against node failures, and potential reduction in energy consumption. This work studies the feasibility of implementing WMSNs in mesh topologies and their limitations by means of exhaustive computer simulation experiments. To this end, a module developed for the Synchronous Energy Saving (SES) mode of the IEEE 802.15.5 mesh standard has been integrated with multimedia tools to thoroughly test video sequences encoded using H.264 in mesh networks.

  2. Research on backbone node deployment for Wireless Mesh Networks in dynamic environments

    Science.gov (United States)

    Li, Meiyi; Cao, Shengling

    2017-08-01

    Wireless Mesh Network is a type of wireless networks in which demands of bandwidth for users has mobility. The backbone node placement of wireless mesh networks in a dynamic scenario is investigated, and the TSDPSO algorithm is used to adapt the dynamic environment, which updates node deployment location to adapt to changes in demand if it detects environmental changes at the beginning of the cycle time. In order to meet the demands of bandwidth for users and network connectivity, particle swarm optimization algorithm is employed to select the gateway location, then nodes to the backbone network is added constantly until all requirement is covered. The experimental results show that algorithm could get effective solution in dynamic environment.

  3. Performance evaluation of routing metrics for wireless mesh networks

    CSIR Research Space (South Africa)

    Nxumalo, SL

    2009-08-01

    Full Text Available for WMN. The routing metrics have not been compared with QoS parameters. This paper is a work in progress of the project in which researchers want to compare the performance of different routing metrics in WMN using a wireless test bed. Researchers...

  4. Energy efficient topology control algorithm for wireless mesh networks

    CSIR Research Space (South Africa)

    Aron, FO

    2008-08-01

    Full Text Available The control of the topology of a network makes it possible for the network nodes to reduce their power of transmission while ensuring that network connectivity is preserved. This paper explains the need for energy consumption control in Wireless...

  5. Reliable Communication in Wireless Meshed Networks using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses...

  6. CAPAClTYANALYSIS OF WIRELESS MESH NET\\VORKS

    African Journals Online (AJOL)

    client lo obtain internet access. or as an acce s point which allows other WiFi devices and the nano stations to obtain network access as illustrated in Figure 2. The capacity o!"wireless rnesh networks is. a1Tec1ecl by many factors such as net\\\\ Ork architecture. node mobility. node density. trartic pallcrn and number or ...

  7. Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network

    Science.gov (United States)

    Gilani, Syed Sherjeel Ahmad; Zubair, Muhammad; Khan, Zeeshan Shafi

    Infrastructure-based Wireless Mesh Networks are emerging as an affordable, robust, flexible and scalable technology. With the advent of Wireless Mesh Networks (WMNs) the dream of connecting multiple technology based networks seems to come true. A fully secure WMN is still a challenge for the researchers. In infrastructure-based WMNs almost all types of existing Wireless Networks like Wi-Fi, Cellular, WiMAX, and Sensor etc can be connected through Wireless Mesh Routers (WMRs). This situation can lead to a security problem. Some nodes can be part of the network with high processing power, large memory and least energy issues while others may belong to a network having low processing power, small memory and serious energy limitations. The later type of the nodes is very much vulnerable to targeted attacks. In our research we have suggested to set some rules on the WMR to mitigate these kinds of targeted flooding attacks. The WMR will then share those set of rules with other WMRs for Effective Utilization of Resources.

  8. Design and Implementation of a Wireless ZigBee Mesh Network

    OpenAIRE

    Ouyang, Chenxi

    2014-01-01

    ZigBee is officially a wireless network protocol that is designed to be used with the low-data-rate sensor and control networks. The objective of this thesis was to implement a ZigBee mesh network with XBee 802.15.4 RF module and Raspberry Pi. The target was to make a mesh network with three nodes. The project consists of two parts: using the X-CTU application to implement the ZigBee network with XBee RF modules, XBee 802.15.4 Starter Development Kit and XBee Adapter Board, and then the imple...

  9. Joint Channel Assignment and Routing in Multiradio Multichannel Wireless Mesh Networks: Design Considerations and Approaches

    Directory of Open Access Journals (Sweden)

    Omar M. Zakaria

    2016-01-01

    Full Text Available Multiradio wireless mesh network is a promising architecture that improves the network capacity by exploiting multiple radio channels concurrently. Channel assignment and routing are underlying challenges in multiradio architectures since both determine the traffic distribution over links and channels. The interdependency between channel assignments and routing promotes toward the joint solutions for efficient configurations. This paper presents an in-depth review of the joint approaches of channel assignment and routing in multiradio wireless mesh networks. First, the key design issues, modeling, and approaches are identified and discussed. Second, existing algorithms for joint channel assignment and routing are presented and classified based on the channel assignment types. Furthermore, the set of reconfiguration algorithms to adapt the network traffic dynamics is also discussed. Finally, the paper presents some multiradio practical implementations and test-beds and points out the future research directions.

  10. Achieving Fair Throughput among TCP Flows in Multi-Hop Wireless Mesh Networks

    Science.gov (United States)

    Hou, Ting-Chao; Hsu, Chih-Wei

    Previous research shows that the IEEE 802.11 DCF channel contention mechanism is not capable of providing throughput fairness among nodes in different locations of the wireless mesh network. The node nearest the gateway will always strive for the chance to transmit data, causing fewer transmission opportunities for the nodes farther from the gateway, resulting in starvation. Prior studies modify the DCF mechanism to address the fairness problem. This paper focuses on the fairness study when TCP flows are carried over wireless mesh networks. By not modifying lower layer protocols, the current work identifies TCP parameters that impact throughput fairness and proposes adjusting those parameters to reduce frame collisions and improve throughput fairness. With the aid of mathematical formulation and ns2 simulations, this study finds that frame transmission from each node can be effectively controlled by properly controlling the delayed ACK timer and using a suitable advertised window. The proposed method reduces frame collisions and greatly improves TCP throughput fairness.

  11. Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Donghai Zhu

    2016-01-01

    Full Text Available Wireless Mesh Networks (WMNs have potential to provide convenient broadband wireless Internet access to mobile users.With the support of Software-Defined Networking (SDN paradigm that separates control plane and data plane, WMNs can be easily deployed and managed. In addition, by exploiting the broadcast nature of the wireless medium and the spatial diversity of multi-hop wireless networks, intra-flow network coding has shown a greater benefit in comparison with traditional routing paradigms in data transmission for WMNs. In this paper, we develop a novel OpenCoding protocol, which combines the SDN technique with intra-flow network coding for WMNs. Our developed protocol can simplify the deployment and management of the network and improve network performance. In OpenCoding, a controller that works on the control plane makes routing decisions for mesh routers and the hop-by-hop forwarding function is replaced by network coding functions in data plane. We analyze the overhead of OpenCoding. Through a simulation study, we show the effectiveness of the OpenCoding protocol in comparison with existing schemes. Our data shows that OpenCoding outperforms both traditional routing and intra-flow network coding schemes.

  12. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  13. Proxy-Based IPv6 Neighbor Discovery Scheme for Wireless LAN Based Mesh Networks

    Science.gov (United States)

    Lee, Jihoon; Jeon, Seungwoo; Kim, Jaehoon

    Multi-hop Wireless LAN-based mesh network (WMN) provides high capacity and self-configuring capabilities. Due to data forwarding and path selection based on MAC address, WMN requires additional operations to achieve global connectivity using IPv6 address. The neighbor discovery operation over WLAN mesh networks requires repeated all-node broadcasting and this gives rise to a big burden in the entire mesh networks. In this letter, we propose the proxy neighbor discovery scheme for optimized IPv6 communication over WMN to reduce network overhead and communication latency. Using simulation experiments, we show that the control overhead and communication setup latency can be significantly reduced using the proxy-based neighbor discovery mechanism.

  14. Interference Effects Redress over Power-Efficient Wireless-Friendly Mesh Networks for Ubiquitous Sensor Communications across Smart Cities.

    Science.gov (United States)

    Santana, Jose; Marrero, Domingo; Macías, Elsa; Mena, Vicente; Suárez, Álvaro

    2017-07-21

    Ubiquitous sensing allows smart cities to take control of many parameters (e.g., road traffic, air or noise pollution levels, etc.). An inexpensive Wireless Mesh Network can be used as an efficient way to transport sensed data. When that mesh is autonomously powered (e.g., solar powered), it constitutes an ideal portable network system which can be deployed when needed. Nevertheless, its power consumption must be restrained to extend its operational cycle and for preserving the environment. To this end, our strategy fosters wireless interface deactivation among nodes which do not participate in any route. As we show, this contributes to a significant power saving for the mesh. Furthermore, our strategy is wireless-friendly, meaning that it gives priority to deactivation of nodes receiving (and also causing) interferences from (to) the rest of the smart city. We also show that a routing protocol can adapt to this strategy in which certain nodes deactivate their own wireless interfaces.

  15. Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Sangil Choi

    2016-12-01

    Full Text Available Wireless mesh networks (WMNs have been considered as one of the key technologies for the configuration of wireless machines since they emerged. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts in the network and also allow them to access the Internet via gateway devices. Wireless routers are typically equipped with multiple radios operating on different channels to increase network throughput. Multicast is a form of communication that delivers data from a source to a set of destinations simultaneously. It is used in a number of applications, such as distributed games, distance education, and video conferencing. In this study, we address a channel assignment problem for multicast in multi-radio multi-channel WMNs. In a multi-radio multi-channel WMN, two nearby nodes will interfere with each other and cause a throughput decrease when they transmit on the same channel. Thus, an important goal for multicast channel assignment is to reduce the interference among networked devices. We have developed a minimum interference channel assignment (MICA algorithm for multicast that accurately models the interference relationship between pairs of multicast tree nodes using the concept of the interference factor and assigns channels to tree nodes to minimize interference within the multicast tree. Simulation results show that MICA achieves higher throughput and lower end-to-end packet delay compared with an existing channel assignment algorithm named multi-channel multicast (MCM. In addition, MICA achieves much lower throughput variation among the destination nodes than MCM.

  16. Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network.

    Science.gov (United States)

    Choi, Sangil; Park, Jong Hyuk

    2016-12-02

    Wireless mesh networks (WMNs) have been considered as one of the key technologies for the configuration of wireless machines since they emerged. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts in the network and also allow them to access the Internet via gateway devices. Wireless routers are typically equipped with multiple radios operating on different channels to increase network throughput. Multicast is a form of communication that delivers data from a source to a set of destinations simultaneously. It is used in a number of applications, such as distributed games, distance education, and video conferencing. In this study, we address a channel assignment problem for multicast in multi-radio multi-channel WMNs. In a multi-radio multi-channel WMN, two nearby nodes will interfere with each other and cause a throughput decrease when they transmit on the same channel. Thus, an important goal for multicast channel assignment is to reduce the interference among networked devices. We have developed a minimum interference channel assignment (MICA) algorithm for multicast that accurately models the interference relationship between pairs of multicast tree nodes using the concept of the interference factor and assigns channels to tree nodes to minimize interference within the multicast tree. Simulation results show that MICA achieves higher throughput and lower end-to-end packet delay compared with an existing channel assignment algorithm named multi-channel multicast (MCM). In addition, MICA achieves much lower throughput variation among the destination nodes than MCM.

  17. Performance Evaluation of Multi-Channel Wireless Mesh Networks with Embedded Systems

    Directory of Open Access Journals (Sweden)

    Whye Kit Tan

    2012-01-01

    Full Text Available Many commercial wireless mesh network (WMN products are available in the marketplace with their own proprietary standards, but interoperability among the different vendors is not possible. Open source communities have their own WMN implementation in accordance with the IEEE 802.11s draft standard, Linux open80211s project and FreeBSD WMN implementation. While some studies have focused on the test bed of WMNs based on the open80211s project, none are based on the FreeBSD. In this paper, we built an embedded system using the FreeBSD WMN implementation that utilizes two channels and evaluated its performance. This implementation allows the legacy system to connect to the WMN independent of the type of platform and distributes the load between the two non-overlapping channels. One channel is used for the backhaul connection and the other one is used to connect to the stations to wireless mesh network. By using the power efficient 802.11 technology, this device can also be used as a gateway for the wireless sensor network (WSN.

  18. Performance evaluation of multi-channel wireless mesh networks with embedded systems.

    Science.gov (United States)

    Lam, Jun Huy; Lee, Sang-Gon; Tan, Whye Kit

    2012-01-01

    Many commercial wireless mesh network (WMN) products are available in the marketplace with their own proprietary standards, but interoperability among the different vendors is not possible. Open source communities have their own WMN implementation in accordance with the IEEE 802.11s draft standard, Linux open80211s project and FreeBSD WMN implementation. While some studies have focused on the test bed of WMNs based on the open80211s project, none are based on the FreeBSD. In this paper, we built an embedded system using the FreeBSD WMN implementation that utilizes two channels and evaluated its performance. This implementation allows the legacy system to connect to the WMN independent of the type of platform and distributes the load between the two non-overlapping channels. One channel is used for the backhaul connection and the other one is used to connect to the stations to wireless mesh network. By using the power efficient 802.11 technology, this device can also be used as a gateway for the wireless sensor network (WSN).

  19. Optimized Group Channel Assignment Using Computational Geometry over Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Anitha Manikandan

    2015-01-01

    Full Text Available Wireless Mesh Networks (WMNs are an evolving division in the field of wireless networks due to their ease of deployment and assured last mile connectivity. It sets out a favorable situation to guarantee the Internet connectivity to all the mobile and static nodes. A wireless environment is dynamic, heterogeneous, and unpredictable as the nodes communicate through the unguided links called channels. The number of nonoverlapping channels available is less than the number of mesh nodes; hence, the same channel will be shared among many nodes. This scarcity of the channels causes interference and degrades the performance of the network. In this paper, we have presented a group based channel assignment method to minimize the interference. We have formulated a mathematical model using Nonlinear Programming (NLP. The objective function defines the channel assignment strategy which eventually reduces the interference. We have adapted the cognitive model of Discrete Particle Swarm Optimization (DPSO, for solving the optimization function. The channel assignment problem is an NP hard problem; hence, we have taken the benefits of a stochastic approach to find a solution that is optimal or near optimal. Finally, we have performed simulations to investigate the efficiency of our proposed work.

  20. Long-range wireless mesh network for weather monitoring in unfriendly geographic conditions.

    Science.gov (United States)

    Toledano-Ayala, Manuel; Herrera-Ruiz, Gilberto; Soto-Zarazúa, Genaro M; Rivas-Araiza, Edgar A; Bazán Trujillo, Rey D; Porrás-Trejo, Rafael E

    2011-01-01

    In this paper a long-range wireless mesh network system is presented. It consists of three main parts: Remote Terminal Units (RTUs), Base Terminal Units (BTUs) and a Central Server (CS). The RTUs share a wireless network transmitting in the industrial, scientific and medical applications ISM band, which reaches up to 64 Km in a single point-to-point communication. A BTU controls the traffic within the network and has as its main task interconnecting it to a Ku-band satellite link using an embedded microcontroller-based gateway. Collected data is stored in a CS and presented to the final user in a numerical and a graphical form in a web portal.

  1. Optimal Channel Width Adaptation, Logical Topology Design, and Routing in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Li Li

    2009-01-01

    Full Text Available Radio frequency spectrum is a finite and scarce resource. How to efficiently use the spectrum resource is one of the fundamental issues for multi-radio multi-channel wireless mesh networks. However, past research efforts that attempt to exploit multiple channels always assume channels of fixed predetermined width, which prohibits the further effective use of the spectrum resource. In this paper, we address how to optimally adapt channel width to more efficiently utilize the spectrum in IEEE802.11-based multi-radio multi-channel mesh networks. We mathematically formulate the channel width adaptation, logical topology design, and routing as a joint mixed 0-1 integer linear optimization problem, and we also propose our heuristic assignment algorithm. Simulation results show that our method can significantly improve spectrum use efficiency and network performance.

  2. Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank

    2013-01-01

    This paper introduces a design and simulation of a locally optimized network coding protocol, called PlayNCool, for wireless mesh networks. PlayN-Cool is easy to implement and compatible with existing routing protocols and devices. This allows the system to gain from network coding capabilities...... linear network coding to increase the usefulness of each transmission from the helpers. This paper focuses on the design details needed to make the system operate in reality and evaluating performance using ns-3 in multi-hop topologies. Our results show that the PlayNCool protocol increases the end...

  3. Joint power and multiple access control for wireless mesh network with Rose projection method.

    Science.gov (United States)

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches.

  4. Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Liang-yu Luan

    2012-09-01

    Full Text Available Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting, watch-nodes-based detection and identity-based cryptosystem are used. The simulation results and qualitative analysis demonstrate the performance and cost of the proposed scheme are more advantageous over the some of the previous schemes.

  5. Contribution to the optimal design and performance improvement of wireless mesh sensor networks

    OpenAIRE

    Rodenas Herráiz, David

    2015-01-01

    [ESP] En los últimos años, las Redes de Sensores Inalámbricas Malladas (Wireless Mesh Sensor Networks, WMSNs) han surgido como una de las tecnologías habilitantes que ofrecerá servicios potenciales de computación ubicua en redes inalámbricas de próxima genera-ción. Aunque las WMSNs no son conceptualmente nuevas, no ha sido hasta ahora cuando las comunidades científica, de fabricantes y de consumidores han prestado especial aten-ción a esta tecnología. A diferencia de las redes cableadas e ina...

  6. Throughput vs. Delay in Lossy Wireless Mesh Networks with Random Linear Network Coding

    DEFF Research Database (Denmark)

    Hundebøll, Martin; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2014-01-01

    This work proposes a new protocol applying on– the–fly random linear network coding in wireless mesh net- works. The protocol provides increased reliability, low delay, and high throughput to the upper layers, while being oblivious to their specific requirements. This seemingly conflicting goals ...... and evaluated in a real test bed with Raspberry Pi devices. We show that order of magnitude gains in throughput over plain TCP are possible with moderate losses and up to two fold improvement in per packet delay in our results....

  7. Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks

    KAUST Repository

    Hassanzadeh, Amin

    2011-07-18

    Wireless Mesh Networks (WMN) are easy-to-deploy, low cost solutions for providing networking and internet services in environments with no network infrastructure, e.g., disaster areas and battlefields. Since electric power is not readily available in such environments battery-powered mesh routers, operating in an energy efficient manner, are required. To the best of our knowledge, the impact of energy efficient solutions, e.g., involving duty-cycling, on WMN intrusion detection systems, which require continuous monitoring, remains an open research problem. In this paper we propose that carefully chosen monitoring mesh nodes ensure continuous and complete detection coverage, while allowing non-monitoring mesh nodes to save energy through duty-cycling. We formulate the monitoring node selection problem as an optimization problem and propose distributed and centralized solutions for it, with different tradeoffs. Through extensive simulations and a proof-of-concept hardware/software implementation we demonstrate that our solutions extend the WMN lifetime by 8%, while ensuring, at the minimum, a 97% intrusion detection rate.

  8. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  9. Wireless Android Based Home Automation System

    Directory of Open Access Journals (Sweden)

    Muhammad Tanveer Riaz

    2017-01-01

    Full Text Available This manuscript presents a prototype and design implementation of an advance home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server, which presents system core that manages and controls user’s home. Users and system administrator can locally (Local Area Network or remotely (internet manage and control the system. Second part is the hardware interface module, which provides appropriate interface to sensors and actuator of home automation system. Unlike most of the available home automation system in the market, the proposed system is scalable that one server can manage many hardware interface modules as long as it exists within network coverage. System supports a wide range of home automation devices like appliances, power management components, and security components. The proposed system is better in terms of the flexibility and scalability than the commercially available home automation systems

  10. The efficacy of centralized flow rate control in 802.11-based wireless mesh networks

    KAUST Repository

    Jamshaid, K.

    2013-06-13

    Commodity WiFi-based wireless mesh networks (WMNs) can be used to provide last mile Internet access. These networks exhibit extreme unfairness with backlogged traffic sources. Current solutions propose distributed source-rate control algorithms requiring link-layer or transport-layer changes on all mesh nodes. This is often infeasible in large practical deployments. In wireline networks, router-assisted rate control techniques have been proposed for use alongside end-to-end mechanisms. We wish to evaluate the feasibility of establishing similar centralized control via gateways in WMNs. In this paper, we focus on the efficacy of this control rather than the specifics of the controller design mechanism. We answer the question: Given sources that react predictably to congestion notification, can we enforce a desired rate allocation through a single centralized controller? The answer is not obvious because flows experience varying contention levels, and transmissions are scheduled by a node using imperfect local knowledge. We find that common router-assisted flow control schemes used in wired networks fail in WMNs because they assume that (1) links are independent, and (2) router queue buildups are sufficient for detecting congestion. We show that non-work-conserving, rate-based centralized scheduling can effectively enforce rate allocation. It can achieve results comparable to source rate limiting, without requiring any modifications to mesh routers or client devices. 2013 Jamshaid et al.; licensee Springer.

  11. Energy Consumption Model and Measurement Results for Network Coding-enabled IEEE 802.11 Meshed Wireless Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Rasmussen, Ulrik Wilken; Hundebøll, Martin

    2012-01-01

    This paper presents an energy model and energy measurements for network coding enabled wireless meshed networks based on IEEE 802.11 technology. The energy model and the energy measurement testbed is limited to a simple Alice and Bob scenario. For this toy scenario we compare the energy usages...

  12. WIRELESS HOME AUTOMATION SYSTEM BASED ON MICROCONTROLLER

    Directory of Open Access Journals (Sweden)

    MUNA H. SALEH

    2017-11-01

    Full Text Available This paper presents the development of Global System Mobile (GSM-based control home air-conditioner for home automation system. The main aim of the prototype development is to reduce electricity wastage. GSM module was used for receiving Short Message Service (SMS from the user’s mobile phone that automatically enable the controller to take any further action such as to switch ON and OFF the home air-conditioner. The system controls the air-conditioner based on the temperature reading through the sensor. Every period temperature sensor sends the degree to Micro Controller Unit (MCU through ZigBee. Based on temperature degree MCU send ON or OFF signal to switch. Additionally, system allows user to operate or shut down the airconditioner remotely through SMS.

  13. Flow Oriented Channel Assignment for Multi-radio Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Niu Zhisheng

    2010-01-01

    Full Text Available We investigate channel assignment for a multichannel wireless mesh network backbone, where each router is equipped with multiple interfaces. Of particular interest is the development of channel assignment heuristics for multiple flows. We present an optimization formulation and then propose two iterative flow oriented heuristics for the conflict-free and interference-aware cases, respectively. To maximize the aggregate useful end-to-end flow rates, both algorithms identify and resolve congestion at instantaneous bottleneck link in each iteration. Then the link rate is optimally allocated among contending flows that share this link by solving a linear programming (LP problem. A thorough performance evaluation is undertaken as a function of the number of channels and interfaces/node and the number of contending flows. The performance of our algorithm is shown to be significantly superior to best known algorithm in its class in multichannel limited radio scenarios.

  14. Interference Aware Routing for Minimum Frame Length Schedules in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Katerina Papadaki

    2008-10-01

    Full Text Available The focus of this paper is on routing in wireless mesh networks (WMNs that results in spatial TDMA (STDMA schedules with minimum frame length. In particular, the emphasis is on spanning tree construction; and we formulate the joint routing, power control, and scheduling problem as a mixedinteger linear program (MILP. Since this is an 𝒩𝒫-complete problem, we propose a low-complexity iterative pruning-based routing scheme that utilizes scheduling information to construct the spanning tree. A randomized version of this scheme is also discussed and numerical investigations reveal that the proposed iterative pruning algorithms outperform previously proposed routing schemes that aim to minimize the transmitted power or interference produced in the network without explicitly taking into account scheduling decisions.

  15. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    to the incoming and outgoing packet ratio. We describe the new protocol as an extension to the CSMA/CA protocol and implement the protocol on our own hardware platform. By means of our own testbed, we investigate two basic network structures, namely, the two-way relay and the cross topology. It is well known...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over......This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...

  16. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2012-08-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol to alleviate the unfairness problem in WMNs. Our protocol uses the age of packet as a priority metric for packet scheduling. Simulation is conducted to validate our model and to illustrate the fairness characteristics of our proposed MAC protocol. We conclude that we can achieve fairness with only little impact on network capacity.

  17. Distributed Synchronization Technique for OFDMA-Based Wireless Mesh Networks Using a Bio-Inspired Algorithm

    Directory of Open Access Journals (Sweden)

    Mi Jeong Kim

    2015-07-01

    Full Text Available In this paper, a distributed synchronization technique based on a bio-inspired algorithm is proposed for an orthogonal frequency division multiple access (OFDMA-based wireless mesh network (WMN with a time difference of arrival. The proposed time- and frequency-synchronization technique uses only the signals received from the neighbor nodes, by considering the effect of the propagation delay between the nodes. It achieves a fast synchronization with a relatively low computational complexity because it is operated in a distributed manner, not requiring any feedback channel for the compensation of the propagation delays. In addition, a self-organization scheme that can be effectively used to construct 1-hop neighbor nodes is proposed for an OFDMA-based WMN with a large number of nodes. The performance of the proposed technique is evaluated with regard to the convergence property and synchronization success probability using a computer simulation.

  18. Distributed Synchronization Technique for OFDMA-Based Wireless Mesh Networks Using a Bio-Inspired Algorithm.

    Science.gov (United States)

    Kim, Mi Jeong; Maeng, Sung Joon; Cho, Yong Soo

    2015-07-28

    In this paper, a distributed synchronization technique based on a bio-inspired algorithm is proposed for an orthogonal frequency division multiple access (OFDMA)-based wireless mesh network (WMN) with a time difference of arrival. The proposed time- and frequency-synchronization technique uses only the signals received from the neighbor nodes, by considering the effect of the propagation delay between the nodes. It achieves a fast synchronization with a relatively low computational complexity because it is operated in a distributed manner, not requiring any feedback channel for the compensation of the propagation delays. In addition, a self-organization scheme that can be effectively used to construct 1-hop neighbor nodes is proposed for an OFDMA-based WMN with a large number of nodes. The performance of the proposed technique is evaluated with regard to the convergence property and synchronization success probability using a computer simulation.

  19. A Signal Detection Technique for OFDMA-based Wireless Mesh Networks with TDoAs

    Directory of Open Access Journals (Sweden)

    Changhwan Park

    2015-06-01

    Full Text Available In this paper, the effect of time difference of arrival (TDoA is investigated for distributed nodes in OFDMA-based wireless mesh networks (WMNs. In order to minimize the interferences caused by TDoA in WMNs, the optimal starting point of FFT window at the receiver side of a node is derived by maximizing the effective SINR for each subcarrier. Also, a signal detection technique, called two dimensional ordered successive interference cancellation (TD-OSIC, is proposed for WMNs with TDoAs. It was shown via simulation that the proposed technique can achieve effective SINR and BER performances similar to the ideal case (no TDoA, even in WMNs with large TDoAs.

  20. Evaluation of VoIP QoS Performance in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Tariq Meeran

    2017-07-01

    Full Text Available The main focus of this research article is the evaluation of selected voice over Internet protocol (VoIP solutions in wireless mesh network (WMN scenarios. While WMNs have self-healing, self-forming, and dynamic topology features, they still pose challenges for the implementation of multimedia applications such as voice in various scenarios. Therefore, various solutions to make WMN more suitable for VoIP application have been proposed in the scientific literature. In this work, we have extensively explored a set of applicable scenarios by conducting experiments by means of a network simulator. The following scenarios were selected as the most representatives for performance evaluation: first responders, flooded village, remote village, and platoon deployment. Each selected scenario has been studied under six sub-scenarios corresponding to various combinations of the IEEE 802.11g, 802.11n, 802.11s, and 802.11e standards; the G.711 and G.729 codecs; and the ad hoc on demand distance vector (AODV and hybrid wireless mesh protocol (HWMP routing protocols. The results in terms of quality of service (measured with the mean opinion score rating scale, supported by the analysis of delay, jitter and packet loss, show that 802.11g integration with both VoIP codecs and AODV routing protocol results in better VoIP performance as compared to most other scenarios. In case of 802.11g integration with 802.11s, VoIP performance decreases as compared to the other sub-scenarios without 802.11s. The results also show that 802.11n integration with 802.11e decreases VoIP performance in larger deployments. We conclude the paper with some recommendations in terms of combinations of those standards and protocols with a view to achieve a higher quality of service for the given scenarios.

  1. Throughput Improvement in Multi radio Multi channel Wireless Cognitive Radio Mesh Networks

    Directory of Open Access Journals (Sweden)

    Fahimeh Aghaei

    2016-10-01

    Full Text Available The classic spectrum management methods cannot efficiently supply the future multicast traffic demands. Recently, the cognitive radio technology has emerged as a promising solution to enhance the spectrum utilization. However, the potential heterogeneity in channel availability among the network users leads to send the packets through multiple channels. This significantly decreases the network throughput. The main goal of this paper is to reduce the multicast period in a single-cell and multi-channel wireless mesh cognitive radio network. In this regard, we jointly exploit the multicast scheduling policies, the intra-groups and inter-groups assistance strategies, and the Wireless Broadcast Advantage (WBA. Based on WBA, a single transmission of a node can simultaneously cover multiple neighboring receivers. In addition, by assigning multiple radios to each network user, we allow the nodes to simultaneously transmit/receive the packets on distinct channels. Numerical results of our comprehensive simulations demonstrate the efficiency of the proposed scheme in term of the network throughput.

  2. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    Science.gov (United States)

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  3. Routing protocol for wireless quantum multi-hop mesh backbone network based on partially entangled GHZ state

    Science.gov (United States)

    Xiong, Pei-Ying; Yu, Xu-Tao; Zhang, Zai-Chen; Zhan, Hai-Tao; Hua, Jing-Yu

    2017-08-01

    Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multihop teleportation for wireless mesh backbone networks. Based on an analysis of quantum multi-hop protocols, a partially entangled Greenberger-Horne-Zeilinger (GHZ) state is selected as the quantum channel for the proposed protocol. Both quantum and classical wireless channels exist between two neighboring nodes along the route. With the proposed routing protocol, quantum information can be transmitted hop by hop from the source node to the destination node. Based on multi-hop teleportation based on the partially entangled GHZ state, a quantum route established with the minimum number of hops. The difference between our routing protocol and the classical one is that in the former, the processes used to find a quantum route and establish quantum channel entanglement occur simultaneously. The Bell state measurement results of each hop are piggybacked to quantum route finding information. This method reduces the total number of packets and the magnitude of air interface delay. The deduction of the establishment of a quantum channel between source and destination is also presented here. The final success probability of quantum multi-hop teleportation in wireless mesh backbone networks was simulated and analyzed. Our research shows that quantum multi-hop teleportation in wireless mesh backbone networks through a partially entangled GHZ state is feasible.

  4. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  5. WING/WORLD: An Open Experimental Toolkit for the Design and Deployment of IEEE 802.11-Based Wireless Mesh Networks Testbeds

    Directory of Open Access Journals (Sweden)

    Riggio Roberto

    2010-01-01

    Full Text Available Wireless Mesh Networks represent an interesting instance of light-infrastructure wireless networks. Due to their flexibility and resiliency to network failures, wireless mesh networks are particularly suitable for incremental and rapid deployments of wireless access networks in both metropolitan and rural areas. This paper illustrates the design and development of an open toolkit aimed at supporting the design of different solutions for wireless mesh networking by enabling real evaluation, validation, and demonstration. The resulting testbed is based on off-the-shelf hardware components and open-source software and is focused on IEEE 802.11 commodity devices. The software toolkit is based on an "open" philosophy and aims at providing the scientific community with a tool for effective and reproducible performance analysis of WMNs. The paper describes the architecture of the toolkit, and its core functionalities, as well as its potential evolutions.

  6. WING/WORLD: An Open Experimental Toolkit for the Design and Deployment of IEEE 802.11-Based Wireless Mesh Networks Testbeds

    Directory of Open Access Journals (Sweden)

    Daniele Miorandi

    2010-01-01

    Full Text Available Wireless Mesh Networks represent an interesting instance of light-infrastructure wireless networks. Due to their flexibility and resiliency to network failures, wireless mesh networks are particularly suitable for incremental and rapid deployments of wireless access networks in both metropolitan and rural areas. This paper illustrates the design and development of an open toolkit aimed at supporting the design of different solutions for wireless mesh networking by enabling real evaluation, validation, and demonstration. The resulting testbed is based on off-the-shelf hardware components and open-source software and is focused on IEEE 802.11 commodity devices. The software toolkit is based on an “open” philosophy and aims at providing the scientific community with a tool for effective and reproducible performance analysis of WMNs. The paper describes the architecture of the toolkit, and its core functionalities, as well as its potential evolutions.

  7. A Cross-Layer Routing Design for Multi-Interface Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Tzu-Chieh Tsai

    2009-01-01

    Full Text Available In recent years, Wireless Mesh Networks (WMNs technologies have received significant attentions. WMNs not only accede to the advantages of ad hoc networks but also provide hierarchical multi-interface architecture. Transmission power control and routing path selections are critical issues in the past researches of multihop networks. Variable transmission power levels lead to different network connectivity and interference. Further, routing path selections among different radio interfaces will also produce different intra-/interflow interference. These features tightly affect the network performance. Most of the related works on the routing protocol design do not consider transmission power control and multi-interface environment simultaneously. In this paper, we proposed a cross-layer routing protocol called M2iRi2 which coordinates transmission power control and intra-/interflow interference considerations as routing metrics. Each radio interface calculates the potential tolerable-added transmission interference in the physical layer. When the route discovery starts, the M2iRi2 will adopt the appropriate power level to evaluate each interface quality along paths. The simulation results demonstrate that our design can enhance both network throughput and end-to-end delay.

  8. TMAC: Timestamp-Ordered MAC for CSMA/CA Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal Saud Yousef

    2011-07-31

    We propose TMAC, a timestamp-ordered MAC protocol for Wireless Mesh Networks (WMNs). TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed with the transmission only if it receives a sufficient number of grant control messages from these neighbors. A grant message indicates that the associated data packet has the lowest timestamp of all the packets pending transmission at the local transmit queue. We demonstrate that a loose ordering of timestamps among neighboring nodes is sufficient for enforcing local fairness, subsequently leading to flow rate fairness in a multi-hop WMN. We show that TMAC can be implemented using the control frames in IEEE 802.11 stack, and thus can be easily integrated in existing 802.11-based WMNs. Our simulation results show that TMAC achieves excellent resource allocation fairness while maintaining over 90% of maximum link capacity in parking lot and large grid topologies.

  9. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks.

    Science.gov (United States)

    Meganathan, Navamani Thandava; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols.

  10. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Navamani Thandava Meganathan

    2015-01-01

    Full Text Available Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols.

  11. My home is my bazaar - A taxonomy and classification of current wireless home network protocols

    DEFF Research Database (Denmark)

    Torbensen, Rune; Hansen, Klaus Marius; Hjorth, Theis Solberg

    2011-01-01

    Recent advances in wireless communication have produced a multitude of related protocols, leading to a growing market of products for home automation systems within energy management, elder care, etc. These systems are different from wired ones in terms of architectures and qualities, which leads......, cost, security, etc. Third, a classification based on the taxonomy and the collected data is presented. In the final discussion, we identify a number of key aspects that could be important technology criteria for future development of home automation protocols....

  12. Joint optimization of physical layer parameters and routing in wireless mesh networks

    KAUST Repository

    Tobagi, Fouad A.

    2010-06-01

    Achieving the best performance in a wireless mesh network requires striking the right balance between the performance of links carrying traffic and the extent of spatial reuse of the wireless medium. The performance of a link depends on its transmit power and data rate as well as the level of interference caused by concurrent transmissions in the network; the latter is function of the Energy Detect (ED) threshold that determines when a node may access the medium. Which links in the network carry traffic is determined by the routing function; routing selects paths according to a link metric that reflects the relative performance of links (e.g., the expected transmission time of a packet on the link). In this paper, we seek to maximize end-to-end network throughput by jointly optimizing physical layer parameters and routing. We consider a random topology with a uniform node density. We consider that the signal attenuation between a pair of nodes is determined by a power law path loss model with an exponent equal to 3. Our findings are as follows. Consider first that the same transmit power and same data rate are used on all links. For any transmit power, data rate and ED threshold setting, the highest feasible load is obtained when the level of interference experienced by links used by routing is the highest possible. For a given transmit power and data rate setting, there is an optimum ED threshold that maximizes network performance. At the optimum ED threshold and maximum load, the range of link lengths used by routing is the lowest possible given the topology and routing metric used. With an ED threshold higher than the optimum, the same range of links is used by routing; however, the highest feasible load in this case is lower due to the fact that concurrent transmitters are allowed to be closer. With a lower ED threshold, concurrent transmitters are forced to be farther apart, and thus longer links become more attractive; as a result, the range of link lengths

  13. Proposal and Performance Evaluation of a Multicast Routing Protocol for Wireless Mesh Networks Based on Network Load

    Directory of Open Access Journals (Sweden)

    Kiyotaka Oe

    2015-01-01

    Full Text Available Wireless Mesh Networks (WMNs can provide wide range Wireless Local Area Networks (WLANs area by connecting Access Points (APs of WLANs with each other using radio communications. A routing protocol is very important to keep communication quality over radio multihop communications because radio waves are impacted much by surrounding environment. When we use multiuser shared applications like a video conference and an IP phone, it is predicted that large amount of traffic flows on network. Therefore, we should consider network loads to use these applications. In this paper, we propose a multicast routing protocol for WMNs which considers network loads and hop count. Furthermore, we evaluate performance by simulation. In the simulation results, we show that the proposed protocol has better performance than a conventional protocol (MAODV at high loaded scenario.

  14. Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks

    Directory of Open Access Journals (Sweden)

    Laisen Nie

    2018-01-01

    Full Text Available Wireless mesh network is prevalent for providing a decentralized access for users and other intelligent devices. Meanwhile, it can be employed as the infrastructure of the last few miles connectivity for various network applications, for example, Internet of Things (IoT and mobile networks. For a wireless mesh backbone network, it has obtained extensive attention because of its large capacity and low cost. Network traffic prediction is important for network planning and routing configurations that are implemented to improve the quality of service for users. This paper proposes a network traffic prediction method based on a deep learning architecture and the Spatiotemporal Compressive Sensing method. The proposed method first adopts discrete wavelet transform to extract the low-pass component of network traffic that describes the long-range dependence of itself. Then, a prediction model is built by learning a deep architecture based on the deep belief network from the extracted low-pass component. Otherwise, for the remaining high-pass component that expresses the gusty and irregular fluctuations of network traffic, the Spatiotemporal Compressive Sensing method is adopted to predict it. Based on the predictors of two components, we can obtain a predictor of network traffic. From the simulation, the proposed prediction method outperforms three existing methods.

  15. Distributed topology control algorithm to conserve energy in heterogeneous wireless mesh networks

    CSIR Research Space (South Africa)

    Aron, FO

    2008-07-01

    Full Text Available to increasing the network capacity via better spatial bandwidth reuse. In this work, the problem of topology control in a hybrid WMN of heterogeneous wireless devices with varying maximum transmission ranges is considered. A localized distributed topology...

  16. Decentralized power control for multi-radio multi-channel wireless mesh networks

    CSIR Research Space (South Africa)

    Olwal, TO

    2010-09-01

    Full Text Available Multi-Radio Multi-Channel (MRMC) WMNs result in power control problems including interference, un-scalable connectivity and energy consumption. Several previous studies have focused on the single radio wireless configurations while studying power...

  17. Mobile RFID of Wireless Mesh Network for Intelligent Safety Care System

    Directory of Open Access Journals (Sweden)

    Chwen-Fu Horng

    2009-12-01

    Full Text Available This paper presents the Wi-Fi phone with RFID (Radio frequency identification of student entered the school, via Wireless Access Points (APs of school will transmit MAC address with RFID of Wi-Fi phone to Internet Data Center (IDC for server and then the message exchanged by using GSM (or 3G has been transmitted message (or mail to the mobile user of parents (or client user. The wireless access points support broadcasting multiple SSIDs, each of which can have a different set of security and network setting. The RADIUS server is used to authenticate the Wireless Access Point (AP and mobile nodes. In safety case system, we used the several authentication and encryption options for the WLAN. We will discuss the use of Wi-Fi protected Access (WPA, RFID, IP Security (IPSec, and Secure Socket Layer (SSL, and there are high Quality of service (QoS and performance.

  18. A Hidden-Exposed Terminal Interference Aware Routing Metric for Multi-Radio and Multi-Rate Wireless Mesh Networks

    Science.gov (United States)

    Jin, Shouguang; Mase, Kenichi

    In this paper, we propose a novel Hidden-terminal and Exposed-terminal Interference aware routing metric (HEI-ETT) for Multi-Radio and Multi-Rate wireless mesh networks in which each stationary mesh node is equipped with multi-radio interfaces that relays traffic to the extend networks by using multi-hop transmissions. We have two main design goals for HEI-ETT. First, we will characterize interferences as Hidden-terminal Interference and Exposed-terminal Interference regardless of inter- or intra-flow interference and should take into account both interference effects while computing the path metric. Second, an efficient transmission rate adaptation should be employed in HEI-ETT to enhance the network throughput. We incorporated our metric in well known Optimized Link State Routing protocol version 2 (OLSRv2) which is one of the two standard routing protocols for MANETs and evaluated the performance of our metric by simulation. The results show that our metric outperforms existing metrics such as ETX, ETT and WCETT.

  19. The Extension of Wireless Mesh Networks Via Vertical Takeoff and Landing Unmanned Aerial Vehicles

    Science.gov (United States)

    2007-12-01

    hops” away from the Ethernet feed. Therein lay inherent limitations of mesh products which use one radio for the backhaul. The chief limitation...operating on a "polluted" channel is especially significant in dense metro areas. In 1-radio backhauls all radios share the same channel

  20. OPTIMASI OLSR ROUTING PROTOCOL PADA JARINGAN WIRELESS MESH DENGAN ADAPTIVE REFRESHING TIME INTERVAL DAN ENHANCE MULTI POINT RELAY SELECTING ALGORITHM

    Directory of Open Access Journals (Sweden)

    Faosan Mapa

    2014-01-01

    Full Text Available Normal 0 false false false IN X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Wireless Mesh Network (WMN adalah suatu konektivitas jaringan yang self-organized, self-configured dan multi-hop. Tujuan dari WMN adalah menawarkan pengguna suatu bentuk jaringan nirkabel yang dapat dengan mudah berkomunikasi dengan jaringan konvensional dengan kecepatan tinggi dan dengan cakupan yang lebih luas serta biaya awal yang minimal. Diperlukan suatu desain protokol routing yang efisien untuk WMN yang secara adaptif dapat mendukung mesh routers dan mesh clients. Dalam tulisan ini, diusulkan untuk mengoptimalkan protokol OLSR, yang merupakan protokol routing proaktif. Digunakan heuristik yang meningkatkan protokol OLSR melalui adaptive refreshing time interval dan memperbaiki metode MPR selecting algorithm. Suatu analisa dalam meningkatkan protokol OLSR melalui adaptive refreshing time interval dan memperbaiki algoritma pemilihan MPR menunjukkan kinerja yang signifikan dalam hal throughput jika dibandingkan dengan protokol OLSR yang asli. Akan tetapi, terdapat kenaikan dalam hal delay. Pada simulasi yang dilakukan dapat disimpulkan bahwa OLSR dapat dioptimalkan dengan memodifikasi pemilihan node MPR berdasarkan cost effective dan penyesuaian waktu interval refreshing hello message sesuai dengan keadaan

  1. Software Defined Coded Networking: Benefits of the PlayNCool protocol in wireless mesh networks

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    The goal of this paper is two-fold. First, to expand an opportunistic network coding protocol for wireless networks, called PlayNCool, in order to incorporate new mechanisms to improve performance in the presence of packet losses. In particular, exploiting additional helper nodes to improve...... the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  2. Range based power control for multi-radio multi-channel wireless mesh networks

    CSIR Research Space (South Africa)

    Olwal, TO

    2009-08-01

    Full Text Available ) Here, 2. is the Euclidean norm and υ is the path loss exponent (PLE) assumed to be 2 6υ≤ ≤ , depending on the physical environment conditions [11]. Substitute (3) into (4) to get: Network and Above PMMUP: V-MAC Link Layer MAC # 2 Physical #2... neighbouring nodes. The probability of selecting transmission power that is greater than the probing power level increases with the connectivity range at different path loss exponents (PLE). When the PLE is high it implies bad wireless channel environment...

  3. Supporting Dynamic Adaptive Streaming over HTTP in Wireless Meshed Networks using Random Linear Network Coding

    DEFF Research Database (Denmark)

    Hundebøll, Martin; Pedersen, Morten Videbæk; Roetter, Daniel Enrique Lucani

    2014-01-01

    , including CUBIC, Reno, Veno, Vegas, and Westwood+, under different packet loss rates in wireless systems using a real testbed with Raspberry Pi devices. Our goal was to choose the most promising TCP version in terms of delay performance, in this case TCP Reno, and make a fair comparison between TCP running...... alone and using FRANC underneath for reliability. Our demonstrator with DASH in Raspberry Pi devices using the DASH benchmark, shows that the video rate delivered is 4x higher when using FRANC. Even in harsh packet loss conditions, FRANC is able to deliver higher data rates (increase 4x), while...

  4. Tri-Band PCB Antenna for Wireless Sensor Network Transceivers in Home Automation Applications

    DEFF Research Database (Denmark)

    Rohde, John; Toftegaard, Thomas Skjødeberg

    2012-01-01

    A novel tri-band antenna design for wireless sensor network devices in home automation applications is proposed. The design is based on a combination of a conventional monopole wire antenna and discrete distributed load impedances. The load impedances are employed to ensure the degrees of freedom...

  5. Sensing Home: A Cost-Effective Design for Smart Home via Heterogeneous Wireless Networks.

    Science.gov (United States)

    Fan, Xiaohu; Huang, Hao; Qi, Shipeng; Luo, Xincheng; Zeng, Jing; Xie, Qubo; Xie, Changsheng

    2015-12-03

    The aging population has inspired the marketing of advanced real time devices for home health care, more and more wearable devices and mobile applications, which have emerged in this field. However, to properly collect behavior information, accurately recognize human activities, and deploy the whole system in a real living environment is a challenging task. In this paper, we propose a feasible wireless-based solution to deploy a data collection scheme, activity recognition model, feedback control and mobile integration via heterogeneous networks. We compared and found a suitable algorithm that can be run on cost-efficient embedded devices. Specifically, we use the Super Set Transformation method to map the raw data into a sparse binary matrix. Furthermore, designed front-end devices of low power consumption gather the living data of the habitant via ZigBee to reduce the burden of wiring work. Finally, we evaluated our approach and show it can achieve a theoretical time-slice accuracy of 98%. The mapping solution we propose is compatible with more wearable devices and mobile apps.

  6. Bandwidth Management in Wireless Home Networks for IPTV Solutions

    Directory of Open Access Journals (Sweden)

    Tamás Jursonovics

    2013-01-01

    Full Text Available The optimal allocation of the retransmission bandwidth is essential for IPTV service providers to ensure maximal service quality. This paper highlights the relevance of the wireless transport in today’s IPTV solution and discusses how this new media affects the existing broadcast technologies. A new Markovian channel model is developed to address the optimization issues of the retransmission throughput, and a new method is presented which is evaluated by empirical measurements followed by mathematical analysis.

  7. Multilevel Bloom Filters for P2P Flows Identification Based on Cluster Analysis in Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Xia-an Bi

    2015-01-01

    Full Text Available With the development of wireless mesh networks and distributed computing, lots of new P2P services have been deployed and enrich the Internet contents and applications. The rapid growth of P2P flows brings great pressure to the regular network operation. So the effective flow identification and management of P2P applications become increasingly urgent. In this paper, we build a multilevel bloom filters data structure to identify the P2P flows through researches on the locality characteristics of P2P flows. Different level structure stores different numbers of P2P flow rules. According to the characteristics values of the P2P flows, we adjust the parameters of the data structure of bloom filters. The searching steps of the scheme traverse from the first level to the last level. Compared with the traditional algorithms, our method solves the drawbacks of previous schemes. The simulation results demonstrate that our algorithm effectively enhances the performance of P2P flows identification. Then we deploy our flow identification algorithm in the traffic monitoring sensors which belong to the network traffic monitoring system at the export link in the campus network. In the real environment, the experiment results demonstrate that our algorithm has a fast speed and high accuracy to identify the P2P flows; therefore, it is suitable for actual deployment.

  8. AN OPTIMIZATION MODEL TO MINIMIZE THE EXPECTED END-TO-END TRANSMISSION TIME IN WIRELESS MESH NETWORKS

    Directory of Open Access Journals (Sweden)

    Marlon da Silva

    Full Text Available ABSTRACT Time metrics are extremely important to evaluate the transmission performance on Wireless Mesh Networks (WMNs, whose main characteristic is to use multihop technology to extend the network coverage area. One of such metrics is WCETT (Weighted Cumulative Expected Transmission Time, in which transmission times per hop are weighted for both proactive and reactive conditions. Furthermore, such metrics are able to detect delays that can degrade some network services. This paper presents an optimization model to minimize WCETT in a WMN, subject to constraints grouped by bandwidth, flow control and power control. As the model includes nonlinear constraints, we propose a heuristic to solve it, which divides the problem in two subproblems. The first subproblem maximizes the network link capacity and a Simulated Annealing algorithm is used to solve it. Considering the link capacities obtained, the second subproblem minimizes the WCETTs, which is formulated as a linear programming model. Some numerical results are presented, based on instances of WMNs randomly generated. Some of these results are compared with the results obtained by a commercial simulator in order to verify the coherence of the proposed heuristic for realistic scenarios.

  9. Performance Improvement of Wireless Mesh Networks by Using a Combination of Channel-Bonding and Multi-Channel Techniques

    Science.gov (United States)

    Xu, Liang; Yamamoto, Koji; Murata, Hidekazu; Yoshida, Susumu

    In the present paper, the use of a combination of channel-bonding and multi-channel techniques is proposed to improve the performance of wireless mesh networks (WMNs). It is necessary to increase the network throughput by broadening the bandwidth, and two approaches to effectively utilize the broadened bandwidth can be considered. One is the multi-channel technique, in which multiple separate frequency channels are used simultaneously for information transmission. The other is the channel-bonding technique used in IEEE 802.11n, which joins multiple frequency channels into a single broader channel. The former can reduce the channel traffic to mitigate the effect of packet collision, while the latter can increase the transmission rate. In the present paper, these two approaches are compared and their respective advantages are clarified in terms of the network throughput and delay performance assuming the same total bandwidth and a CSMA protocol. Our numerical and simulation results indicate that under low-traffic conditions, the channel-bonding technique can achieve low delay, while under traffic congestion conditions, the network performance can be improved by using multi-channel technique. Based on this result, the use of a combination of these two techniques is proposed for a WMN, and show that it is better to use a proper channel technique according to the network traffic condition. The findings of the present study also contribute to improving the performance of a multimedia network, which consists of different traffic types of applications.

  10. A telemedicine system for wireless home healthcare based on Bluetooth and the Internet.

    Science.gov (United States)

    Zhao, Xiaoming; Fei, Ding-Yu; Doarn, Charles R; Harnett, Brett; Merrell, Ronald

    2004-01-01

    The VitalPoll Telemedicine System (VTS) was designed and developed for wireless home healthcare. The aims of this study were: to design the architecture and communication methods for a telemedicine system; to implement a physiologic routing hub to collect data from different medical devices and sensors; and to evaluate the feasibility of this system for applications in wireless home healthcare. The VTS was built using Bluetooth wireless and Internet technologies with client/server architecture. Several medical devices, which acquire vital signs, such as real-time electrocardiogram signals, heart rate, body temperature, and activity (physical motion), were integrated into the VTS. Medical information and data were transmitted over short-range interface (USB, RS232), wireless communication, and the Internet. The medical results were stored in a database and presented using a web browser. The patient's vital signals can be collected, transmitted, and displayed in real time by the VTS. The experiments verified no data loss during Bluetooth and Internet communication. Bluetooth and the Internet provide enough bandwidth channels to tranmit these vital signs. The experimental results show that VTS may be suitable for a practical telemedicine system in home healthcare.

  11. Off the Shelf Cloud Robotics for the Smart Home: Empowering a Wireless Robot through Cloud Computing

    Directory of Open Access Journals (Sweden)

    Javier Ramírez De La Pinta

    2017-03-01

    Full Text Available In this paper, we explore the possibilities offered by the integration of home automation systems and service robots. In particular, we examine how advanced computationally expensive services can be provided by using a cloud computing approach to overcome the limitations of the hardware available at the user’s home. To this end, we integrate two wireless low-cost, off-the-shelf systems in this work, namely, the service robot Rovio and the home automation system Z-wave. Cloud computing is used to enhance the capabilities of these systems so that advanced sensing and interaction services based on image processing and voice recognition can be offered.

  12. Off the Shelf Cloud Robotics for the Smart Home: Empowering a Wireless Robot through Cloud Computing.

    Science.gov (United States)

    Ramírez De La Pinta, Javier; Maestre Torreblanca, José María; Jurado, Isabel; Reyes De Cozar, Sergio

    2017-03-06

    In this paper, we explore the possibilities offered by the integration of home automation systems and service robots. In particular, we examine how advanced computationally expensive services can be provided by using a cloud computing approach to overcome the limitations of the hardware available at the user's home. To this end, we integrate two wireless low-cost, off-the-shelf systems in this work, namely, the service robot Rovio and the home automation system Z-wave. Cloud computing is used to enhance the capabilities of these systems so that advanced sensing and interaction services based on image processing and voice recognition can be offered.

  13. Off the Shelf Cloud Robotics for the Smart Home: Empowering a Wireless Robot through Cloud Computing

    Science.gov (United States)

    Ramírez De La Pinta, Javier; Maestre Torreblanca, José María; Jurado, Isabel; Reyes De Cozar, Sergio

    2017-01-01

    In this paper, we explore the possibilities offered by the integration of home automation systems and service robots. In particular, we examine how advanced computationally expensive services can be provided by using a cloud computing approach to overcome the limitations of the hardware available at the user’s home. To this end, we integrate two wireless low-cost, off-the-shelf systems in this work, namely, the service robot Rovio and the home automation system Z-wave. Cloud computing is used to enhance the capabilities of these systems so that advanced sensing and interaction services based on image processing and voice recognition can be offered. PMID:28272305

  14. A model to improve the routing performance of Cognitive Radio Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Lesiba Morries Kola

    2017-12-01

    Full Text Available The increasing demand for broadband wireless technologies has led to the scarcity, inefficient utilization, and underutilization of the spectrum. The Cognitive Radio (CR technology has emerged as the promising solution which improves the utilization of the spectrum. However, routing is a challenge due to the dynamic nature of the CR networks. The link quality varies in space and time as nodes join and leave the network. The network connectivity is intermittent due to node mobility and the activities of the primary user. The spectrum aware, spectrum agile, and interference aware routing protocols are vital for the sturdiness of the network and efficient utilization of the resources. We propose an interference aware, spectrum aware, and agile extended Weighted Cumulative Expected Transmission Time (xWCETT routing protocol. The protocol integrates the features of the Ad-hoc On-demand Distance Vector (AODV and the weighted cumulative expected transmission time (WCETT routing protocols. The xWCETT was simulated using the Network Simulator 2 and its performance compared with the AODV and the WCETT routing protocols. The xWCETT was evaluated with respect to quality of service related metrics and the results show that it outperformed the AODV and WCETT routing protocols.

  15. Low Power Wireless Smoke Alarm System in Home Fires

    Directory of Open Access Journals (Sweden)

    Juan Aponte Luis

    2015-08-01

    Full Text Available A novel sensing device for fire detection in domestic environments is presented. The fire detector uses a combination of several sensors that not only detect smoke, but discriminate between different types of smoke. This feature avoids false alarms and warns of different situations. Power consumption is optimized both in terms of hardware and software, providing a high degree of autonomy of almost five years. Data gathered from the device are transmitted through a wireless communication to a base station. The low cost and compact design provides wide application prospects.

  16. Low Power Wireless Smoke Alarm System in Home Fires.

    Science.gov (United States)

    Aponte Luis, Juan; Gómez Galán, Juan Antonio; Alcina Espigado, Javier

    2015-08-21

    A novel sensing device for fire detection in domestic environments is presented. The fire detector uses a combination of several sensors that not only detect smoke, but discriminate between different types of smoke. This feature avoids false alarms and warns of different situations. Power consumption is optimized both in terms of hardware and software, providing a high degree of autonomy of almost five years. Data gathered from the device are transmitted through a wireless communication to a base station. The low cost and compact design provides wide application prospects.

  17. Wireless Home Automation System using IoT

    Directory of Open Access Journals (Sweden)

    Alexandra MIHALACHE

    2017-01-01

    Full Text Available Nowadays, the chance of having an automated home is no longer a fancy luxury, but a reality accessible to a wide range of consumers, because smart home systems have replaced those that only automated the home in the past. More and more solutions based on IoT are being devel-oped to transform homes into smart ones, but the problem is that the benefits of home automa-tion are still not clear to everyone as they are not promoted enough, so we cannot talk about a broad mass of consumers already using integrated or DIY solutions to improve their lives. In this paper, I will present a home automation system using Arduino Uno integrated with rele-vant modules which are used to allow remote control of lights or fans, changes being made on the basis of different sensors data. The system is designed to be low cost and expandable, bring-ing accessibility, convenience and energy efficiency.

  18. Detection of Early Morning Daily Activities with Static Home and Wearable Wireless Sensors

    Directory of Open Access Journals (Sweden)

    David Vanderpool

    2007-10-01

    Full Text Available This paper describes a flexible, cost-effective, wireless in-home activity monitoring system for assisting patients with cognitive impairments due to traumatic brain injury (TBI. The system locates the subject with fixed home sensors and classifies early morning bathroom activities of daily living with a wearable wireless accelerometer. The system extracts time- and frequency-domain features from the accelerometer data and classifies these features with a hybrid classifier that combines Gaussian mixture models and a finite state machine. In particular, the paper establishes that despite similarities between early morning bathroom activities of daily living, it is possible to detect and classify these activities with high accuracy. It also discusses system training and provides data to show that with proper feature selection, accurate detection and classification are possible for any subject with no subject specific training.

  19. Experimental Evaluation of a SIP-Based Home Gateway with Multiple Wireless Interfaces for Domotics Systems

    OpenAIRE

    Rosario G. Garroppo; Loris Gazzarrini; Stefano Giordano; Luca Tavanti

    2012-01-01

    In modern houses, the presence of sensors and actuators is increasing, while communication services and entertainment systems had long since settled into everyday life. The utilization of wireless communication technologies, such as ZigBee, Wi-Fi, and Bluetooth, is attractive because of their short installation times and low costs. The research is moving towards the integration of the various home appliances and devices into a single domotics system, able to exploit the cooperation among the ...

  20. Battery-Less 6LoWPAN-Based Wireless Home Automation by Use of Energy Harvesting

    OpenAIRE

    Deokjai Choi; Ali Fahmi Perwira Negara; Ardiansyah Musa Efendi; Seungkyo Oh

    2013-01-01

    Being one of the current main technologies, wireless sensor network (WSN) is absolutely critical and plays an increasingly important role in the development of a wide range of data acquisition, processing, and control applications. One interesting challenge application of the WSNs is Internet-based home automation system. The rapid expansion of IPv6, moreover, after IETF defined 6LoWPAN as a technique to apply IPv6 into WSNs standard, added potential for Internet paradigm communication, contr...

  1. Extending Wireless Broadband Network Architectures with Home Gateways, Localization, and Physical Environment Surveillance

    DEFF Research Database (Denmark)

    Jelling Kristoffersen, Kåre; Kjærgaard, Mikkel Baun; Chen, Jianjun

    2005-01-01

    Adding content is seen as the next important step in the development and deployment of broadband networks. This paper proposes three different ways of adding content to wireless broadband networks. First, the home gateway is presented as the focal point for delivery of digital services to future...... homes. It must bridge across the most prevalent standard protocols for data, video, telephony and telemetry, and must be able to automatically discover new devices in a residence and allow over the air/wire provisioning, billing, management and aggregation of new services from multiple service providers...

  2. Performance Analysis of IEEE 802.15.4 Compliant Wireless Devices for Heterogeneous Indoor Home Automation Environments

    Directory of Open Access Journals (Sweden)

    Juan Antonio Nazabal

    2012-01-01

    Full Text Available The influence of topology as well as morphology of complex indoor scenarios in the deployment of wireless sensor networks and wireless systems applied to home and building automation systems is analyzed. The existence of loss mechanisms such as material absorption (walls, furniture, etc. and strong multipath components as well as the increase in the number of wireless sensors within indoor scenarios increases the relevance in the configuration of the heterogeneous wireless systems. Simulation results by means of empirical-based models are compared with an in-house 3D ray launching code as well as measurement results from wireless sensor networks illustrate the strong influence of the indoor scenario in the overall performance. The use of adequate radioplanning strategies lead to optimal wireless network deployments in terms of capacity, quality of service, and reduced power consumption.

  3. Challenges in Gaining Large Scale Carbon Reductions through Wireless Home Automation Systems

    DEFF Research Database (Denmark)

    Larsen, Peter Gorm; Rovsing, Poul Ejnar; Toftegaard, Thomas Skjødeberg

    2010-01-01

    Buildings account for more than a 35 % of the energy consumption in Europe. Therefore a step towards more sustainable lifestile is to use home automation to optimize the energy consumption “automatically”. This paper reports about the usage and some of the remaining challenges of especially...... wireless but also powerline communication in a home automation setting. For many years, home automation has been visible to many, but accessible to only a few, because of inadequate integration of systems. A vast number of both standard and proprietary communication protocols are used, and systems...... are often difficult to install and configure so professional assistance is needed. In this paper we report about our experience in constructing an open universal home automation framework enabling interoperability of multiple communication protocols. The framework can easily be expanded in order to support...

  4. Mesh network simulation

    OpenAIRE

    Pei, Ping; Petrenko, Y. N.

    2015-01-01

    A Mesh network simulation framework which provides a powerful and concise modeling chain for a network structure will be introduce in this report. Mesh networks has a special topologic structure. The paper investigates a message transfer in wireless mesh network simulation and how does it works in cellular network simulation. Finally the experimental result gave us the information that mesh networks have different principle in transmission way with cellular networks in transmission, and multi...

  5. My Home is my Bazaar - A Taxonomy and Classification of Current Wireless Home Network Protocols

    DEFF Research Database (Denmark)

    Hjorth, Theis S.

    2011-01-01

    . First, we review the technical details of a number of established wireless technologies currently sold in the market. Second, a taxonomy is constructed based on the ISO 9126 quality framework. A number of evaluation criteria are determined such as maturity, replaceability, openness, resource efficiency...

  6. Location-Based Self-Adaptive Routing Algorithm for Wireless Sensor Networks in Home Automation

    Directory of Open Access Journals (Sweden)

    Hong SeungHo

    2011-01-01

    Full Text Available The use of wireless sensor networks in home automation (WSNHA is attractive due to their characteristics of self-organization, high sensing fidelity, low cost, and potential for rapid deployment. Although the AODVjr routing algorithm in IEEE 802.15.4/ZigBee and other routing algorithms have been designed for wireless sensor networks, not all are suitable for WSNHA. In this paper, we propose a location-based self-adaptive routing algorithm for WSNHA called WSNHA-LBAR. It confines route discovery flooding to a cylindrical request zone, which reduces the routing overhead and decreases broadcast storm problems in the MAC layer. It also automatically adjusts the size of the request zone using a self-adaptive algorithm based on Bayes' theorem. This makes WSNHA-LBAR more adaptable to the changes of the network state and easier to implement. Simulation results show improved network reliability as well as reduced routing overhead.

  7. Wireless network system based multi-non-invasive sensors for smart home

    Science.gov (United States)

    Issa Ahmed, Rudhwan

    There are several techniques that have been implemented for smart homes usage; however, most of these techniques are limited to a few sensors. Many of these methods neither meet the needs of the user nor are cost-effective. This thesis discusses the design, development, and implementation of a wireless network system, based on multi-non-invasive sensors for smart home environments. This system has the potential to be used as a means to accurately, and remotely, determine the activities of daily living by continuously monitoring relatively simple parameters that measure the interaction between users and their surrounding environment. We designed and developed a prototype system to meet the specific needs of the elderly population. Unlike audio-video based health monitoring systems (which have associated problems such as the encroachment of privacy), the developed system's distinct features ensure privacy and are almost invisible to the occupants, thus increasing the acceptance levels of this system in household environments. The developed system not only achieved high levels of accuracy, but it is also portable, easy to use, cost-effective, and requires low data rates and less power compared to other wireless devices such as Wi-Fi, Bluetooth, wireless USB, Ultra wideband (UWB), or Infrared (IR) wireless. Field testing of the prototype system was conducted at different locations inside and outside of the Minto Building (Centre for Advanced Studies in Engineering at Carleton University) as well as other locations, such as the washroom, kitchen, and living room of a prototype apartment. The main goal of the testing was to determine the range of the prototype system and the functionality of each sensor in different environments. After it was verified that the system operated well in all of the tested environments, data were then collected at the different locations for analysis and interpretation in order to identify the activities of daily living of an occupant.

  8. Experimental Evaluation of a SIP-Based Home Gateway with Multiple Wireless Interfaces for Domotics Systems

    Directory of Open Access Journals (Sweden)

    Rosario G. Garroppo

    2012-01-01

    Full Text Available In modern houses, the presence of sensors and actuators is increasing, while communication services and entertainment systems had long since settled into everyday life. The utilization of wireless communication technologies, such as ZigBee, Wi-Fi, and Bluetooth, is attractive because of their short installation times and low costs. The research is moving towards the integration of the various home appliances and devices into a single domotics system, able to exploit the cooperation among the diverse subsystems and offer the end-user a single multiservice platform. In this scenario, the paper presents the experimental evaluation of a domotics framework centered on a SIP-based home gateway (SHG. While SIP is used to build a common control plane, the SHG is in charge of translating the user commands from and to the specific domotics languages. The analysis has been devoted to assess both the performance of the SHG software framework and the negative effects produced by the simultaneous interference among the three widespread wireless technologies.

  9. Definition of an 802.11 Interface Management Process in a Proposed System for Transmission Capacity Enhancement in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Christian Köbel

    2015-01-01

    Full Text Available 802.11-based wireless mesh networks (WMNs as last mile solutions frequently become bottlenecks in the overall Internet communication structure. The lack of end-to-end capacity on routes also affects vertical traffic coming from or flowing towards external networks, such as the Internet. The presented approach aims to increase the overall network performance by exploiting channel diversity and to additionally favor vertical traffic. To achieve this, first we propose a general system that modifies an existing mesh node architecture, in order to prepare a more efficient resource management and to enhance the restricted transmission capacity in standard WMNs. The parallel use of nonoverlapping channels, based on a multiradio node, marks the starting point. The system treats aspects of channel assignment, traffic analysis, and fast layer 2 forwarding. Then, the impact of a novel Multihop Radio Resource Management process is discussed as a relevant component of this new system architecture. The process combines per-hop priority queuing and load balancing in a novel way. It was designed, developed, and evaluated in the presented paper, resulting in the fact that capacity in WMNs was significantly increased, Quality-of-Service parameters were improved, and more efficient use of multiple radios could be reached. The proposed process was validated using a simulation approach.

  10. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network

    Science.gov (United States)

    Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing

    2016-01-01

    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods. PMID:28042831

  11. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.

    Science.gov (United States)

    Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing

    2016-12-30

    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.

  12. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Sandeep Pirbhulal

    2016-12-01

    Full Text Available Wireless sensor networks (WSNs provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP to develop the Internet of Things (IoT for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.

  13. Experimental Results on a Wireless Wattmeter Device for the Integration in Home Energy Management Systems

    Directory of Open Access Journals (Sweden)

    Eduardo M. G. Rodrigues

    2017-03-01

    Full Text Available This paper presents a home area network (HAN-based domestic load energy consumption monitoring prototype device as part of an advanced metering system (AMS. This device can be placed on individual loads or configured to measure several loads as a whole. The wireless communication infrastructure is supported on IEEE 805.12.04 radios that run a ZigBee stack. Data acquisition concerning load energy transit is processed in real time and the main electrical parameters are then transmitted through a RF link to a wireless terminal unit, which works as a data logger and as a human-machine interface. Voltage and current sensing are implemented using Hall effect principle-based transducers, while C code is developed on two 16/32-bit microcontroller units (MCUs. The main features and design options are then thoroughly discussed. The main contribution of this paper is that the proposed metering system measures the reactive energy component through the Hilbert transform for low cost measuring device systems.

  14. Exposure caused by wireless technologies used for short-range indoor communication in homes and offices

    International Nuclear Information System (INIS)

    Schmid, G.; Lager, D.; Preiner, P.; Ueberbacher, R.; Cecil, S.

    2007-01-01

    In order to estimate typical radio frequency exposures from indoor used wireless communication technologies applied in homes and offices, WLAN, Bluetooth and Digital Enhanced Cordless Telecommunications systems, as well as baby surveillance devices and wireless headphones for indoor usage, have been investigated by measurements and numerical computations. Based on optimised measurement methods, field distributions and resulting exposure were assessed on selected products and real exposure scenarios. Additionally, generic scenarios have been investigated on the basis of numerical computations. The obtained results demonstrate that under usual conditions the resulting spatially (over body dimensions) averaged and 6-min time-averaged exposure for persons in the radio frequency fields of the considered applications is below ∼0.1% of the reference level for power density according to the International Commission on Non-Ionizing Radiation Protection (ICNIRP) guidelines published in 1998. Spatial and temporal peak values can be considerably higher by 2-3 orders of magnitude. In case of some transmitting devices operated in close proximity to the body (e.g. WLAN transmitters), local exposure can reach the same order of magnitude as the basic restriction; however, none of the devices considered in this study exceeded the limits according to the ICNIRP guidelines. (authors)

  15. Sensor Interfaces for Private Home Automation: From Analog to Digital, Wireless and Autonomous

    Directory of Open Access Journals (Sweden)

    Erich Leder

    2007-08-01

    Full Text Available In this paper a flexible and reliable system for smart home automation is presented. It is based on standardized hardware and open source communication protocols. Firstly, a special sensor interface has been developed, which allows the measurement of (slow analog signals to be determined by inexpensive digital PLC input terminals. Right now, up to eleven different modules have been implemented and the system is being tested in several configurations. In a second step, the communication is digitized. With the digitalization of the sensor modules, based on the implementation of a PIC Microcontroller, more intelligence is provided to the module, which increases the power and flexibility of the whole system. Thirdly, a wireless sensor-system consisting of a base station and of a mobile measuring unit is developed. The autonomous mobile unit is realized by using solar powering, gold cap energy storage, low-power circuits and a radio communication interface.

  16. Implementation of an Embedded Web Server Application for Wireless Control of Brain Computer Interface Based Home Environments.

    Science.gov (United States)

    Aydın, Eda Akman; Bay, Ömer Faruk; Güler, İnan

    2016-01-01

    Brain Computer Interface (BCI) based environment control systems could facilitate life of people with neuromuscular diseases, reduces dependence on their caregivers, and improves their quality of life. As well as easy usage, low-cost, and robust system performance, mobility is an important functionality expected from a practical BCI system in real life. In this study, in order to enhance users' mobility, we propose internet based wireless communication between BCI system and home environment. We designed and implemented a prototype of an embedded low-cost, low power, easy to use web server which is employed in internet based wireless control of a BCI based home environment. The embedded web server provides remote access to the environmental control module through BCI and web interfaces. While the proposed system offers to BCI users enhanced mobility, it also provides remote control of the home environment by caregivers as well as the individuals in initial stages of neuromuscular disease. The input of BCI system is P300 potentials. We used Region Based Paradigm (RBP) as stimulus interface. Performance of the BCI system is evaluated on data recorded from 8 non-disabled subjects. The experimental results indicate that the proposed web server enables internet based wireless control of electrical home appliances successfully through BCIs.

  17. A Conflict-Free Low-Jitter Guaranteed-Rate MAC Protocol for Base-Station Communications in Wireless Mesh Networks

    Science.gov (United States)

    Szymanski, T. H.

    A scheduling algorithm and MAC protocol which provides low-jitter guaranteed-rate (GR) communications between base-stations (BS) in a Wireless Mesh Network (WMN) is proposed. The protocol can provision long-term multimedia services such as VOIP, IPTV, or Video-on-Demand. The time-axis is partitioned into scheduling frames with F time-slots each. A directional antennae scheme is used to provide each directed link with a fixed transmission rate. A protocol such as IntServ is used to provision resources along an end-to-end path of BSs for GR sessions. The Guaranteed Rates between the BSs are then specified in a doubly stochastic traffic rate matrix, which is recursively decomposed to yield a low-jitter GR frame transmission schedule. In the resulting schedule, the end-to-end delay and jitter are small and bounded, and the cell loss rate due to primary scheduling conflicts is zero. For dual-channel WMNs, the MAC protocol can achieve 100% utilization, as well as near-minimal queueing delays and near minimal delay jitter. The scheduling time complexity is O(NFlogNF), where N is the number of BSs. Extensive simulation results are presented.

  18. A Wireless Posture Monitoring System for Personalized Home-Based Rehabilitation

    Directory of Open Access Journals (Sweden)

    Pedro Macedo

    2015-06-01

    Full Text Available We live in an aging society, an issue that will be exacerbated in the coming decades, due to low birth rates and increasing life expectancy. With the decline in physical and cognitive functions with age, it is of the utmost importance to maintain regular physical activity, in order to preserve an individual’s mobility, motor capabilities and coordination. Within this context, this paper describes the development of a wireless sensor network and its application in a human motion capture system based on wearable inertial and magnetic sensors. The goal is to enable, through continuous real- time monitoring, the creation of a personalized home-based rehabilitation system for the elderly population and/or injured people. Within this system, the user can benefit from an assisted mode, in which their movements can be compared to a reference motion model of the same movements, resulting in visual feedback alerts given by the application. This motion model can be created previously, in a ‘learning phase’, under supervision of a caregiver.

  19. A wearable point-of-care system for home use that incorporates plug-and-play and wireless standards.

    Science.gov (United States)

    Yao, Jianchu; Schmitz, Ryan; Warren, Steve

    2005-09-01

    A point-of-care system for continuous health monitoring should be wearable, easy to use, and affordable to promote patient independence and facilitate acceptance of new home healthcare technology. Reconfigurability, interoperability, and scalability are important. Standardization supports these requirements, and encourages an open market where lower product prices result from vendor competition. This paper first discusses candidate standards for wireless communication, plug-and-play device interoperability, and medical information exchange in point-of-care systems. It then addresses the design and implementation of a wearable, plug-and-play system for home care which adopts the IEEE 1073 Medical Information Bus (MIB) standards, and uses Bluetooth as the wireless communication protocol. This standards-based system maximizes user mobility by incorporating a three-level architecture populated by base stations, wearable data loggers, and wearable sensors. Design issues include the implementation of the MIB standards on microcontroller-driven embedded devices, low power consumption, wireless data exchange, and data storage and transmission in a reconfigurable body-area network.

  20. The mesh network protocol evaluation and development

    OpenAIRE

    Pei, Ping; Petrenko, Y. N.

    2015-01-01

    In this paper, we introduce a Mesh network protocol evaluation and development. It has a special protocol. We could easily to understand that how different protocols are used in mesh network. In addition to our comprehension, Multi – hop routing protocol could provide robustness and load balancing to communication in wireless mesh networks.

  1. [Developing a home care nursing information system by utilizing wire-wireless network and mobile computing system].

    Science.gov (United States)

    Park, Jung-Ho; Park, Sung-Ae; Yoon, Soon-Nyoung; Kang, Sung-Rye

    2004-04-01

    The purpose of this study was to develop a home care nursing network system for operating home care effectively and efficiently by utilizing a wire-wireless network and mobile computing in order to record and send patients' data in real time, and by combining the headquarter office and the local offices with home care nurses over the Internet. It complements the preceding research from 1999 by adding home care nursing standard guidelines and upgrading the PDA program. Method/1 and Prototyping were adopted to develop the main network system. The detailed research process is as follows : 1)home care nursing standard guidelines for Diabetes, cancer and peritoneal-dialysis were added in 12 domains of nursing problem fields with nursing assessment/intervention algorithms. 2) complementing the PDA program was done by omitting and integrating the home care nursing algorithm path which is unnecessary and duplicated. Also, upgrading the PDA system was done by utilizing the machinery and tools where the PDA and the data transmission modem are integrated, CDMX-1X base construction, in order to reduce a transmission error or transmission failure.

  2. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  3. [A wireless smart home system based on brain-computer interface of steady state visual evoked potential].

    Science.gov (United States)

    Zhao, Li; Xing, Xiao; Guo, Xuhong; Liu, Zehua; He, Yang

    2014-10-01

    Brain-computer interface (BCI) system is a system that achieves communication and control among humans and computers and other electronic equipment with the electroencephalogram (EEG) signals. This paper describes the working theory of the wireless smart home system based on the BCI technology. We started to get the steady-state visual evoked potential (SSVEP) using the single chip microcomputer and the visual stimulation which composed by LED lamp to stimulate human eyes. Then, through building the power spectral transformation on the LabVIEW platform, we processed timely those EEG signals under different frequency stimulation so as to transfer them to different instructions. Those instructions could be received by the wireless transceiver equipment to control the household appliances and to achieve the intelligent control towards the specified devices. The experimental results showed that the correct rate for the 10 subjects reached 100%, and the control time of average single device was 4 seconds, thus this design could totally achieve the original purpose of smart home system.

  4. Quality Changes of N-3 PUFAs Enriched and Conventional Eggs under Different Home Storage Conditions with Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Wenkang Li

    2017-11-01

    Full Text Available Omega-3 polyunsaturated fatty acids (n-3 PUFAs enriched eggs are popular for their enrichment of PUFAs, but their freshness and quality are prone to decline with time, particularly if storage conditions are not well maintained. Home storage is the last but a neglected important tach in eggs supply chain, but few studies are available on the egg storage in the home stage. This study aimed to evaluate the internal quality change of both n-3 PUFAs enriched and conventional eggs by simulating eggs stored at consumers’ home in refrigeration and under room temperature. The egg quality indices (Haugh unit, yolk index, weight, and albumen pH were adopted and analyzed for both storage conditions. Wireless sensor network (WSN was used for real-time monitoring of the temperature and humidity during storage. The results showed that temperature, humidity and time of storage all have an influence on the freshness of both n-3 PUFAs enriched and conventional eggs and there is no significant difference happened to n-3 PUFAs enriched eggs and conventional eggs. Refrigeration can decelerate the quality deterioration of both n-3 PUFAs enriched and conventional eggs and consumers should be educated about how to maintain the internal quality of eggs during home storage.

  5. MESH NETWORK DEVELOPMENT PROJECT IN GREAT STONE INDUSTRY PARK

    Directory of Open Access Journals (Sweden)

    Pei Ping

    2016-01-01

    Full Text Available Wireless Mesh network (WMN are increasingly becoming popular as low cost alternatives to wired network for providing broadband access to users. A wireless mesh network (WMN is a communication networks made up of radio nodes organized in a mesh topology. It is also a form of wireless network. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. The mesh clients are often laptops, cell phones and other wireless devices while the mesh routers forward traffic to and from the gateways, which may, but need not, be connected, to the Internet. In this paper, we discuss different radio frequency range in wireless connected to Access Point (AP and the project from Belarus – China great stone industry park in Mesh network. The China-Belarus industrial park is a territorial entity with the area of approximately 80 sq. km with a special legal status for the provision of comfortable conditions for business conducting. The Park is located in a unique natural complex 25 km far from Minsk, the capital of the Republic of Belarus. It is in close proximity to the international airport, railway lines, a transnational highway Berlin-Moscow. The result of analysis shows distribution of AP and covering services in great stone industry park. Mesh network provides robustness and load balancing in wireless networks communication.

  6. Impact of wireless link quality across communication layers

    OpenAIRE

    Zhou, J.

    2010-01-01

    Nowadays, wireless networks are used in most of the applications with radio technologies being used in all kinds of wireless networks. In all wireless links, the transmitted packets can be lost. How to identify the quality of a certain wireless link and achieve the best delivery performance over a certain wireless network is an open issue. In this thesis, the performance of wireless mesh network, wireless sensor network and cellular network have been investigated by the method of measurements...

  7. Deploying 5G-technologies in smart city and smart home wireless sensor networks with interferences

    DEFF Research Database (Denmark)

    Lynggaard, Per; Skouby, Knud Erik

    2015-01-01

    communication in an Internet of Things (5G) contexts. In this paper we discuss some of the key challenges that exist in the smart city and smart home networks in the light of possible 5G-solutions. Focus is on deploying cognitive radio technologies (5G) which enables the smart city networks to support......Deploying 5G technologies in a combination of smart homes and smart city opens for a new ecosystem with big potentials. The potentials lie in the creation of an advanced ICT infrastructure with support for connected and entangled services possibilities including technologies for efficient...... interconnected infrastructure elements, to handle big-data from the smart homes, and to be compatible with existing infrastructures. The considered cognitive radio technology is based on pre-coded OFDM which offers the needed flexibility to deal with the key challenges found in the smart home networks. Thus...

  8. Wireless home monitoring and health care activity management through the Internet in patients with chronic diseases.

    Science.gov (United States)

    Tura, Andrea; Quareni, Luca; Longo, David; Condoluci, Claudia; van Rijn, Astrid; Albertini, Giorgio

    2005-12-01

    A project was developed for the creation of an Internet-based network aimed at improved management of home care activities in brain-injured children. At the patient's side, a home care unit was provided, made of a portable medical device, and a tablet PC. Measured clinical data were blood oxygen saturation, heart rate, breath rate and quantity of movement. Thanks to device portability, the patient was free to move while measurements were taken. At prescribed time intervals, measured data were automatically transmitted to the tablet PC via Bluetooth. From the tablet PC, data were transmitted remotely to a Service Centre (via ADSL or GPRS) and made available for consultation by health care professionals through the project Web portal. At the portal, other functionalities were also available, both for patients and families, and for professionals (such as weekly planning agenda, access to relevant information resources, communication tools). Information was delivered for the right participant through a workflow engine. A first trial involving nine patients was performed for two months. At the end, although some improvements were suggested, good acceptance was detected, and 78% of patients and families claimed to be interested in further use of the platform.

  9. Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

    Directory of Open Access Journals (Sweden)

    Zhanyong Tang

    2017-01-01

    Full Text Available Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel Evil-Twin attack detection method based on the received signal strength indicator (RSSI. Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the Wi-Fi signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of a one-off, modest connection delay.

  10. Process Mining for Individualized Behavior Modeling Using Wireless Tracking in Nursing Homes

    Directory of Open Access Journals (Sweden)

    Vicente Traver

    2013-11-01

    Full Text Available The analysis of human behavior patterns is increasingly used for several research fields. The individualized modeling of behavior using classical techniques requires too much time and resources to be effective. A possible solution would be the use of pattern recognition techniques to automatically infer models to allow experts to understand individual behavior. However, traditional pattern recognition algorithms infer models that are not readily understood by human experts. This limits the capacity to benefit from the inferred models. Process mining technologies can infer models as workflows, specifically designed to be understood by experts, enabling them to detect specific behavior patterns in users. In this paper, the eMotiva process mining algorithms are presented. These algorithms filter, infer and visualize workflows. The workflows are inferred from the samples produced by an indoor location system that stores the location of a resident in a nursing home. The visualization tool is able to compare and highlight behavior patterns in order to facilitate expert understanding of human behavior. This tool was tested with nine real users that were monitored for a 25-week period. The results achieved suggest that the behavior of users is continuously evolving and changing and that this change can be measured, allowing for behavioral change detection.

  11. Process Mining for Individualized Behavior Modeling Using Wireless Tracking in Nursing Homes

    Science.gov (United States)

    Fernández-Llatas, Carlos; Benedi, José-Miguel; García-Gómez, Juan M.; Traver, Vicente

    2013-01-01

    The analysis of human behavior patterns is increasingly used for several research fields. The individualized modeling of behavior using classical techniques requires too much time and resources to be effective. A possible solution would be the use of pattern recognition techniques to automatically infer models to allow experts to understand individual behavior. However, traditional pattern recognition algorithms infer models that are not readily understood by human experts. This limits the capacity to benefit from the inferred models. Process mining technologies can infer models as workflows, specifically designed to be understood by experts, enabling them to detect specific behavior patterns in users. In this paper, the eMotiva process mining algorithms are presented. These algorithms filter, infer and visualize workflows. The workflows are inferred from the samples produced by an indoor location system that stores the location of a resident in a nursing home. The visualization tool is able to compare and highlight behavior patterns in order to facilitate expert understanding of human behavior. This tool was tested with nine real users that were monitored for a 25-week period. The results achieved suggest that the behavior of users is continuously evolving and changing and that this change can be measured, allowing for behavioral change detection. PMID:24225907

  12. Acceptability Among Community Healthcare Nurses of Intelligent Wireless Sensor-system Technology for the Rapid Detection of Health Issues in Home-dwelling Older Adults.

    Science.gov (United States)

    Cohen, Christine; Kampel, Thomas; Verloo, Henk

    2017-01-01

    The effective care and support of community healthcare nurses (CHNs) contribute greatly to the healthy aging of older adults living at home. Integrating innovative technologies into CHNs' daily practice offers new opportunities and perspectives for early detection of health issues and interventions among home-dwelling older adults. To explore the perception of acceptability among CHNs of an intelligent wireless sensor system (IWSS) for use in daily practice for the detection of health issues in home-dwelling older adults receiving home healthcare. Descriptive and qualitative data were sourced from a pilot randomized controlled trial involving 17 CHNs using an IWSS in their daily practice to rapidly detect falls and other health issues in patients' homes. IWSS alerts indicating behavior changes were sent to CHNs. Their perceived usefulness (PU) and perceived ease of use (PEOU) were assessed. The acceptability of IWSS technology was explored using a questionnaire and focus group discussions. The PU and PEOU of the IWSS technology were low to moderate. A majority of the CHNs were dissatisfied with its performance and intrusiveness; they reported multiple obstacles in the usefulness and ease of use of the IWSS technology in daily practice. To improve the IWSS technology's low to moderate acceptability among CHNs, we recommend a more user-centered implementation strategy and an embedded model of nursing care.

  13. Evaporometer | A Wireless Mesh of Open-Source Rainfall/Evaporation Gauge and Sensor Suite for In Situ Near-Real-Time Environmental Data

    Science.gov (United States)

    Kwon, M.; Lopez Alcala, J. M.; DeBell, T. C.; Udell, C.; Selker, J. S.

    2017-12-01

    Access to in situ near real-time environmental sensor data in remote locations provides invaluable utility in the fields of agricultural and environmental sciences. For studies where data needs to be gathered frequently, it could be costly and dangerous to take numerous trips into the field to collect this information and to inspect multitudes of distributed devices to ensure proper operation. One solution is to develop remote sensors capable of transmitting data and status updates (like battery level) over long distances from unserviced locations to a receiver hub to be accessed in near real-time online. The Openly Published Environmental Sensing Lab at Oregon State University (OPEnS Lab) produced a low-cost Open Source environmental sensing station called the Evaporometer that collects data at precisely timed intervals including rainfall amount, rate of evaporation, temperature, humidity and light (IR and Visible spectra), while CO2 and other sensors are also being evaluated for inclusion. This project focuses on the development and deployment of the prototype Evaporometer in HJ Andrew's Experimental Forest located in Blue River Oregon. The Evaporometer was designed for efficiency and succeeds in systematically collecting environmental data in hard to reach places over long periods of time. A real time clock interrupt enables the device to enter and exit "sleep mode", allowing Evaporometers to remain in the field over long periods of time and controlling the how frequently data should be collected. A load cell measures the weight of collected water in a container. This container is tightly packed with a fiberglass wick, which draws water from the bottom to the surface for efficient evaporation. A siphon has been designed into the container to prevent any possible water overflow situations and lost collected rainfall. All data collection and transmission processes are handled by an Adafruit Feather development board equipped with a long range, low power wireless

  14. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  15. Cumulus Humilis: Wireless Mesh Networking for Gliders

    NARCIS (Netherlands)

    Baardman, Roel; Meratnia, Nirvana

    Digital communication between gliders would be beneficial because exchange of information has the potential to provide insight not only to the pilot but also other pilots and people on the ground. However, such a communication does not exist. In this paper we present a solution for the exchange of

  16. Energy-efficient wireless mesh networks

    CSIR Research Space (South Africa)

    Ntlatlapa, N

    2007-06-01

    Full Text Available   result   energy  consumption   must   be   minimized   while  achieving   high   throughput   and   low   delay.   In  this context, we are engaged in various projects  to   design   transmission   stratergy   to   minimize  the...   that   large  numbers  of  people  rely on a single telephone line. These characteristics make it difficult to provide  public   telecommunication   services  of   acceptable  quality by traditional means at  affordable prices,  while...

  17. Spherical geodesic mesh generation

    Energy Technology Data Exchange (ETDEWEB)

    Fung, Jimmy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kenamond, Mark Andrew [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Burton, Donald E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Shashkov, Mikhail Jurievich [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-02-27

    In ALE simulations with moving meshes, mesh topology has a direct influence on feature representation and code robustness. In three-dimensional simulations, modeling spherical volumes and features is particularly challenging for a hydrodynamics code. Calculations on traditional spherical meshes (such as spin meshes) often lead to errors and symmetry breaking. Although the underlying differencing scheme may be modified to rectify this, the differencing scheme may not be accessible. This work documents the use of spherical geodesic meshes to mitigate solution-mesh coupling. These meshes are generated notionally by connecting geodesic surface meshes to produce triangular-prismatic volume meshes. This mesh topology is fundamentally different from traditional mesh topologies and displays superior qualities such as topological symmetry. This work describes the geodesic mesh topology as well as motivating demonstrations with the FLAG hydrocode.

  18. Next-generation wireless technologies 4G and beyond

    CERN Document Server

    Chilamkurti, Naveen; Chaouchi, Hakima

    2013-01-01

    This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet o

  19. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  20. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  1. Home

    Directory of Open Access Journals (Sweden)

    Rokeya Sakhawat Hossain

    2012-11-01

    Full Text Available A fiery feminist piece that argues that Indian women are all homeless; animals have homes but Indian women have none, because they have to depend on the mercy of their "keepers"; therefore, Indian women live a life worse than animals.

  2. Evaluation of the impact of furniture on communications performance for ubiquitous deployment of Wireless Sensor Networks in smart homes.

    Science.gov (United States)

    Bleda, Andrés L; Jara, Antonio J; Maestre, Rafael; Santa, Guadalupe; Gómez Skarmeta, Antonio F

    2012-01-01

    The extensions of the environment with the integration of sensing systems in any space, in conjunction with ubiquitous computing are enabling the so-called Smart Space Sensor Networks. This new generation of networks are offering full connectivity with any object, through the Internet of Things (IoT) and/or the Web, i.e., the Web of Things. These connectivity capabilities are making it feasible to sense the behaviours of people at home and act accordingly. These sensing systems must be integrated within typical elements found at home such as furniture. For that reason, this work considers furniture as an interesting element for the transparent location of sensors. Furniture is a ubiquitous object, i.e., it can be found everywhere at home or the office, and it can integrate and hide the sensors of a network. This work addresses the lack of an exhaustive study of the effect of furniture on signal losses. In addition an easy-to-use tool for estimating the robustness of the communication channel among the sensor nodes and gateways is proposed. Specifically, the losses in a sensor network signal due to the materials found within the communication link are evaluated. Then, this work proposes a software tool that gathers the obtained results and is capable of evaluating the impact of a given set of materials on the communications. This tool also provides a mechanism to optimize the sensor network deployments during the definition of smart spaces. Specifically, it provides information such as: maximum distances between sensor nodes, most suitable type of furniture to integrate sensors, or battery life of sensor nodes. This tool has been validated empirically in the lab, and it is currently being used by several enterprise partners of the Technological Centre of Furniture and Wood in the southeast of Spain.

  3. Evaluation of the Impact of Furniture on Communications Performance for Ubiquitous Deployment of Wireless Sensor Networks in Smart Homes

    Science.gov (United States)

    Bleda, Andrés L.; Jara, Antonio J.; Maestre, Rafael; Santa, Guadalupe; Gómez Skarmeta, Antonio F.

    2012-01-01

    The extensions of the environment with the integration of sensing systems in any space, in conjunction with ubiquitous computing are enabling the so-called Smart Space Sensor Networks. This new generation of networks are offering full connectivity with any object, through the Internet of Things (IoT) and/or the Web, i.e., the Web of Things. These connectivity capabilities are making it feasible to sense the behaviours of people at home and act accordingly. These sensing systems must be integrated within typical elements found at home such as furniture. For that reason, this work considers furniture as an interesting element for the transparent location of sensors. Furniture is a ubiquitous object, i.e., it can be found everywhere at home or the office, and it can integrate and hide the sensors of a network. This work addresses the lack of an exhaustive study of the effect of furniture on signal losses. In addition an easy-to-use tool for estimating the robustness of the communication channel among the sensor nodes and gateways is proposed. Specifically, the losses in a sensor network signal due to the materials found within the communication link are evaluated. Then, this work proposes a software tool that gathers the obtained results and is capable of evaluating the impact of a given set of materials on the communications. This tool also provides a mechanism to optimize the sensor network deployments during the definition of smart spaces. Specifically, it provides information such as: maximum distances between sensor nodes, most suitable type of furniture to integrate sensors, or battery life of sensor nodes. This tool has been validated empirically in the lab, and it is currently being used by several enterprise partners of the Technological Centre of Furniture and Wood in the southeast of Spain. PMID:22778653

  4. Evaluation of the Impact of Furniture on Communications Performance for Ubiquitous Deployment of Wireless Sensor Networks in Smart Homes

    Directory of Open Access Journals (Sweden)

    Antonio F. Gómez Skarmeta

    2012-05-01

    Full Text Available The extensions of the environment with the integration of sensing systems in any space, in conjunction with ubiquitous computing are enabling the so-called Smart Space Sensor Networks. This new generation of networks are offering full connectivity with any object, through the Internet of Things (IoT and/or the Web, i.e., the Web of Things. These connectivity capabilities are making it feasible to sense the behaviours of people at home and act accordingly. These sensing systems must be integrated within typical elements found at home such as furniture. For that reason, this work considers furniture as an interesting element for the transparent location of sensors. Furniture is a ubiquitous object, i.e., it can be found everywhere at home or the office, and it can integrate and hide the sensors of a network. This work addresses the lack of an exhaustive study of the effect of furniture on signal losses. In addition an easy-to-use tool for estimating the robustness of the communication channel among the sensor nodes and gateways is proposed. Specifically, the losses in a sensor network signal due to the materials found within the communication link are evaluated. Then, this work proposes a software tool that gathers the obtained results and is capable of evaluating the impact of a given set of materials on the communications. This tool also provides a mechanism to optimize the sensor network deployments during the definition of smart spaces. Specifically, it provides information such as: maximum distances between sensor nodes, most suitable type of furniture to integrate sensors, or battery life of sensor nodes. This tool has been validated empirically in the lab, and it is currently being used by several enterprise partners of the Technological Centre of Furniture and Wood in the southeast of Spain.

  5. Evaluation of the impact of furniture on communications performance for ubiquitous deployment of wireless sensor networks in smart homes

    OpenAIRE

    Bleda A.L.; Jara A.J.; Maestre R.; Santa G.; Gomez Skarmeta A.F.

    2012-01-01

    The extensions of the environment with the integration of sensing systems in any space, in conjunction with ubiquitous computing are enabling the so-called Smart Space Sensor Networks. This new generation of networks are offering full connectivity with any object, through the Internet of Things (IoT) and/or the Web, i.e., the Web of Things. These connectivity capabilities are making it feasible to sense the behaviours of people at home and act accordingly. These sensing s...

  6. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  7. Wireless communications networks for the smart grid

    CERN Document Server

    Ho, Quang-Dung; Rajalingham, Gowdemy; Le-Ngoc, Tho

    2014-01-01

    This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open research opportunities of the SGCN are addressed. Wireless Communications Networks for Smart Grid provi

  8. Work in progress: a channel selection algorithm for a TVWS mesh network

    CSIR Research Space (South Africa)

    Zlobinsky, Natasha

    2016-09-01

    Full Text Available and routing for throughput optimization in multi-radio wireless mesh networks,” Proc. 11th Annu. Int. Conf. Mob. Comput. Netw. - MobiCom ’05, p. 58, 2005. [4] M. R. Rai, S. Vahid, and K. Moessner, “SINR based Topology Control for Multihop Wireless Networks...

  9. Solution adaptive mesh using moving mesh method

    International Nuclear Information System (INIS)

    Tilak, A.S.; Tong, A.Y.; Liao, G.

    2004-01-01

    This work deals with mesh adaptation strategy to enhance the accuracy of numerical solution of partial differential equations. This was achieved economically by employing the Moving Grid Finite Difference Method. The method was reformulated as first order div-curl system. This system was then solved using the Least Square Finite Element method (LSFEM). The reformulation of the method has two desirable effects. Firstly, it eliminates the expensive gradient computation in the original method and secondly it allows the method to be employed for mesh adaptation with dynamic boundaries. A 2-D general finite element code implementing the mesh adaptation method based on LSFEM, capable of analyzing self-adjoint problems in elasticity and heat transfer with variety of boundary conditions, sources or sinks was developed and thoroughly validated. The code was used to analyze and adapt mesh for problems in heat transfer and elasticity. The method was found to perform satisfactorily in all test cases. (author)

  10. Developing wireless sensor networks for monitoring crop canopy temperature using a moving sprinkler system as a platform

    Science.gov (United States)

    The objectives of this study were to characterize wireless sensor nodes that we developed in terms of power consumption and functionality, and compare the performance of mesh and non-mesh wireless sensor networks (WSNs) comprised mainly of infrared thermometer thermocouples located on a center pivot...

  11. Application opportunities in wireless communications. Final report

    International Nuclear Information System (INIS)

    Abbott, R.E.; Blevins, R.P.; Olmstead, C.

    1998-07-01

    This report presents the results of examinations of wireless technologies and applications that may offer potential to utilities. Five different wireless technology areas are reviewed. Three areas--Communication Networks, Monitored Security Services, and Home Automation--potentially represent new business ventures for utilities. Two areas--Automatic Vehicle Location and Automated Field-Force Management--represent wireless applications with potential for reduced operating costs and improved customer relations

  12. Design and security of small wireless network

    OpenAIRE

    Žižka, Ladislav

    2012-01-01

    This thesis deals with design and security of small wireless network. Main goal of the thesis is home network design and choice of optimal solution of wireless security. The thesis has four parts. The first part describes computer networks and network components in theory. Next part deals with network design, choosing of network components and setting of them. It also describes some functionalities of alternative firmware DD-WRT. The third part presents common wireless security and network an...

  13. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  14. Performance Evaluation of Coded Meshed Networks

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Pedersen, Morten Videbæk

    2013-01-01

    of the former to enhance the gains of the latter. We first motivate our work through measurements in WiFi mesh networks. Later, we compare state-of-the-art approaches, e.g., COPE, RLNC, to CORE. Our measurements show the higher reliability and throughput of CORE over other schemes, especially, for asymmetric......We characterize the performance of intra- and inter-session network coding (NC) in wireless networks using real-life implementations. We compare this performance to a recently developed hybrid approach, called CORE, which combines intra- and inter-session NC exploiting the code structure...

  15. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  16. Hernia Surgical Mesh Implants

    Science.gov (United States)

    ... knitted mesh or non-knitted sheet forms. The synthetic materials used can be absorbable, non-absorbable or a combination of absorbable and non-absorbable materials. Animal-derived mesh are made of animal tissue, such as intestine or skin, that has been processed and disinfected to be ...

  17. Urogynecologic Surgical Mesh Implants

    Science.gov (United States)

    ... knitted mesh or non-knitted sheet forms. The synthetic materials used can be either absorbable, non-absorbable, or a combination of absorbable and non-absorbable materials. Animal-derived mesh are made of animal tissue, such as intestine or skin, that have been processed and disinfected to be ...

  18. Polygon mesh processing

    CERN Document Server

    Botsch, Mario; Pauly, Mark; Alliez, Pierre; Levy, Bruno

    2010-01-01

    Geometry processing, or mesh processing, is a fast-growing area of research that uses concepts from applied mathematics, computer science, and engineering to design efficient algorithms for the acquisition, reconstruction, analysis, manipulation, simulation, and transmission of complex 3D models. Applications of geometry processing algorithms already cover a wide range of areas from multimedia, entertainment, and classical computer-aided design, to biomedical computing, reverse engineering, and scientific computing. Over the last several years, triangle meshes have become increasingly popular,

  19. Geometrically Consistent Mesh Modification

    KAUST Repository

    Bonito, A.

    2010-01-01

    A new paradigm of adaptivity is to execute refinement, coarsening, and smoothing of meshes on manifolds with incomplete information about their geometry and yet preserve position and curvature accuracy. We refer to this collectively as geometrically consistent (GC) mesh modification. We discuss the concept of discrete GC, show the failure of naive approaches, and propose and analyze a simple algorithm that is GC and accuracy preserving. © 2010 Society for Industrial and Applied Mathematics.

  20. Connected vehicle insights : fourth generation wireless - vehicle and highway gateways to the cloud.

    Science.gov (United States)

    2011-12-01

    This paper examines next generation wide-area cellular such as fourth generation (4G) will be able to support vehicular applications, and how transportation infrastructure may mesh with wireless networks. : This report is part of the Connected Vehicl...

  1. Technologies for Home Networking

    DEFF Research Database (Denmark)

    A broad overview of the home networking field, ranging from wireless technologies to practical applications. In the future, it is expected that private networks (e.g. home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP...

  2. HomePort

    DEFF Research Database (Denmark)

    Madsen, Per Printz

    2009-01-01

    In the last couple of year's computer based home control systems are getting more and more common in modern homes. For instance these systems take care of light control, heat control and security systems.  The latest trend is to use wireless communication like Z-Wave and ZigBee to interconnect di...

  3. Documentation for MeshKit - Reactor Geometry (&mesh) Generator

    Energy Technology Data Exchange (ETDEWEB)

    Jain, Rajeev [Argonne National Lab. (ANL), Argonne, IL (United States); Mahadevan, Vijay [Argonne National Lab. (ANL), Argonne, IL (United States)

    2015-09-30

    This report gives documentation for using MeshKit’s Reactor Geometry (and mesh) Generator (RGG) GUI and also briefly documents other algorithms and tools available in MeshKit. RGG is a program designed to aid in modeling and meshing of complex/large hexagonal and rectilinear reactor cores. RGG uses Argonne’s SIGMA interfaces, Qt and VTK to produce an intuitive user interface. By integrating a 3D view of the reactor with the meshing tools and combining them into one user interface, RGG streamlines the task of preparing a simulation mesh and enables real-time feedback that reduces accidental scripting mistakes that could waste hours of meshing. RGG interfaces with MeshKit tools to consolidate the meshing process, meaning that going from model to mesh is as easy as a button click. This report is designed to explain RGG v 2.0 interface and provide users with the knowledge and skills to pilot RGG successfully. Brief documentation of MeshKit source code, tools and other algorithms available are also presented for developers to extend and add new algorithms to MeshKit. RGG tools work in serial and parallel and have been used to model complex reactor core models consisting of conical pins, load pads, several thousands of axially varying material properties of instrumentation pins and other interstices meshes.

  4. Curved mesh generation and mesh refinement using Lagrangian solid mechanics

    Energy Technology Data Exchange (ETDEWEB)

    Persson, P.-O.; Peraire, J.

    2008-12-31

    We propose a method for generating well-shaped curved unstructured meshes using a nonlinear elasticity analogy. The geometry of the domain to be meshed is represented as an elastic solid. The undeformed geometry is the initial mesh of linear triangular or tetrahedral elements. The external loading results from prescribing a boundary displacement to be that of the curved geometry, and the final configuration is determined by solving for the equilibrium configuration. The deformations are represented using piecewise polynomials within each element of the original mesh. When the mesh is sufficiently fine to resolve the solid deformation, this method guarantees non-intersecting elements even for highly distorted or anisotropic initial meshes. We describe the method and the solution procedures, and we show a number of examples of two and three dimensional simplex meshes with curved boundaries. We also demonstrate how to use the technique for local refinement of non-curved meshes in the presence of curved boundaries.

  5. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  6. Advanced numerical methods in mesh generation and mesh adaptation

    Energy Technology Data Exchange (ETDEWEB)

    Lipnikov, Konstantine [Los Alamos National Laboratory; Danilov, A [MOSCOW, RUSSIA; Vassilevski, Y [MOSCOW, RUSSIA; Agonzal, A [UNIV OF LYON

    2010-01-01

    Numerical solution of partial differential equations requires appropriate meshes, efficient solvers and robust and reliable error estimates. Generation of high-quality meshes for complex engineering models is a non-trivial task. This task is made more difficult when the mesh has to be adapted to a problem solution. This article is focused on a synergistic approach to the mesh generation and mesh adaptation, where best properties of various mesh generation methods are combined to build efficiently simplicial meshes. First, the advancing front technique (AFT) is combined with the incremental Delaunay triangulation (DT) to build an initial mesh. Second, the metric-based mesh adaptation (MBA) method is employed to improve quality of the generated mesh and/or to adapt it to a problem solution. We demonstrate with numerical experiments that combination of all three methods is required for robust meshing of complex engineering models. The key to successful mesh generation is the high-quality of the triangles in the initial front. We use a black-box technique to improve surface meshes exported from an unattainable CAD system. The initial surface mesh is refined into a shape-regular triangulation which approximates the boundary with the same accuracy as the CAD mesh. The DT method adds robustness to the AFT. The resulting mesh is topologically correct but may contain a few slivers. The MBA uses seven local operations to modify the mesh topology. It improves significantly the mesh quality. The MBA method is also used to adapt the mesh to a problem solution to minimize computational resources required for solving the problem. The MBA has a solid theoretical background. In the first two experiments, we consider the convection-diffusion and elasticity problems. We demonstrate the optimal reduction rate of the discretization error on a sequence of adaptive strongly anisotropic meshes. The key element of the MBA method is construction of a tensor metric from hierarchical edge

  7. Toward An Unstructured Mesh Database

    Science.gov (United States)

    Rezaei Mahdiraji, Alireza; Baumann, Peter Peter

    2014-05-01

    Unstructured meshes are used in several application domains such as earth sciences (e.g., seismology), medicine, oceanography, cli- mate modeling, GIS as approximate representations of physical objects. Meshes subdivide a domain into smaller geometric elements (called cells) which are glued together by incidence relationships. The subdivision of a domain allows computational manipulation of complicated physical structures. For instance, seismologists model earthquakes using elastic wave propagation solvers on hexahedral meshes. The hexahedral con- tains several hundred millions of grid points and millions of hexahedral cells. Each vertex node in the hexahedrals stores a multitude of data fields. To run simulation on such meshes, one needs to iterate over all the cells, iterate over incident cells to a given cell, retrieve coordinates of cells, assign data values to cells, etc. Although meshes are used in many application domains, to the best of our knowledge there is no database vendor that support unstructured mesh features. Currently, the main tool for querying and manipulating unstructured meshes are mesh libraries, e.g., CGAL and GRAL. Mesh li- braries are dedicated libraries which includes mesh algorithms and can be run on mesh representations. The libraries do not scale with dataset size, do not have declarative query language, and need deep C++ knowledge for query implementations. Furthermore, due to high coupling between the implementations and input file structure, the implementations are less reusable and costly to maintain. A dedicated mesh database offers the following advantages: 1) declarative querying, 2) ease of maintenance, 3) hiding mesh storage structure from applications, and 4) transparent query optimization. To design a mesh database, the first challenge is to define a suitable generic data model for unstructured meshes. We proposed ImG-Complexes data model as a generic topological mesh data model which extends incidence graph model to multi

  8. Patient monitoring using infrastructure-oriented wireless LANs.

    Science.gov (United States)

    Varshney, Upkar

    2006-01-01

    There is considerable interest in using wireless and mobile technologies in patient monitoring in diverse environments including hospitals and nursing homes. However, there has not been much work in determining the requirements of patient monitoring and satisfying these requirements using infrastructure-oriented wireless networks. In this paper, we derive several requirements of patient monitoring and show how infrastructure-oriented wireless LANs, such as versions of IEEE 802.11, can be used to support patient monitoring in diverse environments.

  9. From intraperitoneal onlay mesh repair to preperitoneal onlay mesh repair.

    Science.gov (United States)

    Yang, George Pei Cheung

    2017-05-01

    Laparoscopic repair for ventral and incisional hernias was first reported in the early 1990s. It uses intraperitoneal only mesh placement to achieve a tension-free repair of the hernia. However, in recent years, there has been greater concern about long-term complication involving intraperitoneal mesh placement. Many case reports and case series have found evidence of mesh adhesion, mesh fistulation, and mesh migration into hollow organs including the esophagus, small bowel, and large bowel, resulting in various major acute abdominal events. Subsequent management of these complications may require major surgery that is technically demanding and difficult; in such cases, laparotomy and bowel resection have often been performed. Because of these significant, but not common, adverse events, many surgeons favor open sublay repair for ventral and incisional hernias. Investigators are therefore searching for a laparoscopic approach for ventral and incisional hernias that might overcome the mesh-induced visceral complications seen after intraperitoneal only mesh placement repair. Laparoscopic preperitoneal onlay mesh is one such approach. This article will explore the fundamental of intraperitoneal only mesh placement and its problems, the currently available peritoneal visceral-compatible meshes, and upcoming developments in laparoscopic ventral and incisional hernia repair. The technical details of preperitoneal onlay mesh, as well as its potential advantages and disadvantages, will also be discussed. © 2017 Japan Society for Endoscopic Surgery, Asia Endosurgery Task Force and John Wiley & Sons Australia, Ltd.

  10. Autonomous system for wireless network communication powered by photovoltaic solar energy; Sistema autonomo de comunicacao sem fio em malha alimentado por energia solar fotovoltaica

    Energy Technology Data Exchange (ETDEWEB)

    Alonso, Rafael Herrero

    2009-07-01

    The wireless mesh network communication technology, based on the IEEE802.11 standard, has been a relevant technology solution for wireless networking in the recent years. However, even with the elimination of cables for data communication, the wireless mesh networks have to be connected to a voltage source using an electrical cable that may not be available at the local installation. In this scenario, being Brazil a country located in a tropical zone that receives large annual solar irradiation, the conversion of photons to electricity can be an alternative to eliminate the needs of wiring to the mesh access points. This work contributes to the development of autonomous wireless mesh communication systems powered by solar energy, with easy installation in urban or rural areas. This work also describes its evaluations in aspects such as autonomy, wireless coverage, number of users supported, installation height and throughput. (author)

  11. Implementation of a Low-Cost Energy and Environment Monitoring System Based on a Hybrid Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Dong Sik Kim

    2017-01-01

    Full Text Available A low-cost hybrid wireless sensor network (WSN that utilizes the 917 MHz band Wireless Smart Utility Network (Wi-SUN and a 447 MHz band narrow bandwidth communication network is implemented for electric metering and room temperature, humidity, and CO2 gas measurements. A mesh network connection that is commonly utilized for the Internet of Things (IoT is used for the Wi-SUN under the Contiki OS, and a star connection is used for the narrow bandwidth network. Both a duty-cycling receiver algorithm and a digitally controlled temperature-compensated crystal oscillator algorithm for frequency reference are implemented at the physical layer of the receiver to accomplish low-power and low-cost wireless sensor node design. A two-level temperature-compensation approach, in which first a fixed third-order curve and then a sample-based first-order curve are applied, is proposed using a conventional AT-cut quartz crystal resonator. The developed WSN is installed in a home and provides reliable data collection with low construction complexity and power consumption.

  12. SUPERIMPOSED MESH PLOTTING IN MCNP

    Energy Technology Data Exchange (ETDEWEB)

    J. HENDRICKS

    2001-02-01

    The capability to plot superimposed meshes has been added to MCNP{trademark}. MCNP4C featured a superimposed mesh weight window generator which enabled users to set up geometries without having to subdivide geometric cells for variance reduction. The variance reduction was performed with weight windows on a rectangular or cylindrical mesh superimposed over the physical geometry. Experience with the new capability was favorable but also indicated that a number of enhancements would be very beneficial, particularly a means of visualizing the mesh and its values. The mathematics for plotting the mesh and its values is described here along with a description of other upgrades.

  13. Two-index mathematical model of channels distribution in multichannel mesh networks 802.11

    OpenAIRE

    Lemeshko, Alexandr; Garkusha, Sergey; Abed, Ahmed Hassan

    2012-01-01

    The article introduces a two-index model of the distribution channels in the multiradio multichannel wireless mesh networking (MR-MC WMN) standard IEEE 802.11. The model describes the process of distribution channels in both homogeneous and in heterogeneous MR-MC WMN.

  14. Analysis of achievable capacity in irregularly-placed high performance mesh nodes

    CSIR Research Space (South Africa)

    Olwal, TO

    2012-09-01

    Full Text Available Research has shown that the capacity of the wireless mesh network improves with the increase of number of radio interfaces per node and the multiplicity of the non-overlapping frequency channels. Recently, such high performance nodes (HPNs) have...

  15. On Optimal Bilinear Quadrilateral Meshes

    Energy Technology Data Exchange (ETDEWEB)

    D' Azevedo, E

    2000-03-17

    The novelty of this work is in presenting interesting error properties of two types of asymptotically ''optimal'' quadrilateral meshes for bilinear approximation. The first type of mesh has an error equidistributing property where the maximum interpolation error is asymptotically the same over all elements. The second type has faster than expected ''super-convergence'' property for certain saddle-shaped data functions. The ''superconvergent'' mesh may be an order of magnitude more accurate than the error equidistributing mesh. Both types of mesh are generated by a coordinate transformation of a regular mesh of squares. The coordinate transformation is derived by interpreting the Hessian matrix of a data function as a metric tensor. The insights in this work may have application in mesh design near corner or point singularities.

  16. Performance Evaluation of a Routing Protocol in Wireless Sensor Network

    National Research Council Canada - National Science Library

    Cheng Kiat Amos, Teo

    2005-01-01

    ... and have topologies engineered. As such, recent research into wireless sensor networks has attracted great interest due to its diversity of applications, ranging in areas such as home, health, environmental and military applications...

  17. A road map for wireless mesh routing with DSA

    CSIR Research Space (South Africa)

    Maliwatu, R

    2016-09-01

    Full Text Available of Secondary Access to TV White Spaces Using Cognitive Radio, In 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011, pages 1–6, Houston, TX, 2011. [4] Amit Kumar and David Lloyd Johnson. White Space Communication: advances...

  18. Dynamic power control for wireless backbone mesh networks: a survey

    CSIR Research Space (South Africa)

    Olwal, TO

    2010-01-01

    Full Text Available that there is a limited battery power available at each node but each user demands unlimited utility satisfaction, effective and efficient power control strategies ought to be in place [55]. These strategies may be designed to achieve user oriented quality... (i.e., throughput and delay) [69]. Methods from control theory have been used to analyse the dynamical effects and to design appropriate control strategies (e.g., [8]). The basic block Network Protocols and Algorithms ISSN 1943-3581 2010, Vol. 2...

  19. Scalable power selection method for wireless mesh networks

    CSIR Research Space (South Africa)

    Olwal, TO

    2009-01-01

    Full Text Available transmission under the protocol interference model (PIM). Parameters ρ , ed , and MaxTR are the path-loss exponent, transmission distance, the maximum transmission range, respectively for link Ee∈ . Proof for equation (16) can easily be shown by extending...) 12 / eeEe ωωω =∈ . (20) From equations (11), (18) and (20) the notations Ee∈γ and Ee∈ω are respectively, the target QoS threshold and the network priority based non-negative weighting...

  20. Notes on the Mesh Handler and Mesh Data Conversion

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sang Yong; Park, Chan Eok [Korea Power Engineering Company, Daejeon (Korea, Republic of)

    2009-10-15

    At the outset of the development of the thermal-hydraulic code (THC), efforts have been made to utilize the recent technology of the computational fluid dynamics. Among many of them, the unstructured mesh approach was adopted to alleviate the restriction of the grid handling system. As a natural consequence, a mesh handler (MH) has been developed to manipulate the complex mesh data from the mesh generator. The mesh generator, Gambit, was chosen at the beginning of the development of the code. But a new mesh generator, Pointwise, was introduced to get more flexible mesh generation capability. An open source code, Paraview, was chosen as a post processor, which can handle unstructured as well as structured mesh data. Overall data processing system for THC is shown in Figure-1. There are various file formats to save the mesh data in the permanent storage media. A couple of dozen of file formats are found even in the above mentioned programs. A competent mesh handler should have the capability to import or export mesh data as many as possible formats. But, in reality, there are two aspects that make it difficult to achieve the competence. The first aspect to consider is the time and efforts to program the interface code. And the second aspect, which is even more difficult one, is the fact that many mesh data file formats are proprietary information. In this paper, some experience of the development of the format conversion programs will be presented. File formats involved are Gambit neutral format, Ansys-CFX grid file format, VTK legacy file format, Nastran format and CGNS.

  1. Notes on the Mesh Handler and Mesh Data Conversion

    International Nuclear Information System (INIS)

    Lee, Sang Yong; Park, Chan Eok

    2009-01-01

    At the outset of the development of the thermal-hydraulic code (THC), efforts have been made to utilize the recent technology of the computational fluid dynamics. Among many of them, the unstructured mesh approach was adopted to alleviate the restriction of the grid handling system. As a natural consequence, a mesh handler (MH) has been developed to manipulate the complex mesh data from the mesh generator. The mesh generator, Gambit, was chosen at the beginning of the development of the code. But a new mesh generator, Pointwise, was introduced to get more flexible mesh generation capability. An open source code, Paraview, was chosen as a post processor, which can handle unstructured as well as structured mesh data. Overall data processing system for THC is shown in Figure-1. There are various file formats to save the mesh data in the permanent storage media. A couple of dozen of file formats are found even in the above mentioned programs. A competent mesh handler should have the capability to import or export mesh data as many as possible formats. But, in reality, there are two aspects that make it difficult to achieve the competence. The first aspect to consider is the time and efforts to program the interface code. And the second aspect, which is even more difficult one, is the fact that many mesh data file formats are proprietary information. In this paper, some experience of the development of the format conversion programs will be presented. File formats involved are Gambit neutral format, Ansys-CFX grid file format, VTK legacy file format, Nastran format and CGNS

  2. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  3. One-to-one embedding between honeycomb mesh and Petersen-Torus networks.

    Science.gov (United States)

    Seo, Jung-Hyun; Sim, Hyun; Park, Dae-Heon; Park, Jang-Woo; Lee, Yang-Sun

    2011-01-01

    As wireless mobile telecommunication bases organize their structure using a honeycomb-mesh algorithm, there are many studies about parallel processing algorithms like the honeycomb mesh in Wireless Sensor Networks. This paper aims to study the Peterson-Torus graph algorithm in regard to the continuity with honeycomb-mesh algorithm in order to apply the algorithm to sensor networks. Once a new interconnection network is designed, parallel algorithms are developed with huge research costs to use such networks. If the old network is embedded in a newly designed network, a developed algorithm in the old network is reusable in a newly designed network. Petersen-Torus has been designed recently, and the honeycomb mesh has already been designed as a well-known interconnection network. In this paper, we propose a one-to-one embedding algorithm for the honeycomb mesh (HMn) in the Petersen-Torus PT(n,n), and prove that dilation of the algorithm is 5, congestion is 2, and expansion is 5/3. The proposed one-to-one embedding is applied so that processor throughput can be minimized when the honeycomb mesh algorithm runs in the Petersen-Torus.

  4. An Adaptive Mesh Algorithm: Mesh Structure and Generation

    Energy Technology Data Exchange (ETDEWEB)

    Scannapieco, Anthony J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-06-21

    The purpose of Adaptive Mesh Refinement is to minimize spatial errors over the computational space not to minimize the number of computational elements. The additional result of the technique is that it may reduce the number of computational elements needed to retain a given level of spatial accuracy. Adaptive mesh refinement is a computational technique used to dynamically select, over a region of space, a set of computational elements designed to minimize spatial error in the computational model of a physical process. The fundamental idea is to increase the mesh resolution in regions where the physical variables are represented by a broad spectrum of modes in k-space, hence increasing the effective global spectral coverage of those physical variables. In addition, the selection of the spatially distributed elements is done dynamically by cyclically adjusting the mesh to follow the spectral evolution of the system. Over the years three types of AMR schemes have evolved; block, patch and locally refined AMR. In block and patch AMR logical blocks of various grid sizes are overlaid to span the physical space of interest, whereas in locally refined AMR no logical blocks are employed but locally nested mesh levels are used to span the physical space. The distinction between block and patch AMR is that in block AMR the original blocks refine and coarsen entirely in time, whereas in patch AMR the patches change location and zone size with time. The type of AMR described herein is a locally refi ned AMR. In the algorithm described, at any point in physical space only one zone exists at whatever level of mesh that is appropriate for that physical location. The dynamic creation of a locally refi ned computational mesh is made practical by a judicious selection of mesh rules. With these rules the mesh is evolved via a mesh potential designed to concentrate the nest mesh in regions where the physics is modally dense, and coarsen zones in regions where the physics is modally

  5. The Economic and Risk Constraints in the Feasibility Analysis of Wireless Communications in Marine Corps Combat Operation Centers

    Science.gov (United States)

    2013-09-01

    41  A.  SWOT ANALYSIS WIRELESS VS WIRED COC...Ravichandiran and Vaithiyanathan (2009) give great templates for a table of a SWOT analysis on Wi-Fi, Wi-Fi mesh, and WiMAX technologies along with a comparison...ECONOMIC ANALYSIS OF USMC EXISTING WIRED COC VS. WIRELESS A. SWOT ANALYSIS WIRELESS VS WIRED COC 1. Wired COC This section will analyze the Marine

  6. Surface meshing with curvature convergence

    KAUST Repository

    Li, Huibin

    2014-06-01

    Surface meshing plays a fundamental role in graphics and visualization. Many geometric processing tasks involve solving geometric PDEs on meshes. The numerical stability, convergence rates and approximation errors are largely determined by the mesh qualities. In practice, Delaunay refinement algorithms offer satisfactory solutions to high quality mesh generations. The theoretical proofs for volume based and surface based Delaunay refinement algorithms have been established, but those for conformal parameterization based ones remain wide open. This work focuses on the curvature measure convergence for the conformal parameterization based Delaunay refinement algorithms. Given a metric surface, the proposed approach triangulates its conformal uniformization domain by the planar Delaunay refinement algorithms, and produces a high quality mesh. We give explicit estimates for the Hausdorff distance, the normal deviation, and the differences in curvature measures between the surface and the mesh. In contrast to the conventional results based on volumetric Delaunay refinement, our stronger estimates are independent of the mesh structure and directly guarantee the convergence of curvature measures. Meanwhile, our result on Gaussian curvature measure is intrinsic to the Riemannian metric and independent of the embedding. In practice, our meshing algorithm is much easier to implement and much more efficient. The experimental results verified our theoretical results and demonstrated the efficiency of the meshing algorithm. © 2014 IEEE.

  7. A Solution Based on Bluetooth Low Energy for Smart Home Energy Management

    OpenAIRE

    Collotta, Mario; Pau, Giovanni

    2015-01-01

    The research and the implementation of home automation are getting more popular because the Internet of Things holds promise for making homes smarter through wireless technologies. The installation of systems based on wireless networks can play a key role also in the extension of the smart grid towards smart homes, that can be deemed as one of the most important components of smart grids. This paper proposes a fuzzy-based solution for smart energy management in a home automation wireless netw...

  8. Reactor building indoor wireless network channel quality estimation using RSSI measurement of wireless sensor network

    International Nuclear Information System (INIS)

    Merat, S.

    2008-01-01

    Expanding wireless communication network reception inside reactor buildings (RB) and service wings (SW) has always been a technical challenge for operations service team. This is driven by the volume of metal equipment inside the Reactor Buildings (RB) that blocks and somehow shields the signal throughout the link. In this study, to improve wireless reception inside the Reactor Building (RB), an experimental model using indoor localization mesh based on IEEE 802.15 is developed to implement a wireless sensor network. This experimental model estimates the distance between different nodes by measuring the RSSI (Received Signal Strength Indicator). Then by using triangulation and RSSI measurement, the validity of the estimation techniques is verified to simulate the physical environmental obstacles, which block the signal transmission. (author)

  9. Granting silence to avoid wireless collisions

    KAUST Repository

    Choi, Jung Il

    2010-10-01

    We describe grant-to-send, a novel collision avoidance algorithm for wireless mesh networks. Rather than announce packets it intends to send, a node using grant-to-send announces packets it expects to hear others send. We present evidence that inverting collision avoidance in this way greatly improves wireless mesh performance. Evaluating four protocols from 802.11 meshes and 802.15.4 sensor networks, we find that grant-to-send matches or outperforms CSMA and RTS/CTS in all cases. For example, in a 4-hop UDP flow, grantto- send can achieve 96% of the theoretical maximum throughput while maintaining a 99.9% packet delivery ratio. Grant-tosend is also general enough to replace protocol-specific collision avoidance mechanisms common to sensor network protocols. Grant-to-send is simple. For example, incorporating it into 802.11 requires only 11 lines of driver code and no hardware changes. Furthermore, as it reuses existing 802.11 mechanisms, grant-to-send inter-operates with current networks and can be incrementally deployed. © 2010 IEEE.

  10. Quadrilateral finite element mesh coarsening

    Science.gov (United States)

    Staten, Matthew L; Dewey, Mark W; Benzley, Steven E

    2012-10-16

    Techniques for coarsening a quadrilateral mesh are described. These techniques include identifying a coarsening region within the quadrilateral mesh to be coarsened. Quadrilateral elements along a path through the coarsening region are removed. Node pairs along opposite sides of the path are identified. The node pairs along the path are then merged to collapse the path.

  11. Energy management in wireless cellular and ad-hoc networks

    CERN Document Server

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios

    2016-01-01

    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  12. Fog-harvesting Mesh Surfaces

    Science.gov (United States)

    Park, Kyoo-Chul; Chhatre, Shreerang S.; Srinivasan, Siddarth; Cohen, Robert E.; McKinley, Gareth H.

    2012-11-01

    Fog represents a large, untapped source of potable water, especially in arid climates. Various plants and animals use morphological as well as chemical features on their surfaces to harvest this precious resource. In this work, we investigate the influence of surface wettability, structural length scale, and relative openness of the weave on the fog harvesting ability of mesh surfaces. We choose simple woven meshes as a canonical family of model permeable surfaces due to the ability to systematically vary periodicity, porosity, mechanical robustness and ease of fabrication. We measure the fog collecting capacity of a set of meshes with a directed aqueous aerosol stream to simulate a natural foggy environment. Further, we strive to develop and test appropriate scalings and correlations that quantify the collection of water on the mesh surfaces. These design rules can be deployed as an a priori design chart for designing optimal performance meshes for given environmental/operating conditions.

  13. Measurement campaign on connectivity of mesh networks formed by mobile devices

    DEFF Research Database (Denmark)

    Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo

    2007-01-01

    This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...... some statistics of the size of the mesh network and type of constituent nodes. This information is essential for analyzing and devising cooperative strategies among the terminals of mesh networks in different scenarios....... networks. The results represent typically worst-case situations, as more and more people tend to switch off their short-range technology due to the battery consumption and the possible attacks. We explore typical public places like airports, convention centers, shopping malls and bars and extract from them...

  14. Measurement campaign on connectivity of mesh networks formed by mobile devices

    DEFF Research Database (Denmark)

    Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo

    2007-01-01

    This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...... networks. The results represent typically worst-case situations, as more and more people tend to switch off their short-range technology due to the battery consumption and the possible attacks. We explore typical public places like airports, convention centers, shopping malls and bars and extract from them...... some statistics of the size of the mesh network and type of constituent nodes. This information is essential for analyzing and devising cooperative strategies among the terminals of mesh networks in different scenarios....

  15. A Wireless Sensor Enabled by Wireless Power

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-01-01

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network. PMID:23443370

  16. A Wireless Sensor Enabled by Wireless Power

    Directory of Open Access Journals (Sweden)

    Da-Sheng Lee

    2012-11-01

    Full Text Available Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  17. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  18. Ocean modeling on unstructured meshes

    Science.gov (United States)

    Danilov, S.

    2013-09-01

    Unstructured meshes are common in coastal modeling, but still rarely used for modeling the large-scale ocean circulation. Existing and new projects aim at changing this situation by proposing models enabling a regional focus (multiresolution) in global setups, without nesting and open boundaries. Among them, finite-volume models using the C-grid discretization on Voronoi-centroidal meshes or cell-vertex quasi-B-grid discretization on triangular meshes work well and offer the multiresolution functionality at a price of being 2 to 4 times slower per degree of freedom than structured-mesh models. This is already sufficient for many practical tasks and will be further improved as the number of vertical layers is increased. Approaches based on the finite-element method, both used or proposed, are as a rule slower at present. Most of staggered discretizations on triangular or Voronoi meshes allow spurious modes which are difficult to filter on unstructured meshes. The ongoing research seeks how to handle them and explores new approaches where such modes are absent. Issues of numerical efficiency and accurate transport schemes are still important, and the question on parameterizations for multiresolution meshes is hardly explored at all. The review summarizes recent developments the main practical result of which is the emergence of multiresolution models for simulating large-scale ocean circulation.

  19. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Many wireless technologies are already available for sensor applications. It is inevitable that many non-interoperable wireless technologies between 400 MHz and 5.8...

  20. Mesh Adaptation and Shape Optimization on Unstructured Meshes, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — In this SBIR CRM proposes to implement the entropy adjoint method for solution adaptive mesh refinement into the Loci/CHEM unstructured flow solver. The scheme will...

  1. Wireless Sensor Networks Framework for Indoor Temperature Regulation

    DEFF Research Database (Denmark)

    Stojkoska, Biljana; Popovska Avramova, Andrijana

    2013-01-01

    Wireless Sensor Networks take a major part in our everyday lives by enhancing systems for home automation, health-care, temperature control, energy consumption monitoring etc. In this paper we focus on a system used for temperature regulation for homes, educational, industrial, commercial premises...

  2. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  3. An Analysis of Hardware Requirements for Airborne Tactical Mesh Networking Nodes

    Science.gov (United States)

    2005-03-01

    Saddle River , NJ: Prentice Hall, 2004), 68. 4 appropriate mesh routing protocols will discover other nodes similarly enabled within radio range and...Professional operating system with the Optimal Link State Routing (OLSR) mesh routing protocol over Proxim ORiNOCO 802.lla/b/g ComboCard wireless Ethernet...of the PCM-9373, the Proxim ORiNOCO 802.lla/b/g ComboCards used in TNT-I would have to be replaced with older Proxim ORiNOCO Gold cards which are only

  4. Mersiline mesh in premaxillary augmentation.

    Science.gov (United States)

    Foda, Hossam M T

    2005-01-01

    Premaxillary retrusion may distort the aesthetic appearance of the columella, lip, and nasal tip. This defect is characteristically seen in, but not limited to, patients with cleft lip nasal deformity. This study investigated 60 patients presenting with premaxillary deficiencies in which Mersiline mesh was used to augment the premaxilla. All the cases had surgery using the external rhinoplasty technique. Two methods of augmentation with Mersiline mesh were used: the Mersiline roll technique, for the cases with central symmetric deficiencies, and the Mersiline packing technique, for the cases with asymmetric deficiencies. Premaxillary augmentation with Mersiline mesh proved to be simple technically, easy to perform, and not associated with any complications. Periodic follow-up evaluation for a mean period of 32 months (range, 12-98 months) showed that an adequate degree of premaxillary augmentation was maintained with no clinically detectable resorption of the mesh implant.

  5. GENERATION OF IRREGULAR HEXAGONAL MESHES

    Directory of Open Access Journals (Sweden)

    Vlasov Aleksandr Nikolaevich

    2012-07-01

    Decomposition is performed in a constructive way and, as option, it involves meshless representation. Further, this mapping method is used to generate the calculation mesh. In this paper, the authors analyze different cases of mapping onto simply connected and bi-connected canonical domains. They represent forward and backward mapping techniques. Their potential application for generation of nonuniform meshes within the framework of the asymptotic homogenization theory is also performed to assess and project effective characteristics of heterogeneous materials (composites.

  6. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  7. Method and system for mesh network embedded devices

    Science.gov (United States)

    Wang, Ray (Inventor)

    2009-01-01

    A method and system for managing mesh network devices. A mesh network device with integrated features creates an N-way mesh network with a full mesh network topology or a partial mesh network topology.

  8. Bluetooth low energy: wireless connectivity for medical monitoring.

    Science.gov (United States)

    Omre, Alf Helge

    2010-03-01

    Electronic wireless sensors could cut medical costs by enabling physicians to remotely monitor vital signs such as blood pressure, blood glucose, and blood oxygenation while patients remain at home. According to the IDC report "Worldwide Bluetooth Semiconductor 2008-2012 Forecast," published November 2008, a forthcoming radio frequency communication ("wireless connectivity") standard, Bluetooth low energy, will link wireless sensors via radio signals to the 70% of cell phones and computers likely to be fitted with the next generation of Bluetooth wireless technology, leveraging a ready-built infrastructure for data transmission. Analysis of trends indicated by this data can help physicians better manage diseases such as diabetes. The technology also addresses the concerns of cost, compatibility, and interoperability that have previously stalled widespread adoption of wireless technology in medical applications. (c) 2010 Diabetes Technology Society.

  9. Smart Home Energy Management Based on Zigbee

    OpenAIRE

    E.Mallikarjuna

    2015-01-01

    Today organizations use IEEE 802.15&Zigbee to effectively deliver solutions for a variety of areas including consumer electronic device control, energy management and efficiency home and commercial building automation as well as industrial plant management. The smart home energy network has gained widespread attentions due to its flexible integrati- ion into everyday life. This next generation green home system transparently unifies various home appliances smart sensors &wireless communicati...

  10. Connectivity editing for quadrilateral meshes

    KAUST Repository

    Peng, Chihan

    2011-12-01

    We propose new connectivity editing operations for quadrilateral meshes with the unique ability to explicitly control the location, orientation, type, and number of the irregular vertices (valence not equal to four) in the mesh while preserving sharp edges. We provide theoretical analysis on what editing operations are possible and impossible and introduce three fundamental operations to move and re-orient a pair of irregular vertices. We argue that our editing operations are fundamental, because they only change the quad mesh in the smallest possible region and involve the fewest irregular vertices (i.e., two). The irregular vertex movement operations are supplemented by operations for the splitting, merging, canceling, and aligning of irregular vertices. We explain how the proposed high-level operations are realized through graph-level editing operations such as quad collapses, edge flips, and edge splits. The utility of these mesh editing operations are demonstrated by improving the connectivity of quad meshes generated from state-of-art quadrangulation techniques.

  11. Cache-Oblivious Mesh Layouts

    International Nuclear Information System (INIS)

    Yoon, S; Lindstrom, P; Pascucci, V; Manocha, D

    2005-01-01

    We present a novel method for computing cache-oblivious layouts of large meshes that improve the performance of interactive visualization and geometric processing algorithms. Given that the mesh is accessed in a reasonably coherent manner, we assume no particular data access patterns or cache parameters of the memory hierarchy involved in the computation. Furthermore, our formulation extends directly to computing layouts of multi-resolution and bounding volume hierarchies of large meshes. We develop a simple and practical cache-oblivious metric for estimating cache misses. Computing a coherent mesh layout is reduced to a combinatorial optimization problem. We designed and implemented an out-of-core multilevel minimization algorithm and tested its performance on unstructured meshes composed of tens to hundreds of millions of triangles. Our layouts can significantly reduce the number of cache misses. We have observed 2-20 times speedups in view-dependent rendering, collision detection, and isocontour extraction without any modification of the algorithms or runtime applications

  12. Connectivity editing for quadrilateral meshes

    KAUST Repository

    Peng, Chihan

    2011-12-12

    We propose new connectivity editing operations for quadrilateral meshes with the unique ability to explicitly control the location, orientation, type, and number of the irregular vertices (valence not equal to four) in the mesh while preserving sharp edges. We provide theoretical analysis on what editing operations are possible and impossible and introduce three fundamental operations to move and re-orient a pair of irregular vertices. We argue that our editing operations are fundamental, because they only change the quad mesh in the smallest possible region and involve the fewest irregular vertices (i.e., two). The irregular vertex movement operations are supplemented by operations for the splitting, merging, canceling, and aligning of irregular vertices. We explain how the proposed highlevel operations are realized through graph-level editing operations such as quad collapses, edge flips, and edge splits. The utility of these mesh editing operations are demonstrated by improving the connectivity of quad meshes generated from state-of-art quadrangulation techniques. © 2011 ACM.

  13. Intrusion detection and monitoring for wireless networks.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  14. ArduSmartHome

    OpenAIRE

    Sánchez Muñoz, Miguel Ángel

    2017-01-01

    Diseño e implementación de red de sensores inalámbricos para el control domótico de una vivienda basado en Arduino. Design and implementation of a wireless sensor network for home automation control based on Arduino. Disseny i implementació de xarxa de sensors sense fils per al control domòtic d'un habitatge basat en Arduino.

  15. ZigBee wireless sensor network for environmental monitoring system

    Science.gov (United States)

    Chai, Shun-qi; Ji, Lei; Wu, Hong

    2009-11-01

    ZigBee is a new close-up, low-complexity, low-power, low data rate, low-cost wireless networking technology, mainly used for short distance wireless transmission. It is based on IEEE802.15.4 standards, thousands of tiny sensors form a network through mutual coordination to communications. This paper introduces the ZigBee wireless sensor networks in environmental monitoring applications. The hardware design, including microprocessor, data acquisition, antenna and peripheral circuits of the chips, and through software design composed ZigBee mesh network that can make data acquisition and communication. This network has low power consumption, low cost, the effective area is big, and information transfers reliable merits. And have confirmed the network's communication applicability by the Serial Com Assistant, also testified the network have very good pragmatism by the NS2 emulation the network's operation.

  16. Issues in adaptive mesh refinement

    Energy Technology Data Exchange (ETDEWEB)

    Dai, William Wenlong [Los Alamos National Laboratory

    2009-01-01

    In this paper, we present an approach for a patch-based adaptive mesh refinement (AMR) for multi-physics simulations. The approach consists of clustering, symmetry preserving, mesh continuity, flux correction, communications, and management of patches. Among the special features of this patch-based AMR are symmetry preserving, efficiency of refinement, special implementation offlux correction, and patch management in parallel computing environments. Here, higher efficiency of refinement means less unnecessarily refined cells for a given set of cells to be refined. To demonstrate the capability of the AMR framework, hydrodynamics simulations with many levels of refinement are shown in both two- and three-dimensions.

  17. Wireless physical layer security

    OpenAIRE

    Poor, H. Vincent; Schaefer, Rafael F.

    2016-01-01

    Security is a very important issue in the design and use of wireless networks. Traditional methods of providing security in such networks are impractical for some emerging types of wireless networks due to the light computational abilities of some wireless devices [such as radio-frequency identification (RFID) tags, certain sensors, etc.] or to the very large scale or loose organizational structure of some networks. Physical layer security has the potential to address these concerns by taking...

  18. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  19. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  20. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  1. The energy aware smart home

    OpenAIRE

    Jahn, M.; Jentsch, M.; Prause, C.R.; Pramudianto, F.; Al-Akkad, A.; Reiners, R.

    2010-01-01

    In this paper, we present a novel smart home system integrating energy efficiency features. The smart home application is built on top of Hydra, a middleware framework that facilitates the intelligent communication of heterogeneous embedded devices through an overlay P2P network. We interconnect common devices available in private households and integrate wireless power metering plugs to gain access to energy consumption data. These data are used for monitoring and analyzing consumed energy o...

  2. Internet usage and performance analysis of a rural wireless network in Macha, Zambia

    CSIR Research Space (South Africa)

    Johnson, DL

    2010-06-01

    Full Text Available -to-point links, hotspots and wireless mesh networks. Our analysis reveals largely web-based traffic as opposed to the peer-to-peer traffic dominance that one finds in urban areas. Social networking sites receive the most hits, and large file downloads from...

  3. Cognitive Radio-based Home Area Networks

    NARCIS (Netherlands)

    Sarijari, M.A.B.

    2016-01-01

    A future home area network (HAN) is envisaged to consist of a large number of devices that support various applications such as smart grid, security and safety systems, voice call, and video streaming. Most of these home devices are communicating based on various wireless networking technologies

  4. Multigrid for refined triangle meshes

    Energy Technology Data Exchange (ETDEWEB)

    Shapira, Yair

    1997-02-01

    A two-level preconditioning method for the solution of (locally) refined finite element schemes using triangle meshes is introduced. In the isotropic SPD case, it is shown that the condition number of the preconditioned stiffness matrix is bounded uniformly for all sufficiently regular triangulations. This is also verified numerically for an isotropic diffusion problem with highly discontinuous coefficients.

  5. On the Mesh Array for Matrix Multiplication

    OpenAIRE

    Kak, Subhash

    2010-01-01

    This article presents new properties of the mesh array for matrix multiplication. In contrast to the standard array that requires 3n-2 steps to complete its computation, the mesh array requires only 2n-1 steps. Symmetries of the mesh array computed values are presented which enhance the efficiency of the array for specific applications. In multiplying symmetric matrices, the results are obtained in 3n/2+1 steps. The mesh array is examined for its application as a scrambling system.

  6. 6th International Meshing Roundtable '97

    Energy Technology Data Exchange (ETDEWEB)

    White, D.

    1997-09-01

    The goal of the 6th International Meshing Roundtable is to bring together researchers and developers from industry, academia, and government labs in a stimulating, open environment for the exchange of technical information related to the meshing process. In the pas~ the Roundtable has enjoyed significant participation born each of these groups from a wide variety of countries. The Roundtable will consist of technical presentations from contributed papers and abstracts, two invited speakers, and two invited panels of experts discussing topics related to the development and use of automatic mesh generation tools. In addition, this year we will feature a "Bring Your Best Mesh" competition and poster session to encourage discussion and participation from a wide variety of mesh generation tool users. The schedule and evening social events are designed to provide numerous opportunities for informal dialog. A proceedings will be published by Sandia National Laboratories and distributed at the Roundtable. In addition, papers of exceptionally high quaIity will be submitted to a special issue of the International Journal of Computational Geometry and Applications. Papers and one page abstracts were sought that present original results on the meshing process. Potential topics include but are got limited to: Unstructured triangular and tetrahedral mesh generation Unstructured quadrilateral and hexahedral mesh generation Automated blocking and structured mesh generation Mixed element meshing Surface mesh generation Geometry decomposition and clean-up techniques Geometry modification techniques related to meshing Adaptive mesh refinement and mesh quality control Mesh visualization Special purpose meshing algorithms for particular applications Theoretical or novel ideas with practical potential Technical presentations from industrial researchers.

  7. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  8. Mesh network achieve its fuction on Linux

    OpenAIRE

    Pei, Ping; Petrenko, Y. N.

    2015-01-01

    In this paper, we introduce a Mesh network protocol evaluation and development. It has a special protocol. We could easily understand the Linux operation principles which are in use in mesh network. In addition to our comprehension, we describe the graph which shows package routing way. At last according to testing we prove that Mesh protocol AODV satisfy Linux platform performance requirements.

  9. Wireless sensor networks for monitoring physiological signals of multiple patients.

    Science.gov (United States)

    Dilmaghani, R S; Bobarshad, H; Ghavami, M; Choobkar, S; Wolfe, C

    2011-08-01

    This paper presents the design of a novel wireless sensor network structure to monitor patients with chronic diseases in their own homes through a remote monitoring system of physiological signals. Currently, most of the monitoring systems send patients' data to a hospital with the aid of personal computers (PC) located in the patients' home. Here, we present a new design which eliminates the need for a PC. The proposed remote monitoring system is a wireless sensor network with the nodes of the network installed in the patients' homes. These nodes are then connected to a central node located at a hospital through an Internet connection. The nodes of the proposed wireless sensor network are created by using a combination of ECG sensors, MSP430 microcontrollers, a CC2500 low-power wireless radio, and a network protocol called the SimpliciTI protocol. ECG signals are first sampled by a small portable device which each patient carries. The captured signals are then wirelessly transmitted to an access point located within the patients' home. This connectivity is based on wireless data transmission at 2.4-GHz frequency. The access point is also a small box attached to the Internet through a home asynchronous digital subscriber line router. Afterwards, the data are sent to the hospital via the Internet in real time for analysis and/or storage. The benefits of this remote monitoring are wide ranging: the patients can continue their normal lives, they do not need a PC all of the time, their risk of infection is reduced, costs significantly decrease for the hospital, and clinicians can check data in a short time.

  10. User Manual for the PROTEUS Mesh Tools

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Micheal A. [Argonne National Lab. (ANL), Argonne, IL (United States); Shemon, Emily R [Argonne National Lab. (ANL), Argonne, IL (United States)

    2016-09-19

    PROTEUS is built around a finite element representation of the geometry for visualization. In addition, the PROTEUS-SN solver was built to solve the even-parity transport equation on a finite element mesh provided as input. Similarly, PROTEUS-MOC and PROTEUS-NEMO were built to apply the method of characteristics on unstructured finite element meshes. Given the complexity of real world problems, experience has shown that using commercial mesh generator to create rather simple input geometries is overly complex and slow. As a consequence, significant effort has been put into place to create multiple codes that help assist in the mesh generation and manipulation. There are three input means to create a mesh in PROTEUS: UFMESH, GRID, and NEMESH. At present, the UFMESH is a simple way to generate two-dimensional Cartesian and hexagonal fuel assembly geometries. The UFmesh input allows for simple assembly mesh generation while the GRID input allows the generation of Cartesian, hexagonal, and regular triangular structured grid geometry options. The NEMESH is a way for the user to create their own mesh or convert another mesh file format into a PROTEUS input format. Given that one has an input mesh format acceptable for PROTEUS, we have constructed several tools which allow further mesh and geometry construction (i.e. mesh extrusion and merging). This report describes the various mesh tools that are provided with the PROTEUS code giving both descriptions of the input and output. In many cases the examples are provided with a regression test of the mesh tools. The most important mesh tools for any user to consider using are the MT_MeshToMesh.x and the MT_RadialLattice.x codes. The former allows the conversion between most mesh types handled by PROTEUS while the second allows the merging of multiple (assembly) meshes into a radial structured grid. Note that the mesh generation process is recursive in nature and that each input specific for a given mesh tool (such as .axial

  11. 22nd International Meshing Roundtable

    CERN Document Server

    Staten, Matthew

    2014-01-01

    This volume contains the articles presented at the 22nd International Meshing Roundtable (IMR) organized, in part, by Sandia National Laboratories and was held on Oct 13-16, 2013 in Orlando, Florida, USA.  The first IMR was held in 1992, and the conference series has been held annually since.  Each year the IMR brings together researchers, developers, and application experts in a variety of disciplines, from all over the world, to present and discuss ideas on mesh generation and related topics.  The technical papers in this volume present theoretical and novel ideas and algorithms with practical potential, as well as technical applications in science and engineering, geometric modeling, computer graphics and visualization.

  12. 21st International Meshing Roundtable

    CERN Document Server

    Weill, Jean-Christophe

    2013-01-01

    This volume contains the articles presented at the 21st International Meshing Roundtable (IMR) organized, in part, by Sandia National Laboratories and was held on October 7–10, 2012 in San Jose, CA, USA. The first IMR was held in 1992, and the conference series has been held annually since. Each year the IMR brings together researchers, developers, and application experts in a variety of disciplines, from all over the world, to present and discuss ideas on mesh generation and related topics. The technical papers in this volume present theoretical and novel ideas and algorithms with practical potential, as well as technical applications in science and engineering, geometric modeling, computer graphics, and visualization.

  13. Voltammetry at micro-mesh electrodes

    Directory of Open Access Journals (Sweden)

    Wadhawan Jay D.

    2003-01-01

    Full Text Available The voltammetry at three micro-mesh electrodes is explored. It is found that at sufficiently short experimental durations, the micro-mesh working electrode first behaves as an ensemble of microband electrodes, then follows the behaviour anticipated for an array of diffusion-independent micro-ring electrodes of the same perimeter as individual grid-squares within the mesh. During prolonged electrolysis, the micro-mesh electrode follows that behaviour anticipated theoretically for a cubically-packed partially-blocked electrode. Application of the micro-mesh electrode for the electrochemical determination of carbon dioxide in DMSO electrolyte solutions is further illustrated.

  14. On the flexibility of Kokotsakis meshes

    OpenAIRE

    Karpenkov, Oleg

    2008-01-01

    In this paper we study geometric, algebraic, and computational aspects of flexibility and infinitesimal flexibility of Kokotsakis meshes. A Kokotsakis mesh is a mesh that consists of a face in the middle and a certain band of faces attached to the middle face by its perimeter. In particular any 3x3-mesh made of quadrangles is a Kokotsakis mesh. We express the infinitesimal flexibility condition in terms of Ceva and Menelaus theorems. Further we study semi-algebraic properties of the set of fl...

  15. Adaptive Mesh Refinement in CTH

    International Nuclear Information System (INIS)

    Crawford, David

    1999-01-01

    This paper reports progress on implementing a new capability of adaptive mesh refinement into the Eulerian multimaterial shock- physics code CTH. The adaptivity is block-based with refinement and unrefinement occurring in an isotropic 2:1 manner. The code is designed to run on serial, multiprocessor and massive parallel platforms. An approximate factor of three in memory and performance improvements over comparable resolution non-adaptive calculations has-been demonstrated for a number of problems

  16. Wireless sensor networks principles, design and applications

    CERN Document Server

    Yang, Shuang-Hua

    2014-01-01

    Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: ·         sensor node design; ·         embedded software design; ·         routing algorithms; ·         sink node positioning; ·         co-existence with other wireless systems; ·         data fusion; ·         security; ·         indoor location tracking; ·         integrating with radio-frequency identification; and ·         In...

  17. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  18. SHARP/PRONGHORN Interoperability: Mesh Generation

    Energy Technology Data Exchange (ETDEWEB)

    Avery Bingham; Javier Ortensi

    2012-09-01

    Progress toward collaboration between the SHARP and MOOSE computational frameworks has been demonstrated through sharing of mesh generation and ensuring mesh compatibility of both tools with MeshKit. MeshKit was used to build a three-dimensional, full-core very high temperature reactor (VHTR) reactor geometry with 120-degree symmetry, which was used to solve a neutron diffusion critical eigenvalue problem in PRONGHORN. PRONGHORN is an application of MOOSE that is capable of solving coupled neutron diffusion, heat conduction, and homogenized flow problems. The results were compared to a solution found on a 120-degree, reflected, three-dimensional VHTR mesh geometry generated by PRONGHORN. The ability to exchange compatible mesh geometries between the two codes is instrumental for future collaboration and interoperability. The results were found to be in good agreement between the two meshes, thus demonstrating the compatibility of the SHARP and MOOSE frameworks. This outcome makes future collaboration possible.

  19. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  20. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  1. Optical and wireless technologies

    CERN Document Server

    Tiwari, Manish; Singh, Ghanshyam; Minzioni, Paolo

    2018-01-01

    This book presents selected papers from 1st International Conference on Optical and Wireless Technologies, providing insights into the analytical, experimental, and developmental aspects of systems, techniques, and devices in these spheres. It explores the combined use of various optical and wireless technologies in next-generation networking applications, and discusses the latest developments in applications such as photonics, high-speed communication systems and networks, visible light communication, nanophotonics, and wireless and multiple-input-multiple-output (MIMO) systems. The book will serve as a valuable reference resource for academics and researchers across the globe.

  2. Wireless remote monitoring system for sleep apnea

    Science.gov (United States)

    Oh, Sechang; Kwon, Hyeokjun; Varadan, Vijay K.

    2011-04-01

    Sleep plays the important role of rejuvenating the body, especially the central nervous system. However, more than thirty million people suffer from sleep disorders and sleep deprivation. That can cause serious health consequences by increasing the risk of hypertension, diabetes, heart attack and so on. Apart from the physical health risk, sleep disorders can lead to social problems when sleep disorders are not diagnosed and treated. Currently, sleep disorders are diagnosed through sleep study in a sleep laboratory overnight. This involves large expenses in addition to the inconvenience of overnight hospitalization and disruption of daily life activities. Although some systems provide home based diagnosis, most of systems record the sleep data in a memory card, the patient has to face the inconvenience of sending the memory card to a doctor for diagnosis. To solve the problem, we propose a wireless sensor system for sleep apnea, which enables remote monitoring while the patient is at home. The system has 5 channels to measure ECG, Nasal airflow, body position, abdominal/chest efforts and oxygen saturation. A wireless transmitter unit transmits signals with Zigbee and a receiver unit which has two RF modules, Zigbee and Wi-Fi, receives signals from the transmitter unit and retransmits signals to the remote monitoring system with Zigbee and Wi-Fi, respectively. By using both Zigbee and Wi-Fi, the wireless sensor system can achieve a low power consumption and wide range coverage. The system's features are presented, as well as continuous monitoring results of vital signals.

  3. Wireless-accessible sensor populations for monitoring biological variables

    NARCIS (Netherlands)

    Mazzu, Marco; Scalvini, Simonetta; Giordano, A.; Frumento, E.; Wells, Hannah; Lokhorst, C.; Glisenti, Fulvio

    2008-01-01

    The current health-care infrastructure is generally considered to be inadequate to meet the needs of an increasingly older population. We have investigated the feasibility of a passive in-home monitoring system based on wireless accessible sensor populations (WASP). In an EU-funded project we have

  4. Application of Wireless Sensor Networks for Indoor Temperature Regulation

    DEFF Research Database (Denmark)

    Stojkoska, Biljana Risteska; Popovska Avramova, Andrijana; Chatzimisios, Periklis

    2014-01-01

    Wireless sensor networks take a major part in our everyday lives by enhancing systems for home automation, healthcare, temperature control, energy consumption monitoring, and so forth. In this paper we focus on a system used for temperature regulation for residential, educational, industrial...

  5. Synthetic Versus Biological Mesh-Related Erosion After Laparoscopic Ventral Mesh Rectopexy: A Systematic Review.

    Science.gov (United States)

    Balla, Andrea; Quaresima, Silvia; Smolarek, Sebastian; Shalaby, Mostafa; Missori, Giulia; Sileri, Pierpaolo

    2017-04-01

    This review reports the incidence of mesh-related erosion after ventral mesh rectopexy to determine whether any difference exists in the erosion rate between synthetic and biological mesh. A systematic search of the MEDLINE and the Ovid databases was conducted to identify suitable articles published between 2004 and 2015. The search strategy capture terms were laparoscopic ventral mesh rectopexy, laparoscopic anterior rectopexy, robotic ventral rectopexy, and robotic anterior rectopexy. Eight studies (3,956 patients) were included in this review. Of those patients, 3,517 patients underwent laparoscopic ventral rectopexy (LVR) using synthetic mesh and 439 using biological mesh. Sixty-six erosions were observed with synthetic mesh (26 rectal, 32 vaginal, 8 recto-vaginal fistulae) and one (perineal erosion) with biological mesh. The synthetic and the biological mesh-related erosion rates were 1.87% and 0.22%, respectively. The time between rectopexy and diagnosis of mesh erosion ranged from 1.7 to 124 months. No mesh-related mortalities were reported. The incidence of mesh-related erosion after LVR is low and is more common after the placement of synthetic mesh. The use of biological mesh for LVR seems to be a safer option; however, large, multicenter, randomized, control trials with long follow-ups are required if a definitive answer is to be obtained.

  6. Wireless capsule endoscopy

    Science.gov (United States)

    Iddan, Gavriel; Meron, Gavriel; Glukhovsky, Arkady; Swain, Paul

    2000-05-01

    We have developed a new type of endoscopy, which for the first time allows painless endoscopic imaging of the whole of the small bowel. This procedure involves a wireless capsule endoscope and we describe here its successful testing in humans.

  7. SIMULATION OF WIRELESS SENSOR NETWORK WITH HYBRID TOPOLOGY

    Directory of Open Access Journals (Sweden)

    J. Jaslin Deva Gifty

    2016-03-01

    Full Text Available The design of low rate Wireless Personal Area Network (WPAN by IEEE 802.15.4 standard has been developed to support lower data rates and low power consuming application. Zigbee Wireless Sensor Network (WSN works on the network and application layer in IEEE 802.15.4. Zigbee network can be configured in star, tree or mesh topology. The performance varies from topology to topology. The performance parameters such as network lifetime, energy consumption, throughput, delay in data delivery and sensor field coverage area varies depending on the network topology. In this paper, designing of hybrid topology by using two possible combinations such as star-tree and star-mesh is simulated to verify the communication reliability. This approach is to combine all the benefits of two network model. The parameters such as jitter, delay and throughput are measured for these scenarios. Further, MAC parameters impact such as beacon order (BO and super frame order (SO for low power consumption and high channel utilization, has been analysed for star, tree and mesh topology in beacon disable mode and beacon enable mode by varying CBR traffic loads.

  8. Wireless radio a history

    CERN Document Server

    Coe, Lewis

    2006-01-01

    ""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.

  9. Wireless Networks Security

    OpenAIRE

    Jenko, Marko

    2016-01-01

    In this thesis we deal with security, penetration testing and different types of attacks on wireless networks. We theoretically familiarize with the field of wireless networks, security mechanisms and the most used security standards. Then we systematically overview the field of penetration testing. We divide the penetration testing on types and different methodologies. We explain the tasks of the provider and the subscriber in penetration testing. Description of the process of conducting the...

  10. Laparoscopic appendicectomy for suspected mesh-induced appendicitis after laparoscopic transabdominal preperitoneal polypropylene mesh inguinal herniorraphy

    Directory of Open Access Journals (Sweden)

    Jennings Jason

    2010-01-01

    Full Text Available Laparoscopic inguinal herniorraphy via a transabdominal preperitoneal (TAPP approach using Polypropylene Mesh (Mesh and staples is an accepted technique. Mesh induces a localised inflammatory response that may extend to, and involve, adjacent abdominal and pelvic viscera such as the appendix. We present an interesting case of suspected Mesh-induced appendicitis treated successfully with laparoscopic appendicectomy, without Mesh removal, in an elderly gentleman who presented with symptoms and signs of acute appendicitis 18 months after laparoscopic inguinal hernia repair. Possible mechanisms for Mesh-induced appendicitis are briefly discussed.

  11. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  12. Bluetooth Low Energy Mesh Networks: A Survey.

    Science.gov (United States)

    Darroudi, Seyed Mahdi; Gomez, Carles

    2017-06-22

    Bluetooth Low Energy (BLE) has gained significant momentum. However, the original design of BLE focused on star topology networking, which limits network coverage range and precludes end-to-end path diversity. In contrast, other competing technologies overcome such constraints by supporting the mesh network topology. For these reasons, academia, industry, and standards development organizations have been designing solutions to enable BLE mesh networks. Nevertheless, the literature lacks a consolidated view on this emerging area. This paper comprehensively surveys state of the art BLE mesh networking. We first provide a taxonomy of BLE mesh network solutions. We then review the solutions, describing the variety of approaches that leverage existing BLE functionality to enable BLE mesh networks. We identify crucial aspects of BLE mesh network solutions and discuss their advantages and drawbacks. Finally, we highlight currently open issues.

  13. Sierra toolkit computational mesh conceptual model

    International Nuclear Information System (INIS)

    Baur, David G.; Edwards, Harold Carter; Cochran, William K.; Williams, Alan B.; Sjaardema, Gregory D.

    2010-01-01

    The Sierra Toolkit computational mesh is a software library intended to support massively parallel multi-physics computations on dynamically changing unstructured meshes. This domain of intended use is inherently complex due to distributed memory parallelism, parallel scalability, heterogeneity of physics, heterogeneous discretization of an unstructured mesh, and runtime adaptation of the mesh. Management of this inherent complexity begins with a conceptual analysis and modeling of this domain of intended use; i.e., development of a domain model. The Sierra Toolkit computational mesh software library is designed and implemented based upon this domain model. Software developers using, maintaining, or extending the Sierra Toolkit computational mesh library must be familiar with the concepts/domain model presented in this report.

  14. Smart homes design, implementation and issues

    CERN Document Server

    Suryadevara, Nagender Kumar

    2015-01-01

    The book addresses issues towards the design and development of Wireless Sensor Network based Smart Home and fusion of Real-Time Data for Wellness Determination of an elderly person living alone in a Smart Home. The fundamentals of selection of sensor, fusion of sensor data, system design, modelling, characterizations, experimental investigations and analyses have been covered. This book will be extremely useful for the engineers and researchers especially higher undergraduate, postgraduate students as well as practitioners working on the development of Wireless Sensor Networks, Internet of Things and Data Mining.

  15. Floating shock fitting via Lagrangian adaptive meshes

    Science.gov (United States)

    Vanrosendale, John

    1995-01-01

    In recent work we have formulated a new approach to compressible flow simulation, combining the advantages of shock-fitting and shock-capturing. Using a cell-centered on Roe scheme discretization on unstructured meshes, we warp the mesh while marching to steady state, so that mesh edges align with shocks and other discontinuities. This new algorithm, the Shock-fitting Lagrangian Adaptive Method (SLAM), is, in effect, a reliable shock-capturing algorithm which yields shock-fitted accuracy at convergence.

  16. Unstructured Polyhedral Mesh Thermal Radiation Diffusion

    International Nuclear Information System (INIS)

    Palmer, T.S.; Zika, M.R.; Madsen, N.K.

    2000-01-01

    Unstructured mesh particle transport and diffusion methods are gaining wider acceptance as mesh generation, scientific visualization and linear solvers improve. This paper describes an algorithm that is currently being used in the KULL code at Lawrence Livermore National Laboratory to solve the radiative transfer equations. The algorithm employs a point-centered diffusion discretization on arbitrary polyhedral meshes in 3D. We present the results of a few test problems to illustrate the capabilities of the radiation diffusion module

  17. Unstructured mesh adaptivity for urban flooding modelling

    Science.gov (United States)

    Hu, R.; Fang, F.; Salinas, P.; Pain, C. C.

    2018-05-01

    Over the past few decades, urban floods have been gaining more attention due to their increase in frequency. To provide reliable flooding predictions in urban areas, various numerical models have been developed to perform high-resolution flood simulations. However, the use of high-resolution meshes across the whole computational domain causes a high computational burden. In this paper, a 2D control-volume and finite-element flood model using adaptive unstructured mesh technology has been developed. This adaptive unstructured mesh technique enables meshes to be adapted optimally in time and space in response to the evolving flow features, thus providing sufficient mesh resolution where and when it is required. It has the advantage of capturing the details of local flows and wetting and drying front while reducing the computational cost. Complex topographic features are represented accurately during the flooding process. For example, the high-resolution meshes around the buildings and steep regions are placed when the flooding water reaches these regions. In this work a flooding event that happened in 2002 in Glasgow, Scotland, United Kingdom has been simulated to demonstrate the capability of the adaptive unstructured mesh flooding model. The simulations have been performed using both fixed and adaptive unstructured meshes, and then results have been compared with those published 2D and 3D results. The presented method shows that the 2D adaptive mesh model provides accurate results while having a low computational cost.

  18. Meshes optimized for discrete exterior calculus (DEC).

    Energy Technology Data Exchange (ETDEWEB)

    Mousley, Sarah C. [Univ. of Illinois, Urbana-Champaign, IL (United States); Deakin, Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Knupp, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mitchell, Scott A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-12-01

    We study the optimization of an energy function used by the meshing community to measure and improve mesh quality. This energy is non-traditional because it is dependent on both the primal triangulation and its dual Voronoi (power) diagram. The energy is a measure of the mesh's quality for usage in Discrete Exterior Calculus (DEC), a method for numerically solving PDEs. In DEC, the PDE domain is triangulated and this mesh is used to obtain discrete approximations of the continuous operators in the PDE. The energy of a mesh gives an upper bound on the error of the discrete diagonal approximation of the Hodge star operator. In practice, one begins with an initial mesh and then makes adjustments to produce a mesh of lower energy. However, we have discovered several shortcomings in directly optimizing this energy, e.g. its non-convexity, and we show that the search for an optimized mesh may lead to mesh inversion (malformed triangles). We propose a new energy function to address some of these issues.

  19. Parallel adaptive simulations on unstructured meshes

    International Nuclear Information System (INIS)

    Shephard, M S; Jansen, K E; Sahni, O; Diachin, L A

    2007-01-01

    This paper discusses methods being developed by the ITAPS center to support the execution of parallel adaptive simulations on unstructured meshes. The paper first outlines the ITAPS approach to the development of interoperable mesh, geometry and field services to support the needs of SciDAC application in these areas. The paper then demonstrates the ability of unstructured adaptive meshing methods built on such interoperable services to effectively solve important physics problems. Attention is then focused on ITAPs' developing ability to solve adaptive unstructured mesh problems on massively parallel computers

  20. Home education

    OpenAIRE

    Beck, Christian W.

    2013-01-01

    Home Education seems to be a successful way to educate. Academic results and socialization processes in home education are promising. Already home education is global, home educators everywhere educate their children themselves without schools. They develop new forms of local and international co-operation. Is home education an impulse to a renewing of modern education? Is home education globalization otherwise?

  1. SIRI on your wrist: making your home smart

    OpenAIRE

    Ojuroye, Olivia; Wilde, Adriana

    2015-01-01

    The adoption of smart devices in the homes is on the increase. There are tangible benefits for those making the leap, such as increased independence and improved quality of life. This project addresses these issues with the development of a two-part proof-of-concept system for smart home dwellers, consisting of a flexible wearable wristband device that communicates wirelessly with a voice-activated home hub, which, in a future version of this project, would increase accessibility in the home ...

  2. Biologic mesh versus synthetic mesh in open inguinal hernia repair: system review and meta-analysis.

    Science.gov (United States)

    Fang, Zhixue; Ren, Feng; Zhou, Jianping; Tian, Jiao

    2015-12-01

    Biologic meshes are mostly used for abdominal wall reinforcement in infected fields, but no consensus has been reached on its use for inguinal hernia repairing. The purpose of this study was to compare biologic mesh with synthetic mesh in open inguinal herniorrhaphy. A systematic literature review and meta-analysis was undertaken to identify studies comparing the outcomes of biologic mesh and synthetic mesh in open inguinal hernia repair. Published studies were identified by the databases PubMed, EMBASE and the Cochrane Library. A total of 382 patients in five randomized controlled trials were reviewed (179 patients in biologic mesh group; 203 patients in synthetic mesh group). The two groups did not significantly differ in chronic groin pain (P = 0.06) or recurrence (P = 0.38). The incidence of seroma trended higher in biologic mesh group (P = 0.03). Operating time was significantly longer with biologic mesh (P = 0.03). There was no significant difference in hematomas (P = 0.23) between the two groups. From the data of this study, biologic mesh had no superiority to synthetic mesh in open inguinal hernia repair with similar recurrence rates and incidence of chronic groin pain, but higher rate of seroma and longer operating time. However, this mesh still needs to be assessed in a large, multicentre, well-designed randomized controlled trial. © 2015 Royal Australasian College of Surgeons.

  3. Tensile Behaviour of Welded Wire Mesh and Hexagonal Metal Mesh for Ferrocement Application

    Science.gov (United States)

    Tanawade, A. G.; Modhera, C. D.

    2017-08-01

    Tension tests were conducted on welded mesh and hexagonal Metal mesh. Welded Mesh is available in the market in different sizes. The two types are analysed viz. Ø 2.3 mm and Ø 2.7 mm welded mesh, having opening size 31.75 mm × 31.75 mm and 25.4 mm × 25.4 mm respectively. Tensile strength test was performed on samples of welded mesh in three different orientations namely 0°, 30° and 45° degrees with the loading axis and hexagonal Metal mesh of Ø 0.7 mm, having opening 19.05 × 19.05 mm. Experimental tests were conducted on samples of these meshes. The objective of this study was to investigate the behaviour of the welded mesh and hexagonal Metal mesh. The result shows that the tension load carrying capacity of welded mesh of Ø 2.7 mm of 0° orientation is good as compared to Ø2.3 mm mesh and ductility of hexagonal Metal mesh is good in behaviour.

  4. Unstructured mesh based elastic wave modelling on GPU: a double-mesh grid method

    Science.gov (United States)

    Yang, Kai; Zhang, Jianfeng; Gao, Hongwei

    2017-11-01

    We present an unstructured mesh based numerical technique for modelling elastic wave propagation in heterogeneous media with complex geometrical settings. The scheme is developed by adapting the so-called grid method with a double-mesh implementation. The double-mesh is generated by subdividing each triangular grid of the first-level mesh into a group of congruent smaller grids with equally dividing each edge of the triangle. The resulting double-mesh grid method incorporates the advantages of structured- and unstructured-mesh schemes. The irregular, unstructured first-level mesh, which is generated by centroidal Voronoi tessellation based on Delaunay triangulation with a velocity-dependent density function, can accurately describe the surface topography and interfaces, and the size of the grid cells can vary according to local velocities. Congruent smaller grids within each grid cell of the first-level mesh greatly reduce the memory requirement of geometrical coefficients compared to a whole irregular, unstructured mesh. Applying the double-mesh approach can also alleviate the discontinuity of memory accessing mainly caused by adoption of fully unstructured mesh. As a result, the GPU implementation of the proposed scheme can obtain a high speedup rate. Numerical examples demonstrate the good behaviour of the double-mesh elastic grid method.

  5. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  6. EXPERIMENTAL PERFORMANCE ANALYSIS OF WIRELESS ...

    African Journals Online (AJOL)

    ABSTRACT. Wireless networking is currently being deployed for various applications. However, the application of wireless networking in healthcare remains a challenge mainly because of security and reliability concerns. This paper presents experimental results of performance analysis of a wireless network for healthcare ...

  7. Cooperative networking in a heterogeneous wireless medium

    CERN Document Server

    Ismail, Muhammad

    2013-01-01

    This brief focuses on radio resource allocation in a heterogeneous wireless medium. It presents radio resource allocation algorithms with decentralized implementation, which support both single-network and multi-homing services. The brief provides a set of cooperative networking algorithms, which rely on the concepts of short-term call traffic load prediction, network cooperation, convex optimization, and decomposition theory. In the proposed solutions, mobile terminals play an active role in the resource allocation operation, instead of their traditional role as passive service recipients in the networking environment.

  8. Adaptive mesh refinement in titanium

    Energy Technology Data Exchange (ETDEWEB)

    Colella, Phillip; Wen, Tong

    2005-01-21

    In this paper, we evaluate Titanium's usability as a high-level parallel programming language through a case study, where we implement a subset of Chombo's functionality in Titanium. Chombo is a software package applying the Adaptive Mesh Refinement methodology to numerical Partial Differential Equations at the production level. In Chombo, the library approach is used to parallel programming (C++ and Fortran, with MPI), whereas Titanium is a Java dialect designed for high-performance scientific computing. The performance of our implementation is studied and compared with that of Chombo in solving Poisson's equation based on two grid configurations from a real application. Also provided are the counts of lines of code from both sides.

  9. Converting skeletal structures to quad dominant meshes

    DEFF Research Database (Denmark)

    Bærentzen, Jakob Andreas; Misztal, Marek Krzysztof; Welnicka, Katarzyna

    2012-01-01

    We propose the Skeleton to Quad-dominant polygonal Mesh algorithm (SQM), which converts skeletal structures to meshes composed entirely of polar and annular regions. Both types of regions have a regular structure where all faces are quads except for a single ring of triangles at the center of eac...

  10. Parallel mesh management using interoperable tools.

    Energy Technology Data Exchange (ETDEWEB)

    Tautges, Timothy James (Argonne National Laboratory); Devine, Karen Dragon

    2010-10-01

    This presentation included a discussion of challenges arising in parallel mesh management, as well as demonstrated solutions. They also described the broad range of software for mesh management and modification developed by the Interoperable Technologies for Advanced Petascale Simulations (ITAPS) team, and highlighted applications successfully using the ITAPS tool suite.

  11. 7th International Meshing Roundtable '98

    Energy Technology Data Exchange (ETDEWEB)

    Eldred, T.J.

    1998-10-01

    The goal of the 7th International Meshing Roundtable is to bring together researchers and developers from industry, academia, and government labs in a stimulating, open environment for the exchange of technical information related to the meshing process. In the past, the Roundtable has enjoyed significant participation from each of these groups from a wide variety of countries.

  12. Laparoscopic Pelvic Floor Repair Using Polypropylene Mesh

    Directory of Open Access Journals (Sweden)

    Shih-Shien Weng

    2008-09-01

    Conclusion: Laparoscopic pelvic floor repair using a single piece of polypropylene mesh combined with uterosacral ligament suspension appears to be a feasible procedure for the treatment of advanced vaginal vault prolapse and enterocele. Fewer mesh erosions and postoperative pain syndromes were seen in patients who had no previous pelvic floor reconstructive surgery.

  13. Wrinkling prediction with adaptive mesh refinement

    NARCIS (Netherlands)

    Selman, A.; Meinders, Vincent T.; van den Boogaard, Antonius H.; Huetink, Han

    2000-01-01

    An adaptive mesh refinement procedure for wrinkling prediction analyses is presented. First the critical values are determined using Hutchinson’s bifurcation functional. A wrinkling risk factor is then defined and used to determined areas of potential wrinkling risk. Finally, a mesh refinement is

  14. A Comparative Study of Navigation Meshes

    NARCIS (Netherlands)

    van Toll, W.G.; Triesscheijn, Roy; Kallmann, Marcelo; Oliva, Ramon; Pelechano, Nuria; Pettré, Julien; Geraerts, R.J.

    2016-01-01

    A navigation mesh is a representation of a 2D or 3D virtual environment that enables path planning and crowd simulation for walking characters. Various state-of-the-art navigation meshes exist, but there is no standardized way of evaluating or comparing them. Each implementation is in a different

  15. Fiber wireless networks

    Science.gov (United States)

    Nirmalathas, A.; Bakaul, M.; Lim, C.; Novak, D.; Waterhouse, R.

    2005-11-01

    Broadband wireless networks based on a number of new frequency windows at higher microwave and millimeter-wave frequencies have been actively pursued to provide ultra-high bandwidth services over a wireless networks. These networks will have a large number of antenna base-stations with high throughput. Significant reductions in antenna base-station complexity can be achieved if most of the signal routing and switching functions centralized at a central office in the network. In such a network, fiber feed networks can be effectively deployed to provide high bandwidth interconnections between multiple antenna base-stations and the central office. With wavelength division multiplexing, efficient optical fiber feed network architectures could be realised to provide interconnection to a large number of antenna base-stations. In this paper, we present an over view of our recent research into system technologies for fiber wireless networks.

  16. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  17. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  18. Wireless communications algorithmic techniques

    CERN Document Server

    Vitetta, Giorgio; Colavolpe, Giulio; Pancaldi, Fabrizio; Martin, Philippa A

    2013-01-01

    This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It focuses on single user systems, so ignoring multiple access techniques. Moreover, emphasis is put on single-input single-output (SISO) systems, although some relevant topics about multiple-input multiple-output (MIMO) systems are also illustrated.Comprehensive wireless specific guide to algorithmic techniquesProvides a detailed analysis of channel equalization and channel coding for wi

  19. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  20. Wireless optical telecommunications

    CERN Document Server

    Bouchet, Olivier

    2013-01-01

    Wireless optical communication refers to communication based on the unguided propagation of optical waves. The past 30 years have seen significant improvements in this technique - a wireless communication solution for the current millennium - that offers an alternative to radio systems; a technique that could gain attractiveness due to recent concerns regarding the potential effects of radiofrequency waves on human health.The aim of this book is to look at the free space optics that are already used for the exchange of current information; its many benefits, such as incorporating chan

  1. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  2. Priority image transmission in wireless sensor networks

    International Nuclear Information System (INIS)

    Nasri, M.; Helali, A.; Sghaier, H.; Maaref, H.

    2011-01-01

    The emerging technology during the last years allowed the development of new sensors equipped with wireless communication which can be organized into a cooperative autonomous network. Some application areas for wireless sensor networks (WSNs) are home automations, health care services, military domain, and environment monitoring. The required constraints are limited capacity of processing, limited storage capability, and especially these nodes are limited in energy. In addition, such networks are tiny battery powered which their lifetime is very limited. During image processing and transmission to the destination, the lifetime of sensor network is decreased quickly due to battery and processing power constraints. Therefore, digital image transmissions are a significant challenge for image sensor based Wireless Sensor Networks (WSNs). Based on a wavelet image compression, we propose a novel, robust and energy-efficient scheme, called Priority Image Transmission (PIT) in WSN by providing various priority levels during image transmissions. Different priorities in the compressed image are considered. The information for the significant wavelet coeffcients are transmitted with higher quality assurance, whereas relatively less important coefficients are transmitted with lower overhead. Simulation results show that the proposed scheme prolongs the system lifetime and achieves higher energy efficiency in WSN with an acceptable compromise on the image quality.

  3. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  4. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  5. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  6. Resource management in wireless networking

    CERN Document Server

    Cardei, Mihaela; Du, Ding-Zhu

    2005-01-01

    This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.Survey chapters give an excellent introduction to key topics in resource management for wireless networks, while experts will be satisfied by the technical depth of the knowledge imparted in chapters exploring hot research topics.The subject area discussed in this book is very relevant today, considering the recent remarkable growth of wireless networking and the convergence of wireless personal communications, internet technologies and real-time multimedia.This volume is a very good companion for practitioners working on implementing solutions for multimedia and Quality of Service - sensitive applications over wireless networks.Written for:Researchers, faculty members, students...

  7. Using digital watermarking to enhance security in wireless medical image transmission.

    Science.gov (United States)

    Giakoumaki, Aggeliki; Perakis, Konstantinos; Banitsas, Konstantinos; Giokas, Konstantinos; Tachakra, Sapal; Koutsouris, Dimitris

    2010-04-01

    During the last few years, wireless networks have been increasingly used both inside hospitals and in patients' homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.

  8. Secure wireless embedded systems via component-based design

    DEFF Research Database (Denmark)

    Hjorth, T.; Torbensen, R.

    2010-01-01

    This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure applications through verified, reusable software. Following this method we propose a security framework with a secure...... communication component for distributed wireless embedded devices. The components communicate using the Secure Embedded Exchange Protocol (SEEP), which has been designed for flexible trust establishment so that small, resource-constrained, wireless embedded systems are able to communicate short command messages......, with full support for confidentiality, authentication, and integrity using keypairs. The approach has been demonstrated in a multi-platform home automation prototype that can remotely unlock a door using a PDA over the Internet....

  9. A randomized controlled experimental study comparing chitosan coated polypropylene mesh and Proceed™ mesh for abdominal wall defect closure

    Directory of Open Access Journals (Sweden)

    S.T. Jayanth

    2015-12-01

    Conclusion: Chitosan coated polypropylene mesh was found to have similar efficacy to Proceed™ mesh. Chitosan coated polypropylene mesh, can act as an anti adhesive barrier when used in the repair of incisional hernias and abdominal wall defects.

  10. Designing a Portable and Low Cost Home Energy Management Toolkit

    NARCIS (Netherlands)

    Keyson, D.V.; Al Mahmud, A.; De Hoogh, M.; Luxen, R.

    2013-01-01

    In this paper we describe the design of a home energy and comfort management system. The system has three components such as a smart plug with a wireless module, a residential gateway and a mobile app. The combined system is called a home energy management and comfort toolkit. The design is inspired

  11. Opening the Home. A Web Service Approach to Domotics

    NARCIS (Netherlands)

    Aiello, Marco; Marchese, Maurizio; Busetta, Paolo; Calabrese, Gaetano

    2004-01-01

    The pervasiveness of smart appliances in the home, the increase of computational power of traditional home appliances, and the widespread adoption of wireless networking are creating a unique opportunity in domotics. The challenge lies in moving from a set of isolated devices towards a network of

  12. Wireless Distributed Antenna MIMO

    DEFF Research Database (Denmark)

    2015-01-01

    The present disclosure relates to system applications of multicore optical fibers. One embodiment relates to a base transceiver station for a wireless telecommunication system comprising a plurality of antenna units arranged in a MIMO configuration and adapted for transmission and/or reception...

  13. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  14. Wireless Remote Control System

    Directory of Open Access Journals (Sweden)

    Adrian Tigauan

    2012-06-01

    Full Text Available This paper presents the design of a wireless remote control system based on the ZigBee communication protocol. Gathering data from sensors or performing control tasks through wireless communication is advantageous in situations in which the use of cables is impractical. An Atmega328 microcontroller (from slave device is used for gathering data from the sensors and transmitting it to a coordinator device with the help of the XBee modules. The ZigBee standard is suitable for low-cost, low-data-rate and low-power wireless networks implementations. The XBee-PRO module, designed to meet ZigBee standards, requires minimal power for reliable data exchange between devices over a distance of up to 1600m outdoors. A key component of the ZigBee protocol is the ability to support networking and this can be used in a wireless remote control system. This system may be employed e.g. to control temperature and humidity (SHT11 sensor and light intensity (TSL230 sensor levels inside a commercial greenhouse.

  15. Subsurface Wireless Sensor Networks

    Science.gov (United States)

    Niemeier, J. J.; Davies, J. L.; Kruger, A.

    2008-12-01

    Conventional thinking holds that underground- and underwater radio communication is not possible, except at very low frequencies employing very long antennas and high transmit power. However, researchers at The University of Iowa have demonstrated that using inexpensive, low-power radios, it is in fact possible to achieve reliable underground radio communication over distances of several meters. This allows for creating underground wireless sensor networks. A proof-of-concept network was established at The University of Iowa, where nodes that measure soil moisture content are buried over a 20×20 m area (up to 1 m deep). The nodes organize themselves into a wireless sensor network, reconfigure routes as radio link quality waxes and wanes, cooperate in routing data packets to a surface base station, and so on. In an agricultural research setting, an advantage of such buried wireless sensor networks is that, if nodes were buried deep enough, they may be left in place during agricultural field work. Power consumption is an important issue in wireless sensor networks. This is especially true in a buried network where battery replacement is a major undertaking. The focus of continuing research is developing methods of inductively recharging buried sensor batteries.

  16. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  17. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  18. Boundary denoising for open surface meshes

    Science.gov (United States)

    Lee, Wei Zhe; Lim, Wee Keong; Soo, Wooi King

    2013-04-01

    Recently, applications of open surfaces in 3D have emerged to be an interesting research topic due to the popularity of range cameras such as the Microsoft Kinect. However, surface meshes representing such open surfaces are often corrupted with noises especially at the boundary. Such deformity needs to be treated to facilitate further applications such as texture mapping and zippering of multiple open surface meshes. Conventional methods perform denoising by removing components with high frequencies, thus smoothing the boundaries. However, this may result in loss of information, as not all high frequency transitions at the boundaries correspond to noises. To overcome such shortcoming, we propose a combination of local information and geometric features to single out the noises or unusual vertices at the mesh boundaries. The local shape of the selected mesh boundaries regions, characterized by the mean curvature value, is compared with that of the neighbouring interior region. The neighbouring interior region is chosen such that it is the closest to the corresponding boundary region, while curvature evaluation is independent of the boundary. The smoothing processing is done via Laplacian smoothing with our modified weights to reduce boundary shrinkage. The evaluation of the algorithm is done by noisy meshes generated from controlled model clean meshes. The Hausdorff distance is used as the measurement between the meshes. We show that our method produces better results than conventional smoothing of the whole boundary loop.

  19. [CLINICAL EVALUATION OF THE NEW ANTISEPTIC MESHES].

    Science.gov (United States)

    Gogoladze, M; Kiladze, M; Chkhikvadze, T; Jiqia, D

    2016-12-01

    Improving the results of hernia treatment and prevention of complications became a goal of our research which included two parts - experimental and clinical. Histomorphological and bacteriological researches showed that the best result out of the 3 control groups was received in case of covering implant "Coladerm"+ with chlorhexidine. Based on the experiment results working process continued in clinics in order to test and introduce new "coladerm"+ chlorhexidine covered poliprophilene meshes into practice. For clinical illustration there were 60 patients introduced to the research who had hernioplasty procedures by different nets: I group - standard meshes+"coladerm"+chlorhexidine, 35 patients; II group - standard meshes +"coladerm", 15 patients; III group - standard meshes, 10 patients. Assessment of the wound and echo-control was done post-surgery on the 8th, 30th and 90th days. This clinical research based on the experimental results once again showed the best anti-microbe features of new antiseptic polymeric biocomposite meshes (standard meshes+"coladerm"+chlorhexidine); timely termination of regeneration and reparation processes without any post-surgery suppurative complications. We hope that new antiseptic polymeric biocomposite meshes presented by us will be successfully used in surgical practice of hernia treatment based on and supported by expermental-clinical research.

  20. A Bi-directional Energy Splitable Model for Energy Optimization in Wireless Sensor Networks

    OpenAIRE

    Rajeswari, A; Kalaivaani, P.T

    2011-01-01

    Wireless Sensor Networks is a budding  prototype of networking and computing, where a node may be self powered and individual node have the capability to sense and compute and communicate. Wireless Sensor Networks have been proposed for variety of applications such as Industrial control and monitoring and home automation and consumer electronics and security andMilitary sensing, Asset tracking and supply chain management, Intelligent Agriculture, Missile directing, Fire alarming, Landslide Wa...

  1. Fog water collection effectiveness: Mesh intercomparisons

    Science.gov (United States)

    Fernandez, Daniel; Torregrosa, Alicia; Weiss-Penzias, Peter; Zhang, Bong June; Sorensen, Deckard; Cohen, Robert; McKinley, Gareth; Kleingartner, Justin; Oliphant, Andrew; Bowman, Matthew

    2018-01-01

    To explore fog water harvesting potential in California, we conducted long-term measurements involving three types of mesh using standard fog collectors (SFC). Volumetric fog water measurements from SFCs and wind data were collected and recorded in 15-minute intervals over three summertime fog seasons (2014–2016) at four California sites. SFCs were deployed with: standard 1.00 m2 double-layer 35% shade coefficient Raschel; stainless steel mesh coated with the MIT-14 hydrophobic formulation; and FogHa-Tin, a German manufactured, 3-dimensional spacer fabric deployed in two orientations. Analysis of 3419 volumetric samples from all sites showed strong relationships between mesh efficiency and wind speed. Raschel mesh collected 160% more fog water than FogHa-Tin at wind speeds less than 1 m s–1 and 45% less for wind speeds greater than 5 m s–1. MIT-14 coated stainless-steel mesh collected more fog water than Raschel mesh at all wind speeds. At low wind speeds of wind speeds of 4–5 m s–1, it collected 41% more. FogHa-Tin collected 5% more fog water when the warp of the weave was oriented vertically, per manufacturer specification, than when the warp of the weave was oriented horizontally. Time series measurements of three distinct mesh across similar wind regimes revealed inconsistent lags in fog water collection and inconsistent performance. Since such differences occurred under similar wind-speed regimes, we conclude that other factors play important roles in mesh performance, including in-situ fog event and aerosol dynamics that affect droplet-size spectra and droplet-to-mesh surface interactions.

  2. Mesh optimization for microbial fuel cell cathodes constructed around stainless steel mesh current collectors

    KAUST Repository

    Zhang, Fang

    2011-02-01

    Mesh current collectors made of stainless steel (SS) can be integrated into microbial fuel cell (MFC) cathodes constructed of a reactive carbon black and Pt catalyst mixture and a poly(dimethylsiloxane) (PDMS) diffusion layer. It is shown here that the mesh properties of these cathodes can significantly affect performance. Cathodes made from the coarsest mesh (30-mesh) achieved the highest maximum power of 1616 ± 25 mW m-2 (normalized to cathode projected surface area; 47.1 ± 0.7 W m-3 based on liquid volume), while the finest mesh (120-mesh) had the lowest power density (599 ± 57 mW m-2). Electrochemical impedance spectroscopy showed that charge transfer and diffusion resistances decreased with increasing mesh opening size. In MFC tests, the cathode performance was primarily limited by reaction kinetics, and not mass transfer. Oxygen permeability increased with mesh opening size, accounting for the decreased diffusion resistance. At higher current densities, diffusion became a limiting factor, especially for fine mesh with low oxygen transfer coefficients. These results demonstrate the critical nature of the mesh size used for constructing MFC cathodes. © 2010 Elsevier B.V. All rights reserved.

  3. NASA Bluetooth Wireless Communications

    Science.gov (United States)

    Miller, Robert D.

    2007-01-01

    NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.

  4. Markov random fields on triangle meshes

    DEFF Research Database (Denmark)

    Andersen, Vedrana; Aanæs, Henrik; Bærentzen, Jakob Andreas

    2010-01-01

    In this paper we propose a novel anisotropic smoothing scheme based on Markov Random Fields (MRF). Our scheme is formulated as two coupled processes. A vertex process is used to smooth the mesh by displacing the vertices according to a MRF smoothness prior, while an independent edge process labels...... mesh edges according to a feature detecting prior. Since we should not smooth across a sharp feature, we use edge labels to control the vertex process. In a Bayesian framework, MRF priors are combined with the likelihood function related to the mesh formation method. The output of our algorithm...

  5. Engagement of Metal Debris into Gear Mesh

    Science.gov (United States)

    handschuh, Robert F.; Krantz, Timothy L.

    2010-01-01

    A series of bench-top experiments was conducted to determine the effects of metallic debris being dragged through meshing gear teeth. A test rig that is typically used to conduct contact fatigue experiments was used for these tests. Several sizes of drill material, shim stock and pieces of gear teeth were introduced and then driven through the meshing region. The level of torque required to drive the "chip" through the gear mesh was measured. From the data gathered, chip size sufficient to jam the mechanism can be determined.

  6. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.

    Directory of Open Access Journals (Sweden)

    Yan-Ming Lai

    Full Text Available Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN based on tickets. Unfortunately, Li et al.'s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.'s protocol includes the use of high-quality tamper-proof devices (TPDs, and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client's privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay.

  7. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.

    Science.gov (United States)

    Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi

    2016-01-01

    Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.'s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.'s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client's privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay.

  8. Large Scale Environmental Monitoring through Integration of Sensor and Mesh Networks

    Directory of Open Access Journals (Sweden)

    Raja Jurdak

    2008-11-01

    Full Text Available Monitoring outdoor environments through networks of wireless sensors has received interest for collecting physical and chemical samples at high spatial and temporal scales. A central challenge to environmental monitoring applications of sensor networks is the short communication range of the sensor nodes, which increases the complexity and cost of monitoring commodities that are located in geographically spread areas. To address this issue, we propose a new communication architecture that integrates sensor networks with medium range wireless mesh networks, and provides users with an advanced web portal for managing sensed information in an integrated manner. Our architecture adopts a holistic approach targeted at improving the user experience by optimizing the system performance for handling data that originates at the sensors, traverses the mesh network, and resides at the server for user consumption. This holistic approach enables users to set high level policies that can adapt the resolution of information collected at the sensors, set the preferred performance targets for their application, and run a wide range of queries and analysis on both real-time and historical data. All system components and processes will be described in this paper.

  9. Wireless Sensor Networks - Node Localization for Various Industry Problems

    International Nuclear Information System (INIS)

    Derr, Kurt; Manic, Milos

    2015-01-01

    Fast, effective monitoring following airborne releases of toxic substances is critical to mitigate risks to threatened population areas. Wireless sensor nodes at fixed predetermined locations may monitor such airborne releases and provide early warnings to the public. A challenging algorithmic problem is determining the locations to place these sensor nodes while meeting several criteria: 1) provide complete coverage of the domain, and 2) create a topology with problem dependent node densities, while 3) minimizing the number of sensor nodes. This manuscript presents a novel approach to determining optimal sensor placement, Advancing Front mEsh generation with Constrained dElaunay Triangulation and Smoothing (AFECETS) that addresses these criteria. A unique aspect of AFECETS is the ability to determine wireless sensor node locations for areas of high interest (hospitals, schools, high population density areas) that require higher density of nodes for monitoring environmental conditions, a feature that is difficult to find in other research work. The AFECETS algorithm was tested on several arbitrary shaped domains. AFECETS simulation results show that the algorithm 1) provides significant reduction in the number of nodes, in some cases over 40%, compared to an advancing front mesh generation algorithm, 2) maintains and improves optimal spacing between nodes, and 3) produces simulation run times suitable for real-time applications

  10. LR: Compact connectivity representation for triangle meshes

    Energy Technology Data Exchange (ETDEWEB)

    Gurung, T; Luffel, M; Lindstrom, P; Rossignac, J

    2011-01-28

    We propose LR (Laced Ring) - a simple data structure for representing the connectivity of manifold triangle meshes. LR provides the option to store on average either 1.08 references per triangle or 26.2 bits per triangle. Its construction, from an input mesh that supports constant-time adjacency queries, has linear space and time complexity, and involves ordering most vertices along a nearly-Hamiltonian cycle. LR is best suited for applications that process meshes with fixed connectivity, as any changes to the connectivity require the data structure to be rebuilt. We provide an implementation of the set of standard random-access, constant-time operators for traversing a mesh, and show that LR often saves both space and traversal time over competing representations.

  11. Obtuse triangle suppression in anisotropic meshes

    KAUST Repository

    Sun, Feng

    2011-12-01

    Anisotropic triangle meshes are used for efficient approximation of surfaces and flow data in finite element analysis, and in these applications it is desirable to have as few obtuse triangles as possible to reduce the discretization error. We present a variational approach to suppressing obtuse triangles in anisotropic meshes. Specifically, we introduce a hexagonal Minkowski metric, which is sensitive to triangle orientation, to give a new formulation of the centroidal Voronoi tessellation (CVT) method. Furthermore, we prove several relevant properties of the CVT method with the newly introduced metric. Experiments show that our algorithm produces anisotropic meshes with much fewer obtuse triangles than using existing methods while maintaining mesh anisotropy. © 2011 Elsevier B.V. All rights reserved.

  12. Mesh Processing in Medical Image Analysis

    DEFF Research Database (Denmark)

    The following topics are dealt with: mesh processing; medical image analysis; interactive freeform modeling; statistical shape analysis; clinical CT images; statistical surface recovery; automated segmentation; cerebral aneurysms; and real-time particle-based representation....

  13. Pectus excavatum repair using Prolene polypropylene mesh.

    Science.gov (United States)

    Rasihashemi, Seyed Ziaeddin; Ramouz, Ali

    2016-02-01

    We aimed to assess the clinical outcomes of our surgical technique for repair of pectus excavatum using Prolene polypropylene mesh. Among 29 patients with pectus excavatum, the major complaint was cosmetic dissatisfaction, and the main symptom was exercise dyspnea in 15 patients. The Haller index used to assess pectus excavatum severity; it was significant in 22 patients. In all patients, a 2-layer sheet of Prolene polypropylene mesh was placed behind the sternum. No serious complication was observed postoperatively, and all patients were satisfied with the cosmetic result. Mitral valve prolapse improved in all cases after 3 months. Spirometry revealed improved pulmonary function after surgery. With due attention to the advantages of Prolene polypropylene mesh, such as remaining permanently in place, adapting to various stresses encountered in the body, resisting degradation by tissue enzymes, and trimming without unraveling, we concluded that this mesh is suitable for use as posterior sternal support in pectus excavatum patients. © The Author(s) 2016.

  14. Shape space exploration of constrained meshes

    KAUST Repository

    Yang, Yongliang

    2011-12-12

    We present a general computational framework to locally characterize any shape space of meshes implicitly prescribed by a collection of non-linear constraints. We computationally access such manifolds, typically of high dimension and co-dimension, through first and second order approximants, namely tangent spaces and quadratically parameterized osculant surfaces. Exploration and navigation of desirable subspaces of the shape space with regard to application specific quality measures are enabled using approximants that are intrinsic to the underlying manifold and directly computable in the parameter space of the osculant surface. We demonstrate our framework on shape spaces of planar quad (PQ) meshes, where each mesh face is constrained to be (nearly) planar, and circular meshes, where each face has a circumcircle. We evaluate our framework for navigation and design exploration on a variety of inputs, while keeping context specific properties such as fairness, proximity to a reference surface, etc. © 2011 ACM.

  15. Progressive compression of generic surface meshes

    OpenAIRE

    Caillaud , Florian; Vidal , Vincent; Dupont , Florent; Lavoué , Guillaume

    2015-01-01

    International audience; This paper presents a progressive compression method for generic surface meshes (non-manifold and/or polygonal). Two major contributions are proposed : (1) generic edge collapse and vertex split operators allowing surface simplication and renement of a mesh, whatever its connectivity; (2) a distortion-aware collapse clustering strategy that adapts the decima-tion granularity in order to optimize the rate-distortion tradeoff.

  16. Quadrilateral/hexahedral finite element mesh coarsening

    Science.gov (United States)

    Staten, Matthew L; Dewey, Mark W; Scott, Michael A; Benzley, Steven E

    2012-10-16

    A technique for coarsening a finite element mesh ("FEM") is described. This technique includes identifying a coarsening region within the FEM to be coarsened. Perimeter chords running along perimeter boundaries of the coarsening region are identified. The perimeter chords are redirected to create an adaptive chord separating the coarsening region from a remainder of the FEM. The adaptive chord runs through mesh elements residing along the perimeter boundaries of the coarsening region. The adaptive chord is then extracted to coarsen the FEM.

  17. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  18. Integration of hybrid wireless networks in cloud services oriented enterprise information systems

    Science.gov (United States)

    Li, Shancang; Xu, Lida; Wang, Xinheng; Wang, Jue

    2012-05-01

    This article presents a hybrid wireless network integration scheme in cloud services-based enterprise information systems (EISs). With the emerging hybrid wireless networks and cloud computing technologies, it is necessary to develop a scheme that can seamlessly integrate these new technologies into existing EISs. By combining the hybrid wireless networks and computing in EIS, a new framework is proposed, which includes frontend layer, middle layer and backend layers connected to IP EISs. Based on a collaborative architecture, cloud services management framework and process diagram are presented. As a key feature, the proposed approach integrates access control functionalities within the hybrid framework that provide users with filtered views on available cloud services based on cloud service access requirements and user security credentials. In future work, we will implement the proposed framework over SwanMesh platform by integrating the UPnP standard into an enterprise information system.

  19. Unstructured Mesh Movement and Viscous Mesh Generation for CFD-Based Design Optimization Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The innovations proposed are twofold: 1) a robust unstructured mesh movement method able to handle isotropic (Euler), anisotropic (viscous), mixed element (hybrid)...

  20. The finite element method in making up meshes in ANSYS Meshing for CFD models

    Directory of Open Access Journals (Sweden)

    Віктор Іванович Троханяк

    2015-11-01

    Full Text Available Method of finite elements (FEM is used in calculating tasks of hydrodynamics and heat transfer tasks. The essence of the method consists in the approximate solution of a variational task. To formulate this task a functional concept is used. The type of a functional is different for different tasks and is selected through a special choice. Currently FEM is widely used in calculating the strength and in solving tasks of heat transfer in solids. However, it can be applied in calculating the flow of liquids and gases. There are also methods that combine elements of the finite volumes and finite elements methods. The combination of these methods make it possible to use a wide range of computational meshes ( tetragonal meshes, pyramidal meshes, prismatic meshes, polyhedral meshes what is necessary for solving tasks with complex geometry. This approach is used by CFD packages Ansys CFX, Ansys Fluent, Star-CD, Star-CCM +, Comsol and others. The method and the analysis of 2D mesh were carried out, using a method of final elements in ANSYS Meshing for heat exchangers with an inline arrangement of tubes in banks and with their curvilinear arrangement in compact banks of tubes of a new design. Particular features were considered and the algorithm of making up a mesh was developed for tasks of hydraulic and gas dynamics and thermal mass transfer. The most optimum and qualitative meshes for CFD models were chosen

  1. Unstructured Mesh Movement and Viscous Mesh Generation for CFD-Based Design Optimization, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — The innovations proposed are twofold: 1) a robust unstructured mesh movement method able to handle isotropic (Euler), anisotropic (viscous), mixed element (hybrid)...

  2. Automatic Scheme Selection for Toolkit Hex Meshing

    Energy Technology Data Exchange (ETDEWEB)

    TAUTGES,TIMOTHY J.; WHITE,DAVID R.

    1999-09-27

    Current hexahedral mesh generation techniques rely on a set of meshing tools, which when combined with geometry decomposition leads to an adequate mesh generation process. Of these tools, sweeping tends to be the workhorse algorithm, accounting for at least 50% of most meshing applications. Constraints which must be met for a volume to be sweepable are derived, and it is proven that these constraints are necessary but not sufficient conditions for sweepability. This paper also describes a new algorithm for detecting extruded or sweepable geometries. This algorithm, based on these constraints, uses topological and local geometric information, and is more robust than feature recognition-based algorithms. A method for computing sweep dependencies in volume assemblies is also given. The auto sweep detect and sweep grouping algorithms have been used to reduce interactive user time required to generate all-hexahedral meshes by filtering out non-sweepable volumes needing further decomposition and by allowing concurrent meshing of independent sweep groups. Parts of the auto sweep detect algorithm have also been used to identify independent sweep paths, for use in volume-based interval assignment.

  3. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  4. OPNET Modeler simulations of performance for multi nodes wireless systems

    Directory of Open Access Journals (Sweden)

    Krupanek Beata

    2016-01-01

    Full Text Available Paper presents a study under the Quality of Service in modern wireless sensor networks. Such a networks are characterized by small amount of data transmitted in fixed periods. Very often this data must by transmitted in real time so data transmission delays should be well known. This article shows multimode network simulated in packet OPNET Modeler. Also nowadays the quality of services is very important especially in multi-nodes systems such a home automation or measurement systems.

  5. An Assessment of Emerging Wireless Broadband Technologies

    National Research Council Canada - National Science Library

    Fountanas, Leonidas

    2001-01-01

    ... technologies in providing broadband services today, emerging wireless broadband technologies are expected to significantly increase their market share over the next years, Deploying a wireless network...

  6. Wireless Sensor Portal Technology Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Recognizing the needs and challenges facing NASA Earth Science for data input, manipulation and distribution, Mobitrum is proposing a ? Wireless Sensor Portal...

  7. Adaptive Wireless Transceiver, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  8. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  9. Home, Smart Home

    DEFF Research Database (Denmark)

    Hansen, Ellen Kathrine; Olesen, Gitte Gylling Hammershøj; Mullins, Michael

    2013-01-01

    The article places focus on how smart technologies integrated in a one family- home and particular the window offer unique challenges and opportunities for designing buildings with the best possible environments for people and nature. Toward an interdisciplinary approach, we address the interaction...... between daylight defined in technical terms and daylight defined in aesthetic, architectural terms. Through field-tests of a Danish carbon-neutral home and an analysis of five key design parameters, we explore the contradictions and potentials in smart buildings, using the smart window as example of how...... to the energy design is central. The study illuminates an approach of the design of smart houses as living organisms by connecting technology with the needs of the occupants with the power and beauty of daylight....

  10. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  11. Far infrared metal mesh filters and Fabry-Perot interferometry

    International Nuclear Information System (INIS)

    Kiyomi, S.; Genzel, L.

    1983-01-01

    The use of metal meshes is becoming increasingly important for applications in the far infrared. This paper reviews the important aspects of metal meshes, metal mesh filters, Fabry-Perot interferometers and their applications. The article includes the following: an introductory description and historical review of far-infrared metal meshes, the optical properties of metal meshes, beam splitters and filters based on inherent optical properties of meshes, Fabry-Perot interferometers, multimesh filters, applications of metal mesh filters and Fabry-Perot interferometers for far-infrared lasers, for plasma diagnostics and for astronomy

  12. Using Wireless Power Meters to Measure Energy Use of Miscellaneous and Electronic Devices in Buildings

    Energy Technology Data Exchange (ETDEWEB)

    UC Berkeley, Berkeley, CA USA; Brown, Richard; Lanzisera, Steven; Cheung, Hoi Ying (Iris); Lai, Judy; Jiang, Xiaofan; Dawson-Haggerty, Stephen; Taneja, Jay; Ortiz, Jorge; Culler, David

    2011-05-24

    Miscellaneous and electronic devices consume about one-third of the primary energy used in U.S. buildings, and their energy use is increasing faster than other end-uses. Despite the success of policies, such as Energy Star, that promote more efficient miscellaneous and electronic products, much remains to be done to address the energy use of these devices if we are to achieve our energy and carbon reduction goals. Developing efficiency strategies for these products depends on better data about their actual usage, but very few studies have collected field data on the long-term energy used by a large sample of devices due to the difficulty and expense of collecting device-level energy data. This paper describes the development of an improved method for collecting device-level energy and power data using small, relatively inexpensive wireless power meters. These meters form a mesh network based on Internet standard protocols and can form networks of hundreds of metering points in a single building. Because the meters are relatively inexpensive and do not require manual data downloading, they can be left in the field for months or years to collect long time-series energy use data. In addition to the metering technology, we also describe a field protocol used to collect comprehensive, robust data on the miscellaneous and electronic devices in a building. The paper presents sample results from several case study buildings, in which all the plug-in devices for several homes were metered, and a representative sample of several hundred plug-in devices in a commercial office building were metered for several months.

  13. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  14. Transfer to hospital in planned home births

    DEFF Research Database (Denmark)

    Blix, Ellen; Kumle, Merethe; Kjærgaard, Hanne

    2014-01-01

    BACKGROUND: There is concern about the safety of homebirths, especially in women transferred to hospital during or after labour. The scope of transfer in planned home births has not been assessed in a systematic review. This review aimed to describe the proportions and indications for transfer from...... home to hospital during or after labour in planned home births. METHODS: The databases Pubmed, Embase, Cinahl, Svemed+, and the Cochrane Library were searched using the MeSH term "home childbirth". Inclusion criteria were as follows: the study population was women who chose planned home birth...... at the onset of labour; the studies were from Western countries; the birth attendant was an authorised midwife or medical doctor; the studies were published in 1985 or later, with data not older than from 1980; and data on transfer from home to hospital were described. Of the 3366 titles identified, 83 full...

  15. Ultrasound appearances after mesh implantation-evidence of mesh contraction or folding?

    Czech Academy of Sciences Publication Activity Database

    Švabík, K.; Martan, A.; Mašata, J.; Haddad El, R.; Hubka, P.; Pavlíková, Markéta

    2011-01-01

    Roč. 22, č. 5 (2011), s. 529-533 ISSN 0937-3462 Grant - others:GA MZd(CZ) NR9216 Institutional research plan: CEZ:AV0Z10300504 Keywords : prolift anterior * mesh shrinking * mesh retraction * vaginal ultrasound * vaginal surgery Subject RIV: FK - Gynaecology, Childbirth Impact factor: 1.832, year: 2011

  16. Green Wireless Power Transfer Networks

    NARCIS (Netherlands)

    Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.

    2016-01-01

    wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.

  17. Wireless Networks: a brief introduction

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Networks: a brief introduction. Wireless communication: What? Why? How many types? What is cell? Is it different from fixed landline structure? 1G systems: FDMA/FDD and Analog FM [voice comm]. (Introduced in 1983 in Chicago by AMPS). 2G systems: 3 ...

  18. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  19. Pregled metrika rutiranja za višekanalne višeinterfejsne bežične mesh mreže / Survey of routing metrics for multi channel multi interface wireless mesh networks / Обзор показателей маршрутизации для многоканальных мульти-интерфейсных ячеистых сетей

    Directory of Open Access Journals (Sweden)

    Marija Z. Malnar

    2015-07-01

    Full Text Available Bežične mesh mreže – WMNs (Wireless Mesh Networks predstavljaju noviji trend u bežičnim komunikacijama kojim se obezbeđuju veća fleksibilnost, pouzdanost i bolje performanse nego standardnim bežičnim lokalnim mrežama. Imajući u vidu sve veće potrebe korisnika za brzim i efikasnim prenosom podataka, povećanje protoka, ostvareno uvođenjem višekanalnih višeinterfejsnih – MCMI (Multi-Channel Multi-Interface WMNs, predstavlja glavni izazov u projektovanju WMNs. Kako bi se ostvarile što bolje mrežne performanse neophodno je definisati protokole i metrike rutiranja kojima se određuje optimalna putanja između izvorišnog i odredišnog čvora. S obzirom na to da WMN karakteriše velika dinamika signala, posebno kada se realizuju u kompleksnim okruženjima kakva su zatvoreni objekti, neophodno je definisati metrike rutiranja koje mogu da isprate brze promene uslova propagacije koje se dešavaju na svakom pojedinačnom linku u mreži. U ovom radu predstavljen je kritički osvrt na najpoznatije metrike rutiranja za MCMI bežične mesh mreže. Navedeni su osnovni kriterijumi za formiranje metrika rutiranja, kao što su: interferencija, količina informacija, opterećenje linka, agilnost, stabilnost i sposobnost praćenja brzih promena na svakom linku. Opisani su i novi trendovi u razvoju metrika rutiranja za bežične mesh mreže, kao i poređenje opisanih metrika u skladu sa prethodno pomenutim kriterijumima. Na kraju rada predstavljena su zaključna razmatranja. / WMNs (Wireless Mesh Networks represent a new trend in wireless communications, providing greater flexibility, reliability and better network performances than standard WLANs (Wireless Local Area Networks. Having in mind a need for more efficient and faster data transmission, one of the greatest challenges in designing WMNs is to provide greater throughput. This is done by introducing networks the nodes of which have multiple interfaces that can work on one of multiple

  20. Network solutions for home health care applications.

    Science.gov (United States)

    Herzog, Almut; Lind, Leili

    2003-01-01

    The growing number of the elderly in industrialised countries is increasing the pressure on respective health care systems. This is one reason for recent trends in the development and expansion of home health care organisations. With Internet access available to everyone and the advent of wireless technologies, advanced telehomecare is a possibility for a large proportion of the population. In the near future, one of the authors plans to implement a home health care infrastructure for patients with congestive heart failure and patients with chronic obstructive pulmonary disease. The system is meant to support regular and ad-hoc measurements of medical parameters in patient homes and transmission of measurement data to the home health care provider. In this paper we look at network technologies that connect sensors and input devices in the patient home to a home health care provider. We consider wireless and Internet technologies from functional and security-related perspectives and arrive at a recommendation for our system. Security and usability aspects of the proposed network infrastructures are explored with special focus on their impact on the patient home.

  1. Open preperitoneal groin hernia repair with mesh

    DEFF Research Database (Denmark)

    Andresen, Kristoffer; Rosenberg, Jacob

    2017-01-01

    BACKGROUND: For the repair of inguinal hernias, several surgical methods have been presented where the purpose is to place a mesh in the preperitoneal plane through an open access. The aim of this systematic review was to describe preperitoneal repairs with emphasis on the technique. DATA SOURCES......: A systematic review was conducted and reported according to the PRISMA statement. PubMed, Cochrane library and Embase were searched systematically. Studies were included if they provided clinical data with more than 30 days follow up following repair of an inguinal hernia with an open preperitoneal mesh......-analysis. Open preperitoneal techniques with placement of a mesh through an open approach seem promising compared with the standard anterior techniques. This systematic review provides an overview of these techniques together with a description of surgical methods and clinical outcomes....

  2. Open preperitoneal groin hernia repair with mesh

    DEFF Research Database (Denmark)

    Andresen, Kristoffer; Rosenberg, Jacob

    2017-01-01

    Background For the repair of inguinal hernias, several surgical methods have been presented where the purpose is to place a mesh in the preperitoneal plane through an open access. The aim of this systematic review was to describe preperitoneal repairs with emphasis on the technique. Data sources...... A systematic review was conducted and reported according to the PRISMA statement. PubMed, Cochrane library and Embase were searched systematically. Studies were included if they provided clinical data with more than 30 days follow up following repair of an inguinal hernia with an open preperitoneal mesh......-analysis. Open preperitoneal techniques with placement of a mesh through an open approach seem promising compared with the standard anterior techniques. This systematic review provides an overview of these techniques together with a description of surgical methods and clinical outcomes....

  3. NASA Lewis Meshed VSAT Workshop meeting summary

    Science.gov (United States)

    Ivancic, William

    1993-11-01

    NASA Lewis Research Center's Space Electronics Division (SED) hosted a workshop to address specific topics related to future meshed very small-aperture terminal (VSAT) satellite communications networks. The ideas generated by this workshop will help to identify potential markets and focus technology development within the commercial satellite communications industry and NASA. The workshop resulted in recommendations concerning these principal points of interest: the window of opportunity for a meshed VSAT system; system availability; ground terminal antenna sizes; recommended multifrequency for time division multiple access (TDMA) uplink; a packet switch design concept for narrowband; and fault tolerance design concepts. This report presents a summary of group presentations and discussion associated with the technological, economic, and operational issues of meshed VSAT architectures that utilize processing satellites.

  4. Connectivity editing for quad-dominant meshes

    KAUST Repository

    Peng, Chihan

    2013-08-01

    We propose a connectivity editing framework for quad-dominant meshes. In our framework, the user can edit the mesh connectivity to control the location, type, and number of irregular vertices (with more or fewer than four neighbors) and irregular faces (non-quads). We provide a theoretical analysis of the problem, discuss what edits are possible and impossible, and describe how to implement an editing framework that realizes all possible editing operations. In the results, we show example edits and illustrate the advantages and disadvantages of different strategies for quad-dominant mesh design. © 2013 The Author(s) Computer Graphics Forum © 2013 The Eurographics Association and John Wiley & Sons Ltd.

  5. Calculation of coherent synchrotron radiation using mesh

    Directory of Open Access Journals (Sweden)

    T. Agoh

    2004-05-01

    Full Text Available We develop a new method to simulate coherent synchrotron radiation numerically. It is based on the mesh calculation of the electromagnetic field in the frequency domain. We make an approximation in the Maxwell equation which allows a mesh size much larger than the relevant wavelength so that the computing time is tolerable. Using the equation, we can perform a mesh calculation of coherent synchrotron radiation in transient states with shielding effects by the vacuum chamber. The simulation results obtained by this method are compared with analytic solutions. Though, for the comparison with theories, we adopt simplifications such as longitudinal Gaussian distribution, zero-width transverse distribution, horizontal uniform bend, and a vacuum chamber with rectangular cross section, the method is applicable to general cases.

  6. The generation of hexahedral meshes for assembly geometries: A survey

    Energy Technology Data Exchange (ETDEWEB)

    TAUTGES,TIMOTHY J.

    2000-02-14

    The finite element method is being used today to model component assemblies in a wide variety of application areas, including structural mechanics, fluid simulations, and others. Generating hexahedral meshes for these assemblies usually requires the use of geometry decomposition, with different meshing algorithms applied to different regions. While the primary motivation for this approach remains the lack of an automatic, reliable all-hexahedral meshing algorithm, requirements in mesh quality and mesh configuration for typical analyses are also factors. For these reasons, this approach is also sometimes required when producing other types of unstructured meshes. This paper will review progress to date in automating many parts of the hex meshing process, which has halved the time to produce all-hex meshes for large assemblies. Particular issues which have been exposed due to this progress will also be discussed, along with their applicability to the general unstructured meshing problem.

  7. Mesh control information of windmill designed by Solidwork program

    Science.gov (United States)

    Mulyana, T.; Sebayang, D.; Rafsanjani, A. M. D.; Adani, J. H. D.; Muhyiddin, Y. S.

    2017-12-01

    This paper presents the mesh control information imposed on the windmill already designed. The accuracy of Simulation results is influenced by the quality of the created mesh. However, compared to the quality of the mesh is made, the simulation time running will be done software also increases. The smaller the size of the elements created when making the mesh, the better the mesh quality will be generated. When adjusting the mesh size, there is a slider that acts as the density regulator of the element. SolidWorks Simulation also has Mesh Control facility. Features that can adjust mesh density only in the desired part. The best results of mesh control obtained for both static and thermal simulation have ratio 1.5.

  8. Home Modifications

    Science.gov (United States)

    ... content Skip Navigation Department of Health and Human Services Your Browser does not support javascript, so the search function on this page is disabled 1-800-677-1116 Home > Resources > Factsheets > Home ...

  9. Research of home energy management system based on technology of PLC and ZigBee

    Science.gov (United States)

    Wei, Qi; Shen, Jiaojiao

    2015-12-01

    In view of the problem of saving effectively energy and energy management in home, this paper designs a home energy intelligent control system based on power line carrier communication and wireless ZigBee sensor networks. The system is based on ARM controller, power line carrier communication and wireless ZigBee sensor network as the terminal communication mode, and realizes the centralized and intelligent control of home appliances. Through the combination of these two technologies, the advantages of the two technologies complement each other, and provide a feasible plan for the construction of energy-efficient, intelligent home energy management system.

  10. Wireless Headset Communication System

    Science.gov (United States)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  11. Investigating wireless power transfer

    Science.gov (United States)

    St John, Stuart A.

    2017-09-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.

  12. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  13. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  14. Wireless installation standard

    International Nuclear Information System (INIS)

    Lim, Hwang Bin

    2007-12-01

    This is divided six parts which are radio regulation law on securing of radio resource, use of radio resource, protection of radio resource, radio regulation enforcement ordinance with securing, distribution and assignment of radio regulation, radio regulation enforcement regulation on utility of radio resource and technical qualification examination, a wireless installation regulation of technique standard and safety facility standard, radio regulation such as certification regulation of information communicative machines and regulation of radio station on compliance of signal security, radio equipment in radio station, standard frequency station and emergency communication.

  15. Home hemodialysis

    DEFF Research Database (Denmark)

    Agar, John W; Perkins, Anthony; Heaf, James G

    2015-01-01

    We describe the infrastructure that is necessary for hemodialysis in the home focusing on physical requirements, the organization of plumbing and water, and the key features that should guide the selection of machines that are suitable for home use.......We describe the infrastructure that is necessary for hemodialysis in the home focusing on physical requirements, the organization of plumbing and water, and the key features that should guide the selection of machines that are suitable for home use....

  16. Home Dissolution

    DEFF Research Database (Denmark)

    Gram-Hanssen, Kirsten; Bech-Danielsen, Claus

    2008-01-01

    Building a home and creating a family are highly inter­connec­ted processes. So what happens with the home when people separate or divorce? In this paper we address this question both from a quantitative and a qualitative approach. Based on an extensive database with socio-economic background data...... problems of dissolving a home. How to decide who should stay, who should move and how was it to stay alone in or to leave the matrimonial home?...

  17. MUSIC: a mesh-unrestricted simulation code

    International Nuclear Information System (INIS)

    Bonalumi, R.A.; Rouben, B.; Dastur, A.R.; Dondale, C.S.; Li, H.Y.H.

    1978-01-01

    A general formalism to solve the G-group neutron diffusion equation is described. The G-group flux is represented by complementing an ''asymptotic'' mode with (G-1) ''transient'' modes. A particular reduction-to-one-group technique gives a high computational efficiency. MUSIC, a 2-group code using the above formalism, is presented. MUSIC is demonstrated on a fine-mesh calculation and on 2 coarse-mesh core calculations: a heavy-water reactor (HWR) problem and the 2-D lightwater reactor (LWR) IAEA benchmark. Comparison is made to finite-difference results

  18. Unstructured Adaptive Meshes: Bad for Your Memory?

    Science.gov (United States)

    Biswas, Rupak; Feng, Hui-Yu; VanderWijngaart, Rob

    2003-01-01

    This viewgraph presentation explores the need for a NASA Advanced Supercomputing (NAS) parallel benchmark for problems with irregular dynamical memory access. This benchmark is important and necessary because: 1) Problems with localized error source benefit from adaptive nonuniform meshes; 2) Certain machines perform poorly on such problems; 3) Parallel implementation may provide further performance improvement but is difficult. Some examples of problems which use irregular dynamical memory access include: 1) Heat transfer problem; 2) Heat source term; 3) Spectral element method; 4) Base functions; 5) Elemental discrete equations; 6) Global discrete equations. Nonconforming Mesh and Mortar Element Method are covered in greater detail in this presentation.

  19. Local adaptive mesh refinement for shock hydrodynamics

    International Nuclear Information System (INIS)

    Berger, M.J.; Colella, P.; Lawrence Livermore Laboratory, Livermore, 94550 California)

    1989-01-01

    The aim of this work is the development of an automatic, adaptive mesh refinement strategy for solving hyperbolic conservation laws in two dimensions. There are two main difficulties in doing this. The first problem is due to the presence of discontinuities in the solution and the effect on them of discontinuities in the mesh. The second problem is how to organize the algorithm to minimize memory and CPU overhead. This is an important consideration and will continue to be important as more sophisticated algorithms that use data structures other than arrays are developed for use on vector and parallel computers. copyright 1989 Academic Press, Inc

  20. Adaptive mesh refinement for storm surge

    KAUST Repository

    Mandli, Kyle T.

    2014-03-01

    An approach to utilizing adaptive mesh refinement algorithms for storm surge modeling is proposed. Currently numerical models exist that can resolve the details of coastal regions but are often too costly to be run in an ensemble forecasting framework without significant computing resources. The application of adaptive mesh refinement algorithms substantially lowers the computational cost of a storm surge model run while retaining much of the desired coastal resolution. The approach presented is implemented in the GeoClaw framework and compared to ADCIRC for Hurricane Ike along with observed tide gauge data and the computational cost of each model run. © 2014 Elsevier Ltd.

  1. Intelligent Devices in Rural Wireless Networks

    Directory of Open Access Journals (Sweden)

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  2. Dipankar Home

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education. Dipankar Home. Articles written in Resonance – Journal of Science Education. Volume 18 Issue 10 October 2013 pp 905-916 General Article. Bohr's Philosophy of Wave–Particle Complementarity · Dipankar Home · More Details Fulltext PDF ...

  3. TCP adaptation with network coding and opportunistic data forwarding in multi-hop wireless networks

    Directory of Open Access Journals (Sweden)

    Chen Zhang

    2016-10-01

    Full Text Available Opportunistic data forwarding significantly increases the throughput in multi-hop wireless mesh networks by utilizing the broadcast nature of wireless transmissions and the fluctuation of link qualities. Network coding strengthens the robustness of data transmissions over unreliable wireless links. However, opportunistic data forwarding and network coding are rarely incorporated with TCP because the frequent occurrences of out-of-order packets in opportunistic data forwarding and long decoding delay in network coding overthrow TCP’s congestion control. In this paper, we propose a solution dubbed TCPFender, which supports opportunistic data forwarding and network coding in TCP. Our solution adds an adaptation layer to mask the packet loss caused by wireless link errors and provides early positive feedbacks to trigger a larger congestion window for TCP. This adaptation layer functions over the network layer and reduces the delay of ACKs for each coded packet. The simulation results show that TCPFender significantly outperforms TCP/IP in terms of the network throughput in different topologies of wireless networks.

  4. Abdominal reoperation and mesh explantation following open ventral hernia repair with mesh.

    Science.gov (United States)

    Liang, Mike K; Li, Linda T; Nguyen, Mylan T; Berger, Rachel L; Hicks, Stephanie C; Kao, Lillian S

    2014-10-01

    This study sought to identify the incidence, indications, and predictors of abdominal reoperation and mesh explantation following open ventral hernia repair with mesh (OVHR). A retrospective cohort study of all patients at a single institution who underwent an OVHR from 2000 to 2010 was performed. Patients who required subsequent abdominal reoperation or mesh explantation were compared with those who did not. Reasons for reoperation were recorded. The 2 groups were compared using univariate and multivariate analysis (MVA). A total of 407 patients were followed for a median (range) of 57 (1 to 143) months. Subsequent abdominal reoperation was required in 69 (17%) patients. The most common reasons for reoperation were recurrence and surgical site infection. Only the number of prior abdominal surgeries was associated with abdominal reoperation on MVA. Twenty-eight patients (6.9%) underwent subsequent mesh explantation. Only the Ventral Hernia Working Group grade was associated with mesh explantation on MVA. Abdominal reoperation and mesh explantation following OVHR are common. Overwhelmingly, surgical complications are themost common causes for reoperation and mesh explantation. Copyright © 2014 Elsevier Inc. All rights reserved.

  5. Qualitative and Quantitative Security Analyses for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender

    applications, home automation, and traffic control. The challenges for research in this area are due to the unique features of wireless sensor devices such as low processing power and associated low energy. On top of this, wireless sensor networks need secure communication as they operate in open fields...... of the main challenges arise in dealing with the security needs of such systems where it is less likely that absolute security guarantees can be sustained - because of the need to balance security against energy consumption in wireless sensor network standards like ZigBee. This dissertation builds on existing...... low level security protocol s in a qualitative manner and guarantees absolute security, and then takes these verified protocols as actions of scenarios to be verified in a quantitative manner. Working on the emerging ZigBee wireless sensor networks, we used probabilistic verification that can return...

  6. R&D on wireless broadband communication systems: new generation ubiquitous mobile network

    Science.gov (United States)

    Ogawa, Hiroyo

    2007-09-01

    R&D on new generation mobile network has attracted a growing interest over the world on the background of rapid market growth for 2nd and 3rd - generation cellular networks and wireless LANs/MANs. The National Institute of Information and Communications Technology (NICT) has been carried out the New Generation Mobile Network Project from April 2002 to March 2006, and has developed fundamental technologies to enable seamless and secure integration of various wireless access networks such as existing cellular networks, wireless LANs, home networks, intelligent transport systems (ITS), the Beyond-3G (B3G) cellular and other wireless access systems. From April 2006, Ubiquitous Mobile Network project focused on cognitive radio technology and integrated seamless networking technology was started. This paper overviews the achievement and the future plan of these projects.

  7. Properties of meshes used in hernia repair: a comprehensive review of synthetic and biologic meshes.

    Science.gov (United States)

    Ibrahim, Ahmed M S; Vargas, Christina R; Colakoglu, Salih; Nguyen, John T; Lin, Samuel J; Lee, Bernard T

    2015-02-01

    Data on the mechanical properties of the adult human abdominal wall have been difficult to obtain rendering manufacture of the ideal mesh for ventral hernia repair a challenge. An ideal mesh would need to exhibit greater biomechanical strength and elasticity than that of the abdominal wall. The aim of this study is to quantitatively compare the biomechanical properties of the most commonly used synthetic and biologic meshes in ventral hernia repair and presents a comprehensive literature review. A narrative review of the literature was performed using the PubMed database spanning articles from 1982 to 2012 including a review of company Web sites to identify all available information relating to the biomechanical properties of various synthetic and biologic meshes used in ventral hernia repair. There exist differences in the mechanical properties and the chemical nature of different meshes. In general, most synthetic materials have greater stiffness and elasticity than what is required for abdominal wall reconstruction; however, each exhibits unique properties that may be beneficial for clinical use. On the contrary, biologic meshes are more elastic but less stiff and with a lower tensile strength than their synthetic counterparts. The current standard of practice for the treatment of ventral hernias is the use of permanent synthetic mesh material. Recently, biologic meshes have become more frequently used. Most meshes exhibit biomechanical properties over the known abdominal wall thresholds. Augmenting strength requires increasing amounts of material contributing to more stiffness and foreign body reaction, which is not necessarily an advantage. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  8. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  9. Integrated wireless systems: The future has arrived (Keynote Address)

    Science.gov (United States)

    Rivoir, Roberto

    2005-06-01

    It is believed that we are just at the beginning with wireless, and that a new age is dawning for this breakthrough technology. Thanks to several years of industrial manufacturing in mass-market applications such as cellular phones, wireless technology has nowadays reached a level of maturity that, combined with other achievements arising from different fields, such as information technology, artificial intelligence, pervasive computing, science of new materials, and micro-electro-mechanical systems (MEMS), will enable the realization of a networked stream-flow of real-time information, that will accompany us in our daily life, in a total seamless, transparent fashion. As almost any application scenario will require the deployment of complex, miniaturized, almost "invisible" systems, operating with different wireless standards, hard technological challenges will have to be faced for designing and fabricating ultra-low-cost, reconfigurable, and multi-mode heterogeneous smart micro-devices. But ongoing, unending progresses on wireless technology keeps the promise of helping to solve important societal problems in the health-care, safety, security, industry, environment sectors, and in general opening the possibility for an improved quality of life at work, on travel, at home, practically "everywhere, anytime".

  10. Household wireless electroencephalogram hat

    Science.gov (United States)

    Szu, Harold; Hsu, Charles; Moon, Gyu; Yamakawa, Takeshi; Tran, Binh

    2012-06-01

    We applied Compressive Sensing to design an affordable, convenient Brain Machine Interface (BMI) measuring the high spatial density, and real-time process of Electroencephalogram (EEG) brainwaves by a Smartphone. It is useful for therapeutic and mental health monitoring, learning disability biofeedback, handicap interfaces, and war gaming. Its spec is adequate for a biomedical laboratory, without the cables hanging over the head and tethered to a fixed computer terminal. Our improved the intrinsic signal to noise ratio (SNR) by using the non-uniform placement of the measuring electrodes to create the proximity of measurement to the source effect. We computing a spatiotemporal average the larger magnitude of EEG data centers in 0.3 second taking on tethered laboratory data, using fuzzy logic, and computing the inside brainwave sources, by Independent Component Analysis (ICA). Consequently, we can overlay them together by non-uniform electrode distribution enhancing the signal noise ratio and therefore the degree of sparseness by threshold. We overcame the conflicting requirements between a high spatial electrode density and precise temporal resolution (beyond Event Related Potential (ERP) P300 brainwave at 0.3 sec), and Smartphone wireless bottleneck of spatiotemporal throughput rate. Our main contribution in this paper is the quality and the speed of iterative compressed image recovery algorithm based on a Block Sparse Code (Baranuick et al, IEEE/IT 2008). As a result, we achieved real-time wireless dynamic measurement of EEG brainwaves, matching well with traditionally tethered high density EEG.

  11. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  12. Homing oneself

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    2009-01-01

    What is home? A building, a physical and mental phenomenon, or a concept?  There are many homes and ways `to home oneself´. Many of us quite often dwell in other places than at home (as professional commuters between two places, as travellers staying in hotels, as children of divorced parents...... living one week with mom and one week with dad). We spend so much time in and between these movements and settings that we may even (have to learn how to) ‘home ourselves'. In other words, we may use different strategies in order to create a homely feeling and a certain sense of belonging. This paper...... expands on the notion that home indicates more than a house, but also responds to the overuse of the concept home. The aim of this article is to examine how home is done, stretched between everyday life, practices, dreams, loss and cultural ideas of home. My intention is not to remove home...

  13. Highly Symmetric and Congruently Tiled Meshes for Shells and Domes

    Science.gov (United States)

    Rasheed, Muhibur; Bajaj, Chandrajit

    2016-01-01

    We describe the generation of all possible shell and dome shapes that can be uniquely meshed (tiled) using a single type of mesh face (tile), and following a single meshing (tiling) rule that governs the mesh (tile) arrangement with maximal vertex, edge and face symmetries. Such tiling arrangements or congruently tiled meshed shapes, are frequently found in chemical forms (fullerenes or Bucky balls, crystals, quasi-crystals, virus nano shells or capsids), and synthetic shapes (cages, sports domes, modern architectural facades). Congruently tiled meshes are both aesthetic and complete, as they support maximal mesh symmetries with minimal complexity and possess simple generation rules. Here, we generate congruent tilings and meshed shape layouts that satisfy these optimality conditions. Further, the congruent meshes are uniquely mappable to an almost regular 3D polyhedron (or its dual polyhedron) and which exhibits face-transitive (and edge-transitive) congruency with at most two types of vertices (each type transitive to the other). The family of all such congruently meshed polyhedra create a new class of meshed shapes, beyond the well-studied regular, semi-regular and quasi-regular classes, and their duals (platonic, Catalan and Johnson). While our new mesh class is infinite, we prove that there exists a unique mesh parametrization, where each member of the class can be represented by two integer lattice variables, and moreover efficiently constructable. PMID:27563368

  14. Resterilized Polypropylene Mesh for Inguinal Hernia Repair

    African Journals Online (AJOL)

    2018-04-19

    Apr 19, 2018 ... Cost, availability of mesh, and perhaps reluctance to adopt a new technique are factors which prevent widespread ..... critical to preventing postoperative surgical site infection which potentially increases the cost of ... not recorded in 10 years of practice an incident of wound infection. In vitro bacteriological ...

  15. MESH Release 2 implementation at CTIT

    NARCIS (Netherlands)

    Diakov, N.K.; van Sinderen, Marten J.; Koprinkov, G.T.

    This document contains a description of the development done at CTIT on the MESH services platform, a TINA-based platform for the deployment and exploitation of services to support teamwork. It provides an overview of the results and the usability of architectural solutions and technologies used

  16. Markov Random Fields on Triangle Meshes

    DEFF Research Database (Denmark)

    Andersen, Vedrana; Aanæs, Henrik; Bærentzen, Jakob Andreas

    2010-01-01

    In this paper we propose a novel anisotropic smoothing scheme based on Markov Random Fields (MRF). Our scheme is formulated as two coupled processes. A vertex process is used to smooth the mesh by displacing the vertices according to a MRF smoothness prior, while an independent edge process labels...

  17. Polypropylene mesh: evidence for lack of carcinogenicity

    Science.gov (United States)

    Moalli, Pamela; Brown, Bryan; Reitman, Maureen T. F.

    2016-01-01

    Tumors related to the implantation of surgical grade polypropylene in humans have never been reported. In this commentary we present a balanced review of the information on what is known regarding the host response to polypropylene and provide data as to why the potential for carcinogenicity of polypropylene mesh is exceedingly small. PMID:24614956

  18. Structural processing for wireless communications

    CERN Document Server

    Lu, Jianhua; Ge, Ning

    2015-01-01

    This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.

  19. Radio Relays Improve Wireless Products

    Science.gov (United States)

    2009-01-01

    Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.

  20. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  1. Microwave materials for wireless applications

    CERN Document Server

    Cruickshank, David B

    2011-01-01

    This practical resource offers you an in-depth, up-to-date understanding of the use of microwave magnetic materials for cutting-edge wireless applications. The book discusses device applications used in wireless infrastructure base stations, point-to-point radio links, and a range of more specialized microwave systems. You find detailed discussions on the attributes of each family of magnetic materials with respect to specific wireless applications. Moreover, the book addresses two of the hottest topics in the field today - insertion loss and intermodulation. This comprehensive reference also

  2. [Implants for genital prolapse : Pro mesh surgery].

    Science.gov (United States)

    Neymeyer, J; Moldovan, D-E; Kornienko, K; Miller, K; Weichert, A

    2017-12-01

    There has been an overall increase in pelvic organ prolapse due to demographic changes (increased life expectancy). Increasing sociocultural demands of women require treatments that are more effective with methods that are more successful. In the treatment of pelvic floor insufficiency and uterovaginal prolapse, pelvic floor reconstructions with mesh implants have proven to be superior to conventional methods such as the classic colporrhaphy, reconstructions with biomaterial, and native tissue repair in appropriately selected patients and when applying exact operation techniques, especially because of good long-term results and low recurrence rates. When making a systematic therapy plan, one should adhere to certain steps, for example, a pelvic floor reconstruction should be undertaken before performing the corrective procedure for incontinence. The approach, if vaginal, laparoscopic, or abdominal should be chosen wisely, taking into consideration the required space of action, in such a way that none or only minimal collateral damage related to the operation occurs. The use of instrumental suturing techniques and operation robots are advantageous in the case of difficult approaches and limited anatomical spaces. In principle, the surgeon who implants meshes should be able to explant them! The surgical concept of mesh-related interventions in the pelvis must meet established rules. "Implant as little mesh as possible and only as much suitable (!) mesh as absolutely necessary!" In the case of apical direct fixations, a therapeutically relevant target variable is the elevation angle of vagina (EAV). Established anatomical fixation points are preferable. A safe distance between implants and vulnerable tissue is to be maintained. Mesh-based prolapse repairs are indicated in recurrences, in primary situations, in combined defects of the anterior compartment, in central defects of multimorbid and elderly patients, and above all, when organ preservation is wanted

  3. Augmenting forearm crutches with wireless sensors for lower limb rehabilitation

    International Nuclear Information System (INIS)

    Merrett, Geoff V; Ettabib, Mohamed A; White, Neil M; Peters, Christian; Hallett, Georgina

    2010-01-01

    Forearm crutches are frequently used in the rehabilitation of an injury to the lower limb. The recovery rate is improved if the patient correctly applies a certain fraction of their body weight (specified by a clinician) through the axis of the crutch, referred to as partial weight bearing (PWB). Incorrect weight bearing has been shown to result in an extended recovery period or even cause further damage to the limb. There is currently no minimally invasive tool for long-term monitoring of a patient's PWB in a home environment. This paper describes the research and development of an instrumented forearm crutch that has been developed to wirelessly and autonomously monitor a patient's weight bearing over the full period of their recovery, including its potential use in a home environment. A pair of standard forearm crutches are augmented with low-cost off-the-shelf wireless sensor nodes and electronic components to provide indicative measurements of the applied weight, crutch tilt and hand position on the grip. Data are wirelessly transmitted between crutches and to a remote computer (where they are processed and visualized in LabVIEW), and the patient receives biofeedback by means of an audible signal when they put too much or too little weight through the crutch. The initial results obtained highlight the capability of the instrumented crutch to support physiotherapists and patients in monitoring usage

  4. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  5. Oxidation and degradation of polypropylene transvaginal mesh.

    Science.gov (United States)

    Talley, Anne D; Rogers, Bridget R; Iakovlev, Vladimir; Dunn, Russell F; Guelcher, Scott A

    2017-04-01

    Polypropylene (PP) transvaginal mesh (TVM) repair for stress urinary incontinence (SUI) has shown promising short-term objective cure rates. However, life-altering complications have been associated with the placement of PP mesh for SUI repair. PP degradation as a result of the foreign body reaction (FBR) has been proposed as a contributing factor to mesh complications. We hypothesized that PP oxidizes under in vitro conditions simulating the FBR, resulting in degradation of the PP. Three PP mid-urethral slings from two commercial manufacturers were evaluated. Test specimens (n = 6) were incubated in oxidative medium for up to 5 weeks. Oxidation was assessed by Fourier Transform Infrared Spectroscopy (FTIR), and degradation was evaluated by scanning electron microscopy (SEM). FTIR spectra of the slings revealed evidence of carbonyl and hydroxyl peaks after 5 weeks of incubation time, providing evidence of oxidation of PP. SEM images at 5 weeks showed evidence of surface degradation, including pitting and flaking. Thus, oxidation and degradation of PP pelvic mesh were evidenced by chemical and physical changes under simulated in vivo conditions. To assess changes in PP surface chemistry in vivo, fibers were recovered from PP mesh explanted from a single patient without formalin fixation, untreated (n = 5) or scraped (n = 5) to remove tissue, and analyzed by X-ray photoelectron spectroscopy. Mechanical scraping removed adherent tissue, revealing an underlying layer of oxidized PP. These findings underscore the need for further research into the relative contribution of oxidative degradation to complications associated with PP-based TVM devices in larger cohorts of patients.

  6. Impulse radio ultra wide-band over multi-mode fiber for in-home signal distribution

    DEFF Research Database (Denmark)

    Caballero Jambrina, Antonio; Rodes, Roberto; Jensen, Jesper Bevensee

    2009-01-01

    We propose and experimentally demonstrate a high speed impulse radio ultra wide-band (IR-UWB) wireless link for in-home network signal distribution. The IR-UWB pulse is distributed over a multimode fiber to the transmitter antenna. Wireless transmitted bit-rates of 1 Gbps at 2 m and 2 Gbps at 1.5 m...

  7. Surgical Management of Pelvic floor Prolapse in women using Mesh

    African Journals Online (AJOL)

    RAH

    polytetrafluoroethylene) . This article reviews our experience with polypropylene mesh in pelvic floor repair at the. Southern General Hospital Glasgow. The objective was to determine the safety and effectiveness of the prolene mesh in the repair ...

  8. A Fully Automated Mesh Generation Tool, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This SBIR Phase I project proposes to develop a fully automated mesh generation tool which contains two parts: surface mesh generation from the imported Computer...

  9. Jali - Unstructured Mesh Infrastructure for Multi-Physics Applications

    Energy Technology Data Exchange (ETDEWEB)

    2017-04-13

    Jali is a parallel unstructured mesh infrastructure library designed for use by multi-physics simulations. It supports 2D and 3D arbitrary polyhedral meshes distributed over hundreds to thousands of nodes. Jali can read write Exodus II meshes along with fields and sets on the mesh and support for other formats is partially implemented or is (https://github.com/MeshToolkit/MSTK), an open source general purpose unstructured mesh infrastructure library from Los Alamos National Laboratory. While it has been made to work with other mesh frameworks such as MOAB and STKmesh in the past, support for maintaining the interface to these frameworks has been suspended for now. Jali supports distributed as well as on-node parallelism. Support of on-node parallelism is through direct use of the the mesh in multi-threaded constructs or through the use of "tiles" which are submeshes or sub-partitions of a partition destined for a compute node.

  10. CUBIT mesh generation environment. Volume 1: Users manual

    Energy Technology Data Exchange (ETDEWEB)

    Blacker, T.D.; Bohnhoff, W.J.; Edwards, T.L. [and others

    1994-05-01

    The CUBIT mesh generation environment is a two- and three-dimensional finite element mesh generation tool which is being developed to pursue the goal of robust and unattended mesh generation--effectively automating the generation of quadrilateral and hexahedral elements. It is a solid-modeler based preprocessor that meshes volume and surface solid models for finite element analysis. A combination of techniques including paving, mapping, sweeping, and various other algorithms being developed are available for discretizing the geometry into a finite element mesh. CUBIT also features boundary layer meshing specifically designed for fluid flow problems. Boundary conditions can be applied to the mesh through the geometry and appropriate files for analysis generated. CUBIT is specifically designed to reduce the time required to create all-quadrilateral and all-hexahedral meshes. This manual is designed to serve as a reference and guide to creating finite element models in the CUBIT environment.

  11. Sound source localization using a low-cost wireless sensor network

    NARCIS (Netherlands)

    Leeuwen, van H. (Henk); Salomons, E.L. (Etto); Teeuw, W.B. (Wouter)

    2013-01-01

    In the GoGreen project an intelligent home that is able to identify inhabitants and events that take place is created. The location of sounds that are being produced is an important feature for the context awareness of this system. A a wireless solution that uses low-cost sensor nodes and

  12. Sewing machine technique for laparoscopic mesh fixation in intra-peritoneal on-lay mesh.

    Science.gov (United States)

    Dastoor, Khojasteh Sam; Balsara, Kaiomarz P; Gazi, Asif Y

    2018-01-01

    : Mesh fixation in laparoscopic ventral hernia is accomplished using tacks or tacks with transfascial sutures. This is a painful operation and the pain is believed to be more due to transfascial sutures. We describe a method of transfascial suturing which fixes the mesh securely and probably causes less pain. : Up to six ports may be necessary, three on each side. A suitable-sized mesh is used and fixed with tacks all around. A 20G spinal needle is passed from the skin through one corner of the mesh. A 0 prolene suture is passed through into the peritoneum. With the prolene within, the needle is withdrawn above the anterior rectus sheath and passed again at an angle into the abdomen just outside the mesh. A loop of prolene is thus created which is tied under vision using intra-corporeal knotting. : This method gives a secure mesh fixation and causes less pain than conventional methods. This technique is easy to learn but needs expertise in intra-corporeal knotting.

  13. On Reducing Delay in Mesh-Based P2P Streaming: A Mesh-Push Approach

    Science.gov (United States)

    Liu, Zheng; Xue, Kaiping; Hong, Peilin

    The peer-assisted streaming paradigm has been widely employed to distribute live video data on the internet recently. In general, the mesh-based pull approach is more robust and efficient than the tree-based push approach. However, pull protocol brings about longer streaming delay, which is caused by the handshaking process of advertising buffer map message, sending request message and scheduling of the data block. In this paper, we propose a new approach, mesh-push, to address this issue. Different from the traditional pull approach, mesh-push implements block scheduling algorithm at sender side, where the block transmission is initiated by the sender rather than by the receiver. We first formulate the optimal upload bandwidth utilization problem, then present the mesh-push approach, in which a token protocol is designed to avoid block redundancy; a min-cost flow model is employed to derive the optimal scheduling for the push peer; and a push peer selection algorithm is introduced to reduce control overhead. Finally, we evaluate mesh-push through simulation, the results of which show mesh-push outperforms the pull scheduling in streaming delay, and achieves comparable delivery ratio at the same time.

  14. Advanced Wireless Integrated Navy Network

    National Research Council Canada - National Science Library

    Stutzman, Warren; Habayeb, Rick

    2005-01-01

    Quarterly progress report No. I on AWINN hardware and software configurations of smart, wideband, multi-function antennas, secure configurable platform, close-in command and control for Sea Basing visualization of wireless...

  15. Wireless Damage Location Sensing System

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant Douglas (Inventor)

    2012-01-01

    A wireless damage location sensing system uses a geometric-patterned wireless sensor that resonates in the presence of a time-varying magnetic field to generate a harmonic response that will experience a change when the sensor experiences a change in its geometric pattern. The sensing system also includes a magnetic field response recorder for wirelessly transmitting the time-varying magnetic field and for wirelessly detecting the harmonic response. The sensing system compares the actual harmonic response to a plurality of predetermined harmonic responses. Each predetermined harmonic response is associated with a severing of the sensor at a corresponding known location thereof so that a match between the actual harmonic response and one of the predetermined harmonic responses defines the known location of the severing that is associated therewith.

  16. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  17. A Fast and Scalable Algorithm for Calculating the Achievable Capacity of a Wireless Mesh Network

    Science.gov (United States)

    2016-05-09

    approaches for determining network capacity either provide asymptotic results that are not necessarily achievable, are computationally intractable and...provide optimal solutions, but their proposed algorithms are computationally intractable and do not run in any guaranteed amount of time. More recently, [3...antenna. In our analysis, we use a conflict graph [5], which is used to represent the interference in a network using a binary interfer- ence model. We

  18. Achievable capacity limit of high performance nodes for wireless mesh networks

    CSIR Research Space (South Africa)

    Olwal, T

    2012-08-01

    Full Text Available have the ability to simultaneously communicate with many neighbours using multiple radios over orthogonal channels thereby improving effective and "online" channel utilisation. Many such networks emerging from standards such as IEEE 802.11 a...

  19. Optimal control of transmission power management in wireless backbone mesh networks

    CSIR Research Space (South Africa)

    Olwal, TO

    2011-01-01

    Full Text Available and receivers can tune to different non- conflicting channels. As a result, two protocols have been developed. The first is called extended receiver directed transmission (xRDT) while the second is termed the local coordination-based multi-channel (LCM) MAC.... In order to achieve this goal, a power selection MRMC unification protocol (PMMUP) that coordinates Interaction variables (IV) from different UCGs and Unification variables (UV) from higher layers was then proposed. The PMMUP coordinates autonomous power...

  20. Evaluating transceiver power savings produced by connectivity strategies for infrastructure wireless mesh networks

    CSIR Research Space (South Africa)

    Mudali, P

    2011-06-01

    Full Text Available . Santi, ?The k-neighbors Approach to Physical Degree Bounded and Symmetric Topology Control in ad hoc networks, ? Instituto di Informatica e Telematica, Pisa, Technical Report IIT-TR-142003, 2003. [20] P. Hall, ?On continuum percolation,? The Annals...

  1. Interference-aware power control for multi-radio multi-channel wireless mesh networks

    CSIR Research Space (South Africa)

    Olwal, TO

    2009-09-01

    Full Text Available shocks term ( )I tε is a random variable with zero mean and variance, 2εσ . Assume that corresponding to a UCG l is the user (NIC- pair) i. Then, the multi-radio multi-channel state interaction (MRSI) model representation becomes [15...] ( ) ( ) ( ) ( ) 1 N y i ij j i j j i y t L t e t tε = ≠ = +∑ , (9) where ( )yi tε denotes the coordination process shocks with zero mean and covariance yεσ . ( )iC t is a unity...

  2. Significant performance improvement obtained in a wireless mesh network using a beamswitching antenna

    CSIR Research Space (South Africa)

    Lysko, AA

    2012-09-01

    Full Text Available applications, such as video streaming, IPTV and the Internet of Things. The demand for both higher data rates in the presence of limited frequency spectrum availability and greater degree of every-day convenience has lead to the need for higher spectral...

  3. Effectiveness of a Littoral Combat Ship as a Major Node in a Wireless Mesh Network

    Science.gov (United States)

    2017-03-01

    track with deliverables and providing much-needed grammatical and spelling oversight. He was a perfect sounding board for ideas and wasn’t afraid to...through diffraction or absorption , as well as by concealing smaller, potentially threatening Fast Attack Craft (FAC) or Fast Inshore Attack Craft...intentional design of QualNet or oversight. In any case, minor modifications made to properties in the Satellite-RSV subnet required the user to go back

  4. Towards designing energy-efficient routing protocol for wireless mesh networks

    CSIR Research Space (South Africa)

    Dludla, AG

    2009-08-01

    Full Text Available Different studies have proposed number of routing protocols to overcome data transmission challenges. Very few of these protocols consider node energy. In this study, the state of art work from various studies is reviewed and compared based...

  5. Autonomous transmission power adaptation for multi-radio multi-channel wireless mesh networks

    CSIR Research Space (South Africa)

    Olwal, TO

    2009-09-01

    Full Text Available Multi-Radio Multi-Channel (MRMC) systems are key to power control problems in WMNs. Previous studies have emphasized through- put maximization in such systems as the main design challenge and transmission power control treated as a secondary issue...

  6. Autonomous transmission power adaptation for multi-radio multi-channel wireless mesh networks

    CSIR Research Space (South Africa)

    Olwal, TO

    2008-09-01

    Full Text Available Multi-Radio Multi-Channel (MRMC) systems are key to power control problems in WMNs. Previous studies have emphasized throughput maximization in such systems as the main design challenge and transmission power control treated as a secondary issue...

  7. Routing Topologies of Wireless Sensor Networks for Health Monitoring of a Cultural Heritage Site.

    Science.gov (United States)

    Aparicio, Sofía; Martínez-Garrido, María I; Ranz, Javier; Fort, Rafael; Izquierdo, Miguel Ángel G

    2016-10-19

    This paper provides a performance evaluation of tree and mesh routing topologies of wireless sensor networks (WSNs) in a cultural heritage site. The historical site selected was San Juan Bautista church in Talamanca de Jarama (Madrid, Spain). We report the preliminary analysis required to study the effects of heating in this historical location using WSNs to monitor the temperature and humidity conditions during periods of weeks. To test which routing topology was better for this kind of application, the WSNs were first deployed on the upper floor of the CAEND institute in Arganda del Rey simulating the church deployment, but in the former scenario there was no direct line of sight between the WSN elements. Two parameters were selected to evaluate the performance of the routing topologies of WSNs: the percentage of received messages and the lifetime of the wireless sensor network. To analyze in more detail which topology gave the best performance, other communication parameters were also measured. The tree topology used was the collection tree protocol and the mesh topology was the XMESH provided by MEMSIC (Andover, MA, USA). For the scenarios presented in this paper, it can be concluded that the tree topology lost fewer messages than the mesh topology.

  8. Routing Topologies of Wireless Sensor Networks for Health Monitoring of a Cultural Heritage Site

    Directory of Open Access Journals (Sweden)

    Sofía Aparicio

    2016-10-01

    Full Text Available This paper provides a performance evaluation of tree and mesh routing topologies of wireless sensor networks (WSNs in a cultural heritage site. The historical site selected was San Juan Bautista church in Talamanca de Jarama (Madrid, Spain. We report the preliminary analysis required to study the effects of heating in this historical location using WSNs to monitor the temperature and humidity conditions during periods of weeks. To test which routing topology was better for this kind of application, the WSNs were first deployed on the upper floor of the CAEND institute in Arganda del Rey simulating the church deployment, but in the former scenario there was no direct line of sight between the WSN elements. Two parameters were selected to evaluate the performance of the routing topologies of WSNs: the percentage of received messages and the lifetime of the wireless sensor network. To analyze in more detail which topology gave the best performance, other communication parameters were also measured. The tree topology used was the collection tree protocol and the mesh topology was the XMESH provided by MEMSIC (Andover, MA, USA. For the scenarios presented in this paper, it can be concluded that the tree topology lost fewer messages than the mesh topology.

  9. Deterministic Greedy Routing with Guaranteed Delivery in 3D Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Su Xia

    2014-05-01

    Full Text Available With both computational complexity and storage space bounded by a small constant, greedy routing is recognized as an appealing approach to support scalable routing in wireless sensor networks. However, significant challenges have been encountered in extending greedy routing from 2D to 3D space. In this research, we develop decentralized solutions to achieve greedy routing in 3D sensor networks. Our proposed approach is based on a unit tetrahedron cell (UTC mesh structure. We propose a distributed algorithm to realize volumetric harmonic mapping (VHM of the UTC mesh under spherical boundary condition. It is a one-to-one map that yields virtual coordinates for each node in the network without or with one internal hole. Since a boundary has been mapped to a sphere, node-based greedy routing is always successful thereon. At the same time, we exploit the UTC mesh to develop a face-based greedy routing algorithm and prove its success at internal nodes. To deliver a data packet to its destination, face-based and node-based greedy routing algorithms are employed alternately at internal and boundary UTCs, respectively. For networks with multiple internal holes, a segmentation and tunnel-based routing strategy is proposed on top of VHM to support global end-to-end routing. As far as we know, this is the first work that realizes truly deterministic routing with constant-bounded storage and computation in general 3D wireless sensor networks.

  10. Wireless cortical implantable systems

    CERN Document Server

    Majidzadeh Bafar, Vahid

    2013-01-01

    Wireless Cortical Implantable Systems examines the design for data acquisition and transmission in cortical implants. The first part of the book covers existing system-level cortical implants, as well as future devices. The authors discuss the major constraints in terms of microelectronic integration. The second part of the book focuses on system-level as well as circuit and system level solutions to the development of ultra low-power and low-noise microelectronics for cortical implants. Existing solutions are presented and novel methods and solutions proposed. The third part of the book focuses on the usage of digital impulse radio ultra wide-band transmission as an efficient method to transmit cortically neural recorded data at high data-rate to the outside world. Original architectural and circuit and system solutions are discussed.

  11. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  12. Wireless Josephson amplifier

    International Nuclear Information System (INIS)

    Narla, A.; Sliwa, K. M.; Hatridge, M.; Shankar, S.; Frunzio, L.; Schoelkopf, R. J.; Devoret, M. H.

    2014-01-01

    Josephson junction parametric amplifiers are playing a crucial role in the readout chain in superconducting quantum information experiments. However, their integration with current 3D cavity implementations poses the problem of transitioning between waveguide, coax cables, and planar circuits. Moreover, Josephson amplifiers require auxiliary microwave components, like directional couplers and/or hybrids, that are sources of spurious losses and impedance mismatches that limit measurement efficiency and amplifier tunability. We have developed a wireless architecture for these parametric amplifiers that eliminates superfluous microwave components and interconnects. This greatly simplifies their assembly and integration into experiments. We present an experimental realization of such a device operating in the 9–11 GHz band with about 100 MHz of amplitude gain-bandwidth product, on par with devices mounted in conventional sample holders. The simpler impedance environment presented to the amplifier also results in increased amplifier tunability.

  13. Mesh parameters influence on transparent and active antennas performance at microwaves

    Directory of Open Access Journals (Sweden)

    Alexis Martin

    2017-08-01

    Full Text Available Optically transparent and active square loop coplanar antennas operating in X-band are investigated in this letter. The frequency tunability is provided by a surface mounted beam-lead varactor with micrometric size, thereby no-visible to the naked eye. The influence of the metal mesh parameters on the sheet resistance (from 0.05 Ω/sq to 0.54 Ω/sq, the optical transparency (from 66% to 89% and the microwave performance (return loss, resonance frequency, radiation pattern and gain of such antennas is evaluated, compared with those of an opaque counterpart, and finally discussed. This study paves the way of their promising implementation on new surfaces, namely building and car windows for future wireless communications systems.

  14. Mesh parameters influence on transparent and active antennas performance at microwaves

    Science.gov (United States)

    Martin, Alexis; Castel, Xavier; Himdi, Mohamed; Lafond, Olivier

    2017-08-01

    Optically transparent and active square loop coplanar antennas operating in X-band are investigated in this letter. The frequency tunability is provided by a surface mounted beam-lead varactor with micrometric size, thereby no-visible to the naked eye. The influence of the metal mesh parameters on the sheet resistance (from 0.05 Ω/sq to 0.54 Ω/sq), the optical transparency (from 66% to 89%) and the microwave performance (return loss, resonance frequency, radiation pattern and gain) of such antennas is evaluated, compared with those of an opaque counterpart, and finally discussed. This study paves the way of their promising implementation on new surfaces, namely building and car windows for future wireless communications systems.

  15. Surgical management of lower urinary mesh perforation after mid-urethral polypropylene mesh sling: mesh excision, urinary tract reconstruction and concomitant pubovaginal sling with autologous rectus fascia.

    Science.gov (United States)

    Shah, Ketul; Nikolavsky, Dmitriy; Gilsdorf, Daniel; Flynn, Brian J

    2013-12-01

    We present our management of lower urinary tract (LUT) mesh perforation after mid-urethral polypropylene mesh sling using a novel combination of surgical techniques including total or near total mesh excision, urinary tract reconstruction, and concomitant pubovaginal sling with autologous rectus fascia in a single operation. We retrospectively reviewed the medical records of 189 patients undergoing transvaginal removal of polypropylene mesh from the lower urinary tract or vagina. The focus of this study is 21 patients with LUT mesh perforation after mid-urethral polypropylene mesh sling. We excluded patients with LUT mesh perforation from prolapse kits (n = 4) or sutures (n = 11), or mesh that was removed because of isolated vaginal wall exposure without concomitant LUT perforation (n = 164). Twenty-one patients underwent surgical removal of mesh through a transvaginal approach or combined transvaginal/abdominal approaches. The location of the perforation was the urethra in 14 and the bladder in 7. The mean follow-up was 22 months. There were no major intraoperative complications. All patients had complete resolution of the mesh complication and the primary symptom. Of the patients with urethral perforation, continence was achieved in 10 out of 14 (71.5 %). Of the patients with bladder perforation, continence was achieved in all 7. Total or near total removal of lower urinary tract (LUT) mesh perforation after mid-urethral polypropylene mesh sling can completely resolve LUT mesh perforation in a single operation. A concomitant pubovaginal sling can be safely performed in efforts to treat existing SUI or avoid future surgery for SUI.

  16. 21 CFR 870.3650 - Pacemaker polymeric mesh bag.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Pacemaker polymeric mesh bag. 870.3650 Section 870...) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Prosthetic Devices § 870.3650 Pacemaker polymeric mesh bag. (a) Identification. A pacemaker polymeric mesh bag is an implanted device used to hold a...

  17. Cryo-mesh: a simple alternative cryopreservation protocol.

    Science.gov (United States)

    Funnekotter, B; Bunn, E; Mancera, R L

    The continued development of new cryopreservation protocols has improved post-cryogenic success rates for a wide variety of plant species. Methods like the cryo-plate have proven beneficial in simplifying the cryopreservation procedure. This study assessed the practicality of a stainless steel mesh strip (cryo-mesh) for cryopreserving shoot tips from Anigozanthos viridis. Shoot tips of A. viridis (Kangaroo Paw) were precultured on 0.4 M sucrose medium for 48 h. Precultured shoot tips were coated in a 2% alginate solution and placed onto the cryo-mesh (a 25 x 7 mm, 0.4 mm aperture, 0.224 mm diameter wire stainless steel mesh strip). The alginate was set for 20 min in a loading solution containing 100 mM CaCl2, anchoring the shoot tips to the cryo-mesh. The cryo-mesh was then transferred to PVS2 on ice for 20, 30 or 40 min prior to plunging the cryo-mesh into liquid nitrogen. The cryo-mesh protocol was compared to the droplet-vitrification protocol. A maximum of 83% post-cryogenic regeneration was achieved with the cryo-mesh when exposed to PVS2 for 30 min. No significant difference in post-cryogenic regeneration was observed between the cryo-mesh and droplet-vitrification protocols. Anigozanthos viridis shoot tips were successfully cryopreserved utilising the new cryo-mesh. The cryo-mesh thus provides a simple and successful alternative for cryopreservation.

  18. Cache-mesh, a Dynamics Data Structure for Performance Optimization

    DEFF Research Database (Denmark)

    Nguyen, Tuan T.; Dahl, Vedrana Andersen; Bærentzen, J. Andreas

    2017-01-01

    This paper proposes the cache-mesh, a dynamic mesh data structure in 3D that allows modifications of stored topological relations effortlessly. The cache-mesh can adapt to arbitrary problems and provide fast retrieval to the most-referred-to topological relations. This adaptation requires trivial...

  19. Multiphase Flow of Immiscible Fluids on Unstructured Moving Meshes

    DEFF Research Database (Denmark)

    Misztal, Marek Krzysztof; Erleben, Kenny; Bargteil, Adam

    2013-01-01

    In this paper, we present a method for animating multiphase flow of immiscible fluids using unstructured moving meshes. Our underlying discretization is an unstructured tetrahedral mesh, the deformable simplicial complex (DSC), that moves with the flow in a Lagrangian manner. Mesh optimization op...

  20. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  1. Wireless Communications in Reverberant Environments

    Science.gov (United States)

    2015-01-01

    solutions exist which can be tailored to meet the needs nearly any wireless application. Some notable current solutions include USRPs [27] and GNURadio ...tailored to meet the needs nearly any wireless application. Some notable current solutions include USRPs [27] and GNURadio [28]. For this effort, the WARPv3...en.wikipedia.org/wiki/List of software-defined radios [27] “Ettus research.” [Online]. Available: http://www.ettus.com [28] “ Gnuradio .” [Online]. Available: http

  2. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  3. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  4. FPGA-based digital convolution for wireless applications

    CERN Document Server

    Guan, Lei

    2017-01-01

    This book presents essential perspectives on digital convolutions in wireless communications systems and illustrates their corresponding efficient real-time field-programmable gate array (FPGA) implementations. Covering these digital convolutions from basic concept to vivid simulation/illustration, the book is also supplemented with MS PowerPoint presentations to aid in comprehension. FPGAs or generic all programmable devices will soon become widespread, serving as the “brains” of all types of real-time smart signal processing systems, like smart networks, smart homes and smart cities. The book examines digital convolution by bringing together the following main elements: the fundamental theory behind the mathematical formulae together with corresponding physical phenomena; virtualized algorithm simulation together with benchmark real-time FPGA implementations; and detailed, state-of-the-art case studies on wireless applications, including popular linear convolution in digital front ends (DFEs); nonlinear...

  5. Low-Power Wireless Sensor Networks Protocols, Services and Applications

    CERN Document Server

    Suhonen, Jukka; Kaseva, Ville; Hämäläinen, Timo D; Hännikäinen, Marko

    2012-01-01

    Wireless sensor network (WSN) is an ad-hoc network technology comprising even thousands of autonomic and self-organizing nodes that combine environmental sensing, data processing, and wireless networking. The applications for sensor networks range from home and industrial environments to military uses. Unlike the traditional computer networks, a WSN is application-oriented and deployed for a specific task. WSNs are data centric, which means that messages are not send to individual nodes but to geographical locations or regions based on the data content. A WSN node is typically battery powered and characterized by extremely small size and low cost. As a result, the processing power, memory, and energy resources of an individual sensor node are limited. However, the feasibility of a WSN lies on the collaboration between the nodes. A reference WSN node comprises a Micro-Controller Unit (MCU) having few Million Instructions Per Second (MIPS) processing speed, tens of kilobytes program memory, few kilobytes data m...

  6. Fault Tolerance in ZigBee Wireless Sensor Networks

    Science.gov (United States)

    Alena, Richard; Gilstrap, Ray; Baldwin, Jarren; Stone, Thom; Wilson, Pete

    2011-01-01

    Wireless sensor networks (WSN) based on the IEEE 802.15.4 Personal Area Network standard are finding increasing use in the home automation and emerging smart energy markets. The network and application layers, based on the ZigBee 2007 PRO Standard, provide a convenient framework for component-based software that supports customer solutions from multiple vendors. This technology is supported by System-on-a-Chip solutions, resulting in extremely small and low-power nodes. The Wireless Connections in Space Project addresses the aerospace flight domain for both flight-critical and non-critical avionics. WSNs provide the inherent fault tolerance required for aerospace applications utilizing such technology. The team from Ames Research Center has developed techniques for assessing the fault tolerance of ZigBee WSNs challenged by radio frequency (RF) interference or WSN node failure.

  7. Putting Home Data Management into Perspective

    Science.gov (United States)

    2009-12-01

    An Anthropological Study of Television Usage Behaviors. Human Factors and Ergonomics Society 39th Annual Meet- ing, pages 326–330, 1995. 10 [38...advanced networking setups in the home, exploring the management of the physical networks (e.g., wireless routers) installed by the owners themselves...their usage. Pre-study file sharing methods: Before installation of the system, household members primarily used email and physical media to move data

  8. WIRELESS SENSOR SYSTEM FOR IMPLEMENTATION OF SMART SPACES

    Directory of Open Access Journals (Sweden)

    Gerardo Cázarez-Ayala

    2014-01-01

    Full Text Available This paper describes the design, implementation and application of a smart sensor system based in wireless communication protocol, which was developed with the main objective of facilitate the implementation of smart places, whereby monitoring and supervision of environmental physical variables in a residence or commercial buildings. Based in this system, we want to co-help taking advantage and save electric energy, optimizing the use of the lighting systems and air conditioner only in the schedules and under pre-established conditions for the final user. The system is based in a variety of nodes o modules of sensors like temperature, humidity, light, carbon monoxide, noise and LP gas which have the ability to work collaboratively in networks with topologies like star, tree and mesh.

  9. A Wireless Multi-Sensor Dielectric Impedance Spectroscopy Platform

    Directory of Open Access Journals (Sweden)

    Seyed Alireza Ghaffari

    2015-09-01

    Full Text Available This paper describes the development of a low-cost, miniaturized, multiplexed, and connected platform for dielectric impedance spectroscopy (DIS, designed for in situ measurements and adapted to wireless network architectures. The platform has been tested and used as a DIS sensor node on ZigBee mesh and was able to interface up to three DIS sensors at the same time and relay the information through the network for data analysis and storage. The system is built from low-cost commercial microelectronics components, performs dielectric spectroscopy ranging from 5 kHz to 100 kHz, and benefits from an on-the-fly calibration system that makes sensor calibration easy. The paper describes the microelectronics design, the Nyquist impedance response, the measurement sensitivity and accuracy, and the testing of the platform for in situ dielectric impedance spectroscopy applications pertaining to fertilizer sensing, water quality sensing, and touch sensing.

  10. Prosthetic Mesh Repair for Incarcerated Inguinal Hernia

    Directory of Open Access Journals (Sweden)

    Cihad Tatar

    2016-08-01

    Full Text Available Background: Incarcerated inguinal hernia is a commonly encountered urgent surgical condition, and tension-free repair is a well-established method for the treatment of noncomplicated cases. However, due to the risk of prosthetic material-related infections, the use of mesh in the repair of strangulated or incarcerated hernia has often been subject to debate. Recent studies have demonstrated that biomaterials represent suitable materials for performing urgent hernia repair. Certain studies recommend mesh repair only for cases where no bowel resection is required; other studies, however, recommend mesh repair for patients requiring bowel resection as well. Aim: The aim of this study was to compare the outcomes of different surgical techniques performed for strangulated hernia, and to evaluate the effect of mesh use on postoperative complications. Study Design: Retrospective cross-sectional study. Methods: This retrospective study was performed with 151 patients who had been admitted to our hospital’s emergency department to undergo surgery for a diagnosis of incarcerated inguinal hernia. The patients were divided into two groups based on the applied surgical technique. Group 1 consisted of 112 patients treated with mesh-based repair techniques, while Group 2 consisted of 39 patients treated with tissue repair techniques. Patients in Group 1 were further divided into two sub-groups: one consisting of patients undergoing bowel resection (Group 3, and the other consisting of patients not undergoing bowel resection (Group 4. Results: In Group 1, it was observed that eight (7.14% of the patients had wound infections, while two (1.78% had hematomas, four (3.57% had seromas, and one (0.89% had relapse. In Group 2, one (2.56% of the patients had a wound infection, while three (7.69% had hematomas, one (2.56% had seroma, and none had relapses. There were no statistically significant differences between the two groups with respect to wound infection

  11. Home Networking Do-It-Yourself For Dummies

    CERN Document Server

    Miller, Lawrence C

    2011-01-01

    Step by step guide to connecting all your electronic devices into one network A home network allows you to share Internet connections, photos, video, music, game consoles, printers, and other electronic gadgets. This do-it-yourself guide shows you step by step how to create a wired or wireless network in your home. In the For Dummies tradition of making technology less intimidating, Home Networking Do-It-Yourself For Dummies breaks down the process into easy steps with clear instructions.Increasing broadband speeds, cellular technology, the explosive growth of iPhone sales, and the new Home Gr

  12. To mesh or not to mesh: a review of pelvic organ reconstructive surgery

    Directory of Open Access Journals (Sweden)

    Dällenbach P

    2015-04-01

    Full Text Available Patrick Dällenbach Department of Gynecology and Obstetrics, Division of Gynecology, Urogynecology Unit, Geneva University Hospitals, Geneva, Switzerland Abstract: Pelvic organ prolapse (POP is a major health issue with a lifetime risk of undergoing at least one surgical intervention estimated at close to 10%. In the 1990s, the risk of reoperation after primary standard vaginal procedure was estimated to be as high as 30% to 50%. In order to reduce the risk of relapse, gynecological surgeons started to use mesh implants in pelvic organ reconstructive surgery with the emergence of new complications. Recent studies have nevertheless shown that the risk of POP recurrence requiring reoperation is lower than previously estimated, being closer to 10% rather than 30%. The development of mesh surgery – actively promoted by the marketing industry – was tremendous during the past decade, and preceded any studies supporting its benefit for our patients. Randomized trials comparing the use of mesh to native tissue repair in POP surgery have now shown better anatomical but similar functional outcomes, and meshes are associated with more complications, in particular for transvaginal mesh implants. POP is not a life-threatening condition, but a functional problem that impairs quality of life for women. The old adage “primum non nocere” is particularly appropriate when dealing with this condition which requires no treatment when asymptomatic. It is currently admitted that a certain degree of POP is physiological with aging when situated above the landmark of the hymen. Treatment should be individualized and the use of mesh needs to be selective and appropriate. Mesh implants are probably an important tool in pelvic reconstructive surgery, but the ideal implant has yet to be found. The indications for its use still require caution and discernment. This review explores the reasons behind the introduction of mesh augmentation in POP surgery, and aims to

  13. Self-activating intelligent home using bluetooth

    Science.gov (United States)

    Karthikeyan, P.; Sumanth, N.; Jude, S.

    2017-11-01

    Homes today need to exploit the various technologies available to make them intelligent. In this paper, a wireless system is proposed to automate home appliances using Bluetooth. This system can be used from a Bluetooth module that is closer than 10 meters to the system. Once in range, various appliances can be self-activated by the software that is built into a microcontroller. It is envisioned to offer automation of doors, lights and various electrical appliances. It also offers a complete user based automation for an improved personal experience.

  14. Meshed split skin graft for extensive vitiligo

    Directory of Open Access Journals (Sweden)

    Srinivas C

    2004-05-01

    Full Text Available A 30 year old female presented with generalized stable vitiligo involving large areas of the body. Since large areas were to be treated it was decided to do meshed split skin graft. A phototoxic blister over recipient site was induced by applying 8 MOP solution followed by exposure to UVA. The split skin graft was harvested from donor area by Padgett dermatome which was meshed by an ampligreffe to increase the size of the graft by 4 times. Significant pigmentation of the depigmented skin was seen after 5 months. This procedure helps to cover large recipient areas, when pigmented donor skin is limited with minimal risk of scarring. Phototoxic blister enables easy separation of epidermis thus saving time required for dermabrasion from recipient site.

  15. Nondispersive optical activity of meshed helical metamaterials.

    Science.gov (United States)

    Park, Hyun Sung; Kim, Teun-Teun; Kim, Hyeon-Don; Kim, Kyungjin; Min, Bumki

    2014-11-17

    Extreme optical properties can be realized by the strong resonant response of metamaterials consisting of subwavelength-scale metallic resonators. However, highly dispersive optical properties resulting from strong resonances have impeded the broadband operation required for frequency-independent optical components or devices. Here we demonstrate that strong, flat broadband optical activity with high transparency can be obtained with meshed helical metamaterials in which metallic helical structures are networked and arranged to have fourfold rotational symmetry around the propagation axis. This nondispersive optical activity originates from the Drude-like response as well as the fourfold rotational symmetry of the meshed helical metamaterials. The theoretical concept is validated in a microwave experiment in which flat broadband optical activity with a designed magnitude of 45° per layer of metamaterial is measured. The broadband capabilities of chiral metamaterials may provide opportunities in the design of various broadband optical systems and applications.

  16. Isomorphic routing on a toroidal mesh

    Science.gov (United States)

    Mao, Weizhen; Nicol, David M.

    1993-01-01

    We study a routing problem that arises on SIMD parallel architectures whose communication network forms a toroidal mesh. We assume there exists a set of k message descriptors (xi, yi), where (xi, yi) indicates that the ith message's recipient is offset from its sender by xi hops in one mesh dimension, and yi hops in the other. Every processor has k messages to send, and all processors use the same set of message routing descriptors. The SIMD constraint implies that at any routing step, every processor is actively routing messages with the same descriptors as any other processor. We call this isomorphic routing. Our objective is to find the isomorphic routing schedule with least makespan. We consider a number of variations on the problem, yielding complexity results from O(k) to NP-complete. Most of our results follow after we transform the problem into a scheduling problem, where it is related to other well-known scheduling problems.

  17. Partitioning of unstructured meshes for load balancing

    International Nuclear Information System (INIS)

    Martin, O.C.; Otto, S.W.

    1994-01-01

    Many large-scale engineering and scientific calculations involve repeated updating of variables on an unstructured mesh. To do these types of computations on distributed memory parallel computers, it is necessary to partition the mesh among the processors so that the load balance is maximized and inter-processor communication time is minimized. This can be approximated by the problem, of partitioning a graph so as to obtain a minimum cut, a well-studied combinatorial optimization problem. Graph partitioning algorithms are discussed that give good but not necessarily optimum solutions. These algorithms include local search methods recursive spectral bisection, and more general purpose methods such as simulated annealing. It is shown that a general procedure enables to combine simulated annealing with Kernighan-Lin. The resulting algorithm is both very fast and extremely effective. (authors) 23 refs., 3 figs., 1 tab

  18. Adaptive upscaling with the dual mesh method

    Energy Technology Data Exchange (ETDEWEB)

    Guerillot, D.; Verdiere, S.

    1997-08-01

    The objective of this paper is to demonstrate that upscaling should be calculated during the flow simulation instead of trying to enhance the a priori upscaling methods. Hence, counter-examples are given to motivate our approach, the so-called Dual Mesh Method. The main steps of this numerical algorithm are recalled. Applications illustrate the necessity to consider different average relative permeability values depending on the direction in space. Moreover, these values could be different for the same average saturation. This proves that an a priori upscaling cannot be the answer even in homogeneous cases because of the {open_quotes}dynamical heterogeneity{close_quotes} created by the saturation profile. Other examples show the efficiency of the Dual Mesh Method applied to heterogeneous medium and to an actual field case in South America.

  19. Variational mesh segmentation via quadric surface fitting

    KAUST Repository

    Yan, Dongming

    2012-11-01

    We present a new variational method for mesh segmentation by fitting quadric surfaces. Each component of the resulting segmentation is represented by a general quadric surface (including plane as a special case). A novel energy function is defined to evaluate the quality of the segmentation, which combines both L2 and L2 ,1 metrics from a triangle to a quadric surface. The Lloyd iteration is used to minimize the energy function, which repeatedly interleaves between mesh partition and quadric surface fitting. We also integrate feature-based and simplification-based techniques in the segmentation framework, which greatly improve the performance. The advantages of our algorithm are demonstrated by comparing with the state-of-the-art methods. © 2012 Elsevier Ltd. All rights reserved.

  20. Diffusive mesh relaxation in ALE finite element numerical simulations

    Energy Technology Data Exchange (ETDEWEB)

    Dube, E.I.

    1996-06-01

    The theory for a diffusive mesh relaxation algorithm is developed for use in three-dimensional Arbitary Lagrange/Eulerian (ALE) finite element simulation techniques. This mesh relaxer is derived by a variational principle for an unstructured 3D grid using finite elements, and incorporates hourglass controls in the numerical implementation. The diffusive coefficients are based on the geometric properties of the existing mesh, and are chosen so as to allow for a smooth grid that retains the general shape of the original mesh. The diffusive mesh relaxation algorithm is then applied to an ALE code system, and results from several test cases are discussed.

  1. TPM: Tree-Particle-Mesh code

    Science.gov (United States)

    Bode, Paul

    2013-05-01

    TPM carries out collisionless (dark matter) cosmological N-body simulations, evolving a system of N particles as they move under their mutual gravitational interaction. It combines aspects of both Tree and Particle-Mesh algorithms. After the global PM forces are calculated, spatially distinct regions above a given density contrast are located; the tree code calculates the gravitational interactions inside these denser objects at higher spatial and temporal resolution. The code is parallel and uses MPI for message passing.

  2. Symmetries and the coarse-mesh method

    International Nuclear Information System (INIS)

    Makai, M.

    1980-10-01

    This report approaches the basic problem of the coarse-mesh method from a new side. Group theory is used for the determination of the space dependency of the flux. The result is a method called ANANAS after the analytic-analytic solution. This method was tested on two benchmark problems: one given by Melice and the IAEA benchmark. The ANANAS program is an experimental one. The method was intended for use in hexagonal geometry. (Auth.)

  3. Home Care

    Science.gov (United States)

    ... Aging & Health A to Z › Home Care Font size A A A Print Share Glossary Basic Facts & Information Other Resources Caregiving How To's Tools & Tips Latest Research Getting More Help Related Topics Assisted Living Community-Based Care Nursing Homes Join our e- ...

  4. Cross Layer QoS Provisioning in Home Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Brewka, Lukasz Jerzy; Ruepp, Sarah Renée

    2011-01-01

    This paper introduces an innovative QoS provisioning scheme in home networks, by utilizing Optical Wireless (OW) MAC specification proposed by Home Gigabit Access Project (OMEGA) project. The specification is characterized by its resource reservation protocol and the use of Time Division Multiple......S levels to streams with different priorities, especially to delay-sensitive services. Efficiencies of the algorithms and network performance are validated by analyzing the results collected from OPNET simulation models....

  5. Numerical Investigation of Corrugated Wire Mesh Laminate

    Directory of Open Access Journals (Sweden)

    Jeongho Choi

    2013-01-01

    Full Text Available The aim of this work is to develop a numerical model of Corrugated Wire Mesh Laminate (CWML capturing all its complexities such as nonlinear material properties, nonlinear geometry and large deformation behaviour, and frictional behaviour. Development of such a model will facilitate numerical simulation of the mechanical behaviour of the wire mesh structure under various types of loading as well as the variation of the CWML configuration parameters to tailor its mechanical properties to suit the intended application. Starting with a single strand truss model consisting of four waves with a bilinear stress-strain model to represent the plastic behaviour of stainless steel, the finite element model is gradually built up to study single-layer structures with 18 strands of corrugated wire meshes consistency and double- and quadruple-layered laminates with alternating crossply orientations. The compressive behaviour of the CWML model is simulated using contact elements to model friction and is compared to the load-deflection behaviour determined experimentally in uniaxial compression tests. The numerical model of the CWML is then employed to conduct the aim of establishing the upper and lower bounds of stiffness and load capacity achievable by such structures.

  6. Collagen/Polypropylene composite mesh biocompatibility in abdominal wall reconstruction.

    Science.gov (United States)

    Lukasiewicz, Aleksander; Skopinska-Wisniewska, Joanna; Marszalek, Andrzej; Molski, Stanislaw; Drewa, Tomasz

    2013-05-01

    Intraperitoneal placement of polypropylene mesh leads to extensive visceral adhesions and is contraindicated. Different coatings are used to improve polypropylene mesh properties. Collagen is a protein with unique biocompatibility and cell ingrowth enhancement potential. A novel acetic acid extracted collagen coating was developed to allow placement of polypropylene mesh in direct contact with viscera. The authors' aim was to evaluate the long-term influence of acetic acid extracted collagen coating on surgical aspects and biomechanical properties of polypropylene mesh implanted in direct contact with viscera, including complications, adhesions with viscera, strength of incorporation, and microscopic inflammatory reaction. Forty adult Wistar rats were divided into two groups: experimental (polypropylene mesh/acetic acid extracted collagen coating) and control (polypropylene mesh only). Astandardized procedure of mesh implantation was performed. Animals were killed 3 months after surgery and analyzed for complications, mesh area covered by adhesions, type of adhesions, strength of incorporation, and intensity of inflammatory response. The mean adhesion area was lower for polypropylene mesh/acetic acid extracted collagen coating (14.5 percent versus 69.9 percent, p polypropylene mesh are significantly reduced because of acetic acid extracted collagen coating. The collagen coating does not increase complications or induce alterations of polypropylene mesh incorporation.

  7. MeSH Now: automatic MeSH indexing at PubMed scale via learning to rank.

    Science.gov (United States)

    Mao, Yuqing; Lu, Zhiyong

    2017-04-17

    MeSH indexing is the task of assigning relevant MeSH terms based on a manual reading of scholarly publications by human indexers. The task is highly important for improving literature retrieval and many other scientific investigations in biomedical research. Unfortunately, given its manual nature, the process of MeSH indexing is both time-consuming (new articles are not immediately indexed until 2 or 3 months later) and costly (approximately ten dollars per article). In response, automatic indexing by computers has been previously proposed and attempted but remains challenging. In order to advance the state of the art in automatic MeSH indexing, a community-wide shared task called BioASQ was recently organized. We propose MeSH Now, an integrated approach that first uses multiple strategies to generate a combined list of candidate MeSH terms for a target article. Through a novel learning-to-rank framework, MeSH Now then ranks the list of candidate terms based on their relevance to the target article. Finally, MeSH Now selects the highest-ranked MeSH terms via a post-processing module. We assessed MeSH Now on two separate benchmarking datasets using traditional precision, recall and F 1 -score metrics. In both evaluations, MeSH Now consistently achieved over 0.60 in F-score, ranging from 0.610 to 0.612. Furthermore, additional experiments show that MeSH Now can be optimized by parallel computing in order to process MEDLINE documents on a large scale. We conclude that MeSH Now is a robust approach with state-of-the-art performance for automatic MeSH indexing and that MeSH Now is capable of processing PubMed scale documents within a reasonable time frame. http://www.ncbi.nlm.nih.gov/CBBresearch/Lu/Demo/MeSHNow/ .

  8. Prosthetic mesh repair of abdominal wall hernias in horses.

    Science.gov (United States)

    Tóth, Ferenc; Schumacher, Jim

    2018-02-05

    Repair of hernias of the abdominal wall of horses is often augmented by inserting a prosthetic mesh. In this review, we describe the various characteristics of prosthetic meshes used for hernia repair and present 2 systems that are used by surgeons in the human medical field to classify techniques of prosthetic mesh herniorrhaphy. Both of these classification systems distinguish between onlay, inlay, sublay, and underlay placements of mesh, based on the location within the abdominal wall in which the prosthetic mesh is inserted. We separate the published techniques of prosthetic mesh herniorrhaphy of horses using this classification system, ascribing names to the techniques of herniorrhaphy where none existed, and report the success rates and complications associated with each technique. By introducing a classification system widely used in the human medical field and illustrating each technique in a figure, we hope to clarify inconsistent nomenclature associated with prosthetic mesh herniorrhaphy performed by veterinary surgeons. © 2018 The American College of Veterinary Surgeons.

  9. Data-Parallel Mesh Connected Components Labeling and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Harrison, Cyrus; Childs, Hank; Gaither, Kelly

    2011-04-10

    We present a data-parallel algorithm for identifying and labeling the connected sub-meshes within a domain-decomposed 3D mesh. The identification task is challenging in a distributed-memory parallel setting because connectivity is transitive and the cells composing each sub-mesh may span many or all processors. Our algorithm employs a multi-stage application of the Union-find algorithm and a spatial partitioning scheme to efficiently merge information across processors and produce a global labeling of connected sub-meshes. Marking each vertex with its corresponding sub-mesh label allows us to isolate mesh features based on topology, enabling new analysis capabilities. We briefly discuss two specific applications of the algorithm and present results from a weak scaling study. We demonstrate the algorithm at concurrency levels up to 2197 cores and analyze meshes containing up to 68 billion cells.

  10. Home Area Networks and the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Clements, Samuel L.; Carroll, Thomas E.; Hadley, Mark D.

    2011-04-01

    With the wide array of home area network (HAN) options being presented as solutions to smart grid challenges for the home, it is time to compare and contrast their strengths and weaknesses. This white paper examines leading and emerging HAN technologies. The emergence of the smart grid is bringing more networking players into the field. The need for low consistent bandwidth usage differs enough from the traditional information technology world to open the door to new technologies. The predominant players currently consist of a blend of the old and new. Within the wired world Ethernet and HomePlug Green PHY are leading the way with an advantage to HomePlug because it doesn't require installing new wires. In the wireless the realm there are many more competitors but WiFi and ZigBee seem to have the most momentum.

  11. In-home video distribution for telecom operators

    NARCIS (Netherlands)

    Hendrix, B.; Hartog, F.T.H. den; Vlag, H. van der; Baken, N.

    2005-01-01

    We have investigated the various alternatives for in-home video distribution that might be applicable between now and 2010. Among these are wireless and so-called no-new-wires architectures, but also unconventional approaches based on analogue distribution. The latter actually led to a surprisingly

  12. Hybrid Evolutionary Approaches to Maximum Lifetime Routing and Energy Efficiency in Sensor Mesh Networks.

    Science.gov (United States)

    Rahat, Alma A M; Everson, Richard M; Fieldsend, Jonathan E

    2015-01-01

    Mesh network topologies are becoming increasingly popular in battery-powered wireless sensor networks, primarily because of the extension of network range. However, multihop mesh networks suffer from higher energy costs, and the routing strategy employed directly affects the lifetime of nodes with limited energy resources. Hence when planning routes there are trade-offs to be considered between individual and system-wide battery lifetimes. We present a multiobjective routing optimisation approach using hybrid evolutionary algorithms to approximate the optimal trade-off between the minimum lifetime and the average lifetime of nodes in the network. In order to accomplish this combinatorial optimisation rapidly, our approach prunes the search space using k-shortest path pruning and a graph reduction method that finds candidate routes promoting long minimum lifetimes. When arbitrarily many routes from a node to the base station are permitted, optimal routes may be found as the solution to a well-known linear program. We present an evolutionary algorithm that finds good routes when each node is allowed only a small number of paths to the base station. On a real network deployed in the Victoria & Albert Museum, London, these solutions, using only three paths per node, are able to achieve minimum lifetimes of over 99% of the optimum linear program solution's time to first sensor battery failure.

  13. WIRELESS CONTROL SYSTEM: DESIGN, DEVELOPMENT AND APPLICATION ON INDUSTRIAL BOILER

    Directory of Open Access Journals (Sweden)

    Gerardo Cázarez-Ayala

    2014-01-01

    Full Text Available This paper has as objective to describe the design and development of a control unit with capacity to communicate with similar others units in a wireless and wired way, this with the finality of achieve to develop a powerful control unit, useful, flexible and cheap, through it be possible the implementation of distributed control systems in a wireless and wired way based in advance network topologies, like star, cluster tree and mesh, in function of the diverse communication technologies that in these times are manage in the industry process automation field and having as reference the most novelties and promising advantages of the last technologies available in the international market. The system includes a software communication driver; develop to operate in the control unit and the PC level. This driver was implemented in two layers structure, the first one, was develop under the platform of the microcontroller based the electronic board implemented, an ATmega 328 microcontroller with an Arduino bootloader. The second layer of the driver is based in LabVIEW platform under Windows operating system, and this work in a personal computer. All this, with the main objective of to prove to the user a technology tool to develop task communication between the control units network and the control room and do easier the implementation of the network communications and graphical users interfaces GUI ́s, and transparent for the developer of the system or the programmer of the network.

  14. Traffic Profiling in Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Kirykos, Georgios

    2006-01-01

    .... Wireless sensor networks pose unique challenges and limitations to the traditional schemes, which are used in the other wireless networks for security protection, and are due mainly to the increased...

  15. CMOS circuits for passive wireless microsystems

    CERN Document Server

    Yuan, Fei

    2011-01-01

    Here is a comprehensive examination of CMOS circuits for passive wireless microsystems. Covers design challenges, fundamental issues of ultra-low power wireless communications, radio-frequency power harvesting, and advanced design techniques, and more.

  16. Wireless Sensor Portal Technology, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Mobitrum Corporation has demonstrated the feasibility in the Phase I of " A Wireless Sensor Portal Technology" and proposes a Phase II effort to develop a wireless...

  17. Kali Linux wireless penetration testing beginner's guide

    CERN Document Server

    Ramachandran, Vivek

    2015-01-01

    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

  18. STUDY & SURVEY ON WIRELESS CHARGING & TECHNOLOGY

    OpenAIRE

    Harshal Sharma*

    2016-01-01

    In the modern world, we have often heard a word- wireless charging technology. Actually what is it all about? So this paper is giving you the whole package about wireless charging technology. Wireless charging is a technology through which power is transmitted through an air gap to the electrical devices for the motive of replenishment of energy. At present wireless charging techniques and development of commercial products have provided a promise to address the energy bottleneck of portable ...

  19. A Forensic Readiness Model for Wireless Networks

    OpenAIRE

    Ngobeni, Sipho; Venter, Hein; Burke, Ivan

    2010-01-01

    International audience; Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environme...

  20. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...