WorldWideScience

Sample records for wireless internet map

  1. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  2. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  3. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  4. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  5. Economics and Governance of the wireless Internet

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders; Tadayoni, Reza

    barriers of entry. In this paper three issues are discussed: 1) Developments in pricing schemes for Internet interconnection and Internet access with special focus on the role of wireless access. 2) Developments in supporting infrastructures with special focus on the increasing role of wireless......The Internet has undergone a growing diversification with regard to types of users, kinds of services and use of transmission technologies and infrastructures. Today, internet services are delivered by the use of many different wired and wireless communication technologies with different technical...... capabilities and limitations, and with different techno-economic characteristics. The question is whether these trends challenge the current mode of governance for the Internet. In the early days, the Internet was considered to be open, free, competitive, with a high level of entrepreneurialism, and with low...

  6. VT Wireless Internet Service Providers 2006

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) The VT Wireless Internet Service Provider (ISP) dataset (WISP2006) includes polygons depicting the extent of Vermont's WISP broadband system as of...

  7. VT Wireless Internet Service Providers 2007

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) The VT Wireless Internet Service Provider (ISP) dataset (WISP2007) includes polygons depicting the extent of Vermont's WISP broadband system as of...

  8. Adoption of wireless internet parks: An empirical study in Qatar

    OpenAIRE

    Weerakkody, V

    2008-01-01

    This paper examines the adoption of free wireless internet parks (iPark) by Qatari citizens as means of accessing electronic services from public parks. The Qatar government has launched the iPark concept with a view of providing free internet access for all citizens while enjoying the outdoors. By offering free wireless Internet access, the Qatari government encourages its citizen's to actively participate in the global information society with a view of bridging the digital divide. Using a ...

  9. Why People Aren't Using Wireless Internet

    DEFF Research Database (Denmark)

    Ahluwalia, Punit; Gimpel, Gregory; Varshney, Upkar

    2010-01-01

    This paper proposes a new model for understanding the adoption of internet services when competing technological standards can fulfil similar needs. Using prospect theory as its theoretical foundation, the model posits that reference prices, flat rate preference, and status quo bias constitute...... the perceived sacrifice when users consider adoption of new services such as wireless internet. Perceived sacrifice and perceived quality influence the perceived relative value, which in turn influences the intention to adopt wireless internet. The proposed model and related hypotheses are empirically confirmed...

  10. Wireless sensor communications and internet connectivity for sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Dunbar, M. [Crossbow Technology, Inc., San Jose, CA (United States)

    2001-07-01

    A wireless sensor network architecture is an integrated hardware/software solution that has the potential to change the way sensors are used in a virtually unlimited range of industries and applications. By leveraging Bluetooth wireless technology for low-cost, short-range radio links, wireless sensor networks such as CrossNet{sup TM} enable users to create wireless sensor networks. These wireless networks can link dozens or hundreds of sensors of disparate types and brands with data acquisition/analysis systems, such as handheld devices, internet-enabled laptop or desktop PCs. The overwhelming majority of sensor applications are hard-wired at present, and since wiring is often the most time-consuming, tedious, trouble-prone and expensive aspect of sensor applications, users in many fields will find compelling reasons to adopt the wireless sensor network solution. (orig.)

  11. Wireless Internet on Trains - Impact on Performance of Business Travelers

    NARCIS (Netherlands)

    Zhang, M.; Marchau, V.A.W.J.; Wee, B. van; Hoorn, T. van der

    2006-01-01

    Wireless Internet service (WIS) is finding increasing implementation in the Netherlands via several markets. Recently, the idea has emerged of providing WIS through public transport services. The impact of WIS on train travelers, particularly on business travelers, is, however, unknown. In a study

  12. Wireless IP and building the mobile Internet

    National Research Council Canada - National Science Library

    Dixit, Sudhir; Prasad, Ramjee

    2003-01-01

    ..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...

  13. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Science.gov (United States)

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  14. Using Internet of Things technologies for wireless sensor networks

    Science.gov (United States)

    Martinez, K.; Hart, J. K.; Basford, P. J.; Bragg, G. M.; Ward, T.

    2013-12-01

    Numerous authors have envisioned the future internet where anything will be connected: the Internet of Things (IoT). The idea is an extrapolation of the spread of networked devices such as phones, tablets etc. Each device is expected to have its own Internet address and thus be easy to access. The key building blocks of any IoT system are networking, hardware platforms and node software - so they are similar to wireless sensor network requirements. Most existing IoT demonstrators and applications have been gadget-style objects where power and connectivity problems are not too restricting. Environmental sensor networks can benefit from using some of the technologies involved in IoT development. However it is expected that tuning the networking and power management will be necessary to make them as efficient as state of the art wireless sensor networks. Some IoT assumptions such as always-connected nodes and full IP capability need to be considered. This paper will illustrate the advantages and disadvantages of IoT techniques for environment sensing drawing on a range of employment scenarios. We also describe a glacial 'Internet of things' project, which aims to monitor glacial processes. In particular we describe the IoT developments in a deployment in Iceland to examine glacier seismicity, velocity and provide camera images.

  15. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  16. An Internet of Energy Things Based on Wireless LPWAN

    Directory of Open Access Journals (Sweden)

    Yonghua Song

    2017-08-01

    Full Text Available Under intense environmental pressure, the global energy sector is promoting the integration of renewable energy into interconnected energy systems. The demand-side management (DSM of energy systems has drawn considerable industrial and academic attention in attempts to form new flexibilities to respond to variations in renewable energy inputs to the system. However, many DSM concepts are still in the experimental demonstration phase. One of the obstacles to DSM usage is that the current information infrastructure was mainly designed for centralized systems, and does not meet DSM requirements. To overcome this barrier, this paper proposes a novel information infrastructure named the Internet of Energy Things (IoET in order to make DSM practicable by basing it on the latest wireless communication technology: the low-power wide-area network (LPWAN. The primary advantage of LPWAN over general packet radio service (GPRS and area Internet of Things (IoT is its wide-area coverage, which comes with minimum power consumption and maintenance costs. Against this background, this paper briefly reviews the representative LPWAN technologies of narrow-band Internet of Things (NB-IoT and Long Range (LoRa technology, and compares them with GPRS and area IoT technology. Next, a wireless-to-cloud architecture is proposed for the IoET, based on the main technical features of LPWAN. Finally, this paper looks forward to the potential of IoET in various DSM application scenarios.

  17. Ubiquitous Wireless Sensor Networks and future “Internet of Things""

    OpenAIRE

    Vermesan, Ovidiu

    2009-01-01

    Overview of heterogeneous networks of embedded devices that can range from RFID, to smart identifiable systems with sensing and actuating capabilitie. Presentation of wireless sensor networks protocols and Internet of Things future technology. Bridging the real, virtual and digital worlds by using wireless connectivity. Application examples in automotive, aeronautics, healthcare, building, oil and gas industries. Ubiquitous Wireless Sensor Networks and future “Internet ...

  18. IPTV technology for the wireless Internet service provider (WISP

    Directory of Open Access Journals (Sweden)

    Mitchell Vásquez Bermúdez

    2018-02-01

    Full Text Available This article describes the implementation of the IPTV technology through an open source system for the wireless Internet service provider (WISP in the Cerecita site, located in the province of Guayas, Ecuador. The feasibility of implementing the IPTV technology is given through the use of the Emby Server application, in addition to the use of an operating system such as CentOS 7, which are open source and have the necessary requirements for the creation of this service. The analysis of data tra c generated on the WISP network, which will establish the advantages and disadvantages generated by the transmission of this technology, created to VOD multimedia content server that allows the video signal to be sent to users Finally, a feasibility study was carried out to analyze the advantages and disadvantages that exist in the implementation of this IPTV technology.

  19. The Making of a Sustainable Wireless City? Mapping Public Wi-Fi Access in Shanghai

    Directory of Open Access Journals (Sweden)

    Mingfeng Wang

    2016-01-01

    Full Text Available In the context of the global information economy, ready access to the Internet is critical to a city’s competitiveness, which has prompted a number of cities to launch plans to establish wireless networks. Most literature on the development of wireless cities focuses on cities in Western countries, and few have discussed how Chinese cities have adopted wireless technologies in their urban infrastructure development efforts. This paper examines recent development and spatial distribution of public Wi-Fi access in Shanghai, a leading business hub in China. We mapped Wi-Fi hotspots through the government sponsored “i-Shanghai” project and China Mobile Communications Corporation (CMCC. We find that while telecommunication providers have been proactively deploying WLAN (wireless local area network,a proxy of public Wi-Fi or wireless access hotspots in Shanghai, neither government sponsored WLAN hotspots nor facilities established by CMCC could cover the old traditional neighborhoods in the central city and sub-districts in remote rural areas. We also address the development of a more sustainable wireless city in Shanghai with a particular focus on digital divide and social equity issues.

  20. What is harmful for male fertility: Cell phone or the wireless internet?

    Directory of Open Access Journals (Sweden)

    Mehmet Erol Yildirim

    2015-09-01

    Full Text Available In this study, we aimed to assess the potential harmful effects of radiofrequency-electromagnetic radiation on sperm parameters. We requested semen for analyses from the male patients coming to our infertility division and also asked them to fill out an anonymous questionnaire. We queried their mobile phone and wireless internet usage frequencies in order to determine their radiofrequency-electromagnetic radiation exposure. A total of 1082 patients filled the questionnaire but 51 of them were excluded from the study because of azoospermia. There was no significant difference between sperm counts and sperm morphology excluding sperm motility, due to mobile phone usage period, (p = 0.074, p = 0.909, and p = 0.05, respectively. The total motile sperm count and the progressive motile sperm count decreased due to the increase of internet usage (p = 0.032 and p = 0.033, respectively. In line with the total motile sperm count, progressive motile sperm count also decreased with wireless internet usage compared with the wired internet connection usage (p = 0.009 and p = 0.018, respectively. There was a negative correlation between wireless internet usage duration and the total sperm count (r = −0.089, p = 0.039. We have also explored the negative effect of wireless internet use on sperm motility according to our preliminary results.

  1. What is harmful for male fertility: cell phone or the wireless Internet?

    Science.gov (United States)

    Yildirim, Mehmet Erol; Kaynar, Mehmet; Badem, Huseyin; Cavis, Mucahıt; Karatas, Omer Faruk; Cimentepe, Ersın

    2015-09-01

    In this study, we aimed to assess the potential harmful effects of radiofrequency-electromagnetic radiation on sperm parameters. We requested semen for analyses from the male patients coming to our infertility division and also asked them to fill out an anonymous questionnaire. We queried their mobile phone and wireless Internet usage frequencies in order to determine their radiofrequency-electromagnetic radiation exposure. A total of 1082 patients filled the questionnaire but 51 of them were excluded from the study because of azoospermia. There was no significant difference between sperm counts and sperm morphology excluding sperm motility, due to mobile phone usage period, (p = 0.074, p = 0.909, and p = 0.05, respectively). The total motile sperm count and the progressive motile sperm count decreased due to the increase of internet usage (p = 0.032 and p = 0.033, respectively). In line with the total motile sperm count, progressive motile sperm count also decreased with wireless Internet usage compared with the wired Internet connection usage (p = 0.009 and p = 0.018, respectively). There was a negative correlation between wireless Internet usage duration and the total sperm count (r = -0.089, p = 0.039). We have also explored the negative effect of wireless Internet use on sperm motility according to our preliminary results. Copyright © 2015. Published by Elsevier Taiwan.

  2. Performance analysis of different database in new internet mapping system

    Science.gov (United States)

    Yao, Xing; Su, Wei; Gao, Shuai

    2017-03-01

    In the Mapping System of New Internet, Massive mapping entries between AID and RID need to be stored, added, updated, and deleted. In order to better deal with the problem when facing a large number of mapping entries update and query request, the Mapping System of New Internet must use high-performance database. In this paper, we focus on the performance of Redis, SQLite, and MySQL these three typical databases, and the results show that the Mapping System based on different databases can adapt to different needs according to the actual situation.

  3. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  4. A Mobility-aware Broadcasting Infrastructure for a Wireless Internet with Hotspots

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, Henk; Eertink, E.H.; Widya, I.A.; Huizer, E.; Kermani, P.

    In this paper, we consider the problem of adaptively delivering live multimedia broadcasts (e.g., for applications such as TV, radio, or e-cinema) to a potentially large number of mobile hosts that roam about in a wireless internet with hotspots. We take a user-oriented approach based on an

  5. A telemedicine system for wireless home healthcare based on Bluetooth and the Internet.

    Science.gov (United States)

    Zhao, Xiaoming; Fei, Ding-Yu; Doarn, Charles R; Harnett, Brett; Merrell, Ronald

    2004-01-01

    The VitalPoll Telemedicine System (VTS) was designed and developed for wireless home healthcare. The aims of this study were: to design the architecture and communication methods for a telemedicine system; to implement a physiologic routing hub to collect data from different medical devices and sensors; and to evaluate the feasibility of this system for applications in wireless home healthcare. The VTS was built using Bluetooth wireless and Internet technologies with client/server architecture. Several medical devices, which acquire vital signs, such as real-time electrocardiogram signals, heart rate, body temperature, and activity (physical motion), were integrated into the VTS. Medical information and data were transmitted over short-range interface (USB, RS232), wireless communication, and the Internet. The medical results were stored in a database and presented using a web browser. The patient's vital signals can be collected, transmitted, and displayed in real time by the VTS. The experiments verified no data loss during Bluetooth and Internet communication. Bluetooth and the Internet provide enough bandwidth channels to tranmit these vital signs. The experimental results show that VTS may be suitable for a practical telemedicine system in home healthcare.

  6. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Science.gov (United States)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  7. FUZZY MAPPING IN DATA SONIFICATION SYSTEM OF WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    Arseny A. Markhotin

    2016-11-01

    Full Text Available Problem Statement. This paper describes the modeling of sonification system with possible types of wireless sensor network data. Fuzzy logic is used for the data-to-sound mapping. Methods. Devised sonification system includes input data model and sound synthesis core. It was created in Pure Data. For fuzzy output of mapped data the Fuzzy Logic Toolboxof MATLABwas used. Moreover, the system model has an ability to send data to the side application via UDP protocol. Results. We offer the method of timbre space organization for sonification system output and the following output of control sound characteristics depending on the type of input data. Practical Relevance. The offered approach of using fuzzy logic in sonification systems can be applied in development of new applications when the formalization of data-to-sound mapping is difficult and also complicated timbal space organization is required.

  8. Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things

    Science.gov (United States)

    Martínez, Néstor Lucas; Martínez, José-Fernán; Díaz, Vicente Hernández

    2014-01-01

    Wireless Sensor Networks (WSNs) are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model. PMID:25470489

  9. Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Néstor Lucas Martínez

    2014-12-01

    Full Text Available Wireless Sensor Networks (WSNs are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model.

  10. Virtualization of event sources in wireless sensor networks for the internet of things.

    Science.gov (United States)

    Lucas Martínez, Néstor; Martínez, José-Fernán; Hernández Díaz, Vicente

    2014-12-01

    Wireless Sensor Networks (WSNs) are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model.

  11. Internet map of the Hungarian nuclear field

    International Nuclear Information System (INIS)

    Besenyei, Elisabeth

    2001-01-01

    The increasing role of Internet in the dissemination of information cannot be questioned. The organisations dealing with public information have to face with this challenge. New methods and ways are needed in order to effectively use this opportunity. An effective communication requires certain knowledge on the characteristics of the target group. The present situation on the Internet use in Hungary has been studied by a number of public opinion polls. In Europe Hungary is the eleventh in the row concerning the population percentage of Internet users. At the same time it is hard to define the exact number as it is continuously increasing. From the public opinion polls it can be seen that about 49 % of active Internet users, about 37 percent seek for information on the Internet. The organisations playing role in nuclear field includes nuclear facilities, research institutes, regulatory bodies as well as civil associations. Almost all of them realised the importance of the appearance on the Internet and have their web site. Among the web-sites of the Hungarian nuclear facilities the new home page of the Paks NPP (www.npp.hu) is especially well designed and worth to visit. The Atomic Energy Research Institute operates the 10 MW Budapest Research Reactor. The main features of the reactor can be found on the web site of the institute (www.kfki.hu/~aekihp/). Information about the research possibilities of the training reactor of the Institute of Nuclear Techniques of the Technical University of Budapest is provided on the web site (www.reak.bme.hu). The web site of the Hungarian Atomic Energy Authority (www.haea.gov.hu) has been renewed recently. Certainly, the list of the web sites of the Hungarian organisations active in nuclear field cannot be complete as it is a continuously evolving area. Nevertheless one can see that the players realised the importance of the challenge given by the Internet. While considerable effort is needed to maintain and refresh the web site

  12. Indoor Positioning System Using Depth Maps and Wireless Networks

    Directory of Open Access Journals (Sweden)

    Jaime Duque Domingo

    2016-01-01

    Full Text Available This work presents a new Indoor Positioning System (IPS based on the combination of WiFi Positioning System (WPS and depth maps, for estimating the location of people. The combination of both technologies improves the efficiency of existing methods, based uniquely on wireless positioning techniques. While other positioning systems force users to wear special devices, the system proposed in this paper just requires the use of smartphones, besides the installation of RGB-D sensors in the sensing area. Furthermore, the system is not intrusive, being not necessary to know people’s identity. The paper exposes the method developed for putting together and exploiting both types of sensory information with positioning purposes: the measurements of the level of the signal received from different access points (APs of the wireless network and the depth maps provided by the RGB-D cameras. The obtained results show a significant improvement in terms of positioning with respect to common WiFi-based systems.

  13. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Directory of Open Access Journals (Sweden)

    Xin Yang

    Full Text Available Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  14. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Science.gov (United States)

    Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  15. Broadband wireless communications for railway applications for onboard internet access and other applications

    CERN Document Server

    Masson, Émilie

    2017-01-01

    This book focuses on the needs of railway operators in terms of wireless communications, divided in two main categories: the commercial services and the operational needs. Then, all available technologies that can be used to provide Internet access on board trains and all the other operational applications requiring high capacity are detailed. Finally, challenges and trends in railway telecommunications are highlighted, through the presentation of the future and emerging technologies, the current discussions and works in the different authorities, and the key challenges and scientific barriers.

  16. On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things

    OpenAIRE

    Yu, Hong; He, Jingsha; Liu, Ruohong; Ji, Dajie

    2013-01-01

    In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report be authenticated to intended Internet users and effectively filtered on its way to the Internet users to realize the security of data collection and transmission from the WSN. H...

  17. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    Science.gov (United States)

    Abbas, Zeeshan; Yoon, Wonyong

    2015-01-01

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT. PMID:26404275

  18. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    Directory of Open Access Journals (Sweden)

    Zeeshan Abbas

    2015-09-01

    Full Text Available The Internet of Things (IoT is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE, and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT.

  19. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects.

    Science.gov (United States)

    Abbas, Zeeshan; Yoon, Wonyong

    2015-09-25

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT.

  20. Pengembangan Wireless Sensor Network Berbasis Internet of Things untuk Sistem Pemantauan Kualitas Air dan Tanah Pertanian

    Directory of Open Access Journals (Sweden)

    Ummi Syafiqoh

    2018-05-01

    Full Text Available Water and soil quality is very important in agriculture. The level of acidity (pH and soil temperature is one of the things that affect the fertility of plants. Therefore the quality of water and soil on agricultural land is one of the important things that need special attention in its management. One solution to water and soil quality can be monitored and managed efficiently is by utilizing the Wireless Sensor Network based on the Internet of Things (IoT. Use of ESP8266 Module as a WIFI module, widely used by Internet-based applications of Things because the price is cheap, thus reducing many costs and have a pretty good speed of 80 MHz. This research aims to develop the concept of Wireless Sensor Network by utilizing ESP8266 module to monitor pH value using pH Meter Analog Kit sensor and temperature of agricultural land using DS18B20 Waterproof sensor. The result of temperature measurement accuracy using DS18B20 Waterproof sensor of the designed system is 99.09% while the pH measurement using pH Meter Analog Kit sensor is 91.33%.

  1. Addressing the Influence of Hidden State on Wireless Network Optimizations using Performance Maps

    DEFF Research Database (Denmark)

    Højgaard-Hansen, Kim; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2015-01-01

    be used to optimize the use of the wireless net- work by predicting future network performance and scheduling the net- work communication for certain applications on mobile devices. However, other important factors influence the performance of the wireless communication such as changes in the propagation...... environment and resource sharing. In this work we extend the framework of performance maps for wireless networks by introducing network state as an abstraction for all other factors than location that influence the performance. Since network state might not always be directly observable the framework......Performance of wireless connectivity for network client devices is location dependent. It has been shown that it can be beneficial to collect network performance metrics along with location information to generate maps of the location dependent network performance. These performance maps can...

  2. Smart "geomorphological" map browsing - a tale about geomorphological maps and the internet

    Science.gov (United States)

    Geilhausen, M.; Otto, J.-C.

    2012-04-01

    With the digital production of geomorphological maps, the dissemination of research outputs now extends beyond simple paper products. Internet technologies can contribute to both, the dissemination of geomorphological maps and access to geomorphologic data and help to make geomorphological knowledge available to a greater public. Indeed, many national geological surveys employ end-to-end digital workflows from data capture in the field to final map production and dissemination. This paper deals with the potential of web mapping applications and interactive, portable georeferenced PDF maps for the distribution of geomorphological information. Web mapping applications such as Google Maps have become very popular and widespread and increased the interest and access to mapping. They link the Internet with GIS technology and are a common way of presenting dynamic maps online. The GIS processing is performed online and maps are visualised in interactive web viewers characterised by different capabilities such as zooming, panning or adding further thematic layers, with the map refreshed after each task. Depending on the system architecture and the components used, advanced symbology, map overlays from different applications and sources and their integration into a Desktop GIS are possible. This interoperability is achieved through the use of international open standards that include mechanisms for the integration and visualisation of information from multiple sources. The portable document format (PDF) is commonly used for printing and is a standard format that can be processed by many graphic software and printers without loss of information. A GeoPDF enables the sharing of geospatial maps and data in PDF documents. Multiple, independent map frames with individual spatial reference systems are possible within a GeoPDF, for example, for map overlays or insets. Geospatial functionality of a GeoPDF includes scalable map display, layer visibility control, access to attribute

  3. Within a Stone's Throw: Proximal Geolocation of Internet Users via Covert Wireless Signaling

    Energy Technology Data Exchange (ETDEWEB)

    Paul, Nathanael R [ORNL; Shue, Craig [Worcester Polytechnic Institute, Worcester; Taylor, Curtis [Worcester Polytechnic Institute, Worcester

    2013-01-01

    While Internet users may often believe they have anonymity online, a culmination of technologies and recent research may allow an adversary to precisely locate an online user s geophysical location. In many cases, such as peer-to-peer applications, an adversary can easily use a target s IP address to quickly obtain the general geographical location of the target. Recent research has scoped this general area to a 690m (0.43 mile) radius circle. In this work, we show how an adversary can exploit Internet communication for geophysical location by embedding covert signals in communication with a target on a remote wireless local area network. We evaluated the approach in two common real-world settings: a residential neighborhood and an apartment building. In the neighborhood case, we used a single-blind trial in which an observer located a target network to within three houses in less than 40 minutes. Directional antennas may have allowed even more precise geolocation. This approach had only a 0.38% false positive rate, despite 24,000 observed unrelated packets and many unrelated networks. This low rate allowed the observer to exclude false locations and continue searching for the target. Our results enable law enforcement or copyright holders to quickly locate online Internet users without requiring time-consuming subpoenas to Internet Service Providers. Other privacy use cases include rapidly locating individuals based on their online speech or interests. We hope to raise awareness of these issues and to spur discussion on privacy and geolocating techniques.

  4. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications

    Science.gov (United States)

    Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki

    2016-01-01

    Many researchers are devoting attention to the so-called “Internet of Things” (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user’s demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology. PMID:27548177

  5. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications.

    Science.gov (United States)

    Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki

    2016-08-19

    Many researchers are devoting attention to the so-called "Internet of Things" (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user's demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology.

  6. The Resource Mapping Algorithm of Wireless Virtualized Networks for Saving Energy in Ultradense Small Cells

    Directory of Open Access Journals (Sweden)

    Sai Zou

    2015-01-01

    Full Text Available As the current network is designed for peak loads, it results in insufficient resource utilization and energy waste. Virtualized technology makes it possible that intelligent energy perception network could be deployed and resource sharing could become an effective energy saving technology. How to make more small cells into sleeping state for energy saving in ultradense small cell system has become a research hot spot. Based on the mapping feature of virtualized network, a new wireless resource mapping algorithm for saving energy in ultradense small cells has been put forward when wireless resource amount is satisfied in every small cell. First of all, the method divides the virtual cells. Again through the alternate updating between small cell mapping and wireless resource allocation, least amount of small cells is used and other small cells turn into sleeping state on the premise of guaranteeing users’ QoS. Next, the energy consumption of the wireless access system, wireless resource utilization, and the convergence of the proposed algorithm are analyzed in theory. Finally, the simulation results demonstrate that the algorithm can effectively reduce the system energy consumption and required wireless resource amount under the condition of satisfying users’ QoS.

  7. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks.

    Science.gov (United States)

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-11-12

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.

  8. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    Science.gov (United States)

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-01-01

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT. PMID:26569260

  9. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shalli Rani

    2015-11-01

    Full Text Available One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1 a hierarchical network design; (2 a model for the energy efficient IoT; (3 a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.

  10. Monitoring System of Environmental Variables Using a Wireless Sensor Network and Platforms of Internet of Things

    Directory of Open Access Journals (Sweden)

    Manuel Quiñones-Cuenca

    2017-02-01

    Full Text Available This work proposes a system for collecting meteorological data using a Wireless Sensor Network (WSN, that is able to transmit data in real-time. The system automatizes the process of collecting the data in a continuous manner for long periods of time, for this, the module is equipped with a source of solar energy that allows autonomous operation. In order to obtain viability of design and prototype implementation, the construction of two systems was proposed based on DigiMesh and Wi-Fi; those prototypes could be applied to different scenarios such as urban and rural areas. Additionally, it was performed an evaluation of broadcasting of information to platforms of Internet of Things (IoT, where the data collected by the nodes will be managed and displayed. This system was conceived as a low-cost alternative compared with conventional weather stations that offer these facilities and are based on free hardware and software components. Finally, the validation of the obtained results was performed using a statistical analysis with the collected data of the weather station Davis Vantage Pro, obtaining a maximum average relative error of 4.93%.

  11. Planning of Efficient Wireless Access with IEEE 802.16 for Connecting Home Network to the Internet

    Directory of Open Access Journals (Sweden)

    Pichet Ritthisoonthorn

    2010-01-01

    Full Text Available The emergence of IEEE802.16 wireless standard technology (WiMAX has significantly increased the choice to operators for the provisioning of wireless broadband access network. WiMAX is being deployed to compliment with xDSL in underserved or lack of the broadband network area, in both developed and developing countries. Many incumbent operators in developing countries are considering the deployment of WiMAX as part of their broadband access strategy. This paper presents an efficient and simple method for planning of broadband fixed wireless access (BFWA with IEEE802.16 standard to support home connection to Internet. The study formulates the framework for planning both coverage and capacity designs. The relationship between coverage area and access rate from subscriber in each environment area is presented. The study also presents the throughput and channel capacity of IEEE802.16 in different access rates. An extensive analysis is performed and the results are applied to the real case study to demonstrate the practicality of using IEEE 802.16 for connecting home to Internet. Using empirical data and original subscriber traffic from measurement, it is shown that the BFWA with IEEE802.16 standard is a capacity limited system. The capacity of IEEE802.16 is related to different factors including frequency bandwidth, spectrum allocation, estimation of traffic per subscriber, and choice of adaptive modulation from subscriber terminal. The wireless access methods and procedures evolved in this research work and set out in this paper are shown to be well suited for planning BFWA system based on IEEE802.16 which supports broadband home to Internet connections.

  12. Reducing Communication Overhead by Scheduling TCP Transfers on Mobile Devices using Wireless Network Performance Maps

    DEFF Research Database (Denmark)

    Højgaard-Hansen, Kim; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2012-01-01

    The performance of wireless communication networks has been shown to have a strong location dependence. Measuring the performance while having accurate location information available makes it possible to generate performance maps. In this paper we propose a framework for the generation and use...... of such performance maps. We demonstrate how the framework can be used to reduce the retransmissions and to better utilise network resources when performing TCP-based file downloads in vehicular M2M communication scenarios. The approach works on top of a standard TCP stack hence has to map identified transmission...

  13. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Directory of Open Access Journals (Sweden)

    Dexing Zhong

    2014-07-01

    Full Text Available The so-called Internet of Things (IoT has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC, is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE installed in the driver’s operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP through General Packet Radio Service (GPRS. Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  14. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-01-01

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things. PMID:25196106

  15. A practical application combining wireless sensor networks and Internet of Things: Safety Management System for Tower Crane Groups.

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-07-30

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  16. IP Connected Low Power Wireless Personal Area Networks in the Future Internet

    DEFF Research Database (Denmark)

    Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian

    2012-01-01

    The Internet of Things is a key concept of the Future Internet. The Internet of Things potentially interconnects billions of small devices in a large ubiquitous infrastructure based on the Internet Protocol (IP). Typically, these devices will be limited in computational capacity, memory......WPANs). The authors address the key mechanisms from network aspects down to device design aspects and discuss how technologies interplay to make real application deployment practical for the Internet of Things....

  17. Maps and geoinformation on the Internet or how do people feel abour e-democracy?

    DEFF Research Database (Denmark)

    Brande-Lavridsen, Hanne

    2005-01-01

    Danish Municipal Internet pages today swarm with examples of geoinformation by way of maps in a more or less active form (from scanned maps to GIS solutions), planning data, demographic data, etc. At first the intentions were to give the citizens the possibility of commenting on planning proposal...

  18. Progressive Coding and Presentation of Maps for Internet Applications

    DEFF Research Database (Denmark)

    Jensen, Ole Riis; Forchhammer, Søren Otto

    1999-01-01

    A new lossless context based method for content progressive coding of images as maps is proposed.......A new lossless context based method for content progressive coding of images as maps is proposed....

  19. Implementing the Internet of Things vision in industrial wireless sensor networks

    CSIR Research Space (South Africa)

    Kruger, CP

    2014-07-01

    Full Text Available The authors of this paper explore the use of IPv6 over Low power Wireless Personal Area Networks (6LoWPAN), IPv6 Routing Protocol for Low power and Lossy Networks (RPL) and Constrained Application Protocol (CoAP) as a possible solution for realising...

  20. Whitepaper on New Localization Methods for 5G Wireless Systems and the Internet-of-Things

    DEFF Research Database (Denmark)

    Pedersen, Troels; Fleury, Bernard Henri

    2018-01-01

    Disruptive technologies proposed for 5G wireless systems and the IoT hold promise of providing unprecedented localization capabilities for a wide range of application scenarios and target environments. This whitepaper summarizes the expected features and resulting properties of upcoming localizat...

  1. Extraction and Analysis of Autonomous System Level Internet Map of Turkey

    Directory of Open Access Journals (Sweden)

    Hakan Çetin

    2010-01-01

    Full Text Available At the high level, the Internet is a mesh that is composed of thousands of autonomous system (AS connected together. This mesh is represented as a graph where each autonomous system is considered as a node and the connections with Border Gateway Protocol neighbored autonomous systems considered as an edge. Analysis of this mesh and visual representation of the graph gives us the AS level topology of the Internet. In recent years there are increasing numbers of studies that are focused on the structure of the topology of the Internet. It is important to study the Internet infrastructure in Turkey and to provide a way to monitor the changes to it over time. In this study we present the AS level Internet map of Turkey with explanation of each step. In order to get the whole AS level map, we first determined the ASs that geographically reside in Turkey and afterwards determined the interconnections among this ASs, along with international interconnections. Then we extracted the relations between connected ASs and analyzed the structural properties of AS infrastructure. We explained the methods we used in each step. Using the extracted data we analyzed the AS level properties of Turkey and we provide the AS level Internet map of Turkey along with a web-based software that can monitor and provide information of ASs in Turkey.

  2. An Ontology-Based Context Model for Wireless Sensor Network (WSN Management in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Adnan Al-Anbuky

    2013-09-01

    Full Text Available Wireless sensor networks (WSNs are an enabling technology of context-aware systems. The Internet of Things (IoT, which has attracted much attention in recent years, is an emerging paradigm where everyday objects and spaces are made context-aware and interconnected through heterogeneous networks on a global scale. However, the IoT system can suffer from poor performances when its underlying networks are not optimized. In this paper, an ontology model for representing and facilitating context sharing between network entities in WSNs is proposed for the first time. The context model aims to enable optimal context-aware management of WSNs in IoT, which will also harness the rich context knowledge of IoT systems.

  3. Wireless, battery-operated data acquisition system for mobile spectrometry applications and (potentially) for the Internet of things

    Science.gov (United States)

    Fitzgerald, Ryan; Karanassios, Vassili

    2017-05-01

    There are many applications requiring chemical analysis in the field and analytical results in (near) real-time. For example, when accidental spills occur. In others, collecting samples in the field followed by analysis in a lab increases costs and introduces time-delays. In such cases, "bring part of the lab to the sample" would be ideal. Toward this ideal (and to further reduce size and weight), we developed a relatively inexpensive, battery-operated, wireless data acquisition hardware system around an Arduino nano micro-controller and a 16-bit ADC (Analog-to- Digital Converter) with a max sampling rate of 860 samples/s. The hardware communicates the acquired data using low-power Bluetooth. Software for data acquisition and data display was written in Python. Potential ways of making the hardware-software approach described here a part of the Internet-of-Things (IoT) are presented.

  4. Combining wireless sensor networks and semantic middleware for an Internet of Things-based sportsman/woman monitoring application.

    Science.gov (United States)

    Rodríguez-Molina, Jesús; Martínez, José-Fernán; Castillejo, Pedro; López, Lourdes

    2013-01-31

    Wireless Sensor Networks (WSNs) are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

  5. Combining Wireless Sensor Networks and Semantic Middleware for an Internet of Things-Based Sportsman/Woman Monitoring Application

    Science.gov (United States)

    Rodríguez-Molina, Jesús; Martínez, José-Fernán; Castillejo, Pedro; López, Lourdes

    2013-01-01

    Wireless Sensor Networks (WSNs) are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained. PMID:23385405

  6. Combining Wireless Sensor Networks and Semantic Middleware for an Internet of Things-Based Sportsman/Woman Monitoring Application

    Directory of Open Access Journals (Sweden)

    Lourdes López

    2013-01-01

    Full Text Available Wireless Sensor Networks (WSNs are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

  7. The use of interactive graphical maps for browsing medical/health Internet information resources

    Directory of Open Access Journals (Sweden)

    Boulos Maged

    2003-01-01

    Full Text Available Abstract As online information portals accumulate metadata descriptions of Web resources, it becomes necessary to develop effective ways for visualising and navigating the resultant huge metadata repositories as well as the different semantic relationships and attributes of described Web resources. Graphical maps provide a good method to visualise, understand and navigate a world that is too large and complex to be seen directly like the Web. Several examples of maps designed as a navigational aid for Web resources are presented in this review with an emphasis on maps of medical and health-related resources. The latter include HealthCyberMap maps http://healthcybermap.semanticweb.org/, which can be classified as conceptual information space maps, and the very abstract and geometric Visual Net maps of PubMed http://map.net (for demos. Information resources can be also organised and navigated based on their geographic attributes. Some of the maps presented in this review use a Kohonen Self-Organising Map algorithm, and only HealthCyberMap uses a Geographic Information System to classify Web resource data and render the maps. Maps based on familiar metaphors taken from users' everyday life are much easier to understand. Associative and pictorial map icons that enable instant recognition and comprehension are preferred to geometric ones and are key to successful maps for browsing medical/health Internet information resources.

  8. Old maps in the GIS and Internet environment

    Science.gov (United States)

    Křováková, K.; Brůna, V.; Pacina, J.

    2009-04-01

    Old maps are moreover used as data layers in GIS environment, both in raster or vector form. By comparing data from several time periods we can identify the main trends in landscape development and its spatial structure. The Laboratory of geoinformatics at Jan Evangelista Purkyně University, Czech republic is working on several projects concerned about analysis and visualization of old maps. On the poster are presented results of some of the projects solved at the laboratory. One of the most successful project is the web-application http://oldmaps.geolab.cz - where are online presented old maps from the region of Bohemia, Moravia and Silesia. On this server are accessible maps of the 1st, 2nd and partially 3rd military mapping, Müller's map of Bohemia and a part of survey operator of Stabile cadastre. On the poster are as well presented results from the Historical atlas of Czech towns and results from project solved for the National Park of Šumava in the area of Chlum.

  9. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    OpenAIRE

    Zeeshan Abbas; Wonyong Yoon

    2015-01-01

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving...

  10. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  11. Internet

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  12. Battery-free, wireless sensors for full-body pressure and temperature mapping.

    Science.gov (United States)

    Han, Seungyong; Kim, Jeonghyun; Won, Sang Min; Ma, Yinji; Kang, Daeshik; Xie, Zhaoqian; Lee, Kyu-Tae; Chung, Ha Uk; Banks, Anthony; Min, Seunghwan; Heo, Seung Yun; Davies, Charles R; Lee, Jung Woo; Lee, Chi-Hwan; Kim, Bong Hoon; Li, Kan; Zhou, Yadong; Wei, Chen; Feng, Xue; Huang, Yonggang; Rogers, John A

    2018-04-04

    Thin, soft, skin-like sensors capable of precise, continuous measurements of physiological health have broad potential relevance to clinical health care. Use of sensors distributed over a wide area for full-body, spatiotemporal mapping of physiological processes would be a considerable advance for this field. We introduce materials, device designs, wireless power delivery and communication strategies, and overall system architectures for skin-like, battery-free sensors of temperature and pressure that can be used across the entire body. Combined experimental and theoretical investigations of the sensor operation and the modes for wireless addressing define the key features of these systems. Studies with human subjects in clinical sleep laboratories and in adjustable hospital beds demonstrate functionality of the sensors, with potential implications for monitoring of circadian cycles and mitigating risks for pressure-induced skin ulcers. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  13. INTEGRATION ASPECTS OF THE LANGUAGE OF THE MAP IN THE VISUALIZATION OF INFORMATION IN THE INTERNET ERA

    Directory of Open Access Journals (Sweden)

    A. K. Suvorov

    2014-01-01

    Full Text Available Development of new principles of the language maps associated with the use of the Internet, computers and mobile devices. It is shown that the mapping in the modern society with the use of the Internet is based on ready-made visual images of reality, realization of creative opportunities of people by manipulating these images, posting on the Internet of personal information, implementation of project, mapping and other works on the remote services using Web connection. Describes the developed by the author hermeneutic principles of mapping.

  14. Self-configuration without commissioning for wireless Internet of Things using subjective logic

    NARCIS (Netherlands)

    Ozcelebi, T.; Lukkien, J.; Kraaij, B. van; Brock, M.

    2018-01-01

    Internet of Things (IoT) applications need commissioning and configuring of the IoT infrastructure that is comprised of devices called `Things'. In some cases, e.g. for an intelligent street lighting infrastructure in a city, we are looking at tens of thousands of Things that need to be commissioned

  15. Self-configuration without commissioning for wireless Internet of Things using subjective logic

    NARCIS (Netherlands)

    Ozcelebi, Tanir; Lukkien, Johan; Van Kraaij, Bert; Brock, Maarten

    2018-01-01

    Internet of Things (IoT) applications need commissioning and configuring of the IoT infrastructure that is comprised of devices called 'Things'. In some cases, e.g. for an intelligent street lighting infrastructure in a city, we are looking at tens of thousands of Things that need to be commissioned

  16. Nano Mapper: an Internet knowledge mapping system for nanotechnology development

    International Nuclear Information System (INIS)

    Li Xin; Hu, Daning; Dang Yan; Chen Hsinchun; Roco, Mihail C.; Larson, Catherine A.; Chan, Joyce

    2009-01-01

    Nanotechnology research has experienced rapid growth in recent years. Advances in information technology enable efficient investigation of publications, their contents, and relationships for large sets of nanotechnology-related documents in order to assess the status of the field. This paper presents the development of a new knowledge mapping system, called Nano Mapper (http://nanomapper.eller.arizona.eduhttp://nanomapper.eller.arizona.edu), which integrates the analysis of nanotechnology patents and research grants into a Web-based platform. The Nano Mapper system currently contains nanotechnology-related patents for 1976-2006 from the United States Patent and Trademark Office (USPTO), European Patent Office (EPO), and Japan Patent Office (JPO), as well as grant documents from the U.S. National Science Foundation (NSF) for the same time period. The system provides complex search functionalities, and makes available a set of analysis and visualization tools (statistics, trend graphs, citation networks, and content maps) that can be applied to different levels of analytical units (countries, institutions, technical fields) and for different time intervals. The paper shows important nanotechnology patenting activities at USPTO for 2005-2006 identified through the Nano Mapper system.

  17. Nano Mapper: an Internet knowledge mapping system for nanotechnology development

    Energy Technology Data Exchange (ETDEWEB)

    Li Xin, E-mail: xinli@eller.arizona.edu; Hu, Daning, E-mail: hud@eller.arizona.edu; Dang Yan, E-mail: ydang@eller.arizona.edu; Chen Hsinchun, E-mail: hchen@eller.arizona.ed [University of Arizona, Departmet of Management Information Systems, Eller College of Management (United States); Roco, Mihail C., E-mail: mroco@nsf.go [National Science Foundation (United States); Larson, Catherine A., E-mail: cal@eller.arizona.edu; Chan, Joyce, E-mail: joycepchan@eller.arizona.ed [University of Arizona, Department of Management Information Systems, Eller College of Management (United States)

    2009-04-15

    Nanotechnology research has experienced rapid growth in recent years. Advances in information technology enable efficient investigation of publications, their contents, and relationships for large sets of nanotechnology-related documents in order to assess the status of the field. This paper presents the development of a new knowledge mapping system, called Nano Mapper (http://nanomapper.eller.arizona.eduhttp://nanomapper.eller.arizona.edu), which integrates the analysis of nanotechnology patents and research grants into a Web-based platform. The Nano Mapper system currently contains nanotechnology-related patents for 1976-2006 from the United States Patent and Trademark Office (USPTO), European Patent Office (EPO), and Japan Patent Office (JPO), as well as grant documents from the U.S. National Science Foundation (NSF) for the same time period. The system provides complex search functionalities, and makes available a set of analysis and visualization tools (statistics, trend graphs, citation networks, and content maps) that can be applied to different levels of analytical units (countries, institutions, technical fields) and for different time intervals. The paper shows important nanotechnology patenting activities at USPTO for 2005-2006 identified through the Nano Mapper system.

  18. An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box

    Science.gov (United States)

    Khan, Muazzam A.; Ahmad, Jawad; Javaid, Qaisar; Saqib, Nazar A.

    2017-03-01

    Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to a central location for further processing. Numerous applications of WSN can be found in smart homes, intelligent buildings, health care, energy efficient smart grids and industrial control systems. In recent years, computer scientists has focused towards findings more applications of WSN in multimedia technologies, i.e. audio, video and digital images. Due to bulky nature of multimedia data, WSN process a large volume of multimedia data which significantly increases computational complexity and hence reduces battery time. With respect to battery life constraints, image compression in addition with secure transmission over a wide ranged sensor network is an emerging and challenging task in Wireless Multimedia Sensor Networks. Due to the open nature of the Internet, transmission of data must be secure through a process known as encryption. As a result, there is an intensive demand for such schemes that is energy efficient as well as highly secure since decades. In this paper, discrete wavelet-based partial image encryption scheme using hashing algorithm, chaotic maps and Hussain's S-Box is reported. The plaintext image is compressed via discrete wavelet transform and then the image is shuffled column-wise and row wise-wise via Piece-wise Linear Chaotic Map (PWLCM) and Nonlinear Chaotic Algorithm, respectively. To get higher security, initial conditions for PWLCM are made dependent on hash function. The permuted image is bitwise XORed with random matrix generated from Intertwining Logistic map. To enhance the security further, final ciphertext is obtained after substituting all elements with Hussain's substitution box. Experimental and statistical results confirm the strength of the anticipated scheme.

  19. Internet Of Things(IoTs) Enable Decoder Design For Wireless Sensor Network

    DEFF Research Database (Denmark)

    Madhok, Shivani; Mahajan, Ritika; Hussain, Dil muhammed Akbar

    2015-01-01

    temperature, heat sink profile and airflow then proceeding forward to plot the characteristics between power and ambient temperature, junction temperature and ambient temperature.As we are dealing with internet of things, we need an IP address to link with our decoder so in our code we have taken 2 inputs one...... for IPv6(Internet Protocol version 6) and other for a 6-bit input. Through IPv6 port, we can embed IP Address and can read it from our output pin that is IPAddress. We can allot an IP Address to our decoder and can command it’s working as we wish. There is 26-77% saving in power dissipation. In that way...

  20. Design and implementation of an Internet based effective controlling and monitoring system with wireless fieldbus communications technologies for process automation--an experimental study.

    Science.gov (United States)

    Cetinceviz, Yucel; Bayindir, Ramazan

    2012-05-01

    The network requirements of control systems in industrial applications increase day by day. The Internet based control system and various fieldbus systems have been designed in order to meet these requirements. This paper describes an Internet based control system with wireless fieldbus communication designed for distributed processes. The system was implemented as an experimental setup in a laboratory. In industrial facilities, the process control layer and the distance connection of the distributed control devices in the lowest levels of the industrial production environment are provided with fieldbus networks. In this paper, the Internet based control system that will be able to meet the system requirements with a new-generation communication structure, which is called wired/wireless hybrid system, has been designed on field level and carried out to cover all sectors of distributed automation, from process control, to distributed input/output (I/O). The system has been accomplished by hardware structure with a programmable logic controller (PLC), a communication processor (CP) module, two industrial wireless modules and a distributed I/O module, Motor Protection Package (MPP) and software structure with WinCC flexible program used for the screen of Scada (Supervisory Control And Data Acquisition), SIMATIC MANAGER package program ("STEP7") used for the hardware and network configuration and also for downloading control program to PLC. Copyright © 2012 ISA. Published by Elsevier Ltd. All rights reserved.

  1. Data Access Based on a Guide Map of the Underwater Wireless Sensor Network.

    Science.gov (United States)

    Wei, Zhengxian; Song, Min; Yin, Guisheng; Song, Houbing; Wang, Hongbin; Ma, Xuefei; Cheng, Albert M K

    2017-10-17

    Underwater wireless sensor networks (UWSNs) represent an area of increasing research interest, as data storage, discovery, and query of UWSNs are always challenging issues. In this paper, a data access based on a guide map (DAGM) method is proposed for UWSNs. In DAGM, the metadata describes the abstracts of data content and the storage location. The center ring is composed of nodes according to the shortest average data query path in the network in order to store the metadata, and the data guide map organizes, diffuses and synchronizes the metadata in the center ring, providing the most time-saving and energy-efficient data query service for the user. For this method, firstly the data is stored in the UWSN. The storage node is determined, the data is transmitted from the sensor node (data generation source) to the storage node, and the metadata is generated for it. Then, the metadata is sent to the center ring node that is the nearest to the storage node and the data guide map organizes the metadata, diffusing and synchronizing it to the other center ring nodes. Finally, when there is query data in any user node, the data guide map will select a center ring node nearest to the user to process the query sentence, and based on the shortest transmission delay and lowest energy consumption, data transmission routing is generated according to the storage location abstract in the metadata. Hence, specific application data transmission from the storage node to the user is completed. The simulation results demonstrate that DAGM has advantages with respect to data access time and network energy consumption.

  2. Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things

    Directory of Open Access Journals (Sweden)

    Anup Kumar Maurya

    2017-10-01

    Full Text Available To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs and the Internet of Things (IoT. Session key establishment between the sensor node and the user is also required for secure communication. In this paper, we perform the security analysis of A.K.Das’s user authentication scheme (given in 2015, Choi et al.’s scheme (given in 2016, and Park et al.’s scheme (given in 2016. The security analysis shows that their schemes are vulnerable to various attacks like user impersonation attack, sensor node impersonation attack and attacks based on legitimate users. Based on the cryptanalysis of these existing protocols, we propose a secure and efficient authenticated session key establishment protocol which ensures various security features and overcomes the drawbacks of existing protocols. The formal and informal security analysis indicates that the proposed protocol withstands the various security vulnerabilities involved in WSNs. The automated validation using AVISPA and Scyther tool ensures the absence of security attacks in our scheme. The logical verification using the Burrows-Abadi-Needham (BAN logic confirms the correctness of the proposed protocol. Finally, the comparative analysis based on computational overhead and security features of other existing protocol indicate that the proposed user authentication system is secure and efficient. In future, we intend to implement the proposed protocol in real-world applications of WSNs and IoT.

  3. Increasing operations profitability using an end-to-end, wireless internet, gas monitoring system

    Energy Technology Data Exchange (ETDEWEB)

    McDougall, M. [Northrock Resources Ltd., AB (Canada); Benterud, K. [zed.i solutions, inc., Calgary, AB (Canada)

    2004-10-01

    Implementation by Northrock Resources Ltd., a wholly-owned subsidiary of Unocal Corporation, of a fully integrated end-to-end gas measurement and production analysis system, is discussed. The system, dubbed Smart-Alek(TM), utilizes public wireless communications and a web browser only delivery system to provide seamless well visibility to a desk-top computer. Smart-Alek(TM) is an example of a new type of end-to-end electronic gas flow measurement system, known as FINE(TM), which is an acronym for Field Intelligence Network and End-User Interface. The system delivers easy-to-use, complete, reliable and cost effective production information, far more effective than is possible to obtain with conventional SCADA technology. By installing the system, Northrock was able to increase gas volumes with more accurate electronic flow measurement in place of mechanical charts, with very low technical maintenance, and at a reduced operating cost. It is emphasized that deploying the technology alone will produce only partial benefits; to realize full benefits it is also essential to change grass roots operating practices, aiming at timely decision-making at the field level. 5 refs., 5 figs.

  4. Real-Time Mapping: Contemporary Challenges and the Internet of Things as the Way Forward

    Science.gov (United States)

    Bęcek, Kazimierz

    2016-12-01

    The Internet of Things (IoT) is an emerging technology that was conceived in 1999. The key components of the IoT are intelligent sensors, which represent objects of interest. The adjective `intelligent' is used here in the information gathering sense, not the psychological sense. Some 30 billion sensors that `know' the current status of objects they represent are already connected to the Internet. Various studies indicate that the number of installed sensors will reach 212 billion by 2020. Various scenarios of IoT projects show sensors being able to exchange data with the network as well as between themselves. In this contribution, we discuss the possibility of deploying the IoT in cartography for real-time mapping. A real-time map is prepared using data harvested through querying sensors representing geographical objects, and the concept of a virtual sensor for abstract objects, such as a land parcel, is presented. A virtual sensor may exist as a data record in the cloud. Sensors are identified by an Internet Protocol address (IP address), which implies that geographical objects through their sensors would also have an IP address. This contribution is an updated version of a conference paper presented by the author during the International Federation of Surveyors 2014 Congress in Kuala Lumpur. The author hopes that the use of the IoT for real-time mapping will be considered by the mapmaking community.

  5. Real-Time Mapping: Contemporary Challenges and the Internet of Things as the Way Forward

    Directory of Open Access Journals (Sweden)

    Bęcek Kazimierz

    2016-12-01

    Full Text Available The Internet of Things (IoT is an emerging technology that was conceived in 1999. The key components of the IoT are intelligent sensors, which represent objects of interest. The adjective ‘intelligent’ is used here in the information gathering sense, not the psychological sense. Some 30 billion sensors that ‘know’ the current status of objects they represent are already connected to the Internet. Various studies indicate that the number of installed sensors will reach 212 billion by 2020. Various scenarios of IoT projects show sensors being able to exchange data with the network as well as between themselves. In this contribution, we discuss the possibility of deploying the IoT in cartography for real-time mapping. A real-time map is prepared using data harvested through querying sensors representing geographical objects, and the concept of a virtual sensor for abstract objects, such as a land parcel, is presented. A virtual sensor may exist as a data record in the cloud. Sensors are identified by an Internet Protocol address (IP address, which implies that geographical objects through their sensors would also have an IP address. This contribution is an updated version of a conference paper presented by the author during the International Federation of Surveyors 2014 Congress in Kuala Lumpur. The author hopes that the use of the IoT for real-time mapping will be considered by the mapmaking community.

  6. Wireless robot teleoperation via internet using IPv6 over a bluetooth personal area network

    Directory of Open Access Journals (Sweden)

    Carlos Araque Rodríguez

    2010-01-01

    Full Text Available En este artículo se presenta el diseño, construcción y pruebas de un sistema que permite la manipulación y visualización del robot Microbot Teachmover usando una conexión inalámbrica Bluetooth con dirección IPv6, brindando la posibilidad de manejar el robot desde diferentes escenarios: desde un dispositivo móvil que se encuentra en la misma piconet del robot; desde un computador que se encuentre en la misma piconet del robot y desde un computador que se encuentre conectado a Internet con una dirección IPv6.

  7. USGS "Did You Feel It?" internet-based macroseismic intensity maps

    Science.gov (United States)

    Wald, D.J.; Quitoriano, V.; Worden, B.; Hopper, M.; Dewey, J.W.

    2011-01-01

    The U.S. Geological Survey (USGS) "Did You Feel It?" (DYFI) system is an automated approach for rapidly collecting macroseismic intensity data from Internet users' shaking and damage reports and generating intensity maps immediately following earthquakes; it has been operating for over a decade (1999-2011). DYFI-based intensity maps made rapidly available through the DYFI system fundamentally depart from more traditional maps made available in the past. The maps are made more quickly, provide more complete coverage and higher resolution, provide for citizen input and interaction, and allow data collection at rates and quantities never before considered. These aspects of Internet data collection, in turn, allow for data analyses, graphics, and ways to communicate with the public, opportunities not possible with traditional data-collection approaches. Yet web-based contributions also pose considerable challenges, as discussed herein. After a decade of operational experience with the DYFI system and users, we document refinements to the processing and algorithmic procedures since DYFI was first conceived. We also describe a number of automatic post-processing tools, operations, applications, and research directions, all of which utilize the extensive DYFI intensity datasets now gathered in near-real time. DYFI can be found online at the website http://earthquake.usgs.gov/dyfi/. ?? 2011 by the Istituto Nazionale di Geofisica e Vulcanologia.

  8. Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sabrina Sicari

    2017-01-01

    Full Text Available Many solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglect, greed, and DoS attacks, which frequently affect Wireless Sensor Networks (WSNs. Besides recognizing the corrupted or violated information, also the attackers should be identified, in order to activate the proper countermeasures for preserving network’s resources and to mitigate their malicious effects. To this end, techniques adopting Self-Organizing Maps (SOM for intrusion detection in WSN were revealed to represent a valuable and effective solution to the problem. In this paper, the mechanism, namely, Good Network (GoNe, which is based on SOM and is able to assess the reliability of the sensor nodes, is compared with another relevant and similar work existing in literature. Extensive performance simulations, in terms of nodes’ classification, attacks’ identification, data accuracy, energy consumption, and signalling overhead, have been carried out in order to demonstrate the better feasibility and efficiency of the proposed solution in WSN field.

  9. Analysis on Invulnerability of Wireless Sensor Network towards Cascading Failures Based on Coupled Map Lattice

    Directory of Open Access Journals (Sweden)

    Xiuwen Fu

    2018-01-01

    Full Text Available Previous research of wireless sensor networks (WSNs invulnerability mainly focuses on the static topology, while ignoring the cascading process of the network caused by the dynamic changes of load. Therefore, given the realistic features of WSNs, in this paper we research the invulnerability of WSNs with respect to cascading failures based on the coupled map lattice (CML. The invulnerability and the cascading process of four types of network topologies (i.e., random network, small-world network, homogenous scale-free network, and heterogeneous scale-free network under various attack schemes (i.e., random attack, max-degree attack, and max-status attack are investigated, respectively. The simulation results demonstrate that the rise of interference R and coupling coefficient ε will increase the risks of cascading failures. Cascading threshold values Rc and εc exist, where cascading failures will spread to the entire network when R>Rc or ε>εc. When facing a random attack or max-status attack, the network with higher heterogeneity tends to have a stronger invulnerability towards cascading failures. Conversely, when facing a max-degree attack, the network with higher uniformity tends to have a better performance. Besides that, we have also proved that the spreading speed of cascading failures is inversely proportional to the average path length of the network and the increase of average degree k can improve the network invulnerability.

  10. Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  11. Continuous wireless pressure monitoring and mapping with ultra-small passive sensors for health monitoring and critical care.

    Science.gov (United States)

    Chen, Lisa Y; Tee, Benjamin C-K; Chortos, Alex L; Schwartz, Gregor; Tse, Victor; Lipomi, Darren J; Wong, H-S Philip; McConnell, Michael V; Bao, Zhenan

    2014-10-06

    Continuous monitoring of internal physiological parameters is essential for critical care patients, but currently can only be practically achieved via tethered solutions. Here we report a wireless, real-time pressure monitoring system with passive, flexible, millimetre-scale sensors, scaled down to unprecedented dimensions of 1 × 1 × 0.1 cubic millimeters. This level of dimensional scaling is enabled by novel sensor design and detection schemes, which overcome the operating frequency limits of traditional strategies and exhibit insensitivity to lossy tissue environments. We demonstrate the use of this system to capture human pulse waveforms wirelessly in real time as well as to monitor in vivo intracranial pressure continuously in proof-of-concept mice studies using sensors down to 2.5 × 2.5 × 0.1 cubic millimeters. We further introduce printable wireless sensor arrays and show their use in real-time spatial pressure mapping. Looking forward, this technology has broader applications in continuous wireless monitoring of multiple physiological parameters for biomedical research and patient care.

  12. Map as a Service: A Framework for Visualising and Maximising Information Return from Multi-ModalWireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Hammoudeh

    2015-09-01

    Full Text Available This paper presents a distributed information extraction and visualisation service, called the mapping service, for maximising information return from large-scale wireless sensor networks. Such a service would greatly simplify the production of higher-level, information-rich, representations suitable for informing other network services and the delivery of field information visualisations. The mapping service utilises a blend of inductive and deductive models to map sense data accurately using externally available knowledge. It utilises the special characteristics of the application domain to render visualisations in a map format that are a precise reflection of the concrete reality. This service is suitable for visualising an arbitrary number of sense modalities. It is capable of visualising from multiple independent types of the sense data to overcome the limitations of generating visualisations from a single type of sense modality. Furthermore, the mapping service responds dynamically to changes in the environmental conditions, which may affect the visualisation performance by continuously updating the application domain model in a distributed manner. Finally, a distributed self-adaptation function is proposed with the goal of saving more power and generating more accurate data visualisation. We conduct comprehensive experimentation to evaluate the performance of our mapping service and show that it achieves low communication overhead, produces maps of high fidelity, and further minimises the mapping predictive error dynamically through integrating the application domain model in the mapping service.

  13. A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture

    Directory of Open Access Journals (Sweden)

    Oliver Hanka

    2011-02-01

    Full Text Available In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mapping infrastructure of the locator/identifier-split addressing scheme. The security approach is based on Threshold Cryptography which enables a sharing of keys among the mapping servers. Hence, a more trustworthy and fair approach for a Next Generation Internet Architecture as compared to the state of the art approach is fostered. Additionally, we give an evaluation based on IETF AAA recommendations for security-related systems.

  14. TinyMAPS : a lightweight Java-based mobile agent system for wireless sensor networks

    NARCIS (Netherlands)

    Aiello, F.; Fortino, G.; Galzarano, S.; Vittorioso, A.; Brazier, F.M.T.; Nieuwenhuis, K.; Pavlin, G.; Warnier, M.; Badica, C.

    2012-01-01

    In the context of the development of wireless sensor network (WSN) applications, effective programming frameworks and middlewares for rapid and efficient prototyping of resource-constrained applications are highly required. Mobile agents are an effective distributed programming paradigm that is

  15. Hands-On Open Access Broadband Wireless Technology Lab Mapping Course Outcomes to Lab Experiments

    Directory of Open Access Journals (Sweden)

    Yazan Alqudah

    2012-10-01

    Full Text Available The unprecedented growth in wireless communication is offering opportunities and challenges for educators. Thanks to technology advances and job opportunities, more and more students are interested in wireless communications courses. However, bridging the gap between classroom and real-world experience remains a challenge. Advanced undergraduate communications courses typically focus more on theory. Some courses are given online, and lack hands-on experiments. Driven by feedback from industry and students, we propose practical laboratory experiments that attempt to bridge the gap between classroom and real world. The laboratory exercises take advantage of the infrastructure of deployed wireless networks and allow students to measure, and analyze data, as well as to interact. The proposed labs can be used even in online courses. This paper describes the experiments proposed, the procedures and typical results. The experiments are tied to course objective.

  16. STUDI AWAL: PENGARUH GAME KEKERASAN TERHADAP AKTIVITAS OTAK ANAK MELALUI PEMETAAN SINYAL OTAK (BRAIN MAPPING MENGGUNAKAN WIRELESS EEG

    Directory of Open Access Journals (Sweden)

    Nita Handayani

    2017-06-01

    Full Text Available Brain mapping adalah pemetaan aktivitas kelistrikan otak untuk mempelajari fungsional otak manusia. Pada studi ini, brain mapping digunakan untuk mempelajari pengaruh game kekerasan terhadap aktivitas fungsional otak anak dengan menggunakan wireless EEG (electroencephalography berupa Emotiv Epoc 14-channel. Subjek penelitian ini adalah anak-anak pecandu game kekerasan (10 anak dengan rentang usia antara 12-15 tahun. Aktivitas otak pada saat bermain game akan dibandingkan dengan kondisi rileks. Waktu perekaman EEG selama 42 menit untuk setiap subjek. Dari hasil analisis spektral daya menggunakan periodogram Welch menunjukkan bahwa pada saat bermain game, frekuensi gelombang delta dan theta meningkat terutama pada area frontal (F7, F3, FC5, FC6, F4, F8, dan AF4. Spektral daya gelombang alpha mengalami penurunan sedangkan gelombang beta mengalami peningkatan pada saat bermain game. Hal ini mengindikasikan bahwa anak mengalami beban mental dan berada pada kondisi stres pada saat bermain game kekerasan.

  17. Chromhome: a rich internet application for accessing comparative chromosome homology maps.

    Science.gov (United States)

    Nagarajan, Sridevi; Rens, Willem; Stalker, James; Cox, Tony; Ferguson-Smith, Malcolm A

    2008-03-26

    Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is of great importance in the analysis of functionally important genome regions. It can also be used to understand the phylogenetic relationships of species and the mechanisms leading to rearrangement of karyotypes during evolution. Many species have been studied at the cytogenetic level by cross species chromosome painting. With the large amount of such information, it has become vital to computerize the data and make them accessible worldwide. Chromhome http://www.chromhome.org is a comprehensive web application that is designed to provide cytogenetic comparisons among species and to fulfil this need. The Chromhome application architecture is multi-tiered with an interactive client layer, business logic and database layers. Enterprise java platform with open source framework OpenLaszlo is used to implement the Rich Internet Chromhome Application. Cross species comparative mapping raw data are collected and the processed information is stored into MySQL Chromhome database. Chromhome Release 1.0 contains 109 homology maps from 51 species. The data cover species from 14 orders and 30 families. The homology map displays all the chromosomes of the compared species as one image, making comparisons among species easier. Inferred data also provides maps of homologous regions that could serve as a guideline for researchers involved in phylogenetic or evolution based studies. Chromhome provides a useful resource for comparative genomics, holding graphical homology maps of a wide range of species. It brings together cytogenetic data of many genomes under one roof. Inferred painting can often determine the chromosomal homologous regions between two species, if each has been compared with a common third species. Inferred painting greatly reduces the need to map entire genomes and helps focus only on relevant

  18. Chromhome: A rich internet application for accessing comparative chromosome homology maps

    Directory of Open Access Journals (Sweden)

    Cox Tony

    2008-03-01

    Full Text Available Abstract Background Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is of great importance in the analysis of functionally important genome regions. It can also be used to understand the phylogenetic relationships of species and the mechanisms leading to rearrangement of karyotypes during evolution. Many species have been studied at the cytogenetic level by cross species chromosome painting. With the large amount of such information, it has become vital to computerize the data and make them accessible worldwide. Chromhome http://www.chromhome.org is a comprehensive web application that is designed to provide cytogenetic comparisons among species and to fulfil this need. Results The Chromhome application architecture is multi-tiered with an interactive client layer, business logic and database layers. Enterprise java platform with open source framework OpenLaszlo is used to implement the Rich Internet Chromhome Application. Cross species comparative mapping raw data are collected and the processed information is stored into MySQL Chromhome database. Chromhome Release 1.0 contains 109 homology maps from 51 species. The data cover species from 14 orders and 30 families. The homology map displays all the chromosomes of the compared species as one image, making comparisons among species easier. Inferred data also provides maps of homologous regions that could serve as a guideline for researchers involved in phylogenetic or evolution based studies. Conclusion Chromhome provides a useful resource for comparative genomics, holding graphical homology maps of a wide range of species. It brings together cytogenetic data of many genomes under one roof. Inferred painting can often determine the chromosomal homologous regions between two species, if each has been compared with a common third species. Inferred painting greatly reduces the need to

  19. Teaching the Geoweb: Interdisciplinary Undergraduate Research in Wireless Sensor Networks, Web Mapping, and Geospatial Data Management

    Science.gov (United States)

    Abernathy, David

    2011-01-01

    This article addresses an effort to incorporate wireless sensor networks and the emerging tools of the Geoweb into undergraduate teaching and research at a small liberal arts college. The primary goal of the research was to identify the hardware, software, and skill sets needed to deploy a local sensor network, collect data, and transmit that data…

  20. Warming Up to Wireless

    Science.gov (United States)

    Milner, Jacob

    2005-01-01

    In districts big and small across the U.S., students, teachers, and administrators alike have come to appreciate the benefits of wireless technology. Because the technology delivers Internet signals on airborne radio frequencies, wireless networking allows users of all portable devices to move freely on a school's campus and stay connected to the…

  1. Internet-Based Indoor Navigation Services

    OpenAIRE

    Zeinalipour-Yazti, Demetrios; Laoudias, Christos; Georgiou, Kyriakos

    2017-01-01

    Smartphone advances are leading to a class of Internet-based Indoor Navigation services. IIN services rely on geolocation databases that store indoor models, comprising floor maps and points of interest, along with wireless, light, and magnetic signals for localizing users. Developing IIN services creates new information management challenges - such as crowdsourcing indoor models, acquiring and fusing big data velocity signals, localization algorithms, and custodians' location privacy. Here, ...

  2. Applying self-organizing map and modified radial based neural network for clustering and routing optimal path in wireless network

    Science.gov (United States)

    Hoomod, Haider K.; Kareem Jebur, Tuka

    2018-05-01

    Mobile ad hoc networks (MANETs) play a critical role in today’s wireless ad hoc network research and consist of active nodes that can be in motion freely. Because it consider very important problem in this network, we suggested proposed method based on modified radial basis function networks RBFN and Self-Organizing Map SOM. These networks can be improved by the use of clusters because of huge congestion in the whole network. In such a system, the performance of MANET is improved by splitting the whole network into various clusters using SOM. The performance of clustering is improved by the cluster head selection and number of clusters. Modified Radial Based Neural Network is very simple, adaptable and efficient method to increase the life time of nodes, packet delivery ratio and the throughput of the network will increase and connection become more useful because the optimal path has the best parameters from other paths including the best bitrate and best life link with minimum delays. Proposed routing algorithm depends on the group of factors and parameters to select the path between two points in the wireless network. The SOM clustering average time (1-10 msec for stall nodes) and (8-75 msec for mobile nodes). While the routing time range (92-510 msec).The proposed system is faster than the Dijkstra by 150-300%, and faster from the RBFNN (without modify) by 145-180%.

  3. Towards Internet of Things (IOTS):Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing

    OpenAIRE

    Piyare, Rajeev; Lee, Seong Ro

    2013-01-01

    Cloud computing provides great benefits for applications hosted on the Web that also have special computational and storage requirements. This paper proposes an extensible and flexible architecture for integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an interoperable application layer that can be directly integrated into other application domains for remote monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN)...

  4. Optimal Plant Growth in Smart Farm Hydroponics System using the Integration of Wireless Sensor Networks into Internet of Things

    Directory of Open Access Journals (Sweden)

    Nathaphon Boonnam

    2017-07-01

    Full Text Available Greenhouse cultivation is easy to keep up and control important factors such as light, temperature, and humidity. Using of sensors and actuators in the greenhouse to capture different values allows for the control of the equipment, it can also be optimized for growth at optimal temperature and humidity of various crops planted. We use wireless sensor networks’ system by sending results to the cloud service, monitoring values, and devices’s controlling via smart phone. The results of this study are useful for growing crops not only in technical parts, but also in physical part; it was evaluated by questionnaire using technology acceptance model.

  5. Distributed GIS for automated natural hazard zonation mapping Internet-SMS warning towards sustainable society

    Directory of Open Access Journals (Sweden)

    Devanjan Bhattacharya

    2014-12-01

    Full Text Available Today, open systems are needed for real time analysis and warnings on geo-hazards and over time can be achieved using Open Source Geographical Information System (GIS-based platform such as GeoNode which is being contributed to by developers around the world. To develop on an open source platform is a very vital component for better disaster information management as far as spatial data infrastructures are concerned and this would be extremely vital when huge databases are to be created and consulted regularly for city planning at different scales, particularly satellite images and maps of locations. There is a big need for spatially referenced data creation, analysis, and management. Some of the salient points that this research would be able to definitely contribute with GeoNode, being an open source platform, are facilitating the creation, sharing, and collaborative use of geospatial data. The objective is development of an automated natural hazard zonation system with Internet-short message service (SMS warning utilizing geomatics for sustainable societies. A concept of developing an internet-resident geospatial geohazard warning system has been put forward in this research, which can communicate alerts via SMS. There has been a need to develop an automated integrated system to categorize hazard and issue warning that reaches users directly. At present, no web-enabled warning system exists which can disseminate warning after hazard evaluation at one go and in real time. The objective of this research work has been to formalize a notion of an integrated, independent, generalized, and automated geo-hazard warning system making use of geo-spatial data under popular usage platform. In this paper, a model of an automated geo-spatial hazard warning system has been elaborated. The functionality is to be modular in architecture having GIS-graphical user interface (GUI, input, understanding, rainfall prediction, expert, output, and warning modules. A

  6. Wireless Multi Hop Access Networks and Protocols

    OpenAIRE

    Nilsson Plymoth, Anders

    2007-01-01

    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points t...

  7. Increasing gas producer profitability with virtual well visibility via an end-to-end wireless Internet gas monitoring system

    Energy Technology Data Exchange (ETDEWEB)

    McDougall, M. [Northrock Resources Ltd., Calgary, AB (Canada); Benterud, K. [Zed.i solutions, Calgary, AB (Canada)

    2003-07-01

    This PowerPoint presentation describes how Northrock Resources Ltd. increased profitability using Smart-Alek{sup TM} while avoiding high implementation costs. Smart-Alek is a new type of fully integrated end-to-end electronic gas flow measurement (GFM) system based on Field Intelligence Network and End User Interference (FINE). Smart-Alek can analyze gas production through public wireless communications and a web-browser delivery system. The system has enabled Northrock to increase gas volumes with more accurate measurement and reduced downtime. In addition, operating costs have decreased because the frequency of well visits has been reduced and the administrative procedures of data collection is more efficient. The real-time well visibility of the tool has proven to be very effective in optimizing business profitability. 7 figs.

  8. Cognitive Maps, AI Agents and Personalized Virtual Environments in Internet Learning Experiences.

    Science.gov (United States)

    Maule, R. William

    1998-01-01

    Develops frameworks to help Internet media designers address end-user information presentation preferences by advancing structures for assessing metadata design variables which are then linked to user cognitive styles. An underlying theme is that artificial intelligence (AI) methodologies may be used to help automate the Internet media design…

  9. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Directory of Open Access Journals (Sweden)

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  10. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    Science.gov (United States)

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  11. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Science.gov (United States)

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  12. Increasing gas producer profitability with virtual well visibility via an end-to-end, wireless Internet gas monitoring system

    Energy Technology Data Exchange (ETDEWEB)

    McDougall, M.; Coleman, K.; Beck, R.; Lyon, R.; Potts, R. [Northrock Resources Ltd., Calgary, AB (Canada); Benterud, K. [Zed.i solutions, Calgary, AB (Canada)

    2003-07-01

    Most gas producing companies still use 100-year old technology to measure gas volumes because of the prohibitive costs of implementing corporate wide electronic information systems to replace circular mechanical chart technology. This paper describes how Northrock Resources Ltd. increased profitability using Smart-Alek{sup TM} while avoiding high implementation costs. Smart-Alek is a new type of fully integrated end-to-end electronic gas flow measurement (GFM) system based on Field Intelligence Network and End User Interference (FINE). Smart-Alek can analyze gas production through public wireless communications and a web-browser delivery system. The system has enabled Northrock to increase gas volumes with more accurate measurement and reduced downtime. In addition, operating costs were also decreased because the frequency of well visits was reduced and the administrative procedures of data collection was more efficient. The real-time well visibility of the tool has proven to be very effective in optimizing business profitability. 9 refs., 1 tab., 9 figs.

  13. High-frequency mapping of the IPv6 Internet using Yarrp

    OpenAIRE

    Gaston, Eric W.

    2017-01-01

    Approved for public release; distribution is unlimited Both the number of hosts using Internet Protocol version 6 (IPv6), and the volume of IPv6 traffic, has increased exponentially since 2012.With this adoption, the IPv6 routed infrastructure becomes an increasingly important component of global critical infrastructure and network policy. Unfortunately, the tools and techniques used to perform active network topology discovery were designed for Internet Protocol version 4 (IPv4), leading ...

  14. Evaluation of an Affordable Wireless Node Sensor (Mote69) Designed for Internet of Thing (IoT) Device

    Science.gov (United States)

    Ruhiyat, Z. F.; Somantri, Y.; Wahyudin, D.; Hakim, D. L.

    2018-02-01

    This research aims to determine the student’s response to the implementation of Internet of Things (IoT) device based on RFM69, called Mote69, for practical work of Aircraft Electronic Circuits and Controllers. Participants in this study were students of a vocational high school of Aircraft Electronics which consisted of three groups. The first group is the students who have grades above the average class. The second group is the students who have grade the average class. The third group is the students who have grades below the average class. The research phase consisted of (1). Observation and Assessment of Empirical Issues; (2). Testing of Media Feasibility and Research Instruments; (3). Accumulate and Processing of Field Data; and (4). Results and Data Conclusions. The result of media feasibility showed that Mote69 is appropriate to be used in practical work of Aircraft Electronic Circuits and Controllers subject.

  15. CMap 1.01: a comparative mapping application for the internet

    Science.gov (United States)

    CMap is a web-based tool for displaying and comparing maps of any type and from any species. A user can compare an unlimited number of maps, view pair-wise comparisons of known correspondences, and search for maps or for features by name, species, type and accession. CMap is freely available, can ...

  16. PERANCANGAN DAN IMPLEMENTASI SERVER VOICE OVER INTERNET PROTOKAL (VOIP DENGAN TRIXBOX PADA WIRELESS LOCAL AREA NETWORK MENGGUNAKAN SMARTPHONE

    Directory of Open Access Journals (Sweden)

    Muhammad Iqbal Nahwi

    2014-06-01

    Full Text Available At this time telecommunications data is very important in human life , both in terms of the relationship between the human being and the fulfillment of information and entertainment . While obviously, a current cost of communication in the country including Indonesia is still expensive . The utilization of VoIP technology in communication cheap , safe with good enough quality is very appropriate to be applied in this country . In this VoIP technology to communicate over the phone not only can be done by relying on a conventional telephone or mobile phone , but through the Internet can also be done . In this study, the methodology used is to implement Trixbox VoIP system on linux . VoIP network infrastructure protocols designed using SIP (session initiation protocol as the communication protocol , making use of free software as the operating system Linux Trixbox , asterisk as application servers , and on the client side using the X - Lite softphone Keyyo VoIP application used for client on smartphone.

  17. Mapping Disease Data: A Usability Test of an Internet-Based System of Disease Status Disclosure

    Directory of Open Access Journals (Sweden)

    Gareth Enticott

    2018-01-01

    Full Text Available Disease maps are important tools in the management of disease. By communicating risk, disease maps can help raise awareness of disease and encourage farmers and veterinarians to employ best practice to eliminate the spread of disease. However, despite the importance of disease maps in communicating risk and the existence of various online disease maps, there are few studies that explicitly examine their usability. Where disease maps are complicated to use, it seems that they are unlikely to be used effectively. The paper outlines an attempt to create an open access, online, searchable map of incidents of bovine tuberculosis in England and Wales, and analyzes its usability among veterinarians. The paper describes the process of creating the map before describing the results of a series of usability trials. Results show the map to score highly on different measures of usability. However, the trials also revealed a number of social and technical limitations and challenges facing the use of online disease maps, including reputational dangers, role confusion, data accuracy, and data representation. The paper considers the challenges facing disease maps and their potential role in designing new methodologies to evaluate the effectiveness of disease prevention initiatives.

  18. Energy-efficient wireless mesh infrastructures

    OpenAIRE

    Al-Hazmi, Y.; de Meer, Hermann; Hummel, Karin Anna; Meyer, Harald; Meo, Michela; Remondo Bueno, David

    2011-01-01

    The Internet comprises access segments with wired and wireless technologies. In the future, we can expect wireless mesh infrastructures (WMIs) to proliferate in this context. Due to the relatively low energy efficiency of wireless transmission, as compared to wired transmission, energy consumption of WMIs can represent a significant part of the energy consumption of the Internet as a whole. We explore different approaches to reduce energy consumption in WMIs, taking into accoun...

  19. Quantifying and Mapping the Digital Divide from an Internet Point of View

    Energy Technology Data Exchange (ETDEWEB)

    Cottrell, R.Les; /SLAC; Khan, Shahryar; /NUST, Rawalpindi; Williams, Jerrod; /SLAC; Mehdi, Akbar; Kalim, Umar; Ali, Arshad; /NUST, Rawalpindi

    2008-09-18

    Quantitative knowledge of the magnitude, extent and trends of the Digital Divide are critical to understand and identify the regions most in need of help, to make rational decisions on how to address the problems and to make cases for executives, funding agencies and politicians. We report on a project (PingER) to measure the Digital Divide from the point of view of Internet performance. The PingER project has been measuring Internet performance since 1995 and with the increased emphasis on measuring and tracking the Digital Divide, it now covers over 700 hosts in over 150 countries that between them contain over 99% of the world's Internet connected population. In this paper we will describe the how PingER works, it deployment, the data analysis, and presentation. We also introduce a new PingER visualization tool (ViPER) that provides a more appealing interactive visualization of the PingER data and also works on mobile PDAs. We will also show results from PingER that illustrate the magnitude, extent and trends for the Digital Divide, and also compare PingER results with some human development and technology indices.

  20. Mapping service quality : measuring and comparing quality of experience and quality of service for Internet-based map services

    OpenAIRE

    Eriksén, Sara; Eliasson, Charlott; Fiedler, Markus; Chevul, Stefan; Ekelin, Annelie

    2007-01-01

    In this paper, we present an on-going research project in which we are focusing on examining how users of map-based services on-line experience the quality of these services when the traffic load is high, and how the users' experiences of acceptable or not acceptable quality can be related to measurable parameters which can be used to manage network traffic and improve technical solutions. The project is a multi- and interdisciplinary project in cooperation between researchers within human wo...

  1. High-Frequency Mapping of the IPV6 Internet Using YARRP

    Science.gov (United States)

    2017-03-01

    Network CIDR Classless Inter-Domain Routing DNS Domain Name System HMAC Hashed Message Authentication Code HTTP Hypertext Transfer Protocol IANA...is connected (i.e., the interconnection of the routers that make up the network). Topology mapping can be conducted through either passive or active...means. In passive topology mapping, inferences are made about network connections based on data-plane traffic observed at specific points such as web

  2. Colorado Late Cenozoic Fault and Fold Database and Internet Map Server: User-friendly technology for complex information

    Science.gov (United States)

    Morgan, K.S.; Pattyn, G.J.; Morgan, M.L.

    2005-01-01

    Internet mapping applications for geologic data allow simultaneous data delivery and collection, enabling quick data modification while efficiently supplying the end user with information. Utilizing Web-based technologies, the Colorado Geological Survey's Colorado Late Cenozoic Fault and Fold Database was transformed from a monothematic, nonspatial Microsoft Access database into a complex information set incorporating multiple data sources. The resulting user-friendly format supports easy analysis and browsing. The core of the application is the Microsoft Access database, which contains information compiled from available literature about faults and folds that are known or suspected to have moved during the late Cenozoic. The database contains nonspatial fields such as structure type, age, and rate of movement. Geographic locations of the fault and fold traces were compiled from previous studies at 1:250,000 scale to form a spatial database containing information such as length and strike. Integration of the two databases allowed both spatial and nonspatial information to be presented on the Internet as a single dataset (http://geosurvey.state.co.us/pubs/ceno/). The user-friendly interface enables users to view and query the data in an integrated manner, thus providing multiple ways to locate desired information. Retaining the digital data format also allows continuous data updating and quick delivery of newly acquired information. This dataset is a valuable resource to anyone interested in earthquake hazards and the activity of faults and folds in Colorado. Additional geologic hazard layers and imagery may aid in decision support and hazard evaluation. The up-to-date and customizable maps are invaluable tools for researchers or the public.

  3. Value Creation in the Internet of Things: Mapping Business Models and Ecosystem Roles

    Directory of Open Access Journals (Sweden)

    Heini Ikävalko

    2018-03-01

    Full Text Available The increasing connectivity provided by the Internet of Things (IoT supports novel business opportunities for actors in overlapping service systems. Therefore, the co-creative nature of IoT business needs to be further studied. This article reports an empirical study on a European IoT initiative. It contributes to the understudied area of IoT ecosystem dynamics by describing different actor roles and activities in the IoT use cases, and their implications for value creation in IoT ecosystems. Our findings show how IoT ecosystem actors may take the roles of ideator, designer, or intermediary in different IoT design layers, and we recommend this perspective to better understand and describe ecosystem business models. We also discuss the theoretical and managerial implications of our findings.

  4. Mapping publication trends and identifying hot spots of research on Internet health information seeking behavior: a quantitative and co-word biclustering analysis.

    Science.gov (United States)

    Li, Fan; Li, Min; Guan, Peng; Ma, Shuang; Cui, Lei

    2015-03-25

    The Internet has become an established source of health information for people seeking health information. In recent years, research on the health information seeking behavior of Internet users has become an increasingly important scholarly focus. However, there have been no long-term bibliometric studies to date on Internet health information seeking behavior. The purpose of this study was to map publication trends and explore research hot spots of Internet health information seeking behavior. A bibliometric analysis based on PubMed was conducted to investigate the publication trends of research on Internet health information seeking behavior. For the included publications, the annual publication number, the distribution of countries, authors, languages, journals, and annual distribution of highly frequent major MeSH (Medical Subject Headings) terms were determined. Furthermore, co-word biclustering analysis of highly frequent major MeSH terms was utilized to detect the hot spots in this field. A total of 533 publications were included. The research output was gradually increasing. There were five authors who published four or more articles individually. A total of 271 included publications (50.8%) were written by authors from the United States, and 516 of the 533 articles (96.8%) were published in English. The eight most active journals published 34.1% (182/533) of the publications on this topic. Ten research hot spots were found: (1) behavior of Internet health information seeking about HIV infection or sexually transmitted diseases, (2) Internet health information seeking behavior of students, (3) behavior of Internet health information seeking via mobile phone and its apps, (4) physicians' utilization of Internet medical resources, (5) utilization of social media by parents, (6) Internet health information seeking behavior of patients with cancer (mainly breast cancer), (7) trust in or satisfaction with Web-based health information by consumers, (8

  5. Story Maps & Co. État de l’art de la cartographie des récits sur Internet

    Directory of Open Access Journals (Sweden)

    Sébastien Caquard

    2017-07-01

    Full Text Available Cet article propose une analyse comparative de six applications dédiées à la cartographie des récits sur Internet. À travers la mise en carte du récit de vie d’un réfugié rwandais, trois grandes familles d’applications cartographiques ont été identifiées : les applications simples permettant de représenter cartographiquement des histoires de manière uniformisée (par exemple, Tripline et Google Tour Builder ; les applications plus sophistiquées et plus directement liées au monde des SIG permettant non seulement de raconter des histoires variées à l’aide de cartes, mais aussi d’utiliser la carte comme outil d’analyse spatiotemporelle des récits (par exemple, ESRI Story Maps et MapStory ; enfin les applications plus orientées vers la recherche qui abordent les récits comme autant de bases de données dont l’analyse peut nous aider à mieux comprendre les lieux, leurs géographies intimes et personnelles, ainsi que la structure des récits qui s’y réfèrent (par exemple, Atlascine et Neatline.

  6. Security in Internet of Things

    OpenAIRE

    Mohar, Matej

    2017-01-01

    The Internet of Things (IoT) is emerging the Internet and other networks with wireless technologies to make physical objects interact online. The IoT has developed to become a promising technology and receives significant research attention in recent years because of the development of wireless communications and micro-electronics.  Like other immature technological inventions, although IoT will promise their users a better life in the near future, it is a security risk, especially today the ...

  7. Reliable low-power wireless networks over unstable transmission power

    NARCIS (Netherlands)

    Kotian, Roshan; Exarchakos, Georgios; Liotta, Antonio

    2017-01-01

    Internet of Things promises large scale interconnected sensing and actuation capabilities in domains, areas, applications and activities never accessed before by Internet. Besides other technical barriers, wireless network node lifetime impedes its applicability. To reduce the energy cost incurred

  8. Connected car: Engines diagnostic via Internet of Things (IoT)

    Science.gov (United States)

    Hamid, A. F. A.; Rahman, M. T. A.; Khan, S. F.; Adom, A. H.; Rahim, M. A.; Rahim, N. A.; Ismail, M. H. N.; Norizan, A.

    2017-10-01

    This paper is about an experiment for performing engines diagnostic using wireless sensing Internet of Thing (IoT). The study is to overcome problem of current standard On Board Diagnosis (OBD-II) data acquisition method that only can be perform in offline or wired method. From this paper it show a method to determined how the data from engines can be collected, make the data can be easily understand by human and sending data over the wireless internet connection via platform of IOT. This study is separate into three stages that is CAN-bus data collection, CAN data conversion and send data to cloud storage. Every stage is experimented with a two different method and consist five data parameter that is Revolution per Minute (RPM), Manifold Air Pressure (MAP), load-fuel, barometric pressure and engine temperature. The experiment use Arduino Uno as microcontroller, CAN-bus converter and ESP8266 wifi board as transfer medium for data to internet.

  9. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  10. Internet culture

    CERN Document Server

    Porter, David

    2013-01-01

    The internet has recently grown from a fringe cultural phenomenon to a significant site of cultural production and transformation. Internet Culture maps this new domain of language, politics and identity, locating it within the histories of communication and the public sphere. Internet Culture offers a critical interrogation of the sustaining myths of the virtual world and of the implications of the current mass migration onto the electronic frontier. Among the topics discussed in Internet Culture are the virtual spaces and places created by the citizens of the Net and their claims to the hotly contested notion of "virtual community"; the virtual bodies that occupy such spaces; and the desires that animate these bodies. The contributors also examine the communication medium behind theworlds of the Net, analyzing the rhetorical conventions governing online discussion, literary antecedents,and potential pedagogical applications.

  11. Getting ahead of the curve in wireless communications | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The demand for wireless communications is expected to increase significantly over ... would become more accessible to those without mobile phones, or Internet access. ... that will have a lasting impact on the field of wireless communications. ... problems: cooperative communication, coexistence of wireless systems, and ...

  12. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-01-01

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless

  13. 75 FR 55297 - Further Inquiry Into Two Under-Developed Issues in the Open Internet Proceeding

    Science.gov (United States)

    2010-09-10

    ...). The second is the application of open Internet rules to mobile wireless Internet access services...). The second is the application of open Internet rules to mobile wireless Internet access services... in the market. (B) Truth in Advertising: Prohibit broadband providers from marketing specialized...

  14. An Internet-Based Intervention (Mamma Mia) for Postpartum Depression: Mapping the Development from Theory to Practice.

    Science.gov (United States)

    Drozd, Filip; Haga, Silje Marie; Brendryen, Håvar; Slinning, Kari

    2015-10-12

    As much as 10-15% of new mothers experience depression postpartum. An Internet-based intervention (Mamma Mia) was developed with the primary aims of preventing depressive symptoms and enhancing subjective well-being among pregnant and postpartum women. A secondary aim of Mamma Mia was to ease the transition of becoming a mother by providing knowledge, techniques, and support during pregnancy and after birth. The aim of the paper is to provide a systematic and comprehensive description of the intervention rationale and the development of Mamma Mia. For this purpose, we used the intervention mapping (IM) protocol as descriptive tool, which consists of the following 6 steps: (1) a needs assessment, (2) definition of change objectives, (3) selection of theoretical methods and practical strategies, (4) development of program components, (5) planning adoption and implementation, and (6) planning evaluation. Mamma Mia is a fully automated Internet intervention available for computers, tablets, and smartphones, intended for individual use by the mother. It starts in gestational week 18-24 and lasts up to when the baby becomes 6 months old. This intervention applies a tunneled design to guide the woman through the program in a step-by-step fashion in accordance with the psychological preparations of becoming a mother. The intervention is delivered by email and interactive websites, combining text, pictures, prerecorded audio files, and user input. It targets risk and protective factors for postpartum depression such as prepartum and postpartum attachment, couple satisfaction, social support, and subjective well-being, as identified in the needs assessment. The plan is to implement Mamma Mia directly to users and as part of ordinary services at well-baby clinics, and to evaluate the effectiveness of Mamma Mia in a randomized controlled trial and assess users' experiences with the program. The IM of Mamma Mia has made clear the rationale for the intervention, and linked

  15. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  16. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  17. Next-generation wireless technologies 4G and beyond

    CERN Document Server

    Chilamkurti, Naveen; Chaouchi, Hakima

    2013-01-01

    This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet o

  18. EEM{sup TM} wireless supervision

    Energy Technology Data Exchange (ETDEWEB)

    Bilic, H. [Ericsson-Nikola Tesla d.d. Zagreb (Croatia)

    2000-07-01

    By adding the GSM network to the communication level of Energy Management systems, energy operating centres (EOC) can offer wireless access to the supervised equipment. Furthermore EOC can profit from rapid service development in the GSM networks. With implementation of GPRS to the GSM network EOC can instantly offer wireless access to external IP based networks such as Internet and corporate Intranets. The author describes architecture and key characteristic of Ericsson EnergyMaster{sup TM} (EEM{sup TM}) system for Energy Management, how and where to implement wireless supervision, wireless access to IP addresses and also how to implement new services provided by the GSM network. (orig.)

  19. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    OpenAIRE

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...

  20. University Undergraduate Students, Perceptions of The Wireless ...

    African Journals Online (AJOL)

    The study focused on Uni versity Undergraduate students' perceptions of the use of the wireless internet of Abubakar Tafawa Balewa University, Bauchi, Nigeria. Using emperical and new field data, this exploratory study investigated the students' perceptions of internet use in relation to library use. The study adopted a ...

  1. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  2. Building a sustainable research & HCD eco-system: Case study of two wireless communication eco systems

    CSIR Research Space (South Africa)

    Mekuria, F

    2013-05-01

    Full Text Available Sensor Networks (M2M, Energy Efficient & Smart Adhoc Sensor Networks) (Emerging) Energy & Spectrum Efficient Wireless Mesh Network (Existing) Next Generation Wireless Networking (e.g. White Spaces, Femto-cells, Cellular ± 4G, LTE, WiMAX) (Co... applications, M2M and the Internet of Things, (3) wireless cognitive radio network laboratory for spectrum and energy efficient network development, (4) Future wireless cellular networking research with MIMO based LTE applications. The wireless mesh...

  3. On the scalability of uncoordinated multiple access for the Internet of Things

    KAUST Repository

    Chisci, Giovanni; Elsawy, Hesham; Conti, Andrea; Alouini, Mohamed-Slim; Win, Moe Z.

    2017-01-01

    The Internet of things (IoT) will entail massive number of wireless connections with sporadic traffic patterns. To support the IoT traffic, several technologies are evolving to support low power wide area (LPWA) wireless communications. However

  4. Study of intelligent building system based on the internet of things

    Science.gov (United States)

    Wan, Liyong; Xu, Renbo

    2017-03-01

    In accordance with the problem such as isolated subsystems, weak system linkage and expansibility of the bus type buildings management system, this paper based on the modern intelligent buildings has studied some related technologies of the intelligent buildings and internet of things, and designed system architecture of the intelligent buildings based on the Internet of Things. Meanwhile, this paper has also analyzed wireless networking modes, wireless communication protocol and wireless routing protocol of the intelligent buildings based on the Internet of Things.

  5. Internet Addiction Risk in the Academic Environment

    Science.gov (United States)

    Ellis, William F.; McAleer, Brenda; Szakas, Joseph S.

    2015-01-01

    The Internet's effect on society is growing exponentially. One only has to look at the growth of e-commerce, social media, wireless data access, and mobile devices to see how communication is changing. The need and desire for the Internet, especially in such disciplines as Computer Science or Computer Information Systems, pose a unique risk for…

  6. Wireless Cybersecurity

    Science.gov (United States)

    2013-04-01

    completely change the entire landscape. For example, under the quantum computing regime, factoring prime numbers requires only polynomial time (i.e., Shor’s...AFRL-OSR-VA-TR-2013-0206 Wireless Cybersecurity Biao Chen Syracuse University April 2013 Final Report DISTRIBUTION A...19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 21-02-2013 FINAL REPORT 01-04-2009 TO 30-11-2012 Wireless Cybersecurity

  7. Multi-Channel Wireless Sensor Networks: Protocols, Design and Evaluation

    OpenAIRE

    Durmaz, O.

    2009-01-01

    Pervasive systems, which are described as networked embedded systems integrated with everyday environments, are considered to have the potential to change our daily lives by creating smart surroundings and by their ubiquity, just as the Internet. In the last decade, “Wireless Sensor Networks��? have appeared as one of the real-world examples of pervasive systems by combining automated sensing, embedded computing and wireless networking into tiny embedded devices. A wireless sensor network typ...

  8. Mobility support for ubiquitous Internet

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert

    2000-01-01

    This document describes an architecture that is providing Internet access to mobile hosts, by allowing them to access this architecture through various access points and using various wireless technologies. In particular, this deliverable focuses on QoS and mobility between various IP subnetworks

  9. Streaming-aware channel utilization improvement for wireless home networks

    NARCIS (Netherlands)

    Aslam, W.; Lukkien, J.J.

    2012-01-01

    A wireless network of consumer electronic (CE) devices in a modern home, is typically running streaming services with heterogeneous bandwidth demands. Satisfying these demands offers the challenge of mapping them efficiently onto scarce wireless channel bandwidth. This mapping is supported by the

  10. Forecasting economic aspects of future wireless services

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders; Saugstrup, Dan

    services be shaped like the Internet today with a large number of independent information providers offering their services directly to the customers? This deliverable will analyse economic models for delivery of ‘3G and beyond’ wireless Internet services, and assess the types of services that will drive...... the market and the business models to be applied. The analysis will take current market trends as point of departure with focus on vanguard markets with respect to 3G services....

  11. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  12. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Societe Francaise de Radioprotection, 75 - Paris (France)

    2008-04-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  13. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  14. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  15. Reducing Exposure to Radiofrequency Electromagnetic Fields from Wireless Networking with Laptop Computers

    OpenAIRE

    Koppel, T; Ahonen, M; Vilcāne, I

    2014-01-01

    Mobile modems are used with laptops to connect Internet wirelessly. Recently several organisations, including the WHO IARC and the European Union have emphasised health risk-management practices related to wireless devices. We present here radio frequency (RF) power density measurements when a wireless modem is 30 cm, 1 m and 5 m from a user. Our results indicate that by using a USB cable and adding distance between a user and a wireless modem, there is a substantial reduction of exposure. Ad...

  16. Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks

    OpenAIRE

    Donghai Zhu; Xinyu Yang Yang; Peng Zhao; Wei Yu

    2016-01-01

    Wireless Mesh Networks (WMNs) have potential to provide convenient broadband wireless Internet access to mobile users.With the support of Software-Defined Networking (SDN) paradigm that separates control plane and data plane, WMNs can be easily deployed and managed. In addition, by exploiting the broadcast nature of the wireless medium and the spatial diversity of multi-hop wireless networks, intra-flow network coding has shown a greater benefit in comparison with traditional routing paradigm...

  17. Simulations of Large-scale WiFi-based Wireless Networks: Interdisciplinary Challenges and Applications

    OpenAIRE

    Nekovee, Maziar

    2008-01-01

    Wireless Fidelity (WiFi) is the fastest growing wireless technology to date. In addition to providing wire-free connectivity to the Internet WiFi technology also enables mobile devices to connect directly to each other and form highly dynamic wireless adhoc networks. Such distributed networks can be used to perform cooperative communication tasks such ad data routing and information dissemination in the absence of a fixed infrastructure. Furthermore, adhoc grids composed of wirelessly network...

  18. 60 GHz Wireless Propagation Channels: Characterization, Modeling and Evaluation

    OpenAIRE

    Gustafson, Carl

    2014-01-01

    To be able to connect wirelessly to the internet is nowadays a part of everyday life and the number of wireless devices accessing wireless networks worldwide are increasing rapidly. However, with the increasing number of wireless devices and applications and the amount available bandwidth, spectrum shortage is an issue. A promising way to increase the amount of available spectrum is to utilize frequency bands in the mm-wave range of 30-300 GHz that previously have not been used for typical co...

  19. Wireless Tots

    Science.gov (United States)

    Scott, Lee-Allison

    2003-01-01

    The first wireless technology program for preschoolers was implemented in January at the Primrose School at Bentwater in Atlanta, Georgia, a new corporate school operated by Primrose School Franchising Co. The new school serves as a testing and training facility for groundbreaking educational approaches, including emerging innovations in…

  20. Wireless Technician

    Science.gov (United States)

    Tech Directions, 2011

    2011-01-01

    One of the hottest areas in technology is invisible. Wireless communications allow people to transmit voice messages, data, and other signals through the air without physically connecting senders to receivers with cables or wires. And the technology is spreading at lightning speed. Cellular phones, personal digital assistants, and wireless…

  1. Intrusion detection and monitoring for wireless networks.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  2. TRICALCAR : Weaving Community Based Wireless Networks in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... wireless champions by facilitating the exchange of knowledge between them and with other like-minded actors in the region. The training materials and knowledge gained during the experience will be documented and made available online. The idea is to improve Internet access in rural and urban marginalized areas at ...

  3. Small Space Platform Enhanced Internet Protocol Stack Device, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless communication of small, nano and micro satellites will play a vital role to NASA mission and marketability of the satellite. The use of an Internet-based...

  4. Near-real-time simulation and internet-based delivery of forecast-flood inundation maps using two-dimensional hydraulic modeling--A pilot study for the Snoqualmie River, Washington

    Science.gov (United States)

    Jones, Joseph L.; Fulford, Janice M.; Voss, Frank D.

    2002-01-01

    A system of numerical hydraulic modeling, geographic information system processing, and Internet map serving, supported by new data sources and application automation, was developed that generates inundation maps for forecast floods in near real time and makes them available through the Internet. Forecasts for flooding are generated by the National Weather Service (NWS) River Forecast Center (RFC); these forecasts are retrieved automatically by the system and prepared for input to a hydraulic model. The model, TrimR2D, is a new, robust, two-dimensional model capable of simulating wide varieties of discharge hydrographs and relatively long stream reaches. TrimR2D was calibrated for a 28-kilometer reach of the Snoqualmie River in Washington State, and is used to estimate flood extent, depth, arrival time, and peak time for the RFC forecast. The results of the model are processed automatically by a Geographic Information System (GIS) into maps of flood extent, depth, and arrival and peak times. These maps subsequently are processed into formats acceptable by an Internet map server (IMS). The IMS application is a user-friendly interface to access the maps over the Internet; it allows users to select what information they wish to see presented and allows the authors to define scale-dependent availability of map layers and their symbology (appearance of map features). For example, the IMS presents a background of a digital USGS 1:100,000-scale quadrangle at smaller scales, and automatically switches to an ortho-rectified aerial photograph (a digital photograph that has camera angle and tilt distortions removed) at larger scales so viewers can see ground features that help them identify their area of interest more effectively. For the user, the option exists to select either background at any scale. Similar options are provided for both the map creator and the viewer for the various flood maps. This combination of a robust model, emerging IMS software, and application

  5. Simulation of Wireless Digital Communication Systems

    Directory of Open Access Journals (Sweden)

    A. Mohammed

    2004-12-01

    Full Text Available Due to the explosive demands for high speed wireless services, suchas wireless Internet, email and cellular video conferencing, digitalwireless communications has become one of the most exciting researchtopics in electrical and electronic engineering field. The never-endingdemand for such personal and multimedia services, however, demandstechnologies operating at higher data rates and broader bandwidths. Inaddition, the complexity of wireless communication and signalprocessing systems has grown considerably during the past decade.Therefore, powerful computer­aided techniques are required for theprocess of modeling, designing, analyzing and evaluating theperformance of digital wireless communication systems. In this paper wediscuss the basic propagation mechanisms affecting the performance ofwireless communication systems, and present a simple, powerful andefficient way to simulate digital wireless communication systems usingMatlab. The simulated results are compared with the theoreticalanalysis to validate the simulator. The simulator is useful inevaluating the performance of wireless multimedia services and theassociated signal processing structures and algorithms for current andnext generation wireless mobile communication systems.

  6. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  7. Power Analysis of an Enterprise Wireless Communication Architecture

    Science.gov (United States)

    2017-09-01

    command and control, C2, Internet of Things , IoT, model based systems engineering, MBSE, marine air-ground task force, MAGTF, command control and...Electronics Engineers InTop Integrated Topside IPS Instructions per Second IoT Internet of Things JTNC Joint Tactical Networking Center L-RTac...wireless communications in the military increases the amount of energy needed for missions. The Internet of Things (IoT) movement (Thomas, McPherson, and

  8. Secure Your Wireless Network: Going Wireless Comes with Its Own Special Set of Security Concerns

    Science.gov (United States)

    Bloomquist, Jane; Musa, Atif

    2004-01-01

    Imagine a completely wireless school, an open network in which all students and staff can roam around using laptops or handheld computers to browse the Internet, access files and applications on the school server, and communicate with each other and the world via e-mail. It's a great picture--and at some schools the future is already here. But…

  9. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  10. 5G-Enabled Tactile Internet

    OpenAIRE

    Simsek, Meryem; Aijaz, Adnan; Dohler, Mischa; Sachs, Joachim; Fettweis, Gerhard

    2016-01-01

    The long-term ambition of the Tactile Internet is to enable a democratization of skill, and how it is being delivered globally. An integral part of this is to be able to transmit touch in perceived real-time, which is enabled by suitable robotics and haptics equipment at the edges, along with an unprecedented communications network. The fifth generation (5G) mobile communications systems will underpin this emerging Internet at the wireless edge. This paper presents the most important technolo...

  11. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  12. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  13. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  14. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  15. Modeling Internet Topology Dynamics

    NARCIS (Netherlands)

    Haddadi, H.; Uhlig, S.; Moore, A.; Mortier, R.; Rio, M.

    Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. While recent findings have illustrated the inaccuracies in maps inferred from BGP peering and traceroute measurements,

  16. How to model wireless mesh networks topology

    International Nuclear Information System (INIS)

    Sanni, M L; Hashim, A A; Anwar, F; Ali, S; Ahmed, G S M

    2013-01-01

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  17. Mobile access to the Internet: from personal bubble to satellites

    Science.gov (United States)

    Gerla, Mario

    2001-10-01

    Mobile, wireless access and networking has emerged in the last few years as one of the most important directions of Internet growth. The popularity of mobile, and, more generally, nomadic Internet access is due to many enabling factors including: (a) emergence of meaningful applications tailored to the individual on the move; (b) small form factor and long battery life; (c) efficient middleware designed to support mobility; and, (d) efficient wireless networking technologies. A key player in the mobile Internet access is the nomad, i.e. the individual equipped with various computing and I/O gadgets (cellular phone, earphones, GPS navigator, palm pilot, beeper, portable scanner, digital camera, etc.). These devices form his/her Personal Area Network or PAN or personal bubble. The connectivity within the bubble is wireless (using for example a low cost, low power wireless LAN such as Bluetooth). The bubble can expand and contract dynamically depending on needs. It may temporarily include sensors and actuators as the nomad walks into a new environment. In this paper, we identify the need for the interconnection of the PAN with other wireless networks in order to achieve costeffective mobile access to the Internet. We will overview some key networking technologies required to support the PAN (eg, Bluetooth). We will also discuss an emerging technology, Ad Hoc wireless networking which is the natural complement of the PAN in sparsely populated areas. Finally, we will identify the need for intelligent routers to assist the mobile user in the selection of the best Internet access strategy.

  18. Internet marketing

    OpenAIRE

    Zelený, Martin

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  19. Sharing Map Annotations in Small Groups: X Marks the Spot

    Science.gov (United States)

    Congleton, Ben; Cerretani, Jacqueline; Newman, Mark W.; Ackerman, Mark S.

    Advances in location-sensing technology, coupled with an increasingly pervasive wireless Internet, have made it possible (and increasingly easy) to access and share information with context of one’s geospatial location. We conducted a four-phase study, with 27 students, to explore the practices surrounding the creation, interpretation and sharing of map annotations in specific social contexts. We found that annotation authors consider multiple factors when deciding how to annotate maps, including the perceived utility to the audience and how their contributions will reflect on the image they project to others. Consumers of annotations value the novelty of information, but must be convinced of the author’s credibility. In this paper we describe our study, present the results, and discuss implications for the design of software for sharing map annotations.

  20. Internet accounting

    NARCIS (Netherlands)

    Pras, Aiko; van Beijnum, Bernhard J.F.; Sprenkels, Ron; Parhonyi, R.

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  1. Mobile internet technologies and their application to intelligent transportation systems

    Science.gov (United States)

    2003-01-01

    The worlds of mobile communication and the Internet are rapidly converging. This new domain, which is being touted as the "Wireless Web" or "Mobile Internet", is in its infancy and will require a number of complex technologies to mature and converge ...

  2. Research and Mass Deployment of Non-cognitive Authentication Strategy Based on Campus Wireless Network

    Directory of Open Access Journals (Sweden)

    Huangfu Dapeng

    2018-01-01

    Full Text Available With the rapid development of Internet +, the dependence on wireless networks and wireless terminals are increasing. Campus wireless network has become the main network of teachers and students in campus on the internet. As there are uneven clients and a wide variety of intelligent terminals now. Simplified authentication and network security become the most urgent problem for wireless network. This paper used the Portal + Mac authentication method to realize the non-cognitive authentication of teachers and students on basis of the analysis of the advantages and disadvantages of mainstream authentication of campus wireless network, such as 802.1X authentication, Portal authentication, Mac authentication and DHCP authentication. Teachers and students only need portal certification at the first time, then surf the internet with non-perceived authentication at the second time and later. This method increases network security, and is better to meet the needs of teachers and students.

  3. Cross-layer optimization of wireless multi-hop networks

    OpenAIRE

    Soldati, Pablo

    2007-01-01

    The interest in wireless communications has grown constantly for the past decades, leading to an enormous number of applications and services embraced by billions of users. In order to meet the increasing demand for mobile Internet access, several high data-rate radio networking technologies have been proposed to offer wide area high-speed wireless communications, eventually replacing fixed (wired) networks for many applications. This thesis considers cross-layer optimization of multi-hop rad...

  4. Seamless and secure communications over heterogeneous wireless networks

    CERN Document Server

    Cao, Jiannong

    2014-01-01

    This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in im

  5. "De-Randomizing" Congestion Losses to Improve TCP Performance over Wired-Wireless Networks

    National Research Council Canada - National Science Library

    Biaz, Saad; Vaidya, Nitin H

    2004-01-01

    .... With Internet becoming more heterogeneous with more and more wireless error-prone links, a TCP connection may unduly throttle its sending rate and experience poor performance over paths experiencing...

  6. Ding Dong, You've Got Mail! A Lab Activity for Teaching the Internet of Things

    Science.gov (United States)

    Frydenberg, Mark

    2017-01-01

    Connecting ordinary devices to the Internet is a defining characteristic of the Internet of Things. In this hands-on lab activity, students will connect a wireless doorbell to the Internet using a Raspberry Pi computer. By modifying and running a program on the Raspberry Pi to send an email or text message notifying a recipient that someone is at…

  7. Worm epidemics in wireless ad hoc networks

    Energy Technology Data Exchange (ETDEWEB)

    Nekovee, Maziar [BT Research, Polaris 134, Adastral Park, Martlesham, Suffolk IP5 3RE (United Kingdom); Centre for Computational Science, University College London, 20 Gordon Street, London WC1H 0AJ (United Kingdom)

    2007-06-15

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  8. Worm epidemics in wireless ad hoc networks

    Science.gov (United States)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  9. Worm epidemics in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Nekovee, Maziar

    2007-01-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet

  10. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  11. Resource and Traffic Management Techniques for Performance Optimization in Wireless Mesh Networks

    OpenAIRE

    D'Elia, Francesco Paolo

    2010-01-01

    Since Internet was born, it has steadily evolved. New devices, new needs, new applications, new protocols, and this evolution is not going to slow down in the near future. As a result of the introduction and standardization of wireless access technology, we are living through an inevitable replacement of the old wired technology. We are going through a wireless revolution, which brings with it new ways to access information: simply, anywhere, anytime. The new Internet challenge is to embo...

  12. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  13. Scaling Laws for Heterogeneous Wireless Networks

    Science.gov (United States)

    2009-09-01

    planned and the size of communication networks that are fundamentally understood. On the one hand, wireline networks (like the Internet) have grown from...Franceschetti, Marco D. Migliore, and Paolo Minero . The capacity of wireless networks: Information-theoretic and physical limits. In Proceedings of the...Allerton Conference on Communication, Control, and Computing, September 2007. [12] Massimo Franceschetti, Marco D. Migliore, and Paolo Minero . The

  14. Internet piracy

    OpenAIRE

    Fiala, Jiří

    2012-01-01

    The main objective of this thesis is to describe the Internet piracy phenomenon and to define responsibility of individuals for copyright violations on the Internet from the view of valid Czech legislation. In order to prevent Internet piracy, countries are pushed to swiftly react on continuous development of new technologies used by pirates - these efforts of individual countries are described in several chapters of this thesis that are exploring the most significant court rulings. These rul...

  15. Online maps with APIs and webservices

    CERN Document Server

    Peterson, Michael P

    2014-01-01

    With the Internet now the primary method of accessing maps, this volume examines developments in the world of online map delivery, focusing in particular on application programmer interfaces such as the Google Maps API, and their utility in thematic mapping.

  16. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  17. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  18. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  19. Wireless communication technology NFC

    OpenAIRE

    MÁROVÁ, Kateřina

    2014-01-01

    Aim of this bachelor thesis is to handle the issue of new wireless communication technology NFC (Near Field Communication) including a comparison of advantages and disadvantages of NFC with other wireless technologies (Bluetooth, Wi-Fi, etc.). NFC is a technology for wireless communications between different electronic devices, one of which is typically a mobile phone. Near Field Communication allows wireless communication at very short distance by approaching or enclosing two devices and can...

  20. TREMOR: A wireless MEMS accelerograph for dense arrays

    Science.gov (United States)

    Evans, J.R.; Hamstra, R.H.; Kundig, C.; Camina, P.; Rogers, J.A.

    2005-01-01

    The ability of a strong-motion network to resolve wavefields can be described on three axes: frequency, amplitude, and space. While the need for spatial resolution is apparent, for practical reasons that axis is often neglected. TREMOR is a MEMS-based accelerograph using wireless Internet to minimize lifecycle cost. TREMOR instruments can economically augment traditional ones, residing between them to improve spatial resolution. The TREMOR instrument described here has dynamic range of 96 dB between ??2 g, or 102 dB between ??4 g. It is linear to ???1% of full scale (FS), with a response function effectively shaped electronically. We developed an economical, very low noise, accurate (???1%FS) temperature compensation method. Displacement is easily recovered to 10-cm accuracy at full bandwidth, and better with care. We deployed prototype instruments in Oakland, California, beginning in 1998, with 13 now at mean spacing of ???3 km - one of the most densely instrumented urban centers in the United States. This array is among the quickest in returning (PGA, PGV, Sa) vectors to ShakeMap, ???75 to 100 s. Some 13 events have been recorded. A ShakeMap and an example of spatial variability are shown. Extensive tests of the prototypes for a commercial instrument are described here and in a companion paper. ?? 2005, Earthquake Engineering Research Institute.

  1. Wireless steganography

    Science.gov (United States)

    Agaian, Sos S.; Akopian, David; D'Souza, Sunil

    2006-02-01

    Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on Symbian TM/Series60 TM architecture. Finally, two data hiding applications developed for Symbian TM/Series60 TM mobile phones are presented.

  2. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  3. Shed a light of wireless technology on portable mobile design of NIRS

    Science.gov (United States)

    Sun, Yunlong; Li, Ting

    2016-03-01

    Mobile internet is growing rapidly driven by high-tech companies including the popular Apple and Google. The wireless mini-NIRS is believed to deserve a great spread future, while there is sparse report on wireless NIRS device and even for the reported wireless NIRS, its wireless design is scarcely presented. Here we focused on the wireless design of NIRS devices. The widely-used wireless communication standards and wireless communication typical solutions were employed into our NIRS design and then compared on communication efficiency, distance, error rate, low-cost, power consumption, and stabilities, based on the requirements of NIRS applications. The properly-performed wireless communication methods matched with the characteristics of NIRS are picked out. Finally, we realized one recommended wireless communication in our NIRS, developed a test platform on wireless NIRS and tested the full properties on wireless communication. This study elaborated the wireless communication methods specified for NIRS and suggested one implementation with one example fully illustrated, which support the future mobile design on NIRS devices.

  4. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  5. Current Status and Trend of Internet and E-Commerce Market in Korea

    Institute of Scientific and Technical Information of China (English)

    LEE Hongjoo; KIM Jongwoo; PARK Sungjoo

    2004-01-01

    After the remarkable increase of Internet users and broadband Internet subscribers at the end of the 20th century, the size of Korean Internet and e-commerce market steadily increased but the growth rate has been either stagnant or decreased. Trends of Korean Internet and e-commerce market are summarized in this paper the trends on Internet usage are introduced. Trends of online games, blogs and wireless Internet are introduced. The trends of Korean Internet market may have implications for China and Japan.

  6. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  7. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  8. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire - IRSN, 92 - Clamart (France)

    2011-01-15

    This section gathers a selection of Internet links to online articles dealing with radiation protection issues. Below are the titles of the papers with their web site source: 1 - A mission of the European Commission verifies the proper enforcement by France of the EURATOM treaty dispositions relative to the control of radioactivity in the vicinity of uranium mines (http://www.asn.fr); 2 - tritium contamination at Saint-Maur-des-Fosses: new results from measurements performed by IRSN in the environment; 3 - status of radioactivity monitoring in French Polynesia in 2009 (http://www.irsn.fr); 4 - study of mortality and cancers impact near the Aube facility for low- and medium-activity waste storage (http://www.invs.sante.fr); 5 - Marcel Jurien de la Graviere appointed president of the guidance committee of the defense nuclear expertise of the Institute of radiation protection and nuclear safety (IRSN) (http://www.legifrance.gouv.fr); 6 - radiation protection 163: 'Childhood Leukaemia - Mechanisms and Causes'; 7- Radiation Protection 164: Radioactive effluents from nuclear power stations and nuclear fuel reprocessing sites in the European Union, 2004-08; 8 - Radiation Protection 165: Medical Effectiveness of Iodine Prophylaxis in a Nuclear Reactor Emergency Situation and Overview of European Practices Protection (http://ec.europa.eu); 9 - Report RIFE 15: Radioactivity in Food and the Environment - RIFE (SEPA - Scottish Environment Protection Agency, http://www.sepa.org.uk); 10 - HPA response statement: Advisory Group on Ionising Radiation's report on circulatory disease risk (HPA - Health Protection Agency, http://www.hpa.org.uk); 11 - launching of the national database for the voluntary registering of (quasi) incidents (AFCN - Federal agency of nuclear control, http://www.fanc.fgov.be); 12 - Radiation dose optimization in nuclear medicine (IAEA RPOP - Radiation Protection Of Patients, http://rpop.iaea.org); 13 - The government of Canada finances

  9. The Wireless ATM Architecture

    Directory of Open Access Journals (Sweden)

    R. Palitefka

    1998-06-01

    Full Text Available An overview of the proposed wireless ATM structure is provided. Wireless communication have been developed to a level where offered services can now be extended beyond voice and data. There are already wireless LANs, cordless systems offering data services and mobile data. Wireless LAN systems are basically planned for local, on-promises and in-house networking providing short distance radio or infrared links between computer system. The main challenge of wireless ATM is to harmonise the development of broadband wireless system with service B -ISDN/ATM and ATM LANs, and offer multimedia multiservice features for the support of time-sensitive voice communication, video, desktop multimedia applications, and LAN data traffic for the wireless user.

  10. Service Class Resource Management For Green Wireless-Optical Broadband Access NetworksWOBAN

    Directory of Open Access Journals (Sweden)

    SRUTHY.S

    2015-08-01

    Full Text Available Abstract-Broadband access networks have become an essential part of worldwide communication systems because of the exponential growth of broadband services such as video on demand high definition TV internet protocol TV and video conferencing. Exponential growth in the volume of wireless data boosted by the growing popularity of mobile devices such as smartphone and tablets has forced the telecommunication industries to rethink the way networks are currently designed and to focus on the development of high-capacity mobile broadband networks. In response to this challenge researchers have been working toward the development of an integrated wireless optical broadband access network. Two major candidate technologies which are currently known for their high capacity as well as quality of service QoS for multimedia traffic are passive optical networks PON and fourth generation 4G wireless networks. PON is a wired access technology well known for its cost efficiency and high capacity whereas 4G is a wireless broadband access technology which has achieved broad market acceptance because of its ease of deployment ability to offer mobility and its cost efficiency. Integration of PON and 4G technologies in the form of wireless-optical broadband access networks offers advantages such as extension of networks in rural areas support for mobile broadband services and quick deployment of broadband networks. These two technologies however have different design architectures for handling broadband services that require quality of service. For example 4G networks use traffic classification for supporting different QoS demands whereas the PON architecture has no such mechanism to differentiate between types of traffic. These two technologies also differ in their power saving mechanisms. Propose a service class mapping for the integrated PON-4G network which is based on the MG1 queuing model and class-based power saving mechanism which significantly improves the

  11. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  12. Internet printing

    Science.gov (United States)

    Rahgozar, M. Armon; Hastings, Tom; McCue, Daniel L.

    1997-04-01

    The Internet is rapidly changing the traditional means of creation, distribution and retrieval of information. Today, information publishers leverage the capabilities provided by Internet technologies to rapidly communicate information to a much wider audience in unique customized ways. As a result, the volume of published content has been astronomically increasing. This, in addition to the ease of distribution afforded by the Internet has resulted in more and more documents being printed. This paper introduces several axes along which Internet printing may be examined and addresses some of the technological challenges that lay ahead. Some of these axes include: (1) submission--the use of the Internet protocols for selecting printers and submitting documents for print, (2) administration--the management and monitoring of printing engines and other print resources via Web pages, and (3) formats--printing document formats whose spectrum now includes HTML documents with simple text, layout-enhanced documents with Style Sheets, documents that contain audio, graphics and other active objects as well as the existing desktop and PDL formats. The format axis of the Internet Printing becomes even more exciting when one considers that the Web documents are inherently compound and the traversal into the various pieces may uncover various formats. The paper also examines some imaging specific issues that are paramount to Internet Printing. These include formats and structures for representing raster documents and images, compression, fonts rendering and color spaces.

  13. The study and implementation of the wireless network data security model

    Science.gov (United States)

    Lin, Haifeng

    2013-03-01

    In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.

  14. [Internet addiction].

    Science.gov (United States)

    Dannon, Pinhas Nadim; Iancu, Iulian

    2007-07-01

    The Internet provides inexpensive, interesting and comfortable recreation, but sometimes users get hooked. Thus, the computer-internet addiction concept has been proposed as an explanation for uncontrollable and damaging use. Symptoms of addiction could be compared to other addictive behaviors such as pathological gambling, kleptomania, trichotillomania, sex addiction and pyromania. Although criteria to diagnose this addiction have been proposed, methods of assessing excessive computer-internet use are limited. Early diagnosis could help the patient that suffers from this addiction before developing additional psychiatric diagnoses. A review of the proposed etiologies in the literature is summarized, together with recommendations for physicians and mental health officials.

  15. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  16. Integration between WSNs and Internet based on Address Internetworking for Web

    OpenAIRE

    Jeong Hee Kim; Do Hyeun Kim; Ho Young Kwak; Yung Cheol Byun

    2012-01-01

    There has been an increasing interest in wireless sensor networks as a new technology to realize ubiquitous computing, and demands for internetworking technology between the wireless sensor networks and the Internet which is based on IP address. For this purpose, this paper proposes and implements the internetworking scheme which assigns IP addresses to the sensor nodes and internetworks based on the gateway-based integration for internetworking between the wireless sensor networks and the In...

  17. Multi-Channel Wireless Sensor Networks: Protocols, Design and Evaluation

    NARCIS (Netherlands)

    Durmaz, O.

    2009-01-01

    Pervasive systems, which are described as networked embedded systems integrated with everyday environments, are considered to have the potential to change our daily lives by creating smart surroundings and by their ubiquity, just as the Internet. In the last decade, “Wireless Sensor Networks��? have

  18. Self-learning power control in wireless sensor networks

    NARCIS (Netherlands)

    Chincoli, Michele; Liotta, Antonio

    2018-01-01

    Current trends in interconnecting myriad smart objects to monetize on Internet of Things applications have led to high-density communications in wireless sensor networks. This aggravates the already over-congested unlicensed radio bands, calling for new mechanisms to improve spectrum management and

  19. Energy-aware Wireless Multi-hop Networks

    NARCIS (Netherlands)

    Vazifehdan, J.

    2011-01-01

    Wireless networks have provided us a variety of services which facilitate communication between people beyond the physical boundaries. Mobile telephony, mobile Internet and high-deffnition video calls are examples of services supported by modern networks nowadays. Beyond this, enhancements in

  20. Finding Waves: Techniques for a Successful Wireless Site Survey

    Science.gov (United States)

    Shanafelt, Michael

    2004-01-01

    Wireless Local Area Networks are the most widely adopted networking technology to hit the market in the last three years. They have the potential to make network applications and the Internet available anywhere on a campus so that students and faculty are no longer tethered to their offices or shared computer laboratories in order to connect to a…

  1. Wireless mesh networks.

    Science.gov (United States)

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

  2. MANETS and Internet of Things: The Development of a Data Routing Algorithm

    OpenAIRE

    Alameri, I. A.

    2018-01-01

    Internet of things (IoT), is an innovative technology which allows the connection of physical things with the digital world through the use of heterogeneous networks and communication technologies. IoT in smart environments interacts with wireless sensor network (WSN) and mobile ad‐hoc network (MANET), becoming even more attractive and economically successful. Interaction between wireless sensor and mobile ad‐hoc networks with the internet of things allows the creation of a new MANET‐IoT syst...

  3. Internet Connectivity

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet Connectivity. BSNL, SIFY, HCL in Guwahati; only BSNL elsewhere in NE (local player in Shillong). Service poor; All vendors lease BW from BSNL.

  4. Internet enlightens

    International Nuclear Information System (INIS)

    Figueiredo, S.

    2008-01-01

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  5. Internet enlightens

    International Nuclear Information System (INIS)

    Anon.

    2010-01-01

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  6. Internet Censorship

    Science.gov (United States)

    Jyotsna; Kapil; Aayush

    2012-09-01

    Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.

  7. On Radio over Fiber for Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Riaz, M. Tahir; Nielsen, Rasmus Hjorth; Pedersen, Jens Myrup

    2009-01-01

    The paper provides an overview of the radio over fiber (RoF) technology and its potential use in heterogeneous wireless networks. Wireless communications have seen a huge growth in the last decade. It has been estimated that five in every six people in the entire world will have a mobile phone...... in 2010. The vast growing use of Internet on the mobile devices has also been increased significantly. In order to provide a broadband access for mobile communications, a new wireless infrastructure (fiber optic networks for distributed, extendible heterogeneous radio architectures and service...... provisioning - FUTON) based on RoF technology has been introduced. The project adopts centralized processing of radio signals for number of wireless base stations can enhance the network performance in terms of bandwidth, and QoS parameters. The simplified remote access units (RAU) are expected to not only...

  8. Internet tomography an introduction to concepts, techniques, tools and applications

    CERN Document Server

    Moloisane, Abia; O’Droma, Máirtín

    2013-01-01

    Internet tomography, introduced from basic principles through to techniques, tools and applications, is the subject of this book. The design of Internet Tomography Measurement Systems (ITMS) aimed at mapping the Internet performance profile spatially and temporally over paths between probing stations is a particular focus.The Internet Tomography Measurement System design criteria addressed include:Minimally-invasive, independent and autonomous, active or passive measurement;Flexibility and scalability;Capability of targeting local, regional and global Internet paths and underlying IP networks;

  9. Matching of Energy Provisions in Multihop Wireless Infra-Structures

    Directory of Open Access Journals (Sweden)

    Rui Teng

    2016-01-01

    Full Text Available Recently there have been large advances in energy technologies for battery-operated systems, including green energy resources and high capacity batteries. The effective use of battery energy resources in wireless infrastructure networks to improve the versatility and reliability of wireless communications is an important issue. Emerging applications of smart cities, Internet of Things (IoT, and emergency responses highly rely on the basic communication network infrastructures that enable ubiquitous network connections. However, energy consumption by nodes in a wireless infrastructure network depends on the transmissions of other nodes in the network. Considering this inter-dependence is necessary to achieve efficient provision of energy in wireless networks. This paper studies the issue of energy provision for wireless relay nodes in Wireless Multihop Infrastructures (WMI assuming constraints on the total energy provision. We introduce a scheme of Energy Provision Matching (Matching-EP for WMI which optimizes energy provision based on matching of energy provision with estimates of differentiated position-dependent energy consumption by wireless nodes distributed in the network. The evaluation results show that Matching-EP with 4%–34% improvement in energy matching degree enables 10%–40% improvement of the network lifetime, and 5%–40% improvement of packet delivery compared with conventional WMI networks.

  10. Intelligent Wireless Sensor Network

    OpenAIRE

    Saeed, Bakhtiar I.; Mehrdadi, Bruce

    2010-01-01

    In recent years, there has been significant increase in utilisation of embedded-microcontrollers in broad range of applications extending from commercial products to industrial process system monitoring. Furthermore, improvements in speed, size and power consumption of microcontrollers with added wireless capabilities has provided new generation of applications. These include versatile and\\ud low cost solutions in wireless sensor networking applications such as wireless system monitoring and ...

  11. Don't Let Your COWS Be an Udder (Utter) Disaster: Wirelessness and Education Test the Electromagnetic Spectrum

    Science.gov (United States)

    Huber, Joe; Gillan, Bud

    2004-01-01

    Just when thinking about the Internet and other tidal waves of technology have found their places in schools, along comes a brash new upstart called wirelessness. This discussion takes on more simple task of providing more useful information to schools in their quest for being wireless, including the use of COWS (computer on wheels) is related to…

  12. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  13. Rogue AP Detection in the Wireless LAN for Large Scale Deployment

    Directory of Open Access Journals (Sweden)

    Sang-Eon Kim

    2006-10-01

    Full Text Available The wireless LAN standard, also known as WiFi, has begun to use commercial purposes. This paper describes access network architecture of wireless LAN for large scale deployment to provide public service. A metro Ethernet and digital subscriber line access network can be used for wireless LAN with access point. In this network architecture, access point plays interface between wireless node and network infrastructure. It is important to maintain access point without any failure and problems to public users. This paper proposes definition of rogue access point and classifies based on functional problem to access the Internet. After that, rogue access point detection scheme is described based on classification over the wireless LAN. The rogue access point detector can greatly improve the network availability to network service provider of wireless LAN.

  14. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  15. Playing with the internet through world wide web

    International Nuclear Information System (INIS)

    Kim, Seon Tae; Jang, Jin Seok

    1995-07-01

    This book describes how to use the internet with world wide web. It is divided into six chapters, which are Let's go to the internet ocean, the internet in information superhighway are, connecting the world with a telephone wire such as link with the internet cable and telephone modem, internet service providers, text mode connection, Domain and IP address, the principle and use of world wide web ; business, music, fashion, movie and photo, internet news and e-mail, making internet map with web language, and from installation to application of base program such as TCP/IP, SLIP/PPP 3270 Emulator, Finger and NCSA Mosaic.

  16. The security energy encryption in wireless power transfer

    Science.gov (United States)

    Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.

    2017-09-01

    This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.

  17. Multihoming for Mobile Internet of Multimedia Things

    OpenAIRE

    Balan, Titus; Robu, Dan; Sandu, Florin

    2017-01-01

    Mobility, redundancy, and bandwidth requirements are transforming the communication models used for IoT, mainly in case of Critical Communications and multimedia streaming (“IoMT, Internet of Multimedia Things”), as wireless video traffic is expected to be 60–75% of the global mobile traffic by 2020. One of the characteristics of 5G networks will be the proliferation of different/heterogeneous radio networks (virtualized radio access networks, RAN, new energy-efficient radios, femtocells, and...

  18. Everyone's Internet

    Institute of Scientific and Technical Information of China (English)

    YAO BIN

    2010-01-01

    @@ After more than 20 years, the Internet in China has become a big success. The country has the world's largest Intemet population that topped 420 million at the end of June. In the first six months of this year, China's Internet market reached 74.3 billion yuan ($10.9 billion), the equivalent of 2009's total. Local businesses have risen to leaders on the Chinese market, as Chinese language search, instant messaging and online auction service providers have overwhelming advantages over foreign rivals.

  19. Internet Sexualities

    Science.gov (United States)

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  20. Internet bullying.

    Science.gov (United States)

    Donnerstein, Ed

    2012-06-01

    There is substantial literature on the impact of the mass media on children's and adolescents' health and development. The question of what role new technology plays in the media's influence is now a subject of both review and discussion, particularly regarding health risks and intervention. This article takes a brief look at online usage and the theoretical mechanisms that might make Internet access more problematic in terms of risks, compared with more traditional media such as television and film. One of these risks, known today as cyberbullying or Internet harassment, is scrutinized in detail. Copyright © 2012 Elsevier Inc. All rights reserved.

  1. A Remote WIRELESS Facility

    Directory of Open Access Journals (Sweden)

    Kees Uiterwijk

    2007-10-01

    Full Text Available Continuing need for available distance learning facilities has led to the development of a remote lab facility focusing on wireless technology. In the field of engineering there is a student need of gaining experience in set-up, monitoring and maintenance of 802.11A/B/G based wireless LAN environments.

  2. A SURVEY on WIRELESS MESH NETWORKS, ROUTING METRICS and PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Safak DURUKAN ODABASI

    2013-01-01

    Full Text Available Today, Internet has become an indispensable part of our daily lives. It has a growing user community in many fields from banking transactions to online entertainment. It will be very efficient for users, as the next generation internet access becomes wireless like frequently used services such as cellular phones. But for providing this, a new network is needed to be designed or an existing network must be improved as well as making changes on infrastructure. At this point, mesh network infrastructure arises and offers more sophisticated internet access with less need. The most important advantage of mesh networks is the capability of working without infrastructure. Mesh networks are an additional access technology more than being a renewed one in the next generation wireless networks called 4G. In this study, wireless mesh networks and example applications are mentioned. Base architecture and design factors are emphasized, current routing protocols that are used on wireless mesh networks and routing metrics on which these protocols are based, are explained. Finally, the performance effects of these protocols and metrics on different network topologies are referred.

  3. Wireless adiabatic power transfer

    International Nuclear Information System (INIS)

    Rangelov, A.A.; Suchowski, H.; Silberberg, Y.; Vitanov, N.V.

    2011-01-01

    Research highlights: → Efficient and robust mid-range wireless energy transfer between two coils. → The adiabatic energy transfer is analogous to adiabatic passage in quantum optics. → Wireless energy transfer is insensitive to any resonant constraints. → Wireless energy transfer is insensitive to noise in the neighborhood of the coils. - Abstract: We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  4. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  5. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  6. Internet Policy

    Science.gov (United States)

    1999-11-17

    equipment, including information technology , includes, but is not limited to, personal computers and related peripheral equipment and software, office...classified or Sensitive Unclassified Information through the Internet unless the Designated Approving Authority has approved the method of transmission in...writing. 2. Government office equipment, including Information Technology (IT), shall only be used for official purposes, except as specifically

  7. Internet Shopping

    Institute of Scientific and Technical Information of China (English)

    刘洪毓

    2004-01-01

    Nowadays you no longer need to walk round hundreds of shops looking for the items you need. You can shop for just about anything from your armchair. All you need is a computer and access(进入) to the Internet.

  8. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  9. IPv6 for Future Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard

    2001-01-01

    The functionalities of the next generation Internet protocol, IPv6, havebecome increasingly interesting due to the current merging of the traditionalcellular mobile communications and the traditional data-communications intothe future wireless systems, as e.g., UMTS. IPv6 provides several...... enhancedfunctionalities requested for the future mobile systems. In this article thelargest advantages in relation to mobile systems are presented. Variousaspects of introducing IP throughout the entire mobile network (core, accessand termainals) are also presented along with an illustration of the abilitiesof the future...

  10. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  11. Wireless Sensor Network for Indoor Air Quality Monitoring

    Directory of Open Access Journals (Sweden)

    Jun Li

    2014-06-01

    Full Text Available Indoor air quality monitoring system consists of wireless sensor device, nRF24L01 wireless transceiver modules, C8051MCU, STM32103 remote monitoring platform, alarm device and data server. Distributed in the interior space of wireless sensors measure parameters of the local air quality, wireless transceiver module of the MCU to transmit data to the remote monitoring platform for analysis which displayed and stored field environment data or charts. The data collecting from wireless sensors to be send by wireless Access Point to the remote data server based on B/S architecture, intelligent terminals such as mobile phone, laptop, tablet PC on the Internet monitor indoor air quality in real-time. When site environment air quality index data exceeds the threshold in the monitoring device, the remote monitoring platform sends out the alarm SMS signal to inform user by GSM module. Indoor air quality monitoring system uses modular design method, has the portability and scalability has the low manufacture cost, real-time monitoring data and man-machine interaction.

  12. Fatal collision? Are wireless headsets a risk in treating patients?

    Science.gov (United States)

    Sage, Cindy; Hardell, Lennart

    2018-02-05

    Wireless-enabled headsets that connect to the internet can provide remote transcribing of patient examination notes. Audio and video can be captured and transmitted by wireless signals sent from the computer screen in the frame of the glasses. But using wireless glass-type devices can expose the user to a specific absorption rates (SAR) of 1.11-1.46 W/kg of radiofrequency radiation. That RF intensity is as high as or higher than RF emissions of some cell phones. Prolonged use of cell phones used ipsilaterally at the head has been associated with statistically significant increased risk of glioma and acoustic neuroma. Using wireless glasses for extended periods to teach, to perform surgery, or conduct patient exams will expose the medical professional to similar RF exposures which may impair brain performance, cognition and judgment, concentration and attention and increase the risk for brain tumors. The quality of medical care may be compromised by extended use of wireless-embedded devices in health care settings. Both medical professionals and their patients should know the risks of such devices and have a choice about allowing their use during patient exams. Transmission of sensitive patient data over wireless networks may increase the risk of hacking and security breaches leading to losses of private patient medical and financial data that are strictly protected under HIPPA health information privacy laws.

  13. Developing a Framework for E-Manufacturing Based on Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Xu Xi

    2013-06-01

    Full Text Available This paper analyzes the current situation of business environment and business intelligence systems integration at first. With emerging applications of internet and wireless communication technologies, e-manufacturing is focused on the use of internet, monitoring and communications technologies to make things happen collaboratively on a global basis. A wireless sensor network based data acquisition system gives enormous benefits such as ease and flexibility of deployment in addition to low maintenance and deployment costs. This paper reviews wireless sensor network and its application for e-manufacturing. To provide a dependable, non-intrusive, secure, real-time automated health monitoring, a distributed reconfigurable sensor network is introduced which consists of real and virtual sensor nodes over a communication wireless sensor network using Mica2 motes.

  14. Distribution of Multimedia Streams to Mobile Internet Users

    NARCIS (Netherlands)

    Hesselman, C.E.W.

    2005-01-01

    In this thesis, we consider the efficient distribution of live and scheduled multimedia content (e.g., radio and TV broadcasts) to mobile users via a ubiquitous wireless Internet. The objective is to design and develop a content delivery system that (1) enables content owners to deliver their

  15. Impact of the Internet on Academic Performance of Students in ...

    African Journals Online (AJOL)

    was also revealed that Power outage, slow internet speed, lack of computer ... mail, online chat, file transfer, the interlinked Web pages and other documents of the World ..... If cybercafés are provided with wireless access points, it will become ...

  16. .Planning Our Smart Cities In The Internet Of Things Architects ...

    African Journals Online (AJOL)

    2016-12-01

    Dec 1, 2016 ... ... IoT (Internet of Things) was developed in parallel to Wireless Sensor Networks, and ... interpret and transmit the data coming from all these sensors. The cloud is .... devices or data sources with limited power and unreliable ...

  17. Packet Header Compression for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Pekka KOSKELA

    2016-01-01

    Full Text Available Due to the extensive growth of Internet of Things (IoT, the number of wireless devices connected to the Internet is forecasted to grow to 26 billion units installed in 2020. This will challenge both the energy efficiency of wireless battery powered devices and the bandwidth of wireless networks. One solution for both challenges could be to utilize packet header compression. This paper reviews different packet compression, and especially packet header compression, methods and studies the performance of Robust Header Compression (ROHC in low speed radio networks such as XBEE, and in high speed radio networks such as LTE and WLAN. In all networks, the compressing and decompressing processing causes extra delay and power consumption, but in low speed networks, energy can still be saved due to the shorter transmission time.

  18. An Experimental Performance Measurement of Implemented Wireless Access Point for Interworking Wi-Fi and HSDPA Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of WAP(Wireless Access Point) that provides the wireless Internet access anywhere. Implemented WAP can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. WAP in the IP mechanism has to process connection setup procedure to one wireless WAN. Also, WAP can provide connection management procedures to reconnect interrupted connection automatically. By using WAP, several mobile devices such as netbook, UMPC and smart-phone in a moving vehicle can access to HSDPA network simultaneously. So, it has more convenient for using the WAP when there are needs to access wireless Internet more than two mobile devices in restricted spaces such as car, train and ship.

  19. Internet Alternatifs

    OpenAIRE

    Dulong de Rosnay , Melanie; Musiani , Francesca

    2015-01-01

    International audience; L'Internet est constitué de différents éléments et couches, qui peuvent être développés, façonnés et organisés de plusieurs manières : le réseau, l'hébergement, les applications, la connexion locale, les contenus. Si le concept de décentralisation est en quelque sorte inscrit dans le principe même de l'Internet – et notamment dans l'organisation de la circulation des flux – son urbanisme actuel semble n'intégrer ce principe que de manière limitée, et certains des risqu...

  20. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  1. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  2. An 802.11 n wireless local area network transmission scheme for wireless telemedicine applications.

    Science.gov (United States)

    Lin, C F; Hung, S I; Chiang, I H

    2010-10-01

    In this paper, an 802.11 n transmission scheme is proposed for wireless telemedicine applications. IEEE 802.11n standards, a power assignment strategy, space-time block coding (STBC), and an object composition Petri net (OCPN) model are adopted. With the proposed wireless system, G.729 audio bit streams, Joint Photographic Experts Group 2000 (JPEG 2000) clinical images, and Moving Picture Experts Group 4 (MPEG-4) video bit streams achieve a transmission bit error rate (BER) of 10-7, 10-4, and 103 simultaneously. The proposed system meets the requirements prescribed for wireless telemedicine applications. An essential feature of this proposed transmission scheme is that clinical information that requires a high quality of service (QoS) is transmitted at a high power transmission rate with significant error protection. For maximizing resource utilization and minimizing the total transmission power, STBC and adaptive modulation techniques are used in the proposed 802.11 n wireless telemedicine system. Further, low power, direct mapping (DM), low-error protection scheme, and high-level modulation are adopted for messages that can tolerate a high BER. With the proposed transmission scheme, the required reliability of communication can be achieved. Our simulation results have shown that the proposed 802.11 n transmission scheme can be used for developing effective wireless telemedicine systems.

  3. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  4. Identity Management Framework for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.

    -configuring capability and is termed as Internet of Things (IoT). The vision of IoT is to connect every object with computing, communication and sensing ability to the Internet. IoT contains varied range of devices from RFID tags, sensor nodes to the even shoes. Thus, IoT enable nomadic collaboration and communication...... between users and devices, between devices themselves and devices to services. Due to rapid technological advancements in the wireless communications, information coming from uncountable applications and services converged on user devices, communication infrastructure and the Internet are integral part...... that are public can be part of the personal space of multiple users at the same time. Secure interaction in and with IoT, secure data management and exchange, authentication, distributed access control and IdM of the devices are the main challenges. The work carried out in the scope of this thesis addresses...

  5. Wireless radio a history

    CERN Document Server

    Coe, Lewis

    2006-01-01

    ""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.

  6. Mapping in the cloud

    CERN Document Server

    Peterson, Michael P

    2014-01-01

    This engaging text provides a solid introduction to mapmaking in the era of cloud computing. It takes students through both the concepts and technology of modern cartography, geographic information systems (GIS), and Web-based mapping. Conceptual chapters delve into the meaning of maps and how they are developed, covering such topics as map layers, GIS tools, mobile mapping, and map animation. Methods chapters take a learn-by-doing approach to help students master application programming interfaces and build other technical skills for creating maps and making them available on the Internet. Th

  7. Optical wireless communication in data centers

    Science.gov (United States)

    Arnon, Shlomi

    2018-01-01

    In the last decade data centers have become a crucial element in modern human society. However, to keep pace with internet data rate growth, new technologies supporting data center should develop. Integration of optical wireless communication (OWC) in data centers is one of the proposed technologies as augmented technology to the fiber network. One implementation of the OWC technology is deployment of optical wireless transceiver on top of the existing cable/fiber network as extension to the top of rack (TOR) switch; in this way, a dynamic and flexible network is created. Optical wireless communication could reduce energy consumption, increase the data rate, reduce the communication latency, increase flexibility and scalability, and reduce maintenance time and cost, in comparison to extra fiber network deployment. In this paper we review up to date literature in the field, propose an implementation scheme of OWC network, discuss ways to reduce energy consumption by parallel link communication and report preliminary measurement result of university data center environment.

  8. Wireless Network Security Vulnerabilities and Concerns

    Science.gov (United States)

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  9. Public health implications of wireless technologies.

    Science.gov (United States)

    Sage, Cindy; Carpenter, David O

    2009-08-01

    Global exposures to emerging wireless technologies from applications including mobile phones, cordless phones, DECT phones, WI-FI, WLAN, WiMAX, wireless internet, baby monitors, and others may present serious public health consequences. Evidence supporting a public health risk is documented in the BioInitiative Report. New, biologically based public exposure standards for chronic exposure to low-intensity exposures are warranted. Existing safety standards are obsolete because they are based solely on thermal effects from acute exposures. The rapidly expanding development of new wireless technologies and the long latency for the development of such serious diseases as brain cancers means that failure to take immediate action to reduce risks may result in an epidemic of potentially fatal diseases in the future. Regardless of whether or not the associations are causal, the strengths of the associations are sufficiently strong that in the opinion of the authors, taking action to reduce exposures is imperative, especially for the fetus and children. Such action is fully compatible with the precautionary principle, as enunciated by the Rio Declaration, the European Constitution Principle on Health (Section 3.1) and the European Union Treaties Article 174.

  10. INTERNET ADVERTISING: A PRIMER

    OpenAIRE

    Matthew N. O. Sadiku*, Shumon Alam, Sarhan M. Musa

    2017-01-01

    Internet advertising (IA) is using the Internet to market products and services to a large audience. In the current era of Internet commerce, companies have chosen to use Internet advertising and the trend is irreversible. The goal of Internet advertising is to drive customers to your website. Understanding some key concepts of Internet advertising is crucial to creating a strategy that will suit one’s business. This paper provides a brief introduction to Internet or online advertising.

  11. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  12. Internet of THings Area Coverage Analyzer (ITHACA for Complex Topographical Scenarios

    Directory of Open Access Journals (Sweden)

    Raúl Parada

    2017-10-01

    Full Text Available The number of connected devices is increasing worldwide. Not only in contexts like the Smart City, but also in rural areas, to provide advanced features like smart farming or smart logistics. Thus, wireless network technologies to efficiently allocate Internet of Things (IoT and Machine to Machine (M2M communications are necessary. Traditional cellular networks like Global System for Mobile communications (GSM are widely used worldwide for IoT environments. Nevertheless, Low Power Wide Area Networks (LP-WAN are becoming widespread as infrastructure for present and future IoT and M2M applications. Based also on a subscription service, the LP-WAN technology SIGFOXTM may compete with cellular networks in the M2M and IoT communications market, for instance in those projects where deploying the whole communications infrastructure is too complex or expensive. For decision makers to decide the most suitable technology for each specific application, signal coverage is within the key features. Unfortunately, besides simulated coverage maps, decision-makers do not have real coverage maps for SIGFOXTM, as they can be found for cellular networks. Thereby, we propose Internet of THings Area Coverage Analyzer (ITHACA, a signal analyzer prototype to provide automated signal coverage maps and analytics for LP-WAN. Experiments performed in the Gran Canaria Island, Spain (with both urban and complex topographic rural environments, returned a real SIGFOXTM service availability above 97% and above 11% more coverage with respect to the company-provided simulated maps. We expect that ITHACA may help decision makers to deploy the most suitable technologies for future IoT and M2M projects.

  13. Internet Telephony

    OpenAIRE

    Perri, Richard.

    1999-01-01

    During the mid 90s, data and voice began to merge, propelled by advances in compression technology. The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the deployment of Voice over IP (VoIP). One advantage of VoIP technologies is that they leverage existing network resources and dramatically reduce, or major eliminate telephone costs. If there is an existing Wide Area Network (WAN) then VoIP could be employed over the ...

  14. A Multifactor Secure Authentication System for Wireless Payment

    Science.gov (United States)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  15. Internet dynamics

    Science.gov (United States)

    Lukose, Rajan Mathew

    The World Wide Web and the Internet are rapidly expanding spaces, of great economic and social significance, which offer an opportunity to study many phenomena, often previously inaccessible, on an unprecedented scale and resolution with relative ease. These phenomena are measurable on the scale of tens of millions of users and hundreds of millions of pages. By virtue of nearly complete electronic mediation, it is possible in principle to observe the time and ``spatial'' evolution of nearly all choices and interactions. This cyber-space therefore provides a view into a number of traditional research questions (from many academic disciplines) and creates its own new phenomena accessible for study. Despite its largely self-organized and dynamic nature, a number of robust quantitative regularities are found in the aggregate statistics of interesting and useful quantities. These regularities can be understood with the help of models that draw on ideas from statistical physics as well as other fields such as economics, psychology and decision theory. This thesis develops models that can account for regularities found in the statistics of Internet congestion and user surfing patterns and discusses some practical consequences. practical consequences.

  16. Secure wireless embedded systems via component-based design

    DEFF Research Database (Denmark)

    Hjorth, T.; Torbensen, R.

    2010-01-01

    This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure applications through verified, reusable software. Following this method we propose a security framework with a secure c......, with full support for confidentiality, authentication, and integrity using keypairs. The approach has been demonstrated in a multi-platform home automation prototype that can remotely unlock a door using a PDA over the Internet....

  17. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  18. Internet of things and automation of imaging: beyond representationalism

    Directory of Open Access Journals (Sweden)

    2016-09-01

    Full Text Available It is no doubt that the production of digital imagery invites for the major update of theoretical apparatus: what up until now was perceived solely or primarily as the stable representation of the world gives way to the image understood in terms of “the continuous actualization of networked data” or “networked terminal.” In my article I would like to argue that analysis of this new visual environment should not be limited to the procedures of data processing. What also invites serious investigation is acknowledging the reliance of contemporary media ecology on wireless communication which according to Adrian Mackenzie functions as “prepositions (‘at,’ ‘in,’ ‘with,’ by’, ‘between,’ ‘near,’ etc in the grammar of contemporary media” It seems especially important in the case of the imagery accompanying some instances of internet of things, where the considerable part of networked imagery is produced in a fully automated and machinic way. This crowdsourced air pollution monitoring platform consists of networked sensors transmitting signals and data which are then visualized as graphs and maps through the IoT service provider, Xively.

  19. Evolution of Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  20. Navigating the Internet of Things

    DEFF Research Database (Denmark)

    Rassia, Stamatina; Steiner, Henriette

    2017-01-01

    Navigating the Internet of Things is an exploration of interconnected objects, functions, and situations in networks created to ease and manage our daily lives. The Internet of Things represents semi-automated interconnections of different objects in a network based on different information...... technologies. Some examples of this are presented here in order to better understand, explain, and discuss the elements that compose the Internet of Things. In this chapter, we provide a theoretical and practical perspective on both the micro- and macro-scales of ‘things’ (objects), small and large (e.......g. computers or interactive maps), that suggest new topographic relationships and challenge our understanding of users’ involvement with a given technology against the semi-automated workings of these systems. We navigate from a philosophical enquiry into the ‘thingness of things’ dating from the 1950s...

  1. Internet-based Modeling, Mapping, and Analysis for the Greater Everglades (IMMAGE; Version 1.0): web-based tools to assess the impact of sea level rise in south Florida

    Science.gov (United States)

    Hearn, Paul; Strong, David; Swain, Eric; Decker, Jeremy

    2013-01-01

    South Florida's Greater Everglades area is particularly vulnerable to sea level rise, due to its rich endowment of animal and plant species and its heavily populated urban areas along the coast. Rising sea levels are expected to have substantial impacts on inland flooding, the depth and extent of surge from coastal storms, the degradation of water supplies by saltwater intrusion, and the integrity of plant and animal habitats. Planners and managers responsible for mitigating these impacts require advanced tools to help them more effectively identify areas at risk. The U.S. Geological Survey's (USGS) Internet-based Modeling, Mapping, and Analysis for the Greater Everglades (IMMAGE) Web site has been developed to address these needs by providing more convenient access to projections from models that forecast the effects of sea level rise on surface water and groundwater, the extent of surge and resulting economic losses from coastal storms, and the distribution of habitats. IMMAGE not only provides an advanced geographic information system (GIS) interface to support decision making, but also includes topic-based modules that explain and illustrate key concepts for nontechnical users. The purpose of this report is to familiarize both technical and nontechnical users with the IMMAGE Web site and its various applications.

  2. A Wireless Sensor Network Framework for Real-Time Monitoring of Height and Volume Variations on Sandy Beaches and Dunes

    Directory of Open Access Journals (Sweden)

    Alessandro Pozzebon

    2018-04-01

    Full Text Available In this paper, the authors describe the realization and testing of a Wireless Sensor Network (WSN framework aiming at measuring, remotely and in real time, the level variations of the sand layer of sandy beaches or dunes. The proposed framework is based on an innovative low cost sensing structure, able to measure the level variations with a 5-cm degree of precision and to locally transfer the acquired data through the ZigBee protocol. The described sensor is integrated in a wider ZigBee wireless sensor network architecture composed of an array of sensors that, arranged according to a grid layout, can acquire the same data at different points, allowing the definition of a dynamic map of the area under study. The WSN is connected to a local Global System for Mobile Communications (GSM gateway that is in charge of data processing and transmission to a cloud infrastructure through a General Packet Radio Service (GPRS connection. Data are then stored in a MySQL database and made available any time and anywhere through the Internet. The proposed architecture has been tested in a laboratory, to analyze data acquisition, processing timing and power consumption and then in situ to prove the effectiveness of the system. The described infrastructure is expected to be integrated in a wider IoT architecture including different typologies of sensors, in order to create a multi-purpose tool for the study of coastal erosive processes.

  3. Radio frequency identification enabled wireless sensing for intelligent food logistics.

    Science.gov (United States)

    Zou, Zhuo; Chen, Qiang; Chen, Qing; Uysal, Ismail; Zheng, Lirong

    2014-06-13

    Future technologies and applications for the Internet of Things (IoT) will evolve the process of the food supply chain and create added value of business. Radio frequency identifications (RFIDs) and wireless sensor networks (WSNs) have been considered as the key technological enablers. Intelligent tags, powered by autonomous energy, are attached on objects, networked by short-range wireless links, allowing the physical parameters such as temperatures and humidities as well as the location information to seamlessly integrate with the enterprise information system over the Internet. In this paper, challenges, considerations and design examples are reviewed from system, implementation and application perspectives, particularly with focus on intelligent packaging and logistics for the fresh food tracking and monitoring service. An IoT platform with a two-layer network architecture is introduced consisting of an asymmetric tag-reader link (RFID layer) and an ad-hoc link between readers (WSN layer), which are further connected to the Internet via cellular or Wi-Fi. Then, we provide insights into the enabling technology of RFID with sensing capabilities. Passive, semi-passive and active RFID solutions are discussed. In particular, we describe ultra-wideband radio RFID which has been considered as one of the most promising techniques for ultra-low-power and low-cost wireless sensing. Finally, an example is provided in the form of an application in fresh food tracking services and corresponding field testing results.

  4. Poultry Internet

    Science.gov (United States)

    Cheok, Adrian David

    Poultry are one of the most badly treated animals in the modern world. It has been shown that they have high levels of both cognition and feelings, and as a result there has been a recent trend of promoting poultry welfare. There is also a tradition of keeping poultry as pets in some parts of the world. However, in modern cities and societies, it is often difficult to maintain contact with pets, particularly for office workers. We propose and describe a novel cybernetics system to use mobile and Internet technology to improve human-pet interaction. It can also be used for people who are allergic to touching animals and thus cannot stroke them directly. This interaction encompasses both visualization and tactile sensation of real objects.

  5. Internet Astrometry

    Science.gov (United States)

    Caballero, Rafael; Argyle, R. W.

    Amateur astronomers can carry out scientific research in many different ways. Some activities require expensive telescopes, cameras, and often access to dark skies. But those who live in highly polluted areas, or do not have access to very specialized equipment, still have many possibilities; amongst which is using the online resources available from the internet. In this chapter we explore Aladin, Simbad, and VizieR, three resources created and maintained by the Centre de Données astronomiques de Strasbourg (CDS). Although these applications are intended for professional astronomers, they are also freely available for amateurs. They allow us to find and measure old neglected difficult pairs, discover new double stars, and in general have a better understanding of those tiny pairs of points of light that we love to observe, photograph and measure.

  6. Autonomous Vehicle Coordination with Wireless Sensor and Actuator Networks

    NARCIS (Netherlands)

    Marin Perianu, Mihai; Bosch, S.; Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.

    2010-01-01

    A coordinated team of mobile wireless sensor and actuator nodes can bring numerous benefits for various applications in the field of cooperative surveillance, mapping unknown areas, disaster management, automated highway and space exploration. This article explores the idea of mobile nodes using

  7. Java-based mobile agent platforms for wireless sensor networks

    NARCIS (Netherlands)

    Aiello, F.; Carbone, A.; Fortino, G.; Galzarano, S.; Ganzha, M.; Paprzycki, M.

    2010-01-01

    This paper proposes an overview and comparison of mobile agent platforms for the development of wireless sensor network applications. In particular, the architecture, programming model and basic performance of two Java-based agent platforms, Mobile Agent Platform for Sun SPOT (MAPS) and Agent

  8. Wireless communications resource management

    CERN Document Server

    Lee, B; Seo, H

    2009-01-01

    Wireless technologies continue to evolve to address the insatiable demand for faster response times, larger bandwidth, and reliable transmission. Yet as the industry moves toward the development of post 3G systems, engineers have consumed all the affordable physical layer technologies discovered to date. This has necessitated more intelligent and optimized utilization of available wireless resources. Wireless Communications Resource Managem ent, Lee, Park, and Seo cover all aspects of this critical topic, from the preliminary concepts and mathematical tools to detailed descriptions of all the resource management techniques. Readers will be able to more effectively leverage limited spectrum and maximize device battery power, as well as address channel loss, shadowing, and multipath fading phenomena.

  9. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  10. Contribution to the improvement of the performance of wireless mesh networks providing real time services

    OpenAIRE

    Vázquez Rodas, Andrés Marcelo

    2015-01-01

    Nowadays, people expectations for ubiquitous connectivity is continuously growing. Cities are now moving towards the smart city paradigm. Electricity companies aims to become part of smart grids. Internet is no longer exclusive for humans, we now assume the Internet of everything. We consider that Wireless Mesh Networks (WMNs) have a set of valuable features that will make it an important part of such environments. WMNs can also be use in less favored areas thanks to their low-cost deployment...

  11. Mapping of wine industry

    OpenAIRE

    Віліна Пересадько; Надія Максименко; Катерина Біла

    2016-01-01

    Having reviewed a variety of approaches to understanding the essence of wine industry, having studied the modern ideas about the future of wine industry, having analyzed more than 50 maps from the Internet we have set the trends and special features of wine industry mapping in the world, such as: - the vast majority of maps displays the development of the industry at regional or national level, whereas there are practically no world maps; - wine-growing regions are represented on maps very un...

  12. The Effectiveness of Internet-Based Peer Feedback Training on Chinese EFL College Students' Writing Proficiency

    Science.gov (United States)

    Jiang, Jiahong; Yu, Yibing

    2014-01-01

    English writing, an indispensable skill in English learning, plays an important role in improving learners' language proficiency. With the wide spread and use of wired or wireless internet, EFL students can easily help and be helped with English writing. Therefore, the application of internet-based peer feedback training on writing to foreign or…

  13. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  14. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  15. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  16. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    International Nuclear Information System (INIS)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs

  17. Wireless sensor platform

    Science.gov (United States)

    Joshi, Pooran C.; Killough, Stephen M.; Kuruganti, Phani Teja

    2017-08-08

    A wireless sensor platform and methods of manufacture are provided. The platform involves providing a plurality of wireless sensors, where each of the sensors is fabricated on flexible substrates using printing techniques and low temperature curing. Each of the sensors can include planar sensor elements and planar antennas defined using the printing and curing. Further, each of the sensors can include a communications system configured to encode the data from the sensors into a spread spectrum code sequence that is transmitted to a central computer(s) for use in monitoring an area associated with the sensors.

  18. Wireless Testbed Bonsai

    Science.gov (United States)

    2006-02-01

    wireless sensor device network, and a about 200 Stargate nodes higher-tier multi-hop peer- to-peer 802.11b wireless network. Leading up to the full ExScal...deployment, we conducted spatial scaling tests on our higher-tier protocols on a 7 × 7 grid of Stargates nodes 45m and with 90m separations respectively...onW and its scaled version W̃ . III. EXPERIMENTAL SETUP Description of Kansei testbed. A stargate is a single board linux-based computer [7]. It uses a

  19. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  20. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  1. Wireless optical telecommunications

    CERN Document Server

    Bouchet, Olivier

    2013-01-01

    Wireless optical communication refers to communication based on the unguided propagation of optical waves. The past 30 years have seen significant improvements in this technique - a wireless communication solution for the current millennium - that offers an alternative to radio systems; a technique that could gain attractiveness due to recent concerns regarding the potential effects of radiofrequency waves on human health.The aim of this book is to look at the free space optics that are already used for the exchange of current information; its many benefits, such as incorporating chan

  2. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  3. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  4. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  5. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  6. INTERNET & INTRANET

    Institute of Scientific and Technical Information of China (English)

    刘硬

    1999-01-01

    <正> 一、什么是INTERNET,INTRANET 说起INTERNET大家都知道它是我们平时接触最多的国际互联网。而INTRANET是最近两年才发展起来的新事物,被企业界称为企业内部网。 INTERNET是一组全球范围内信息资源的名字。这些资源非常巨大,不是一般人所能想象的。它于20世纪70年代创建。他们从一称为ARPANET的网络开始,是由美国国防部发起的用于军事情报的调查与军队之间的联络。原来的ARPANET早已被扩展与替代了,今天它已成为我们所说的INTERNET的全球主干网。

  7. Internet addiction or excessive internet use.

    Science.gov (United States)

    Weinstein, Aviv; Lejoyeux, Michel

    2010-09-01

    Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Review of published literature between 2000-2009 in Medline and PubMed using the term "internet addiction. Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Cross-sectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.

  8. Middleware solutions for the Internet of Things

    CERN Document Server

    Delicato, Flávia C; Batista, Thais

    2013-01-01

    After a brief introduction and contextualization on the Internet of Things (IoT) and Web of Things (WoT) paradigms, this timely new book describes one of the first research initiatives aimed at tackling the several challenges involved in building a middleware-layer infrastructure capable of realizing the WoT vision: the SmartSensor infrastructure. It is based on current standardization efforts and designed to manage a specific type of physical devices, those organized to shape a Wireless Sensor Network (WSN), where sensors work collaboratively, extracting data and transmitting it to external n

  9. Internet of Things challenges and opportunities

    CERN Document Server

    2014-01-01

    Advancement in sensor technology, smart instrumentation, wireless sensor networks, miniaturization, RFID and information processing is helping towards the realization of Internet of Things (IoT). IoTs are finding applications in various area applications including environmental monitoring, intelligent buildings, smart grids and so on. This book provides design challenges of IoT, theory, various protocols, implementation issues and a few case study. The book will be very useful for postgraduate students and researchers to know from basics to implementation of IoT.

  10. A wireless potentiostat for mobile chemical sensing and biosensing.

    Science.gov (United States)

    Steinberg, Matthew D; Kassal, Petar; Kereković, Irena; Steinberg, Ivana Murković

    2015-10-01

    Wireless chemical sensors are used as analytical devices in homeland defence, home-based healthcare, food logistics and more generally for the Sensor Internet of Things (SIoT). Presented here is a battery-powered and highly portable credit-card size potentiostat that is suitable for performing mobile and wearable amperometric electrochemical measurements with seamless wireless data transfer to mobile computing devices. The mobile electrochemical analytical system has been evaluated in the laboratory with a model redox system - the reduction of hexacyanoferrate(III) - and also with commercially available enzymatic blood-glucose test-strips. The potentiostat communicates wirelessly with mobile devices such as tablets or Smartphones by near-field communication (NFC) or with personal computers by radio-frequency identification (RFID), and thus provides a solution to the 'missing link' in connectivity that often exists between low-cost mobile and wearable chemical sensors and ubiquitous mobile computing products. The mobile potentiostat has been evaluated in the laboratory with a set of proof-of-concept experiments, and its analytical performance compared with a commercial laboratory potentiostat (R(2)=0.9999). These first experimental results demonstrate the functionality of the wireless potentiostat and suggest that the device could be suitable for wearable and point-of-sample analytical measurements. We conclude that the wireless potentiostat could contribute significantly to the advancement of mobile chemical sensor research and adoption, in particular for wearable sensors in healthcare and sport physiology, for wound monitoring and in mobile point-of-sample diagnostics as well as more generally as a part of the Sensor Internet of Things. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  12. Miniaturized wireless sensor network

    OpenAIRE

    Lecointre , Aubin; Dragomirescu , Daniela; Dubuc , David; Grenier , Katia; Pons , Patrick; Aubert , Hervé; Müller , A.; Berthou , Pascal; Gayraud , Thierry; Plana , Robert

    2006-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  13. Investigating Wireless Power Transfer

    Science.gov (United States)

    St. John, Stuart A.

    2017-01-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a…

  14. Future of wireless communication

    Energy Technology Data Exchange (ETDEWEB)

    Barker, M

    1996-12-31

    This document reproduces slides from a conference presentation giving an overview of current and upcoming wireless communication methods of interest to Canadian electric utilities. Both voice and data communication methods are considered, including cellular telephone, satellite communications, personal communication services, regulated licensed arrowband data systems, and integrated services.

  15. Wired vs. Wireless.

    Science.gov (United States)

    Fielding, Randall

    2000-01-01

    Presents a debate on which technology will be in tomorrow's classrooms and the pros and cons of wiring classrooms and using a wireless network. Concluding comments address the likelihood, and desirability, of placing computers throughout the entire educational process and what types of computers and capabilities are needed. (GR)

  16. Wireless Remote Control System

    Directory of Open Access Journals (Sweden)

    Adrian Tigauan

    2012-06-01

    Full Text Available This paper presents the design of a wireless remote control system based on the ZigBee communication protocol. Gathering data from sensors or performing control tasks through wireless communication is advantageous in situations in which the use of cables is impractical. An Atmega328 microcontroller (from slave device is used for gathering data from the sensors and transmitting it to a coordinator device with the help of the XBee modules. The ZigBee standard is suitable for low-cost, low-data-rate and low-power wireless networks implementations. The XBee-PRO module, designed to meet ZigBee standards, requires minimal power for reliable data exchange between devices over a distance of up to 1600m outdoors. A key component of the ZigBee protocol is the ability to support networking and this can be used in a wireless remote control system. This system may be employed e.g. to control temperature and humidity (SHT11 sensor and light intensity (TSL230 sensor levels inside a commercial greenhouse.

  17. Building the Wireless Campus

    Science.gov (United States)

    Gerraughty, James F.; Shanafelt, Michael E.

    2005-01-01

    This prototype is a continuation of a series of wireless prototypes which began in August 2001 and was reported on again in August 2002. This is the final year of this prototype. This continuation allowed Saint Francis University's Center of Excellence for Remote and Medically Under-Served Areas (CERMUSA) to refine the existing WLAN for the Saint…

  18. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  19. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  20. Responsible Internet Use.

    Science.gov (United States)

    Truett, Carol; And Others

    1997-01-01

    Provides advice for making school Internet-use guidelines. Outlines responsible proactive use of the Internet for educators and librarians, discusses strengths and weaknesses of Internet blocking software and rating systems, and describes acceptable-use policies (AUP). Lists resources for creating your own AUP, Internet filtering software, and…

  1. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  2. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  3. Internet Economics IV

    Science.gov (United States)

    2004-08-01

    edts.): Internet Economics IV Technical Report No. 2004-04, August 2004 Information Systems Laboratory IIS, Departement of Computer Science University of...level agreements (SLA), Information technology (IT), Internet address, Internet service provider 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... technology and its economic impacts in the Internet world today. The second talk addresses the area of AAA protocol, summarizing authentication

  4. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    networking it has never been easier to penetrate the network. One of the biggest problems of today's wireless networks is the lack of effective systems for intrusion detection. Forgetting to cover gaps in wireless network security may result in intrusion into the network by an attacker. Security in IEEE 802.11 wireless networks Although the IEEE 802.11 protocol defines security standards, wireless networks are one of the weakest links in the chain of computer networks. The basic security requirements of each computer network are reliable user authentication, privacy protection and user authentication. Security attacks on IEEE 802.11 wireless networks Non-technical attacks include a variety of human weaknesses, such as lack of conscience, negligence or over-confidence towards the strangers. Network attacks include a number of techniques that enable attackers to penetrate into  the wireless network, or at least to disable it. Apart from the security problems with the IEEE 802.11 protocol, there are vulnerabilities in operating systems and applications on wireless clients. The methodology of attack Before testing wireless network security vulnerabilities, it is important to define a formal testing methodology. The first step before the actual attack is footprinting. The second step is the creation of a network map that shows how the wireless system looks. For this purpose, hackers are using specific tools, such as Network Stumbler, Nmap and Fping. When basic information about the wireless network is gathered, more information can be found out through the process of system scanning (enumeration. Attacks on IEEE 802.11 wireless networks Social engineering is a technique by which attackers exploit the natural trust of most people. Radio waves do not respect defined boundaries. If radio waves are broadcasted outside of the boundaries of the defined area, then it is necessary to reduce signal strength on wireless access points. In that way, radio waves travel over shorter distances

  5. Mobility and Heterogeneity Aware Cluster-Based Data Aggregation for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    Internet of things (IoT) is the modern era, which offers a variety of novel applications for mobile targets and opens the new domains for the distributed data aggregations using Wireless Sensor Networks (WSNs). However, low cost tiny sensors used for network formation generate the large amount...

  6. Radio frequency energy harvesting and low power data transmission for autonomous wireless sensor nodes

    NARCIS (Netherlands)

    Rodrigues Mansano, A.L.

    2016-01-01

    Since the Internet of Things (IoT) is expected to be the new technology to drive the semiconductor industry, significant research efforts have been made to develop new circuit and system techniques for autonomous/very low-power operation of wireless sensor nodes. Very low-power consumption of

  7. An Energy Efficient Adaptive Wireless Link for Farms based on IoT technologies

    DEFF Research Database (Denmark)

    Blaszczyk, tomasz; Lynggaard, Per

    2016-01-01

    There is a huge demand for automation infrastructures that increase the efficiency and the commercial potential for the agricultural sector. One approach to achieve these objectives is deploying Internet of Things including its embedded wireless sensor network platform. However, deploying wireles...

  8. An Energy Efficient Adaptive Wireless Link for Farms based on IoT technologies

    DEFF Research Database (Denmark)

    Blaszczyk, Tomasz; Lynggaard, P.

    2015-01-01

    There is a huge demand for automation infrastructures that increase the efficiency and the commercial potential for the agricultural sector. One approach to achieve these objectives is deploying Internet of Things including its embedded wireless sensor network platform. However, deploying wireles...

  9. Software defined networking for improved wireless sensor network management: a survey

    CSIR Research Space (South Africa)

    Ndiaye, M

    2017-05-01

    Full Text Available Wireless sensor networks (WSNs) are becoming increasingly popular with the advent of the Internet of things (IoT). Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment...

  10. Circuit Design for Highly Sensitive RF-Powered Wireless Sensor Nodes

    NARCIS (Netherlands)

    Stoopman, M.

    2016-01-01

    Emerging applications such as Internet of Things (IoT), smart buildings and warehouse inventory management are important driving forces behind the development of Wireless Sensor Nodes (WSNs). With future advancements made in the semiconductor industry, these WSNs are expected to become smaller,

  11. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Su, Chunhua

    2017-01-01

    Internet of Things (IoT) has been widely used in our daily life, which enables various objects to be interconnected for data exchange, including physical devices, vehicles, and other items embedded with network connectivity. Wireless sensor network (WSN) is a vital application of IoT, providing...

  12. When Whereabouts is No Longer Thereabouts: Location Privacy in Wireless Networks

    OpenAIRE

    Freudiger, Julien

    2011-01-01

    Modern mobile devices are fast, programmable and feature localization and wireless capabilities. These technological advances notably facilitate mobile access to Internet, development of mobile applications and sharing of personal information, such as location information. Cell phone users can for example share their whereabouts with friends on online social networks. Following this trend, the field of ubiquitous computing foresees communication netwo...

  13. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  14. IP communication optimization for 6LoWPAN-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Li MA

    2014-07-01

    Full Text Available The emergence of 6LoWPAN makes it possible that Wireless Sensor Networks access to the Internet. However, the cost of IP communication between 6LoWPAN wireless sensor node and external internet node is still relatively high. This paper proposed a new addressing configuration and compression scheme in 6LoWPAN network called IPHC-NAT, which largely reduced the proportion of the IP header in 6LoWPAN packet, designed and constructed a bidirectional data transmission gateway to connect 6LoWPAN wireless sensor node with IPv6 client. The experimental results show the feasibility of the design of IPHC-NAT and the data transmission efficiency has significantly been improved compared to the original 6LoWPAN network.

  15. NASA Bluetooth Wireless Communications

    Science.gov (United States)

    Miller, Robert D.

    2007-01-01

    NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.

  16. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  17. Work in progress — rural Pondicherry's wireless internet | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The system may have moved data at less than a tenth of the speed of current dialup modems in North ... Enabling social change ... Plus de 300 personnes, principalement de jeunes entrepreneures, ont assisté au forum « Think Big: Women in ...

  18. Work in progress — rural Pondicherry's wireless internet | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-02-03

    Feb 3, 2011 ... What a difference seven years can make. ... paper to put together a monthly short program based on its contents. Enabling social change. Over the past few years, knowledge centres in the wired villages of Pondicherry have ...

  19. A Survey on Wireless Transmitter Localization Using Signal Strength Measurements

    Directory of Open Access Journals (Sweden)

    Henri Nurminen

    2017-01-01

    Full Text Available Knowledge of deployed transmitters’ (Tx locations in a wireless network improves many aspects of network management. Operators and building administrators are interested in locating unknown Txs for optimizing new Tx placement, detecting and removing unauthorized Txs, selecting the nearest Tx to offload traffic onto it, and constructing radio maps for indoor and outdoor navigation. This survey provides a comprehensive review of existing algorithms that estimate the location of a wireless Tx given a set of observations with the received signal strength indication. Algorithms that require the observations to be location-tagged are suitable for outdoor mapping or small-scale indoor mapping, while algorithms that allow most observations to be unlocated trade off some accuracy to enable large-scale crowdsourcing. This article presents empirical evaluation of the algorithms using numerical simulations and real-world Bluetooth Low Energy data.

  20. Wireless Communications Device Wakeup Method and System

    NARCIS (Netherlands)

    Drago, S.; Sebastiano, F.; Leenaerts, D.M.W.; Breems, L.J.

    2008-01-01

    Abstract of WO 2009044368 Disclosed are wakeable wireless communications devices, and methods for waking wireless communications devices, for use in a wireless network of such devices. The devices communicate during respectively-designated timeslots according to a communications protocol. The

  1. QoE-based transmission strategies for multi-user wireless information and power transfer

    Directory of Open Access Journals (Sweden)

    Taehun Jung

    2015-12-01

    Full Text Available One solution to the problem of supplying energy to wireless networks is wireless power transfer. One such technology–electromagnetic radiation enabled wireless power transfer–will change traditional wireless networks. In this paper, we investigate a transmission strategy for multi-user wireless information and power transfer. We consider a multi-user multiple-input multiple-output (MIMO channel that includes one base station (BS and two user terminals (UT consisting of one energy harvesting (EH receiver and one information decoding (ID receiver. Our system provides transmission strategies that can be executed and implemented in practical scenarios. The paper then analyzes the rate–energy (R–E pair of our strategies and compares them to those of the theoretical optimal strategy. We furthermore propose a QoE-based mode selection algorithm by mapping the R–E pair to the utility functions.

  2. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  3. Software Defined Networks in Wireless Sensor Architectures

    Directory of Open Access Journals (Sweden)

    Jesús Antonio Puente Fernández

    2018-03-01

    Full Text Available Nowadays, different protocols coexist in Internet that provides services to users. Unfortunately, control decisions and distributed management make it hard to control networks. These problems result in an inefficient and unpredictable network behaviour. Software Defined Networks (SDN is a new concept of network architecture. It intends to be more flexible and to simplify the management in networks with respect to traditional architectures. Each of these aspects are possible because of the separation of control plane (controller and data plane (switches in network devices. OpenFlow is the most common protocol for SDN networks that provides the communication between control and data planes. Moreover, the advantage of decoupling control and data planes enables a quick evolution of protocols and also its deployment without replacing data plane switches. In this survey, we review the SDN technology and the OpenFlow protocol and their related works. Specifically, we describe some technologies as Wireless Sensor Networks and Wireless Cellular Networks and how SDN can be included within them in order to solve their challenges. We classify different solutions for each technology attending to the problem that is being fixed.

  4. Intelligent Devices in Rural Wireless Networks

    Directory of Open Access Journals (Sweden)

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  5. A STUDY ON INTERNET OF THINGS APPLICATIONS AND RELATED ISSUES

    OpenAIRE

    Sandeep Kumar; Hemlata Dalmia

    2017-01-01

    Day by day Internet of Things (IoT) has gained a great attention from research community because of the importance of IoT technology in human life. IoT is a smart system which consists of different type of sensors and real world application connected with each other through internet via wired or wireless network structure. The IoT makes the world smart in every aspects means IoT gives the information regarding the surrounding condition of things with the help of technology i.e. smart home, sm...

  6. Security For Wireless Sensor Network

    OpenAIRE

    Saurabh Singh,; Dr. Harsh Kumar Verma

    2011-01-01

    Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodescommunicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks aredeployed in hostile environments. Environmental conditions along with resource-constraints give...

  7. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  8. An Assessment of Emerging Wireless Broadband Technologies

    National Research Council Canada - National Science Library

    Fountanas, Leonidas

    2001-01-01

    ... technologies in providing broadband services today, emerging wireless broadband technologies are expected to significantly increase their market share over the next years, Deploying a wireless network...

  9. Interoperability, Standardisation and Governance in the Era of Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Rajeev; Prasad, Neeli R.

    2011-01-01

    The idiom “Internet of Things” has appeared to describe a number of technologies and research disciplines that enable the Internet to reach out into the real world of physical objects. Technologies such as RFID, short-range wireless communications, real-time localization, and sensor networks...... are becoming increasingly common, bringing the “Internet of Things” into industrial, commercial, and domestic use. Since the last decade, a thought-provoking idea is fast emerging in the wireless communications which gives us the newscientific insight about the omnipresent presence around us of a variety...... of “things” or “objects,” such as RFIDs, sensors, actuators, mobile phones, which, through unique addressing schemes, are able to interact with each other and cooperate with their neighboring “smart” components to reach common goals. This novel paradigm, named “The Internet of Things” (IoT) continues...

  10. Photonics in wireless transceivers

    International Nuclear Information System (INIS)

    Bogani, A.; Ghelfi, P.

    2013-01-01

    During the last few years, the cross-fertilization between photonics and radio systems has been helping to overcome some major limitations of the classical radio technologies, setting new paradigms, and promising improved performance and new applications with strong benefits for public communications and safety. In particular, photonics-based wireless systems, albeit still at research level, are moving toward a new generation of multifunctional systems able to manage the wireless communication with several different frequencies and protocols, even simultaneously while also realizing surveillance operations. Photonics matches the new requirements of flexibility for software-defined architectures, thanks to its ultra-wide bandwidths and ease of tunability, and guarantees low footprint and weight, thanks to integrated photonic technologies. Moreover, photonics also allows increased resolution and sensitivity by means of the inherent low phase noise of lasers. (author)

  11. Wireless infrared computer control

    Science.gov (United States)

    Chen, George C.; He, Xiaofei

    2004-04-01

    Wireless mouse is not restricted by cable"s length and has advantage over its wired counterpart. However, all the mice available in the market have detection range less than 2 meters and angular coverage less than 180 degrees. Furthermore, commercial infrared mice are based on track ball and rollers to detect movements. This restricts them to be used in those occasions where users want to have dynamic movement, such as presentations and meetings etc. This paper presents our newly developed infrared wireless mouse, which has a detection range of 6 meters and angular coverage of 180 degrees. This new mouse uses buttons instead of traditional track ball and is developed to be a hand-held device like remote controller. It enables users to control cursor with a distance closed to computer and the mouse to be free from computer operation.

  12. Sweet Dreams and Nightmares: Security in the Internet of Things

    OpenAIRE

    Kasper , Timo; Oswald , David; Paar , Christof

    2014-01-01

    Part 1: Invited Paper; International audience; Wireless embedded devices are predominant in the Internet of Things: Objects tagged with Radio Frequency IDentification and Near Field Communication technology, smartphones, and other embedded tokens interact from device to device and thereby often process information that is security or privacy relevant for humans. For protecting sensitive data and preventing attacks, many embedded devices employ cryptographic algorithms and authentication schem...

  13. Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles

    OpenAIRE

    Wan, Jiafu; Liu, Jianqi; Shao, Zehui; Vasilakos, Athanasios V.; Imran, Muhammad; Zhou, Keliang

    2016-01-01

    The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and Io...

  14. [Implementation of ECG Monitoring System Based on Internet of Things].

    Science.gov (United States)

    Lu, Liangliang; Chen, Minya

    2015-11-01

    In order to expand the capabilities of hospital's traditional ECG device and enhance medical staff's work efficiency, an ECG monitoring system based on internet of things is introduced. The system can monitor ECG signals in real time and analyze data using ECG sensor, PDA, Web servers, which embeds C language, Android systems, .NET, wireless network and other technologies. After experiments, it can be showed that the system has high reliability and stability and can bring the convenience to medical staffs.

  15. Adaptive Wireless Transceiver, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  16. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  17. 3D inkjet printed disposable environmental monitoring wireless sensor node

    KAUST Repository

    Farooqui, Muhammad Fahad

    2017-10-24

    We propose a disposable, miniaturized, moveable, fully integrated 3D inkjet-printed wireless sensor node for large area environmental monitoring applications. As a proof of concept, we show the wireless sensing of temperature, humidity and H2S levels which are important for early warnings of two critical environmental conditions namely forest fires and industrial gas leaks. The temperature sensor has TCR of -0.018/°, the highest of any inkjet-printed sensor and the H2S sensor can detect as low as 3 ppm of gas. These sensors and an antenna have been realized on the walls of a 3D-printed cubic package which encloses the microelectronics developed on a 3D-printed circuit board. Hence, 3D printing and inkjet printing have been combined in order to realize a unique low-cost, fully integrated wireless sensor node. Field tests show that these sensor nodes can wirelessly communicate up to a distance of over 100m. Our proposed sensor node can be a part of internet of things with the aim of providing a better and safe living.

  18. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  19. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  20. Miniaturised wireless smart tag for optical chemical analysis applications.

    Science.gov (United States)

    Steinberg, Matthew D; Kassal, Petar; Tkalčec, Biserka; Murković Steinberg, Ivana

    2014-01-01

    A novel miniaturised photometer has been developed as an ultra-portable and mobile analytical chemical instrument. The low-cost photometer presents a paradigm shift in mobile chemical sensor instrumentation because it is built around a contactless smart card format. The photometer tag is based on the radio-frequency identification (RFID) smart card system, which provides short-range wireless data and power transfer between the photometer and a proximal reader, and which allows the reader to also energise the photometer by near field electromagnetic induction. RFID is set to become a key enabling technology of the Internet-of-Things (IoT), hence devices such as the photometer described here will enable numerous mobile, wearable and vanguard chemical sensing applications in the emerging connected world. In the work presented here, we demonstrate the characterisation of a low-power RFID wireless sensor tag with an LED/photodiode-based photometric input. The performance of the wireless photometer has been tested through two different model analytical applications. The first is photometry in solution, where colour intensity as a function of dye concentration was measured. The second is an ion-selective optode system in which potassium ion concentrations were determined by using previously well characterised bulk optode membranes. The analytical performance of the wireless photometer smart tag is clearly demonstrated by these optical absorption-based analytical experiments, with excellent data agreement to a reference laboratory instrument. © 2013 Elsevier B.V. All rights reserved.

  1. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  2. Wearable wireless photoplethysmography sensors

    Science.gov (United States)

    Spigulis, Janis; Erts, Renars; Nikiforovs, Vladimirs; Kviesis-Kipge, Edgars

    2008-04-01

    Wearable health monitoring sensors may support early detection of abnormal conditions and prevention of their consequences. Recent designs of three wireless photoplethysmography monitoring devices embedded in hat, glove and sock, and connected to PC or mobile phone by means of the Bluetooth technology, are described. First results of distant monitoring of heart rate and pulse wave transit time using the newly developed devices are presented.

  3. Wireless Cellular Mobile Communications

    OpenAIRE

    Zalud, V.

    2002-01-01

    In this article is briefly reviewed the history of wireless cellular mobile communications, examined the progress in current second generation (2G) cellular standards and discussed their migration to the third generation (3G). The European 2G cellular standard GSM and its evolution phases GPRS and EDGE are described somewhat in detail. The third generation standard UMTS taking up on GSM/GPRS core network and equipped with a new advanced access network on the basis of code division multiple ac...

  4. Case studies in geographic information systems for internet portals

    Science.gov (United States)

    2012-06-30

    The following report investigates the experiences of transportation agencies in the deployment of Internet-based mapping portals based on GIS. It presents background information, a series of case studies, and a summary of conclusions given the experi...

  5. 670 investigating changes in coastal environment using internet

    African Journals Online (AJOL)

    Osondu

    the basis of this background, access to geospatial data through internet technology has become ... refer to different things in the strictest sense. .... maps, previous literature, and ground survey .... across a broad range of industries and.

  6. Research on sensor design for internet of things and laser manufacturing

    Science.gov (United States)

    Wang, Tao; Yao, Jianquan; Guo, Ling; Zhang, Yanchun

    2010-12-01

    In this paper, we will introduce the research on sensor design for IOT (Internet of Things) and laser manufacturing, and supporting the establishment of local area IOT. The main contents include studying on the structure designing of silicon micro tilt sensor, data acquisition and processing, addressing implanted and building Local Area IOT with wireless sensor network technology. At last, it is discussed the status and trends of the Internet of Things from the promoters, watchers, pessimists and doers.

  7. Switching Brains: Cloud-based Intelligent Resources Management for the Internet of Cognitive Things

    OpenAIRE

    R. Francisco; A.M. Arsenio

    2014-01-01

    Cognitive technologies can bring important benefits to our everyday life, enabling connected devices to do tasks that in the past only humans could do, leading to the Cognitive Internet of Things. Wireless Sensor and Actuator Networks (WSAN) are often employed for communication between Internet objects. However, WSAN face some problems, namely sensors’ energy and CPU load consumption, which are common to other networked devices, such as mobile devices or robotic platforms. Additionally, cogni...

  8. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  9. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  10. Complex Geography of the Internet Network

    International Nuclear Information System (INIS)

    Kallus, Z.; Haga, P.; Matray, P.; Vattay, G.; Laki, S.

    2011-01-01

    The geographic layout of the physical Internet inherently determines important network properties. In this paper, we analyze the spatial properties of the Internet topology. In particular, the distribution of the lengths of Internet links is presented - which was possible through spatial embedding of a representative set of IP addresses by applying a novel IP geolocalization service, called Spotter. The dataset is a result of a geographically dispersed topological discovery campaign. After showing the spatial likelihood of Internet nodes we present two approaches to describe the length distribution of the links. The resulting characterization reveals that the distribution can be separated into three characteristic distance ranges which can be mapped to the regional, transcontinental and intercontinental connections. These regimes follow a power-law function with different exponents. (author)

  11. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  12. Internet flash of lightning

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    Seven Internet sites are given relative to European Research and IAEA; Three sites in relation with optimization of radiation protection and environment, Google scolar, medicine, radioecology, finally seventeen Internet sites are detailed in this article. (N.C.)

  13. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  14. A Multimetric Approach for Handoff Decision in Heterogeneous Wireless Networks

    Science.gov (United States)

    Kustiawan, I.; Purnama, W.

    2018-02-01

    Seamless mobility and service continuity anywhere at any time are an important issue in the wireless Internet. This research proposes a scheme to make handoff decisions effectively in heterogeneous wireless networks using a fuzzy system. Our design lies in an inference engine which takes RSS (received signal strength), data rate, network latency, and user preference as strategic determinants. The logic of our engine is realized on a UE (user equipment) side in faster reaction to network dynamics while roaming across different radio access technologies. The fuzzy system handles four metrics jointly to deduce a moderate decision about when to initiate handoff. The performance of our design is evaluated by simulating move-out mobility scenarios. Simulation results show that our scheme outperforms other approaches in terms of reducing unnecessary handoff.

  15. On design of sensor nodes in the rice planthopper monitoring system based on the internet of things

    Science.gov (United States)

    Wang, Ke Qiang; Cai, Ken

    2011-02-01

    Accurate records and prediction of the number of the rice planthopper's outbreaks and the environmental information of farmland are effective measures to control pests' damages. On the other hand, a new round of technological revolution from the Internet to the Internet of things is taking place in the field of information. The application of the Internet of things in rice planthopper and environmental online monitoring is an effective measure to solve problems existing in the present wired sensor monitoring technology. Having described the general framework of wireless sensor nodes in the Internet of things in this paper, the software and hardware design schemes of wireless sensor nodes are proposed, combining the needs of rice planthopper and environmental monitoring. In these schemes, each module's design and key components' selection are both aiming to the characteristics of the Internet of things, so it has a strong practical value.

  16. Internet Addiction and Antisocial Internet Behavior of Adolescents

    OpenAIRE

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued ...

  17. The internet for radiologists

    International Nuclear Information System (INIS)

    Caramella, D.; Pavone, P.

    1999-01-01

    This book provides information on all aspects of the Internet of interest to radiologists. It also provides non-experts with all the information necessary to profit from the Internet and to explore the different possibilities offered by the www. Its use should be recommended to all radiologists who use the Internet. (orig.)

  18. Advertising on the Internet.

    Science.gov (United States)

    Jugenheimer, Donald W.

    1996-01-01

    States that although many advertisers have intentions of utilizing the Internet for advertising, which can provide specific audience targeting and buyer/seller interactivity, few have been successful. Explains advantages and disadvantages of using the Internet for advertising purposes. Cites special problems with Internet advertising and successes…

  19. Impact of the Internet.

    Science.gov (United States)

    Balajthy, Ernest

    1997-01-01

    Discusses the impact and the potential of the Internet on education. Suggests that educators and parents need to deal with the lack of quality assurance of the Internet. Addresses readability and appropriateness for children. Notes that successful use of the Internet by children requires that teachers provide instruction in multiple sources and…

  20. Internet Bad Neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it

  1. Internet Addiction in Adolescents

    Science.gov (United States)

    Rebisz, Slawomir; Sikora, Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the…

  2. Konsep Pemasaran Melalui Internet

    OpenAIRE

    Nurbasari, Anny

    2002-01-01

    Tulisan ini mencoba membuka wawasan kita untuk mengenal dan mendalami paradigma baru dalam manajemen pemasaran, yang berkaitan dengan kemajuan teknologi pemasaran khususnya pemasaran internet (internet marketing).Pemasaran lewat internet sebagai media komunikasi baru makin lazim dilakukan dan makin berpengaruh karena efisiensinya (lengkap, detail, akurat, cepat, mudah, hemat, murah, dan berjangkauan luas). Secara otomatis ini meningkatkan customer intimacy dan customer satisfaction.

  3. The Sensing Internet

    DEFF Research Database (Denmark)

    Heller, Alfred

    2015-01-01

    . Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...

  4. Internet from Above.

    Science.gov (United States)

    Sullivan, Laura

    1998-01-01

    Explains how fast and reliable Internet access can be obtained by using satellite communications based on experiences at a high school in Mississippi. Discusses Internet communications; how it was implemented in the media center; local area networks; the need for Ethernet-based connection to the Internet; and price. (LRW)

  5. Measuring the internet

    NARCIS (Netherlands)

    Zhou, X.

    2006-01-01

    The Internet is a collection of networks that use the TCP/IP suite of protocols. It has a huge impact on human activity. There are currently hundreds of millions of computers connected to the Internet, generating several petabytes traffic a day. Internet is still growing rapidly. However, the

  6. Internet Addiction and Psychopathology

    Science.gov (United States)

    Koc, Mustafa

    2011-01-01

    This study examined the relationships between university students' internet addiction and psychopathology in Turkey. The study was based on data drawn from a national survey of university students in Turkey. 174 university students completed the SCL-90-R scale and Addicted Internet Users Inventory. Results show that students who use internet six…

  7. Green Wireless Power Transfer Networks

    NARCIS (Netherlands)

    Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.

    2016-01-01

    wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.

  8. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  9. Next Generation Intelligent Wireless Infrastructure

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg

    2010-01-01

    Given the commercial success of wireless technologies that has already taken place over the last couple of decades, with a global mobile communication penetration beyond 3 billion subscribers as well as the enormous success of wireless data communication through IEEE 802.11x and Bluetooth, people...

  10. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  11. Ubiquitous Monitoring Solution for Wireless Sensor Networks with Push Notifications and End-to-End Connectivity

    Directory of Open Access Journals (Sweden)

    Luis M. L. Oliveira

    2014-01-01

    Full Text Available Wireless Sensor Networks (WSNs belongs to a new trend in technology in which tiny and resource constrained devices are wirelessly interconnected and are able to interact with the surrounding environment by collecting data such as temperature and humidity. Recently, due to the huge growth in the use of mobile devices with Internet connection, smartphones are becoming the center of future ubiquitous wireless networks. Interconnecting WSNs with smartphones and the Internet is a big challenge and new architectures are required due to the heterogeneity of these devices. Taking into account that people are using smartphones with Internet connection, there is a good opportunity to propose a new architecture for wireless sensors monitoring using push notifications and smartphones. Then, this paper proposes a ubiquitous approach for WSN monitoring based on a REST Web Service, a relational database, and an Android mobile application. Real-time data sensed by WSNs are sent directly to a smartphone or stored in a database and requested by the mobile application using a well-defined RESTful interface. A push notification system was created in order to alert mobile users when a sensor parameter overcomes a given threshold. The proposed architecture and mobile application were evaluated and validated using a laboratory WSN testbed and are ready for use.

  12. The Internet of Playful Things

    DEFF Research Database (Denmark)

    Wyeth, Peta; Brereton, Margot; Roe, Paul

    2015-01-01

    This one-day workshop brings together researchers and practitioners to share knowledge and practices on how people can connect and interact with the Internet of Things in a playful way. Open to participants with a diverse range of interests and expertise, and by exploring novel ways to playfully...... will be a road map to support the development of a Model of Playful Connectedness, focusing on how best to design and make playful networks of things, identifying the challenges that need to be addressed in order to do so....

  13. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Directory of Open Access Journals (Sweden)

    Qin Qin

    2015-01-01

    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  14. DEVELOPING A WIRELESS SENSOR NETWORD WITH RFID CAPABILITIES

    Directory of Open Access Journals (Sweden)

    Dan LICA

    2016-05-01

    Full Text Available The concept underlying the pervasive communications systems is Internet of Objects, defined as a global network of smart objects, resulting in "attachment" of communication functions, data acquisition, data processing objects we interact with daily. Internet of Objects will be based on 4th generation of Internet systems. In such systems, each intelligent networked device must offer its users a number of services, which constitute a development of the current model of Web services. Such services will result from aggregation of micro services offered by each pervasive device connected to the Internet. Aggregating these micro services requires that each node in the network has the opportunity to present / expose its capabilities (so-called "advertising" in a standard way for client applications to be integrated into complex services. Therefore there appears the need to introduce a coding scheme to identity the nodes in the network, enabling the identification of their capabilities. An alternative to implementing such a system of encoding / identifying characteristics of network nodes is active RFID technology. The aim of this chapter is to develop a method to ensure the convergence of wireless sensor networks with active RFID systems within a pervasive hybrid network based on the IEEE 802.15.4 standard, which satisfies the Internet of Objects network.

  15. Wireless Technology in K-12 Education

    Science.gov (United States)

    Walery, Darrell

    2004-01-01

    Many schools begin implementing wireless technology slowly by creating wireless "hotspots" on the fly. This is accomplished by putting a wireless access point on a cart along with a set of wireless laptop computers. A teacher can then wheel the cart anywhere in the school that has a network drop, plug the access point in and have an…

  16. Wireless Distributed Antenna MIMO

    DEFF Research Database (Denmark)

    2015-01-01

    The present disclosure relates to system applications of multicore optical fibers. One embodiment relates to a base transceiver station for a wireless telecommunication system comprising a plurality of antenna units arranged in a MIMO configuration and adapted for transmission and/or reception...... of radio-frequency signals, an optical transmitter in the form of an electro-optic conversion unit for each of said plurality of antenna units, each electro-optic conversion unit adapted for converting an RF signal into an optical signal, a plurality of a single core optical fibers for guiding the optical...

  17. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  18. Investigating wireless power transfer

    Science.gov (United States)

    St John, Stuart A.

    2017-09-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.

  19. Deployable wireless Fresnel lens

    Science.gov (United States)

    Kennedy, Timothy F. (Inventor); Fink, Patrick W. (Inventor); Chu, Andrew W. (Inventor); Lin, Gregory Y. (Inventor)

    2013-01-01

    Apparatus and methods for enhancing the gain of a wireless signal are provided. In at least one specific embodiment, the apparatus can include a screen comprised of one or more electrically conductive regions for reflecting electromagnetic radiation and one or more non-conductive regions for permitting electromagnetic radiation therethrough. The one or more electrically conductive regions can be disposed adjacent to at least one of the one or more non-conductive regions. The apparatus can also include a support member disposed about at least a portion of the screen. The screen can be capable of collapsing by twisting the support member in opposite screw senses to form interleaved concentric sections.

  20. Wireless Headset Communication System

    Science.gov (United States)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  1. Wireless passive radiation sensor

    Science.gov (United States)

    Pfeifer, Kent B; Rumpf, Arthur N; Yelton, William G; Limmer, Steven J

    2013-12-03

    A novel measurement technique is employed using surface acoustic wave (SAW) devices, passive RF, and radiation-sensitive films to provide a wireless passive radiation sensor that requires no batteries, outside wiring, or regular maintenance. The sensor is small (<1 cm.sup.2), physically robust, and will operate unattended for decades. In addition, the sensor can be insensitive to measurement position and read distance due to a novel self-referencing technique eliminating the need to measure absolute responses that are dependent on RF transmitter location and power.

  2. Wireless installation standard

    International Nuclear Information System (INIS)

    Lim, Hwang Bin

    2007-12-01

    This is divided six parts which are radio regulation law on securing of radio resource, use of radio resource, protection of radio resource, radio regulation enforcement ordinance with securing, distribution and assignment of radio regulation, radio regulation enforcement regulation on utility of radio resource and technical qualification examination, a wireless installation regulation of technique standard and safety facility standard, radio regulation such as certification regulation of information communicative machines and regulation of radio station on compliance of signal security, radio equipment in radio station, standard frequency station and emergency communication.

  3. Wireless Cellular Mobile Communications

    Directory of Open Access Journals (Sweden)

    V. Zalud

    2002-12-01

    Full Text Available In this article is briefly reviewed the history of wireless cellularmobile communications, examined the progress in current secondgeneration (2G cellular standards and discussed their migration to thethird generation (3G. The European 2G cellular standard GSM and itsevolution phases GPRS and EDGE are described somewhat in detail. Thethird generation standard UMTS taking up on GSM/GPRS core network andequipped with a new advanced access network on the basis of codedivision multiple access (CDMA is investigated too. A sketch of theperspective of mobile communication beyond 3G concludes this article.

  4. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  5. Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach

    Science.gov (United States)

    Rizos, G. E.; Vasiliadis, D. C.

    2007-12-01

    We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.

  6. Wireless Zigbee strain gage sensor system for structural health monitoring

    Science.gov (United States)

    Ide, Hiroshi; Abdi, Frank; Miraj, Rashid; Dang, Chau; Takahashi, Tatsuya; Sauer, Bruce

    2009-05-01

    A compact cell phone size radio frequency (ZigBee) wireless strain measurement sensor system to measure the structural strain deformation was developed. The developed system provides an accurate strain measurement data stream to the Internet for further Diagnostic and Prognostic (DPS) correlation. Existing methods of structural measurement by strain sensors (gauges) do not completely satisfy problems posed by continuous structural health monitoring. The need for efficient health monitoring methods with real-time requirements to bidirectional data flow from sensors and to a commanding device is becoming critical for keeping our daily life safety. The use of full-field strain measurement techniques could reduce costly experimental programs through better understanding of material behavior. Wireless sensor-network technology is a monitoring method that is estimated to grow rapidly providing potential for cost savings over traditional wired sensors. The many of currently available wireless monitoring methods have: the proactive and constant data rate character of the data streams rather than traditional reactive, event-driven data delivery; mostly static node placement on structures with limited number of nodes. Alpha STAR Electronics' wireless sensor network system, ASWN, addresses some of these deficiencies, making the system easier to operate. The ASWN strain measurement system utilizes off-the-shelf sensors, namely strain gauges, with an analog-to-digital converter/amplifier and ZigBee radio chips to keep cost lower. Strain data is captured by the sensor, converted to digital form and delivered to the ZigBee radio chip, which in turn broadcasts the information using wireless protocols to a Personal Data Assistant (PDA) or Laptop/Desktop computers. From here, data is forwarded to remote computers for higher-level analysis and feedback using traditional cellular and satellite communication or the Ethernet infrastructure. This system offers a compact size, lower cost

  7. Mapping of wine industry

    Directory of Open Access Journals (Sweden)

    Віліна Пересадько

    2016-10-01

    Full Text Available Having reviewed a variety of approaches to understanding the essence of wine industry, having studied the modern ideas about the future of wine industry, having analyzed more than 50 maps from the Internet we have set the trends and special features of wine industry mapping in the world, such as: - the vast majority of maps displays the development of the industry at regional or national level, whereas there are practically no world maps; - wine-growing regions are represented on maps very unevenly; - all existing maps of the industry could be classified as analytical ascertaining inventory type; - the dominant ways of cartographic representation are area method and qualitative background method, sign method and collation maps are rarely used; - basically all the Internet maps have low quality as they are scanned images with poor resolution; - the special feature of maps published lately is lack of geographical basis (except for state borders and coastline. We created wine production and consumption world map «Wine Industry» in the scale of 1:60 000 000 with simple geographical basis (state names, state borders, major rivers, coastline. It was concluded that from the methodological point of view it is incorrect not to show geographical basis on maps of wine industry. Analysis of this map allowed us to identify areas of traditional wine-making, potential wine-making areas and countries which claim to be the world leaders in the field of wine production. We found disbalans between wine production and wine consumption - increasing wine production in South America, China and the United States and increasing wine consumption (mainly due to the import products in countries where the grape is not the primary agricultural product.

  8. Project SIMORAC: a wireless system for radiation monitoring in emergencies

    International Nuclear Information System (INIS)

    Gomez, D.; Serrano, J. L.; Cabrera, E.; Barbaran, J.; Llopis, L.; Diaz, M.

    2013-01-01

    The SIMORAC project includes a new system for Radiological monitoring using wireless sensor networks (RSIs), without infrastructure planning in emergency situations for a rapidly deployable by air or land, with the aim of providing a tool emergency teams capable of offering a real time x-ray map within the radius of action of an accident. Communication of quality at a great distance, resistance to weather, long autonomy and possibility of aerial deployment are some of the features of SIMORAC.

  9. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  10. Application of an automated wireless structural monitoring system for long-span suspension bridges

    International Nuclear Information System (INIS)

    Kurata, M.; Lynch, J. P.; Linden, G. W. van der; Hipley, P.; Sheng, L.-H.

    2011-01-01

    This paper describes an automated wireless structural monitoring system installed at the New Carquinez Bridge (NCB). The designed system utilizes a dense network of wireless sensors installed in the bridge but remotely controlled by a hierarchically designed cyber-environment. The early efforts have included performance verification of a dense network of wireless sensors installed on the bridge and the establishment of a cellular gateway to the system for remote access from the internet. Acceleration of the main bridge span was the primary focus of the initial field deployment of the wireless monitoring system. An additional focus of the study is on ensuring wireless sensors can survive for long periods without human intervention. Toward this end, the life-expectancy of the wireless sensors has been enhanced by embedding efficient power management schemes in the sensors while integrating solar panels for power harvesting. The dynamic characteristics of the NCB under daily traffic and wind loads were extracted from the vibration response of the bridge deck and towers. These results have been compared to a high-fidelity finite element model of the bridge.

  11. Application of AN Automated Wireless Structural Monitoring System for Long-Span Suspension Bridges

    Science.gov (United States)

    Kurata, M.; Lynch, J. P.; van der Linden, G. W.; Hipley, P.; Sheng, L.-H.

    2011-06-01

    This paper describes an automated wireless structural monitoring system installed at the New Carquinez Bridge (NCB). The designed system utilizes a dense network of wireless sensors installed in the bridge but remotely controlled by a hierarchically designed cyber-environment. The early efforts have included performance verification of a dense network of wireless sensors installed on the bridge and the establishment of a cellular gateway to the system for remote access from the internet. Acceleration of the main bridge span was the primary focus of the initial field deployment of the wireless monitoring system. An additional focus of the study is on ensuring wireless sensors can survive for long periods without human intervention. Toward this end, the life-expectancy of the wireless sensors has been enhanced by embedding efficient power management schemes in the sensors while integrating solar panels for power harvesting. The dynamic characteristics of the NCB under daily traffic and wind loads were extracted from the vibration response of the bridge deck and towers. These results have been compared to a high-fidelity finite element model of the bridge.

  12. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  13. Household wireless electroencephalogram hat

    Science.gov (United States)

    Szu, Harold; Hsu, Charles; Moon, Gyu; Yamakawa, Takeshi; Tran, Binh

    2012-06-01

    We applied Compressive Sensing to design an affordable, convenient Brain Machine Interface (BMI) measuring the high spatial density, and real-time process of Electroencephalogram (EEG) brainwaves by a Smartphone. It is useful for therapeutic and mental health monitoring, learning disability biofeedback, handicap interfaces, and war gaming. Its spec is adequate for a biomedical laboratory, without the cables hanging over the head and tethered to a fixed computer terminal. Our improved the intrinsic signal to noise ratio (SNR) by using the non-uniform placement of the measuring electrodes to create the proximity of measurement to the source effect. We computing a spatiotemporal average the larger magnitude of EEG data centers in 0.3 second taking on tethered laboratory data, using fuzzy logic, and computing the inside brainwave sources, by Independent Component Analysis (ICA). Consequently, we can overlay them together by non-uniform electrode distribution enhancing the signal noise ratio and therefore the degree of sparseness by threshold. We overcame the conflicting requirements between a high spatial electrode density and precise temporal resolution (beyond Event Related Potential (ERP) P300 brainwave at 0.3 sec), and Smartphone wireless bottleneck of spatiotemporal throughput rate. Our main contribution in this paper is the quality and the speed of iterative compressed image recovery algorithm based on a Block Sparse Code (Baranuick et al, IEEE/IT 2008). As a result, we achieved real-time wireless dynamic measurement of EEG brainwaves, matching well with traditionally tethered high density EEG.

  14. Challenges in Second-Generation Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Pescapé Antonio

    2008-01-01

    Full Text Available Wireless mesh networks have the potential to provide ubiquitous high-speed Internet access at low costs. The good news is that initial deployments of WiFi meshes show the feasibility of providing ubiquitous Internet connectivity. However, their performance is far below the necessary and achievable limit. Moreover, users' subscription in the existing meshes is dismal even though the technical challenges to get connectivity are low. This paper provides an overview of the current status of mesh networks' deployment, and highlights the technical, economical, and social challenges that need to be addressed in the next years. As a proof-of-principle study, we discuss the above-mentioned challenges with reference to three real networks: (i MagNets, an operator-driven planned two-tier mesh network; (ii Berlin Freifunk network as a pure community-driven single-tier network; (iii Weimar Freifunk network, also a community-driven but two-tier network.

  15. Converged Wireless Networking and Optimization for Next Generation Services

    Directory of Open Access Journals (Sweden)

    J. Rodriguez

    2010-01-01

    Full Text Available The Next Generation Network (NGN vision is tending towards the convergence of internet and mobile services providing the impetus for new market opportunities in combining the appealing services of internet with the roaming capability of mobile networks. However, this convergence does not go far enough, and with the emergence of new coexistence scenarios, there is a clear need to evolve the current architecture to provide cost-effective end-to-end communication. The LOOP project, a EUREKA-CELTIC driven initiative, is one piece in the jigsaw by helping European industry to sustain a leading role in telecommunications and manufacturing of high-value products and machinery by delivering pioneering converged wireless networking solutions that can be successfully demonstrated. This paper provides an overview of the LOOP project and the key achievements that have been tunneled into first prototypes for showcasing next generation services for operators and process manufacturers.

  16. Microwave materials for wireless applications

    CERN Document Server

    Cruickshank, David B

    2011-01-01

    This practical resource offers you an in-depth, up-to-date understanding of the use of microwave magnetic materials for cutting-edge wireless applications. The book discusses device applications used in wireless infrastructure base stations, point-to-point radio links, and a range of more specialized microwave systems. You find detailed discussions on the attributes of each family of magnetic materials with respect to specific wireless applications. Moreover, the book addresses two of the hottest topics in the field today - insertion loss and intermodulation. This comprehensive reference also

  17. Structural processing for wireless communications

    CERN Document Server

    Lu, Jianhua; Ge, Ning

    2015-01-01

    This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.

  18. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  19. Asia-Pacific POPIN workshop on Internet.

    Science.gov (United States)

    1996-01-01

    This brief article announces the accomplishments of the ESCAP Population Division of the Department of Economic and Social Information and Policy Analysis (DESIPA) in conjunction with the Asia-Pacific POPIN Internet (Information Superhighway) Training Workshop in popularizing useful new computer information technologies. A successful workshop was held in Bangkok in November 1996 for 18 people from 8 countries in the Asian and Pacific region, many of whom were from population information centers. Participants were taught some techniques for disseminating population data and information through use of the Internet computer facility. Participants learned 1) how to use Windows software in the ESCAP local area network (LAN), 2) about concepts such as HTML (hypertext mark-up language), and 3) detailed information about computer language. Computer practices involved "surfing the Net (Internet)" and linking with the global POPIN site on the Internet. Participants learned about computer programs for information handling and learned how to prepare documents using HTML, how to mount information on the World Wide Web (WWW) of the Internet, how to convert existing documents into "HTML-style" files, and how to scan graphics, such as logos, photographs, and maps, for visual display on the Internet. The Workshop and the three training modules was funded by the UN Population Fund (UNFPA). The POPIN Coordinator was pleased that competency was accomplished in such a short period of time.

  20. Unit and ubiquitous Internet of Things

    CERN Document Server

    Ning, Huansheng

    2013-01-01

    Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts. Answering fundamental questions about IoT architectures and models, Unit and Ubiquitous Internet of Things introduces essential IoT concepts from the perspectives of mapping and interaction between the physical world and the cyber world. It addresses key issues such as strategy and education, particularly around unit and ubiquitous IoT technologies. Supplying a new pers

  1. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  2. Wireless Power Transfer and Data Collection in Wireless Sensor Networks

    OpenAIRE

    Li, Kai; Ni, Wei; Duan, Lingjie; Abolhasan, Mehran; Niu, Jianwei

    2017-01-01

    In a rechargeable wireless sensor network, the data packets are generated by sensor nodes at a specific data rate, and transmitted to a base station. Moreover, the base station transfers power to the nodes by using Wireless Power Transfer (WPT) to extend their battery life. However, inadequately scheduling WPT and data collection causes some of the nodes to drain their battery and have their data buffer overflow, while the other nodes waste their harvested energy, which is more than they need...

  3. Security in the internet; Sicherheitsaspekte im Internet

    Energy Technology Data Exchange (ETDEWEB)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P. [Witten-Herdecke Univ., Witten (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie

    2000-04-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [German] Ziele der Studie und Analyse: Es sollten die Fragen beantwortet werden, ob es moeglich ist, das Internet als sicheres Uebermittlungsmedium fuer Telemedizin zu nutzen und welche Sicherheitsrisiken bestehen. Dazu wurden die gaengigen Sicherheitsmethoden analysiert. Telemedizin im Internet ist mit Sicherheitsrisiken behaftet, die durch die Oeffnung eines Intranets mit der Moeglichkeit zur unberechtigten Manipulation von aussen bedingt sind. Schlussfolgerung: Diese Sicherheitsrisiken koennen durch eine Firewall weitgehend unterbunden werden. Chipkarten wie die Health professional card ermoeglichen eine hohe Sicherheit bei digitaler Signatur und sicherer Authentifikation der Sender und Empfaenger von Daten im Internet. Auch Standards wie Pretty good privacy sind inzwischen fuer sichere e-mails einfach einzusetzen. Wichtige Voraussetzung fuer die Reduktion von Sicherheitsrisiken ist unter Beruecksichtigung der gesetzlichen Vorgaben die exakte Planung aller Aktivitaeten im Internet, bei denen medizinische Patientendaten versandt werden sollen, in einem Team aus Aerzten und Informatikern. (orig.)

  4. Internet marketing global features

    Directory of Open Access Journals (Sweden)

    Rakita Branko

    2005-01-01

    Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.

  5. Ultrasonic wireless health monitoring

    Science.gov (United States)

    Petit, Lionel; Lefeuvre, Elie; Guyomar, Daniel; Richard, Claude; Guy, Philippe; Yuse, Kaori; Monnier, Thomas

    2006-03-01

    The integration of autonomous wireless elements in health monitoring network increases the reliability by suppressing power supplies and data transmission wiring. Micro-power piezoelectric generators are an attractive alternative to primary batteries which are limited by a finite amount of energy, a limited capacity retention and a short shelf life (few years). Our goal is to implement such an energy harvesting system for powering a single AWT (Autonomous Wireless Transmitter) using our SSH (Synchronized Switch Harvesting) method. Based on a non linear process of the piezoelement voltage, this SSH method optimizes the energy extraction from the mechanical vibrations. This AWT has two main functions : The generation of an identifier code by RF transmission to the central receiver and the Lamb wave generation for the health monitoring of the host structure. A damage index is derived from the variation between the transmitted wave spectrum and a reference spectrum. The same piezoelements are used for the energy harvesting function and the Lamb wave generation, thus reducing mass and cost. A micro-controller drives the energy balance and synchronizes the functions. Such an autonomous transmitter has been evaluated on a 300x50x2 mm 3 composite cantilever beam. Four 33x11x0.3 mm 3 piezoelements are used for the energy harvesting and for the wave lamb generation. A piezoelectric sensor is placed at the free end of the beam to track the transmitted Lamb wave. In this configuration, the needed energy for the RF emission is 0.1 mJ for a 1 byte-information and the Lamb wave emission requires less than 0.1mJ. The AWT can harvested an energy quantity of approximately 20 mJ (for a 1.5 Mpa lateral stress) with a 470 μF storage capacitor. This corresponds to a power density near to 6mW/cm 3. The experimental AWT energy abilities are presented and the damage detection process is discussed. Finally, some envisaged solutions are introduced for the implementation of the required data

  6. Internet Geo-Location

    Science.gov (United States)

    2017-12-01

    INTERNET GEO-LOCATION DUKE UNIVERSITY DECEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR...REPORT TYPE FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) MAY 2014 – MAY 2017 4. TITLE AND SUBTITLE INTERNET GEO-LOCATION 5a. CONTRACT...of SpeedTest servers that are used by end users to measure the speed of their Internet connection. The servers log the IP address and the location

  7. INTERNET AND SENIORS

    OpenAIRE

    Rain, Tomáš; Ivana Švarcová

    2010-01-01

    The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize...

  8. International Mathematical Internet Olympiad

    Directory of Open Access Journals (Sweden)

    Alexander Domoshnitsky

    2012-10-01

    Full Text Available Modern Internet technologies open new possibilities in wide spectrum of traditional methods used in mathematical education. One of the areas, where these technologies can be efficiently used, is an organization of mathematical competitions. Contestants can stay at their schools or universities and try to solve as many mathematical problems as possible and then submit their solutions through Internet. Simple Internet technologies supply audio and video connection between participants and organizers.

  9. Everyone’s Internet

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    After more than 20 years,the Internet in China has become a big success.The country has the world’s largest Internet population that topped 420 million at the end of June.In the first six months of this year,China’s Internet market reached 74.3 billion yuan($10.9 billion),the equivalent of 2009’s total.Local businesses have risen to

  10. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  11. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  12. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  13. Internet Addiction in Adolescents

    OpenAIRE

    Rębisz Sławomir; Sikora Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known...

  14. Health issues in adolescents' Internet use - benefits and risks.

    Science.gov (United States)

    Hardoff, D

    2013-09-01

    The Internet has turned during the past decade into a major information resource in various domains of life and a communication venue among adolescents who seek health information via the net. The increasing availability of computers in homes, as well as wireless Internet access, means that adolescents today can go online anywhere, at any time. The media are not the leading cause of any major health problem, but they do contribute significantly to a variety of adolescent health problems, including aggressive behavior, sexual activity, drug use, obesity, sleep disorders, eating disorders, depression, suicide and self harm. This paper focuses on 3 major health issues in adolescents' Internet use: Body image and eating behaviors; sexuality and reproductive health behaviors; and self harm and suicidal behavior. This paper also demonstrates Internet venues where reliable health information is provided to young people by health professionals. Health professionals need to recognize the hazards of adolescents Internet use, and to address potential Internet abuse when encountering adolescents in clinical settings.

  15. Wireless Integrated Microelectronic Vacuum Sensor System

    Science.gov (United States)

    Krug, Eric; Philpot, Brian; Trott, Aaron; Lawrence, Shaun

    2013-01-01

    -gauge measurements automatically and wirelessly, in near-real time - using a low-maintenance, lowpower sensor mesh network. The WIMVSS operates by using a self-configuring mesh network of wireless sensor units. Mesh networking is a type of networking where each sensor or node can capture and disseminate its own data, but also serve as a relay to receive and transmit data from other sensors. Each sensor node can synchronize with adjacent sensors, and propagate data from one sensor to the next, until the destination is reached. In this case, the destination is a Network Interface Unit (NIU). The WIMVSS sensors are mounted on the existing vacuum gauges. Information gathered by the sensors is sent to the NIU. Because of the mesh networking, if a sensor cannot directly send the data to the NIU, it can be propagated through the network of sensors. The NIU requires antenna access to the sensor units, AC power, and an Ethernet connection. The NIU bridges the sensor network to a WIMVSS server via an Ethernet connection. The server is configured with a database, a Web server, and proprietary interface software that makes it possible for the vacuum measurements from vacuum jacketed fluid lines to be saved, retrieved, and then displayed from any Web-enabled PC that has access to the Internet. Authorized users can then simply access the data from any PC with Internet connection. Commands can also be sent directly from the Web interface for control and maintenance of the sensor network. The technology enabled by the WIMVSS decreases labor required for gathering vacuum measurements, increases access to vacuum data by making it available on any computer with access to the Internet, increases the frequency with which data points can be acquired for evaluating the system, and decreases the recurring cost of the sensors by using off-the-shelf components and integrating these with heritage vacuum gauges.

  16. Wireless sensor network topology control

    OpenAIRE

    Zuk, Olexandr; Romanjuk, Valeriy; Sova, Oleg

    2010-01-01

    Topology control process for the wireless sensor network is considered. In this article the use of rule base for making decision on the search of optimum network topology is offered for the realization of different aims of network management.

  17. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  18. Wireless Damage Location Sensing System

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant Douglas (Inventor)

    2012-01-01

    A wireless damage location sensing system uses a geometric-patterned wireless sensor that resonates in the presence of a time-varying magnetic field to generate a harmonic response that will experience a change when the sensor experiences a change in its geometric pattern. The sensing system also includes a magnetic field response recorder for wirelessly transmitting the time-varying magnetic field and for wirelessly detecting the harmonic response. The sensing system compares the actual harmonic response to a plurality of predetermined harmonic responses. Each predetermined harmonic response is associated with a severing of the sensor at a corresponding known location thereof so that a match between the actual harmonic response and one of the predetermined harmonic responses defines the known location of the severing that is associated therewith.

  19. Wireless sensor network adaptive cooling

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, T. [SynapSense Corp., Folsom, CA (United States)

    2009-07-01

    Options for reducing data centre cooling energy requirements and their cost savings were discussed with particular reference to a wireless control solution developed by SynapSense Corporation. The wireless sensor network reduces cooling energy use at data centres by providing improved air flow management through the installation of cold aisle containment. The use of this low cost, non-invasive wireless sensor network has reduced the cooling energy use in a data center at BC Hydro by 30 per cent. The system also reduced the server and storage fan energy by 3 per cent by maintaining inlet air temperature below ASHRAE recommended operating range. The distribution of low power, low cost wireless sensors has enabled visualization tools that are changing the way that data centres are managed. The annual savings have been estimated at 4,560,000 kWh and the annual carbon dioxide abatement is approximately 1,400 metric tons. tabs., figs.

  20. Cooperative Diversity in Wireless Networks

    Directory of Open Access Journals (Sweden)

    A. Mahmood

    2010-01-01

    Full Text Available Transmit Diversity is an effective methodology for improving the quality and reliability of a wireless network by reducingthe effects of fading. As majority of the wireless devices (i.e. mobile handsets, etc are limited to only one antenna, especiallydue to hardware constraints, size and cost factors; cooperative communication can be utilized in order to generatetransmit diversity [1]. This enables single antenna wireless devices to share their antennas during transmission in such amanner that creates a virtual MIMO (multiple-input and multiple-output system [2] [3]. In this paper, we will analyze therecent developments and trends in this promising area of wireless Ad hoc networks. The article will also discuss variousmain cooperative signaling methods and will also observe their performance.

  1. Mapping out Map Libraries

    Directory of Open Access Journals (Sweden)

    Ferjan Ormeling

    2008-09-01

    Full Text Available Discussing the requirements for map data quality, map users and their library/archives environment, the paper focuses on the metadata the user would need for a correct and efficient interpretation of the map data. For such a correct interpretation, knowledge of the rules and guidelines according to which the topographers/cartographers work (such as the kind of data categories to be collected, and the degree to which these rules and guidelines were indeed followed are essential. This is not only valid for the old maps stored in our libraries and archives, but perhaps even more so for the new digital files as the format in which we now have to access our geospatial data. As this would be too much to ask from map librarians/curators, some sort of web 2.0 environment is sought where comments about data quality, completeness and up-to-dateness from knowledgeable map users regarding the specific maps or map series studied can be collected and tagged to scanned versions of these maps on the web. In order not to be subject to the same disadvantages as Wikipedia, where the ‘communis opinio’ rather than scholarship, seems to be decisive, some checking by map curators of this tagged map use information would still be needed. Cooperation between map curators and the International Cartographic Association ( ICA map and spatial data use commission to this end is suggested.

  2. INTERNET AND SENIORS

    Directory of Open Access Journals (Sweden)

    Rain, Tomáš

    2010-12-01

    Full Text Available The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize ways of using internet for helping seniors to better life. The authors describe terms e-senior. The authors suggest methodological approach to exercising user’s skills.

  3. Internet dalam Konteks Perpustakaan

    Directory of Open Access Journals (Sweden)

    Roni Rodhin

    2017-02-01

    Full Text Available The presence of internet would bring a variaty of effects in all areas of human life. The impac of bias could be both a positive and negative. On the other side for libraries it would bring a disparate impact, engaged  in the service and information. In the contect of libraries, the internet is very helpfull to disseminate information that is available in it. It means internet becomes a partner in the dissemination of information. Therefore, the existence of internet is very important for the library.

  4. Modeling the Internet.

    Energy Technology Data Exchange (ETDEWEB)

    Kelic, Andjelka; Mitchell, Michael David; Shirah, Donald N.

    2017-12-01

    The National Infrastructure Simulations and Analysis Center (NISAC) has developed a nationwide model of the Internet to study the potential impact of the loss of physical facilities on the network and on other infrastructures that depend on the Internet for services. The model looks at the Internet from the perspective of Internet Service Providers (ISPs) and their connectivity and can be used to determine how the network connectivity could be modified to assist in mitigating an event. In addition the model could be used to explore how portions of the network could be made more resilient to disruptive events.

  5. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  6. Wireless transmission of power

    International Nuclear Information System (INIS)

    Grotz, T.

    1991-01-01

    This paper reports that it has been proven by researchers that electrical energy can be propagated around the world between the surface of the Earth and the ionosphere at extremely low frequencies in what is known as the Schumann Cavity. Experiments to data have shown that electromagnetic waves with frequencies in the range of 8 Hz, the fundamental Schumann Resonance frequency, propagate with litter attenuation around the planet within the Schumann Cavity. It is the intent of this research to determine if the Schumann Cavity can be resonated, if the power that is delivered to the cavity propagated with very low losses, and if power can be extracted at other locations within the cavity. Experimental data collected and calculations made in recent years support the hypothesis that wireless power transmission is a viable and practical alternative to the present systems of power transmission

  7. Wireless power transfer system

    Science.gov (United States)

    Wu, Hunter; Sealy, Kylee; Gilchrist, Aaron

    2016-02-23

    A system includes a first stage of an inductive power transfer system with an LCL load resonant converter with a switching section, an LCL tuning circuit, and a primary receiver pad. The IPT system includes a second stage with a secondary receiver pad, a secondary resonant circuit, a secondary rectification circuit, and a secondary decoupling converter. The secondary receiver pad connects to the secondary resonant circuit. The secondary resonant circuit connects to the secondary rectification circuit. The secondary rectification circuit connects to the secondary decoupling converter. The second stage connects to a load. The load includes an energy storage element. The second stage and load are located on a vehicle and the first stage is located at a fixed location. The primary receiver pad wirelessly transfers power to the secondary receiver pad across a gap when the vehicle positions the secondary receiver pad with respect to the primary receiver pad.

  8. QoS Provisioning Techniques for Future Fiber-Wireless (FiWi Access Networks

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2010-04-01

    Full Text Available A plethora of enabling optical and wireless access-metro network technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi networks. Hybrid FiWi networks aim at providing wired and wireless quad-play services over the same infrastructure simultaneously and hold great promise to mitigate the digital divide and change the way we live and work by replacing commuting with teleworking. After overviewing enabling optical and wireless network technologies and their QoS provisioning techniques, we elaborate on enabling radio-over-fiber (RoF and radio-and-fiber (R&F technologies. We describe and investigate new QoS provisioning techniques for future FiWi networks, ranging from traffic class mapping, scheduling, and resource management to advanced aggregation techniques, congestion control, and layer-2 path selection algorithms.

  9. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  10. Chaos-based wireless communication resisting multipath effects

    Science.gov (United States)

    Yao, Jun-Liang; Li, Chen; Ren, Hai-Peng; Grebogi, Celso

    2017-09-01

    In additive white Gaussian noise channel, chaos has been shown to be the optimal coherent communication waveform in the sense of using a very simple matched filter to maximize the signal-to-noise ratio. Recently, Lyapunov exponent spectrum of the chaotic signals after being transmitted through a wireless channel has been shown to be unaltered, paving the way for wireless communication using chaos. In wireless communication systems, inter-symbol interference caused by multipath propagation is one of the main obstacles to achieve high bit transmission rate and low bit-error rate (BER). How to resist the multipath effect is a fundamental problem in a chaos-based wireless communication system (CWCS). In this paper, a CWCS is built to transmit chaotic signals generated by a hybrid dynamical system and then to filter the received signals by using the corresponding matched filter to decrease the noise effect and to detect the binary information. We find that the multipath effect can be effectively resisted by regrouping the return map of the received signal and by setting the corresponding threshold based on the available information. We show that the optimal threshold is a function of the channel parameters and of the information symbols. Practically, the channel parameters are time-variant, and the future information symbols are unavailable. In this case, a suboptimal threshold is proposed, and the BER using the suboptimal threshold is derived analytically. Simulation results show that the CWCS achieves a remarkable competitive performance even under inaccurate channel parameters.

  11. Analysis of Wireless Traffic Data through Machine Learning

    Directory of Open Access Journals (Sweden)

    Muhammad Ahsan Latif

    2017-06-01

    Full Text Available The paper presents an analytical study on a wireless traffic dataset carried out under the different approaches of machine learning including the backpropagation feedforward neural network, the time-series NARX network, the self-organizing map and the principal component analyses. These approaches are well-known for their usefulness in the modeling and in transforming a high dimensional data into a more convenient form to make the understanding and the analysis of the trends, the patterns within the data easy. We witness to an exponential rise in the volume of the wireless traffic data in the recent decade and it is increasingly becoming a problem for the service providers to ensure the QoS for the end-users given the limited resources as the demand for a larger bandwidth almost always exist. The inception of the next generation wireless networks (3G/4G somehow provide such services to meet the amplified capacity, higher data rates, seamless mobile connectivity as well as the dynamic ability of reconfiguration and the self-organization. Nevertheless, having an intelligent base-station able to perceive the demand well before the actual need may assist in the management of the traffic data. The outcome of the analysis conducted in this paper may be considered in designing an efficient and an intelligent base-station for better resource management for wireless network traffic.

  12. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  13. Wireless data link for FBTR

    International Nuclear Information System (INIS)

    Sundararajan, M.K.; Prabhakara Rao, G.; Ilango Sambasivan, S.; Swaminathan, P.; Ramakrishna, P.V.

    2004-01-01

    This paper deals with the design and development of a wireless data link for transmission of block pile signals at the Fast Breeder Test Reactor (FBTR) of Indira Gandhi Center for Atomic Research (IGCAR). This link is to establish wireless connectivity, typically at RS232C rates, over distances of the order of 50 m, and is expected to operate under electrically hostile conditions. (author)

  14. Wireless Sensor Network Safety Study

    OpenAIRE

    M.Shankar; Dr.M.Sridar; Dr.M.Rajani

    2012-01-01

    Few security mechanisms in wireless sensor networks (WSNs) have been implemented, and even fewer have been applied in real deployments. The limited resources of each sensor node makes security in WSNs hard, as the tradeoff between security and practicality must be carefully considered. These complex systems include in their design different types of information and communication technology systems, such as wireless (mesh) sensor networks, to carry out control processes in real time. This fact...

  15. Wireless data signal transmission system

    DEFF Research Database (Denmark)

    2014-01-01

    The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver.......The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver....

  16. Wireless Smart Systems Beyond RFID

    OpenAIRE

    Vermesan, Ovidiu

    2008-01-01

    It is expected that in the coming 20 years the IoT will be pervasive, and ubiquitous: smart devices, embedded in smart materials, will work in synergy to improve the quality of our lives. In this context wireless smart systems will play an essential role that is far beyond the ID information that is part of RFID devices today. Wireless Smart Systems Beyond RFID

  17. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  18. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  19. Wireless sensor network

    Science.gov (United States)

    Perotti, Jose M.; Lucena, Angel R.; Mullenix, Pamela A.; Mata, Carlos T.

    2006-05-01

    Current and future requirements of aerospace sensors and transducers demand the design and development of a new family of sensing devices, with emphasis on reduced weight, power consumption, and physical size. This new generation of sensors and transducers will possess a certain degree of intelligence in order to provide the end user with critical data in a more efficient manner. Communication between networks of traditional or next-generation sensors can be accomplished by a Wireless Sensor Network (WSN) developed by NASA's Instrumentation Branch and ASRC Aerospace Corporation at Kennedy Space Center (KSC), consisting of at least one central station and several remote stations and their associated software. The central station is application-dependent and can be implemented on different computer hardware, including industrial, handheld, or PC-104 single-board computers, on a variety of operating systems: embedded Windows, Linux, VxWorks, etc. The central stations and remote stations share a similar radio frequency (RF) core module hardware that is modular in design. The main components of the remote stations are an RF core module, a sensor interface module, batteries, and a power management module. These modules are stackable, and a common bus provides the flexibility to stack other modules for additional memory, increased processing, etc. WSN can automatically reconfigure to an alternate frequency if interference is encountered during operation. In addition, the base station will autonomously search for a remote station that was perceived to be lost, using relay stations and alternate frequencies. Several wireless remote-station types were developed and tested in the laboratory to support different sensing technologies, such as resistive temperature devices, silicon diodes, strain gauges, pressure transducers, and hydrogen leak detectors.

  20. Evolution of Wireless Sensor Networks for Industrial Control

    Directory of Open Access Journals (Sweden)

    Arthur Low

    2013-05-01

    Full Text Available Technologies evolve in a process of gradual scientific change, but the commercial application of technologies is discontinuous. Managers interested in technology evolution can integrate these contrasting ideas using a powerful theoretical framework, based on the concept of punctuated equilibrium from evolutionary biology. The framework, which enables the differentiation of the technical evolution of a technology from its market application, is used in this article to compare the two standards for wireless sensor networks (WSN for industrial instrumentation and control: WirelessHART and ISA100.11a. The two WSN standards are the product of two different market contexts, which have selected different minimum viable technologies for evolution in their respective niches. Network security issues present some important selection criteria. Both WSN standards implement security countermeasures against localized wireless network attacks based on the application of the AES encryption standard, but some specific security threats – some local, others remotely launched – are only well-defended by the adoption of public-key cryptographic (PKC protocols, which only ISA100.11a supports. This article concludes that the mainstream market potential of the Internet has influenced the evolution of ISA100.11a and will continue to demand that each WSN standard evolve in ways that are difficult to predict.

  1. Wireless communication of real-time ultrasound data and control

    Science.gov (United States)

    Tobias, Richard J.

    2015-03-01

    The Internet of Things (IoT) is expected to grow to 26 billion connected devices by 2020, plus the PC, smart phone, and tablet segment that includes mobile Health (mHealth) connected devices is projected to account for another 7.3 billion units by 2020. This paper explores some of the real-time constraints on the data-flow and control of a wireless connected ultrasound machine. The paper will define an ultrasound server and the capabilities necessary for real-time use of the device. The concept of an ultrasound server wirelessly (or over any network) connected to multiple lightweight clients on devices like an iPad, iPhone, or Android-based tablet, smartphone and other network-attached displays (i.e., Google Glass) is explored. Latency in the ultrasound data stream is one of the key areas to measure and to focus on keeping as small as possible (20 frames-per-second on a properly configured wireless network. The ultrasound server needs to be designed to accept multiple ultrasound data clients and multiple control clients. A description of the server and some of its key features will be described.

  2. Ubiquitous wireless ECG recording: a powerful tool physicians should embrace.

    Science.gov (United States)

    Saxon, Leslie A

    2013-04-01

    The use of smart phones has increased dramatically and there are nearly a billion users on 3G and 4G networks worldwide. Nearly 60% of the U.S. population uses smart phones to access the internet, and smart phone sales now surpass those of desktop and laptop computers. The speed of wireless communication technology on 3G and 4G networks and the widespread adoption and use of iOS equipped smart phones (Apple Inc., Cupertino, CA, USA) provide infrastructure for the transmission of wireless biomedical data, including ECG data. These technologies provide an unprecedented opportunity for physicians to continually access data that can be used to detect issues before symptoms occur or to have definitive data when symptoms are present. The technology also greatly empowers and enables the possibility for unprecedented patient participation in their own medical education and health status as well as that of their social network. As patient advocates, physicians and particularly cardiac electrophysiologists should embrace the future and promise of wireless ECG recording, a technology solution that can truly scale across the global population. © 2013 Wiley Periodicals, Inc.

  3. A wireless smart sensor network for automated monitoring of cable tension

    International Nuclear Information System (INIS)

    Sim, Sung-Han; Cho, Soojin; Li, Jian; Jo, Hongki; Park, Jong-Woong; Jung, Hyung-Jo; Spencer Jr, Billie F

    2014-01-01

    As cables are primary load carrying members in cable-stayed bridges, monitoring the tension forces of the cables provides valuable information regarding structural soundness. Incorporating wireless smart sensors with vibration-based tension estimation methods provides an efficient means of autonomous long-term monitoring of cable tensions. This study develops a wireless cable tension monitoring system using MEMSIC’s Imote2 smart sensors. The monitoring system features autonomous operation, sustainable energy harvesting and power consumption, and remote access using the internet. To obtain the tension force, an in-network data processing strategy associated with the vibration-based tension estimation method is implemented on the Imote2-based sensor network, significantly reducing the wireless data transmission and the power consumption. The proposed monitoring system has been deployed and validated on the Jindo Bridge, a cable-stayed bridge located in South Korea. (paper)

  4. A wireless smart sensor network for automated monitoring of cable tension

    Science.gov (United States)

    Sim, Sung-Han; Li, Jian; Jo, Hongki; Park, Jong-Woong; Cho, Soojin; Spencer, Billie F., Jr.; Jung, Hyung-Jo

    2014-02-01

    As cables are primary load carrying members in cable-stayed bridges, monitoring the tension forces of the cables provides valuable information regarding structural soundness. Incorporating wireless smart sensors with vibration-based tension estimation methods provides an efficient means of autonomous long-term monitoring of cable tensions. This study develops a wireless cable tension monitoring system using MEMSIC’s Imote2 smart sensors. The monitoring system features autonomous operation, sustainable energy harvesting and power consumption, and remote access using the internet. To obtain the tension force, an in-network data processing strategy associated with the vibration-based tension estimation method is implemented on the Imote2-based sensor network, significantly reducing the wireless data transmission and the power consumption. The proposed monitoring system has been deployed and validated on the Jindo Bridge, a cable-stayed bridge located in South Korea.

  5. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  6. Differential psychological impact of internet exposure on Internet addicts.

    Science.gov (United States)

    Romano, Michela; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  7. Energy efficiency in hybrid mobile and wireless networks

    Energy Technology Data Exchange (ETDEWEB)

    Abbas, Ziaul Haq

    2012-07-01

    Wireless Internet access is almost pervasive nowadays, and many types of wireless networks can be used to access the Internet. However, along with this growth, there is an even greater concern about the energy consumption and efficiency of mobile devices as well as of the supporting networks, triggering the appearance of the concept of green communication. While some efforts have been made towards this direction, challenges still exist and need to be tackled from diverse perspectives. Cellular networks, WLANs, and ad hoc networks in the form of wireless mesh networks are the most popular technologies for wireless Internet access. The availability of such a variety of access networks has also paved the way to explore synergistic approaches for Internet access, leading to the concept of hybrid networks and relay communications. In addition, many mobile devices are being equipped with multiple interfaces, enabling them to operate in hybrid networks. In contrast, the improvements in the battery technology itself have not matched the pace of the emerging mobile applications. The situation becomes more sophisticated when a mobile device functions also as a relay node to forward other station's data. In the literature, energy efficiency of mobile devices has been addressed from various perspectives such as protocol-level efforts, battery management efforts, etc. However, there is little work on energy efficiency in hybrid mobile and wireless networks and devices with heterogeneous connections. For example, when there are multiple networks available to a mobile device, how to achieve optimum long-term energy consumption of such a device is an open question. Furthermore, in today's cellular networks, micro-, pico-, and femto-cells are the most popular network topologies in order to support high data rate services and high user density. With the growth of such small-cell solutions, the energy consumption of these networks is also becoming an important concern for operators

  8. A New Missing Values Estimation Algorithm in Wireless Sensor Networks Based on Convolution

    Directory of Open Access Journals (Sweden)

    Feng Liu

    2013-04-01

    Full Text Available Nowadays, with the rapid development of Internet of Things (IoT applications, data missing phenomenon becomes very common in wireless sensor networks. This problem can greatly and directly threaten the stability and usability of the Internet of things applications which are constructed based on wireless sensor networks. How to estimate the missing value has attracted wide interest, and some solutions have been proposed. Different with the previous works, in this paper, we proposed a new convolution based missing value estimation algorithm. The convolution theory, which is usually used in the area of signal and image processing, can also be a practical and efficient way to estimate the missing sensor data. The results show that the proposed algorithm in this paper is practical and effective, and can estimate the missing value accurately.

  9. Internet Teleoperation of a Robot with Streaming Buffer System under Varying Time Delays

    Science.gov (United States)

    Park, Jahng-Hyon; Shin, Wanjae

    It is known that existence of irregular transmission time delay is a major bottleneck for application of advanced robot control schemes to internet telerobotic systems. In the internet teleoperation system, the irregular transmission time delay causes a critical problem, which includes instability and inaccuracy. This paper suggests a practical internet teleoperation system with streaming buffer system, which consists of a buffer, a buffer manager, and a control timer. The proposed system converts the irregular transmission time delay to a constant. So, the system effectively transmits the control input to a remote site to operate a robot stably and accurately. This feature enables short control input intervals. That means the entire system has a large control bandwidth. The validity of the proposed method is demonstrated by experiments of teleoperation from USC (University of Southern California in U. S.A.) to HYU (Hanyang Univ. in Korea) through the Internet. The proposed method is also demonstrated by experiments of teleoperation through the wireless internet.

  10. Differential Psychological Impact of Internet Exposure on Internet Addicts

    OpenAIRE

    Romano, Michela; Osborne, Lisa A.; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and aut...

  11. From Web Analytics to Product Analytics: The Internet of Things as a New Data Source for Enterprise Information Systems

    OpenAIRE

    Klat , Wilhelm; Stummer , Christian; Decker , Reinhold

    2016-01-01

    Part 4: Advanced Manufacturing and Management Aspects; International audience; The internet of things (IoT) paves the way for a new generation of consumer products that collect and exchange data, constituting a new data source for enterprise information systems (EIS). These IoT-ready products use built-in sensors and wireless communication technologies to capture and share data about product usage and the environment in which the products are used. The dissemination of the internet into the p...

  12. Piecing together the Internet

    CERN Multimedia

    Rae-Dupree, J

    2002-01-01

    No one group or person can take credit for inventing the Internet. Key ideas came from both military and academic researchers, DOE money got it up and running. Article giving a chronological timeline of the development of the internet from the 1960s to the present day (2 PC screens).

  13. Interlinguistics and the Internet.

    Science.gov (United States)

    Fettes, Mark

    1997-01-01

    Argues that the Internet offers new opportunities for the development, use, and study of planned languages. Notes that while most Web pages on "constructed" languages are the work of individual hobbyists, a few projects have small communities of users. The paper concludes that the use of Esperanto on the Internet reflects increased socialization…

  14. Creating Pupils' Internet Magazine

    Science.gov (United States)

    Bognar, Branko; Šimic, Vesna

    2014-01-01

    This article presents an action research, which aimed to improve pupils' literary creativity and enable them to use computers connected to the internet. The study was conducted in a small district village school in Croatia. Creating a pupils' internet magazine appeared to be an excellent way for achieving the educational aims of almost all…

  15. The Internet Erlang Formula

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk

    2012-01-01

    This paper presents a robust and efficient algorithm for evaluating multi-service multi-rate queueing systems, including finite buffer systems and loss systems. Vint Cerf listed in 2007 seven research problems concerning the Internet. This paper responds to the second problem: an Internet Erlang...

  16. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  17. Teaching on the Internet.

    Science.gov (United States)

    Kubala, Tom

    1998-01-01

    Discusses Internet graduate teaching experiences at the University of Central Florida and explores the pros and cons of online instruction. Describes Internet courses as asynchronous, allowing students to participate at any time and place. States that faculty must be excellent teachers, able to translate their styles into effective,…

  18. The Internet Debate.

    Science.gov (United States)

    Wampler, Angela Mallicote

    1996-01-01

    Examines whether the Internet will be an equalizer or will increase social stratification, whether the Internet will be a boon to rural areas, and how it can be made more appealing or acceptable to rural areas. Discusses the "missionary movement" model of economic change and rural issues related to access to infrastructure, censorship,…

  19. Internet Bad Neighborhoods Aggregation

    NARCIS (Netherlands)

    Moreira Moura, Giovane; Sadre, R.; Sperotto, Anna; Pras, Aiko; Paschoal Gaspary, L.; De Turk, Filip

    Internet Bad Neighborhoods have proven to be an innovative approach for fighting spam. They have also helped to understand how spammers are distributed on the Internet. In our previous works, the size of each bad neighborhood was fixed to a /24 subnetwork. In this paper, however, we investigate if

  20. Ethics and Internet Measurements

    NARCIS (Netherlands)

    van der Ham, Jeroen; van Rijswijk, Roland M.

    2017-01-01

    Over the past decade the Internet has changed from a helpful tool to an important part of our daily lives for most of the world’s population. Where in the past the Internet mostly served to look up and exchange information, it is now used to stay in touch with friends, perform financial transactions

  1. Internet accounting dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro; Mourier, Lise

    2005-01-01

    An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...

  2. LIFE ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The fast development of the Internet has not only changed people’s lifestyles but also had a deep impact on social structure the rapidly growing Internet has not only changed ways of collecting and using information,but also exerted a farreaching influence on social

  3. Internet and information

    Institute of Scientific and Technical Information of China (English)

    王文龙

    2001-01-01

    As the society develops, information becomesmore important than ever before. Computers willgradually be familiar to more and more people andbe used in more and more ways. Internet makes theworld integrated(合并) as a whole. So, it is important to learn how to make use of the Internet.

  4. Measuring internet skills

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2010-01-01

    Research that considers Internet skills often lacks theoretical justifications and does not go beyond basic button knowledge. There is a strong need for a measurement framework that can guide future research. In this article, operational definitions for measuring Internet skills are proposed,

  5. Banking on the Internet.

    Science.gov (United States)

    Internet Research, 1996

    1996-01-01

    Electronic ground was broken in 1995 with the development of the completely Internet-based bank Security First Network Bank. This article discusses the need for developing online services, outlines the reasons for the formation of an Internet-based bank and argues that to remain competitive financial services providers must provide easier customer…

  6. Development of a simulated Internet for education

    Directory of Open Access Journals (Sweden)

    Andrew Smith

    2011-02-01

    Full Text Available This paper describes the early stages of research and development of an educational environment designed to enable learners to participate in remote, group based large-scale activities based on local area network and wide area network technologies working on a range of systems and within different learning situations, such as in class group work, remote group work or independent learning. The environment covers specifically routing, switching and wireless principles in the domain of computer networking. This is accomplished using the ‘multiuser functionality' feature found within the Cisco Academy programme, Packet Tracer application. The initial research explores how a ‘virtual Internet' can be implemented to enable learners to engage with the scale and complexity of the Internet without interacting with active routing infrastructures thereby interfering with others. Different communities of interest from Cisco Systems as well as their Academy Programme academic affiliates have contributed to the development of the resource as well as to research into how individuals participate in learning as a result of using this software. This paper tells the story of the iterative action research process with two initial learning situations of ‘remote many' participation and ‘in class many' participation in a large scale networking exercise. As research is still in the development process, this paper explores the experiences and observations gathered from engaging with the two learning scenarios, describing how each interaction exercise was perceived by participants and their educators. Initial findings from both activities indicate that the concept of an ‘Internet on the Internet' to deliver simulated practical learning has considerable potential and brings an alternative dimension to the practical learning experience. Research is ongoing, with the work in this paper informing the continual iterative process.

  7. Resilient Disaster Network Based on Software Defined Cognitive Wireless Network Technology

    Directory of Open Access Journals (Sweden)

    Goshi Sato

    2015-01-01

    Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.

  8. Australian internet policy

    Directory of Open Access Journals (Sweden)

    Angela Daly

    2017-03-01

    Full Text Available This special issue focussing on internet policy in Australia provides a snapshot of developments on various topics (access, privacy, censorship as a means of understanding better the state of play in Australia, and also how this compares to internet policy in other parts of the world, especially Europe and North America. Given changing geopolitics, the influence of internet policy in the rest of the Asia Pacific through vehicles such as the Regional Comprehensive Economic Partnership (RCEP may become increasingly important in Australia in the coming years. This leaves Australia, and its internet policy, at a crossroads, which may reflect broader dynamics in internet policy internationally, and makes this an interesting time in which to explore what is happening in this particular country.

  9. The Internet drag race

    CERN Document Server

    Fitchard, Kevin

    2004-01-01

    The Internet2 consortium members from California Institute of Technology and CERN developed effective fiber optic network, sending data upto 11,000 kilometers between Caltech's LA laboratories and CERN's campus in Geneva at a rate of 6.25 Gb/s. The 68,431 terabit- meters per second data transfer was accomplished using the IPv4 protocols that power the public Internet. Network run by Internet2, called Abilene maintains the highest capacities in the world, connecting dozens of GigaPOP's with OC-192c 10 Gb/s Ip backbone. The member institutions of Internet2 keep Abilene 10% to 15% full, but the researchers also use the network as a base for the latest Internet technologies and experiments, which include development of IPv6. (Edited abstract).

  10. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  11. Internet Use for Health Information

    Science.gov (United States)

    ... Health Services Utilization > Internet use for Health Information Internet use for Health Information Narrative Due in part ... adults in the United States who use the Internet has increased substantially, from 47 percent in 2000 ...

  12. Causes of Internet Addiction Disorder

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The Internet Addiction Disorder diagnostic manual approved by psychologists on November 8 divides Internet addiction into five categories,which are addiction to online games,pornography,social networking,Internet information and Internetshopping.

  13. Integration of Antennas and Solar cells for Low Power Wireless Systems

    OpenAIRE

    O’Conchubhair, Oisin

    2015-01-01

    This thesis reports on design methods for enhanced integration of low-profile antennas for short-range wireless communications with solar voltaic systems. The need to transform to more sustainable energy sources arises from the excessive production of harmful carbon emissions from fossil fuels. The Internet of Things and the proliferation of battery powered devices makes energy harvesting from the environment more desirable in order to reduce dependency on the power grid and running costs. Wh...

  14. Adjusting DICOM specifications when using wireless LANs: The MedLAN example

    OpenAIRE

    Banitsas, KA; Tachakra, S; Song, YH

    2003-01-01

    Wireless networks will become increasingly useful in point-of-care areas such as hospitals, because of their ease of use and their flexibility. A system called MedLAN has been developed by the Central Middlesex Hospital and Brunei University to take advantage of the above desirable properties of WLANs for use in accident & emergency departments to broadcast live, high quality video images and sound over a LAN or the Internet. However, in many cases, the limited available throughput of such a ...

  15. Wireless sensor network

    OpenAIRE

    Calvo Cervera, Jordi; Gil Laso, Jose Antonio; Gonzalez Ortega, Carlos

    2017-01-01

    This document is the final report for the LoRa project made by three international Erasmus students in the Aarhus Universitet as their bachelor's project. The goal of this project is to take profit of the Internet of Things technology by developing a low consuming sensing device. This device will consist in one gateway and one node. Where the node will be the responsible of the data gathering and will send it to the gateway. Then, the gateway will save all the data in a database in order to m...

  16. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    Science.gov (United States)

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  17. Wireless Data Acquisition of Transient Signals for Mobile Spectrometry Applications.

    Science.gov (United States)

    Trzcinski, Peter; Weagant, Scott; Karanassios, Vassili

    2016-05-01

    Wireless data acquisition using smartphones or handhelds offers increased mobility, it provides reduced size and weight, it has low electrical power requirements, and (in some cases) it has an ability to access the internet. Thus, it is well suited for mobile spectrometry applications using miniaturized, field-portable spectrometers, or detectors for chemical analysis in the field (i.e., on-site). There are four main wireless communications standards that can be used for wireless data acquisition, namely ZigBee, Bluetooth, Wi-Fi, and UWB (ultra-wide band). These are briefly reviewed and are evaluated for applicability to data acquisition of transient signals (i.e., time-domain) in the field (i.e., on-site) from a miniaturized, field-portable photomultiplier tube detector and from a photodiode array detector installed in a miniaturized, field-portable fiber optic spectrometer. These are two of the most widely used detectors for optical measurements in the ultraviolet-visible range of the spectrum. A miniaturized, 3D-printed, battery-operated microplasma-on-a-chip was used for generation of transient optical emission signals. Elemental analysis from liquid microsamples, a microplasma, and a handheld or a smartphone will be used as examples. Development and potential applicability of wireless data acquisition of transient optical emission signals for taking part of the lab to the sample types of mobile, field-portable spectrometry applications will be discussed. The examples presented are drawn from past and ongoing work in the authors' laboratory. A handheld or a smartphone were used as the mobile computing devices of choice. © The Author(s) 2016.

  18. Wireless networks of opportunity in support of secure field operations

    Science.gov (United States)

    Stehle, Roy H.; Lewis, Mark

    1997-02-01

    Under funding from the Defense Advanced Research Projects Agency (DARPA) for joint military and law enforcement technologies, demonstrations of secure information transfer in support of law enforcement and military operations other than war, using wireless and wired technology, were held in September 1996 at several locations in the United States. In this paper, the network architecture, protocols, and equipment supporting the demonstration's scenarios are presented, together with initial results, including lessons learned and desired system enhancements. Wireless networks of opportunity encompassed in-building (wireless-LAN), campus-wide (Metricom Inc.), metropolitan (AMPS cellular, CDPD), and national (one- and two-way satellite) systems. Evolving DARPA-sponsored packet radio technology was incorporated. All data was encrypted, using multilevel information system security initiative (MISSI)FORTEZZA technology, for carriage over unsecured and unclassified commercial networks. The identification and authentication process inherent in the security system permitted logging for database accesses and provided an audit trail useful in evidence gathering. Wireless and wireline communications support, to and between modeled crisis management centers, was demonstrated. Mechanisms for the guarded transport of data through the secret-high military tactical Internet were included, to support joint law enforcement and crisis management missions. A secure World Wide Web (WWW) browser forms the primary, user-friendly interface for information retrieval and submission. The WWW pages were structured to be sensitive to the bandwidth, error rate, and cost of the communications medium in use (e.g., the use of and resolution for graphical data). Both still and motion compressed video were demonstrated, along with secure voice transmission from laptop computers in the field. Issues of network bandwidth, airtime costs, and deployment status are discussed.

  19. Traffic Profiling in Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Kirykos, Georgios

    2006-01-01

    .... Wireless sensor networks pose unique challenges and limitations to the traditional schemes, which are used in the other wireless networks for security protection, and are due mainly to the increased...

  20. Wireless Connectivity to ATM Communication Grid

    National Research Council Canada - National Science Library

    Rajaravivarma, Veeramuthu

    1998-01-01

    The AFOSR funds were used to purchase a 12 port Fore ATM switch, ATM network interface cards, a SUN UltraSPARC workstation, Lucent WavePoint wireless bridge, and Lucent WaveLAN wireless network interface cards...