WorldWideScience

Sample records for wireless ip telephony

  1. Security Risks in IP Telephony

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2010-01-01

    Full Text Available This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is a significant advantage.

  2. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  3. Security of IP Telephony in Ecuador: Online Analysis

    Directory of Open Access Journals (Sweden)

    José Estrada

    2016-06-01

    Full Text Available Telephony is a global service and thus telephone networks have been a coveted target for criminals. Now that voice can be transported over IP and that multiple services are integrated in a convergent model through Internet, there are more incentives to attack and more attackers. Moreover, the development of open source telephone applications has encouraged the massive use of IP telephony, but not an increased awareness about embedded security risks. Due to the current and intensive adoption of IP telephony systems in Ecuador, we conducted an exploration based on public information to obtain statistics about telephone systems connected to Internet in Ecuador. Additionally, using a deliberately vulnerable IP telephony system, we collected more data to do a preliminary analysis of threats to such systems. We found that hundreds of telephone systems were publicly available on the Internet and using outdated versions of Asterisk-based applications. We also found thousands of malicious interactions on the IP telephony system we deployed on the Internet.

  4. Diffusion of IP Telephony in Undergraduate Private Colleges

    Directory of Open Access Journals (Sweden)

    Patrick C. Olson, PhD

    2007-02-01

    Full Text Available Over the summer of 2000 Menlo College implemented enterprise wide Internet Protocol (IP Telephony (Voice over Internet Protocol [VoIP]. More than five years have passed, and analysts are predicting that in the near future the only available Private Branch Exchange (PBX solutions will be VoIP [4]. In view of this market trend, the diffusion of this technology in these institutions seems slow. The Menlo College implementation is very successful, but has the concept diffused to other institutions? What factors influence the diffusion of this technology to other institutions? This paper examines the status of VoIP at these institutions.

  5. Intelligent Advanced Communications IP Telephony Feasibility for the U.S. Navy (DVD)

    National Research Council Canada - National Science Library

    Binns, Todd D; Naas, Bill

    2007-01-01

    ...: 2 DVD-ROMs; 4 3/4 in.; 2.68 GB. ABSTRACT: The purpose of this research paper is to research technologies and solutions supporting the communications infrastructure necessary to implement an integrated VoIP (IP telephony...

  6. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  7. Telephony Over IP: A QoS Measurement-Based End to End Control Algorithm

    Directory of Open Access Journals (Sweden)

    Luigi Alcuri

    2004-12-01

    Full Text Available This paper presents a method for admitting voice calls in Telephony over IP (ToIP scenarios. This method, called QoS-Weighted CAC, aims to guarantee Quality of Service to telephony applications. We use a measurement-based call admission control algorithm, which detects network congested links through a feedback on overall link utilization. This feedback is based on the measures of packet delivery latencies related to voice over IP connections at the edges of the transport network. In this way we introduce a close loop control method, which is able to auto-adapt the quality margin on the basis of network load and specific service level requirements. Moreover we evaluate the difference in performance achieved by different Queue management configurations to guarantee Quality of Service to telephony applications, in which our goal was to evaluate the weight of edge router queue configuration in complex and real-like telephony over IP scenario. We want to compare many well-know queue scheduling algorithms, such as SFQ, WRR, RR, WIRR, and Priority. This comparison aims to locate queue schedulers in a more general control scheme context where different elements such as DiffServ marking and Admission control algorithms contribute to the overall Quality of Service required by real-time voice conversations. By means of software simulations we want to compare this solution with other call admission methods already described in scientific literature in order to locate this proposed method in a more general control scheme context. On the basis of the results we try to evidence the possible advantages of this QoS-Weighted solution in comparison with other similar CAC solutions ( in particular Measured Sum, Bandwidth Equivalent with Hoeffding Bounds, and Simple Measure CAC, on the planes of complexity, stability, management, tune-ability to service level requirements, and compatibility with actual network implementation.

  8. Intelligent Advanced Communications IP Telephony Feasibility for the US Navy - Phase 3

    Science.gov (United States)

    2011-03-01

    transferred, DTMF received, registered/ unregistered , etc. o Call management control via HTTP/JSON-based web service for remote control Voice engine...material; or * e) Declining to grant rights under trademark law for use of some trade names, trademarks , or service marks; or * f) Requiring...CERTIFIED™ logo are registered trademarks of the Wi-Fi Alliance ® . 370 Intelligent Advanced Communications IP Telephony Feasibility for the US

  9. Design and implementation of a system to interconnect VoIP services and CERN’s telephony networks

    CERN Document Server

    Pohančeník, Martin; Segeč, Pavel

    The purpose of this diploma thesis was to design and implement a system that would provide an interface of CERN’s telephony network for Voice over IP services (SIP-based services specifically). This system thus serves as an entry point for calls originating from outside of CERN’s telephony network and enables users of these services to call CERN’s fixed and mobile phone numbers. The theoretical part of the thesis talks in detail about the project specification and describes the goals that were trying to be achieved. It also describes the topic of VoIP telephony and current trends, alongside with analysis of the current telephone network of CERN. The practical part is targeted to explain the design of the solution and deployment of the system at CERN. The final part of the thesis shows testing scenarios and results and states several extension capabilities.

  10. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    with the deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality VoIP...... communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality....... The focus of Voice over IP in Wierless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction  while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session...

  11. Analyzing ENUM Service and Administration from the Bottom Up: The addressing system for IP telephony and beyond

    OpenAIRE

    Hwang, Junseok; Mueller, Milton; Yoon, Gunyoung; Kim, Joonmin

    2001-01-01

    ENUM creates many new market opportunities and raises several important policy issues related to the implementation and administration of the ENUM database and services. Recent World Telecommunications Policy Forum 2001 dealt with the emergence of ENUM as an important numbering issue of IP telephony. This paper prepares some important emerging issues of ENUM administration and policy by taking an empirical research approach from the bottom up. We will identify potential key ENUM services, and...

  12. Wireless IP and building the mobile Internet

    National Research Council Canada - National Science Library

    Dixit, Sudhir; Prasad, Ramjee

    2003-01-01

    ..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...

  13. Management of speech and video telephony quality in heterogeneous wireless networks

    CERN Document Server

    Lewcio, Błażej

    2014-01-01

    This book shows how networking research and quality engineering can be combined to successfully manage the transmission quality when speech and video telephony is delivered in heterogeneous wireless networks. Nomadic use of services requires intelligent management of ongoing transmission, and to make the best of available resources many fundamental trade-offs must be considered. Network coverage versus throughput and reliability of a connection is one key aspect, efficiency versus robustness of signal compression is another. However, to successfully manage services, user-perceived Quality of Experience (QoE) in heterogeneous networks must be known, and the perception of quality changes must be understood.  These issues are addressed in this book, in particular focusing on the perception of quality changes due to switching between diverse networks, speech and video codecs, and encoding bit rates during active calls.

  14. The Village Telco project: a reliable and practical wireless mesh telephony infrastructure

    Directory of Open Access Journals (Sweden)

    Gardner-Stephen Paul

    2011-01-01

    Full Text Available Abstract VoIP (Voice over IP over mesh networks could be a potential solution to the high cost of making phone calls in most parts of Africa. The Village Telco (VT is an easy to use and scalable VoIP over meshed WLAN (Wireless Local Area Network telephone infrastructure. It uses a mesh network of mesh potatoes to form a peer-to-peer network to relay telephone calls without landlines or cell phone towers. This paper discusses the Village Telco infrastructure, how it addresses the numerous difficulties associated with wireless mesh networks, and its efficient deployment for VoIP services in some communities around the globe. The paper also presents the architecture and functions of a mesh potato and a novel combined analog telephone adapter (ATA and WiFi access point that routes calls. Lastly, the paper presents the results of preliminary tests that have been conducted on a mesh potato. The preliminary results indicate very good performance and user acceptance of the mesh potatoes. The results proved that the infrastructure is deployable in severe and under-resourced environments as a means to make cheap phone calls and render Internet and IP-based services. As a result, the VT project contributes to bridging the digital divide in developing areas.

  15. MOBILTEL - Mobile Multimodal Telecommunications dialogue system based on VoIP telephony

    Directory of Open Access Journals (Sweden)

    Anton Čižmár

    2009-10-01

    Full Text Available In this paper the project MobilTel ispresented. The communication itself is becoming amultimodal interactive process. The MobilTel projectprovides research and development activities inmultimodal interfaces area. The result is a functionalarchitecture for mobile multimodal telecommunicationsystem running on handheld device. The MobilTelcommunicator is a multimodal Slovak speech andgraphical interface with integrated VoIP client. Theother possible modalities are pen – touch screeninteraction, keyboard, and display on which theinformation is more user friendly presented (icons,emoticons, etc., and provides hyperlink and scrollingmenu availability.We describe the method of interaction between mobileterminal (PDA and MobilTel multimodal PCcommunicator over a VoIP WLAN connection basedon SIP protocol. We also present the graphicalexamples of services that enable users to obtaininformation about weather or information about trainconnection between two train stations.

  16. Modular system for measuring a speech quality in the IP telephony infrastructures using autonomous probes

    Science.gov (United States)

    Rezac, Filip; Safarik, Jakub; Macura, Lukas; Rozhon, Jan; Gresak, Erik

    2017-05-01

    The paper deals with a speech quality monitoring system using probes placed on the individual network nodes operating VoIP services. Information on speech quality is measured periodically and the results are then stored on the central server which provides visualization in a form of graph respecting a topology of the probes. Article provides overall description of the technology and algorithms used in the speech quality monitoring system and results achieved in this applied research are verified in real operation. Contribution of the work lies in a proposal of the new multi-agent system enabling speech quality monitoring and in own implementation and its verification in Czech academic network.

  17. Telephony user survey

    CERN Multimedia

    IT Department

    2016-01-01

    Let us know your needs to better plan the transition to a new CERN telephony system.   CERN is planning to upgrade its telephony network and replace the system with a new and modern VoIP infrastructure. We strive to make this transition as beneficial and smooth as possible for you. Please let us know more about your current working environment, expectations and suggestions by responding to this survey: https://cern.ch/tel-survey. The more answers we get, the better the new system will serve everyone in the future. The survey will take you about five minutes to complete; we are counting on your feedback!

  18. Reducing handover latency in future IP-based wireless networks: Fast Proxy Mobile IPv6

    NARCIS (Netherlands)

    Heijenk, Geert; Bargh, Mortaza S.; Laganier, Julien; Prasad, Anand R.

    2008-01-01

    Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the

  19. Intrusion detection for IP-based multimedia communications over wireless networks

    CERN Document Server

    Tang, Jin

    2013-01-01

    IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief

  20. 76 FR 59916 - Interconnected VoIP Service; Wireless E911 Location Accuracy Requirements; E911 Requirements for...

    Science.gov (United States)

    2011-09-28

    ... network-based location technology, the Commission required wireless carriers to provide confidence and... applications, examining emerging E911 public safety location technologies, and recommending options to CSRIC...] Interconnected VoIP Service; Wireless E911 Location Accuracy Requirements; E911 Requirements for IP-Enabled...

  1. VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN

    Science.gov (United States)

    Morioka, Yasufumi; Higashino, Takeshi; Tsukamoto, Katsutoshi; Komaki, Shozo

    This paper proposes a VoIP (Voice over Internet Protocol) session capacity expansion method that uses periodic packet transmission suppression control for wireless LANs. The proposed method expands the VoIP session capacity of an AP without critically degrading the QoS (Quality of Service) of all stations. Simulation results show the proposed method with 0.5% packet suppression control on each station expands a VoIP session capacity by up to 5% compared to a legacy method while satisfying required QoS for all stations.

  2. Managing wireless IP-Connectivity Experience as Mobile Social Media

    NARCIS (Netherlands)

    Rigolin Ferreira Lopes, R.; van Beijnum, Bernhard J.F.; dos Santos Moreira, Edson

    2010-01-01

    Social media is the meaningful digital content that results from interaction or collaboration between users through web-based applications, e.g. blogs and virtual communities. While on the move, people can create or consume mobile social media using portable devices with IP-connectivity. Our

  3. Fixed telephony evolution at CERN

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    The heart of CERN’s telephony infrastructure consists of the Alcatel IP-PBX that links CERN’s fixed line phones, Lync softphones and CERN’s GSM subscribers to low-cost local and international telephony services. The PABX infrastructure also supports the emergency “red telephones” in the LHC tunnel and provides vital services for the Fire and Rescue Service and the CERN Control Centre. Although still reliable, the Alcatel hardware is increasingly costly to maintain and looking increasingly outmoded in a market where open source solutions are increasingly dominant. After presenting an overview of the Alcatel PABX and the services it provides, including innovative solutions such as the Closed User Group for our mobile telephony services, we present a possible architecture for a software based system designed to meet tomorrow’s communication needs and describe how the introduction of open-source call routers based on the SIP protocol and Session Border Controllers (SBC) could foster the introduction...

  4. Truncated power control for improving TCP/IP performance over CDMA wireless links

    DEFF Research Database (Denmark)

    Cianca, Ernestina; Prasad, Ramjee; De Sanctis, Mauro

    2005-01-01

    The issue of the performance degradation of transmission control protocol/Internet Protocol (TCP/IP) over wireless links due to the presence of noncongestion-related packet losses has been addressed with a physical layer approach. The effectiveness of automatic repeat request techniques in enhanc...

  5. Analysis of Techniques for Protection Against Spam over Internet Telephony

    NARCIS (Netherlands)

    Quinten, Vincent M.; van de Meent, R.; Pras, A.; Pras, Aiko; van Sinderen, M.J.; van Sinderen, Marten J.

    2007-01-01

    Spam in Internet telephony (SPIT) networks is likely to become a large problem in the future, as more and more people and companies switch from traditional telephone networks to Voice over IP (VoIP) networks, and as it is easy to spam VoIP users. The goal of this survey paper is to identify

  6. Performance Study of Objective Speech Quality Measurement for Modern Wireless-VoIP Communications

    Directory of Open Access Journals (Sweden)

    Chan Wai-Yip

    2009-01-01

    Full Text Available Wireless-VoIP communications introduce perceptual degradations that are not present with traditional VoIP communications. This paper investigates the effects of such degradations on the performance of three state-of-the-art standard objective quality measurement algorithms—PESQ, P.563, and an "extended" E-model. The comparative study suggests that measurement performance is significantly affected by acoustic background noise type and level as well as speech codec and packet loss concealment strategy. On our data, PESQ attains superior overall performance and P.563 and E-model attain comparable performance figures.

  7. On mobile wireless ad hoc IP video transports

    Science.gov (United States)

    Kazantzidis, Matheos

    2006-05-01

    Multimedia transports in wireless, ad-hoc, multi-hop or mobile networks must be capable of obtaining information about the network and adaptively tune sending and encoding parameters to the network response. Obtaining meaningful metrics to guide a stable congestion control mechanism in the transport (i.e. passive, simple, end-to-end and network technology independent) is a complex problem. Equally difficult is obtaining a reliable QoS metrics that agrees with user perception in a client/server or distributed environment. Existing metrics, objective or subjective, are commonly used after or before to test or report on a transmission and require access to both original and transmitted frames. In this paper, we propose that an efficient and successful video delivery and the optimization of overall network QoS requires innovation in a) a direct measurement of available and bottleneck capacity for its congestion control and b) a meaningful subjective QoS metric that is dynamically reported to video sender. Once these are in place, a binomial -stable, fair and TCP friendly- algorithm can be used to determine the sending rate and other packet video parameters. An adaptive mpeg codec can then continually test and fit its parameters and temporal-spatial data-error control balance using the perceived QoS dynamic feedback. We suggest a new measurement based on a packet dispersion technique that is independent of underlying network mechanisms. We then present a binomial control based on direct measurements. We implement a QoS metric that is known to agree with user perception (MPQM) in a client/server, distributed environment by using predetermined table lookups and characterization of video content.

  8. Evaluation of VoIP QoS Performance in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Tariq Meeran

    2017-07-01

    Full Text Available The main focus of this research article is the evaluation of selected voice over Internet protocol (VoIP solutions in wireless mesh network (WMN scenarios. While WMNs have self-healing, self-forming, and dynamic topology features, they still pose challenges for the implementation of multimedia applications such as voice in various scenarios. Therefore, various solutions to make WMN more suitable for VoIP application have been proposed in the scientific literature. In this work, we have extensively explored a set of applicable scenarios by conducting experiments by means of a network simulator. The following scenarios were selected as the most representatives for performance evaluation: first responders, flooded village, remote village, and platoon deployment. Each selected scenario has been studied under six sub-scenarios corresponding to various combinations of the IEEE 802.11g, 802.11n, 802.11s, and 802.11e standards; the G.711 and G.729 codecs; and the ad hoc on demand distance vector (AODV and hybrid wireless mesh protocol (HWMP routing protocols. The results in terms of quality of service (measured with the mean opinion score rating scale, supported by the analysis of delay, jitter and packet loss, show that 802.11g integration with both VoIP codecs and AODV routing protocol results in better VoIP performance as compared to most other scenarios. In case of 802.11g integration with 802.11s, VoIP performance decreases as compared to the other sub-scenarios without 802.11s. The results also show that 802.11n integration with 802.11e decreases VoIP performance in larger deployments. We conclude the paper with some recommendations in terms of combinations of those standards and protocols with a view to achieve a higher quality of service for the given scenarios.

  9. 75 FR 67321 - Wireless E911 Location Accuracy Requirements; E911 Requirements for IP-Enabled Service Providers

    Science.gov (United States)

    2010-11-02

    ...; or via the Internet to [email protected] . SUPPLEMENTARY INFORMATION: I. Introduction 1. As... with the surge in wireless usage, encompassing additional voice over Internet Protocol (VoIP) and... evolution in the use of wireless devices and the development of location technologies. As recommended in the...

  10. 76 FR 1126 - Wireless E911 Location Accuracy Requirements; E911 Requirements for IP-Enabled Service Providers

    Science.gov (United States)

    2011-01-07

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 20 Wireless E911 Location Accuracy Requirements; E911 Requirements for IP-Enabled Service Providers AGENCY: Federal Communications Commission. ACTION: Proposed rule; extension of comment...

  11. Reducing handover latency in future IP-based wireless networks: Proxy Mobile IPv6 with simultaneous bindings

    NARCIS (Netherlands)

    Bargh, Mortaza S.; Hulsebosch, Bob; Eertink, Henk; Eertink, E.H.; Heijenk, Geert; Idserda, Jeroen; Laganier, Julien; Prasad, Anand R.; Zugenmaier, Alf

    2008-01-01

    Handover in future wireless communication systems must be seamless. Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements. At the same time they do not give sufficient control to the network to optimize the handover process and they do not deal well

  12. Telephony Earth Station

    Science.gov (United States)

    Morris, Adrian J.; Kay, Stan

    The Telephony Earth Station (TES), a digital full-mesh SCPC (single channel per carrier) system designed for satellite voice and data transmission is described. As compared to companded FM, the advanced speech compression and forward error correction techniques used by TES better achieve the quality, power, and bandwidth ideal for each application. In addition, the TES offers a fully demand-assigned voice call setup, handles point-to-point data channels, supports a variety of signaling schemes, and does not require any separate pilot receivers at the station, while keeping costs low through innovative technology and packaging. The TES can be used for both C-band and Ku-band (domestic or international) applications, and is configurable either as an VSAT (very small aperture terminal) using an SSPA, or as a larger station depending on the capacity requirements. A centralized DAMA processor and network manager is implemented using a workstation.

  13. Interoperation of an UHF RFID Reader and a TCP/IP Device via Wired and Wireless Links

    Directory of Open Access Journals (Sweden)

    Ik Soo Jin

    2011-11-01

    Full Text Available A main application in radio frequency identification (RFID sensor networks is the function that processes real-time tag information after gathering the required data from multiple RFID tags. The component technologies that contain an RFID reader, called the interrogator, which has a tag chip, processors, coupling antenna, and a power management system have advanced significantly over the last decade. This paper presents a system implementation for interoperation between an UHF RFID reader and a TCP/IP device that is used as a gateway. The proposed system consists of an UHF RFID tag, an UHF RFID reader, an RF end-device, an RF coordinator, and a TCP/IP I/F. The UHF RFID reader, operating at 915 MHz, is compatible with EPC Class-0/Gen1, Class-1/Gen1 and 2, and ISO18000-6B. In particular, the UHF RFID reader can be combined with the RF end-device/coordinator for a ZigBee (IEEE 802.15.4 interface, which is a low-power wireless standard. The TCP/IP device communicates with the RFID reader via wired links. On the other hand, it is connected to the ZigBee end-device via wireless links. The web based test results show that the developed system can remotely recognize information of multiple tags through the interoperation between the RFID reader and the TCP/IP device.

  14. Interoperation of an UHF RFID reader and a TCP/IP device via wired and wireless links.

    Science.gov (United States)

    Lee, Sang Hoon; Jin, Ik Soo

    2011-01-01

    A main application in radio frequency identification (RFID) sensor networks is the function that processes real-time tag information after gathering the required data from multiple RFID tags. The component technologies that contain an RFID reader, called the interrogator, which has a tag chip, processors, coupling antenna, and a power management system have advanced significantly over the last decade. This paper presents a system implementation for interoperation between an UHF RFID reader and a TCP/IP device that is used as a gateway. The proposed system consists of an UHF RFID tag, an UHF RFID reader, an RF end-device, an RF coordinator, and a TCP/IP I/F. The UHF RFID reader, operating at 915 MHz, is compatible with EPC Class-0/Gen1, Class-1/Gen1 and 2, and ISO18000-6B. In particular, the UHF RFID reader can be combined with the RF end-device/coordinator for a ZigBee (IEEE 802.15.4) interface, which is a low-power wireless standard. The TCP/IP device communicates with the RFID reader via wired links. On the other hand, it is connected to the ZigBee end-device via wireless links. The web based test results show that the developed system can remotely recognize information of multiple tags through the interoperation between the RFID reader and the TCP/IP device.

  15. Optimization of mobile IPv6-based handovers to support VoIP services in wireless heterogeneous networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    2007-01-01

    The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers. The durat......The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers....... The duration of such interruptions is called disruption time or handover delay and can heavily affect user satisfaction. Therefore, this delay needs to be minimized to provide good-quality VoIP services. In this paper, the focus is on the network layer mobility, specifically on dates for providing mobility...... at layer 3. Using analytical models, the authors evaluate MIPv4, MIPv6, fast MIPv6 (FMIPv6), and hierarchical MIPv6 (HMIPv6) and compare their performances in terms of handover delay for VoIP services. To optimize the handover delay, the authors propose to use the adaptive retransmission timer described...

  16. Digital telephony and network integration

    CERN Document Server

    Keiser, Bernhard E

    1995-01-01

    What is "digital telephony"? To the authors, the term digital telephony denotes the technology used to provide a completely digital telecommunication system from end-to-end. This implies the use of digital technology from one end instru­ ment through transmission facilities and switching centers to another end instru­ ment. Digital telephony has become possible only because of the recent and on­ going surge of semiconductor developments, allowing microminiaturization and high reliability along with reduced costs. This book deals with both the future and the present. Thus, the first chapter is entitled, "A Network in Transition." As baselines, Chapters 2 and 11 provide the reader with the present status of teler-hone technology in terms of voice digiti­ zation as well as switching principles. The book is an outgrowth of the authors' consulting and teaching experience in the field since the early 1980s. The book has been written to provide both the engineering student and the practicing engineer a working k...

  17. Interactive Video Coding and Transmission over Heterogeneous Wired-to-Wireless IP Networks Using an Edge Proxy

    Directory of Open Access Journals (Sweden)

    Modestino James W

    2004-01-01

    Full Text Available Digital video delivered over wired-to-wireless networks is expected to suffer quality degradation from both packet loss and bit errors in the payload. In this paper, the quality degradation due to packet loss and bit errors in the payload are quantitatively evaluated and their effects are assessed. We propose the use of a concatenated forward error correction (FEC coding scheme employing Reed-Solomon (RS codes and rate-compatible punctured convolutional (RCPC codes to protect the video data from packet loss and bit errors, respectively. Furthermore, the performance of a joint source-channel coding (JSCC approach employing this concatenated FEC coding scheme for video transmission is studied. Finally, we describe an improved end-to-end architecture using an edge proxy in a mobile support station to implement differential error protection for the corresponding channel impairments expected on the two networks. Results indicate that with an appropriate JSCC approach and the use of an edge proxy, FEC-based error-control techniques together with passive error-recovery techniques can significantly improve the effective video throughput and lead to acceptable video delivery quality over time-varying heterogeneous wired-to-wireless IP networks.

  18. IP Connected Low Power Wireless Personal Area Networks in the Future Internet

    DEFF Research Database (Denmark)

    Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian

    2012-01-01

    , and available energy and will suffer a high data loss rate when integrated into a network infrastructure. This poses significant challenges in the network design. This chapter describes the assumptions, technologies, and challenges for transmitting IPv6 over low power wireless personal area networks (Lo......WPANs). The authors address the key mechanisms from network aspects down to device design aspects and discuss how technologies interplay to make real application deployment practical for the Internet of Things....

  19. Mobile IP

    NARCIS (Netherlands)

    Heijenk, Geert; Sallent, S.; Pras, Aiko

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to

  20. Voice and Video Telephony Services in Smartphone

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Multimedia telephony is a delay-sensitive application. Packet losses, relatively less critical than delay, are allowed up to a certain threshold. They represent the QoS constraints that have to be respected to guarantee the operation of the telephony service and user satisfaction. In this work we introduce a new smartphone architecture characterized by two process levels called application processor (AP and mobile termination (MT, respectively. Here, they communicate through a serial channel. Moreover, we focus our attention on two very important UMTS services: voice and video telephony. Through a simulation study the impact of voice and video telephony is evaluated on the structure considered using the protocols known at this moment to realize voice and video telephony

  1. Impact of VoIP and QoS on Open and Distance Learning

    Directory of Open Access Journals (Sweden)

    Sanjay JASOLA

    2006-07-01

    Full Text Available Voice over Internet Protocol (VoIP is becoming a reality in many organizations. The potential for mobility in voice over wi-fi networks will derive demand for the technology. Wireless VoIP is poised to rival VoIP as an alternative telephony tool. Internet has been used to transport data in the form of packet. In the past, Internet did not support any kind of sophisticated quality of service (QoS mechanism. Although the type of service (TOS field in the Internet protocol (IP header has been existing and has been allowing the differentiated treatment of packets, it was never really used on a large scale. The voice is sensitive to delay and jitter so bandwidth must be guaranteed while transporting it. With the extensive use of Internet for carrying voice, there is a need to add QoS functionality in it. QoS with reference to VoIP has been discussed in the paper. Limited bandwidth and network latency are the issues which need to be considered while using wireless LAN for packetized voice data. Efforts of standards like 802.11e which will take care of these issues, have also been explored. The impact of these technologies on distance education has also been explored in the paper.

  2. Change of Mobile Telephony Operator

    CERN Multimedia

    2015-01-01

    Following a call for tenders issued in 2014, CERN has agreed a contract with Swisscom for the provision of mobile telephony services from 1 July 2015.     The Sunrise equipment on CERN sites will therefore be switched off from this date and people with a CERN mobile subscription will need to exchange their Sunrise SIM card for a new one from Swisscom, with a new mobile number (the last 4 digits will remain the same). We cannot give further details at present as we are still finalising arrangements for the deployment of the new network with Swisscom, but detailed information on the steps to be followed will be given well in advance of the changeover. Communication Systems Group Information Technology Department 

  3. IP telephony based danger alert communication system and its implementation

    Science.gov (United States)

    Rezac, Filip; Safarik, Jakub; Voznak, Miroslav; Tomala, Karel; Partila, Pavol

    2013-05-01

    This article discusses a danger alert system created as a part of the research project at Department of Telecommunications of Technical University of Ostrava. The aim of the system is to distribute pre-recorded voice messages in order to alert the called party in danger. This article describes individual technologies, which the application uses for its operation as well as issues relating to hardware requirements and transfer line bandwidth load. The article also describes new algorithms, which had to be developed in order to ensure the reliability of the system. Our intent is focused on disaster management, the message, which should be delivered within specified time span, is typed in the application and text-to-speech module ensures its transformation to a speech format, after that a particular scenario or warned area is selected and a target group is automatically unloaded. For this purpose, we have defined XML format for delivery of phone numbers which are located in the target area and these numbers are obtained from mobile BTS's (Base transmission stations). The benefit of such communication compared to others, is the fact, that it uses a phone call and, therefore, it is possible to get feedback who accepted the message and to improve efficiency of alert system. Finally, the list of unanswered calls is exported and these users can be informed via SMS.

  4. Energy use of set-top boxes and telephony products in the U.S.

    Energy Technology Data Exchange (ETDEWEB)

    Rosen, Karen B.; Meier, Alan K.; Zandelin, Stefan

    2001-06-01

    The goal of this investigation was to estimate the 1999 energy consumption of set-top boxes and telephony products in the U.S. residential sector. Results of this study will be used to identify new energy conservation opportunities and to align programs with those opportunities. We conducted a bottom-up analysis for set-top boxes and telephony products using our own power measurements and stock and usage estimates from secondary sources. The most common set-top boxes in U.S. homes in 1999 were analog cable boxes, digital cable boxes, wireless receivers, and game consoles. According to these measurements, analog cable boxes and wireless receivers draw between 10 and 15 watts, while digital cable boxes draw between 20 and 25 watts in both the Active and Standby modes. Video games used less than 2 watts in Standby mode, and about 8 watts when Active. We estimate that set-top boxes accounted for 0.7% of residential electricity use in 1999. Our investigation of telephony products included answering machines, cordless phones, cordless phone answering machine combination units, and mobile phone chargers. Answering machines, cordless phones, and combination units use between 2 and 3 watts in both the Active and Standby modes. Mobile phone chargers use about 1 watt in standby. We estimate that these telephony products account for 0.5% of U.S. residential electricity consumption. Together, set-tops and telephony constituted 1.2% of U.S. residential electricity consumption in 1999. Standby power use accounted for about 60% of this energy use. The combined total energy use of the products investigated for this study and those researched previously for this series of reports account for about 6.6% of residential electricity use in the U.S.

  5. 76 FR 47114 - Wireless E911 Location Accuracy Requirements; E911 Requirements for IP-Enabled Service Providers

    Science.gov (United States)

    2011-08-04

    ... of the `smart phone', it has been observed that the location reported by the device is enormously... calls. Vonage states that it has worked with public safety to adapt Vonage's 911 service to the... commercial mobile smartphones running VoIP applications, Wi-Fi enabled VoIP handsets, portable terminal...

  6. Phonion: Practical Protection of Metadata in Telephony Networks

    Directory of Open Access Journals (Sweden)

    Heuser Stephan

    2017-01-01

    Full Text Available The majority of people across the globe rely on telephony networks as their primary means of communication. As such, many of the most sensitive personal, corporate and government related communications pass through these systems every day. Unsurprisingly, such connections are subject to a wide range of attacks. Of increasing concern is the use of metadata contained in Call Detail Records (CDRs, which contain source, destination, start time and duration of a call. This information is potentially dangerous as the very act of two parties communicating can reveal significant details about their relationship and put them in the focus of targeted observation or surveillance, which is highly critical especially for journalists and activists. To address this problem, we develop the Phonion architecture to frustrate such attacks by separating call setup functions from call delivery. Specifically, Phonion allows users to preemptively establish call circuits across multiple providers and technologies before dialing into the circuit and does not require constant Internet connectivity. Since no single carrier can determine the ultimate destination of the call, it provides unlinkability for its users and helps them to avoid passive surveillance. We define and discuss a range of adversary classes and analyze why current obfuscation technologies fail to protect users against such metadata attacks. In our extensive evaluation we further analyze advanced anonymity technologies (e.g., VoIP over Tor, which do not preserve our functional requirements for high voice quality in the absence of constant broadband Internet connectivity and compatibility with landline and feature phones. Phonion is the first practical system to provide guarantees of unlinkable communication against a range of practical adversaries in telephony systems.

  7. Extending Tactical Fleet Communications Through VoIP

    Science.gov (United States)

    2014-09-01

    Router Network SPIT Spam-over-Internet- Telephony SRTP Secure Real-time Transport Protocol SVoIP Secure Voice Over IP TCP Transmission Control...that encodes and decodes (digital to analog or analog to digital) a signal for efficient transmission . In VoIP terminology the term codec describes the...designed for this purpose [47]. It takes an analog audio signal on a voice interface port and converts it to RTP audio packets for digital transmission

  8. Analysis of a voip telephony system with environment of ururau discrete event simulation software

    Directory of Open Access Journals (Sweden)

    Italo dos Santos Ferreira

    2016-11-01

    Full Text Available The aim of this study is to evaluate the free and open-source discrete event simulation software, Ururau. A voice over IP telephony system model was constructed in order to to evaluate the dimensioning of the resources. The model designed in Ururau was tested and compared to the results of another model of the same system, built with commercial software package Arena. The results of the simulation showed that the current system easily meets institutional demand and that resources are being underused. The results also demonstrated the viability of using of Ururau for small applications.

  9. Troublesome telephony: how users and non-users shaped the development of early British exchange telephony

    Directory of Open Access Journals (Sweden)

    Dr Michael Kay

    2015-05-01

    Full Text Available When exchange telephony was first marketed to the British public by the early telephone companies in the late nineteenth century it was as an intuitive technology requiring no specialist knowledge or training. This has gone unquestioned in subsequent telephone historiography but, as this article demonstrates, telephone instruments and systems were not always unproblematic or easy to use. Whilst other scholars have discussed important factors in the development and uptake of telephony, such as business economics and intellectual property, this article focuses on usage, and argues that difficulties in using telephone instruments and systems also influenced key changes in the operations of early British exchange systems. To understand these responses and developments it is necessary to look at the opinions and complaints of both users and non-users of telephone exchange systems. In investigating non-users as well as users, this article is influenced by the work of Sally Wyatt in Oudshoorn and Pinch's (2003 edited volume regarding users and non-users of technologies. Recovering the reactions of such people is possible through extensive use of letters received by the telephone companies or published in the periodical press, and opinions voiced at select committee meetings investigating the state of the country's telephone system. In recovering the difficulties early users and non-users faced when confronted with exchange telephone systems this article emphasises the importance of problematising the historical uptake of new technologies, and highlights how, in the case of early British telephony in particular, these problems can reveal specific facts both about historical telephone use-experience and about how exchange telephony spread around the country.

  10. IP voice over ATM satellite: experimental results over satellite channels

    Science.gov (United States)

    Saraf, Koroush A.; Butts, Norman P.

    1999-01-01

    IP telephony, a new technology to provide voice communication over traditional data networks, has the potential to revolutionize telephone communication within the modern enterprise. This innovation uses packetization techniques to carry voice conversations over IP networks. This packet switched technology promises new integrated services, and lower cost long-distance communication compared to traditional circuit switched telephone networks. Future satellites will need to carry IP traffic efficiently in order to stay competitive in servicing the global data- networking and global telephony infrastructure. However, the effects of Voice over IP over switched satellite channels have not been investigated in detail. To fully understand the effects of satellite channels on Voice over IP quality; several experiments were conducted at Lockheed Martin Telecommunications' Satellite Integration Lab. The result of those experiments along with suggested improvements for voice communication over satellite are presented in this document. First, a detailed introduction of IP telephony as a suitable technology for voice communication over future satellites is presented. This is followed by procedures for the experiments, along with results and strategies. In conclusion we hope that these capability demonstrations will alleviate any uncertainty regarding the applicability of this technology to satellite networks.

  11. Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity

    Directory of Open Access Journals (Sweden)

    Craig Valli

    2010-06-01

    Full Text Available 30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP systems to enumerate and potentially attack and compromise a wide range of vulnerable systems. This paper is an outline of preliminary research into malfeasant VoIP activity on the Internet.

  12. On a Malware Targeting Private Telephony Networks during Cyber Conflict

    Directory of Open Access Journals (Sweden)

    I. I. Androulidakis

    2013-06-01

    Full Text Available Telecommunication networks have long ago entered the Critical Infrastructure domain. Apart from the public telephony network, there is a parallel private telephony network, consisting of Private Branch Exchanges (PBXs that serve the communication needs of private or public entities. Their penetration in the market is substantial. As a result, thousands of PBX installations are present in every country serving many times more users in vital infrastructures (including health, safety, security, economy, energy. Therefore, attacking PBXs can have critical effects that disrupt society and can clearly be used in warlike situations. PBXs are an integral part of the critical infrastructure, along with the public telephony network. The contribution of this work focuses on the theoretical and practical capabilities of a malware able to target PBXs. Such an occurrence would have devastating effects on the communication confidentiality, integrity and availability.

  13. Energy-aware Wireless Multi-hop Networks

    NARCIS (Netherlands)

    Vazifehdan, J.

    2011-01-01

    Wireless networks have provided us a variety of services which facilitate communication between people beyond the physical boundaries. Mobile telephony, mobile Internet and high-deffnition video calls are examples of services supported by modern networks nowadays. Beyond this, enhancements in

  14. Competition and market strategies in the Swiss fixed telephony market

    OpenAIRE

    Balmer, Roberto E.

    2015-01-01

    Fixed telephony has long been a fundamentally important market for European telecommunications operators. The liberalisation and the introduction of regulation in the end of the 1990s, however, allowed new entrants to compete with incumbents at the retail level. A rapid price decline and a decline in revenues followed. Increased retail competition eventually led a number of national regulators to deregulate this market. In 2013, however, many European countries (including Switzerland) continu...

  15. Energy-aware Wireless Multi-hop Networks

    OpenAIRE

    Vazifehdan, J.

    2011-01-01

    Wireless networks have provided us a variety of services which facilitate communication between people beyond the physical boundaries. Mobile telephony, mobile Internet and high-deffnition video calls are examples of services supported by modern networks nowadays. Beyond this, enhancements in processing capabilities of electronic devices coupled with advances in wireless communication have resulted in the emergence of devices which have high processing and communication capabilities. Small de...

  16. A Stepwise Approach to Developing Languages for SIP Telephony Service Creation

    DEFF Research Database (Denmark)

    Palix, Nicolas; Consel, Charles; Reveillere, Laurent

    2007-01-01

    Developing a SIP-based telephony service requires a programmer to have expertise in telephony rules and constraints, the SIP protocol, distributed systems, and a SIP API, which is often large and complex. These requirements make the development of telephony software an overwhelming challenge...... a scripting language dedicated to the development of telephony services. This approach enables critical properties of services to be guaranteed and captures expertise on the operational behavior of a service. We have applied this approach to developing the Session Processing Language (SPL) dedicated to SIP...

  17. Intelligent Advanced Communications IP Telephony Feasibility for the U.S. Navy: Phase 2

    Science.gov (United States)

    2009-03-31

    90 4.1.7.2 Open Shortest Path First ( OSPF ) ............................................................. 90 4.1.7.3 Border Gateway Protocol...still in use today, however, they are considered technically obsolete by more advanced techniques, such as Open Shortest Path First ( OSPF ) and the OSI...use with IPv6. 4.1.7.2 Open Shortest Path First ( OSPF ) Open Shortest Path First ( OSPF ) 11 is a dynamic routing protocol for use in Internet

  18. Intelligent Advanced Communications IP Telephony Feasibility for the U.S. Navy. Volume 1

    Science.gov (United States)

    2007-10-01

    reliability is achieved by advertising a "virtual router" (an abstract representation of master and backup routers acting as a group) as a default gateway to...hosts on the same subnet. This increased reliability is achieved by advertising a "virtual router" (an abstract representation of master and backup...rates- from low bit-rate streaming applications to High Definition Television (HDTV) broadcast and Digital Cinema . The transport protocol for H.264

  19. Ogbuewu, IP

    African Journals Online (AJOL)

    Ogbuewu, IP. Vol 13 (2011) - Articles Egg Production Potentials of Muscovy Ducks (Cairina moschata) Raised Under Three Management Systems in the Humid Tropics Abstract. ISSN: 1119-4308. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL ...

  20. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  1. Application-Level and User-Level QoS Assessment of Audio-Video IP Transmission over Cross-Layer Designed Wireless Ad Hoc Networks

    Science.gov (United States)

    Nunome, Toshiro; Tasaka, Shuji; Nakaoka, Ken

    This paper performs application-level QoS and user-level QoS assessment of audio-video streaming in cross-layer designed wireless ad hoc networks. In order to achieve high QoS at the user-level, we employ link quality-based routing in the network layer and media synchronization control in the application layer. We adopt three link quality-based routing protocols: OLSR-SS (Signal Strength), AODV-SS, and LQHR (Link Quality-Based Hybrid Routing). OLSR-SS is a proactive routing protocol, while AODV-SS is a reactive one. LQHR is a hybrid protocol, which is a combination of proactive and reactive routing protocols. For applicationlevel QoS assessment, we performed computer simulation with ns-2 where an IEEE 802.11b mesh topology network with 24 nodes was assumed. We also assessed user-level QoS by a subjective experiment with 30 assessors. From the assessment results, we find AODV-SS the best for networks with long inter-node distances, while LQHR outperforms AODV-SS for short inter-node distances. In addition, we also examine characteristics of the three schemes with respect to the application-level QoS in random topology networks.

  2. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs

    National Research Council Canada - National Science Library

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring...

  3. Reliable Mobile IP Multicast Based on Hierarchical Local Registration

    National Research Council Canada - National Science Library

    Huanming Zhang; Quanlong Guan; Zi Zhao Zhu; Weiqi Luo

    2014-01-01

    .... In order to resolve the problems of multicast reliability in wireless networks, a framework architecture of the mobile IP multicast is proposed, which is a reliable multicast architecture based...

  4. Využití QoS pro podporu VoIP a videotelefonie ve firemní síti

    OpenAIRE

    Drobný, Jakub

    2014-01-01

    This bachelor thesis deals with an implementation of the QoS for VoIP and video telephony support in a corporate network. Case study will be worked out within this bachelor thesis emphasis on the provision of QoS. At the end of the bachelor thesis, there is economic evaluation of costs.

  5. Differential Fault Attack on KASUMI Cipher Used in GSM Telephony

    Directory of Open Access Journals (Sweden)

    Zongyue Wang

    2014-01-01

    Full Text Available The confidentiality of GSM cellular telephony depends on the security of A5 family of cryptosystems. As an algorithm in this family survived from cryptanalysis, A5/3 is based on the block cipher KASUMI. This paper describes a novel differential fault attack on KAUSMI with a 64-bit key. Taking advantage of some mathematical observations on the FL, FO functions, and key schedule, only one 16-bit word fault is required to recover all information of the 64-bit key. The time complexity is only 232 encryptions. We have practically simulated the attack on a PC which takes only a few minutes to recover all the key bits. The simulation also experimentally verifies the correctness and complexity.

  6. Wireless Networks: a brief introduction

    Indian Academy of Sciences (India)

    Wireless communication: What? Why? How many types? What is cell? Is it different from fixed landline structure? 1G systems: FDMA/FDD and Analog FM ... CDMA: IS-95 (also known as CDMA-one). 3G systems: High data rate and wideband communication. Internet access, Voice over IP (VoIP), high network capacity etc.

  7. IP over DWDM Technologies

    OpenAIRE

    Qiong Wang

    2012-01-01

    This study has discussed some shortages of IP over SDH used currently, and has proposed the necessities of IP over DWDM. It has given the structure of IP over DWDM, and has explained why it can increase its bandwidth when transiting IP packets over DWDM. The study has also discussed the two methods of realizing IP over DWDM transmission network.

  8. World Without Wires: Is Your District Ready to Go Wireless?

    Science.gov (United States)

    Villano, Matt

    2005-01-01

    In this article, the author presents the latest wireless equipments available in market. For starters, wireless networks offer mobility and flexibility: users of laptops, PDAs, tablet PCs, and wireless Voice over IP telephones can move freely about campus while staying connected to the Internet. There are two kinds of wireless networks: ad-hoc, or…

  9. Continuously Connected With Mobile IP

    Science.gov (United States)

    2002-01-01

    Cisco Systems developed Cisco Mobile Networks, making IP devices mobile. With this innovation, a Cisco router and its connected IP devices can roam across network boundaries and connection types. Because a mobile user is able to keep the same IP address while roaming, a live IP connection can be maintained without interruption. Glenn Research Center jointly tested the technology with Cisco, and is working to use it on low-earth-orbiting research craft. With Cisco's Mobile Networks functionality now available in Cisco IOS Software release 12.2(4)T, the commercial advantages and benefits are numerous. The technology can be applied to public safety, military/homeland security, emergency management services, railroad and shipping systems, and the automotive industry. It will allow ambulances, police, firemen, and the U.S. Coast Guard to stay connected to their networks while on the move. In the wireless battlefield, the technology will provide rapid infrastructure deployment for U.S. national defense. Airline, train, and cruise passengers utilizing Cisco Mobile Networks can fly all around the world with a continuous Internet connection. Cisco IOS(R) Software is a registered trademark of Cisco Systems.

  10. Change to mobile telephony coverage and billing in France

    CERN Multimedia

    IT Department

    2016-01-01

    Following recent discussions with the French and Swiss authorities, it has become clear that it is not permitted for a mobile telephony provider from one host state to transmit signals from the territory of the other. As a result, the Swisscom transmitters in France will be turned off on 29 August. From that date, coverage in France will be provided by Orange France. Users with a private subscription will be pleased to note that they will again have the ability to identify calls as private as from 18 July.   In order to ensure that you can still be contacted by your colleagues, please make sure that you have enabled roaming for voice calls. Instructions for common phone models are available at https://cern.ch/gsm-france/content/instructions. If you make use of data services, you will also need to enable data roaming to, for example, access your email whilst in France, but note that use of data services will be charged. Special arrangements have been put in place by Swisscom to ensure that k...

  11. Analyzing of MOS and Codec Selection for Voice over IP Technology

    Directory of Open Access Journals (Sweden)

    Mohd Nazri Ismail

    2009-01-01

    Full Text Available In this research, we propose an architectural solution to implement the voice over IP (VoIP service in campus environment network. Voice over IP (VoIP technology has become a discussion issue for this time being. Today, the deployment of this technology on an organization truly can give a great financial benefit over traditional telephony. Therefore, this study is to analyze the VoIP Codec selection and investigate the Mean Opinion Score (MOS performance areas evolved with the quality of service delivered by soft phone and IP phone. This study focuses on quality of voice prediction such as i accuracy of MOS between automated system and human perception and ii different types of codec performance measurement via human perception using MOS technique. In this study, network management system (NMS is used to monitor and capture the performance of VoIP in campus environment. In addition, the most apparent of implementing soft phone and IP phone in campus environment is to define the best codec selection that can be used in operational environment. Based on the finding result, the MOS measurement through automated and manual system is able to predict and evaluate VoIP performance. In addition, based on manual MOS measurement, VoIP conversations over LAN contribute more reliability and availability performance compare to WAN.

  12. PVM and IP multicast

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Hall, K.A.

    1996-12-01

    This report describes a 1994 demonstration implementation of PVM that uses IP multicast. PVM`s one-to-many unicast implementation of its pvm{_}mcast() function is replaced with reliable IP multicast. Performance of PVM using IP multicast over local and wide-area networks is measured and compared with the original unicast implementation. Current limitations of IP multicast are noted.

  13. Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2011-01-01

    Full Text Available SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors. The article describes a system that was developed on VSB-TU Ostrava as a testing tool to verify if the target VoIP PBX is adequately secured and protected against any real threats. The system tests the SIP element for several usually occurring attacks and it compiles evaluation of its overall security on the basis of successfully or unsuccessfully penetrations. The article describes the applications and algorithms that are used by system and the conclusion consists recommendations and guidelines to ensure effective protection against VoIP PBX threats. The system is designed as an open-source web application, thus allowing independent access and is fully extensible to other test modules.

  14. EEM{sup TM} wireless supervision

    Energy Technology Data Exchange (ETDEWEB)

    Bilic, H. [Ericsson-Nikola Tesla d.d. Zagreb (Croatia)

    2000-07-01

    By adding the GSM network to the communication level of Energy Management systems, energy operating centres (EOC) can offer wireless access to the supervised equipment. Furthermore EOC can profit from rapid service development in the GSM networks. With implementation of GPRS to the GSM network EOC can instantly offer wireless access to external IP based networks such as Internet and corporate Intranets. The author describes architecture and key characteristic of Ericsson EnergyMaster{sup TM} (EEM{sup TM}) system for Energy Management, how and where to implement wireless supervision, wireless access to IP addresses and also how to implement new services provided by the GSM network. (orig.)

  15. Frequency-agile antennas for wireless communications

    CERN Document Server

    Petosa, Aldo

    2013-01-01

    Mobile data subscriptions are expected to more than double and mobile wireless traffic to increase by more than tenfold over the next few years. Proliferation of smart phones, tablets, and other portable devices are placing greater demands for services such as web browsing, global positioning, video streaming, and video telephony. Many of the proposed solutions to deal with these demands will have a significant impact on antenna designs. Antennas with frequency agility are considered a promising technology to help implement these new solutions.This book provides readers with a sense of the cap

  16. Mobile location services over the next generation IP core network

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update....... The concept of mobile location services over the next generation IP networks is described. We also discuss the effectiveness of the short-range wireless network regarding a mobile user's position inside buildings and hotspot areas....

  17. Mobile IP: Security & application

    NARCIS (Netherlands)

    Tuquerres, G.; Salvador, M.R.; Sprenkels, Ron

    1999-01-01

    As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.

  18. Ensuring Software IP Cleanliness

    Directory of Open Access Journals (Sweden)

    Mahshad Koohgoli

    2007-12-01

    Full Text Available At many points in the life of a software enterprise, determination of intellectual property (IP cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  19. Impact of mobile telephony on food security in Nigeria: A case study ...

    African Journals Online (AJOL)

    This study assessed the relevance of mobile telephony to food security in Nigeria using food crop farmers in Ondo State as a case study. The study stemmed from the need to boost agricultural production in the country through timely access to relevant innovations and practices by Nigerian farmers. The study describes the ...

  20. The Development of Mobile Telephony in the World and in Croatia

    Directory of Open Access Journals (Sweden)

    Miroslav Mikula

    2012-10-01

    Full Text Available The paper first describes the invention and introduction ofmobile telephony in the world and in Croatia. Then the basiccharacteristics are compared as well as the possibilities of certaingenerations of the mobile radio telephone systems with emphasison certain advantages. Finally, the prospects of furtherdevelopment of the mobile telephones are discussed, and theadequate conclusions made.

  1. Facilitating patient self-management through telephony and web technologies in seasonal influenza

    Directory of Open Access Journals (Sweden)

    Zsolt Nagykaldi

    2010-03-01

    Conclusions Primary care patients and their clinicians can adopt and successfully utilise influenza self-management technologies. Our pilot study suggests that web resources combined with telephony technology are feasible to set up and easy to use in primary care settings.

  2. A Technical Approach to the Evaluation of Radiofrequency Radiation Emissions from Mobile Telephony Base Stations

    Directory of Open Access Journals (Sweden)

    Raimondas Buckus

    2017-03-01

    Full Text Available During the last two decades, the number of macrocell mobile telephony base station antennas emitting radiofrequency (RF electromagnetic radiation (EMR in residential areas has increased significantly, and therefore much more attention is being paid to RF EMR and its effects on human health. Scientific field measurements of public exposure to RF EMR (specifically to radio frequency radiation from macrocell mobile telephony base station antennas and RF electromagnetic field (EMF intensity parameters in the environment are discussed in this article. The research methodology is applied according to the requirements of safety norms and Lithuanian Standards in English (LST EN. The article presents and analyses RF EMFs generated by mobile telephony base station antennas in areas accessible to the general public. Measurements of the RF electric field strength and RF EMF power density were conducted in the near- and far-fields of the mobile telephony base station antenna. Broadband and frequency-selective measurements were performed outside (on the roof and on the ground and in a residential area. The tests performed on the roof in front of the mobile telephony base station antennas in the near-field revealed the presence of a dynamic energy interaction within the antenna electric field, which changes rapidly with distance. The RF EMF power density values on the ground at distances of 50, 100, 200, 300, 400, and 500 m from the base station are very low and are scattered within intervals of 0.002 to 0.05 μW/cm2. The results were compared with international exposure guidelines (ICNIRP.

  3. A Technical Approach to the Evaluation of Radiofrequency Radiation Emissions from Mobile Telephony Base Stations.

    Science.gov (United States)

    Buckus, Raimondas; Strukčinskienė, Birute; Raistenskis, Juozas; Stukas, Rimantas; Šidlauskienė, Aurelija; Čerkauskienė, Rimantė; Isopescu, Dorina Nicolina; Stabryla, Jan; Cretescu, Igor

    2017-03-01

    During the last two decades, the number of macrocell mobile telephony base station antennas emitting radiofrequency (RF) electromagnetic radiation (EMR) in residential areas has increased significantly, and therefore much more attention is being paid to RF EMR and its effects on human health. Scientific field measurements of public exposure to RF EMR (specifically to radio frequency radiation) from macrocell mobile telephony base station antennas and RF electromagnetic field (EMF) intensity parameters in the environment are discussed in this article. The research methodology is applied according to the requirements of safety norms and Lithuanian Standards in English (LST EN). The article presents and analyses RF EMFs generated by mobile telephony base station antennas in areas accessible to the general public. Measurements of the RF electric field strength and RF EMF power density were conducted in the near- and far-fields of the mobile telephony base station antenna. Broadband and frequency-selective measurements were performed outside (on the roof and on the ground) and in a residential area. The tests performed on the roof in front of the mobile telephony base station antennas in the near-field revealed the presence of a dynamic energy interaction within the antenna electric field, which changes rapidly with distance. The RF EMF power density values on the ground at distances of 50, 100, 200, 300, 400, and 500 m from the base station are very low and are scattered within intervals of 0.002 to 0.05 μW/cm². The results were compared with international exposure guidelines (ICNIRP).

  4. Using telephony data to facilitate discovery of clinical workflows.

    Science.gov (United States)

    Rucker, Donald W

    2017-04-19

     Discovery of clinical workflows to target for redesign using methods such as Lean and Six Sigma is difficult. VoIP telephone call pattern analysis may complement direct observation and EMR-based tools in understanding clinical workflows at the enterprise level by allowing visualization of institutional telecommunications activity.  To build an analytic framework mapping repetitive and high-volume telephone call patterns in a large medical center to their associated clinical units using an enterprise unified communications server log file and to support visualization of specific call patterns using graphical networks.  Consecutive call detail records from the medical center's unified communications server were parsed to cross-correlate telephone call patterns and map associated phone numbers to a cost center dictionary. Hashed data structures were built to allow construction of edge and node files representing high volume call patterns for display with an open source graph network tool.  Summary statistics for an analysis of exactly one week's call detail records at a large academic medical center showed that 912,386 calls were placed with a total duration of 23,186 hours. Approximately half of all calling called number pairs had an average call duration under 60 seconds and of these the average call duration was 27 seconds.  Cross-correlation of phone calls identified by clinical cost center can be used to generate graphical displays of clinical enterprise communications. Many calls are short. The compact data transfers within short calls may serve as automation or re-design targets. The large absolute amount of time medical center employees were engaged in VoIP telecommunications suggests that analysis of telephone call patterns may offer additional insights into core clinical workflows.

  5. IP-Based TV Technologies, Services and Multidisciplinary Applications

    NARCIS (Netherlands)

    O.M. Bonastre; M.J. Montpetit; P.S. Cesar Garcia (Pablo Santiago)

    2013-01-01

    htmlabstractThe move to Internet Protocol (IP)-based content delivery services has challenged the television industry by allowing high-quality television content to be delivered using the Internet, wired and wireless, private and public. The new convergence paradigm is already playing out its

  6. VoIP makes voice heard--functionality is up.

    Science.gov (United States)

    Wade, Phil; Wakelam, Mathew

    2008-05-01

    Phil Wade, sales and marketing director, and Mathew Wakelam, VoIP product manager, at alarm and communication specialist Static Systems Group, discuss wireless VoLP's potential in healthcare establishments and examine how, in particular, the technology can be successfully integrated with nurse call systems.

  7. Voice Quality Estimation in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Petr Zach

    2015-01-01

    Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.

  8. Exploring User’s Habits and Virtual Communities to Improve IP-Connectivity Management

    NARCIS (Netherlands)

    Rigolin Ferreira Lopes, R.; Yokoyama, Roberta Sadao; Kimura, Bruno Yuji Lino; Pawar, P.; van Beijnum, Bernhard J.F.; dos Sandos Moreira, Edson

    2009-01-01

    A wireless connectivity island is a geographic area covered by a particular wireless ISP. Nowadays, mobile users possessing multi-homing mobile devices can have IP-connectivity almost everywhere, while being on the move. In terms of vertical handover, these users jump from a connectivity island to

  9. How internet telephony could improve communication for hearing-impaired individuals.

    Science.gov (United States)

    Mantokoudis, Georgios; Kompis, Martin; Dubach, Patrick; Caversaccio, Marco; Senn, Pascal

    2010-09-01

    To test, whether modern Internet telephony with a broadband transmission (0.1-8 kHz) of speech improves speech perception in comparison to conventional telephony (0.3-3.5 kHz) in hearing-impaired and normal-hearing adults. Experimental clinical study. Audiologic laboratory in a tertiary referral center in Bern, Switzerland. Twenty-one adult hearing-impaired patients consisting of 11 users of cochlear implants and 10 users of hearing aids were selected from the institution's database based on pure tone audiograms, speech perception scores, and device settings. Ten normal-hearing adults served as controls. Superiority trial of speech perception assessed with Internet versus conventional telephone quality and noninferiority trial of Internet telephone versus frequency restricted, uncompressed audio CD quality. A modern broadband codec was chosen to simulate Internet telephone quality, and ideal network conditions without packet loss were assumed. Speech perception scores of a monosyllabic word test in quiet and a sentence test in background noise assessed in different audio qualities. : Test scores were, on average, 15% (4-33) higher in the monosyllabic word and 25% (8-51) higher in the sentence test using Internet versus conventional telephone quality across all subject groups. Speech perception was not significantly different when Internet telephone quality was compared with high-cut CD quality. Internet telephony offers significantly improved speech perception to hearing-impaired and normal-hearing adults under ideal laboratory conditions through doubling the frequency range and through conserving audio quality during digital sound processing.

  10. Evaluation of IP Portfolios

    DEFF Research Database (Denmark)

    Søberg, Peder Veng

    2009-01-01

    As a result of an inquiry concerning how to evaluate IP (intellectual property) portfolios in order to enable the best possible use of IP resources within organizations, an IP evaluation approach primarily applicable for patents and utility models is developed. The developed approach is useful...... in order to discuss, visualize and align IPR issues with different management functions within the organization. Unlike existing approaches the present approach takes into account such value indicators as remaining lifetime, geographical range, broadness of scope and product strategic considerations...

  11. Agency IP Data

    Data.gov (United States)

    National Aeronautics and Space Administration — Public data set for NASA Agency Intellectual Property (IP). The distribution contains both Patent information as well as General Release of Open Source Software.

  12. Extraction of Electronic Evidence from VoIP: Forensic Analysis of A Virtual Hard Disk Vs RAM

    Directory of Open Access Journals (Sweden)

    david irwin

    2011-03-01

    Full Text Available The popularity of Voice over the Internet Protocol (VoIP is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global telephony service, in which it is difficult to verify the user’s identification. The security of placing such calls may also be appealing to criminals, as many implementations use strong encryption to secure both the voice payload as well as to control messages making monitoring such VoIP calls difficult since conventional methods such as wire-tapping is not applicable to VoIP calls. Therefore, other methods of recovering electronic evidence and information from VoIP are required.  This research looks at what protocol evidence remains after a VoIP call has taken place examining both a virtual hard disk and the Random Access Memory (RAM. This paper proposes a set of identifiable credentials based on packet header information contained within the VoIP protocol stack. A series of controlled tests were undertaken whereby these credentials were forensically searched for on a virtual machine which was used to make the VoIP call. This experiment was then repeated by a search for the same protocol credentials within the RAM.

  13. Classifier fusion for VoIP attacks classification

    Science.gov (United States)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  14. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  15. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  16. Mobile IP and protocol authentication extension

    OpenAIRE

    Nguyen, Phuc V.

    2011-01-01

    Mobile IP is an open standard, defined by the Internet Engineering Task Force (IETF) RFC 3220. By using Mobile IP, you can keep the same IP address, stay connected, and maintain ongoing applications while roaming between IP networks. Mobile IP is scalable for the Internet because it is based on IP - any media that can support IP can support Mobile IP.

  17. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  18. Change of mobile telephony operator and mobile telephone numbers - 24 June 2015

    CERN Multimedia

    2015-01-01

    Following a call for tenders issued in 2014, Swisscom will replace Sunrise as CERN’s mobile telephony operator from 24 June 2015. As of this date, CERN mobile telephone numbers will change from the +41 (0)76 487 xxxx format to the +41 (0)75 411 xxxx format and people with a CERN mobile telephony subscription will need to change their SIM card.   SIM card replacement New SIM cards will be available for collection between 1 June and 30 June from distribution points located around CERN. Please check the list of distribution points to find where you will need to collect your SIM card based on your department and group. After 1st July, you will be able to collect your SIM card from the Telecom lab. Please open a SNOW request via this link if: you will not be at CERN in June, you are using a SIM card in a modem or other special device for machine-to-machine communications.   New mobile phone numbers CERN mobile numbers will change from the +41 (0)76 487 xxxx format to the +41...

  19. Benefícios do Uso do VoIP: um estudo de caso na GMBenefits from the VOIP Use: a case study at GMBeneficios del Uso del VoIP: un estudio de caso en la GM

    Directory of Open Access Journals (Sweden)

    FEITERA, Carlos Henrique

    2006-05-01

    Full Text Available RESUMOEste artigo traz uma visão do que é o VoIP, assim como suas principais aplicações, os fatores que as empresas buscam para minimizar custos em telefonia, as vantagens e desvantagens, a agregação de novas tecnologias, como WI-FI e o VOIP, e o futuro da telefonia no Brasil.Serão analisadas as diferenças entre Telefonia IP e VOIP paralelamente, e será tratada como base e estudo de caso a empresa General Motors do Brasil. O objetivo é mostrar o conteúdo que envolve essa inovadora tecnologia. Podemos dizer que a vontade de abordar esse tema foi despertada não somente por ser uma tecnologia inovadora que vem substituindo a telefonia convencional reduzindo os custos das empresas e trocando serviços e equipamentos obsoletos por uma série de novos serviços e oferecendo muitos recursos e benefícios, mas nos chamou a atenção também pelo fato de ser uma tecnologia que está revolucionando o mercado de telecomunicações, já que as empresas de telefonia prestadoras de serviços consomem uma boa parte da renda das empresas e pessoas, e também por exigir, nesse período de transição, muita habilidade em adequar as necessidades do cliente ao uso dessas ferramentas.ABSTRACTThis article brings a vision about Voip, as well as itself main applications, the factors with that the companies search to decrease costs in telephony, the advantages and disadvantages, aggregation of new technologies as wi-fi to the VOIP and the future of the telephony in Brazil. The differences between Telephony IP and VOIP will be analyzed parallel, and will be showed with as base study case of the General Motors. Our objective for this subject is to show the content that involves this fantastic technology. We can say that will to approach this subject it was influenced not only by being an innovative technology that comes substituting the conventional telephony, reducing the costs of the companies, and changing to services and obsolete equipments for a series

  20. Stud.IP

    OpenAIRE

    Stockmann, Ralf; Berg, Alexander

    2005-01-01

    Dieser Beitrag beschreibt die Konzeption, den Funktionsumfang und Erfahrungswerte der Open-Source-eLearning-Plattform Stud.IP. Der Funktionsumfang umfasst für jede einzelne Veranstaltung Ablaufpläne, das Hochladen von Hausarbeiten, Diskussionsforen, persönliche Homepages, Chaträume u.v.a. Ziel ist es hierbei, eine Infrastruktur des Lehrens und Lernens anzubieten, die dem Stand der Technik entspricht. Wissenschaftliche Einrichtungen finden zudem eine leistungsstarke Umgebung zur Verwaltung ihr...

  1. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  2. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  3. Next Generation Intelligent Wireless Infrastructure

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg

    2010-01-01

    could think the wireless revolution is over. However, future connectivity will be wireless and ubiquitous. Therefore the future of wireless infrastructures seems to be in front of a remarkable evolution as this paper will describe. With a vision of creating continuous seamless user connectivity as well...... as having physical devices/things connected through the wide spread usage of sensor and RFID near field communication technologies the network will increase in size with a order of magnitude compared to today. Additionally having the widespread Internet protocol technologies as a fundamental building block...... efficient ways of optimizing the spectrum usage are necessary. The extent of IP-based sensor networks with explode due to the rapid evolution in the relationship between processing power, cost, power consumption and physical size....

  4. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  5. The Telephony in the City of Santiago of Cuba (1893 - 1959

    Directory of Open Access Journals (Sweden)

    Maithe Sánchez-Garrido

    2016-02-01

    Full Text Available In spite of the substantial advantages which it specifically contributed the restoration of the telephone in Cuba and in the oriental locality, like an element of modernity that contributed to improve the form of life of the population, as well as the quality of mass media, the subject from its arrival to Santiago of Cuba is very little disclosed and/or not known, to grief that with the triumph of the Cuban Revolution considerably spread the use of the same one and some writings were published on the matter. The present research shows an analysis of the historical evolution of the telephony in the Island, but having like attention center the city of Santiago of Cuba. For it the antecedents of this phenomenon consider, the political, economic-social and cultural circumstances that influenced in their evolution and development, as well as their within the framework local incidence.

  6. Facilitating patient self-management through telephony and web technologies in seasonal influenza.

    Science.gov (United States)

    Nagykaldi, Zsolt; Calmbach, Walter; Dealleaume, Lauren; Temte, Jonathan; Mold, James; Ryan, John G

    2010-01-01

    The aim of this project was to develop and test information technology implementations that could assist patients with influenza self-management in primary care settings. Although testing was conducted in the context of seasonal influenza, the project aimed to develop a blueprint that primary care practices could use in an influenza pandemic. Four primary care practice-based research networks (PBRNs) systematically designed, implemented, tailored and tested a tiered patient self-management technology model in 12 primary care practices during the peak of the 2007 to 2008 influenza season. Participating clinicians received a customised practice website that included a bilingual influenza self-triage module, a downloadable influenza toolkit and electronic messaging capability. As an alternative option, a bilingual, interactive seasonal influenza telephone hotline that patients could call for assistance was provided. Influenza self-management web pages presented via nine customised practice websites received 1060 hits between February and April of 2008. The Self-management Influenza Toolkit was downloaded 76 times and 185 Influenza Self-Triage Module sessions were completed via practice websites during the course of testing. Logs of the telephony hotline indicated 88 calls between February and April 2008. Seventy-two percent of callers had influenza-like symptoms and 18% were eligible for antiviral therapy. The Spanish language option was selected by 21% of callers. Qualitative feedback from 37 patients (29 English and 8 Spanish) and six clinicians from four PBRNs indicated ease of use, problem-free access and navigation, useful and adequate information that was utilised in various ways by patients and a high level of overall satisfaction with these technologies. Both patients and clinicians provided rich and meaningful feedback about future improvements. Primary care patients and their clinicians can adopt and successfully utilise influenza self

  7. Identification of a quantitative method for the evaluation of the environmental quality of educational centers near to antennas of base stations of mobile telephony

    Directory of Open Access Journals (Sweden)

    Alexander Armesto Arenas

    2017-01-01

    Conclusions: The proposed method allows measuring indices of environmental quality in educational centers affected by the location and function of antennas base stations of mobile telephony. Additionally, a quantitative method prevents the need to implement a subjective and unspecific evaluation.

  8. Analisis Kinerja Voip Server pada Wireless Access Point

    Directory of Open Access Journals (Sweden)

    Effan Najwaini

    2015-01-01

    Abstract Voice quality on VoIP communication is caused by many factors, one of which is the quality of the server. Choosing PC platform or server which is suitable is the main issue in developing VoIP network. A bad server performance or not equivalent with the most of users will degrade the sound quality or even not able to connect between users. Tthe test carried out to the performance of the wireless access point Linksys WRT54GL which is used as a VoIP server. The test was carried out to determine how many VoIP calls which are able to be serviced by a wireless access point as a VoIP server and how long the server needs to be able to process every signal of SIP and RTP packet. Based on the test result performed, the VoIP server on the wireless access point is able to serve VoIP communication well for a few calls number, so it is worth to be implemented on the use of small scale. The use of Native Bridging method in handling the media performed by the server can increase the number of calls that were able to be served about 3 to 7 times compared with other methods.     Keywords— VoIP, Asterisk, Acess Point, WRT54GL, OpenWRT, Performance

  9. Foundations of hardware IP protection

    CERN Document Server

    Torres, Lionel

    2017-01-01

    This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutar...

  10. Vertical displacement of Ips Latidens and Ips Pini

    Science.gov (United States)

    Daniel R. Miller

    2000-01-01

    The effect of semiochemical interruptants was examined for Ips latidens (LeConte) and Ips pini (Say) using artificial trees (tall-traps) consisting of an array of seven Lindgren multiple-funnel traps suspended vertically on a rope ladder. S-(+)- Ipsdienol reduced the numbers of I. latidens captured in (±)-ipsenol...

  11. Identification of a major IP5 kinase in Cryptococcus neoformans confirms that PP-IP5/IP7, not IP6, is essential for virulence

    OpenAIRE

    Cecilia Li; Sophie Lev; Adolfo Saiardi; Desmarini Desmarini; Sorrell, Tania C.; Djordjevic, Julianne T.

    2016-01-01

    Fungal inositol polyphosphate (IP) kinases catalyse phosphorylation of IP3 to inositol pyrophosphate, PP-IP5/IP7, which is essential for virulence of Cryptococcus neoformans. Cryptococcal Kcs1 converts IP6 to PP-IP5/IP7, but the kinase converting IP5 to IP6 is unknown. Deletion of a putative IP5 kinase-encoding gene (IPK1) alone (ipk1Δ), and in combination with KCS1 (ipk1Δkcs1Δ), profoundly reduced virulence in mice. However, deletion of KCS1 and IPK1 had a greater impact on virulence attenua...

  12. IMPLEMENTASI IP V 6 MULTICAST DALAM JARINGAN WIRELESS

    Directory of Open Access Journals (Sweden)

    Dessyanto Boedi Prasetyo

    2015-04-01

    Full Text Available Teleconferencing is a media technology to create a long-distance communication of audio data and video can also be data. With teleconferencing you can perform a communication with another person that much with a relatively low cost. At this time the use of computers in a network more complex. Some time ago has developed a new network protocol, the IPv6 is a solution to overcome the deficiencies found on previous generation protocol is IPv4 Multicast is a communication mechanism of one-to-many, or point-to-multipoint. In IPv6 technology, multicast is a basic feature and has become the standard specification of every router. In the implementation is done using IPv6 multicast teleconferencing application on the LAN network topology. At the teleconference has been observed with the amount of traffic parameters that occurred during the last teleconference. Used in this study SDR and RAT teleconferencing applications. SDR (Session Directory Tool and RAT (Robust Audio Tool used for teleconferencing, which is part of the MBone tools. Protocol MLD (Multicast Listener Directory is also used in this study for multicast signaling can run well.

  13. Beyond iPS!

    Directory of Open Access Journals (Sweden)

    Editorial

    2012-01-01

    Full Text Available It’s undoubtedly a jubilant moment for scientists and clinicians working in the stem cell arena as Prof. Gurdon and Prof. Shinya Yamanaka have been chosen for the Nobel Prize in Physiology & Medicine this year. The mystery of cell biology is something unfathomable and probably the work of this duo as well as the other scientists, who have put their hands on in- vitro de-differentiation have opened our eyes to a new window or a new paradigm in cell biology. The iPS invention has brought a lot of hope in terms of potential direct benefits to treat several diseases, which have no definite options at the moment. But, we envisage that several spin-offs could come out of this invention and one very significant spin-off finding recently witnessed is the finding by Prof. Masaharu Seno and his team of researchers at the Okayama University, Japan (Chen L, et al. 2012, PLoS ONE 7(4:e33544.doi:10.1371/journal.pone.0033544. According to Prof. Seno, mouse iPS cells (miPS when cultured in the conditioned medium derived from cancer cell lines, differentiate into cancer stem cells (CSCs. While differentiating into CSCs, they do retain the potential to develop endothelial progenitor cells. Several questions arise here: 1.Are these miPS derived CSCs really pluripotent, even if the terminal differentiation destined to specific phenotypes? 2.Shouldn’t the Cancer Stem Cells be termed as cancer progenitor cells, as till date they are considered to be producing only cancer cells but not pluripotent to yield other types of normal tissues? The spin-offs could be infinite as the process of differentiation and de-differentiation happening due to trillions of signals and pathways, most still remaining not-so-well understood. A special mention should be made to Prof. Shinya Yamanaka as he has several sterling qualities to be a role-model for budding scientists. Apart from his passion for science, which made him shift his career from orthopedics to a cell biologist, his

  14. Identification of a major IP5 kinase in Cryptococcus neoformans confirms that PP-IP5/IP7, not IP6, is essential for virulence.

    Science.gov (United States)

    Li, Cecilia; Lev, Sophie; Saiardi, Adolfo; Desmarini, Desmarini; Sorrell, Tania C; Djordjevic, Julianne T

    2016-04-01

    Fungal inositol polyphosphate (IP) kinases catalyse phosphorylation of IP3 to inositol pyrophosphate, PP-IP5/IP7, which is essential for virulence of Cryptococcus neoformans. Cryptococcal Kcs1 converts IP6 to PP-IP5/IP7, but the kinase converting IP5 to IP6 is unknown. Deletion of a putative IP5 kinase-encoding gene (IPK1) alone (ipk1Δ), and in combination with KCS1 (ipk1Δkcs1Δ), profoundly reduced virulence in mice. However, deletion of KCS1 and IPK1 had a greater impact on virulence attenuation than that of IPK1 alone. ipk1Δkcs1Δ and kcs1Δ lung burdens were also lower than those of ipk1Δ. Unlike ipk1Δ, ipk1Δkcs1Δ and kcs1Δ failed to disseminate to the brain. IP profiling confirmed Ipk1 as the major IP5 kinase in C. neoformans: ipk1Δ produced no IP6 or PP-IP5/IP7 and, in contrast to ipk1Δkcs1Δ, accumulated IP5 and its pyrophosphorylated PP-IP4 derivative. Kcs1 is therefore a dual specificity (IP5 and IP6) kinase producing PP-IP4 and PP-IP5/IP7. All mutants were similarly attenuated in virulence phenotypes including laccase, urease and growth under oxidative/nitrosative stress. Alternative carbon source utilisation was also reduced significantly in all mutants except ipk1Δ, suggesting that PP-IP4 partially compensates for absent PP-IP5/IP7 in ipk1Δ grown under this condition. In conclusion, PP-IP5/IP7, not IP6, is essential for fungal virulence.

  15. Effects of the Wireless Channel, Signal Compression and Network Architecture on Speech Quality in Voip Networks

    National Research Council Canada - National Science Library

    Nikolaos, Tiantioukas

    2007-01-01

    .... The purpose of this thesis is to measure the quality of voice in VoIP communications. More specifically it investigates the effects of wireless channel conditions as well as channel coding and compression on the received speech quality...

  16. Cooperative Power Saving Strategies for IP-Services Supported over DVB-H Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, F.H.P.; Katz, Marcos

    2007-01-01

    This paper introduces power saving strategies for cooperative wireless communication systems. The described scenario focuses on IP-services over DVB-H networks showing the strength of non-altruistic cooperation between mobile devices. The envisioned cooperation is based on cellular reception...

  17. PV-solar / wind hybrid energy system for GSM/CDMA type mobile telephony base station

    Energy Technology Data Exchange (ETDEWEB)

    Nema, Pragya; Rangnekar, Saroj [Energy Engineering Department, Maulana Azad National Institute of Technology , Bhopal-462007 M.P. (India); Nema, R.K. [Electrical Engineering Department, Maulana Azad National Institute of Technology, Bhopal-462007 M.P. (India)

    2010-07-01

    This paper gives the design idea of optimized PV-Solar and Wind Hybrid Energy System for GSM/CDMA type mobile base station over conventional diesel generator for a particular site in central India (Bhopal). For this hybrid system ,the meteorological data of Solar Insolation, hourly wind speed, are taken for Bhopal-Central India (Longitude 77 deg.23'and Latitude 23 deg.21' ) and the pattern of load consumption of mobile base station are studied and suitably modeled for optimization of the hybrid energy system using HOMER software. The simulation and optimization result gives the best optimized sizing of wind turbine and solar array with diesel generator for particular GSM/CDMA type mobile telephony base station. This system is more cost effective and environmental friendly over the conventional diesel generator. It should reduced approximate 70%-80% fuel cost over conventional diesel generator and also reduced the emission of CO2 and other harmful gasses in environments. It is expected that the newly developed and installed system will provide very good opportunities for telecom sector in near future.

  18. Location and Unlocation: Examining Gender and Telephony through Autoethnographic Textual and Visual Methods

    Directory of Open Access Journals (Sweden)

    Lia Bryant BSW, PhD in Sociology

    2013-02-01

    Full Text Available Studies on gender and telephony tend to be quantitative and depict the purposes for which women and men use mobile telephones and landlines. Qualitative studies on the topic predominantly rely on face-to-face interviews to examine how telephone use genders space. We suggest these traditional methods of data collection leave unexamined the emotional and social relationships that emerge and are enabled by telephone use, which at times reconfigure and gender social spaces. In this article we present a collaborative autoethnographic inquiry based on our own telephone lives. We introduce a reflexive visual and textual methodological design, specifically diary notes, memory work, and photography, developed from our lives as researcher and researched. We examine an important theme in our findings, the physical placement of the telephone and the phone holder's awareness of the physicality of the telephone, which illustrates the importance of our methodological choices. We show how the placement of the phone by the users both genders space and creates emotional spaces.

  19. Gevaar VoIP voor telecomsector overdreven

    NARCIS (Netherlands)

    Deventer, M.O. van; Wegberg, M. van

    2004-01-01

    Het is een hype Voice-over-IP (VoIP) voor te stellen als een ontwrichtende technologie die de telecomindustrie ingrijpend zal veranderen. Maar hoe ontwrichtend is VoIP eigenlijk? Oskar van Deventer en Marc van Wegberg analyseren drie vormen van VoIP en laten zien dat alleen ‘VoIP-chat’ potentieel

  20. Considerations on VoIP Throughput in 802.11 Networks

    Directory of Open Access Journals (Sweden)

    POTORAC, A. D.

    2009-10-01

    Full Text Available Voice data packets have to arrive at the destination in time, with a defined cadence and with low and constant delay in order to allow the real time voice reconstruction. From this point of view, transmitting voice over IP networks is the most sensitive category of applications, especially when wireless medium is involved. The paper discusses the possibilities of transmitting the maximum number of simultaneous voice streams over 802.11 wireless networks considering the main factors which impact with VoIP throughput, in a basic scenario. Starting from a proposed communication model, the number of simultaneous possible VoIP sessions is calculated, taking into consideration the contribution of the protocol overheads, the security overheads, the PHY level timings and the CODEC proprieties. Numerical results are generated and compared.

  1. Wireless Communications

    Science.gov (United States)

    1991-01-01

    A technology utilization project led to the commercial adaptation of a Space Shuttle Orbiter wireless infrared voice communications system. The technology was adapted to a LAN system by Wilton Industries, one of the participants. Because the system is cable-free, installation charges are saved, and it can be used where cable is impractical. Resultant products include the IRplex 6000. Transceivers can be located anywhere and can include mobile receivers. The system provides wireless LAN coverage up to 44,000 square feet. applications include stock exchange communications, trade shows, emergency communications, etc.

  2. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  3. Wireless Technician

    Science.gov (United States)

    Tech Directions, 2011

    2011-01-01

    One of the hottest areas in technology is invisible. Wireless communications allow people to transmit voice messages, data, and other signals through the air without physically connecting senders to receivers with cables or wires. And the technology is spreading at lightning speed. Cellular phones, personal digital assistants, and wireless…

  4. Error and Congestion Resilient Video Streaming over Broadband Wireless

    Directory of Open Access Journals (Sweden)

    Laith Al-Jobouri

    2015-04-01

    Full Text Available In this paper, error resilience is achieved by adaptive, application-layer rateless channel coding, which is used to protect H.264/Advanced Video Coding (AVC codec data-partitioned videos. A packetization strategy is an effective tool to control error rates and, in the paper, source-coded data partitioning serves to allocate smaller packets to more important compressed video data. The scheme for doing this is applied to real-time streaming across a broadband wireless link. The advantages of rateless code rate adaptivity are then demonstrated in the paper. Because the data partitions of a video slice are each assigned to different network packets, in congestion-prone wireless networks the increased number of packets per slice and their size disparity may increase the packet loss rate from buffer overflows. As a form of congestion resilience, this paper recommends packet-size dependent scheduling as a relatively simple way of alleviating the buffer-overflow problem arising from data-partitioned packets. The paper also contributes an analysis of data partitioning and packet sizes as a prelude to considering scheduling regimes. The combination of adaptive channel coding and prioritized packetization for error resilience with packet-size dependent packet scheduling results in a robust streaming scheme specialized for broadband wireless and real-time streaming applications such as video conferencing, video telephony, and telemedicine.

  5. Development and Application of a Wireless, Networked Raspberry Pi Controlled Head Mounted Tactile Display (HMTD)

    Science.gov (United States)

    2016-09-01

    other. 3.2.4.2 Network Communication We used a TCP/IP client– server protocol over wireless ad hoc mode for network communication. Two Wi-Fi capable...became an ideal replacement. The RPi’s size and weight support HMTD portability; the ad hoc wireless-networking mode allows a network of them to move...Raspberry Pi, wireless ad hoc networking, head-mounted tactile display, tactile communication, HMTD 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  6. A Design of SDN Based IP Mobility Management Considering Inter-Domain Handovers and Its Evaluation

    Directory of Open Access Journals (Sweden)

    Misumi Hata

    2017-06-01

    Full Text Available To use IP services continually while users are moving with their mobile devices, IP mobility management that enables them to keep IP communication is necessary. Although Mobile IP is a popular method to manage IP mobility, Mobile IP has a problem that there is a possibility of a mobile node (MN communicating over a redundant route. Then, Software Defined Network (SDN based IP mobility management has emerged to solve this problem. Most of these solutions focus on intra-domain handovers and routing. However, since wireless network environment has spread, mobile devices move across domains during communication. To deal with this, we need to look upon inter-domain handovers and routing. In this paper, we propose a SDN based IP mobility management scheme considering situation of mobile devices moving across domains. This proposed scheme focuses on inter-domain handovers and introduces efficient functions of management information sharing and inter-domain routing. Experimental results show the desired effects of the proposed scheme: optimizing communication route and keeping the management information exchange traffic low.

  7. Data storage system for wireless sensor networks

    OpenAIRE

    Sacramento, David

    2015-01-01

    Dissertação de mestrado, Engenharia Informática, Faculdade de Ciências e Tecnologia, Universidade do Algarve, 2015 Wireless sensor networks (WSNs) are starting to have a high impact on our societies and, for next generation WSNs to become more integrated with the Internet, researchers recently proposed to embed Internet Protocol (IP) v6 into such very constrained networks. Also, Constrained Application Protocol (CoAP) and Observe have been proposed for RESTful services to be pr...

  8. Wireless access to a pharmaceutical database: a demonstrator for data driven Wireless Application Protocol (WAP) applications in medical information processing.

    Science.gov (United States)

    Schacht Hansen, M; Dørup, J

    2001-01-01

    The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if

  9. Integrating Wireless Networking for Radiation Detection

    Science.gov (United States)

    Board, Jeremy; Barzilov, Alexander; Womble, Phillip; Paschal, Jon

    2006-10-01

    As wireless networking becomes more available, new applications are being developed for this technology. Our group has been studying the advantages of wireless networks of radiation detectors. With the prevalence of the IEEE 802.11 standard (``WiFi''), we have developed a wireless detector unit which is comprised of a 5 cm x 5 cm NaI(Tl) detector, amplifier and data acquisition electronics, and a WiFi transceiver. A server may communicate with the detector unit using a TCP/IP network connected to a WiFi access point. Special software on the server will perform radioactive isotope determination and estimate dose-rates. We are developing an enhanced version of the software which utilizes the receiver signal strength index (RSSI) to estimate source strengths and to create maps of radiation intensity.

  10. Running TCP/IP over ATM Networks.

    Science.gov (United States)

    Witt, Michael

    1995-01-01

    Discusses Internet protocol (IP) and subnets and describes how IP may operate over asynchronous transfer mode (ATM). Topics include TCP (transmission control protocol), ATM cells and adaptation layers, a basic architectural model for IP over ATM, address resolution, mapping IP to a subnet technology, and connection management strategy. (LRW)

  11. Offloading IP Flows onto Lambda-Connections

    NARCIS (Netherlands)

    Fioreze, Tiago; Oude Wolbers, Mattijs; van de Meent, R.; Pras, Aiko

    2007-01-01

    Optical networks are capable of switching IP traffic via lambda connections. In this way, big IP flows that overload the regular IP routing level may be moved to the optical level, where they get better Quality of Service (QoS). At the same time, the IP routing level is off-loaded and can serve

  12. DNA-ČIP TEHNOLOGIJA

    OpenAIRE

    BOLARIĆ, SNJEŽANA; Trusk, Marija; Kozumplik, Vinko; Vokurka, Aleš

    2009-01-01

    Usporedno s razvojem DNA molekularnih markera kao ishodišnih tehnologija analiza DNA, 90-tih godina prošlog stoljeća znanstvenici su počeli razvijati novu tehnologiju nazvanu DNA-čip. Naziv dolazi od toga što se, tehnički gledano, na maloj staklenoj površini nalaze oligonukleotidni lanci poznatog slijeda baza, što podsječa na elektronički čip. Ostali nazivi koji se spominju u literaturi su: biochip, DNA microarray, gene array, gene chip i drugi. Prema namjeni eksperimenata razvijena su tri gl...

  13. Seamless handoff in Mobile IP

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert; El Malki, Karim; Soliman, Hesham

    2001-01-01

    In a system and method for handing off a mobile node in a seamless manner in a wireless access network, procedures are implemented for allowing the mobile node to synchronize the handoff with a base node (e.g., a home agent) and a correspondent node. In this way, a seamless handoff may be achieved,

  14. Cell death induced by GSM 900-MHz and DCS 1800-MHz mobile telephony radiation.

    Science.gov (United States)

    Panagopoulos, Dimitris J; Chavdoula, Evangelia D; Nezis, Ioannis P; Margaritis, Lukas H

    2007-01-10

    In the present study, the TUNEL (Terminal deoxynucleotide transferase dUTP Nick End Labeling) assay--a well known technique widely used for detecting fragmented DNA in various types of cells--was used to detect cell death (DNA fragmentation) in a biological model, the early and mid stages of oogenesis of the insect Drosophila melanogaster. The flies were exposed in vivo to either GSM 900-MHz (Global System for Mobile telecommunications) or DCS 1800-MHz (Digital Cellular System) radiation from a common digital mobile phone, for few minutes per day during the first 6 days of their adult life. The exposure conditions were similar to those to which a mobile phone user is exposed, and were determined according to previous studies of ours [D.J. Panagopoulos, A. Karabarbounis, L.H. Margaritis, Effect of GSM 900-MHz mobile phone radiation on the reproductive capacity of D. melanogaster, Electromagn. Biol. Med. 23 (1) (2004) 29-43; D.J. Panagopoulos, N. Messini, A. Karabarbounis, A.L. Philippetis, L.H. Margaritis, Radio frequency electromagnetic radiation within "safety levels" alters the physiological function of insects, in: P. Kostarakis, P. Stavroulakis (Eds.), Proceedings of the Millennium International Workshop on Biological Effects of Electromagnetic Fields, Heraklion, Crete, Greece, October 17-20, 2000, pp. 169-175, ISBN: 960-86733-0-5; D.J. Panagopoulos, L.H. Margaritis, Effects of electromagnetic fields on the reproductive capacity of D. melanogaster, in: P. Stavroulakis (Ed.), Biological Effects of Electromagnetic Fields, Springer, 2003, pp. 545-578], which had shown a large decrease in the oviposition of the same insect caused by GSM radiation. Our present results suggest that the decrease in oviposition previously reported, is due to degeneration of large numbers of egg chambers after DNA fragmentation of their constituent cells, induced by both types of mobile telephony radiation. Induced cell death is recorded for the first time, in all types of cells

  15. Third Generation Telephony: New Technological Support for Computer Assisted Language Learning

    OpenAIRE

    Jose Carlos Garcia Cabrero

    2002-01-01

    The expansion of the lnternet has Ied to the development of distance teaching models based on the net (e learning). One of the crucial factors in this phenomenon is the continuous training required by workers to maintain or improve their professional skills. Foreign languages are, without doubt, one of the most in demand subjects. This is because they are needed for comunication in an increasingly globalized world. The development of new wireless communication technologies, UMTS or 3G n...

  16. THIRD GENERATION TELEPHONY: NEW TECHNOLOGICAL SUPPORT FOR COMPUTER ASSISTED LANGUAGE LEARNING

    Directory of Open Access Journals (Sweden)

    Jose Carlos Garcia Cabrero

    2002-06-01

    Full Text Available The expansion of the lnternet has Ied to the development of distance teaching models based on the net (e learning. One of the crucial factors in this phenomenon is the continuous training required by workers to maintain or improve their professional skills. Foreign languages are, without doubt, one of the most in demand subjects. This is because they are needed for comunication in an increasingly globalized world. The development of new wireless communication technologies, UMTS or 3G nets, and their corresponding access terminals (Palm-size PCs, PPCs, with wireless telephone connection. also called smart-phones. will enable solutions to be found for some of the problems Iaeed hy current e-learning users. These problems include access speed and the physical constraints of tlhe ( The new wireless comunication technologies will bring other benefits like portability. always on-line, etc. This article presents one on' the world's first prototypes of language learning software or smart-phones, produced by the Laboratorio de lngenieria Didactica e lngenieria Linguistica of UNED (Didactic Engineering and Linguistic Engineering Laboratory (LIDIL, http://www.vip.~ined.es. i¿le Enl

  17. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  18. Clustering of IP3 receptors by IP3 retunes their regulation by IP3 and Ca2+

    OpenAIRE

    Taufiq-Ur-Rahman,; Skupin, Alexander; Falcke, Martin; Taylor, Colin W.

    2009-01-01

    The versatility of Ca2+ signals derives from their spatio-temporal organization1,2. For Ca2+ signals initiated by inositol trisphosphate (IP3) this requires local interactions between IP3 receptors (IP3R)3,4 mediated by their rapid stimulation and slower inhibition4 by cytosolic Ca2+. This allows hierarchical recruitment of Ca2+ release events as the IP3 concentration increases5. Single IP3R respond first, then clustered IP3R open together giving a local Ca2+ puff, and as puffs become more fr...

  19. A Framework for an IP-Based DVB Transmission Network

    Directory of Open Access Journals (Sweden)

    Nimbe L. Ewald-Arostegui

    2010-01-01

    Full Text Available One of the most important challenges for next generation all-IP networks is the convergence and interaction of wireless and wired networks in a smooth and efficient manner. This challenge will need to be faced if broadcast transmission networks are to converge with IP infrastructure. The 2nd generation of DVB standards supports the Generic Stream, allowing the direct transmission of IP-based content using the Generic Stream Encapsulation (GSE, in addition to the native Transport Stream (TS. However, the current signalling framework is based on MPEG-2 Tables that rely upon the TS. This paper examines the feasibility of providing a GSE signalling framework, eliminating the need for the TS. The requirements and potential benefits of this new approach are described. It reviews prospective methods that may be suitable for network discovery and selection and analyses different options for the transport and syntax of this signalling metadata. It is anticipated that the design of a GSE-only signalling system will enable DVB networks to function as a part of the Internet.

  20. MODEL TEKNIK KEAMANAN VOIP DENGAN VIRTUAL PRIVATE NETWORKING KRIPTOGRAFI PADA JARINGAN WIRELESS LAN 802.11B DAN KORELASI TERHADAP INTELLIGIBILITY SUARA DAN BANDWIDTH VOIP

    OpenAIRE

    Syarif, Syafruddin

    2009-01-01

    Abstrak Voice Over Internet Protocol (VoIP) merupakan suatu terobosan dalam komunikasi data. Penggunaan Teknologi VoIP pada jaringan nir-kabel (Wireless LAN) 802.11b memberikan kemudahan pergerakan pengguna (mobility). Namun demikian faktor keamanan data pada VoIP masih rentan terhadap kemungkinan penyalahgunaan (abuse), hacking, data-sniffing dan berbagai macam ancaman lainnya. Pada paper ini telah dicapai suatu system yang dapat digunakan untuk mengamankan komunikasi VoIP pada ja...

  1. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  2. Internetworking with TCP/IP

    CERN Document Server

    Comer, Douglas E

    2014-01-01

    An internationally best-selling, conceptual introduction to the TCP/IP protocols and Internetworking, this book interweaves a clear discussion of fundamentals and scientific principles with details and examples drawn from the latest technologies. Leading author Douglas Comer covers layering and packet formats for all the Internet protocols, includingTCP, IPv4, IPv6, DHCP, and DNS. In addition, the text explains new trends in Internet systems, including packet classification, Software Defined Networking (SDN), and mesh protocols used in The Internet of Things. The text is appropriate for individuals interested in learning more about TCP/IP protocols, Internet architecture, and current networking technologies, as well as engineers who build network systems. It is suitable for junior to graduate-level courses in Computer Networks, Data Networks, Network Protocols, and Internetworking.

  3. OSI and TCP/IP

    Science.gov (United States)

    Randolph, Lynwood P.

    1994-01-01

    The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.

  4. Enhancing the Radio Link Protocol for VoIP Session Establishment Signalling Over Satellite-UMTS

    OpenAIRE

    Kueh, Victor Y H; Tafazolli, Rahim; Evans, Barry

    2004-01-01

    Session Initiation Protocol (SIP) is an application layer signalling protocol used in the IP-based UMTS network for establishing multimedia sessions. With a satellite component identified to play an integral role in UNITS, there is a need to support SIP-based session establishment over Satellite-UMTS (SUNITS) as well. Due to the inherent characteristics of SIP, the transport of SIP over an unreliable wireless link with a larger propagation delay is inefficient. To improve the session setup pe...

  5. Role of Ipsdienol, Ipsenol, and cis-Verbenol in chemical ecology of Ips avulsus, Ips calligraphus, and Ips grandicollis (Coleoptera: Curculionidae: Scolytinae)

    Science.gov (United States)

    Jeremy D. Allison; Jessica I. McKenney; Daniel R. Miller; Matthew L. Gimmel

    2012-01-01

    ABSTRACT Stressed or damaged pine (Pinus sp.) trees in the southeastern United States are often colonized simultaneously by three southern Ips species (Coleoptera: Curculionidae: Scolytinae): small southern pine engraver, Ips avulsus (Eichhoff); sixspined ips, Ips calligraphus (Germar); and...

  6. Two-Dimensional Effort in Patent-Race Games and Rent-Seeking Contests: The Case of Telephony

    Directory of Open Access Journals (Sweden)

    João Ricardo Faria

    2014-05-01

    Full Text Available Using the political-economic history of the development of telephony during the 1870s as a backdrop, this paper studies a two-player Tullock contest that includes both research effort (R&D and legal effort (i.e., rent-seeking effort. The two types of efforts complement each other and positively influence the payoff of the contest. We assume that legal effort affects the prize value, increasing the winner’s prospective rents, and research effort impacts the probability of winning the contest. The results of the model break new ground in showing that research effort is a function of legal effort, wherein research effort increases with rent-seeking effort. The model also shows the existence of a strategic equivalence between rent seeking and patent races.

  7. Ips Bark Beetles in the South

    Science.gov (United States)

    Michael D. Conner; Robert C. Wilkinson

    1983-01-01

    Ips beetles usually attack weakened, dying, or recently felled trees and fresh logging debris. Large numbers Ips may build up when natural events such as lightning storms, ice storms, tornadoes, wildfires, and droughts create large amounts of pine suitable for the breeding of these beetles. Ips populations may also build up following forestry activities, such as...

  8. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  9. Voice over IP: how computing technology is being used in mobile communications.

    Science.gov (United States)

    Johnson, William

    2005-01-01

    This article explains how computing technology was used to address the need for mobile communications among nursing staff. In 2004, nursing staff at Fauquier Hospital relocated from one nursing floor in an older building to two floors in a new structure. This resulted in complaints and supervision issues as nursing managers, who had previously been relatively sedentary, now became quite mobile as they attempted to control nursing operations on two separate floors. Complaints arose from several sources. Nursing staff and managers both complained about the increased difficulty in communicating with each other Physicians expressed frustration to hospital administration at playing "telephone tag" with managers. The solution involved Internet Protocol technology that is in widespread use on most computer networks. The article details how this technology was selected over several other communications technologies and used to implement wireless telephony over the hospital's existing computer network. It reviews key standards and technologies and issues surrounding their use. Finally, the article demonstrates how this computing technology improved patient care by facilitating mobile communications.

  10. Combining Natural Human-Computer Interaction and Wireless Communication

    Directory of Open Access Journals (Sweden)

    Ştefan Gheorghe PENTIUC

    2011-01-01

    Full Text Available In this paper we present how human-computer interaction can be improved by using wireless communication between devices. Devices that offer a natural user interaction, like the Microsoft Surface Table and tablet PCs, can work together to enhance the experience of an application. Users can use physical objects for a more natural way of handling the virtual world on one hand, and interact with other users wirelessly connected on the other. Physical objects, that interact with the surface table, have a tag attached to them, allowing us to identify them, and take the required action. The TCP/IP protocol was used to handle the wireless communication over the wireless network. A server and a client application were developed for the used devices. To get a wide range of targeted mobile devices, different frameworks for developing cross platform applications were analyzed.

  11. A Novel Addressing Scheme for PMIPv6 Based Global IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-08-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  12. A novel addressing scheme for PMIPv6 based global IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  13. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  14. A Wireless Sensor Enabled by Wireless Power

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-01-01

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network. PMID:23443370

  15. Challenges Regarding IP Core Functional Reliability

    Science.gov (United States)

    Berg, Melanie D.; LaBel, Kenneth A.

    2017-01-01

    For many years, intellectual property (IP) cores have been incorporated into field programmable gate array (FPGA) and application specific integrated circuit (ASIC) design flows. However, the usage of large complex IP cores were limited within products that required a high level of reliability. This is no longer the case. IP core insertion has become mainstream including their use in highly reliable products. Due to limited visibility and control, challenges exist when using IP cores and subsequently compromise product reliability. We discuss challenges and suggest potential solutions to critical application IP insertion.

  16. Mobile-ip Aeronautical Network Simulation Study

    Science.gov (United States)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  17. Optical switching using IP protocol

    Science.gov (United States)

    Utreras, Andres J.; Gusqui, Luis; Reyes, Andres; Mena, Ricardo I.; Licenko, Gennady L.; Amirgaliyev, Yedilkhan; Komada, Paweł; Luganskaya, Saule; Kashaganova, Gulzhan

    2017-08-01

    To understand and evaluate the Optical Layer, and how it will affect the IP protocols over WDM (Switching), the present analyse is proposed. Optical communications have attractive proprieties, but also have some disadvantages, so the challenge is to combine the best of both branches. In this paper, general concepts for different options of switching are reviewed as: optical burst switching (OBS) and automatically switching optical network (ASON). Specific details such as their architectures are also discussed. In addition, the relevant characteristics of each variation for switching are reviewed.

  18. TCP/IP Network Administration

    CERN Document Server

    Hunt, Craig

    2002-01-01

    This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet. Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial

  19. IPS y el Tercer Mundo

    Directory of Open Access Journals (Sweden)

    Roberto Savio

    2015-01-01

    Full Text Available CHASQUI, entrevistó al periodista italo-argentino Roberto Savio, director fundador de la IPS, quien respondió a interrogantes como: En América Latina no hay sociedades de comunicación sino de información? ¿ Por qué y cúal la diferencia? ¿Cómo se puede hacer una sociedad comunicacional en A. Latina? ¿Cuál es la diferencia entre comunicación alternativa y popular? ¿Qué hacer para ampliar el mercado de lectores?¿Qué opina de ASIN y ALASE?

  20. IP Profiling via Service Cluster Membership Vectors

    Energy Technology Data Exchange (ETDEWEB)

    Bartoletti, A

    2009-02-23

    This study investigates the feasibility of establishing and maintaining a system of compact IP behavioral profiles as a robust means of computer anomaly definition and detection. These profiles are based upon the degree to which a system's (IP's) network traffic is distributed among stable characteristic clusters derived of the aggregate session traffic generated by each of the major network services. In short, an IP's profile represents its degree of membership in these derived service clusters. The goal is to quantify and rank behaviors that are outside of the statistical norm for the services in question, or present significant deviation from profile for individual client IPs. Herein, we establish stable clusters for accessible features of common session traffic, migrate these clusters over time, define IP behavior profiles with respect to these clusters, migrate individual IP profiles over time, and demonstrate the detection of IP behavioral changes in terms of deviation from profile.

  1. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Many wireless technologies are already available for sensor applications. It is inevitable that many non-interoperable wireless technologies between 400 MHz and 5.8...

  2. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  3. The Spacelab IPS Star Simulator

    Science.gov (United States)

    Wessling, Francis C., III

    The cost of doing business in space is very high. If errors occur while in orbit the costs grow and desired scientific data may be corrupted or even lost. The Spacelab Instrument Pointing System (IPS) Star Simulator is a unique test bed that allows star trackers to interface with simulated stars in a laboratory before going into orbit. This hardware-in-the loop testing of equipment on earth increases the probability of success while in space. The IPS Star Simulator provides three fields of view 2.55 x 2.55 degrees each for input into star trackers. The fields of view are produced on three separate monitors. Each monitor has 4096 x 4096 addressable points and can display 50 stars (pixels) maximum at a given time. The pixel refresh rate is 1000 Hz. The spectral output is approximately 550 nm. The available relative visual magnitude range is 2 to 8 visual magnitudes. The star size is less than 100 arc seconds. The minimum star movement is less than 5 arc seconds and the relative position accuracy is approximately 40 arc seconds. The purpose of this paper is to describe the LPS Star Simulator design and to provide an operational scenario so others may gain from the approach and possible use of the system.

  4. Community Wireless Networks

    Science.gov (United States)

    Feld, Harold

    2005-01-01

    With increasing frequency, communities are seeing the arrival of a new class of noncommercial broadband providers: community wireless networks (CWNs). Utilizing the same wireless technologies that many colleges and universities have used to create wireless networks on campus, CWNs are creating broadband access for free or at costs well below…

  5. Implementasi Sistem IP PBX menggunakan Briker

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2017-06-01

    Full Text Available Abstrak VoIP (Voice over Internet Protocol adalah komunikasi suara jarak jauh yang digunakan melalui jaringan IP. Pada penelitian ini dirancang sistem IP PBX dengan menggunakan teknologi berbasis VoIP. IP PBX adalah perangkat switching komunikasi telepon dan data berbasis teknologi Internet Protocol (IP yang mengendalikan ekstension telepon analog maupun ekstension IP Phone. Software VirtualBox digunakan dengan tujuan agar lebih memudahkan dalam sistem pengoperasian Linux yang dimana program untuk membuat IP PBX adalah menggunakan Briker yang bekerja pada Operating System Linux 2.6. Setelah proses penginstalan Briker pada Virtualbox dilakukan implementasi jaringan IP PBX. Setelah mengimplementasikan jaringan IP PBX sesuai dengan topologi, kemudian melakukan pengujian success call rate dan analisis Quality of Service (QoS. Pengukuran QoS menggunakan parameter jitter, delay, dan packet loss yang dihasilkan dalam sistem IP PBX ini. Nilai jitter sesama user Briker (baik pada smartphone maupun komputer mempunyai rata-rata berada pada nilai 16,77 ms. Sedangkan nilai packetloss yang didapat pada saat terdapat pada saat user 1 sebagai pemanggil telepon adalah 0%. Sedangkan persentase packet loss pada saat user 1 sebagai penerima telepon adalah 0,01%. Nilai delay pada saat berkomunikasi antar user berada pada 11,75 ms. Secara keseluruhan nilai yang didapatkan melalui penelitian ini, dimana hasil pengujian parameter-parameter QOS sesuai dengan standar yang telah direkomendasikan oleh ITU dan didapatkan nilai QoS dengan hasil “baik”. Kata Kunci : Briker, VoIP, QoS, IP PBX, Smartphone. Abstract VoIP (Voice over Internet Protocol is a long-distance voice communications over IP networks are used. In this study, IP PBX systems designed using VoIP -based technologies. IP PBX is a telephone switching device and data communication technology-based Internet Protocol (IP which controls the analog phone extensions and IP Phone extensions. VirtualBox software is

  6. Applying a gaming approach to IP strategy.

    Science.gov (United States)

    Gasnier, Arnaud; Vandamme, Luc

    2010-02-01

    Adopting an appropriate IP strategy is an important but complex area, particularly in the pharmaceutical and biotechnology sectors, in which aspects such as regulatory submissions, high competitive activity, and public health and safety information requirements limit the amount of information that can be protected effectively through secrecy. As a result, and considering the existing time limits for patent protection, decisions on how to approach IP in these sectors must be made with knowledge of the options and consequences of IP positioning. Because of the specialized nature of IP, it is necessary to impart knowledge regarding the options and impact of IP to decision-makers, whether at the level of inventors, marketers or strategic business managers. This feature review provides some insight on IP strategy, with a focus on the use of a new 'gaming' approach for transferring the skills and understanding needed to make informed IP-related decisions; the game Patentopolis is discussed as an example of such an approach. Patentopolis involves interactive activities with IP-related business decisions, including the exploitation and enforcement of IP rights, and can be used to gain knowledge on the impact of adopting different IP strategies.

  7. Vaccines and IP Rights: A Multifaceted Relationship.

    Science.gov (United States)

    Durell, Karen

    2016-01-01

    Just as there are many forms of vaccines and components to vaccines-particular compositions, delivery systems, components, and distribution networks-there are a variety of intellectual property (IP) protections applicable for vaccines. IP rights such as patent, copyright, trademarks, plant breeders' rights, and trade secrets may all be applicable to vaccines. Thus, discussion of IP rights and vaccines should not begin and end with the application of one IP right to a vaccine. The discussion should engage considerations of multiple IP rights applicable to a vaccine and how these can be utilized in an integrated manner in a strategy aimed at supporting the development and distribution of the vaccine. Such an approach to IP rights to vaccines allows for the integrated rights to be considered in light of the justifications for protecting vaccines with IP rights, as well as the issues relating to specific IP rights for vaccines, such as compulsory license regimes, available humanitarian purpose IP credits, etc. To view vaccines as the subject of multiple IP protections involves a refocusing, but the outcome can provide significant benefits for vaccine development and distribution.

  8. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  9. Performance of VoIP on HSDPA

    DEFF Research Database (Denmark)

    Wang, Bang; Pedersen, Klaus I.; Kolding, Troels E.

    2005-01-01

    This paper provides packet scheduler design and performance simulations for running VoIP services over high-speed downlink packet access (HSDPA) in WCDMA. The main challenge of supporting VoIP service on HSDPA is the tight delay requirement combined with the small VoIP packet size. A packet...... scheduler design incorporating VoIP packet aggregation and user multiplexing is proposed and the VoIP capacity is studied for a macro-cellular environment. Results are obtained for different delay budgets and packet scheduling settings, using either blind round robin or a slightly modified version...... of proportional fair scheduling. For proportional fair scheduling with code-multiplexing of 4-users, the downlink VoIP cell capacity on HSDPA is found to be in the range 72-104 users depending on whether the delay budget for the Node-B scheduling and user reception equals 80 ms or 150 ms, respectively....

  10. Performance of Wireless Networks in Highly Reflective Rooms with Variable Absorption

    Science.gov (United States)

    2014-09-01

    the-shelf CSMA/CA carrier sense multiple access with collision avoidance DFT discrete Fourier transform DS direct sequence EMI electromagnetic...interference FDM frequency division multiplexing FEC forward error correction FFT fast Fourier transform FH frequency hopping GO geometrical optics...universal serial bus VHT very high throughput VoIP voice over Internet Protocol WLAN wireless local area network WMAN wireless metropolitan area

  11. The Wireless ATM Architecture

    Directory of Open Access Journals (Sweden)

    R. Palitefka

    1998-06-01

    Full Text Available An overview of the proposed wireless ATM structure is provided. Wireless communication have been developed to a level where offered services can now be extended beyond voice and data. There are already wireless LANs, cordless systems offering data services and mobile data. Wireless LAN systems are basically planned for local, on-promises and in-house networking providing short distance radio or infrared links between computer system. The main challenge of wireless ATM is to harmonise the development of broadband wireless system with service B -ISDN/ATM and ATM LANs, and offer multimedia multiservice features for the support of time-sensitive voice communication, video, desktop multimedia applications, and LAN data traffic for the wireless user.

  12. Universal Space IP Transparent Proxy Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Communications applications are strategically moving toward Internet Protocol-based architectures and technologies. Despite IP's huge potential, (e.g. cost...

  13. Software structure for broadband wireless sensor network system

    Science.gov (United States)

    Kwon, Hyeokjun; Oh, Sechang; Yoon, Hargsoon; Varadan, Vijay K.

    2010-04-01

    Zigbee Sensor Network system has been investigating for monitoring and analyzing the data measured from a lot of sensors because the Zigbee Sensor Network has several advantages of low power consumption, compact size, and multi-node connection. However, it has a disadvantage not to be able to monitor the data measured from sensors at the remote area such as other room that is located at other city. This paper describes the software structure to compensate the defect with combining the Zigbee Sensor Network and wireless LAN technology for remote monitoring of measured sensor data. The software structure has both benefits of Zigbee Sensor Network and the advantage of wireless LAN. The software structure has three main software structures. The first software structure consists of the function in order to acquire the data from sensors and the second software structure is to gather the sensor data through wireless Zigbee and to send the data to Monitoring system by using wireless LAN. The second part consists of Linux packages software based on 2440 CPU (Samsung corp.), which has ARM9 core. The Linux packages include bootloader, device drivers, kernel, and applications, and the applications are TCP/IP server program, the program interfacing with Zigbee RF module, and wireless LAN program. The last part of software structure is to receive the sensor data through TCP/IP client program from Wireless Gate Unit and to display graphically measured data by using MATLAB program; the sensor data is measured on 100Hz sampling rate and the measured data has 10bit data resolution. The wireless data transmission rate per each channel is 1.6kbps.

  14. Network performance and fault analytics for LTE wireless service providers

    CERN Document Server

    Kakadia, Deepak; Gilgur, Alexander

    2017-01-01

     This book is intended to describe how to leverage emerging technologies big data analytics and SDN, to address challenges specific to LTE and IP network performance and fault management data in order to more efficiently manage and operate an LTE wireless networks. The proposed integrated solutions permit the LTE network service provider to operate entire integrated network, from RAN to Core , from UE to application service, as one unified system and correspondingly collect and align disparate key metrics and data, using an integrated and holistic approach to network analysis. The LTE wireless network performance and fault involves the network performance and management of network elements in EUTRAN, EPC and IP transport components, not only as individual components, but also as nuances of inter-working of these components. The key metrics for EUTRAN include radio access network accessibility, retainability, integrity, availability and mobility. The key metrics for EPC include MME accessibility, mobility and...

  15. Localitzador Gràfic de Direccions IP 'IpLocInspector'

    OpenAIRE

    Ordóñez Chapado, Miguel

    2006-01-01

    En aquest treball s'ha desenvolupat una aplicació capaç de localitzar adreces IP. En este trabajo se ha desarrollado una aplicación capaz de localizar direcciones IP. In this work an application was developed capable of locating IP addresses.

  16. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, Frank; Wardenaar, Rene; Colomé Tatché, Maria; Mousson, Florence; de Graaf, Petra; Mokry, Michal; Guryev, Victor; Timmers, H. Th. Marc; Cuppen, Edwin; Jansen, Ritsert C.; Bateman, Alex

    2010-01-01

    Motivation: ChIP-chip and ChIP-seq technologies provide genomewide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/ or individuals, we can now begin to characterize stochastic or systematic changes in

  17. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, F.; Wardenaar, R.; Colome-Tatche, M.; Mousson, F.; de Graaf, P.; Mokry, M.; Guryev, V.; Timmers, H.T.; Cuppen, E.; Jansen, R.

    2010-01-01

    MOTIVATION: ChIP-chip and ChIP-seq technologies provide genome-wide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/or individuals, we can now begin to characterize stochastic or systematic changes in

  18. AN INTELLIGENT VERTICAL HANDOVER DECISION ALGORITHM FOR WIRELESS HETEROGENEOUS NETWORKS

    OpenAIRE

    V. Anantha Narayanan; Rajeswari, A; Sureshkumar, V.

    2014-01-01

    The Next Generation Wireless Networks (NGWN) should be compatible with other communication technologies to offer the best connectivity to the mobile terminal which can access any IP based services at any time from any network without the knowledge of its user. It requires an intelligent vertical handover decision making algorithm to migrate between technologies that enable seamless mobility, always best connection and minimal terminal power consumption. Currently existing decision engines are...

  19. Multi-user Session Control in Next Generation Wireless Systems

    OpenAIRE

    Eduardo Cerqueira; Paulo Mendes; Edmundo Monteiro

    2006-01-01

    Next generation IP wireless systems are envisioned to be heterogeneous and to provide ubiquitous services to mobile users with different quality of service requirements. Furthermore, in order to attract and keep customers, mobile operators are expanding their portfolio with the inclusion of publish-subscribe services, such as real-time multimedia sessions. This paper presents a signalling application layer based on the Next Steps in Signalling (NSIS) framework that aims to provide the c...

  20. Power Analysis of an Enterprise Wireless Communication Architecture

    Science.gov (United States)

    2017-09-01

    command and control, C2, Internet of Things, IoT , model based systems engineering, MBSE, marine air-ground task force, MAGTF, command control and...Electronics Engineers InTop Integrated Topside IPS Instructions per Second IoT Internet of Things JTNC Joint Tactical Networking Center L-RTac...wireless communications in the military increases the amount of energy needed for missions. The Internet of Things ( IoT ) movement (Thomas, McPherson, and

  1. 75 FR 13235 - IP-Enabled Services

    Science.gov (United States)

    2010-03-19

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 63 IP-Enabled Services AGENCY: Federal Communications Commission ACTION: Final rule... interconnected Voice over Internet Protocol (VoIP) service the discontinuance obligations that apply to domestic...

  2. Packets with deadlines a framework for real-time wireless networks

    CERN Document Server

    Hou, I-Hong

    2013-01-01

    With the explosive increase in the number of mobile devices and applications, it is anticipated that wireless traffic will increase exponentially in the coming years. Moreover, future wireless networks all carry a wide variety of flows, such as video streaming, online gaming, and VoIP, which have various quality of service (QoS) requirements. Therefore, a new mechanism that can provide satisfactory performance to the complete variety of all kinds of flows, in a coherent and unified framework, is needed.In this book, we introduce a framework for real-time wireless networks. This consists of a m

  3. Wireless Intrusion Prevention Systems

    Directory of Open Access Journals (Sweden)

    Jack TIMOFTE

    2008-01-01

    Full Text Available The wireless networks have changed the way organizations work and offered a new range of possibilities, but at the same time they introduced new security threats. While an attacker needs physical access to a wired network in order to launch an attack, a wireless network allows anyone within its range to passively monitor the traffic or even start an attack. One of the countermeasures can be the use of Wireless Intrusion Prevention Systems.

  4. Space Network IP Services (SNIS): An Architecture for Supporting Low Earth Orbiting IP Satellite Missions

    Science.gov (United States)

    Israel, David J.

    2005-01-01

    The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.

  5. 11th International Conference On Broad-Band Wireless Computing, Communication and Applications

    CERN Document Server

    Xhafa, Fatos; Yim, Kangbin

    2017-01-01

    The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pave the way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary. The aim of the volume is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of broadband and wireless computing. This proceedings volume presents the results of the 11th International Conference on Broad-Band Wireless Computing, Communication And Applications (BWCCA-2016), held November 5-7, 2016, at Soonchunhyang University, Asan, Korea. .

  6. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  7. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  8. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  9. A New Mechanism for Network Monitoring and Shielding in Wireless LAN

    Directory of Open Access Journals (Sweden)

    Jiujun Cheng

    2014-01-01

    Full Text Available Wireless LAN (WLAN technology is developing rapidly with the help of wireless communication technology and social demand. During the development of WLAN, the security is more and more important, and wireless monitoring and shielding are of prime importance for network security. In this paper, we have explored various security issues of IEEE 802.11 based wireless network and analyzed numerous problems in implementing the wireless monitoring and shielding system. We identify the challenges which monitoring and shielding system needs to be aware of, and then provide a feasible mechanism to avoid those challenges. We implemented an actual wireless LAN monitoring and shielding system on Maemo operating system to monitor wireless network data stream efficiently and solve the security problems of mobile users. More importantly, the system analyzes wireless network protocols efficiently and flexibly, reveals rich information of the IEEE 802.11 protocol such as traffic distribution and different IP connections, and graphically displays later. Moreover, the system running results show that the system has the capability to work stably, and accurately and analyze the wireless protocols efficiently.

  10. IPS guidestar selection for stellar mode (ASTRO)

    Science.gov (United States)

    Mullins, Larry; Wooten, Lewis

    1988-01-01

    This report describes how guide stars are selected for the Optical Sensor Package (OSP) for the Instrument Pointing System (IPS) when it is operating in the stellar mode on the ASTRO missions. It also describes how the objective loads are written and how the various roll angles are related; i.e., the celestial roll or position angle, the objective load roll angles, and the IPS gimbal angles. There is a brief description of how the IPS operates and its various modes of operation; i.e., IDOP, IDIN, and OSPCAL.

  11. IP2P K-means: an efficient method for data clustering on sensor networks

    Directory of Open Access Journals (Sweden)

    Peyman Mirhadi

    2013-03-01

    Full Text Available Many wireless sensor network applications require data gathering as the most important parts of their operations. There are increasing demands for innovative methods to improve energy efficiency and to prolong the network lifetime. Clustering is considered as an efficient topology control methods in wireless sensor networks, which can increase network scalability and lifetime. This paper presents a method, IP2P K-means – Improved P2P K-means, which uses efficient leveling in clustering approach, reduces false labeling and restricts the necessary communication among various sensors, which obviously saves more energy. The proposed method is examined in Network Simulator Ver.2 (NS2 and the preliminary results show that the algorithm works effectively and relatively more precisely.

  12. 77 FR 33227 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2012-06-05

    ... SECURITY Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT) AGENCY... Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Sector Outreach and...--Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT). DHS previously...

  13. Fuzzy logic congestion control in IEEE 802.11 wireless local area networks: A performance evaluation

    CSIR Research Space (South Africa)

    Nyirenda, CN

    2007-09-01

    Full Text Available to the wireless network. Therefore, the implementation of a congestion control mechanism in Access Points promises to be a suitable solution. Recently, a particle swarm optimized Fuzzy Logic Congestion Detection (FLCD) was proposed for IP networks. This algorithm...

  14. Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN

    National Research Council Canada - National Science Library

    Nam, Seung Yeob; Jurayev, Sirojiddin; Kim, Seung-Sik; Choi, Kwonhue; Choi, Gyu Sang

    2012-01-01

    ...) attacks in wired or wireless LAN environments. The proposed mechanism is based on the idea that when a node knows the correct MAC address for a given IP address, if it does not delete the mapping while the machine is alive, then MITM attack...

  15. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  16. Debate: Wired versus Wireless.

    Science.gov (United States)

    Meeks, Glenn; Nair, Prakash

    2000-01-01

    Debates the issue of investing in wiring schools for desktop computer networks versus using laptops and wireless networks. Included are cost considerations and the value of technology for learning. Suggestions include using wireless networks for existing schools, hardwiring computers for new construction, and not using computers for elementary…

  17. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR

    Science.gov (United States)

    What does IP/SA handle? IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,&nbs

  18. Wireless communication with chaos.

    Science.gov (United States)

    Ren, Hai-Peng; Baptista, Murilo S; Grebogi, Celso

    2013-05-03

    The modern world fully relies on wireless communication. Because of intrinsic physical constraints of the wireless physical media (multipath, damping, and filtering), signals carrying information are strongly modified, preventing information from being transmitted with a high bit rate. We show that, though a chaotic signal is strongly modified by the wireless physical media, its Lyapunov exponents remain unaltered, suggesting that the information transmitted is not modified by the channel. For some particular chaotic signals, we have indeed proved that the dynamic description of both the transmitted and the received signals is identical and shown that the capacity of the chaos-based wireless channel is unaffected by the multipath propagation of the physical media. These physical properties of chaotic signals warrant an effective chaos-based wireless communication system.

  19. IndigoVision IP video keeps watch over remote gas facilities in Amazon rainforest

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-07-15

    In Brazil, IndigoVision's complete IP video security technology is being used to remotely monitor automated gas facilities in the Amazon rainforest. Twelve compounds containing millions of dollars of process automation, telemetry, and telecom equipment are spread across many thousands of miles of forest and centrally monitored in Rio de Janeiro using Control Center, the company's Security Management software. The security surveillance project uses a hybrid IP network comprising satellite, fibre optic, and wireless links. In addition to advanced compression technology and bandwidth tuning tools, the IP video system uses Activity Controlled Framerate (ACF), which controls the frame rate of the camera video stream based on the amount of motion in a scene. In the absence of activity, the video is streamed at a minimum framerate, but the moment activity is detected the framerate jumps to the configured maximum. This significantly reduces the amount of bandwidth needed. At each remote facility, fixed analog cameras are connected to transmitter nodules that convert the feed to high-quality digital video for transmission over the IP network. The system also integrates alarms with video surveillance. PIR intruder detectors are connected to the system via digital inputs on the transmitters. Advanced alarm-handling features in the Control Center software process the PIR detector alarms and alert operators to potential intrusions. This improves operator efficiency and incident response. 1 fig.

  20. Sensor Proxy Mobile IPv6 (SPMIPv6—A Novel Scheme for Mobility Supported IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-02-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6. We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  1. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Science.gov (United States)

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  2. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  3. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  4. A Wireless LAN and Voice Information System for Underground Coal Mine

    Directory of Open Access Journals (Sweden)

    Yu Zhang

    2014-06-01

    Full Text Available In this paper we constructed a wireless information system, and developed a wireless voice communication subsystem based on Wireless Local Area Networks (WLAN for underground coal mine, which employs Voice over IP (VoIP technology and Session Initiation Protocol (SIP to achieve wireless voice dispatching communications. The master control voice dispatching interface and call terminal software are also developed on the WLAN ground server side to manage and implement the voice dispatching communication. A testing system for voice communication was constructed in tunnels of an underground coal mine, which was used to actually test the wireless voice communication subsystem via a network analysis tool, named Clear Sight Analyzer. In tests, the actual flow charts of registration, call establishment and call removal were analyzed by capturing call signaling of SIP terminals, and the key performance indicators were evaluated in coal mine, including average subjective value of voice quality, packet loss rate, delay jitter, disorder packet transmission and end-to- end delay. Experimental results and analysis demonstrate that the wireless voice communication subsystem developed communicates well in underground coal mine environment, achieving the designed function of voice dispatching communication.

  5. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  6. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  7. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  8. Optical and wireless technologies

    CERN Document Server

    Tiwari, Manish; Singh, Ghanshyam; Minzioni, Paolo

    2018-01-01

    This book presents selected papers from 1st International Conference on Optical and Wireless Technologies, providing insights into the analytical, experimental, and developmental aspects of systems, techniques, and devices in these spheres. It explores the combined use of various optical and wireless technologies in next-generation networking applications, and discusses the latest developments in applications such as photonics, high-speed communication systems and networks, visible light communication, nanophotonics, and wireless and multiple-input-multiple-output (MIMO) systems. The book will serve as a valuable reference resource for academics and researchers across the globe.

  9. Investigation on possible risks to human health by exposure to the radiation of electromagnetic waves produced by the radio communications; Investigacion sobre posibles riesgos a la salud humana por exposicion a la radiacion de ondas electromagneticas producidas por las radiocomunicaciones

    Energy Technology Data Exchange (ETDEWEB)

    Garcia Hernandez, Carlos Felipe; Ibarguengoytia Gonzalez, Pablo Hector; Flores Garcia, Andres; Franco Campos, Laura Elena [Instituto de Investigaciones Electricas, Cuernavaca, Morelos (Mexico)

    2011-06-13

    This verification procedure is based on a research work on the possible risks to human health by exposure to the radiation of electromagnetic waves produced by the radio communications, cases of study: cellular telephony, radio digital troncalized and wireless telephony IP of Voice on IP (wireless local area network). The revision of all the international standards and the applicable national standardization was included, as well as the verification of fulfillment. [Spanish] Este procedimiento de verificacion esta basado en un trabajo de investigacion sobre posibles riesgos a la salud humana por exposicion a la radiacion de ondas electromagneticas producidas por la radiocomunicaciones, casos de estudio: telefonia celular, radio troncalizado digital y telefonia IP inalambrica de Voz sobre IP (red de area local inalambrica). Se incluyo la revision de todos los estandares internacionales y de la normatividad nacional aplicable, asi como la verificacion de cumplimiento.

  10. Integrative analysis of ChIP-chip and ChIP-seq dataset.

    Science.gov (United States)

    Zhu, Lihua Julie

    2013-01-01

    Epigenetic regulation and interactions between transcription factors and regulatory genomic regions play crucial roles in controlling transcriptional regulatory networks that drive development, environmental responses, and disease. Chromatin immunoprecipitation (ChIP) followed by high-throughput sequencing (ChIP-seq) and ChIP followed by genomic tiling microarray hybridization (ChIP-chip) are the two of the most widely used technologies for genome-wide identification of DNA protein interactions and histone modification in vivo. Many algorithms and tools have been developed and evaluated that allow identification of transcription factor binding sites from ChIP-seq or ChIP-chip datasets. However, binding site identification is only the first step; the ultimate goal is to discover the regulatory network of the transcription factor (TF). Here, we present a common workflow for downstream analysis of ChIP-chip and ChIP-seq with an emphasis on annotating binding sites and integration with gene expression data to identify direct and indirect targets of the TF. These tools will help with the overall goal of unraveling transcriptional regulatory networks using datasets publicly available in GEO.

  11. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  12. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  13. Capturing value from Intellectual Property (IP) in a global environment

    DEFF Research Database (Denmark)

    Alcácer, Juan; Beukel, Karin; Cassiman, Bruno

    2017-01-01

    in patents, trademarks, and industrial designs used by firms to protect their IP globally. We then show that IP protection remains fragmented; the quality of IP applications might be questionable; and developing a comprehensive IP footprint worldwide is very costly. Growing numbers of applications...

  14. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  15. A survey of IP over ATM architectures

    Energy Technology Data Exchange (ETDEWEB)

    Chen, H.; Tsang, R.; Brandt, J.; Hutchins, J.

    1997-07-01

    Over the past decade, the Internet has burgeoned into a worldwide information highway consisting of approximately 5 million hosts on over 45,000 interconnected networks. This unprecedented growth, together with the introduction of multimedia workstations, has spurred the development of innovative applications that require high speed, low latency, and real-time transport. Today`s Internet can neither scale in its bandwidth nor guarantee the Quality of Services (QoS) necessary to meet these performance requirements. Many network researchers propose to use the Asynchronous Transfer Mode (ATM) technology as the underlying infrastructure for the next generation of workgroup, campus, and enterprise IP networks. Since ATM is significantly different from today`s legacy network technologies, efficient implementation of IP over ATM is especially challenging. This tutorial paper covers several existing proposals that integrate IP over ATM.

  16. Wireless radio a history

    CERN Document Server

    Coe, Lewis

    2006-01-01

    ""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.

  17. Optimization of OSPF Routing in IP Networks

    Science.gov (United States)

    Bley, Andreas; Fortz, Bernard; Gourdin, Eric; Holmberg, Kaj; Klopfenstein, Olivier; Pióro, Michał; Tomaszewski, Artur; Ümit, Hakan

    The Internet is a huge world-wide packet switching network comprised of more than 13,000 distinct subnetworks, referred to as Autonomous Systems (ASs) autonomous system AS . They all rely on the Internet Protocol (IP) internet protocol IP for transport of packets across the network. And most of them use shortest path routing protocols shortest path routing!protocols , such as OSPF or IS-IS, to control the routing of IP packets routing!of IP packets within an AS. The idea of the routing is extremely simple — every packet is forwarded on IP links along the shortest route between its source and destination nodes of the AS. The AS network administrator can manage the routing of packets in the AS by supplying the so-called administrative weights of IP links, which specify the link lengths that are used by the routing protocols for their shortest path computations. The main advantage of the shortest path routing policy is its simplicity, allowing for little administrative overhead. From the network engineering perspective, however, shortest path routing can pose problems in achieving satisfactory traffic handling efficiency. As all routing paths depend on the same routing metric routing!metric , it is not possible to configure the routing paths for the communication demands between different pairs of nodes explicitly or individually; the routing can be controlled only indirectly and only as a whole by modifying the routing metric. Thus, one of the main tasks when planning such networks is to find administrative link weights that induce a globally efficient traffic routing traffic!routing configuration of an AS. It turns out that this task leads to very difficult mathematical optimization problems. In this chapter, we discuss and describe exact integer programming models and solution approaches as well as practically efficient smart heuristics for such shortest path routing problems shortest path routing!problems .

  18. Secure IP mobility management for VANET

    CERN Document Server

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  19. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  20. Analysis list: Terf2ip [Chip-atlas[Archive

    Lifescience Database Archive (English)

    Full Text Available Terf2ip Embryonic fibroblast + mm9 http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/target/Terf...2ip.1.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/target/Terf2ip.5.tsv http://dbarchive.bio...sciencedbc.jp/kyushu-u/mm9/target/Terf2ip.10.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/colo/Terf2ip

  1. 76 FR 81955 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2011-12-29

    ... SECURITY Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT) AGENCY... Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Sector Specific Agency.../IP/SSA EMO, 245 Murray Lane SW., Mail Stop 0640, Arlington, VA 20598-0630. Emailed requests should go...

  2. ChIP-chip versus ChIP-seq: Lessons for experimental design and data analysis

    Science.gov (United States)

    2011-01-01

    Background Chromatin immunoprecipitation (ChIP) followed by microarray hybridization (ChIP-chip) or high-throughput sequencing (ChIP-seq) allows genome-wide discovery of protein-DNA interactions such as transcription factor bindings and histone modifications. Previous reports only compared a small number of profiles, and little has been done to compare histone modification profiles generated by the two technologies or to assess the impact of input DNA libraries in ChIP-seq analysis. Here, we performed a systematic analysis of a modENCODE dataset consisting of 31 pairs of ChIP-chip/ChIP-seq profiles of the coactivator CBP, RNA polymerase II (RNA PolII), and six histone modifications across four developmental stages of Drosophila melanogaster. Results Both technologies produce highly reproducible profiles within each platform, ChIP-seq generally produces profiles with a better signal-to-noise ratio, and allows detection of more peaks and narrower peaks. The set of peaks identified by the two technologies can be significantly different, but the extent to which they differ varies depending on the factor and the analysis algorithm. Importantly, we found that there is a significant variation among multiple sequencing profiles of input DNA libraries and that this variation most likely arises from both differences in experimental condition and sequencing depth. We further show that using an inappropriate input DNA profile can impact the average signal profiles around genomic features and peak calling results, highlighting the importance of having high quality input DNA data for normalization in ChIP-seq analysis. Conclusions Our findings highlight the biases present in each of the platforms, show the variability that can arise from both technology and analysis methods, and emphasize the importance of obtaining high quality and deeply sequenced input DNA libraries for ChIP-seq analysis. PMID:21356108

  3. Teaching Network Security with IP Darkspace Data

    Science.gov (United States)

    Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C.

    2016-01-01

    This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…

  4. PERBANDINGAN KINERJA IP SEC DAN SSL

    Directory of Open Access Journals (Sweden)

    Dessyanto Boedi P

    2015-04-01

    Full Text Available Ipsec (IP Security and SSL (Secure Socket Layer is the most widely used techniques to secure data communications over the Internet. Both of these techniques has advantages and disadvantages of each. The purpose of this study is to present an analysis of the two techniques above in terms of security and performance.

  5. Relationship between Interplanetary (IP) Parameters and ...

    Indian Academy of Sciences (India)

    environment results in various space weather changes, including the phenomenon of the geomagnetic storm and its manifestations (Chapman 1936). Since the 1960s, orbiting and geostationary satellites have made it possible to study the linkage between solar emissions, their manifestations in IP space, and geomagnetic ...

  6. IP-I0 BASED IMMUNOLOGICAL MONITORING

    DEFF Research Database (Denmark)

    2008-01-01

    The present invention relates to an immunological method and, more particularly, a method for measuring cell-mediated immune reactivity (CMI) in mammals based on the production of IP-10.The invention further discloses an assay and a kit for measuring CMI to an antigen using whole blood or other...

  7. Wireless Sensor Portal Technology Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Mobitrum Corporation has demonstrated the feasibility in the Phase I of " A Wireless Sensor Portal Technology" and proposes a Phase II effort to develop a wireless...

  8. Evolution of Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  9. Versatile Wireless Data Net Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed R&D is to develop a wireless data networking capability. A prototype capability will result from the Phase 1 and 2 contracts. The Versatile Wireless...

  10. S@tMax—A space-based system enabling mobile IP applications in vehicles

    Science.gov (United States)

    Arcioni, Marco; Daehler, Erik; Mueller, Robert P.; van der Meulen, Wencke

    2009-06-01

    As personal mobility increases, people spend more time in their vehicles. Furthermore, a large segment of today's workforce is part of a growing mobile service industry. This mobile society creates opportunities to increase productivity which do not yet exist. Today's commuting time could be better utilized and mobile business transactions could be more efficiently conducted, by integrating mobile IP wireless services in vehicles. By means of a direct to mobile user Internet access, and total IP services, integrated into automobiles, S@tMax services can empower the mobile business movement therefore improving productivity. This paper presents a commercial system architecture that will deliver an optimized solution for direct to mobile user Internet access, through an integration of a ground based network infrastructure, use of existing communications satellites and the development of a proprietary satellite system. As a result of a detailed systems engineering process, the architectures of the space, ground and infrastructures segments will be presented. Furthermore, the benefits of on-orbit servicing were examined in the S@tMax context. The approach proposed is considered as an important step towards enforcing main roadway IP coverage in the US, for near-continuous communications and services.

  11. Quality-Aware SCTP in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Pan Jen-Yi

    2010-01-01

    Full Text Available SCTP (Stream control transmission protocol is a new transport layer protocol that was published as RFC2960 by IETF (the Internet Engineering Task Force in October 2000 and amended in RFC4960 in September 2007. SCTP provides reliable ordered and unordered transport services. The congestion control and flow control mechanisms for SCTP are very similar to those for TCP (transmission control protocol. SCTP can apply more than one IP address when establishing associations. SCTP multihoming can support multiple paths in association. These features provide SCTP with some network-level fault tolerance through network address redundancy. SCTP multihoming has tremendous transmission potential. However, SCTP path management is very simple in RFC4960 and therefore cannot effectively distinguish path conditions; it also has no path switch strategy appropriate for wireless networking. These factors all degrade SCTP performance. This study proposes a new path management (quality-aware SCTP for wireless networks; this includes a new path failure detection method and ICE (idle path congestion window size estimation mechanism. An experiment using NS2 was performed, showing that quality-aware SCTP can effectively improve the network performance. Quality-aware SCTP is simple and provides a more effective performance than SCTP alone.

  12. Handoff Between a Wireless Local Area Network (WLAN and a Wide Area Network (UMTS

    Directory of Open Access Journals (Sweden)

    J. Sánchez–García

    2009-04-01

    Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.

  13. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  14. User-centered Development of Video telephony for Servicing Mainly Older Users: Review and Evaluation of an Approach Applied for 10 Years

    Directory of Open Access Journals (Sweden)

    Seppo Väyrynen

    2006-01-01

    Full Text Available A research and development (R&D approach has been applied to video telephony (VT in northern Finland since 1994 by broad consortia. The focus has been on the considerable involvement of ergonomics within the engineering and implementation of VT. This multidisciplinary participatory ergonomic R&D approach (PERDA is described briefly, in general and through two cases. The user-centeredness should be discernible in this sociotechnical systemic entity. A consortium—comprising mainly manufacturers, individual and organizational users of technological products, and R&D organizations—serves as a natural context for product development. VT has been considered to have much potential for enhancing (multimedia interaction and effective multimodal communication, thereby facilitating many activities of everyday life and work. An assessment of the VT system, called HomeHelper, involved older citizens, as clients or customers, and the staff of social, health, and other services.

  15. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    . Antennas are an integral part of wireless networks. A selected antenna type affects performance, network availability and safety of wireless networks. Finding default values CommView for WiFi is a tool for monitoring data flow (sniffer especially written for wireless networks. Cain & Abel is a universal tool for the detection of all types of passwords. If a wireless network uses a protective mechanism of MAC address filtering, then the attacker must collect the IP addresses. To connect to a wireless access point, it is necessary to know its SSID. Contrary to what some people think, SSID is not a password. Wardriving Driving a car with a portable computer aimed at the detection of wireless computer networks, onto which connection is later possible, is called wardriving. For wardriving, it is necessary to have an appropriate software tool and a wireless network card or an adapter, on which an external antenna can be added to increase signal strength. It is also possible to use a global positioning device (GPS to determine the coordinates of the detected wireless access points on a map. The most widely used software tools for wardriving are Network Stumbler, Kismet and MiniStumbler. Network attacks Hackers’ most usual attack to circumvent the basic access control in wireless networks is masking their own MAC address with an MAC address of a legitimate client on the network (MAC address spoofing. Man-in-the-Middle attack inserts the attacker’s system in the middle between wireless clients and the wireless access point. Legitimate wireless users will be fooled when they try to connect, by being associated to the attacker's system instead of the legitimate wireless access point. The ARP table poisoning attack inserts the attacker's system in the middle of communication between legitimate clients and the wireless access point. Attackers could use the address resolution protocol if it is running on the network. The aim of this attack is to introduce an attacker as a legitimate

  16. Opportunities for IP  in Communications Beyond 3G

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard; Jacobsen, Rune H.

    2005-01-01

    Future communication will be based on TCP/IP as common network and transport layers to provide global connectivity to users and applications. IP is used to provide ubiquitous access across different access networks and exploits the benefits of a common connectivity layer while reducing the cost...... of operation and maintenance of the network. This paper discusses the opportunities for IP in the evolution towards a future broadband, all-IP mobile communication network. In particular, we argue for three opportunities for the future: Interworking access technologies over IP, IP layer transparency...

  17. Modelling ChIP-seq Data Using HMMs.

    Science.gov (United States)

    Vinciotti, Veronica

    2017-01-01

    Chromatin ImmunoPrecipitation-sequencing (ChIP-seq) experiments have now become routine in biology for the detection of protein binding sites. In this chapter, we show how hidden Markov models can be used for the analysis of data generated by ChIP-seq experiments. We show how a hidden Markov model can naturally account for spatial dependencies in the ChIP-seq data, how it can be used in the presence of data from multiple ChIP-seq experiments under the same biological condition, and how it naturally accounts for the different IP efficiencies of individual ChIP-seq experiments.

  18. Secure collaborative system in heterogenous wireless sensor networks

    Directory of Open Access Journals (Sweden)

    M. Kasraoui

    2015-04-01

    Full Text Available The IPv6 over Low power Wireless Personal Area Networks (6LoWPANs have turned out to be one of the most emerging field in Wireless Sensor Networks (WSNs which can be integrated with Internet technology. 6LoWPAN network consists of heterogeneous wireless sensors which have high resource-constraints such as bandwidth, processing power, memory, energy, etc. The resource-constraints put forth many challenges to apply the available standard security protocols such as Transport Layer Security (TLS, Internet Protocol Security (IPSec, Internet Key Exchange version 2 (IKEv2, etc., for the interconnection of Heterogeneous Wireless Sensor Networks (HWSNs with Internet. To overcome these situations, the researchers aimed to reinforce and adapt the end-to-end security between Internet and the IP enabled sensor networks. The above mentioned security protocols are not modified at the Internet end point in HWSNs. Hence we are proposing a novel Cooperative Key Exchange System (CKES by using the concept of Chinese Remainder Theorem (CRT. We have used NS2 simulator to implement the proposed concept and also compared with IKEv2.

  19. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  20. Wireless communications resource management

    CERN Document Server

    Lee, B; Seo, H

    2009-01-01

    Wireless technologies continue to evolve to address the insatiable demand for faster response times, larger bandwidth, and reliable transmission. Yet as the industry moves toward the development of post 3G systems, engineers have consumed all the affordable physical layer technologies discovered to date. This has necessitated more intelligent and optimized utilization of available wireless resources. Wireless Communications Resource Managem ent, Lee, Park, and Seo cover all aspects of this critical topic, from the preliminary concepts and mathematical tools to detailed descriptions of all the resource management techniques. Readers will be able to more effectively leverage limited spectrum and maximize device battery power, as well as address channel loss, shadowing, and multipath fading phenomena.

  1. Wireless physical layer security.

    Science.gov (United States)

    Poor, H Vincent; Schaefer, Rafael F

    2017-01-03

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  2. Wireless Technology Development: History, Now, and Then

    OpenAIRE

    Lusiana Citra Dewi

    2011-01-01

    Wireless technology is one of many technologies that can enable people to communicate with each other by air medium, or rather you can say by radio frequency. This paper discusses about history of wireless technology, different kinds of wireless connection, wireless technology standards, and a few comparisons of different kinds of world’s wireless technology standards. Besides discussing about history about wireless technology and wireless technology that we can use nowadays, this paper also ...

  3. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  4. Layer-component-based communication stack framework for wireless residential control systems

    DEFF Research Database (Denmark)

    Torbensen, Rune Sonnich; Hjorth, Theis

    2010-01-01

    of nodes such as bridges, controllers, sensor/actuators - as well as secure communication between them. A special messaging system facilitates inter-component communication, and a Virtual Port Service protocol enables resource addressing. The end-devices in the heterogeneous network are made accessible...... on a common IP infrastructure, regardless of individual wireless technology. Legacy home automation devices are also supported. A prototype has been implemented on multiple resource-constrained hardware platforms, to demonstrate that the solution is both feasible for low-cost devices and portable. It has been...... shown how the framework facilitates fast prototyping and makes developing secure wireless control systems less complex....

  5. Layer-component-based communication stack framework for wireless residential control systems

    DEFF Research Database (Denmark)

    Torbensen, R.; Hjorth, Theis S.

    2011-01-01

    of nodes such as bridges, controllers, sensor/actuators – as well as secure communication between them. A special messaging system facilitates inter-component communication, and a Virtual Port Service protocol enables resource addressing. The end-devices in the heterogeneous network are made accessible...... on a common IP infrastructure, regardless of individual wireless technology. Legacy home automation devices are also supported. A prototype has been implemented on multiple resource-constrained hardware platforms, to demonstrate that the solution is both feasible for low-cost devices and portable. It has been...... shown how the framework facilitates fast prototyping and makes developing secure wireless control systems less complex....

  6. Automated Negotiation for Resource Assignment in Wireless Surveillance Sensor Networks

    Directory of Open Access Journals (Sweden)

    Enrique de la Hoz

    2015-11-01

    Full Text Available Due to the low cost of CMOS IP-based cameras, wireless surveillance sensor networks have emerged as a new application of sensor networks able to monitor public or private areas or even country borders. Since these networks are bandwidth intensive and the radioelectric spectrum is limited, especially in unlicensed bands, it is mandatory to assign frequency channels in a smart manner. In this work, we propose the application of automated negotiation techniques for frequency assignment. Results show that these techniques are very suitable for the problem, being able to obtain the best solutions among the techniques with which we have compared them.

  7. Automated Negotiation for Resource Assignment in Wireless Surveillance Sensor Networks

    Science.gov (United States)

    de la Hoz, Enrique; Gimenez-Guzman, Jose Manuel; Marsa-Maestre, Ivan; Orden, David

    2015-01-01

    Due to the low cost of CMOS IP-based cameras, wireless surveillance sensor networks have emerged as a new application of sensor networks able to monitor public or private areas or even country borders. Since these networks are bandwidth intensive and the radioelectric spectrum is limited, especially in unlicensed bands, it is mandatory to assign frequency channels in a smart manner. In this work, we propose the application of automated negotiation techniques for frequency assignment. Results show that these techniques are very suitable for the problem, being able to obtain the best solutions among the techniques with which we have compared them. PMID:26610512

  8. Wireless communications algorithmic techniques

    CERN Document Server

    Vitetta, Giorgio; Colavolpe, Giulio; Pancaldi, Fabrizio; Martin, Philippa A

    2013-01-01

    This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It focuses on single user systems, so ignoring multiple access techniques. Moreover, emphasis is put on single-input single-output (SISO) systems, although some relevant topics about multiple-input multiple-output (MIMO) systems are also illustrated.Comprehensive wireless specific guide to algorithmic techniquesProvides a detailed analysis of channel equalization and channel coding for wi

  9. Wireless sensor platform

    Energy Technology Data Exchange (ETDEWEB)

    Joshi, Pooran C.; Killough, Stephen M.; Kuruganti, Phani Teja

    2017-08-08

    A wireless sensor platform and methods of manufacture are provided. The platform involves providing a plurality of wireless sensors, where each of the sensors is fabricated on flexible substrates using printing techniques and low temperature curing. Each of the sensors can include planar sensor elements and planar antennas defined using the printing and curing. Further, each of the sensors can include a communications system configured to encode the data from the sensors into a spread spectrum code sequence that is transmitted to a central computer(s) for use in monitoring an area associated with the sensors.

  10. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  11. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  12. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  13. Wireless optical telecommunications

    CERN Document Server

    Bouchet, Olivier

    2013-01-01

    Wireless optical communication refers to communication based on the unguided propagation of optical waves. The past 30 years have seen significant improvements in this technique - a wireless communication solution for the current millennium - that offers an alternative to radio systems; a technique that could gain attractiveness due to recent concerns regarding the potential effects of radiofrequency waves on human health.The aim of this book is to look at the free space optics that are already used for the exchange of current information; its many benefits, such as incorporating chan

  14. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  15. Energy efficiency in wireless networks

    CERN Document Server

    Jumira, Oswald

    2013-01-01

    The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network "traffic" generated over network infrastructures.This book presents state-of-the-art energy-efficient techniques, designs and implementations that pertain to wireless communication networks such as cellular networks, wireless local area networks (WLANs) and wireless ad hoc networks (WAHNs) including mobile ad hoc networks (MANETs), and wireless sensor networks (WSNs) as they are deployed across the world to facilitate "always on" reliable high-speed

  16. New-generation security network with synergistic IP sensors

    Science.gov (United States)

    Peshko, Igor

    2007-09-01

    Global Dynamic Monitoring and Security Network (GDMSN) for real-time monitoring of (1) environmental and atmospheric conditions: chemical, biological, radiological and nuclear hazards, climate/man-induced catastrophe areas and terrorism threats; (2) water, soil, food chain quantifiers, and public health care; (3) large government/public/ industrial/ military areas is proposed. Each GDMSN branch contains stationary or mobile terminals (ground, sea, air, or space manned/unmanned vehicles) equipped with portable sensors. The sensory data are transferred via telephone, Internet, TV, security camera and other wire/wireless or optical communication lines. Each sensor is a self-registering, self-reporting, plug-and-play, portable unit that uses unified electrical and/or optical connectors and operates with IP communication protocol. The variant of the system based just on optical technologies cannot be disabled by artificial high-power radio- or gamma-pulses or sunbursts. Each sensor, being supplied with a battery and monitoring means, can be used as a separate portable unit. Military personnel, police officers, firefighters, miners, rescue teams, and nuclear power plant personnel may individually use these sensors. Terminals may be supplied with sensors essential for that specific location. A miniature "universal" optical gas sensor for specific applications in life support and monitoring systems was designed and tested. The sensor is based on the physics of absorption and/or luminescence spectroscopy. It can operate at high pressures and elevated temperatures, such as in professional and military diving equipment, submarines, underground shelters, mines, command stations, aircraft, space shuttles, etc. To enable this capability, the multiple light emitters, detectors and data processing electronics are located within a specially protected chamber.

  17. TCP/IP Implementations and Vendors Guide,

    Science.gov (United States)

    1986-02-01

    IMAGEN and others. The applications are integrated inwo the generic device, pathname...8217 . + ’. ’, " . . " .’ .- . - .- - - -- .. .- . . . . ’ - . . + ’ - .’ . . . , . ..++ - . -. ". , .-’ . , , - - . . . -+ ’- - - - , , - - , . . .. ... , - . % F 2.8. Imagen 2.8.1. Imprint-10 PRODUCT NAME: IMPRINT-10 TCP/IP Ethernet Printer DESCRIPTION: 4. The IMPRINT-10 is an...hardware O/S: Proprietary, not user-programmable IMPLEMENTATION-LANGUAGE: C DISTRIBUTOR: Imagen Corporation 2660 Marine

  18. La competenza per materia delle sezioni IP

    OpenAIRE

    Luigi Carlo Ubertazzi

    2004-01-01

    Italian Law 12/12/2002, n. 273 [0] as implemented through the Legislative Decree 168/2003 [1] has created "specialized sections" for IP-related matters in the courts (both first and second level) of Bari, Bologna, Catania, Firenze, Genova, Milano, Napoli, Palermo, Roma, Torino, Trieste and Venezia. These sections "deal with cases of national and communitarian trademarks, patents for inventions and new plant varieties, utility models, pictures and models, author rights and all cases of unfair ...

  19. Research study on IPS digital controller design

    Science.gov (United States)

    Kuo, B. C.; Folkerts, C.

    1976-01-01

    The performance is investigated of the simplified continuous-data model of the Instrument Pointing System (IPS). Although the ultimate objective is to study the digital model of the system, knowledge on the performance of the continuous-data model is important in the sense that the characteristics of the digital system should approach those of the continuous-data system as the sampling period approaches zero.

  20. Architectural design proposal for real time clock for wireless microcontroller unit

    Science.gov (United States)

    Alias, Muhammad Nor Azwan Mohd; Nizam Mohyar, Shaiful

    2017-11-01

    In this project, we are developing an Intellectual properties (IP) which is a dedicated real-time clock (RTC) system for a wireless microcontroller. This IP is developed using Verilog Hardware Description Language (Verilog HDL) and being simulated using Quartus II and Synopsys software. This RTC will be used in microcontroller system to provide precise time and date which can be used for various applications. It plays a very important role in the real-time systems like digital clock, attendance system, digital camera and more.

  1. Wireless Sensor Technologies and Applications

    Directory of Open Access Journals (Sweden)

    Feng Xia

    2009-11-01

    Full Text Available Recent years have witnessed tremendous advances in the design and applications of wirelessly networked and embedded sensors. Wireless sensor nodes are typically low-cost, low-power, small devices equipped with limited sensing, data processing and wireless communication capabilities, as well as power supplies. They leverage the concept of wireless sensor networks (WSNs, in which a large (possibly huge number of collaborative sensor nodes could be deployed. As an outcome of the convergence of micro-electro-mechanical systems (MEMS technology, wireless communications, and digital electronics, WSNs represent a significant improvement over traditional sensors. In fact, the rapid evolution of WSN technology has accelerated the development and deployment of various novel types of wireless sensors, e.g., multimedia sensors. Fulfilling Moore’s law, wireless sensors are becoming smaller and cheaper, and at the same time more powerful and ubiquitous. [...

  2. Resource management in wireless networking

    CERN Document Server

    Cardei, Mihaela; Du, Ding-Zhu

    2005-01-01

    This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.Survey chapters give an excellent introduction to key topics in resource management for wireless networks, while experts will be satisfied by the technical depth of the knowledge imparted in chapters exploring hot research topics.The subject area discussed in this book is very relevant today, considering the recent remarkable growth of wireless networking and the convergence of wireless personal communications, internet technologies and real-time multimedia.This volume is a very good companion for practitioners working on implementing solutions for multimedia and Quality of Service - sensitive applications over wireless networks.Written for:Researchers, faculty members, students...

  3. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR Staging

    Science.gov (United States)

    IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,request for assignment ofcopyri

  4. Media Distribution in Heterogeneous Environments using IP-Multicast

    OpenAIRE

    Parnes, Peter

    1998-01-01

    This document discusses problems and solutions around distribution of media in heterogeneous environments when using IP-multicast. This document discusses problems and solutions around distribution of media in heterogeneous environments when using IP-multicast.

  5. Role of ipsdienol, ipsenol, and cis-verbenol in chemical ecology of Ips avulsus, Ips calligraphus, and Ips grandicollis (Coleoptera: Curculionidae: Scolytinae).

    Science.gov (United States)

    Allison, Jeremy D; McKenney, Jessica L; Miller, Daniel R; Gimmel, Matthew L

    2012-06-01

    Stressed or damaged pine (Pinus sp.) trees in the southeastern United States are often colonized simultaneously by three southern Ips species (Coleoptera: Curculionidae: Scolytinae): small southern pine engraver, Ips avulsus (Eichhoff); sixspined ips, Ips calligraphus (Germar); and eastern fivespined ips, Ips grandicollis (Eichhoff). All three species mediate colonization of host material with volatile pheromones. All of the southern Ips produce cis-verbenol, and either ipsdienol or ipsenol, and electrophysiological studies have demonstrated that all three southern Ips are able to detect all three compounds. This study examined the role of ipsdienol, ipsenol, and cis-verbenol in the chemical ecology of the southern Ips in Georgia and Louisiana. The most attractive blends of pheromones, with the fewest number of components, were ipsdienol plus ipsenol for I. avulsus, cis-verbenol plus ipsdienol for I. calligraphus, and either cis-verbenol plus ipsenol or ipsdienol plus ipsenol for I. grandicollis. Cross-attraction of I. grandicollis to the pheromone blend most attractive to I. avulsus was observed. Although the presence of heterospecific pheromone reduced the catches of all three species (i.e., the tertiary blend captured fewer beetles than the most attractive binary blends) in both states (significantly in two cases), high numbers of all three species were still captured in traps baited with all three compounds. These results suggest that the pheromones cis-verbenol, ipsdienol, and ipsenol can be combined for monitoring all three species of the southern Ips simultaneously.

  6. Wireless Telegraphic Communication

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 7; Issue 1. Wireless Telegraphic Communication. Guglielmo Marconi. Classics Volume 7 Issue 1 January 2002 pp 95-101. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/007/01/0095-0101 ...

  7. Wireless, Not Penniless.

    Science.gov (United States)

    Schaeffer, Brett

    2003-01-01

    Describes some advantages of the early adoption of wireless, laptop, and personal digital assistant (PDA) technology. Provides examples of early adoption experiences in several school districts. Advantages include increased computer access, timesavings, and expanded curricular offerings. Also highlights potential cost savings involving, for…

  8. Wired vs. Wireless.

    Science.gov (United States)

    Fielding, Randall

    2000-01-01

    Presents a debate on which technology will be in tomorrow's classrooms and the pros and cons of wiring classrooms and using a wireless network. Concluding comments address the likelihood, and desirability, of placing computers throughout the entire educational process and what types of computers and capabilities are needed. (GR)

  9. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  10. Investigating Wireless Power Transfer

    Science.gov (United States)

    St. John, Stuart A.

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a…

  11. Wireless Sensors Network (Sensornet)

    Science.gov (United States)

    Perotti, J.

    2003-01-01

    The Wireless Sensor Network System presented in this paper provides a flexible reconfigurable architecture that could be used in a broad range of applications. It also provides a sensor network with increased reliability; decreased maintainability costs, and assured data availability by autonomously and automatically reconfiguring to overcome communication interferences.

  12. Investigating Wireless Power Transfer

    Science.gov (United States)

    St. John, Stuart A.

    2017-01-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a…

  13. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  14. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  15. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  16. A Survey of Voice over IP Security Research

    Science.gov (United States)

    Keromytis, Angelos D.

    We present a survey of Voice over IP security research. Our goal is to provide a roadmap for researchers seeking to understand existing capabilities and, and to identify gaps in addressing the numerous threats and vulnerabilities present in VoIP systems. We also briefly discuss the implications of our findings with respect to actual vulnerabilities reported in a variety VoIP products.

  17. Impact of genome assembly status on ChIP-Seq and ChIP-PET data mapping

    Directory of Open Access Journals (Sweden)

    Sachs Laurent

    2009-12-01

    Full Text Available Abstract Background ChIP-Seq and ChIP-PET can potentially be used with any genome for genome wide profiling of protein-DNA interaction sites. Unfortunately, it is probable that most genome assemblies will never reach the quality of the human genome assembly. Therefore, it remains to be determined whether ChIP-Seq and ChIP-PET are practicable with genome sequences other than a few (e.g. human and mouse. Findings Here, we used in silico simulations to assess the impact of completeness or fragmentation of genome assemblies on ChIP-Seq and ChIP-PET data mapping. Conclusions Most currently published genome assemblies are suitable for mapping the short sequence tags produced by ChIP-Seq or ChIP-PET.

  18. Performance of Implementation IBR-DTN and Batman-Adv Routing Protocol in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Herman Yuliandoko

    2016-03-01

    Full Text Available Wireless mesh networks is a network which has high mobility and flexibility network. In Wireless mesh networks nodes are free to move and able to automatically build a network connection with other nodes. High mobility, heterogeneous condition and intermittent network connectivity cause data packets drop during wireless communication and it becomes a problem in the wireless mesh networks. This condition can happen because wireless mesh networks use connectionless networking type such as IP protocol which it is not tolerant to delay. To solve this condition it is needed a technology to keep data packets when the network is disconnect. Delay tolerant technology is a technology that provides store and forward mechanism and it can prevent packet data dropping during communication. In our research, we proposed a test bed wireless mesh networks implementation by using proactive routing protocol and combining with delay tolerant technology. We used Batman-adv routing protocol and IBR-DTN on our research. We measured some particular performance aspect of networking such as packet loss, delay, and throughput of the network. We identified that delay tolerant could keep packet data from dropping better than current wireless mesh networks in the intermittent network condition. We also proved that IBR-DTN and Batman-adv could run together on the wireless mesh networks. In The experiment throughput test result of IBR-DTN was higher than Current TCP on the LoS (Line of Side and on environment with obstacle. Keywords: Delay Tolerant, IBR-DTN, Wireless Mesh, Batman-adv, Performance

  19. NASA Bluetooth Wireless Communications

    Science.gov (United States)

    Miller, Robert D.

    2007-01-01

    NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.

  20. How can we integrate IP strategy with corporate strategy? Combining IP strategy with management strategy making process

    OpenAIRE

    田中, 義敏; Tanaka, Yoshitoshi

    2013-01-01

    Intellectual property systems have been introduced and used in manycountries as a global standard. However, its practical utilisation is still not yetmature because of the lack of IP strategy. Each enterprise has to define aunique IP strategy and be differentiated by other enterprises because the outsideenvironment and internal resource are different. IP people have to havebetter understandings on strategy making process, which is fundamental to themanagement field. In addition, IP strategy s...

  1. Impact of artefact removal on ChIP quality metrics in ChIP-seq and ChIP-exo data.

    Directory of Open Access Journals (Sweden)

    Thomas Samuel Carroll

    2014-04-01

    Full Text Available With the advent of ChIP-seq multiplexing technologies and the subsequent increase in ChIP-seq throughput, the development of working standards for the quality assessment of ChIP-seq studies has received significant attention. The ENCODE consortium’s large scale analysis of transcription factor binding and epigenetic marks as well as concordant work on ChIP-seq by other laboratories has established a new generation of ChIP-seq quality control measures. The use of these metrics alongside common processing steps has however not been evaluated. In this study, we investigate the effects of blacklisting and removal of duplicated reads on established metrics of ChIP-seq quality and show that the interpretation of these metrics is highly dependent on the ChIP-seq preprocessing steps applied. Further to this we perform the first investigation of the use of these metrics for ChIP-exo data and make recommendations for the adaptation of the NSC statistic to allow for the assessment of ChIP-exo efficiency.

  2. Impact of artifact removal on ChIP quality metrics in ChIP-seq and ChIP-exo data

    Science.gov (United States)

    Carroll, Thomas S.; Liang, Ziwei; Salama, Rafik; Stark, Rory; de Santiago, Ines

    2014-01-01

    With the advent of ChIP-seq multiplexing technologies and the subsequent increase in ChIP-seq throughput, the development of working standards for the quality assessment of ChIP-seq studies has received significant attention. The ENCODE consortium's large scale analysis of transcription factor binding and epigenetic marks as well as concordant work on ChIP-seq by other laboratories has established a new generation of ChIP-seq quality control measures. The use of these metrics alongside common processing steps has however not been evaluated. In this study, we investigate the effects of blacklisting and removal of duplicated reads on established metrics of ChIP-seq quality and show that the interpretation of these metrics is highly dependent on the ChIP-seq preprocessing steps applied. Further to this we perform the first investigation of the use of these metrics for ChIP-exo data and make recommendations for the adaptation of the NSC statistic to allow for the assessment of ChIP-exo efficiency. PMID:24782889

  3. Analysis list: Atf7ip [Chip-atlas[Archive

    Lifescience Database Archive (English)

    Full Text Available Atf7ip Pluripotent stem cell + mm9 http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/target/Atf7ip....1.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/target/Atf7ip.5.tsv http://dbarchive.biosc...iencedbc.jp/kyushu-u/mm9/target/Atf7ip.10.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/colo/Atf7ip.Plurip...otent_stem_cell.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/colo/Pluripotent_stem_cell.gml ...

  4. Evolving science enhanced with iPS

    Directory of Open Access Journals (Sweden)

    Editor

    2007-11-01

    Full Text Available Dear friends, Greetings from all in the team. With the stage set for online submissions and the review-response-revision-resubmission process standardized, we have come with the first regular issue and from now there will be quarterly issues of the journal. Since the starting of the JSRM in a short span there have been a lot of developments, which we would rather say as "evolutions" keeping in mind, the recent iPS! This evolution we would like you to see from a background of the various developments in the art and science of medicine throughout in the past three centuries. We have come across the era of investigative tools such as bamboo made laryngoscopes to era of vaccines and antibiotics followed by the era of revolutionary non-invasive procedures and recently the nano technology based drugs and now the iPS! Macro to Micro, but still more to go. All through the influence of the society, religions, philosophies have been playing a very important role in every step the science of biology moves ahead. Starting with the contraception, assisted reproduction then the gene modified plants....and now the embryonic stem cells! With the advent of the iPS, though the issues of oncogenes, teratoma yet to be ruled out, we have found there is a way which can bypass the ES cells! Hats off to those scientists who have burnt their midnight oil to have found this way out! The lesson we learn is to explore things with an open mind and continue to proceed further without spending much time fingers crossed. Yours sincerely,The Editorial team.

  5. Wireless Technology Development: History, Now, and Then

    Directory of Open Access Journals (Sweden)

    Lusiana Citra Dewi

    2011-12-01

    Full Text Available Wireless technology is one of many technologies that can enable people to communicate with each other by air medium, or rather you can say by radio frequency. This paper discusses about history of wireless technology, different kinds of wireless connection, wireless technology standards, and a few comparisons of different kinds of world’s wireless technology standards. Besides discussing about history about wireless technology and wireless technology that we can use nowadays, this paper also reviews about prediction of wireless technology development in the future for better human life. The purpose of this study is to give a glimpse of view on how the wireless technology develops, the world standard for wireless technologies and work system, the security and characteristic for each wireless technology including advantages and drawbacks, and future wireless technology development. 

  6. Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)

    Science.gov (United States)

    Ivancic, William D.

    1997-01-01

    The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.

  7. ejIP: A TCP/IP Stack for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2011-01-01

    To enable Java on resource constraint embedded devices, the whole system should be implemented in a single programming language to avoid overheads on language boundaries. However, most of the functionality that is dedicated to the operating system layer is usually written in C. In this paper we...... present the design and implementation of a network stack written entirely in Java. This implementation serves as an example how to implement system functions in a safe language and gives evidence that Java can be used for operating system related functionality. The described TCP/IP stack ejIP has already...... been successfully used in industrial projects on pure Java embedded systems....

  8. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  9. 5G Wireless Communication Systems

    OpenAIRE

    Saddam Hossain

    2013-01-01

    As a subscriber becomes more aware of the mobile phone technology, he/she will seek for anappropriate package all together, including all the advanced features of a cellular phone can have. Hence, the search for new technology is always the main intention of the prime cell phone giants to out innovate their competitors. In addition, the main purpose of the fifth generation wireless networks (5G Wireless networks) is planned to design the best wireless world that is free from limitations...

  10. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  11. SONAbeam optical wireless products

    Science.gov (United States)

    Carbonneau, Theresa H.; Mecherle, G. Stephen

    2000-05-01

    fSONA has developed an optical wireless line of products that will enable high bandwidth wireless connectivity, much like fiber optic technology has done for wired connectivity. All of the fSONA products use wavelengths around 1.5 micrometers both for eye safety and for maximum commonality with fiber optic technology. Initial products provide either OC-3 (155 Mbps) or Fast Ethernet (125 Mbps). The 2 km unit is fixed mounted and provides a relatively large beamwidth to compensate for building motion. The 4 km unit utilizes a narrow transmit beamwidth with active pointing for motion compensation. Trials of the units with key customers begin in second quarter 2000, with volume production of the 2 km- unit beginning in third quarter and the 4 km unit in the fourth quarter. Product designs for 622 Mbps and 1.25 Gbps should be completed prior to the end of the 2000.

  12. Wireless Seismometer for Venus

    Science.gov (United States)

    Ponchak, George E.; Scardelletti, Maximilian C.; Taylor, Brandt; Beard, Steve; Clougherty, Brian; Meredith, Roger D.; Beheim, Glenn M.; Kiefer, Walter S.; Hunter, Gary W.

    2014-01-01

    Measuring the seismic activity of Venus is critical to understanding its composition and interior dynamics. Because Venus has an average surface temperature of 462 C and the challenge of providing cooling to multiple seismometers, a high temperature, wireless sensor using a wide bandgap semiconductor is an attractive option. This paper presents progress towards a seismometer sensor with wireless capabilities for Venus applications. A variation in inductance of a coil caused by a 1 cm movement of a ferrite probe held in the coil and attached to a balanced leaf-spring seismometer causes a variation of 80 MHz in the transmitted signal from the oscillator sensor system at 420 C, which correlates to a 10 kHz mm sensitivity when the ferrite probe is located at the optimum location in the coil.

  13. La competenza per materia delle sezioni IP

    Directory of Open Access Journals (Sweden)

    Luigi Carlo Ubertazzi

    2004-12-01

    Full Text Available Italian Law 12/12/2002, n. 273 [0] as implemented through the Legislative Decree 168/2003 [1] has created "specialized sections" for IP-related matters in the courts (both first and second level of Bari, Bologna, Catania, Firenze, Genova, Milano, Napoli, Palermo, Roma, Torino, Trieste and Venezia. These sections "deal with cases of national and communitarian trademarks, patents for inventions and new plant varieties, utility models, pictures and models, author rights and all cases of unfair competition when these cases interfere with the protection of industrial and intellectual property". This paper discusses the different positions of Italian law scholars and lawyers as to whether the list of subjects, on which the specialized sections are competent as written in the law, is intensive or extensive - in other words, whether the specialized sections should take care *only* of the matters that the law clearly specifies, or whether they should take care of everything "related to" intellectual and industrial property. In this paper several justifications are made for giving full responsibility to IP sections over all law cases dealing with intellectual property (extensive interpretation, together with a rebuttal of the most relevant positions advocating an intensive interpretation of the law.

  14. IPS - a vision aided navigation system

    Science.gov (United States)

    Börner, Anko; Baumbach, Dirk; Buder, Maximilian; Choinowski, Andre; Ernst, Ines; Funk, Eugen; Grießbach, Denis; Schischmanow, Adrian; Wohlfeil, Jürgen; Zuev, Sergey

    2017-04-01

    Ego localization is an important prerequisite for several scientific, commercial, and statutory tasks. Only by knowing one's own position, can guidance be provided, inspections be executed, and autonomous vehicles be operated. Localization becomes challenging if satellite-based navigation systems are not available, or data quality is not sufficient. To overcome this problem, a team of the German Aerospace Center (DLR) developed a multi-sensor system based on the human head and its navigation sensors - the eyes and the vestibular system. This system is called integrated positioning system (IPS) and contains a stereo camera and an inertial measurement unit for determining an ego pose in six degrees of freedom in a local coordinate system. IPS is able to operate in real time and can be applied for indoor and outdoor scenarios without any external reference or prior knowledge. In this paper, the system and its key hardware and software components are introduced. The main issues during the development of such complex multi-sensor measurement systems are identified and discussed, and the performance of this technology is demonstrated. The developer team started from scratch and transfers this technology into a commercial product right now. The paper finishes with an outlook.

  15. Wireless Sensor Portal Technology Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Recognizing the needs and challenges facing NASA Earth Science for data input, manipulation and distribution, Mobitrum is proposing a ? Wireless Sensor Portal...

  16. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because....... This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  17. Integration of hybrid wireless networks in cloud services oriented enterprise information systems

    Science.gov (United States)

    Li, Shancang; Xu, Lida; Wang, Xinheng; Wang, Jue

    2012-05-01

    This article presents a hybrid wireless network integration scheme in cloud services-based enterprise information systems (EISs). With the emerging hybrid wireless networks and cloud computing technologies, it is necessary to develop a scheme that can seamlessly integrate these new technologies into existing EISs. By combining the hybrid wireless networks and computing in EIS, a new framework is proposed, which includes frontend layer, middle layer and backend layers connected to IP EISs. Based on a collaborative architecture, cloud services management framework and process diagram are presented. As a key feature, the proposed approach integrates access control functionalities within the hybrid framework that provide users with filtered views on available cloud services based on cloud service access requirements and user security credentials. In future work, we will implement the proposed framework over SwanMesh platform by integrating the UPnP standard into an enterprise information system.

  18. Mobile RFID of Wireless Mesh Network for Intelligent Safety Care System

    Directory of Open Access Journals (Sweden)

    Chwen-Fu Horng

    2009-12-01

    Full Text Available This paper presents the Wi-Fi phone with RFID (Radio frequency identification of student entered the school, via Wireless Access Points (APs of school will transmit MAC address with RFID of Wi-Fi phone to Internet Data Center (IDC for server and then the message exchanged by using GSM (or 3G has been transmitted message (or mail to the mobile user of parents (or client user. The wireless access points support broadcasting multiple SSIDs, each of which can have a different set of security and network setting. The RADIUS server is used to authenticate the Wireless Access Point (AP and mobile nodes. In safety case system, we used the several authentication and encryption options for the WLAN. We will discuss the use of Wi-Fi protected Access (WPA, RFID, IP Security (IPSec, and Secure Socket Layer (SSL, and there are high Quality of service (QoS and performance.

  19. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  20. Wireless Cellular Mobile Communications

    OpenAIRE

    V. Zalud

    2002-01-01

    In this article is briefly reviewed the history of wireless cellular mobile communications, examined the progress in current second generation (2G) cellular standards and discussed their migration to the third generation (3G). The European 2G cellular standard GSM and its evolution phases GPRS and EDGE are described somewhat in detail. The third generation standard UMTS taking up on GSM/GPRS core network and equipped with a new advanced access network on the basis of code division multiple ac...

  1. Wireless just-in-time training of mobile skilled support personnel

    Science.gov (United States)

    Bandera, Cesar; Marsico, Michael; Rosen, Mitchel; Schlegel, Barry

    2006-05-01

    Skilled Support Personnel (SSP) serve emergency response organizations during an emergency incident, and include laborers, operating engineers, carpenters, ironworkers, sanitation workers and utility workers. SSP called to an emergency incident rarely have recent detailed training on the chemical, biological, radiological, nuclear and/or explosives (CBRNE) agents or the personal protection equipment (PPE) relevant to the incident. This increases personal risk to the SSP and mission risk at the incident site. Training for SSP has been identified as a critical need by the National Institute for Environmental Health Sciences, Worker Education and Training Program. We present a system being developed to address this SSP training shortfall by exploiting a new training paradigm called just-in-time training (JITT) made possible by advances in distance learning and cellular telephony. In addition to the current conventional training at regularly scheduled instructional events, SSP called to an emergency incident will have secure access to short (cell phone technologies and wireless service providers, integration with the incident management system, and SCORM compliance.

  2. Chromatin immunoprecipitation (ChIP) of plant transcription factors followed by sequencing (ChIP-SEQ) or hybridization to whole genome arrays (ChIP-CHIP)

    NARCIS (Netherlands)

    Kaufmann, K.; Muiño, J.M.; Østerås, M.; Farinelli, L.; Krajewski, P.; Angenent, G.C.

    2010-01-01

    Chromatin immunoprecipitation (ChIP) is a powerful technique to study interactions between transcription factors (TFs) and DNA in vivo. For genome-wide de novo discovery of TF-binding sites, the DNA that is obtained in ChIP experiments needs to be processed for sequence identification. The sequences

  3. A wireless sensor network deployment for rural and forest fire detection and verification.

    Science.gov (United States)

    Lloret, Jaime; Garcia, Miguel; Bri, Diana; Sendra, Sandra

    2009-01-01

    Forest and rural fires are one of the main causes of environmental degradation in Mediterranean countries. Existing fire detection systems only focus on detection, but not on the verification of the fire. However, almost all of them are just simulations, and very few implementations can be found. Besides, the systems in the literature lack scalability. In this paper we show all the steps followed to perform the design, research and development of a wireless multisensor network which mixes sensors with IP cameras in a wireless network in order to detect and verify fire in rural and forest areas of Spain. We have studied how many cameras, sensors and access points are needed to cover a rural or forest area, and the scalability of the system. We have developed a multisensor and when it detects a fire, it sends a sensor alarm through the wireless network to a central server. The central server selects the closest wireless cameras to the multisensor, based on a software application, which are rotated to the sensor that raised the alarm, and sends them a message in order to receive real-time images from the zone. The camera lets the fire fighters corroborate the existence of a fire and avoid false alarms. In this paper, we show the test performance given by a test bench formed by four wireless IP cameras in several situations and the energy consumed when they are transmitting. Moreover, we study the energy consumed by each device when the system is set up. The wireless sensor network could be connected to Internet through a gateway and the images of the cameras could be seen from any part of the world.

  4. KAJIAN INDUCED PLURIPOTENT STEMCELL (iPS (HARAPAN DAN TANTANGAN

    Directory of Open Access Journals (Sweden)

    Masagus Zainuri

    2014-05-01

    Full Text Available AbstractInduced Pluripotent Stemcell (iPS are adult cells which the genetic information in the nucleus of those cells being reprogrammed (reprogram by inserting exogenous pluripotential genes. The exogenous gene transduction is using vectors, such as lentivirus, retrovirus, or adenovirus, which suppressed the gene expression of the original cells, so they will express the transduced exogenous gene. Viral vectors are then used to reprogramming and producing iPS clones that are pluripotent. iPS derived from adult cells of patient with certain diseases will be used as a tool to study the mechanisms of those specific diseases and the effects of selected drugs against the diseases. Several previous studies have shown that iPS clones developed from specific genetic disease have its original genotype and retain the character of the response to the drug that similar as the original adult cells. Opportunities for the utilization of autologous iPS cell therapy in the future is wide open as expected iPS transplant will not be rejected when transplanted back to the patient. Behind all its potential, iPS production is still facing some problems to be applicable clinically. The use of viruses as vectors may cause problems due to virus gene sequences may be integrated into the genome of the DNA donor cell, thereby causing mutations of the iPS clones. Several subsequent studies have succeeded in replacing the use of viruses as vectors, but the level of efficiency obtained is still very low. Another problem that arises is that epigenetic changes may occur in iPS cultures. Many advanced research related to iPS may be developed in Indonesia and is necessary to improve the production efficiency of iPS and solve iPS clones epigenetic changes problems in the future.Keywords: iPS, pluripotency, transduction, transfection.AbstrakInduced Pluripotent Stemcell (iPS adalah sel somatic dewasa yang informasi genetika dalam inti selnyadiprogram ulang (reprogram dengan cara

  5. Analisis Performansi Konektifitas Pada Jaringan Wireless Broadband di Bandung

    Directory of Open Access Journals (Sweden)

    OTNIEL TONAPA

    2016-02-01

    Full Text Available Abstrak Perkembangan teknologi komunikasi Wireless mengarah ke teknologi yang berbasis jaringan IP (Internet Protocol. Access Point adalah suatu perangkat Wireless Router.  Access point membentuk hot spot, sedangkan Wireless Router mengatur lalu lintas data. Parameter yang diukur pada penelitian ini yaitu Quality of Service (QoS, antara lain pengukuran jitter, delay, dan packet loss yang dihasilkan dalam layanan paket data. Nilai jitter rata-rata sesama pengguna modem ADSL yang terhubung dengan access point pada smartphone bernilai 143.36 ms sedangkan pada laptop berada pada nilai 45.6 ms. Nilai jitter sesama penguna modem GPON, nilai rata-rata pada smartphone bernilai 133.12 ms, sedangkan pada laptop berada pada nilai 45.56 ms. Nilai rata-rata delay sesama pengguna modem ADSL pada smartphone bernilai 99.04 ms, sedangkan pada laptop sebesar 56.33 ms. Nilai rata-rata delay pada sesama pengguna modem GPON pada smartphone adalah 97.96 ms sedangkan pada laptop sebesar 56.15 ms.  Packet loss dari hasil pengujian keduanya memiliki presentase sama yaitu 1%. Kata kunci: Teknologi Digital Subscriber Line, Jaringan Optik Pasif, Dynamic Host Configuration Protocol (DHCP, Quality of Service (QoS Abstract Wireless communication technology development leading to technologies that network-based IP (Internet Protocol. Access Point Wireless Router is a device. Access point forming a hot spot, while the router manage data traffic. Parameters measured in this research is Quality of Service (QoS. among other things, measuring jitter, delay, and packet loss. resulting in packet data service. Jitter value among ADSL fellow have the average on smartphones 143.36 ms. On laptop average be at 45.6 ms. While jitter value among GPON fellow user have the average on smartphone 133.12 ms. On laptop average be at 45.56 ms. The average value of the delay to ADSL fellow users on smartphones 99.04 ms and on laptop average be at 56.33 ms. While delay value among GPON fellow user

  6. Platform for capacity reservation in IP networks

    Directory of Open Access Journals (Sweden)

    Maksić Nataša

    2013-01-01

    Full Text Available The fast development of multimedia devices and services causes the need for increase of the transport capacity of packet networks. OSPF-TE uses both the information about network topology and the link utilization when finding the routing path. Accordingly, it might find path even in the cases when the shortest path routing would cause overloaded link and dropped packets. In this paper we develop the platform for capacity reservation in IP networks. We implement OSPF-TE protocol as an extension of the existing OSPF. In addition, the basic functionalities of the reservation protocol and the user interface are implemented. We present the simulation environment for the verification of our implementation and for the analysis of various routing algorithms based on the information conveyed by OSPF-TE.

  7. Telemetry and Communication IP Video Player

    Science.gov (United States)

    OFarrell, Zachary L.

    2011-01-01

    Aegis Video Player is the name of the video over IP system for the Telemetry and Communications group of the Launch Services Program. Aegis' purpose is to display video streamed over a network connection to be viewed during launches. To accomplish this task, a VLC ActiveX plug-in was used in C# to provide the basic capabilities of video streaming. The program was then customized to be used during launches. The VLC plug-in can be configured programmatically to display a single stream, but for this project multiple streams needed to be accessed. To accomplish this, an easy to use, informative menu system was added to the program to enable users to quickly switch between videos. Other features were added to make the player more useful, such as watching multiple videos and watching a video in full screen.

  8. PENGEMBANGAN BUKU AJAR IPS SD BERBASIS KONTEKSTUAL

    Directory of Open Access Journals (Sweden)

    Dina Fitrohtur Rohmah

    2017-05-01

    Full Text Available Text book is an instructional material which is often used in learning. Text book which is used in learning should be contextual with students’ characteristic and environment. The aim of this research is to develop supplement book in learning that is contextual Social Studies Textbooks which is valid, interesting, practical, and effective. Data are collected by questionnaire, test, and documentation. Based on data analysis, it shows that the text book is valid, interseting, practical, and effective to use in learning. Buku ajar merupakan bahan ajar yang sering digunakan dalam pembelajaran. Buku ajar yang digunakan dalam pembelajaran hendaknya kontekstual dengan karakteristik dan lingkungan siswa. Tujuan penelitian ini untuk mengembangkan buku suplemen dalam pembelajaran berupa buku ajar IPS SD berbasis kontekstual yang valid, menarik, praktis, dan efektif. Data dikumpulkan melalui angket, tes, dan dokumentasi. Berdasarkan analisis data, menunjukkan bahwa buku yang dikembangkan valid, menarik, praktis, dan efektif digunakan dalam pembelajaran.

  9. Forwarding Techniques for IP Fragmented Packets in a Real 6LoWPAN Network

    Directory of Open Access Journals (Sweden)

    Jordi Casademont

    2011-01-01

    Full Text Available Wireless Sensor Networks (WSNs are attracting more and more interest since they offer a low-cost solution to the problem of providing a means to deploy large sensor networks in a number of application domains. We believe that a crucial aspect to facilitate WSN diffusion is to make them interoperable with external IP networks. This can be achieved by using the 6LoWPAN protocol stack. 6LoWPAN enables the transmission of IPv6 packets over WSNs based on the IEEE 802.15.4 standard. IPv6 packet size is considerably larger than that of IEEE 802.15.4 data frame. To overcome this problem, 6LoWPAN introduces an adaptation layer between the network and data link layers, allowing IPv6 packets to be adapted to the lower layer constraints. This adaptation layer provides fragmentation and header compression of IP packets. Furthermore, it also can be involved in routing decisions. Depending on which layer is responsible for routing decisions, 6LoWPAN divides routing in two categories: mesh under if the layer concerned is the adaptation layer and route over if it is the network layer. In this paper we analyze different routing solutions (route over, mesh under and enhanced route over focusing on how they forward fragments. We evaluate their performance in terms of latency and energy consumption when transmitting IP fragmented packets. All the tests have been performed in a real 6LoWPAN implementation. After consideration of the main problems in forwarding of mesh frames in WSN, we propose and analyze a new alternative scheme based on mesh under, which we call controlled mesh under.

  10. Machinability of IPS Empress 2 framework ceramic.

    Science.gov (United States)

    Schmidt, C; Weigl, P

    2000-01-01

    Using ceramic materials for an automatic production of ceramic dentures by CAD/CAM is a challenge, because many technological, medical, and optical demands must be considered. The IPS Empress 2 framework ceramic meets most of them. This study shows the possibilities for machining this ceramic with economical parameters. The long life-time requirement for ceramic dentures requires a ductile machined surface to avoid the well-known subsurface damages of brittle materials caused by machining. Slow and rapid damage propagation begins at break outs and cracks, and limits life-time significantly. Therefore, ductile machined surfaces are an important demand for machine dental ceramics. The machining tests were performed with various parameters such as tool grain size and feed speed. Denture ceramics were machined by jig grinding on a 5-axis CNC milling machine (Maho HGF 500) with a high-speed spindle up to 120,000 rpm. The results of the wear test indicate low tool wear. With one tool, you can machine eight occlusal surfaces including roughing and finishing. One occlusal surface takes about 60 min machining time. Recommended parameters for roughing are middle diamond grain size (D107), cutting speed v(c) = 4.7 m/s, feed speed v(ft) = 1000 mm/min, depth of cut a(e) = 0.06 mm, width of contact a(p) = 0.8 mm, and for finishing ultra fine diamond grain size (D46), cutting speed v(c) = 4.7 m/s, feed speed v(ft) = 100 mm/min, depth of cut a(e) = 0.02 mm, width of contact a(p) = 0.8 mm. The results of the machining tests give a reference for using IPS Empress(R) 2 framework ceramic in CAD/CAM systems. Copyright 2000 John Wiley & Sons, Inc.

  11. Wireless communication with multiple antennas

    Indian Academy of Sciences (India)

    admin

    Wireless communications has seen a very rapid growth, both in practice and theory, during the past one decade. Most of the present wireless communication systems use one transmit antenna and one receive antenna. However, communication with multiple transmit and multiple receive antennas can enormously increase ...

  12. Green Wireless Power Transfer Networks

    NARCIS (Netherlands)

    Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.

    2016-01-01

    wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.

  13. Launching a Wireless Laptop Program

    Science.gov (United States)

    Grignano, Domenic

    2007-01-01

    In this article, the author, as a technology director for East Rock Magnet School in New Haven, Connecticut, a federal government test site for laptop learning, shares his secrets to a successful implementation of a wireless laptop program: (1) Build a wireless foundation; (2) Do not choose the cheapest model just because of budget; (3) A sturdy…

  14. Energy efficient wireless ATM design

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Smit, Gerardus Johannes Maria; Bos, M.

    1999-01-01

    Energy efficiency is an important issue for mobile computers since they must rely on their batteries. We present an architecture for wireless ATM and a novel MAC protocol that achieves a good energy efficiency of the wireless interface of the mobile and provides QoS support for diverse traffic

  15. Energy-efficient wireless communication

    NARCIS (Netherlands)

    Havinga, Paul J.M.

    2000-01-01

    In this chapter we present an energy-efficient highly adaptive network interface architecture and a novel data link layer protocol for wireless networks that provides Quality of Service (QoS) support for diverse traffic types. Due to the dynamic nature of wireless networks, adaptations in bandwidth

  16. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... COMMISSION In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices... importation, and the sale within the United States after importation of certain wireless communications system... importation of certain wireless communications system server software, wireless handheld devices or battery...

  17. Views of wireless network systems.

    Energy Technology Data Exchange (ETDEWEB)

    Young, William Frederick; Duggan, David Patrick

    2003-10-01

    Wireless networking is becoming a common element of industrial, corporate, and home networks. Commercial wireless network systems have become reliable, while the cost of these solutions has become more affordable than equivalent wired network solutions. The security risks of wireless systems are higher than wired and have not been studied in depth. This report starts to bring together information on wireless architectures and their connection to wired networks. We detail information contained on the many different views of a wireless network system. The method of using multiple views of a system to assist in the determination of vulnerabilities comes from the Information Design Assurance Red Team (IDART{trademark}) Methodology of system analysis developed at Sandia National Laboratories.

  18. Overview of the Moral Status of iPS Cells.

    Science.gov (United States)

    Martinho, Andreia Martins

    2016-07-01

    The production of induced pluripotent stem (iPS) cells in 2006 by Takahashi and Yamanaka was a major breakthrough in stem cell research. IPS cells technology holds great promise for cell therapy, disease modelling, and drug testing, but it poses ethical questions concerning the moral status of somatic cells, which can re-gain pluripotency (iPS cells). This article provides an overview of the arguments that substantiate the debate on the moral assessment of iPS cells: potentiality argument; relational properties/standard view; and genetic basis for moral status.

  19. Distinct iPS Cells Show Different Cardiac Differentiation Efficiency.

    Science.gov (United States)

    Ohno, Yohei; Yuasa, Shinsuke; Egashira, Toru; Seki, Tomohisa; Hashimoto, Hisayuki; Tohyama, Shugo; Saito, Yuki; Kunitomi, Akira; Shimoji, Kenichiro; Onizuka, Takeshi; Kageyama, Toshimi; Yae, Kojiro; Tanaka, Tomofumi; Kaneda, Ruri; Hattori, Fumiyuki; Murata, Mitsushige; Kimura, Kensuke; Fukuda, Keiichi

    2013-01-01

    Patient-specific induced pluripotent stem (iPS) cells can be generated by introducing transcription factors that are highly expressed in embryonic stem (ES) cells into somatic cells. This opens up new possibilities for cell transplantation-based regenerative medicine by overcoming the ethical issues and immunological problems associated with ES cells. Despite the development of various methods for the generation of iPS cells that have resulted in increased efficiency, safety, and general versatility, it remains unknown which types of iPS cells are suitable for clinical use. Therefore, the aims of the present study were to assess (1) the differentiation potential, time course, and efficiency of different types of iPS cell lines to differentiate into cardiomyocytes in vitro and (2) the properties of the iPS cell-derived cardiomyocytes. We found that high-quality iPS cells exhibited better cardiomyocyte differentiation in terms of the time course and efficiency of differentiation than low-quality iPS cells, which hardly ever differentiated into cardiomyocytes. Because of the different properties of the various iPS cell lines such as cardiac differentiation efficiency and potential safety hazards, newly established iPS cell lines must be characterized prior to their use in cardiac regenerative medicine.

  20. Inositol hexaphosphate (IP6): a novel treatment for pancreatic cancer.

    Science.gov (United States)

    Somasundar, Ponnandai; Riggs, Dale R; Jackson, Barbara J; Cunningham, Cynthia; Vona-Davis, Linda; McFadden, David W

    2005-06-15

    Inositol hexaphosphate (IP6) is a naturally occurring polyphosphorylated carbohydrate found in food sources high in fiber content. IP6 has been reported to have significant inhibitory effects against a variety of primary tumors including breast and colon. The effects of IP6 have not been evaluated in pancreatic cancer. We hypothesized that IP6 would significantly inhibit cell growth and increase the apoptotic rate of pancreatic cancer in vitro. Two pancreatic cancer cell lines (MIAPACA and PANC1) were cultured using standard techniques and treated with IP6 at doses of 0.5, 1.0, and 5.0 mm. Cell viability was measured by MTT at 24 and 72 h. Apoptosis was evaluated by Annexin V-FITC and results calculated using FACS analysis. Statistical analysis was performed by ANOVA. Significant reductions (P < 0.01) in cellular proliferation were observed with all IP6 concentrations tested in both cell lines and at both time points. Reductions in cell proliferation ranged from 37.1 to 91.5%. IP6 increased early and late apoptotic activity (P < 0.01). Treatment of pancreatic cancer with the common dietary polyphosphorylated carbohydrate IP6 significantly decreased cellular growth and increased apoptosis. Our findings suggest that IP6 has the potential to become an effective adjunct for pancreatic cancer treatment. Further in vivo and human studies are needed to evaluate safety and clinical utility of this agent in patients with pancreatic cancer.

  1. Whole Genome Chromatin IP-Sequencing (ChIP-Seq) in Skeletal Muscle Cells.

    Science.gov (United States)

    So, Karl Kamhei; Peng, Xianlu Laura; Sun, Hao; Wang, Huating

    2017-01-01

    Transcriptional control of gene expression in skeletal muscle cell is involved in different processes ranging from muscle formation to regeneration. The identification of an increasing number of transcription factors, co-factors, and histone modifications has been greatly advanced by methods that allow studies of genome-wide chromatin-protein interactions. Chromatin immunoprecipitation with massively parallel DNA sequencing, or ChIP-seq, is a powerful tool for identifying binding sites of TFs/co-factors and histone modifications. The major steps of this technique involve immunoprecipitation of fragmented chromatin, followed by high-throughput sequencing to identify the protein bound regions genome-wide. Here, in this protocol, we will illustrate how the entire ChIP-seq is performed using global H3K27ac profiling in myoblast cells as an example.

  2. Wireless Chemical Sensing Method

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Oglesby, Donald M. (Inventor); Taylor, Bryant D. (Inventor)

    2017-01-01

    A wireless chemical sensor includes an electrical conductor and a material separated therefrom by an electric insulator. The electrical conductor is an unconnected open-circuit shaped for storage of an electric field and a magnetic field. In the presence of a time-varying magnetic field, the first electrical conductor resonates to generate harmonic electric and magnetic field responses. The material is positioned at a location lying within at least one of the electric and magnetic field responses so-generated. The material changes in electrical conductivity in the presence of a chemical-of-interest.

  3. Wireless Distributed Antenna MIMO

    DEFF Research Database (Denmark)

    2015-01-01

    The present disclosure relates to system applications of multicore optical fibers. One embodiment relates to a base transceiver station for a wireless telecommunication system comprising a plurality of antenna units arranged in a MIMO configuration and adapted for transmission and/or reception...... of radio-frequency signals, an optical transmitter in the form of an electro-optic conversion unit for each of said plurality of antenna units, each electro-optic conversion unit adapted for converting an RF signal into an optical signal, a plurality of a single core optical fibers for guiding the optical...

  4. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  5. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  6. Wireless Cellular Mobile Communications

    Directory of Open Access Journals (Sweden)

    V. Zalud

    2002-12-01

    Full Text Available In this article is briefly reviewed the history of wireless cellularmobile communications, examined the progress in current secondgeneration (2G cellular standards and discussed their migration to thethird generation (3G. The European 2G cellular standard GSM and itsevolution phases GPRS and EDGE are described somewhat in detail. Thethird generation standard UMTS taking up on GSM/GPRS core network andequipped with a new advanced access network on the basis of codedivision multiple access (CDMA is investigated too. A sketch of theperspective of mobile communication beyond 3G concludes this article.

  7. Investigating wireless power transfer

    Science.gov (United States)

    St John, Stuart A.

    2017-09-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.

  8. QoS Management and Control for an All-IP WiMAX Network Architecture: Design, Implementation and Evaluation

    Directory of Open Access Journals (Sweden)

    Thomas Michael Bohnert

    2008-01-01

    Full Text Available The IEEE 802.16 standard provides a specification for a fixed and mobile broadband wireless access system, offering high data rate transmission of multimedia services with different Quality-of-Service (QoS requirements through the air interface. The WiMAX Forum, going beyond the air interface, defined an end-to-end WiMAX network architecture, based on an all-IP platform in order to complete the standards required for a commercial rollout of WiMAX as broadband wireless access solution. As the WiMAX network architecture is only a functional specification, this paper focuses on an innovative solution for an end-to-end WiMAX network architecture offering in compliance with the WiMAX Forum specification. To our best knowledge, this is the first WiMAX architecture built by a research consortium globally and was performed within the framework of the European IST project WEIRD (WiMAX Extension to Isolated Research Data networks. One of the principal features of our architecture is support for end-to-end QoS achieved by the integration of resource control in the WiMAX wireless link and the resource management in the wired domains in the network core. In this paper we present the architectural design of these QoS features in the overall WiMAX all-IP framework and their functional as well as performance evaluation. The presented results can safely be considered as unique and timely for any WiMAX system integrator.

  9. Secure Protocol and IP Core for Configuration of Networking Hardware IPs in the Smart Grid

    Directory of Open Access Journals (Sweden)

    Marcelo Urbina

    2018-02-01

    Full Text Available Nowadays, the incorporation and constant evolution of communication networks in the electricity sector have given rise to the so-called Smart Grid, which is why it is necessary to have devices that are capable of managing new communication protocols, guaranteeing the strict requirements of processing required by the electricity sector. In this context, intelligent electronic devices (IEDs with network architectures are currently available to meet the communication, real-time processing and interoperability requirements of the Smart Grid. The new generation IEDs include an Field Programmable Gate Array (FPGA, to support specialized networking switching architectures for the electric sector, as the IEEE 1588-aware High-availability Seamless Redundancy/Parallel Redundancy Protocol (HSR/PRP. Another advantage to using an FPGA is the ability to update or reconfigure the design to support new requirements that are being raised to the standards (IEC 61850. The update of the architecture implemented in the FPGA can be done remotely, but it is necessary to establish a cyber security mechanism since the communication link generates vulnerability in the case the attacker gains physical access to the network. The research presented in this paper proposes a secure protocol and Intellectual Property (IP core for configuring and monitoring the networking IPs implemented in a Field Programmable Gate Array (FPGA. The FPGA based implementation proposed overcomes this issue using a light Layer-2 protocol fully implemented on hardware and protected by strong cryptographic algorithms (AES-GCM, defined in the IEC 61850-90-5 standard. The proposed secure protocol and IP core are applicable in any field where remote configuration over Ethernet is required for IP cores in FPGAs. In this paper, the proposal is validated in communications hardware for Smart Grids.

  10. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  11. Telomere reprogramming and maintenance in porcine iPS cells.

    Directory of Open Access Journals (Sweden)

    Guangzhen Ji

    Full Text Available Telomere reprogramming and silencing of exogenous genes have been demonstrated in mouse and human induced pluripotent stem cells (iPS cells. Pigs have the potential to provide xenotransplant for humans, and to model and test human diseases. We investigated the telomere length and maintenance in porcine iPS cells generated and cultured under various conditions. Telomere lengths vary among different porcine iPS cell lines, some with telomere elongation and maintenance, and others telomere shortening. Porcine iPS cells with sufficient telomere length maintenance show the ability to differentiate in vivo by teratoma formation test. IPS cells with short or dysfunctional telomeres exhibit reduced ability to form teratomas. Moreover, insufficient telomerase and incomplete telomere reprogramming and/or maintenance link to sustained activation of exogenous genes in porcine iPS cells. In contrast, porcine iPS cells with reduced expression of exogenous genes or partial exogene silencing exhibit insufficient activation of endogenous pluripotent genes and telomerase genes, accompanied by telomere shortening with increasing passages. Moreover, telomere doublets, telomere sister chromatid exchanges and t-circles that presumably are involved in telomere lengthening by recombination also are found in porcine iPS cells. These data suggest that both telomerase-dependent and telomerase-independent mechanisms are involved in telomere reprogramming during induction and passages of porcine iPS cells, but these are insufficient, resulting in increased telomere damage and shortening, and chromosomal instability. Active exogenes might compensate for insufficient activation of endogenous genes and incomplete telomere reprogramming and maintenance of porcine iPS cells. Further understanding of telomere reprogramming and maintenance may help improve the quality of porcine iPS cells.

  12. Telomere reprogramming and maintenance in porcine iPS cells.

    Science.gov (United States)

    Ji, Guangzhen; Ruan, Weimin; Liu, Kai; Wang, Fang; Sakellariou, Despoina; Chen, Jijun; Yang, Yang; Okuka, Maja; Han, Jianyong; Liu, Zhonghua; Lai, Liangxue; Gagos, Sarantis; Xiao, Lei; Deng, Hongkui; Li, Ning; Liu, Lin

    2013-01-01

    Telomere reprogramming and silencing of exogenous genes have been demonstrated in mouse and human induced pluripotent stem cells (iPS cells). Pigs have the potential to provide xenotransplant for humans, and to model and test human diseases. We investigated the telomere length and maintenance in porcine iPS cells generated and cultured under various conditions. Telomere lengths vary among different porcine iPS cell lines, some with telomere elongation and maintenance, and others telomere shortening. Porcine iPS cells with sufficient telomere length maintenance show the ability to differentiate in vivo by teratoma formation test. IPS cells with short or dysfunctional telomeres exhibit reduced ability to form teratomas. Moreover, insufficient telomerase and incomplete telomere reprogramming and/or maintenance link to sustained activation of exogenous genes in porcine iPS cells. In contrast, porcine iPS cells with reduced expression of exogenous genes or partial exogene silencing exhibit insufficient activation of endogenous pluripotent genes and telomerase genes, accompanied by telomere shortening with increasing passages. Moreover, telomere doublets, telomere sister chromatid exchanges and t-circles that presumably are involved in telomere lengthening by recombination also are found in porcine iPS cells. These data suggest that both telomerase-dependent and telomerase-independent mechanisms are involved in telomere reprogramming during induction and passages of porcine iPS cells, but these are insufficient, resulting in increased telomere damage and shortening, and chromosomal instability. Active exogenes might compensate for insufficient activation of endogenous genes and incomplete telomere reprogramming and maintenance of porcine iPS cells. Further understanding of telomere reprogramming and maintenance may help improve the quality of porcine iPS cells.

  13. Protection against cancer by dietary IP6 and inositol.

    Science.gov (United States)

    Vucenik, Ivana; Shamsuddin, AbulKalam M

    2006-01-01

    Inositol hexaphosphate (IP(6)) is a naturally occurring polyphosphorylated carbohydrate, abundantly present in many plant sources and in certain high-fiber diets, such as cereals and legumes. In addition to being found in plants, IP(6) is contained in almost all mammalian cells, although in much smaller amounts, where it is important in regulating vital cellular functions such as signal transduction, cell proliferation, and differentiation. For a long time IP(6) has been recognized as a natural antioxidant. Recently IP(6) has received much attention for its role in cancer prevention and control of experimental tumor growth, progression, and metastasis. In addition, IP(6) possesses other significant benefits for human health, such as the ability to enhance immune system, prevent pathological calcification and kidney stone formation, lower elevated serum cholesterol, and reduce pathological platelet activity. In this review we show the efficacy and discuss some of the molecular mechanisms that govern the action of this dietary agent. Exogenously administered IP(6) is rapidly taken up into cells and dephosphorylated to lower inositol phosphates, which further affect signal transduction pathways resulting in cell cycle arrest. A striking anticancer action of IP(6) was demonstrated in different experimental models. In addition to reducing cell proliferation, IP(6) also induces differentiation of malignant cells. Enhanced immunity and antioxidant properties also contribute to tumor cell destruction. Preliminary studies in humans show that IP(6) and inositol, the precursor molecule of IP(6), appear to enhance the anticancer effect of conventional chemotherapy, control cancer metastases, and improve quality of life. Because it is abundantly present in regular diet, efficiently absorbed from the gastrointestinal tract, and safe, IP(6) + inositol holds great promise in our strategies for cancer prevention and therapy. There is clearly enough evidence to justify the

  14. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  15. PENGEMBANGAN PERANGKAT PEMBELAJARAN IPS DENGAN PENDEKATAN INQUIRY

    Directory of Open Access Journals (Sweden)

    Lisna Handayani

    2015-08-01

    Full Text Available Tujuan  penelitian adalah menghasilkan perangkat pembelajaran IPS dengan Pendekatan Inquiry. Penelitian pengembangan ini menggunakan langkah-langkah Borg and Gall yang terdiri dari tiga tahapan utama yaitu pendahuluan, pengembangan dan validasi. Data yang diperoleh adalah hasil belajar, aktivitas diskusi dan respon peserta didik. Data dianalisis menggunakan analisis deskriptif dan uji t. Penggunaan pendekatan inquiry sebagai salah satau strategi pembelajaran IPS dapat dilakukan dengan mempersiapkan terlebih dahulu perangkat pembelajarannya. Hasil pengembangan divalidasi oleh pakar, diujicobakan pada kelas terbatas dan selanjutnya dilakukan ujicoba pada kelas eksperimen yang dibandingkan hasilnya dengan kelas kontrol. Perangkat pembelajaran tergolong efektif untuk meningkatkan hasil belajar peserta didik di kelas VII SMP Negeri 2 Jepara, terbukti dari adanya peningkatan yang nyata terbukti dari hasil uji paired sampel t-test dengan nilai signifikansi 0,000 <0,05, dan terjadi peningkatan yang tinggi (gain > 0,7, serta hasil belajar yang dicapai berbeda secara signifikan dengan kelompok kontrol. Di samping hasil belajar, pembelajaran yang dilakukan juga berdampak pada proses belajar yang membawa tingginya aktivitas peserta didik dalam memberikan gagasan, kerjasama, inisiatif, keaktifan dan kedisiplinan. The purpose of this research is creating Social Lesson Material with Inquiry Approach.This developing of the research is used of  the steps of Borg and Gall. They are Introducing, developing and evaluating. Learning materials are developed and validity by expert. Datas are gooten by study result, discussion activity and students, respone. Analizing datas are used descriptive analize and t- try out. The use of inquiry approach as one of learning strategy on Social Lesson Material can be done by preparing those. The result of  developing are being validity by expert,  try out on limited group and experiment group ad compare with control group

  16. An empirical evaluation of bufferbloat in IEEE 802.11n wireless networks

    KAUST Repository

    Showail, Ahmad

    2014-04-06

    In this paper, we analyze the impact of large, persistently-full buffers (`bufferbloat\\') on various network dynamics in IEEE 802.11n wireless networks. Bufferbloat has mostly been studied in the context of wired networks. We study the impact of bufferbloat on a variety of wireless network topologies, including wireless LAN (WLAN) and multi-hop wireless networks. Our results show that a single FTP transfer between two Linux wireless hosts can saturate the buffers in the network stack, leading to RTT delays exceeding 4.5 s in multi-hop configurations. We show that well-designed Aggregate MAC Protocol Data Unit (A-MPDU) MAC-layer frame aggregation can reduce RTT delays while simultaneously increasing network throughput. However, additional measures may still be required to meet the constraints of real-time flows (such as VoIP). Our experiments show that large buffers can deteriorate the fairness in rate allocation in parking lot based multi-hop networks.

  17. TCP adaptation with network coding and opportunistic data forwarding in multi-hop wireless networks

    Directory of Open Access Journals (Sweden)

    Chen Zhang

    2016-10-01

    Full Text Available Opportunistic data forwarding significantly increases the throughput in multi-hop wireless mesh networks by utilizing the broadcast nature of wireless transmissions and the fluctuation of link qualities. Network coding strengthens the robustness of data transmissions over unreliable wireless links. However, opportunistic data forwarding and network coding are rarely incorporated with TCP because the frequent occurrences of out-of-order packets in opportunistic data forwarding and long decoding delay in network coding overthrow TCP’s congestion control. In this paper, we propose a solution dubbed TCPFender, which supports opportunistic data forwarding and network coding in TCP. Our solution adds an adaptation layer to mask the packet loss caused by wireless link errors and provides early positive feedbacks to trigger a larger congestion window for TCP. This adaptation layer functions over the network layer and reduces the delay of ACKs for each coded packet. The simulation results show that TCPFender significantly outperforms TCP/IP in terms of the network throughput in different topologies of wireless networks.

  18. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  19. Household wireless electroencephalogram hat

    Science.gov (United States)

    Szu, Harold; Hsu, Charles; Moon, Gyu; Yamakawa, Takeshi; Tran, Binh

    2012-06-01

    We applied Compressive Sensing to design an affordable, convenient Brain Machine Interface (BMI) measuring the high spatial density, and real-time process of Electroencephalogram (EEG) brainwaves by a Smartphone. It is useful for therapeutic and mental health monitoring, learning disability biofeedback, handicap interfaces, and war gaming. Its spec is adequate for a biomedical laboratory, without the cables hanging over the head and tethered to a fixed computer terminal. Our improved the intrinsic signal to noise ratio (SNR) by using the non-uniform placement of the measuring electrodes to create the proximity of measurement to the source effect. We computing a spatiotemporal average the larger magnitude of EEG data centers in 0.3 second taking on tethered laboratory data, using fuzzy logic, and computing the inside brainwave sources, by Independent Component Analysis (ICA). Consequently, we can overlay them together by non-uniform electrode distribution enhancing the signal noise ratio and therefore the degree of sparseness by threshold. We overcame the conflicting requirements between a high spatial electrode density and precise temporal resolution (beyond Event Related Potential (ERP) P300 brainwave at 0.3 sec), and Smartphone wireless bottleneck of spatiotemporal throughput rate. Our main contribution in this paper is the quality and the speed of iterative compressed image recovery algorithm based on a Block Sparse Code (Baranuick et al, IEEE/IT 2008). As a result, we achieved real-time wireless dynamic measurement of EEG brainwaves, matching well with traditionally tethered high density EEG.

  20. Wirelessness as Experience of Transition

    Directory of Open Access Journals (Sweden)

    Adrian Mackenzie

    2008-01-01

    Full Text Available The paper analyses wireless networks in terms of a concept of experience drawn from the work of William James. James' account of experience focuses closely on the effects of ongoing change, and this is particularly useful in thinking about media change. The specific experience in question here is 'wirelessness,' an experience that envelops many media, infrastructures, practices, and processes today. The paper argues that a concept of wirelessness uniquely connects together a set of perceptions, representation, materials, problems and events associated with ongoing change in contemporary media and information cultures. In analysing wirelessness as form of experience, the article examines how those feelings of ongoing change shape and inform experiences of self, otherness, place and sociality in technological-informatic environments. In describing different infrastructural and commercial dimensions of wirelessness, it pays close attention to how ‘conjunctive relations’ (James’ term such as ‘with’, ‘between’, ‘near’, and ‘inside’ arise in wireless networks, and how different kinds of intimacy and distance stem from conjunctive relations. The paper explores how wirelessness embodies and organises networked places. In this respect, the paper inverts conventional understandings of the network as ground or platform. It treats the under-represented yet highly significant embodied experiences of relations as generative of information infrastructures.

  1. IP-10 release assays in the diagnosis of tuberculosis infection

    DEFF Research Database (Denmark)

    Ruhwald, Morten; Aabye, Martine G; Ravn, Pernille

    2012-01-01

    The current state-of-the-art tests for infection with Mycobacterium tuberculosis - the IFN-γ release assays - rely on accurate measurement of the cytokine IFN-γ. Many other potential biomarkers are expressed in concert with IFN-γ, and IP-10 in particular has shown promising results. IP-10...

  2. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    of patenting globally. For trademarks and industrial designs, globalization has created more potential infringers and an increase in piracy, as evidenced by a significant increase in customs seizures. The problems with IP even go beyond individual firms, as when governments use IP policies to favor local firms...

  3. Special rights for the development of Indigenous Peoples (IPS) in ...

    African Journals Online (AJOL)

    Indigenous Peoples (IPs) have been subjected to a series of humiliation, discrimination and in some cases dis-membership of a state. This is germane, but not peculiar, to the developing states with special reference to Africa. Globalization and efforts to link human, cultural and social rights to the IPs remain blurred and ...

  4. Probabilistic Route Selection Algorithm for IP Traceback

    Science.gov (United States)

    Yim, Hong-Bin; Jung, Jae-Il

    DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very difficult to find a real origin of attackers because DoS/DDoS attacker uses spoofed IP addresses. To solve this problem, we propose a probabilistic route selection traceback algorithm, namely PRST, to trace the attacker's real origin. This algorithm uses two types of packets such as an agent packet and a reply agent packet. The agent packet is in use to find the attacker's real origin and the reply agent packet is in use to notify to a victim that the agent packet is reached the edge router of the attacker. After attacks occur, the victim generates the agent packet and sends it to a victim's edge router. The attacker's edge router received the agent packet generates the reply agent packet and send it to the victim. The agent packet and the reply agent packet is forwarded refer to probabilistic packet forwarding table (PPFT) by routers. The PRST algorithm runs on the distributed routers and PPFT is stored and managed by routers. We validate PRST algorithm by using mathematical approach based on Poisson distribution.

  5. Radio Relays Improve Wireless Products

    Science.gov (United States)

    2009-01-01

    Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.

  6. Microwave materials for wireless applications

    CERN Document Server

    Cruickshank, David B

    2011-01-01

    This practical resource offers you an in-depth, up-to-date understanding of the use of microwave magnetic materials for cutting-edge wireless applications. The book discusses device applications used in wireless infrastructure base stations, point-to-point radio links, and a range of more specialized microwave systems. You find detailed discussions on the attributes of each family of magnetic materials with respect to specific wireless applications. Moreover, the book addresses two of the hottest topics in the field today - insertion loss and intermodulation. This comprehensive reference also

  7. Structural processing for wireless communications

    CERN Document Server

    Lu, Jianhua; Ge, Ning

    2015-01-01

    This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.

  8. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  9. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  10. Research on implementation of proxy Arp in IP DSLAM

    Science.gov (United States)

    Cheng, Chuanqing; Wang, Li; Huang, Qiugen

    2005-02-01

    While the ethernet is applied more and more in public network environment and xdsl service become the most common access mode ,IP kenel DSLAM undertakes some functions such as service distribution and convergence ,security management and customer management.Facing the contradiction of the need of port isolation and the shortage of ip address,VLAN aggregation technology is applied in DSLAM.How to implement the communicatio between the two vlan but share the same ip subnet,proxy arp does this. This paper introduces how to implement proxy arp in the DSLAM. TCP/IP communication detail procedure betweent two host ,the relation of VLAN and network segment are discussed. The proxy arp model and its implementation in IP DSLAM is also expatiated in this paper and a conformance tesing is given.

  11. COPAR: A ChIP-Seq Optimal Peak Analyzer.

    Science.gov (United States)

    Tang, Binhua; Wang, Xihan; Jin, Victor X

    2017-01-01

    Sequencing data quality and peak alignment efficiency of ChIP-sequencing profiles are directly related to the reliability and reproducibility of NGS experiments. Till now, there is no tool specifically designed for optimal peak alignment estimation and quality-related genomic feature extraction for ChIP-sequencing profiles. We developed open-sourced COPAR, a user-friendly package, to statistically investigate, quantify, and visualize the optimal peak alignment and inherent genomic features using ChIP-seq data from NGS experiments. It provides a versatile perspective for biologists to perform quality-check for high-throughput experiments and optimize their experiment design. The package COPAR can process mapped ChIP-seq read file in BED format and output statistically sound results for multiple high-throughput experiments. Together with three public ChIP-seq data sets verified with the developed package, we have deposited COPAR on GitHub under a GNU GPL license.

  12. Defining bacterial regulons using ChIP-seq.

    Science.gov (United States)

    Myers, Kevin S; Park, Dan M; Beauchene, Nicole A; Kiley, Patricia J

    2015-09-15

    Chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq) is a powerful method that identifies protein-DNA binding sites in vivo. Recent studies have illustrated the value of ChIP-seq in studying transcription factor binding in various bacterial species under a variety of growth conditions. These results show that in addition to identifying binding sites, correlation of ChIP-seq data with expression data can reveal important information about bacterial regulons and regulatory networks. In this chapter, we provide an overview of the current state of knowledge about ChIP-seq methodology in bacteria, from sample preparation to raw data analysis. We also describe visualization and various bioinformatic analyses of processed ChIP-seq data. Copyright © 2015 Elsevier Inc. All rights reserved.

  13. Defining Bacterial Regulons Using ChIP-seq Methods

    Science.gov (United States)

    Myers, Kevin S.; Park, Dan M.; Beauchene, Nicole A.; Kiley, Patricia J.

    2015-01-01

    Chromatin immunoprecitation followed by high-throughput sequencing (ChIP-seq) is a powerful method that identifies protein-DNA binding sites in vivo. Recent studies have illustrated the value of ChIP-seq in studying transcription factor binding in various bacterial species under a variety of growth conditions. These results show that in addition to identifying binding sites, correlation of ChIP-seq data with expression data can reveal important information about bacterial regulons and regulatory networks. In this chapter, we provide an overview of the current state of knowledge about ChIP-seq methodology in bacteria, from sample preparation to raw data analysis. We also describe visualization and various bioinformatic analyses of processed ChIP-seq data. PMID:26032817

  14. Computational methodology for ChIP-seq analysis

    Science.gov (United States)

    Shin, Hyunjin; Liu, Tao; Duan, Xikun; Zhang, Yong; Liu, X. Shirley

    2015-01-01

    Chromatin immunoprecipitation coupled with massive parallel sequencing (ChIP-seq) is a powerful technology to identify the genome-wide locations of DNA binding proteins such as transcription factors or modified histones. As more and more experimental laboratories are adopting ChIP-seq to unravel the transcriptional and epigenetic regulatory mechanisms, computational analyses of ChIP-seq also become increasingly comprehensive and sophisticated. In this article, we review current computational methodology for ChIP-seq analysis, recommend useful algorithms and workflows, and introduce quality control measures at different analytical steps. We also discuss how ChIP-seq could be integrated with other types of genomic assays, such as gene expression profiling and genome-wide association studies, to provide a more comprehensive view of gene regulatory mechanisms in important physiological and pathological processes. PMID:25741452

  15. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  16. Anti-angiogenic activity of inositol hexaphosphate (IP6).

    Science.gov (United States)

    Vucenik, Ivana; Passaniti, Antonino; Vitolo, Michele I; Tantivejkul, Kwanchanit; Eggleton, Paul; Shamsuddin, Abulkalam M

    2004-11-01

    A significant anticancer activity of the naturally occurring carbohydrate inositol hexaphosphate (IP(6)) has been reported against numerous cancer models. Since tumors require angiogenesis for growth and metastasis, we hypothesize that IP(6) reduces tumor growth by inhibiting angiogenesis. Because angiogenesis depends on the interaction between endothelial and tumor cells, we investigated the effect of IP(6) on both. IP(6) inhibited the proliferation and induced the differentiation of endothelial cells in vitro; the growth of bovine aortic endothelial cells (BAECs) evaluated by MTT proliferation assay was inhibited in a dose-dependent manner (IC(50) = 0.74 mM). The combination of IP(6) and vasostatin, a calreticulin fragment with anti-angiogenic activity, was synergistically superior in growth inhibition than either compound. IP(6) inhibited human umbilical vein endothelial cell (HUVEC) tube formation (in vitro capillary differentiation) on a reconstituted extracellular matrix, Matrigel, and disrupted pre-formed tubes. IP(6) significantly reduced basic fibroblast growth factor (bFGF)-induced vessel formation (P < 0.01) in vivo in Matrigel plug assay. Exposure of HepG2, a human hepatoma cell line, to IP(6) for 8 h, resulted in a dose-dependent decrease in the mRNA levels of vascular endothelial growth factor (VEGF), as assessed by RT-PCR. IP(6) treatment of HepG2 cells for 24 h also significantly reduced the VEGF protein levels in conditioned medium, in a concentration-dependent manner (P = 0.012). Thus, IP(6) has an inhibitory effect on induced angiogenesis.

  17. A highly efficient and effective motif discovery method for ChIP-seq/ChIP-chip data using positional information.

    Science.gov (United States)

    Ma, Xiaotu; Kulkarni, Ashwinikumar; Zhang, Zhihua; Xuan, Zhenyu; Serfling, Robert; Zhang, Michael Q

    2012-04-01

    Identification of DNA motifs from ChIP-seq/ChIP-chip [chromatin immunoprecipitation (ChIP)] data is a powerful method for understanding the transcriptional regulatory network. However, most established methods are designed for small sample sizes and are inefficient for ChIP data. Here we propose a new k-mer occurrence model to reflect the fact that functional DNA k-mers often cluster around ChIP peak summits. With this model, we introduced a new measure to discover functional k-mers. Using simulation, we demonstrated that our method is more robust against noises in ChIP data than available methods. A novel word clustering method is also implemented to group similar k-mers into position weight matrices (PWMs). Our method was applied to a diverse set of ChIP experiments to demonstrate its high sensitivity and specificity. Importantly, our method is much faster than several other methods for large sample sizes. Thus, we have developed an efficient and effective motif discovery method for ChIP experiments.

  18. Inositol hexakisphosphate (IP6) generated by IP5K mediates cullin-COP9 signalosome interactions and CRL function.

    Science.gov (United States)

    Scherer, Paul C; Ding, Yan; Liu, Zhiqing; Xu, Jing; Mao, Haibin; Barrow, James C; Wei, Ning; Zheng, Ning; Snyder, Solomon H; Rao, Feng

    2016-03-29

    The family of cullin-RING E3 Ligases (CRLs) and the constitutive photomorphogenesis 9 (COP9) signalosome (CSN) form dynamic complexes that mediate ubiquitylation of 20% of the proteome, yet regulation of their assembly/disassembly remains poorly understood. Inositol polyphosphates are highly conserved signaling molecules implicated in diverse cellular processes. We now report that inositol hexakisphosphate (IP6) is a major physiologic determinant of the CRL-CSN interface, which includes a hitherto unidentified electrostatic interaction between the N-terminal acidic tail of CSN subunit 2 (CSN2) and a conserved basic canyon on cullins. IP6, with an EC50 of 20 nM, acts as an intermolecular "glue," increasing cullin-CSN2 binding affinity by 30-fold, thereby promoting assembly of the inactive CRL-CSN complexes. The IP6 synthase, Ins(1,3,4,5,6)P5 2-kinase (IPPK/IP5K) binds to cullins. Depleting IP5K increases the percentage of neddylated, active Cul1 and Cul4A, and decreases levels of the Cul1/4A substrates p27 and p21. Besides dysregulating CRL-mediated cell proliferation and UV-induced apoptosis, IP5K depletion potentiates by 28-fold the cytotoxic effect of the neddylation inhibitor MLN4924. Thus, IP5K and IP6 are evolutionarily conserved components of the CRL-CSN system and are potential targets for cancer therapy in conjunction with MLN4924.

  19. Attributes associated with probability of infestation by the pinon Ips, Ips confusus, (Coleoptera: Scolytidae) in pinon pine, Pinus edulis

    Science.gov (United States)

    Jose F. Negron; Jill L. Wilson

    2008-01-01

    (Please note, this is an abstract only) We examined attributes associated with the probability of infestation by pinon ips (Ips confusus), in pinon pine (Pinus edulis), in an outbreak in the Coconino National Forest, Arizona. We used data collected from 87 plots, 59 infested and 28 uninfested, and a logistic regression approach to estimate the probability of...

  20. Telebation: next-generation telemedicine in remote airway management using current wireless technologies.

    Science.gov (United States)

    Mosier, Jarrod; Joseph, Bellal; Sakles, John C

    2013-02-01

    Since the first remote intubation with telemedicine guidance, wireless technology has advanced to enable more portable methods of telemedicine involvement in remote airway management. Three voice over Internet protocol (VoIP) services were evaluated for quality of image transmitted, data lag, and audio quality with remotely observed and assisted intubations in an academic emergency department. The VoIP clients evaluated were Apple (Cupertino, CA) FaceTime(®), Skype™ (a division of Microsoft, Luxembourg City, Luxembourg), and Tango(®) (TangoMe, Palo Alto, CA). Each client was tested over a Wi-Fi network as well as cellular third generation (3G) (Skype and Tango). All three VoIP clients provided acceptable image and audio quality. There is a significant data lag in image transmission and quality when VoIP clients are used over cellular broadband (3G) compared with Wi-Fi. Portable remote telemedicine guidance is possible with newer technology devices such as a smartphone or tablet, as well as VoIP clients used over Wi-Fi or cellular broadband.

  1. Study of potential health effects of electromagnetic fields of telephony and Wi-Fi, using chicken embryo development as animal model

    NARCIS (Netherlands)

    Woelders, H.; Wit, de A.A.C.; Lourens, A.; Stockhofe, N.; Engel, B.; Hulsegge, B.; Schokker, D.; Heijningen, van P.; Vossen, S.; Bekers, D.; Zwamborn, P.

    2017-01-01

    The objective of this study is to investigate possible biological effects of radiofrequency electromagnetic fields (RF-EMF) as used in modern wireless telecommunication in a well-controlled experimental environment using chicken embryo development as animal model. Chicken eggs were incubated under

  2. Wireless devices in nursing education

    Directory of Open Access Journals (Sweden)

    Ana Belén Sánchez-García

    2013-03-01

    Full Text Available Objective. This article sought to explore the adoption of wireless devices in university nursing teaching and address their repercussion on future professionals. Methodology. This is a bibliographical study conducted in 2011, which analyzed international publications on the use, review, application, opinion, and experimentation of wireless devices in university nursing teaching of wireless technology in nursing teaching. The following databases were used: Medline and Science@Direct. Results. A total of 503 articles were extracted and 77 were selected, of which 40 investigated the Personal Digital Assistant (PDA, 13 the clicker (Student Response Wireless System, and six the smart phone. The use of mobile devices has experienced strong growth during the last five years, especially PDAs. Conclusion. Use of mobile devices in university nursing teaching has grown in recent years, especially PDAs

  3. Wireless Communication over Dispersive Channels

    NARCIS (Netherlands)

    Fang, K.

    2010-01-01

    Broadband wireless communication systems require high transmission rates, where the bandwidth of the transmitted signal is larger than the channel coherence bandwidth. This gives rise to time dispersion of the transmitted symbols or frequency-selectivity with different frequency components

  4. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  5. Wireless power transfer system

    Science.gov (United States)

    Wu, Hunter; Sealy, Kylee; Gilchrist, Aaron

    2016-02-23

    A system includes a first stage of an inductive power transfer system with an LCL load resonant converter with a switching section, an LCL tuning circuit, and a primary receiver pad. The IPT system includes a second stage with a secondary receiver pad, a secondary resonant circuit, a secondary rectification circuit, and a secondary decoupling converter. The secondary receiver pad connects to the secondary resonant circuit. The secondary resonant circuit connects to the secondary rectification circuit. The secondary rectification circuit connects to the secondary decoupling converter. The second stage connects to a load. The load includes an energy storage element. The second stage and load are located on a vehicle and the first stage is located at a fixed location. The primary receiver pad wirelessly transfers power to the secondary receiver pad across a gap when the vehicle positions the secondary receiver pad with respect to the primary receiver pad.

  6. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  7. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  8. Wireless data signal transmission system

    DEFF Research Database (Denmark)

    2014-01-01

    The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver.......The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver....

  9. Wireless Instrumentation Use on Launch Vehicles

    Science.gov (United States)

    Sherman, Aaron

    2010-01-01

    This slide presentation reviews the results of a study on the use of wireless instrumentation and sensors on future launch vehicles. The use of wireless technologies would if feasible would allow for fewer wires, and allow for more flexibility. However, it was generally concluded that wireless solutions are not currently ready to replace wired technologies for launch vehicles. The recommendations of the study were to continue to use wired sensors as the primary choice for vehicle instrumentation, and to continue to assess needs and use wireless instrumentation where appropriate. The future work includes support efforts for wireless technologies, and continue to monitor the development of wireless solutions.

  10. An IP-10 (CXCL10)-Derived Peptide Inhibits Angiogenesis

    Science.gov (United States)

    Yates-Binder, Cecelia C.; Rodgers, Margaret; Jaynes, Jesse; Wells, Alan; Bodnar, Richard J.; Turner, Timothy

    2012-01-01

    Angiogenesis plays a critical role in processes such as organ development, wound healing, and tumor growth. It requires well-orchestrated integration of soluble and matrix factors and timely recognition of such signals to regulate this process. Previous work has shown that newly forming vessels express the chemokine receptor CXC receptor 3 (CXCR3) and, activation by its ligand IP-10 (CXCL10), both inhibits development of new vasculature and causes regression of newly formed vessels. To identify and develop new therapeutic agents to limit or reverse pathological angiogenesis, we identified a 21 amino acid fragment of IP-10, spanning the α-helical domain residues 77–98, that mimic the actions of the whole IP-10 molecule on endothelial cells. Treatment of the endothelial cells with the 22 amino acid fragment referred to as IP-10p significantly inhibited VEGF-induced endothelial motility and tube formation in vitro, properties critical for angiogenesis. Using a Matrigel plug assay in vivo, we demonstrate that IP-10p both prevented vessel formation and induced involution of nascent vessels. CXCR3 neutralizing antibody was able to block the inhibitory effects of the IP-10p, demonstrating specificity of the peptide. Inhibition of endothelial function by IP-10p was similar to that described for IP-10, secondary to CXCR3-mediated increase in cAMP production, activation of PKA inhibiting cell migration, and inhibition of VEGF-mediated m-calpain activation. IP-10p provides a novel therapeutic agent that inhibits endothelial cell function thus, allowing for the modulation of angiogenesis. PMID:22815829

  11. Inositol hexaphosphate (IP6) inhibits cellular proliferation in melanoma.

    Science.gov (United States)

    Rizvi, Irfan; Riggs, Dale R; Jackson, Barbara J; Ng, Alex; Cunningham, Cynthia; McFadden, David W

    2006-06-01

    Inositol Hexaphosphate (IP6) is a naturally occurring polyphosphorylated carbohydrate found in food sources high in fiber content. We have previously reported IP6 to have significant inhibitory effects against pancreatic cancer in vitro. We hypothesized that the IP6 would significantly inhibit cell growth of cutaneous melanoma in vitro. The melanoma line HTB68 was cultured using standard techniques and treated with IP6 at doses ranging from 0.2 to 1.0 mM/well. Cell viability was measured by MTT at 72 h. VEGF production was measured in the cell supernatants by ELISA. Apoptosis was evaluated by Annexin V-FITC and results calculated using FACS analysis. Statistical analysis was performed by ANOVA. Significant reductions (P < 0.001) in cellular proliferation were observed with IP6. Overall, IP6 exhibited a mean inhibition of cell growth of 52.1 +/- 11.5% (range, 1.6-83.0%) at 72 h of incubation. VEGF production was significantly reduced (P < 0.001) by the addition of IP6 (7.5 pg/ml) compared to control (40.9 pg/ml). IP6 significantly increased (P = 0.029) late apoptosis from 5.3 to 7.0% gated events. No changes in necrosis or early apoptosis were observed. Adjuvant treatment of melanoma continues to challenge clinicians and patients. Our findings that IP6 significantly decreased cellular growth, VEGF production and increased late apoptosis in melanoma suggest its potential therapeutic value. Further in vivo studies are planned to evaluate safety and clinical utility of this agent.

  12. Protecting LHC IP1/IP5 Components Against Radiation Resulting from Colliding Beam Interactions

    CERN Document Server

    Mokhov, N V; Kerby, J S; Strait, J B

    2003-01-01

    Beam-induced energy deposition in the LHC high luminosity interaction region (IR) components due to both pp collisions and beam loss in the IR vicinity is a significant challenge for the design of the high luminosity insertions. It was shown in our previous studies that a set of absorbers would reduce both the peak power density and total heat load to tolerable levels. In this paper the results of further optimization and comprehensive MARS calculations are summarized for the LHC lattice, version 6.4, for the updated IP1 and IP5 layouts and a baseline pp-collision source term. Power density, power dissipation, particle fluxes and spectra, accumulated dose and residual dose rates are studied in the components of the inner triplets including their TAS absorbers, the TAN neutral beam absorbers, separation dipoles, and quadrupoles of the outer triplets and possible collimators there. Results are given for the nominal luminosity of 1034 cm-2 s-1. The current design is proved to provide the best safety margin under...

  13. On the Cryptographic Features of a VoIP Service

    Directory of Open Access Journals (Sweden)

    Dimitrios Alvanos

    2018-01-01

    Full Text Available Security issues of typical Voice over Internet Protocol (VoIP applications are studied in this paper; in particular, the open source Linphone application is being used as a case study. An experimental analysis indicates that protecting signalling data with the TLS protocol, which unfortunately is not always the default option, is needed to alleviate several security concerns. Moreover, towards improving security, it is shown that a VoIP application may operate over a virtual private network without significantly degrading the overall performance. The conclusions of this study provide useful insights to the usage of any VoIP application.

  14. Lessons from Korea Telecom's VoIP testbed

    Science.gov (United States)

    Lee, Ki Jong; Yang, Junhwan; Kim, Dongkweon

    2001-07-01

    This paper describers the results and lessons from the voice over IP trial service on the Korea Telecom's VoIP Testbed. The testbed was made up of four different vendors' systems and solutions constituted four separate zones. Even though the backbone network of the testbed was not commercial IP network, we could comprehend some engineering parameters essential to packetized voice QoS. And we got some know-how. These kinds of results will be much help to traditional telco confronted with many difficult issues especially on packet voice network.

  15. Actuator development for the Instrument Pointing System (IPS)

    Science.gov (United States)

    Suttner, K.

    1984-01-01

    The mechanisms of the instrument pointing system (IPS) are described. Particular emphasis is placed on the actuators which are necessary for operating the IPS. The actuators are described as follows: (1) two linear actuators that clamp the gimbals down during ascent and descent; (2) two linear actuators that attach the payload to the IPS during the mission, and release it into the payload clamps; (3) one rotational actuator that opens and closes the payload clamps; and (4) three identical drive units that represent the three orthogonal gimbal axes and are the prime movers for pointing. Design features, manufacturing problems, test performance, and results are presented.

  16. A Novel Smart Meter Controlling System with Dynamic IP Addresses

    DEFF Research Database (Denmark)

    Manembu, Pinrolinvic; Welang, Brammy; Kalua Lapu, Aditya

    2017-01-01

    Smart meters are the electronic devices for measuring energy consumption in real time. Usually, static public IP addresses are allocated to realize the point-to-point (P2P) communication and remote controlling for smart metering systems. This, however, restricts the wide deployment of smart meters......, due to the deficiency of public IP resources. This paper proposes a novel subscription-based communication architecture for the support of dynamic IP addresses and group controlling of smart meters. The paper evaluates the proposed architecture by comparing the traditional P2P architecture...

  17. Application of Mobile-ip to Space and Aeronautical Networks

    Science.gov (United States)

    Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.

    2001-01-01

    The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.

  18. Effects of radio- and microwaves emitted by wireless communication devices on the functions of the nervous system selected elements

    Directory of Open Access Journals (Sweden)

    Piotr Politański

    2016-06-01

    Full Text Available Nervous system is the most “electric” system in the human body. The research of the effects of electromagnetic fields (EMFs of different frequencies on its functioning have been carried out for years. This paper presents the results of the scientific literature review on the EMF influence on the functioning of the human nervous system with a particular emphasis on the recent studies of the modern wireless communication and data transmission systems. In the majority of the analyzed areas the published research results do not show EMF effects on the nervous system, except for the influence of GSM telephony signal on resting EEG and EEG during patients’ sleep and the influence of radiofrequency EMF on the cardiovascular regulation. In other analyzed areas (EMF impact on sleep, the evoked potentials and cognitive processes, there are no consistent results supporting any influence of electromagnetic fields. Neurophysiological studies of the effect of radio- and microwaves on the brain functions in humans are still considered inconclusive. This is among others due to, different exposure conditions, a large number of variables tested, deficiencies in repeatability of research and statistical uncertainties. However, methodological guidelines are already available giving a chance of unifying research that definitely needs to be continued in order to identify biophysical mechanisms of interaction between EMFs and the nervous system. One of the EMF research aspects, on which more and more attention is paid, are inter-individual differences. Med Pr 2016;67(3:411–421

  19. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... COMMISSION In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices... for importation, and the sale within the United States after importation of certain wireless communications system server software, wireless handheld devices and battery packs by reason of infringement of...

  20. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    Science.gov (United States)

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  1. Wireless Sensor Networks for Developmental and Flight Instrumentation

    Science.gov (United States)

    Alena, Richard; Figueroa, Fernando; Becker, Jeffrey; Foster, Mark; Wang, Ray; Gamudevelli, Suman; Studor, George

    2011-01-01

    Wireless sensor networks (WSN) based on the IEEE 802.15.4 Personal Area Network and ZigBee Pro 2007 standards are finding increasing use in home automation and smart energy markets providing a framework for interoperable software. The Wireless Connections in Space Project, funded by the NASA Engineering and Safety Center, is developing technology, metrics and requirements for next-generation spacecraft avionics incorporating wireless data transport. The team from Stennis Space Center and Mobitrum Corporation, working under a NASA SBIR grant, has developed techniques for embedding plug-and-play software into ZigBee WSN prototypes implementing the IEEE 1451 Transducer Electronic Datasheet (TEDS) standard. The TEDS provides meta-information regarding sensors such as serial number, calibration curve and operational status. Incorporation of TEDS into wireless sensors leads directly to building application level software that can recognize sensors at run-time, dynamically instantiating sensors as they are added or removed. The Ames Research Center team has been experimenting with this technology building demonstration prototypes for on-board health monitoring. Innovations in technology, software and process can lead to dramatic improvements for managing sensor systems applied to Developmental and Flight Instrumentation (DFI) aboard aerospace vehicles. A brief overview of the plug-and-play ZigBee WSN technology is presented along with specific targets for application within the aerospace DFI market. The software architecture for the sensor nodes incorporating the TEDS information is described along with the functions of the Network Capable Gateway processor which bridges 802.15.4 PAN to the TCP/IP network. Client application software connects to the Gateway and is used to display TEDS information and real-time sensor data values updated every few seconds, incorporating error detection and logging to help measure performance and reliability in relevant target environments

  2. Kali Linux wireless penetration testing beginner's guide

    CERN Document Server

    Ramachandran, Vivek

    2015-01-01

    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

  3. CMOS circuits for passive wireless microsystems

    CERN Document Server

    Yuan, Fei

    2011-01-01

    Here is a comprehensive examination of CMOS circuits for passive wireless microsystems. Covers design challenges, fundamental issues of ultra-low power wireless communications, radio-frequency power harvesting, and advanced design techniques, and more.

  4. CODE: Description Language for Wireless Collaborating Objects

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.

    2005-01-01

    This paper introduces CODE, a Description Language for Wireless Collaborating Objects (WCO), with the specific aim of enabling service management in smart environments. WCO extend the traditional model of wireless sensor networks by transferring additional intelligence and responsibility from the

  5. Telemetry Transmission over Internet Protocol (TMoIP) Standard

    Science.gov (United States)

    2010-10-01

    which might go to network-critical traffic such as Routing Information Protocol (RIP) and Open Shortest Path First ( OSPF ) table updates. Values five and...Protocol (TMoIP), RCC Standard 218-10, October 2010 B-4 OSPF Open Shortest Path First: a protocol used by IP routers to determine most efficient paths...for traffic. It is generally acknowledged that OSPF is superior to and the successor to Routing Information Protocol (RIP). packet A formatted

  6. Mathematical Representation of VoIP Connection Delay

    Directory of Open Access Journals (Sweden)

    M. Halas

    2007-09-01

    Full Text Available The main topic of this article is to define mathematical formulation of VoIP connection delay model. It handles about all partial delay components, the mechanism of their generation, facilities and their mathematical formulation. Thereafter based on mathematical formulation of all partial delay components, the final mathematical model of whole VoIP call delay is created. In conclusion of this article the results of the designed mathematical model are compared with the experimentally gained results.

  7. CATCHprofiles: Clustering and Alignment Tool for ChIP Profiles

    DEFF Research Database (Denmark)

    G. G. Nielsen, Fiona; Galschiøt Markus, Kasper; Møllegaard Friborg, Rune

    2012-01-01

    Chromatin Immuno Precipitation (ChIP) profiling detects in vivo protein-DNA binding, and has revealed a large combinatorial complexity in the binding of chromatin associated proteins and their post-translational modifications. To fully explore the spatial and combinatorial patterns in ChIP-profil......Chromatin Immuno Precipitation (ChIP) profiling detects in vivo protein-DNA binding, and has revealed a large combinatorial complexity in the binding of chromatin associated proteins and their post-translational modifications. To fully explore the spatial and combinatorial patterns in Ch......IP-profiling data and detect potentially meaningful patterns, the areas of enrichment must be aligned and clustered, which is an algorithmically and computationally challenging task. We have developed CATCHprofiles, a novel tool for exhaustive pattern detection in ChIP profiling data. CATCHprofiles is built upon...... a computationally efficient implementation for the exhaustive alignment and hierarchical clustering of ChIP profiling data. The tool features a graphical interface for examination and browsing of the clustering results. CATCHprofiles requires no prior knowledge about functional sites, detects known binding patterns...

  8. Sinkhole Avoidance Routing in Wireless Sensor Networks

    Science.gov (United States)

    2011-05-09

    COVERED (From- To) 09-05-2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Sinkhole Avoidance Routing in Wireless Sensor Networks 5b . GRANT NUMBER . 5c...reliability of wireless sensor networks. 15. SUBJECT TERMS wireless sensor networks, sinkhole attack, routing protocol 16. SECURITY CLASSIFICATION...Include area code) Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std . Z39.18 1 Sinkhole Avoidance Routing in Wireless Sensor Networks MIDN 1/C

  9. How Effective is Routing for Wireless Networking

    Science.gov (United States)

    2016-03-05

    world examples of multi-hop wireless networks. Today, almost all of our wireless devices communicate directly with a base station (such as WiFi or...a link towards the next waypoint. Since routing Distribution A: Public Release. This work is sponsored by the Defense Advanced Research Program...prevents these schemes from working well in a wireless environment. The idea of a link is borrowed from wired networks. In a wireless network, there is no

  10. An Intelligent Handover Management System for Future Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Kassar Meriem

    2008-01-01

    Full Text Available Abstract Future generation wireless networks should provide to mobile users the best connectivity to services anywhere at anytime. The most challenging problem is the seamless intersystem/vertical mobility across heterogeneous wireless networks. In order to answer it, a vertical handover management system is needed. In our paper, we propose an intelligent solution answering user requirements and ensuring service continuity. We focus on a vertical handover decision strategy based on the context-awareness concept. The given strategy chooses the appropriate time and the most suitable access network among those available to perform a handover. It uses advanced decision algorithms (for more efficiency and intelligence and it is governed by handover policies as decision rules (for more flexibility and optimization. To maintain a seamless service continuity, handover execution is based on mobile IP functionalities. We study our decision system in a case of a 3G/UMTS-WLAN scenario and we discuss all the handover decision issues in our solution.

  11. Using Internet of Things technologies for wireless sensor networks

    Science.gov (United States)

    Martinez, K.; Hart, J. K.; Basford, P. J.; Bragg, G. M.; Ward, T.

    2013-12-01

    Numerous authors have envisioned the future internet where anything will be connected: the Internet of Things (IoT). The idea is an extrapolation of the spread of networked devices such as phones, tablets etc. Each device is expected to have its own Internet address and thus be easy to access. The key building blocks of any IoT system are networking, hardware platforms and node software - so they are similar to wireless sensor network requirements. Most existing IoT demonstrators and applications have been gadget-style objects where power and connectivity problems are not too restricting. Environmental sensor networks can benefit from using some of the technologies involved in IoT development. However it is expected that tuning the networking and power management will be necessary to make them as efficient as state of the art wireless sensor networks. Some IoT assumptions such as always-connected nodes and full IP capability need to be considered. This paper will illustrate the advantages and disadvantages of IoT techniques for environment sensing drawing on a range of employment scenarios. We also describe a glacial 'Internet of things' project, which aims to monitor glacial processes. In particular we describe the IoT developments in a deployment in Iceland to examine glacier seismicity, velocity and provide camera images.

  12. Indoor Positioning System Using Depth Maps and Wireless Networks

    Directory of Open Access Journals (Sweden)

    Jaime Duque Domingo

    2016-01-01

    Full Text Available This work presents a new Indoor Positioning System (IPS based on the combination of WiFi Positioning System (WPS and depth maps, for estimating the location of people. The combination of both technologies improves the efficiency of existing methods, based uniquely on wireless positioning techniques. While other positioning systems force users to wear special devices, the system proposed in this paper just requires the use of smartphones, besides the installation of RGB-D sensors in the sensing area. Furthermore, the system is not intrusive, being not necessary to know people’s identity. The paper exposes the method developed for putting together and exploiting both types of sensory information with positioning purposes: the measurements of the level of the signal received from different access points (APs of the wireless network and the depth maps provided by the RGB-D cameras. The obtained results show a significant improvement in terms of positioning with respect to common WiFi-based systems.

  13. IP6K gene identification in plant genomes by tag searching

    OpenAIRE

    Fassetti, Fabio; Leone, Ofelia; Palopoli, Luigi; Rombo, Simona E.; Saiardi, Adolfo

    2011-01-01

    Background Plants have played a special role in inositol polyphosphate (IP) research since in plant seeds was discovered the first IP, the fully phosphorylated inositol ring of phytic acid (IP6). It is now known that phytic acid is further metabolized by the IP6 Kinases (IP6Ks) to generate IP containing pyro-phosphate moiety. The IP6K are evolutionary conserved enzymes identified in several mammalian, fungi and amoebae species. Although IP6K has not yet been identified in plant chromosomes, t...

  14. Techniques for Wireless Applications

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-05-01

    Switching techniques have been first proposed as a spacial diversity techniques. These techniques have been shown to reduce considerably the processing load while letting multi-antenna systems achieve a specific target performance. In this thesis, we take a different look at the switching schemes by implementing them for different other wireless applications. More specifically, this thesis consists of three main parts, where the first part considers a multiuser environment and an adaptive scheduling algorithm based on the switching with post-selection scheme for statistically independent but non-identically distributed channel conditions. The performance of this switched based scheduler is investigated and a multitude of performance metrics are presented. In a second part, we propose and analyze the performance of three switched-based algorithms for interference reduction in the downlink of over-loaded femtocells. For instance, performance metrics are derived in closed-form and these metrics are used to compare these three proposed schemes. Finally in a third part, a switch based opportunistic channel access scheme is proposed for a cognitive radio system and its performance is analyzed in terms of two new proposed metrics namely the average cognitive radio access and the waiting time duration.

  15. Advanced Wireless Sensor Nodes - MSFC

    Science.gov (United States)

    Varnavas, Kosta; Richeson, Jeff

    2017-01-01

    NASA field center Marshall Space Flight Center (Huntsville, AL), has invested in advanced wireless sensor technology development. Developments for a wireless microcontroller back-end were primarily focused on the commercial Synapse Wireless family of devices. These devices have many useful features for NASA applications, good characteristics and the ability to be programmed Over-The-Air (OTA). The effort has focused on two widely used sensor types, mechanical strain gauges and thermal sensors. Mechanical strain gauges are used extensively in NASA structural testing and even on vehicle instrumentation systems. Additionally, thermal monitoring with many types of sensors is extensively used. These thermal sensors include thermocouples of all types, resistive temperature devices (RTDs), diodes and other thermal sensor types. The wireless thermal board will accommodate all of these types of sensor inputs to an analog front end. The analog front end on each of the sensors interfaces to the Synapse wireless microcontroller, based on the Atmel Atmega128 device. Once the analog sensor output data is digitized by the onboard analog to digital converter (A/D), the data is available for analysis, computation or transmission. Various hardware features allow custom embedded software to manage battery power to enhance battery life. This technology development fits nicely into using numerous additional sensor front ends, including some of the low-cost printed circuit board capacitive moisture content sensors currently being developed at Auburn University.

  16. Inositol hexakisphosphate (IP6) generated by IP5K mediates cullin-COP9 signalosome interactions and CRL function

    National Research Council Canada - National Science Library

    Paul C. Scherer; Yan Ding; Zhiqing Liu; Jing Xu; Haibin Mao; James C. Barrow; Ning Wei; Ning Zheng; Solomon H. Snyder; Feng Rao

    2016-01-01

    .... We now report that inositol hexakisphosphate (IP6) is a major physiologic determinant of the CRL-CSN interface, which includes a hitherto unidentified electrostatic interaction between the N-terminal acidic tail of CSN subunit 2 (CSN2...

  17. TRENDS IN THE CONVERGENCE OF WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    Daniel SORA

    2011-01-01

    Full Text Available In today’s technological market, there are many types of networks. These networks include wireless personal area networks (WPANs, wireless local area networks (WLANs, wireless metropolitan area networks (WMANs, and cellular networks. A vision of a future convergence of networks envisaged for WPANs, WLANs, WiMax, and cellular networks is presented in this paper.

  18. A Wireless Communications Systems Laboratory Course

    Science.gov (United States)

    Guzelgoz, Sabih; Arslan, Huseyin

    2010-01-01

    A novel wireless communications systems laboratory course is introduced. The course teaches students how to design, test, and simulate wireless systems using modern instrumentation and computer-aided design (CAD) software. One of the objectives of the course is to help students understand the theoretical concepts behind wireless communication…

  19. Dimensioning Method for Conversational Video Applications in Wireless Convergent Networks

    Directory of Open Access Journals (Sweden)

    Alonso JoséI

    2008-01-01

    Full Text Available Abstract New convergent services are becoming possible, thanks to the expansion of IP networks based on the availability of innovative advanced coding formats such as H.264, which reduce network bandwidth requirements providing good video quality, and the rapid growth in the supply of dual-mode WiFi cellular terminals. This paper provides, first, a comprehensive subject overview as several technologies are involved, such as medium access protocol in IEEE802.11, H.264 advanced video coding standards, and conversational application characterization and recommendations. Second, the paper presents a new and simple dimensioning model of conversational video over wireless LAN. WLAN is addressed under the optimal network throughput and the perspective of video quality. The maximum number of simultaneous users resulting from throughput is limited by the collisions taking place in the shared medium with the statistical contention protocol. The video quality is conditioned by the packet loss in the contention protocol. Both approaches are analyzed within the scope of the advanced video codecs used in conversational video over IP, to conclude that conversational video dimensioning based on network throughput is not enough to ensure a satisfactory user experience, and video quality has to be taken also into account. Finally, the proposed model has been applied to a real-office scenario.

  20. Dimensioning Method for Conversational Video Applications in Wireless Convergent Networks

    Directory of Open Access Journals (Sweden)

    Raquel Perez Leal

    2007-12-01

    Full Text Available New convergent services are becoming possible, thanks to the expansion of IP networks based on the availability of innovative advanced coding formats such as H.264, which reduce network bandwidth requirements providing good video quality, and the rapid growth in the supply of dual-mode WiFi cellular terminals. This paper provides, first, a comprehensive subject overview as several technologies are involved, such as medium access protocol in IEEE802.11, H.264 advanced video coding standards, and conversational application characterization and recommendations. Second, the paper presents a new and simple dimensioning model of conversational video over wireless LAN. WLAN is addressed under the optimal network throughput and the perspective of video quality. The maximum number of simultaneous users resulting from throughput is limited by the collisions taking place in the shared medium with the statistical contention protocol. The video quality is conditioned by the packet loss in the contention protocol. Both approaches are analyzed within the scope of the advanced video codecs used in conversational video over IP, to conclude that conversational video dimensioning based on network throughput is not enough to ensure a satisfactory user experience, and video quality has to be taken also into account. Finally, the proposed model has been applied to a real-office scenario.

  1. Collaborative Wireless Sensor Networks in Industrial and Business Processes

    NARCIS (Netherlands)

    Marin Perianu, Mihai

    2008-01-01

    Personal computers, mobile telephony and the Internet made the vision of everyone being networked real, at such a level of quality and speed that people could only dream of, one hundred years ago. Nowadays, another dream starts to become reality: the dream of networking everything. The limits of

  2. Distributed Speech Enhancement in Wireless Acoustic Sensor Networks

    NARCIS (Netherlands)

    Zeng, Y.

    2015-01-01

    In digital speech communication applications like hands-free mobile telephony, hearing aids and human-to-computer communication systems, the recorded speech signals are typically corrupted by background noise. As a result, their quality and intelligibility can get severely degraded. Traditional

  3. New Wireless Network for Uganda's Healthcare Workers | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-11-10

    Nov 10, 2010 ... The introduction of cellular telephony has revolutionized Uganda's communication industry, increasing national teledensity by 350% since the first ... Moreover, PDAs were found to be an extremely efficient tool for conducting surveys to determine the prevalence of disease such as measles or malaria.

  4. Resilient Disaster Network Based on Software Defined Cognitive Wireless Network Technology

    Directory of Open Access Journals (Sweden)

    Goshi Sato

    2015-01-01

    Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.

  5. [Development of Bluetooth wireless sensors].

    Science.gov (United States)

    Moor, C; Schwaibold, M; Roth, H; Schöchlin, J; Bolz, A

    2002-01-01

    Wireless communication could help to overcome current obstacles in medical devices and could enable medical services to offer completely new scenarios in health care. The Bluetooth technology which is the upcoming global market leader in wireless communication turned out to be perfectly suited not only for consumer market products but also in the medical environment [1]. It offers a low power, low cost connection in the medium range of 1-100 m with a bandwidth of currently 723.2 kbaud. This paper describes the development of a wireless ECG device and a Pulse Oximeter. Equipped with a Bluetooth port, the measurement devices are enabled to transmit data between the sensor and a Bluetooth-monitor. Therefore, CSR's Bluetooth protocol embedded two-processor and embedded single-processor architecture has been used.

  6. Wireless Authentication Protocol Implementation: Descriptions of a Zero-Knowledge Proof (ZKP) Protocol Implementation for Testing on Ground and Airborne Mobile Networks

    Science.gov (United States)

    2015-01-01

    current FFS Feige-Fiat-Shamir GMP GNU Multiple Precision MANET Mobile Ad Hoc Network MHz Mega-Hertz RF Radio Frequency TCP/IP Transmission Control...payload package consists of a processor board (model: PM-945GSE-270) and wireless radio board (model: TL-WN861N) which are stacked and attached to a...number of devices which include a processor board (model: PM-LX2-800-R10) and wireless radio board (model: TL-WN861N) along with an RF attenuator, a

  7. Latency and Jitter Analysis for IEEE 802.11e Wireless LANs

    Directory of Open Access Journals (Sweden)

    Sungkwan Youm

    2013-01-01

    Full Text Available This paper presents a numerical analysis of latency and jitter for IEEE 802.11e wireless local area networks (WLANs in a saturation condition, by using a Markov model. We use this model to explicate how the enhanced distributed coordination function (EDCF differentiates classes of service and to characterize the probability distribution of the medium access control (MAC layer packet latency and jitter, on which the quality of the voice over Internet protocol (VoIP calls is dependent. From the proposed analytic model, we can estimate the available number of nodes determining the system performance, in order to satisfy user demands on the latency and jitter.

  8. OFDM systems for wireless communications

    CERN Document Server

    Narasimhamurthy, Adarsh

    2010-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is

  9. Artificial intelligence in wireless communications

    CERN Document Server

    Rondeau, Thomas W

    2009-01-01

    This cutting-edge resource offers practical overview of cognitive radio, a paradigm for wireless communications in which a network or a wireless node changes its transmission or reception parameters. The alteration of parameters is based on the active monitoring of several factors in the external and internal radio environment. This book offers a detailed description of cognitive radio and its individual parts. Practitioners learn how the basic processing elements and their capabilities are implemented as modular components. Moreover, the book explains how each component can be developed and t

  10. Embracing interference in wireless systems

    CERN Document Server

    Gollakota, Shyamnath

    2014-01-01

    The wireless medium is a shared resource. If nearby devices transmit at thesame time, their signals interfere, resulting in a collision. In traditionalnetworks, collisions cause the loss of the transmitted information. For thisreason, wireless networks have been designed with the assumption thatinterference is intrinsically harmful and must be avoided.This book, a revised version of the author's award-winning Ph.D.dissertation, takes an alternate approach: Instead of viewing interferenceas an inherently counterproductive phenomenon that should to be avoided, wedesign practical systems that tra

  11. The Wireless Nursing Call System

    DEFF Research Database (Denmark)

    Jensen, Casper Bruun

    2006-01-01

    This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight into the cha......This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight...

  12. WIRELESS FOR A NUCLEAR FACILITY

    Energy Technology Data Exchange (ETDEWEB)

    Shull, D; Joe Cordaro, J

    2007-03-28

    The introduction of wireless technology into a government site where nuclear material is processed and stored brings new meaning to the term ''harsh environment''. At SRNL, we are attempting to address not only the harsh RF and harsh physical environment common to industrial facilities, but also the ''harsh'' regulatory environment necessitated by the nature of the business at our site. We will discuss our concepts, processes, and expected outcomes in our attempts to surmount the roadblocks and reap the benefits of wireless in our ''factory''.

  13. Wireless Augmented Reality Communication System

    Science.gov (United States)

    Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)

    2017-01-01

    A portable unit is for video communication to select a user name in a user name network. A transceiver wirelessly accesses a communication network through a wireless connection to a general purpose node coupled to the communication network. A user interface can receive user input to log on to a user name network through the communication network. The user name network has a plurality of user names, at least one of the plurality of user names is associated with a remote portable unit, logged on to the user name network and available for video communication.

  14. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  15. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  16. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...... be useful for practicing engineers from industry who deal with the wireless systems that are designed and analyzed with the UWB technique.......Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...

  17. Wireless Ways: Business and Personal Applications of Wireless Technology.

    Science.gov (United States)

    Chung, Joe

    2001-01-01

    Describes the Art Technology Group (ATG), an electronic business and customer management company, and the work they have done with wireless technology. Highlights include designing virtual offices and supporting the resulting virtual community; the mobility it allows; problems with bandwidth; and display issues. (LRW)

  18. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...

  19. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo......Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless...

  20. The centriolar satellite protein SSX2IP promotes centrosome maturation.

    Science.gov (United States)

    Bärenz, Felix; Inoue, Daigo; Yokoyama, Hideki; Tegha-Dunghu, Justus; Freiss, Stephanie; Draeger, Stefanie; Mayilo, Dmytro; Cado, Ivana; Merker, Sabine; Klinger, Maren; Hoeckendorf, Burkhard; Pilz, Sahra; Hupfeld, Kerstin; Steinbeisser, Herbert; Lorenz, Holger; Ruppert, Thomas; Wittbrodt, Joachim; Gruss, Oliver J

    2013-07-08

    Meiotic maturation in vertebrate oocytes is an excellent model system for microtubule reorganization during M-phase spindle assembly. Here, we surveyed changes in the pattern of microtubule-interacting proteins upon Xenopus laevis oocyte maturation by quantitative proteomics. We identified the synovial sarcoma X breakpoint protein (SSX2IP) as a novel spindle protein. Using X. laevis egg extracts, we show that SSX2IP accumulated at spindle poles in a Dynein-dependent manner and interacted with the γ-tubulin ring complex (γ-TuRC) and the centriolar satellite protein PCM-1. Immunodepletion of SSX2IP impeded γ-TuRC loading onto centrosomes. This led to reduced microtubule nucleation and spindle assembly failure. In rapidly dividing blastomeres of medaka (Oryzias latipes) and in somatic cells, SSX2IP knockdown caused fragmentation of pericentriolar material and chromosome segregation errors. We characterize SSX2IP as a novel centrosome maturation and maintenance factor that is expressed at the onset of vertebrate development. It preserves centrosome integrity and faithful mitosis during the rapid cleavage division of blastomeres and in somatic cells.

  1. Virtual Community Computer-Telephony

    OpenAIRE

    Tolkiehn, Günter-Ulrich

    2002-01-01

    Es war beabsichtigt, mithilfe des Internets und geeigneter Systeme und Anwendungen für Kommunikation und Content-Management kommerziellen Anwendern und Anbietern von Computer-Telefonie-Technik eine themenbezogene interaktive Plattform für Information, Kommunikation und Meinungsbildung zu bieten, wobei es öffentliche und Mitgliederbereiche geben soll. Solche Gebilde, virtuelle Interessengemeinschaften, werden auch als vertikales Business-to-Business (B2B)-Portal oder B2B-Virtual Community of I...

  2. Architectures for Wireless Sensor Networks

    NARCIS (Netherlands)

    Dulman, S.O.; Havinga, Paul J.M.

    2005-01-01

    Various architectures have been developed for wireless sensor networks. Many of them leave to the programmer important concepts as the way in which the inter-task communication and dynamic reconfigurations are addressed. In this paper we describe the characteristics of a new architecture we proposed

  3. Approximate Inference for Wireless Communications

    DEFF Research Database (Denmark)

    Hansen, Morten

    This thesis investigates signal processing techniques for wireless communication receivers. The aim is to improve the performance or reduce the computationally complexity of these, where the primary focus area is cellular systems such as Global System for Mobile communications (GSM) (and extensions...

  4. Wireless Power for Mobile Devices

    NARCIS (Netherlands)

    Waffenschmidt, E.

    2011-01-01

    Wireless power transfer allows a convenient, easy to use battery charging of mobile phones and other mobile devices. No hassle with cables and plugs, just place the device on a pad and that’s it. Such asystem even has the potential to become a standard charging solution. Where are the limits for

  5. Adaptability in dynamic wireless networks

    NARCIS (Netherlands)

    Iyer, V.G.

    2012-01-01

    Software for networked embedded systems faces several challenges when the deployed network is subject to changing circumstances during operation. Typically, inter-node communication and network connectivity are two crucial aspects that are directly affected by dynamics such as failing wireless links

  6. EXPERIMENTAL PERFORMANCE ANALYSIS OF WIRELESS ...

    African Journals Online (AJOL)

    EXPERIMENTAL PERFORMANCE ANALYSIS OF WIRELESS LINKS .... less reliable predictors of link quality. They recognised that the accuracy of the results of their work was, however, affected by delay im- posed by measurement window and the period of the ... a digital computer and analysing the results. Although.

  7. Socially Aware Heterogeneous Wireless Networks.

    Science.gov (United States)

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-06-11

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  8. Gigabit Wireless for Network Connectivity

    Science.gov (United States)

    Schoedel, Eric

    2009-01-01

    Uninterrupted, high-bandwidth network connectivity is crucial for higher education. Colleges and universities increasingly adopt gigabit wireless solutions because of their fiber-equivalent performance, quick implementation, and significant return on investment. For just those reasons, Rush University Medical Center switched from free space optics…

  9. Breaking Free with Wireless Networks.

    Science.gov (United States)

    Fleischman, John

    2002-01-01

    Discusses wireless local area networks (LANs) which typically consist of laptop computers that connect to fixed access points via infrared or radio signals. Topics include wide area networks; personal area networks; problems, including limitations of available bandwidth, interference, and security concerns; use in education; interoperability;…

  10. Securing underwater wireless communication networks

    OpenAIRE

    Domingo Aladrén, Mari Carmen

    2011-01-01

    Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels. The unique characteristics of the underwater acoustic communication channel, and the differences between underwater sensor networks and their ground-based counterparts require the development of efficient and reliable security mechanisms. In this article, a compl...

  11. Data centric wireless sensor networks

    NARCIS (Netherlands)

    Dulman, S.O.; Havinga, Paul J.M.

    2005-01-01

    The vision of wirteless sensing systems requires the development of devices and technologies that can be pervasive without being intrusive. The basic component of such a smart environment will be a small node with sensing and wireless communications capabilities, able to organize itself flexibly

  12. Wireless Crew Communication Feasibility Assessment

    Science.gov (United States)

    Archer, Ronald D.; Romero, Andy; Juge, David

    2016-01-01

    Ongoing discussions with crew currently onboard the ISS as well as the crew debriefs from completed ISS missions indicate that issues associated with the lack of wireless crew communication results in increased crew task completion times and lower productivity, creates cable management issues, and increases crew frustration.

  13. Implementasi Server VoIP Berbasis SIP Pada LAN Nirkabel

    Directory of Open Access Journals (Sweden)

    Mohammad Shoffa Al Arofat

    2013-03-01

    Full Text Available Voice over Internet Protocol (VoIP merupakan teknologi yang memungkinkan percakapan suara jarak jauh melalui protokol internet. Dalam telekomunikasi, diperlukan teknologi pensinyalan yang berguna untuk membangun, mengawasi, dan melepas hubungan antara dua titik. Salah satu teknologi pensinyalan yang banyak digunakan untuk VoIP adalah Session Initiation Protocol, dengan implementasinya yang berupa perangkat lunak Open SIP Server. Selain pensinyalan, ada beberapa parameter yang perlu diperhatikan dalam implementasi VoIP, yaitu Mean Opinion Score (MOS, network impairment, dan bandwidth. Pengujian dilakukan terhadap enam codec, yaitu G.722, PCMA, PCMU, Speex, GSM, dan BV16. Berdasarkan hasil analisis dapat diambil kesimpulan bahwa codec yang menggunakan bandwidth paling rendah adalah Speex (27,12 kbps; Rata-rata delay yang dihasilkan oleh sipdroid lebih baik daripada jitsi.

  14. Speciální aplikace VoIP

    OpenAIRE

    Lembard, Tomáš

    2011-01-01

    Cílem této diplomové práce je návrh a následná realizace zařízení pro přenos hlasu v lokální síti a popisem použitých obvodů a řešení po stránce hw i sw. Zabývá se problematikou digitalizace nízkofrekvenčních signálů, strukturou IP a UDP protokolů, implementací TCP/IP stacku cIPS The aim of this master's thesis is suggestion and following realization of voice transmission over the local network equipment and a description of used circuits and solutions in terms of hardware and software. Th...

  15. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    Executive Summary The authors argue that challenges to capturing value from know-how and reputation through the use of different IP tools will be an increasingly important matter of strategy for global enterprises. This has important implications for management practice. Global enterprises......), develop their know-how, and build and maintain their reputation globally during the last decades. We focus on three tools: patents, trademarks, and industrial designs. We find that, although most IP applications come from a few countries (the United States, European Union, Japan, China, and South Korea......), most growth in IP activity has come from middle-income countries, especially in Asia. We observe important differences in the origins of this growth. For example, while in India most applicants were foreign firms, in China most were local. However, most Indian innovations are also applied overseas...

  16. 78 FR 39345 - ACS Wireless, Inc.; Notice of Application

    Science.gov (United States)

    2013-07-01

    ... No. 812-14066] ACS Wireless, Inc.; Notice of Application AGENCY: Securities and Exchange Commission... (``Act''). Summary of Application: ACS Wireless, Inc. (``ACS Wireless'') seeks an order under section 3(b..., reinvesting, owning, holding or trading in securities. ACS Wireless is primarily engaged in providing wireless...

  17. Wireless and mobile systems in telemedicine

    Directory of Open Access Journals (Sweden)

    Reza Safdari

    2012-12-01

    Full Text Available Background: It is necessary to deploy mobile and wireless systems in healthcare, because they have many benefits for healthcare systems. The objectives of this article were introducing various systems, applications, and standards of the wireless and mobile telemedicine. Material and Methods: This review study was conducted in 2010. To conduct the study, published articles in the years 2005 to 2012, in English with an emphasis on wireless and mobile technologies in health were studied. Search was done with key words include telemedicine, wireless health systems, health and telecommunications technology in databases including Pubmed, Science Direct, Google Scholar, Web of Sciences, Proquest. The collected data were analyzed. Results: Telemedicine system in the ambulance, telemedicine systems in space, telecardiology systems, EEG system, ultrasound system are some types of wireless and mobile systems in telemedicine. PDA-based mobile and wireless telemedicine application, based PDA drug application, and patient tracking application are some of wireless and mobile applications of telemedicine. The most important standards of wireless and mobile telemedicine are HL7, DICOM, SNOMed, and ICD-9-CM. Conclusion: There are many challenges in the wireless and mobile systems in telemedicine, despite the many benefits. Slow speed in sending pictures and video, lack of attention to the privacy in the design of these systems, environmental variables and the number of users during the day are some of these challenges. It is recommended to consider these challenges during the planning and designing of wireless and mobile systems in telemedicine.

  18. Energy-efficient digital and wireless IC design for wireless smart sensing

    Science.gov (United States)

    Zhou, Jun; Huang, Xiongchuan; Wang, Chao; Tae-Hyoung Kim, Tony; Lian, Yong

    2017-10-01

    Wireless smart sensing is now widely used in various applications such as health monitoring and structural monitoring. In conventional wireless sensor nodes, significant power is consumed in wirelessly transmitting the raw data. Smart sensing adds local intelligence to the sensor node and reduces the amount of wireless data transmission via on-node digital signal processing. While the total power consumption is reduced compared to conventional wireless sensing, the power consumption of the digital processing becomes as dominant as wireless data transmission. This paper reviews the state-of-the-art energy-efficient digital and wireless IC design techniques for reducing the power consumption of the wireless smart sensor node to prolong battery life and enable self-powered applications.

  19. Adaptive Naive Bayes classification for wireless sensor networks

    NARCIS (Netherlands)

    Zwartjes, G.J.

    2017-01-01

    Wireless Sensor Networks are tiny devices equipped with sensors and wireless communication. These devices observe environments and communicatie about these observations. Machine Learning techniques are of interest for Wireless Sensor Network applications since they can reduce the amount of needed

  20. Construction of a nuclear data server using TCP/IP

    Energy Technology Data Exchange (ETDEWEB)

    Kawano, Toshihiko; Sakai, Osamu [Kyushu Univ., Fukuoka (Japan)

    1997-03-01

    We construct a nuclear data server which provides data in the evaluated nuclear data library through the network by means of TCP/IP. The client is not necessarily a user but a computer program. Two examples with a prototype server program are demonstrated, the first is data transfer from the server to a user, and the second is to a computer program. (author)

  1. Credibility and validation of simulation models for tactical IP networks

    NARCIS (Netherlands)

    Boltjes, B.; Thiele, F.; Diaz, I.F.

    2007-01-01

    The task of TNO is to provide predictions of the scalability and performance of the new all-IP tactical networks of the Royal Netherlands Army (RNLA) that are likely to be fielded. The inherent properties of fielded tactical networks, such as low bandwidth and Quality of Service (QoS) policies

  2. The Verb Always Leaves IP in V2 Clauses

    DEFF Research Database (Denmark)

    Schwartz, Bonnie D.; Vikner, Sten

    2007-01-01

    (1989) we claimed that all V2 clauses were CPs, and we referred to this analysis as the 'traditional' analysis. In this paper we shall call it the 'V2 outside IP' analysis, and by using this term we want to convey that although in what follows we will adhere to the view that the verb moves to Cº, any......-initial and non-subject-initial V2 clauses, the former being only IPs and the latter CPs, as suggested by Travis (1984, 1986, 1991) and Zwart (1990, 1991). Below we will refer to this analysis as the 'V2 asymmetry' analysis. The other alternative analysis is that V2 takes place inside IP, as suggested by Diesing......The verb second (V2) phenomenon, as it is found in the Germanic languages, has been the focus of much attention within recent syntactic research. In most of the literature on V2, it is assumed that the verb in all V2 clauses has moved to a head position outside IP, e.g. Cº. In Schwartz & Vikner...

  3. Designing TCP/IP Checksum Function for Acceleration in FPGA

    African Journals Online (AJOL)

    etim

    bus speed limits. Consequently, for a higher throughput and speedy delivery of information between hosts on the internet, there is the need to identify those performance-critical TCP/IP functions ... instruction fetching and decoding, bus speed constraints, latency due to buffer/memory ... functions in FPGA that can be updated.

  4. TTI ARO Opportunity Fund: IPS | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This funding will allow the Think Tank Initiative grantee, the Institute of Policy Studies of Sri Lanka (IPS), to undertake quality, policy-oriented labour migration research. The research will focus on some of the issues identified by the National Human Resources and Employment Policy for Sri Lanka.

  5. Changepoint detection techniques for VoIP traffic

    NARCIS (Netherlands)

    Mandjes, M.; Zuraniewski, P.W.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  6. Changepoint Detection Techniques for VoIP Traffic

    NARCIS (Netherlands)

    Mandjes, M.; Żuraniewski, P.; Biersack, E.; Callegari, C.; Matijasevic, M.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  7. Empirical assessment of VoIP overload detection tests

    NARCIS (Netherlands)

    Żuraniewski, P.; Mandjes, M.; Mellia, M.

    2010-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this paper we explore such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). We focus on

  8. Biobjective VoIP Service Management in Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    Jorge M. Cortés-Mendoza

    2016-01-01

    Full Text Available Voice over Internet Protocol (VoIP allows communication of voice and/or data over the internet in less expensive and reliable manner than traditional ISDN systems. This solution typically allows flexible interconnection between organization and companies on any domains. Cloud VoIP solutions can offer even cheaper and scalable service when virtualized telephone infrastructure is used in the most efficient way. Scheduling and load balancing algorithms are fundamental parts of this approach. Unfortunately, VoIP scheduling techniques do not take into account uncertainty in dynamic and unpredictable cloud environments. In this paper, we formulate the problem of scheduling of VoIP services in distributed cloud environments and propose a new model for biobjective optimization. We consider the special case of the on-line nonclairvoyant dynamic bin-packing problem and discuss solutions for provider cost and quality of service optimization. We propose twenty call allocation strategies and evaluate their performance by comprehensive simulation analysis on real workload considering six months of the MIXvoip company service.

  9. Aspects of the epidemiology of intestinal parasitosis (IP) in children ...

    African Journals Online (AJOL)

    Background: Intestinal parasitoses (IP) have been demonstrated to pose a major public health problem in the tropics. It is hypothesized that children are continually exposed to re- infection despite interventions. We conducted this hospital-based study to investigate knowledge, practices and perceptions among mothers of ...

  10. TTI ARO Opportunity Fund: IPS | CRDI - Centre de recherches pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This funding will allow the Think Tank Initiative grantee, the Institute of Policy Studies of Sri Lanka (IPS), to undertake quality, policy-oriented labour migration research. The research will focus on some of the issues identified by the National Human Resources and Employment Policy for Sri Lanka.

  11. Voice over IP phone calls from your smartphone

    CERN Multimedia

    2014-01-01

    All CERN users do have a Lync account (see here) and can use Instant Messaging, presence and other features. In addition, if your number is activated on Lync IP Phone(1) system then you can make standard phone calls from your computer (Windows/Mac).   Recently, we upgraded the infrastructure to Lync 2013. One of the major features is the possibility to make Voice over IP phone calls from a smartphone using your CERN standard phone number (not mobile!). Install Lync 2013 on iPhone/iPad, Android or Windows Phone, connect to WiFi network and make phone calls as if you were in your office. There will be no roaming charges because you will be using WiFi to connect to CERN phone system(2). Register here to the presentation on Tuesday 29 April at 11 a.m. in the Technical Training Center and see the most exciting features of Lync 2013.   Looking forward to seeing you! The Lync team (1) How to register on Lync IP Phone system: http://information-technology.web.cern.ch/book/lync-ip-phone-serv...

  12. TCP/IP communication between two USRP-E110

    OpenAIRE

    Sanabria-Russo, Luis

    2012-01-01

    This short report intends to provide an overview of the procedure and statistics of establishing a TCP/IP link between two USRP-E110. The testings are performed using an example GNURadio code and the networking protocol stack provided by the Linux operating system embedded in the USRP-E110.

  13. Load characterization and anomaly detection for voice over IP traffic

    NARCIS (Netherlands)

    M.R.H. Mandjes (Michel); I. Saniee; A. Stolyar

    2005-01-01

    textabstractWe consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically arise when there is focused overload or when a network element fails and it is desired to infer these purely from the measured traffic. We derive new general formulae for the variance of the

  14. QoS-aware bandwidth provisioning for IP network links

    NARCIS (Netherlands)

    van den Berg, H; Mandjes, M.R.H.; van de Meent, R.; Pras, A.; Roijers, F.; Venemans, P.H.A.

    2006-01-01

    Current bandwidth provisioning procedures for IP network links are mostly based on simple rules of thumb, using coarse traffic measurements made on a time scale of e.g., 5 or 15 minutes. A crucial question, however, is whether such coarse measurements give any useful insight into the capacity

  15. QoS aware bandwidth provisioning of IP links

    NARCIS (Netherlands)

    van den Berg, Hans Leo; Altman, E; Mandjes, M.R.H.; van de Meent, R.; Pras, Aiko; Roijers, Frank; Venemans, Pieter

    Current bandwidth provisioning procedures for IP network links are mostly based on simple rules of thumb, using coarse traffic measurements made on a time scale of e.g., 5 or 15 min. A crucial question, however, is whether such coarse measurements give any useful insight into the capacity actually

  16. QoS-aware bandwidth provisioning for IP network links

    NARCIS (Netherlands)

    Berg, J.L. van den; Mandjes, M.; Meent, R. van de; Pras, A.; Roijers, F.; Venemans, P.

    2006-01-01

    Current bandwidth provisioning procedures for IP network links are mostly based on simple rules of thumb, using coarse traffic measurements made on a time scale of e.g., 5 or 15 min. A crucial question, however, is whether such coarse measurements give any useful insight into the capacity actually

  17. Sensing CMEs Propagating in the Interplanetary Medium. MEXART IPS Observations

    Science.gov (United States)

    Gonzalez-Esparza, A.; Romero Hernandez, E.; Aguilar-Rodriguez, E.; Ontiveros-Hernandez, V.; Rodriguez-Martinez, M. R.; Mejia-Ambriz, J. C.

    2014-12-01

    The Mexican Array Radiotelescope (MEXART) is a ground instrument fully dedicated to perform Interplanetary Scintillation (IPS) observations to track large-scale solar wind disturbances within the Sun and the Earth. The MEXART is located at Michoacan (19 degrees 48' North, 101 degrees 41' West) and has an operation frequency of 140 MHz. The IPS technique is based on the scintillations that interplanetary disturbances (e.g., ICMEs) causes on the signal of small diameter cosmic radio sources detected by a radiotelescope. We report the tracking of the first solar disturbances detected by the instrument during the maximum of solar cycle 24. We estimated solar wind velocities and scintillation indexes (m). We present the first curves of the variation of the scintillating index with respect to the heliocentric distance for some strong radio sources using IPS observations at 140 MHZ. We identified events associated with strong scintilltaion in our data. We combine the IPS data with white light chronograph observations to identify the first CMEs in the interplanetary medium detected by the instrument.

  18. PENGARUH PEMANFAATAN PERPUSTAKAAN TERHADAP PRESTASI BELAJAR IPS MELALUI MOTIVASI BELAJAR

    Directory of Open Access Journals (Sweden)

    Nurhayani Nurhayani

    2017-11-01

    Full Text Available The purpose of this research was to investigate the effect of the use of libraries on social study learning achievement through learning motivation, either directly or indirectly. The type of this research was quantitative Ex post facto. The sampling technique used probability sampling with total of the students consisted of 156. Collecting data used a Likert questionnaire and students’ report documentation. The data analysis used path analysis and assisted by SPSS for windows version 20. The results (1 there was a direct effect of the use of libraries on the learning motivation; (2 there was a direct effect of the use of libraries to the learning achievement of Social Study; (3 there was a direct effect of learning motivation towards learning achievement of Social Study; (4 there was an indirect effect on social study learning achievement library through learning motivation. Penelitian ini bertujuan untuk mengetahui pengaruh pemanfaatan perpustakaan terhadap prestasi belajar IPS melalui motivasi belajar, baik secara langsung maupun tidak langsung. Jenis penelitian adalah kuantitatif Ex Post Facto. Teknik pengambilan sampel menggunakan probability sampling sebanyak 156 siswa. Pengumpulan data menggunakan angket skala likert dan dokumentasi nilai rapor. Analisis data menggunakan analisis jalur dan dibantu program SPSS for window versi 20. Hasil penelitian (1 terdapat pengaruh langsung pemanfaatan perpustakaan terhadap motivasi belajar; (2 terdapat pengaruh langsung pemanfaatan perpustakaan terhadap Prestasi belajar IPS; (3 terdapat pengaruh langsung motivasi belajar terhadap prestasi belajar IPS; (4 terdapat pengaruh tidak langsung pemanfaatan perpustakaan terhadap prestasi belajar IPS melalui motivasi belajar.

  19. Sister broods in the spruce bark beetle, Ips typographus (L.)

    Czech Academy of Sciences Publication Activity Database

    Davídková, Markéta; Doležal, Petr

    2017-01-01

    Roč. 405, DEC 01 (2017), s. 13-21 ISSN 0378-1127 Grant - others:Lesy ČR(CZ) 08/2009- 2015 Institutional support: RVO:60077344 Keywords : re-emergence * sister broods * Ips typographus Subject RIV: EH - Ecology, Behaviour OBOR OECD: Zoology Impact factor: 3.064, year: 2016 http://www.sciencedirect.com/science/article/pii/S0378112717309507

  20. Understanding Innovative Potential (IP) in an ICT Context

    DEFF Research Database (Denmark)

    Rai, Sudhanshu

    a dynamic perspective in its conception, operation and instantiation. I conclude this paper with insights on what I call the dynamic IP threshold arguing that being dynamic cannot be seen as a point in time but a threshold existing over time. I then discuss some implications. I suggest that firms need...

  1. Wireless Network Penetration Testing and Security Auditing

    Directory of Open Access Journals (Sweden)

    Wang Shao-Long

    2016-01-01

    Full Text Available IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory environment to conduct penetration tests to confirm whether our wireless network is hackable or not. WAIDPS is configured as auditing tool to view wireless attacks, such as WEP/WPA/WPA2 cracking, rouge access points, denial of service attack. WAIDPS is designed to detect wireless intrusion with additional features. Penetration testing and auditing will mitigate the risk and threatening to protect WALN.

  2. Multi-Channel Multi-Radio Using 802.11 Based Media Access for Sink Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kok-Keong Loo

    2011-05-01

    Full Text Available The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and data over IP networks instead of standalone video circuits. These systems will increase their reliability in the future on wireless networks and on IEEE 802.11 networks. However, due to limited non-overlapping channels, delay, and congestion there will be problems at sink nodes. In this paper we provide necessary conditions to verify the feasibility of round robin technique in these networks at the sink nodes by using a technique to regulate multi-radio multichannel assignment. We demonstrate through simulations that dynamic channel assignment scheme using multi-radio, and multichannel configuration at a single sink node can perform close to optimal on the average while multiple sink node assignment also performs well. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.

  3. Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems

    Directory of Open Access Journals (Sweden)

    Troy Weingart

    2007-01-01

    Full Text Available The flexibility of cognitive and software-defined radio heralds an opportunity for researchers to reexamine how network protocol layers operate with respect to providing quality of service aware transmission among wireless nodes. This opportunity is enhanced by the continued development of spectrally responsive devices—ones that can detect and respond to changes in the radio frequency environment. Present wireless network protocols define reliability and other performance-related tasks narrowly within layers. For example, the frame size employed on 802.11 can substantially influence the throughput, delay, and jitter experienced by an application, but there is no simple way to adapt this parameter. Furthermore, while the data link layer of 802.11 provides error detection capabilities across a link, it does not specify additional features, such as forward error correction schemes, nor does it provide a means for throttling retransmissions at the transport layer (currently, the data link and transport layer can function counterproductively with respect to reliability. This paper presents an analysis of the interaction of physical, data link, and network layer parameters with respect to throughput, bit error rate, delay, and jitter. The goal of this analysis is to identify opportunities where system designers might exploit cross-layer interactions to improve the performance of Voice over IP (VoIP, instant messaging (IM, and file transfer applications.

  4. CtIP Mutations Cause Seckel and Jawad Syndromes.

    Directory of Open Access Journals (Sweden)

    Per Qvist

    2011-10-01

    Full Text Available Seckel syndrome is a recessively inherited dwarfism disorder characterized by microcephaly and a unique head profile. Genetically, it constitutes a heterogeneous condition, with several loci mapped (SCKL1-5 but only three disease genes identified: the ATR, CENPJ, and CEP152 genes that control cellular responses to DNA damage. We previously mapped a Seckel syndrome locus to chromosome 18p11.31-q11.2 (SCKL2. Here, we report two mutations in the CtIP (RBBP8 gene within this locus that result in expression of C-terminally truncated forms of CtIP. We propose that these mutations are the molecular cause of the disease observed in the previously described SCKL2 family and in an additional unrelated family diagnosed with a similar form of congenital microcephaly termed Jawad syndrome. While an exonic frameshift mutation was found in the Jawad family, the SCKL2 family carries a splicing mutation that yields a dominant-negative form of CtIP. Further characterization of cell lines derived from the SCKL2 family revealed defective DNA damage induced formation of single-stranded DNA, a critical co-factor for ATR activation. Accordingly, SCKL2 cells present a lowered apoptopic threshold and hypersensitivity to DNA damage. Notably, over-expression of a comparable truncated CtIP variant in non-Seckel cells recapitulates SCKL2 cellular phenotypes in a dose-dependent manner. This work thus identifies CtIP as a disease gene for Seckel and Jawad syndromes and defines a new type of genetic disease mechanism in which a dominant negative mutation yields a recessively inherited disorder.

  5. Application and promotion of wireless charging technology

    OpenAIRE

    Yan, Kaijun

    2014-01-01

    The aim of this thesis is to study wireless charging technology and analyze the application and promotion of each technology. This technology is based on Faraday’s electromagnetic in 1830s. It is not a new technology but it is developing high speed nowadays. This thesis introduces four mainstream types of wireless charging technology and three main-stream standards, and analyzes their features and development status. Wireless charging technology has been applied to some products, suc...

  6. Science and Technology Text Mining: Wireless LANS

    Science.gov (United States)

    2005-01-01

    Page 1 SCIENCE AND TECHNOLOGY TEXT MINING : WIRELESS LANS By Dr. Ronald N. Kostoff Office of Naval Research 874 North Randolph...Minnesota) KEYWORDS: Wireless LANs; Database Tomography; text mining ; clustering; computational linguistics; bibliometrics; scientometrics...Technology Text Mining : Wireless LANS 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER

  7. Optical Wireless Communications - An Emerging Technology

    OpenAIRE

    Utkovski, Zoran

    2015-01-01

    Wireless transmission via optical carriers opens doors of opportunity in areas as yet largely unexplored. Offering significant technical and operational advantages, optical wireless communication (OWC) can be, in some applications, a powerful alternative to and, in others, complementary to existing radio frequency (RF) wireless systems. Variations of OWC can be employed in a diverse range of communication applications ranging from very short-range (on the order of millimetres) optical interco...

  8. Contemporary Developments in Wireless Sensor Networks

    OpenAIRE

    Sangeeta Mittal; Alok Aggarwal; S.L. Maskara

    2012-01-01

    Wireless Sensor Networks (WSN) since their inception, a decade ago, have grown well in research and implementation. In this work the developments in WSNs are reported in three sub areas of wireless sensor networks that is, wireless sensor node (hardware and software), Communication & Networking issues in WSNs and application areas. WSNs are characterized by huge data hence research work in aggregation & mining is also discussed. Contemporary issues of integration of WSNs with other prevalent ...

  9. Topological Analysis of Wireless Networks (TAWN)

    Science.gov (United States)

    2016-05-31

    19b. TELEPHONE NUMBER (Include area code) 31-05-2016 FINAL REPORT 12-02-2015 -- 31-05-2016 Topological Analysis of Wireless Networks (TAWN) Robinson...mathematical literature on sheaves that describes how to draw global ( network -wide) inferences from them. Wireless network , local homology, sheaf...topology U U U UU 32 Michael Robinson 202-885-3681 Final Report: May 2016 Topological Analysis of Wireless Networks Principal Investigator: Prof. Michael

  10. Wireless network technologies toward 5G

    National Research Council Canada - National Science Library

    Dai Kimura; Hiroyuki Seki; Tokuro Kubo; Tomohiko Taniguchi

    2015-01-01

    .... The 5G wireless network is expected to become a "Heterogeneous Network" where new wireless access technologies incompatible with 4G and the wireless access technologies for unlicensed band are incorporated with the enhanced technology of 4G (e.g. IMT-advanced). This paper introduces the vision and technology trends of 5G, shows key directions of the research and development of 5G in the future, and introduces some of our studies on 5G.

  11. Design of Wireless Remote Control Solar Cleaner

    Directory of Open Access Journals (Sweden)

    Ma Zhicai

    2015-01-01

    Full Text Available This paper describes the operation principle and the hardware composition of the wireless remote control cleaner by adopting solar panel power supply mode in detail. The experimental circuit is designed and on based on the designed experimental circuit the wireless remote control solar cleaner is made. The experimental results show that it is feasible that the combination of solar panels and wireless remote control cleaner.

  12. Wireless Sensor Needs Defined by SBIR Topics

    Science.gov (United States)

    Studor, George F.

    2010-01-01

    This slide presentation reviews the needs for wireless sensor technology from various U.S. government agencies as exhibited by an analysis of Small Business Innovation Research (SBIR) solicitations. It would appear that a multi-agency group looking at overlapping wireless sensor needs and technology projects is desired. Included in this presentation is a review of the NASA SBIR process, and an examination of some of the SBIR projects from NASA, and other agencies that involve wireless sensor development

  13. A SURVEY ON WIRELESS SENSOR NETWORKS

    OpenAIRE

    R. Sudha*1 & B. Shamile2

    2017-01-01

    A Wireless Sensor Network (WSN) can communicate the information through wireless devices. WSN consists of base stations and wireless sensor nodes. These networks are used to monitor various condition are sound, pressure, temperature and cooperatively pass data through the network to the main location. The functionality parameters of a sensor are energy consumption, computational speed rate, bandwidth, memory. In this paper, it embraces application of WSN, types of WSN, security issues and sec...

  14. Mobility needs and wireless solutions

    DEFF Research Database (Denmark)

    Saugstrup, Dan; Henten, Anders

    The main purpose of this report is to spell out a methodological approach to the analysis of user needs with respect to mobility. Furthermore, this methodological approach is used in an exemplary analysis of the relationship between user needs and technology solutions offered by different wireless...... technologies. The report is based on a research approach, emphasizing important aspects in relation to developing more user oriented mobile services and applications in a heterogeneous network environment. As a staring point, Scandinavian research within the field of social science concerning mobility...... is described and discussed. Furthermore different wireless technologies are briefly described and discussed in relation to possible transmission capacities and coverage areas. In addition to this, a preliminary framework regarding the implications of mobility on the use and development of mobile services...

  15. Biomedical Wireless Ambulatory Crew Monitor

    Science.gov (United States)

    Chmiel, Alan; Humphreys, Brad

    2009-01-01

    A compact, ambulatory biometric data acquisition system has been developed for space and commercial terrestrial use. BioWATCH (Bio medical Wireless and Ambulatory Telemetry for Crew Health) acquires signals from biomedical sensors using acquisition modules attached to a common data and power bus. Several slots allow the user to configure the unit by inserting sensor-specific modules. The data are then sent real-time from the unit over any commercially implemented wireless network including 802.11b/g, WCDMA, 3G. This system has a distributed computing hierarchy and has a common data controller on each sensor module. This allows for the modularity of the device along with the tailored ability to control the cards using a relatively small master processor. The distributed nature of this system affords the modularity, size, and power consumption that betters the current state of the art in medical ambulatory data acquisition. A new company was created to market this technology.

  16. Wireless autonomous device data transmission

    Science.gov (United States)

    Sammel, Jr., David W. (Inventor); Cain, James T. (Inventor); Mickle, Marlin H. (Inventor); Mi, Minhong (Inventor)

    2013-01-01

    A method of communicating information from a wireless autonomous device (WAD) to a base station. The WAD has a data element having a predetermined profile having a total number of sequenced possible data element combinations. The method includes receiving at the WAD an RF profile transmitted by the base station that includes a triggering portion having a number of pulses, wherein the number is at least equal to the total number of possible data element combinations. The method further includes keeping a count of received pulses and wirelessly transmitting a piece of data, preferably one bit, to the base station when the count reaches a value equal to the stored data element's particular number in the sequence. Finally, the method includes receiving the piece of data at the base station and using the receipt thereof to determine which of the possible data element combinations the stored data element is.

  17. Wireless Augmented Reality Communication System

    Science.gov (United States)

    Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)

    2016-01-01

    The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.

  18. Propagation Engineering in Wireless Communications

    CERN Document Server

    Ghasemi, Abdollah; Ghasemi, Farshid

    2012-01-01

    Wireless communications has seen explosive growth in recent decades, in a realm that is both broad and rapidly expanding to include satellite services, navigational aids, remote sensing, telemetering, audio and video broadcasting, high-speed data communications, mobile radio systems and much more. Propagation Engineering in Wireless Communications deals with the basic principles of radiowaves propagation for frequency bands used in radio-communications, offering descriptions of new achievements and newly developed propagation models. The book bridges the gap between theoretical calculations and approaches, and applied procedures needed for advanced radio links design. The primary objective of this two-volume set is to demonstrate the fundamentals, and to introduce propagation phenomena and mechanisms that engineers are likely to encounter in the design and evaluation of radio links of a given type and operating frequency. Volume one covers basic principles, along with tropospheric and ionospheric propagation,...

  19. [Wireless human body communication technology].

    Science.gov (United States)

    Sun, Lei; Zhang, Xiaojuan

    2014-12-01

    The Wireless Body Area Network (WBAN) is a key part of the wearable monitoring technologies, which has many communication technologies to choose from, like Bluetooth, ZigBee, Ultra Wideband, and Wireless Human Body Communication (WHBC). As for the WHBC developed in recent years, it is worthy to be further studied. The WHBC has a strong momentum of growth and a natural advantage in the formation of WBAN. In this paper, we first briefly describe the technical background of WHBC, then introduce theoretical model of human-channel communication and digital transmission machine based on human channel. And finally we analyze various of the interference of the WHBC and show the AFH (Adaptive Frequency Hopping) technology which can effectively deal with the interference.

  20. Passive Wireless Temperature Sensors with Enhanced Sensitivity and Range Project

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal describes the development of a wireless multisensor system for NASA application to remote wireless sensing of temperature distributions in composite...

  1. Passive Wireless SAW Humidity Sensors Project

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal describes the preliminary development of passive wireless surface acoustic wave (SAW) based humidity sensors for NASA application to distributed...

  2. Wireless SAW Interrogator and Sensor System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless, passive, Surface Acoustic Wave (SAW), Orthogonal Frequency Coded (OFC) temperature sensors, operating in a multi-sensor environment, developed at the...

  3. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...... wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless...

  4. High Speed Wireless Signal Generation and Demodulation

    DEFF Research Database (Denmark)

    Caballero Jambrina, Antonio; Sambaraju, Rakesh; Zibar, Darko

    We present the experimental demonstration of high speed wireless generation, up to 40 Gb/s, in the 75-110 GHz wireless band. All-optical OFDM and photonic up-conversion are used for generation and single side-band modulation with digital coherent detection for demodulation.......We present the experimental demonstration of high speed wireless generation, up to 40 Gb/s, in the 75-110 GHz wireless band. All-optical OFDM and photonic up-conversion are used for generation and single side-band modulation with digital coherent detection for demodulation....

  5. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  6. Wireless communication devices and movement monitoring methods

    Science.gov (United States)

    Skorpik, James R.

    2006-10-31

    Wireless communication devices and movement monitoring methods are described. In one aspect, a wireless communication device includes a housing, wireless communication circuitry coupled with the housing and configured to communicate wireless signals, movement circuitry coupled with the housing and configured to provide movement data regarding movement sensed by the movement circuitry, and event processing circuitry coupled with the housing and the movement circuitry, wherein the event processing circuitry is configured to process the movement data, and wherein at least a portion of the event processing circuitry is configured to operate in a first operational state having a different power consumption rate compared with a second operational state.

  7. Wireless microsystems for biomedical applications

    OpenAIRE

    Carmo, João Paulo; Correia, José Higino

    2013-01-01

    This paper presents a review with the state-of-the-art of wireless microsystems for biomedical applications. Aspects including the radio-frequency systems, data acquisition, application specificities (especially those in the context of implantable devices), power consumption and issues associated to their integration are presented. A review of COTS (Commercial Off-The-Shelf) systems and new concepts and technologies are also presented.

  8. Inkjet printed wireless smart bandage

    KAUST Repository

    Farooqui, Muhammad Fahad

    2016-12-19

    Chronic wounds affect millions of patients around the world and requires a major portion of health care budget for treatment. In this article, we present an unprecedented low cost continuous wireless monitoring system, realized through inkjet printing on a standard bandage strip, which can send early warnings as well as record long term wound progression data. The smart bandage can communicate upto a distance of 60 m when worn on the body.

  9. Unjuk Kerja IP PBX Asterisk dan FreeSWITCH pada Topologi Bertingkat di Jaringan Kampus

    Directory of Open Access Journals (Sweden)

    Iwan Setiawan

    2017-08-01

    Full Text Available Internet Protocol-based Private Branch Exchange (IP PBX diperlukan untuk menghubungkan panggilan antar perangkat komunikasi Voice over Internet Protocol (VoIP di sebuah jaringan lokal (LAN. Dengan adanya IP PBX, layanan VoIP dapat disediakan di atas jaringan data/IP yang sudah tergelar. Penelitian ini kami lakukan untuk mengetahui unjuk kerja VoIP pada dua IP PBX yang menggunakan perangkat lunak server Asterisk dan FreeSWITCH. Kami merancang sebuah arsitektur jaringan eksperimen yang diadaptasi dari topologi bertingkat pada jaringan kampus (CAN di lokasi penelitian dengan hierarki perangkat yang terdiri dari core switch, distribution switch, dan access switch. Kedua IP PBX ditempatkan pada hierarki yang berbeda pada topologi jaringan tersebut agar dapat diketahui pengaruhnya terhadap unjuk kerja VoIP. Konsep eksperimen ini diharapkan dapat menjadi salah satu dasar untuk mendesain arsitektur IP PBX secara terpusat dan tersebar pada jaringan kampus. Unjuk kerja VoIP kami ukur dengan parameter-parameter Quality of Service (QoS dan Quality of Experience (QoE. Selain itu, kami juga mengukur konsumsi prosesor dan memori yang dipakai oleh perangkat lunak server VoIP pada saat komunikasi terjadi. Pengukuran dilakukan dengan skenario phone-to-phone pada jaringan eksperimen yang terhubung ke jaringan kampus aktif. Hasil penelitian menunjukkan bahwa penempatan IP PBX di hierarki yang berbeda pada topologi jaringan berpengaruh terhadap unjuk kerja VoIP khususnya pada IP PBX Asterisk. Ketika dibandingkan, unjuk kerja IP PBX FreeSWITCH dalam hal QoS dan QoE sedikit lebih baik daripada Asterisk pada rerata latensi/delay, jitter, Mean Opinion Score (MOS, dan konsumsi memori yaitu 41,012 ms, 0,060 ms, 5, dan 1 % untuk IP PBX 1 serta 41,016 ms, 0,066 ms, 5, dan 0,5 % untuk IP PBX 2

  10. Smartphone Household Wireless Electroencephalogram Hat

    Directory of Open Access Journals (Sweden)

    Harold Szu

    2013-01-01

    Full Text Available Rudimentary brain machine interface has existed for the gaming industry. Here, we propose a wireless, real-time, and smartphone-based electroencephalogram (EEG system for homecare applications. The system uses high-density dry electrodes and compressive sensing strategies to overcome conflicting requirements between spatial electrode density, temporal resolution, and spatiotemporal throughput rate. Spatial sparseness is addressed by close proximity between active electrodes and desired source locations and using an adaptive selection of N active among 10N passive electrodes to form m-organized random linear combinations of readouts, m≪N≪10N. Temporal sparseness is addressed via parallel frame differences in hardware. During the design phase, we took tethered laboratory EEG dataset and applied fuzzy logic to compute (a spatiotemporal average of larger magnitude EEG data centers in 0.3 second intervals and (b inside brainwave sources by Independent Component Analysis blind deconvolution without knowing the impulse response function. Our main contributions are the fidelity of quality wireless EEG data compared to original tethered data and the speed of compressive image recovery. We have compared our recovery of ill-posed inverse data against results using Block Sparse Code. Future work includes development of strategies to filter unwanted artifact from high-density EEGs (i.e., facial muscle-related events and wireless environmental electromagnetic interferences.

  11. A randomised controlled trial of time-limited individual placement and support: IPS-LITE trial.

    Science.gov (United States)

    Burns, Tom; Yeeles, Ksenija; Langford, Oliver; Montes, Maria Vazquez; Burgess, Jennifer; Anderson, Catriona

    2015-10-01

    Individual placement and support (IPS) has been repeatedly demonstrated to be the most effective form of mental health vocational rehabilitation. Its no-discharge policy plus fixed caseloads, however, makes it expensive to provide. To test whether introducing a time limit for IPS would significantly alter its clinical effectiveness and consequently its potential cost-effectiveness. Referrals to an IPS service were randomly allocated to either standard IPS or to time-limited IPS (IPS-LITE). IPS-LITE participants were referred back to their mental health teams if still unemployed at 9 months or after 4 months employment support. The primary outcome at 18 months was working for 1 day. Secondary outcomes comprised other vocational measures plus clinical and social functioning. The differential rates of discharge were used to calculate a notional increased capacity and to model potential rates and costs of employment. A total of 123 patients were randomised and data were collected on 120 patients at 18 months. The two groups (IPS-LITE = 62 and IPS = 61) were well matched at baseline. Rates of employment were equal at 18 months (IPS-LITE = 24 (41%) and IPS = 27 (46%)) at which time 57 (97%) had been discharged from the IPS-LITE service and 16 (28%) from IPS. Only 11 patients (4 IPS-LITE and 7 IPS) obtained their first employment after 9 months. There were no significant differences in any other outcomes. IPS-LITE discharges generated a potential capacity increase of 46.5% compared to 12.7% in IPS which would translate into 35.8 returns to work in IPS-LITE compared to 30.6 in IPS over an 18-month period if the rates remained constant. IPS-LITE is equally effective to IPS and only minimal extra employment is gained by persisting beyond 9 months. If released capacity is utilised with similar outcomes, IPS-LITE results in an increase by 17% in numbers gaining employment within 18 months compared to IPS and will increase with prolonged follow-up. IPS-LITE may be more cost

  12. [Retinal Cell Therapy Using iPS Cells].

    Science.gov (United States)

    Takahashi, Masayo

    2016-03-01

    Progress in basic research, starting with the work on neural stem cells in the middle 1990's to embryonic stem (ES) cells and induced pluripotent stem (iPS) cells at present, will lead the cell therapy (regenerative medicine) of various organs, including the central nervous system to a big medical field in the future. The author's group transplanted iPS cell-derived retinal pigment epithelial (RPE) cell sheets to the eye of a patient with exudative age-related macular degeneration (AMD) in 2014 as a clinical research. Replacement of the RPE with the patient's own iPS cell-derived young healthy cell sheet will be one new radical treatment of AMD that is caused by cellular senescence of RPE cells. Since it was the first clinical study using iPS cell-derived cells, the primary endpoint was safety judged by the outcome one year after surgery. The safety of the cell sheet has been confirmed by repeated tumorigenisity tests using immunodeficient mice, as well as purity of the cells, karyotype and genetic analysis. It is, however, also necessary to prove the safety by clinical studies. Following this start, a good strategy considering cost and benefit is needed to make regenerative medicine a standard treatment in the future. Scientifically, the best choice is the autologous RPE cell sheet, but autologous cell are expensive and sheet transplantation involves a risky part of surgical procedure. We should consider human leukocyte antigen (HLA) matched allogeneic transplantation using the HLA 6 loci homozyous iPS cell stock that Prof. Yamanaka of Kyoto University is working on. As the required forms of donor cells will be different depending on types and stages of the target diseases, regenerative medicine will be accomplished in a totally different manner from the present small molecule drugs. Proof of concept (POC) of photoreceptor transplantation in mouse is close to being accomplished using iPS cell-derived photoreceptor cells. The shortest possible course for treatment

  13. Briefer assessment of social network drinking: A test of the Important People Instrument-5 (IP-5).

    Science.gov (United States)

    Hallgren, Kevin A; Barnett, Nancy P

    2016-12-01

    The Important People instrument (IP; Longabaugh et al., 2010) is one of the most commonly used measures of social network drinking. Although its reliability and validity are well-supported, the length of the instrument may limit its use in many settings. The present study evaluated whether a briefer, 5-person version of the IP (IP-5) adequately reproduces scores from the full IP. College freshmen (N = 1,053) reported their own past-month drinking, alcohol-related consequences, and information about drinking in their close social networks at baseline and 1 year later. From this we derived network members' drinking frequency, percentage of drinkers, and percentage of heavy drinkers, assessed for up to 10 (full IP) or 5 (IP-5) network members. We first modeled the expected concordance between full-IP scores and scores from simulated shorter IP instruments by sampling smaller subsets of network members from full IP data. Then, using quasi-experimental methods, we administered the full IP and IP-5 and compared the 2 instruments' score distributions and concurrent and year-lagged associations with participants' alcohol consumption and consequences. Most of the full-IP variance was reproduced from simulated shorter versions of the IP (ICCs ≥ 0.80). The full IP and IP-5 yielded similar score distributions, concurrent associations with drinking (r = 0.22 to 0.52), and year-lagged associations with drinking. The IP-5 retains most of the information about social network drinking from the full IP. The shorter instrument may be useful in clinical and research settings that require frequent measure administration, yielding greater temporal resolution for monitoring social network drinking. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  14. Validation of the Revised Individual Placement and Support Fidelity Scale (IPS-25).

    Science.gov (United States)

    Bond, Gary R; Peterson, Alison E; Becker, Deborah R; Drake, Robert E

    2012-08-01

    The individual placement and support (IPS) model of supported employment for people with severe mental illness is an evidence-based practice. The 15-item IPS Fidelity Scale (IPS-15) was developed to measure program fidelity and has been shown to have good psychometric properties, including predictive validity. On the basis of field experience and research updates, the authors developed an expanded and revised version of this scale, the IPS-25, also known as the Supported Employment Fidelity Scale. This study evaluated the psychometric properties of the IPS-25. In addition to data on the local unemployment rate and program longevity, the authors collected IPS-25 ratings and employment data for 79 sites in eight states participating in a learning collaborative devoted to implementing the IPS model. Descriptive data for items and the total scale and predictive validity were examined. Internal consistency reliability for the IPS-25 was .88. Predictive validity, measured as the correlation between the IPS-25 and site-level employment rate, was .34. Eight of the IPS-25 items were significantly positively correlated with employment rate. Items related to the vocational generalist role, disclosure, follow-along support, and vocational unit were the most strongly correlated with employment. Program longevity was positively associated with employment, whereas the unemployment rate was not. The IPS-25 has promising psychometric properties, with greater precision and content coverage than the IPS-15. However, it has not demonstrated an advantage over the IPS-15 in predictive validity. Research directly comparing the two scales is needed.

  15. Evaluation of the International Prognostic Score (IPS-7) and a Simpler Prognostic Score (IPS-3) for advanced Hodgkin lymphoma in the modern era.

    Science.gov (United States)

    Diefenbach, Catherine S; Li, Hailun; Hong, Fangxin; Gordon, Leo I; Fisher, Richard I; Bartlett, Nancy L; Crump, Michael; Gascoyne, Randy D; Wagner, Henry; Stiff, Patrick J; Cheson, Bruce D; Stewart, Douglas A; Kahl, Brad S; Friedberg, Jonathan W; Blum, Kristie A; Habermann, Thomas M; Tuscano, Joseph M; Hoppe, Richard T; Horning, Sandra J; Advani, Ranjana H

    2015-11-01

    The International Prognostic Score (IPS-7) is the most commonly used risk stratification tool for advanced Hodgkin lymphoma (HL), however recent studies suggest the IPS-7 is less discriminating due to improved outcomes with contemporary therapy. We evaluated the seven variables for IPS-7 recorded at study entry for 854 patients enrolled on Eastern Cooperative Oncology Group 2496 trial. Univariate and multivariate Cox models were used to assess their prognostic ability for freedom from progression (FFP) and overall survival (OS). The IPS-7 remained prognostic however its prognostic range has narrowed. On multivariate analysis, two factors (age, stage) remained significant for FFP and three factors (age, stage, haemoglobin level) for OS. An alternative prognostic index, the IPS-3, was constructed using age, stage and haemoglobin level, which provided four distinct risk groups [FFP (P = 0·0001) and OS (P IPS-3 outperformed the IPS-7 on risk prediction for both FFP and OS by model fit and discrimination criteria. Using reclassification calibration, 18% of IPS-7 low risk patients were re-classified as intermediate risk and 13% of IPS-7 intermediate risk patients as low risk. For patients with advanced HL, the IPS-3 may provide a simpler and more accurate framework for risk assessment in the modern era. Validation of these findings in other large data sets is planned. © 2015 John Wiley & Sons Ltd.

  16. Crecimiento estructurado y sostenible de NovaIP SAS

    OpenAIRE

    Urrutia Muñoz, Nidia Johana

    2016-01-01

    El presente documento tiene como objetivo, el diseño del plan estratégico para el crecimiento estructurado y sostenible de la compañía Colombia de telecomunicaciones NovaIP SAS. NovaIP SAS es una compañía colombiana multilatina, del sector de las tecnologías de la información y las comunicaciones, fundada en Cali en el año 2013. Nace con el propósito de ofrecer soluciones informáticas y de telecomunicaciones innovadoras y a la medida para los sectores público y privado, en pequeñas y media...

  17. Congested Link Inference Algorithms in Dynamic Routing IP Network

    Directory of Open Access Journals (Sweden)

    Yu Chen

    2017-01-01

    Full Text Available The performance descending of current congested link inference algorithms is obviously in dynamic routing IP network, such as the most classical algorithm CLINK. To overcome this problem, based on the assumptions of Markov property and time homogeneity, we build a kind of Variable Structure Discrete Dynamic Bayesian (VSDDB network simplified model of dynamic routing IP network. Under the simplified VSDDB model, based on the Bayesian Maximum A Posteriori (BMAP and Rest Bayesian Network Model (RBNM, we proposed an Improved CLINK (ICLINK algorithm. Considering the concurrent phenomenon of multiple link congestion usually happens, we also proposed algorithm CLILRS (Congested Link Inference algorithm based on Lagrangian Relaxation Subgradient to infer the set of congested links. We validated our results by the experiments of analogy, simulation, and actual Internet.

  18. Implementation of Cloud Computing into VoIP

    Directory of Open Access Journals (Sweden)

    Floriana GEREA

    2012-08-01

    Full Text Available This article defines Cloud Computing and highlights key concepts, the benefits of using virtualization, its weaknesses and ways of combining it with classical VoIP technologies applied to large scale businesses. The analysis takes into consideration management strategies and resources for better customer orientation and risk management all for sustaining the Service Level Agreement (SLA. An important issue in cloud computing can be security and for this reason there are several security solution presented.

  19. Science spin: iPS cell research in the news.

    Science.gov (United States)

    Caulfield, T; Rachul, C

    2011-05-01

    Big scientific developments have always been spun to meet particular social agendas. We have seen it in the context of global warming, nuclear power, and genetically modified organisms. But few stories illustrate the phenomenon of spin as well as the reaction, and concomitant media coverage, that surrounded the November 2007 announcement regarding the reprogramming of skin cells to produce cells with qualities comparable to those of human embryonic stem cells (hESCs) known as induced pluripotent stem (iPS) cells.

  20. Demand Engineering: IP Network Optimisation Through Intelligent Demand Placement

    OpenAIRE

    Evans, John; Afrakteh, Arash; Xiu, Ruoyang

    2016-01-01

    Traffic engineering has been used in IP and MPLS networks for a number of years as a tool for making more efficient use of capacity by explicitly routing traffic demands where there is available network capacity that would otherwise be unused. Deployment of traffic engineering imposes an additional layer of complexity to network design and operations, however, which has constrained its adoption for capacity optimisation. The rise of Software Defined Networks has renewed interest in the use of...