WorldWideScience

Sample records for wireless laptop computers

  1. Reducing Exposure to Radiofrequency Electromagnetic Fields from Wireless Networking with Laptop Computers

    OpenAIRE

    Koppel, T; Ahonen, M; Vilcāne, I

    2014-01-01

    Mobile modems are used with laptops to connect Internet wirelessly. Recently several organisations, including the WHO IARC and the European Union have emphasised health risk-management practices related to wireless devices. We present here radio frequency (RF) power density measurements when a wireless modem is 30 cm, 1 m and 5 m from a user. Our results indicate that by using a USB cable and adding distance between a user and a wireless modem, there is a substantial reduction of exposure. Ad...

  2. Exploring the Benefits and Challenges of Using Laptop Computers in Higher Education Classrooms: A Formative Analysis

    OpenAIRE

    Robin H. Kay; Sharon Lauricella

    2011-01-01

    Because of decreased prices, increased convenience, and wireless access, an increasing number of college and university students are using laptop computers in their classrooms. This recent trend has forced instructors to address the educational consequences of using these mobile devices. The purpose of the current study was to analyze and assess beneficial and challenging laptop behaviours in higher education classrooms. Both quantitative and qualitative data were collected from 177 undergrad...

  3. Wireless Laptops in English Classrooms: A SWOT Analysis from Singapore

    Science.gov (United States)

    Towndrow, Phillip A.; Vaish, Viniti

    2009-01-01

    This paper presents illustrative findings from a one-year pilot study undertaken in the English department of a high school in Singapore that was in the first year of implementing a one-to-one wireless laptop programme. The findings show that learning was often constrained by lecture-style presentations and overt test preparation. Despite…

  4. Exploring the Benefits and Challenges of Using Laptop Computers in Higher Education Classrooms: A Formative Analysis

    Science.gov (United States)

    Kay, Robin H.; Lauricella, Sharon

    2011-01-01

    Because of decreased prices, increased convenience, and wireless access, an increasing number of college and university students are using laptop computers in their classrooms. This recent trend has forced instructors to address the educational consequences of using these mobile devices. The purpose of the current study was to analyze and assess…

  5. Side-effects to the use of laptop computers

    DEFF Research Database (Denmark)

    Søholm Secher, Lisa Linnea; Vind-Kezunovic, Dina; Zachariae, Claus Otto Carl

    2010-01-01

    The use of laptop computers is increasing, and many children and young adults spend hours with their laptops on their laps daily. We report a case with erythema ab igne on the thigh of a 17-year-old girl, induced by use of laptop computers four to five hours daily for nine months....

  6. Exploring the Benefits and Challenges of Using Laptop Computers in Higher Education Classrooms: A Formative Analysis

    Directory of Open Access Journals (Sweden)

    Robin H. Kay

    2011-04-01

    Full Text Available Because of decreased prices, increased convenience, and wireless access, an increasing number of college and university students are using laptop computers in their classrooms. This recent trend has forced instructors to address the educational consequences of using these mobile devices. The purpose of the current study was to analyze and assess beneficial and challenging laptop behaviours in higher education classrooms. Both quantitative and qualitative data were collected from 177 undergraduate university students (89 males, 88 females. Key benefits observed include note-taking activities, in-class laptop-based academic tasks, collaboration, increased focus, improved organization and efficiency, and addressing special needs. Key challenges noted include other student’s distracting laptop behaviours, instant messaging, surfing the web, playing games, watching movies, and decreased focus. Nearly three-quarters of the students claimed that laptops were useful in supporting their academic experience. Twice as many benefits were reported compared to challenges. It is speculated that the integration of meaningful laptop activities is a critical determinant of benefits and challenges experienced in higher education classrooms.

  7. Transforming an Introductory Programming Course: From Lectures to Active Learning via Wireless Laptops

    Science.gov (United States)

    Barak, Miri; Harward, Judson; Kocur, George; Lerman, Steven

    2007-08-01

    Within the framework of MIT's course 1.00: Introduction to Computers and Engineering Problem Solving, this paper describes an innovative project entitled: Studio 1.00 that integrates lectures with in-class demonstrations, active learning sessions, and on-task feedback, through the use of wireless laptop computers. This paper also describes a related evaluation study that investigated the effectiveness of different instructional strategies, comparing traditional teaching with two models of the studio format. Students' learning outcomes, specifically, their final grades and conceptual understanding of computational methods and programming, were examined. Findings indicated that Studio-1.00, in both its extensive- and partial-active learning modes, enhanced students' learning outcomes in Java programming. Comparing to the traditional courses, more students in the studio courses received "A" as their final grade and less failed. Moreover, students who regularly attended the active learning sessions were able to conceptualize programming principles better than their peers. We have also found two weaknesses in the teaching format of Studio-1.00 that can guide future versions of the course.

  8. The Fundamental Reasons Why Laptop Computers should not be Used on Your Lap

    Directory of Open Access Journals (Sweden)

    Mortazavi S. A. R.

    2016-12-01

    Full Text Available As a tendency to use new technologies, gadgets such as laptop computers are becoming more popular among students, teachers, businessmen and office workers. Today laptops are a great tool for education and learning, work and personal multimedia. Millions of men, especially those in the reproductive age, are frequently using their laptop computers on the lap (thigh. Over the past several years, our lab has focused on the health effects of exposure to different sources of electromagnetic fields such as cellular phones, mobile base stations, mobile phone jammers, laptop computers, radars, dentistry cavitrons and Magnetic Resonance Imaging (MRI. Our own studies as well as the studies performed by other researchers indicate that using laptop computers on the lap adversely affects the male reproductive health. When it is placed on the lap, not only the heat from a laptop computer can warm men’s scrotums, the electromagnetic fields generated by laptop’s internal electronic circuits as well as the Wi-Fi Radiofrequency radiation hazards (in a Wi-Fi connected laptop may decrease sperm quality. Furthermore, due to poor working posture, laptops should not be used on the lap for long hours.

  9. Wireless Technology in K-12 Education

    Science.gov (United States)

    Walery, Darrell

    2004-01-01

    Many schools begin implementing wireless technology slowly by creating wireless "hotspots" on the fly. This is accomplished by putting a wireless access point on a cart along with a set of wireless laptop computers. A teacher can then wheel the cart anywhere in the school that has a network drop, plug the access point in and have an…

  10. Using Laptop Computers in Class: A Student Motivation Perspective

    Science.gov (United States)

    Houle, Philip A.; Reed, Diana; Vaughan, Amy Grace; Clayton, Suzanne R.

    2013-01-01

    This study examined the reasons why students choose to take laptop computers into college classes. The model involved the individual student choice involving opportunity, ability and motivation. The resulting model demonstrated how some (primary) factors, such as effective learning, directly impact the laptop usage choice, and other factors…

  11. Evaluation of a Secure Laptop-Based Testing Program in an Undergraduate Nursing Program: Students' Perspective.

    Science.gov (United States)

    Tao, Jinyuan; Gunter, Glenda; Tsai, Ming-Hsiu; Lim, Dan

    2016-01-01

    Recently, the many robust learning management systems, and the availability of affordable laptops, have made secure laptop-based testing a reality on many campuses. The undergraduate nursing program at the authors' university began to implement a secure laptop-based testing program in 2009, which allowed students to use their newly purchased laptops to take quizzes and tests securely in classrooms. After nearly 5 years' secure laptop-based testing program implementation, a formative evaluation, using a mixed method that has both descriptive and correlational data elements, was conducted to seek constructive feedback from students to improve the program. Evaluation data show that, overall, students (n = 166) believed the secure laptop-based testing program helps them get hands-on experience of taking examinations on the computer and gets them prepared for their computerized NCLEX-RN. Students, however, had a lot of concerns about laptop glitches and campus wireless network glitches they experienced during testing. At the same time, NCLEX-RN first-time passing rate data were analyzed using the χ2 test, and revealed no significant association between the two testing methods (paper-and-pencil testing and the secure laptop-based testing) and students' first-time NCLEX-RN passing rate. Based on the odds ratio, however, the odds of students passing NCLEX-RN the first time was 1.37 times higher if they were taught with the secure laptop-based testing method than if taught with the traditional paper-and-pencil testing method in nursing school. It was recommended to the institution that better quality of laptops needs to be provided to future students, measures needed to be taken to further stabilize the campus wireless Internet network, and there was a need to reevaluate the Laptop Initiative Program.

  12. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  13. Wireless Infrared Networking in the Duke Paperless Classroom.

    Science.gov (United States)

    Stetten, George D.; Guthrie, Scott D.

    1995-01-01

    Discusses wireless (diffuse infrared) networking technology to link laptop computers in a computer programming and numerical methods course at Duke University (North Carolina). Describes products and technologies, and effects on classroom dynamics. Reports on effective instructional strategies for lecture, solving student problems, building shared…

  14. Analysis of the Extremely Low Frequency Magnetic Field Emission from Laptop Computers

    Directory of Open Access Journals (Sweden)

    Brodić Darko

    2016-03-01

    Full Text Available This study addresses the problem of magnetic field emission produced by the laptop computers. Although, the magnetic field is spread over the entire frequency spectrum, the most dangerous part of it to the laptop users is the frequency range from 50 to 500 Hz, commonly called the extremely low frequency magnetic field. In this frequency region the magnetic field is characterized by high peak values. To examine the influence of laptop’s magnetic field emission in the office, a specific experiment is proposed. It includes the measurement of the magnetic field at six laptop’s positions, which are in close contact to its user. The results obtained from ten different laptop computers show the extremely high emission at some positions, which are dependent on the power dissipation or bad ergonomics. Eventually, the experiment extracts these dangerous positions of magnetic field emission and suggests possible solutions.

  15. Learning from the Learners: Preparing Future Teachers to Leverage the Benefits of Laptop Computers

    Science.gov (United States)

    Grundmeyer, Trent; Peters, Randal

    2016-01-01

    Technology is changing the teaching and learning landscape. Teacher preparation programs must produce teachers who have new skills and strategies to leverage the benefits of laptop computers in their classrooms. This study used a phenomenological strategy to explain first-year college students' perceptions of the effects of a 1:1 laptop experience…

  16. Computers, Laptops and Tools. ACER Research Monograph No. 56.

    Science.gov (United States)

    Ainley, Mary; Bourke, Valerie; Chatfield, Robert; Hillman, Kylie; Watkins, Ian

    In 1997, Balwyn High School (Australia) instituted a class of 28 Year 7 students to use laptop computers across the curriculum. This report details findings from an action research project that monitored important aspects of what happened when this program was introduced. A range of measures was developed to assess the influence of the use of…

  17. Secure Your Wireless Network: Going Wireless Comes with Its Own Special Set of Security Concerns

    Science.gov (United States)

    Bloomquist, Jane; Musa, Atif

    2004-01-01

    Imagine a completely wireless school, an open network in which all students and staff can roam around using laptops or handheld computers to browse the Internet, access files and applications on the school server, and communicate with each other and the world via e-mail. It's a great picture--and at some schools the future is already here. But…

  18. A Case of Laptop Computer-Induced Erythema Ab Igne

    Directory of Open Access Journals (Sweden)

    Nurettin Özgür Doğan

    2014-12-01

    Full Text Available Erythema ab igne, also known as toasted skin syndrome, is a skin reaction characterized by reticulate erythema, brown pigmentation, and telangiectasia. In some cases, epidermal atrophy and scaling are also identified. The condition is usually caused by prolonged exposure to a source of heat or infrared radiation. Here, we report a case of erythema ab igne associated with laptop computer use.

  19. Effects of Dual Monitor Computer Work Versus Laptop Work on Cervical Muscular and Proprioceptive Characteristics of Males and Females.

    Science.gov (United States)

    Farias Zuniga, Amanda M; Côté, Julie N

    2017-06-01

    The effects of performing a 90-minute computer task with a laptop versus a dual monitor desktop workstation were investigated in healthy young male and female adults. Work-related musculoskeletal disorders are common among computer (especially female) users. Laptops have surpassed desktop computer sales, and working with multiple monitors has also become popular. However, few studies have provided objective evidence on how they affect the musculoskeletal system in both genders. Twenty-seven healthy participants (mean age = 24.6 years; 13 males) completed a 90-minute computer task while using a laptop or dual monitor (DualMon) desktop. Electromyography (EMG) from eight upper body muscles and visual strain were measured throughout the task. Neck proprioception was tested before and after the computer task using a head-repositioning test. EMG amplitude (root mean square [RMS]), variability (coefficients of variation [CV]), and normalized mutual information (NMI) were computed. Visual strain ( p computer workstation designs.

  20. Writing Essays on a Laptop or a Desktop Computer: Does It Matter?

    Science.gov (United States)

    Ling, Guangming; Bridgeman, Brent

    2013-01-01

    To explore the potential effect of computer type on the Test of English as a Foreign Language-Internet-Based Test (TOEFL iBT) Writing Test, a sample of 444 international students was used. The students were randomly assigned to either a laptop or a desktop computer to write two TOEFL iBT practice essays in a simulated testing environment, followed…

  1. THE USE OF LAPTOP COMPUTERS, TABLETS AND GOOGLE EARTH/GOOGLE MAPS APPLICATIONS DURING GEOGRAPHY CLUB SEMINARS

    Directory of Open Access Journals (Sweden)

    FLORIN GALBIN

    2015-01-01

    Full Text Available In the current study, we aim to investigate the use of Google Earth and Google Maps Applications on tablet and laptop computers. The research was carried out during the Geography Club seminars organized at “Radu Petrescu” High School in the 2013-2014 school year. The research involved 13 students in various gymnasium and high school grades. The activities included: navigation with Google Earth/Maps, image capturing techniques, virtual tours, measuring distances or river lengths, identifying relief forms, and locating geographical components of the environment. In order to retrieve students’ opinions regarding the use of tablets and laptop computers with these two applications, they were asked to respond to a questionnaire after the activities took place. Conclusions revealed that students enjoyed using these applications with laptops and tablets and that the learning process during Geography classes became more interesting.

  2. Wireless Technology in the Library: The RIT Experience: Overview of the Project.

    Science.gov (United States)

    Pitkin, Pat

    2001-01-01

    Provides an overview of a project at RIT (Rochester Institute of Technology) that experimented with wireless technology, including laptop computers that circulate within the library building. Discusses project requirements, including ease of use, low maintenance, and low cost; motivation, including mobility; implementation; and benefits to the…

  3. Wireless embedded control system for atomically precise manufacturing

    KAUST Repository

    Khan, Yasser; Randall, John N.

    2011-01-01

    This paper will explore the possibilities of implementing a wireless embedded control system for atomically precise manufacturing. The manufacturing process, similar to Scanning Tunneling Microscopy, takes place within an Ultra High Vacuum (UHV) chamber at a pressure of 10-10 torr. In order to create vibration isolation, and to keep internal noise to a minimum, a wireless link inside the UHV chamber becomes essential. We present a MATLAB simulation of the problem, and then demonstrate a hardware scheme between a Gumstix computer and a Linux based laptop for controlling nano-manipulators with three degrees of freedom. © 2011 IEEE.

  4. Wireless embedded control system for atomically precise manufacturing

    KAUST Repository

    Khan, Yasser

    2011-04-01

    This paper will explore the possibilities of implementing a wireless embedded control system for atomically precise manufacturing. The manufacturing process, similar to Scanning Tunneling Microscopy, takes place within an Ultra High Vacuum (UHV) chamber at a pressure of 10-10 torr. In order to create vibration isolation, and to keep internal noise to a minimum, a wireless link inside the UHV chamber becomes essential. We present a MATLAB simulation of the problem, and then demonstrate a hardware scheme between a Gumstix computer and a Linux based laptop for controlling nano-manipulators with three degrees of freedom. © 2011 IEEE.

  5. Posture, Musculoskeletal Activities, and Possible Musculoskeletal Discomfort Among Children Using Laptops or Tablet Computers for Educational Purposes: A Literature Review

    Science.gov (United States)

    Binboğa, Elif; Korhan, Orhan

    2014-10-01

    Educational ergonomics focuses on the interaction between educational performance and educational design. By improving the design or pointing out the possible problems, educational ergonomics can be utilized to have positive impacts on the student performance and thus on education process. Laptops and tablet computers are becoming widely used by school children and beginning to be used effectively for educational purposes. As the latest generation of laptops and tablet computers are mobile and lightweight compared to conventional personal computers, they support student-centred interaction-based learning. However, these technologies have been introduced into schools with minimal adaptations to furniture or attention to ergonomics. There are increasing reports of an association between increased musculoskeletal (MSK) problems in children and use of such technologies. Although children are among the users of laptops and tablet computers both in their everyday lives and at schools, the literature investigating MSK activities and possible MSK discomfort regarding children using portable technologies is limited. This study reviews the literature to identify published studies that investigated posture, MSK activities, and possible MSK discomfort among children using mobile technologies (laptops or tablet computers) for educational purposes. An electronic search of the literature published in English between January 1994 and January 2014 was performed in several databases. The literature search terms were identified and combined to search the databases. The search results that the resources investigating MSK outcomes of laptop or tablet use of children are very scarce. This review points out the research gaps in this field, and identifying areas for future studies.

  6. The appearance of angiolipomatosis after using laptop computer on the thighs: a relationship?

    Directory of Open Access Journals (Sweden)

    Marie Caucanas

    2011-09-01

    Full Text Available A 56-year-old patient developed angiolipomatosis of the anterior part of the thighs after repeated laptop contact localisation. Histological findings exhibit an unusual inflammatory infiltrate. We postulate that the computer could favour lipoma development by a physiopathological mechanism that remains to be clarified.

  7. Wireless data collection of self-administered surveys using tablet computers.

    Science.gov (United States)

    Singleton, Kyle W; Lan, Mars; Arnold, Corey; Vahidi, Mani; Arangua, Lisa; Gelberg, Lillian; Bui, Alex A T

    2011-01-01

    The accurate and expeditious collection of survey data by coordinators in the field is critical in the support of research studies. Early methods that used paper documentation have slowly evolved into electronic capture systems. Indeed, tools such as REDCap and others illustrate this transition. However, many current systems are tailored web-browsers running on desktop/laptop computers, requiring keyboard and mouse input. We present a system that utilizes a touch screen interface running on a tablet PC with consideration for portability, limited screen space, wireless connectivity, and potentially inexperienced and low literacy users. The system was developed using C#, ASP.net, and SQL Server by multiple programmers over the course of a year. The system was developed in coordination with UCLA Family Medicine and is currently deployed for the collection of data in a group of Los Angeles area clinics of community health centers for a study on drug addiction and intervention.

  8. Wireless Phone Threat Assessment for Aircraft Communication and Navigation Radios

    Science.gov (United States)

    Nguyens, T. X.; Koppen, S. V.; Smith, L. J.; Williams, R. A.; Salud, M. T.

    2005-01-01

    Emissions in aircraft communication and navigation bands are measured for the latest generation of wireless phones. The two wireless technologies considered, GSM/GPRS and CDMA2000, are the latest available to general consumers in the U.S. A base-station simulator is used to control the phones. The measurements are conducted using reverberation chambers, and the results are compared against FCC and aircraft installed equipment emission limits. The results are also compared against baseline emissions from laptop computers and personal digital assistant devices that are currently allowed to operate on aircraft.

  9. Laptop energy-saving opportunities based on user behaviors

    Energy Technology Data Exchange (ETDEWEB)

    Jones, M.E. Jr; Hung, D.L. [College of Engineering, San Jose State University, One Washington Square, San Jose, CA 95192 (United States); Wei, B.W.Y. [Academic Affairs Division, Chico State University, Kendall Hall 106, Chico, CA 95929 (United States)

    2013-05-15

    In order to improve the energy efficiency of laptop use and design, it is important to gain knowledge of how laptops are being used in real-world settings. However, the current workload studies have focused on computer-usage patterns of business users, but not those of consumer users. As part of the Green project at ABC University, a pilot study was undertaken to develop and test software tools and methods for monitoring the laptop computer usage of 13 college students for a period of 1 month. This paper describes such tools and methods for monitoring and collecting laptop usage data. It also illustrates how the collected data can be analyzed to obtain high-impact energy usage patterns, which include long idle periods, excessive use of the AC power source, and high backlight levels. These identified high-impact usage patterns, if confirmed by our subsequent study, offer valuable user behavioral insights to advance more energy-efficient laptop use and design.

  10. A wireless breathing-training support system for kinesitherapy.

    Science.gov (United States)

    Tawa, Hiroki; Yonezawa, Yoshiharu; Maki, Hiromichi; Ogawa, Hidekuni; Ninomiya, Ishio; Sada, Kouji; Hamada, Shingo; Caldwell, W Morton

    2009-01-01

    We have developed a new wireless breathing-training support system for kinesitherapy. The system consists of an optical sensor, an accelerometer, a microcontroller, a Bluetooth module and a laptop computer. The optical sensor, which is attached to the patient's chest, measures chest circumference. The low frequency components of circumference are mainly generated by breathing. The optical sensor outputs the circumference as serial digital data. The accelerometer measures the dynamic acceleration force produced by exercise, such as walking. The microcontroller sequentially samples this force. The acceleration force and chest circumference are sent sequentially via Bluetooth to a physical therapist's laptop computer, which receives and stores the data. The computer simultaneously displays these data so that the physical therapist can monitor the patient's breathing and acceleration waveforms and give instructions to the patient in real time during exercise. Moreover, the system enables a quantitative training evaluation and calculation the volume of air inspired and expired by the lungs.

  11. Portable Wireless Device Threat Assessment for Aircraft Navigation Radios

    Science.gov (United States)

    Nguyen, Truong X.; Koppen, Sandra V.; Ely, Jay J.; Williams, Reuben A.; Smith, Laura J.; Salud, Maria Theresa P.

    2004-01-01

    This paper addresses the concern for Wireless Local Area Network devices and two-way radios to cause electromagnetic interference to aircraft navigation radio systems. Spurious radiated emissions from various IEEE 802.11a, 802.11b, and Bluetooth devices are characterized using reverberation chambers. The results are compared with baseline emissions from standard laptop computer and personal digital assistants (PDAs) that are currently allowed for use on aircraft. The results indicate that the WLAN devices tested are not more of a threat to aircraft navigation radios than standard laptop computers and PDAs in most aircraft bands. In addition, spurious radiated emission data from seven pairs of two-way radios are provided. These two-way radios emit at much higher levels in the bands considered. A description of the measurement process, device modes of operation and the measurement results are reported.

  12. Burn Injury Caused by Laptop Computers

    African Journals Online (AJOL)

    generated in central processing unit (CPU), graphics processing unit, hard drive, internal ... change its position. Discussion ... Suzuki, et al. reported that the critical temperature for superficial burn was 37.8°C, for deep dermal burns 41.9°C and ... The laptop should be placed on a hard surface and not on soft surfaces like.

  13. Developing a Research Agenda for Ubiquitous Computing in Schools

    Science.gov (United States)

    Zucker, Andrew

    2004-01-01

    Increasing numbers of states, districts, and schools provide every student with a computing device; for example, the middle schools in Maine maintain wireless Internet access and the students receive laptops. Research can provide policymakers with better evidence of the benefits and costs of 1:1 computing and establish which factors make 1:1…

  14. Practical Skills in Laptop Computer Repairs for Curriculum Innovation in Technical Education Programmes in Nigeria

    Science.gov (United States)

    Chukwuedo, Samson O.; Omofonmwan, Godwin O.

    2015-01-01

    The increase in the use of laptop computer in Nigeria with their corresponding incessant breakdown calls for the preparation of competent technicians/technologists to carry out such repairs at the downtime of the appliance. This is one of the responsibilities of technology education programmes. This study therefore determined the practical skills…

  15. Efficiency using computer simulation of Reverse Threshold Model Theory on assessing a “One Laptop Per Child” computer versus desktop computer

    Directory of Open Access Journals (Sweden)

    Supat Faarungsang

    2017-04-01

    Full Text Available The Reverse Threshold Model Theory (RTMT model was introduced based on limiting factor concepts, but its efficiency compared to the Conventional Model (CM has not been published. This investigation assessed the efficiency of RTMT compared to CM using computer simulation on the “One Laptop Per Child” computer and a desktop computer. Based on probability values, it was found that RTMT was more efficient than CM among eight treatment combinations and an earlier study verified that RTMT gives complete elimination of random error. Furthermore, RTMT has several advantages over CM and is therefore proposed to be applied to most research data.

  16. AARP laptops for dummies

    CERN Document Server

    Gookin, Dan

    2011-01-01

    Take technology with you wherever you go! Get a move on and learn to roam free with this mini guide to choosing and using a laptop. Packed with useful advice on picking a laptop, setting it up, managing power and peripherals, going online, and hitting the road, you'll learn to love your laptop with help from For Dummies. Whether this is your first laptop or a recent upgrade, you'll get the advice you need from laptop to lap-bottom here. Open the book and find:Tips for buying the right laptop for youA tour of your laptop and its featuresExp

  17. Bluetooth wireless database for scoliosis clinics.

    Science.gov (United States)

    Lou, E; Fedorak, M V; Hill, D L; Raso, J V; Moreau, M J; Mahood, J K

    2003-05-01

    A database system with Bluetooth wireless connectivity has been developed so that scoliosis clinics can be run more efficiently and data can be mined for research studies without significant increases in equipment cost. The wireless database system consists of a Bluetooth-enabled laptop or PC and a Bluetooth-enabled handheld personal data assistant (PDA). Each patient has a profile in the database, which has all of his or her clinical history. Immediately prior to the examination, the orthopaedic surgeon selects a patient's profile from the database and uploads that data to the PDA over a Bluetooth wireless connection. The surgeon can view the entire clinical history of the patient while in the examination room and, at the same time, enter in any new measurements and comments from the current examination. After seeing the patient, the surgeon synchronises the newly entered information with the database wirelessly and prints a record for the chart. This combination of the database and the PDA both improves efficiency and accuracy and can save significant time, as there is less duplication of work, and no dictation is required. The equipment required to implement this solution is a Bluetooth-enabled PDA and a Bluetooth wireless transceiver for the PC or laptop.

  18. Laptops in Classroom Interaction: The Dynamic Reach of the Laptoped Situation

    Science.gov (United States)

    Lindroth, Tomas; Lundin, Johan; Svensson, Lars

    2013-01-01

    Laptops and other networked technologies are commonplace at university campuses. While a range of studies researches the negative effects of multitasking, screenpeeking and other laptop related side effects this article emphasize the situational impact of student-laptop interaction. Departing from Goffman's framework on unfocused interaction and…

  19. Technical note: real-time web-based wireless visual guidance system for radiotherapy.

    Science.gov (United States)

    Lee, Danny; Kim, Siyong; Palta, Jatinder R; Kim, Taeho

    2017-06-01

    Describe a Web-based wireless visual guidance system that mitigates issues associated with hard-wired audio-visual aided patient interactive motion management systems that are cumbersome to use in routine clinical practice. Web-based wireless visual display duplicates an existing visual display of a respiratory-motion management system for visual guidance. The visual display of the existing system is sent to legacy Web clients over a private wireless network, thereby allowing a wireless setting for real-time visual guidance. In this study, active breathing coordinator (ABC) trace was used as an input for visual display, which captured and transmitted to Web clients. Virtual reality goggles require two (left and right eye view) images for visual display. We investigated the performance of Web-based wireless visual guidance by quantifying (1) the network latency of visual displays between an ABC computer display and Web clients of a laptop, an iPad mini 2 and an iPhone 6, and (2) the frame rate of visual display on the Web clients in frames per second (fps). The network latency of visual display between the ABC computer and Web clients was about 100 ms and the frame rate was 14.0 fps (laptop), 9.2 fps (iPad mini 2) and 11.2 fps (iPhone 6). In addition, visual display for virtual reality goggles was successfully shown on the iPhone 6 with 100 ms and 11.2 fps. A high network security was maintained by utilizing the private network configuration. This study demonstrated that a Web-based wireless visual guidance can be a promising technique for clinical motion management systems, which require real-time visual display of their outputs. Based on the results of this study, our approach has the potential to reduce clutter associated with wired-systems, reduce space requirements, and extend the use of medical devices from static usage to interactive and dynamic usage in a radiotherapy treatment vault.

  20. Computer-Based Wireless Advertising Communication System

    Directory of Open Access Journals (Sweden)

    Anwar Al-Mofleh

    2009-10-01

    Full Text Available In this paper we developed a computer based wireless advertising communication system (CBWACS that enables the user to advertise whatever he wants from his own office to the screen in front of the customer via wireless communication system. This system consists of two PIC microcontrollers, transmitter, receiver, LCD, serial cable and antenna. The main advantages of the system are: the wireless structure and the system is less susceptible to noise and other interferences because it uses digital communication techniques.

  1. Numerical evaluation of human exposure to WiMax patch antenna in tablet or laptop.

    Science.gov (United States)

    Siervo, Beatrice; Morelli, Maria Sole; Landini, Luigi; Hartwig, Valentina

    2018-04-30

    The use of wireless communication devices, such as tablets or laptops, is increasing among children. Only a few studies assess specific energy absorption rate (SAR) due to exposure from wireless-enabled tablets and laptops, in particular with Worldwide Interoperability for Microwave Access (WiMax) technology. This paper reports the estimation of the interaction between an E-shaped patch antenna (3.5 GHz) and human models, by means of finite-difference time-domain (FDTD) method. Specifically, four different human models (young adult male, young adult female, pre-teenager female, male child) in different exposure conditions (antenna at different distances from the human model, in different positions, and orientations) were considered and whole-body, 10 and 1 g local SAR and magnetic field value (Bmax) were evaluated. From our results, in some worst-case scenarios involving male and female children's exposure, the maximum radiofrequency energy absorption (hot spots) is located in more sensitive organs such as eye, genitals, and breast. Bioelectromagnetics. © 2018 Wiley Periodicals, Inc. © 2018 Wiley Periodicals, Inc.

  2. Wireless infrared computer control

    Science.gov (United States)

    Chen, George C.; He, Xiaofei

    2004-04-01

    Wireless mouse is not restricted by cable"s length and has advantage over its wired counterpart. However, all the mice available in the market have detection range less than 2 meters and angular coverage less than 180 degrees. Furthermore, commercial infrared mice are based on track ball and rollers to detect movements. This restricts them to be used in those occasions where users want to have dynamic movement, such as presentations and meetings etc. This paper presents our newly developed infrared wireless mouse, which has a detection range of 6 meters and angular coverage of 180 degrees. This new mouse uses buttons instead of traditional track ball and is developed to be a hand-held device like remote controller. It enables users to control cursor with a distance closed to computer and the mouse to be free from computer operation.

  3. Some Pros and Cons of Laptop Use in Class

    Science.gov (United States)

    Harris, R. W.

    2018-05-01

    We did not have laptops or computer networks in schools in 1968, when I started teaching physics. When classroom computers became available, followed by the internet, I greeted them as great educational tools. I developed my own website in order to provide reference material and assignments for my students. I found that online assignments were more likely than traditional ones to be completed. I also had my own system making password-protected grades available online. The parents loved it. I began giving some tests online. However, there is a downside to laptop use in class.

  4. Introducing Laptops to Children: An Examination of Ubiquitous Computing in Grade 3 Reading, Language, and Mathematics

    Science.gov (United States)

    Bernard, Robert M.; Bethel, Edward Clement; Abrami, Philip C.; Wade, C. Anne

    2007-01-01

    This study examines the achievement outcomes accompanying the implementation of a Grade 3 laptop or so-­called "ubiquitous computing" program in a Quebec school district. CAT­3 reading, language, and mathematics batteries were administered at the end of Grade 2 and again at the end of Grade 3, after the first year of computer…

  5. Development of smart wireless detector system for gamma ray detection

    International Nuclear Information System (INIS)

    Nolida Yussup; Nur Aira Abdul Rahman; Ismail Mustapha; Jaafar Abdullah; Mohd Ashhar Khalid; Hearie Hassan; Yoong, Chong Foh

    2012-01-01

    Data transmission in field works especially that is related to industry, gas and chemical is paramount importance to ensure data accuracy and delivery time. A development of wireless detector system for remote data acquisition to be applied in conducting fieldwork in industry is described in this paper. A wireless communication which is applied in the project development is a viable and cost-effective method of transmitting data from the detector to the laptop on the site to facilitate data storage and analysis automatically, which can be used in various applications such as column scanning. The project involves hardware design for the detector and electronics parts besides programming for control board and user interface. A prototype of a wireless gamma scintillation detector is developed with capabilities of transmitting data to computer via radio frequency (RF) and recording the data within the 433 MHz band at baud rate of 19200. (author)

  6. Development of smart wireless detector system for gamma ray detection

    International Nuclear Information System (INIS)

    Nolida Yussup; Nur Aira Abd. Rahman; Chong, Foh Yoong; Mohd Ashhar Khalid; Ismail Mustapha; Jaafar Abdullah; Hearie Hassan

    2010-01-01

    Data transmission in field works especially that is related to industry, gas and chemical is paramount importance to ensure data accuracy and delivery time. A development of wireless detector system for remote data acquisition to be applied in conducting fieldwork in industry is described in this paper. A wireless communication which is applied in the project development is a viable and cost-effective method of transmitting data from the detector to the laptop on the site to facilitate data storage and analysis automatically, which can be used in various applications such as column scanning. The project involves hardware design for the detector and electronics parts besides programming for control board and user interface. A prototype of a wireless gamma scintillation detector is developed with capabilities of transmitting data to computer via radio frequency (RF) and recording the data within the 433 MHz band at baud rate of 19200. (author)

  7. EMI Evaluation on Wireless Computer Devices in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jae Ki; JI Yeong Hwa; Sung, Chan Ho

    2011-01-01

    Wireless computer devices, for example, mice and keyboards are widely used in various industries. However, I and C (instrumentation and control) equipment in nuclear power plants are very susceptible to the EMI (Electro-magnetic interference) and there are concerns regarding EMI induced transient caused by wireless computer devices which emit electromagnetic waves for communication. In this paper, industrial practices and nuclear related international standards are investigated to verify requirements of wireless devices. In addition, actual measurement and evaluation for the intensity of EMI of some commercially available wireless devices is performed to verify their compatibility in terms of EMI. Finally we suggest an appropriate method of using wireless computer devices in nuclear power plant control rooms for better office circumstances of operators

  8. Laptops and Lipsticks: Feminising Technology

    Science.gov (United States)

    Gannon, Susanne

    2007-01-01

    This paper brings learning, mass media and technology together in a critical analysis of advertising and its gendered implications in terms of women's desires and investments in technology. It uses two advertisements for laptop computers that appeared in the same weekend news magazine as an analytical opportunity to examine collisions and…

  9. A feasibility study on direct methanol fuel cells for laptop computers based on a cost comparison with lithium-ion batteries

    International Nuclear Information System (INIS)

    Wee, Jung-Ho

    2007-01-01

    This paper compares the total cost of direct methanol fuel cell (DMFC) and lithium (Li)-ion battery systems when applied as the power supply for laptop computers in the Korean environment. The average power output and operational time of the laptop computers were assumed to be 20 W and 3000 h, respectively. Considering the status of their technologies and with certain conditions assumed, the total costs were calculated to be US$140 for the Li-ion battery and US$362 for DMFC. The manufacturing costs of the DMFC and Li-ion battery systems were calculated to be $16.65 W -1 and $0.77 W h -1 , and the energy consumption costs to be $0.00051 W h -1 and $0.00032 W h -1 , respectively. The higher fuel consumption cost of the DMFC system was due to the methanol (MeOH) crossover loss. Therefore, the requirements for DMFCs to be able to compete with Li-ion batteries in terms of energy cost include reducing the crossover level to at an order magnitude of -9 and the MeOH price to under $0.5 kg -1 . Under these conditions, if the DMFC manufacturing cost could be reduced to $6.30 W -1 , then the DMFC system would become at least as competitive as the Li-ion battery system for powering laptop computers in Korea. (author)

  10. Teach yourself visually laptops

    CERN Document Server

    Gunter, Sherry Kinkoph

    2012-01-01

    The fast and easy way to learn about buying, maintaining, and troubleshooting, a laptop How do I find the right laptop for me? Now that I have a laptop, how do I set it up and maintain it? What are some tips for getting the most out of software systems? How do I begin to troubleshoot my laptop? If you are a visual learner and have ever asked yourself any of those questions, then this is just the book you need. Visual, step-by-step guidance walks you through finding the right laptop to meet your needs, getting comfortable with the latest versions of Windows and the Microsoft Office Suite, and u

  11. The Role of Wireless Computing Technology in the Design of Schools.

    Science.gov (United States)

    Nair, Prakash

    This document discusses integrating computers logically and affordably into a school building's infrastructure through the use of wireless technology. It begins by discussing why wireless networks using mobile computers are preferable to desktop machines in each classoom. It then explains the features of a wireless local area network (WLAN) and…

  12. 78 FR 1247 - Certain Electronic Devices, Including Wireless Communication Devices, Tablet Computers, Media...

    Science.gov (United States)

    2013-01-08

    ... Wireless Communication Devices, Tablet Computers, Media Players, and Televisions, and Components Thereof... devices, including wireless communication devices, tablet computers, media players, and televisions, and... wireless communication devices, tablet computers, media players, and televisions, and components thereof...

  13. Collecting Sensitive Self-Report Data with Laptop Computers: Impact on the Response Tendencies of Adolescents in a Home Interview.

    Science.gov (United States)

    Supple, Andrew J.; Aquilino, William S.; Wright, Debra L.

    1999-01-01

    Explored effects of computerized, self-administered data collection techniques in research on adolescents' self-reported substance use and psychological well-being. Adolescents completing sensitive questions on only laptop computers reported higher levels of substance use and indicated higher levels of depression and irritability; they perceived…

  14. KeyWare: an open wireless distributed computing environment

    Science.gov (United States)

    Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir

    1995-12-01

    Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.

  15. Architectural analysis for wirelessly powered computing platforms

    NARCIS (Netherlands)

    Kapoor, A.; Pineda de Gyvez, J.

    2013-01-01

    We present a design framework for wirelessly powered generic computing platforms that takes into account various system parameters in response to a time-varying energy source. These parameters are the charging profile of the energy source, computing speed (fclk), digital supply voltage (VDD), energy

  16. Posture, Musculoskeletal Activities, and Possible Musculoskeletal Discomfort among Children Using Laptops or Tablet Computers for Educational Purposes: A Literature Review

    Science.gov (United States)

    Binboga, Elif; Korhan, Orhan

    2014-01-01

    Educational ergonomics focuses on the interaction between educational performance and educational design. By improving the design or pointing out the possible problems, educational ergonomics can be utilized to have positive impacts on the student performance and thus on education process. Laptops and tablet computers are becoming widely used by…

  17. Peter Carey's Laptop

    Directory of Open Access Journals (Sweden)

    Rowan Wilken

    2014-03-01

    Full Text Available In 2001, the State Library of Victoria in Melbourne built on its holdings of Australian literary manuscripts by acquiring all the papers, drafts and other items associated with Peter Carey’s Booker Prize-winning novel, True History of the Kelly Gang. The centrepiece of this acquisition, and the focus of this article, is Carey’s Apple Mac Classic laptop computer. The argument that is developed in this article is that Carey’s laptop is a technological artefact that operates, especially at the time of its acquisition, as an important talisman in three interrelated senses. First, it was viewed by library staff as a key means of gaining access to the ‘true history’ of Carey’s own creative drive or creative unconscious. Second, its public display alongside other textual objects (mostly books served to reinforce a reconstructed corporate image that endeavoured to reposition the library as a vital contemporary cultural site and key player in Melbourne’s institutional gallery scene. Third, it was a crucial symbolic acquisition insofar as it spoke to certain desires within library management at that time, and which responded to similar moves at major libraries elsewhere around the world, to embrace collection digitisation as the path forward.

  18. Teaching and Learning Physics in a 1:1 Laptop School

    Science.gov (United States)

    Zucker, Andrew A.; Hug, Sarah T.

    2008-12-01

    1:1 laptop programs, in which every student is provided with a personal computer to use during the school year, permit increased and routine use of powerful, user-friendly computer-based tools. Growing numbers of 1:1 programs are reshaping the roles of teachers and learners in science classrooms. At the Denver School of Science and Technology, a public charter high school where a large percentage of students come from low-income families, 1:1 laptops are used often by teachers and students. This article describes the school's use of laptops, the Internet, and related digital tools, especially for teaching and learning physics. The data are from teacher and student surveys, interviews, classroom observations, and document analyses. Physics students and teachers use an interactive digital textbook; Internet-based simulations (some developed by a Nobel Prize winner); word processors; digital drop boxes; email; formative electronic assessments; computer-based and stand-alone graphing calculators; probes and associated software; and digital video cameras to explore hypotheses, collaborate, engage in scientific inquiry, and to identify strengths and weaknesses of students' understanding of physics. Technology provides students at DSST with high-quality tools to explore scientific concepts and the experiences of teachers and students illustrate effective uses of digital technology for high school physics.

  19. Wireless sensor communications and internet connectivity for sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Dunbar, M. [Crossbow Technology, Inc., San Jose, CA (United States)

    2001-07-01

    A wireless sensor network architecture is an integrated hardware/software solution that has the potential to change the way sensors are used in a virtually unlimited range of industries and applications. By leveraging Bluetooth wireless technology for low-cost, short-range radio links, wireless sensor networks such as CrossNet{sup TM} enable users to create wireless sensor networks. These wireless networks can link dozens or hundreds of sensors of disparate types and brands with data acquisition/analysis systems, such as handheld devices, internet-enabled laptop or desktop PCs. The overwhelming majority of sensor applications are hard-wired at present, and since wiring is often the most time-consuming, tedious, trouble-prone and expensive aspect of sensor applications, users in many fields will find compelling reasons to adopt the wireless sensor network solution. (orig.)

  20. Operating Wireless Sensor Nodes without Energy Storage: Experimental Results with Transient Computing

    Directory of Open Access Journals (Sweden)

    Faisal Ahmed

    2016-12-01

    Full Text Available Energy harvesting is increasingly used for powering wireless sensor network nodes. Recently, it has been suggested to combine it with the concept of transient computing whereby the wireless sensor nodes operate without energy storage capabilities. This new combined approach brings benefits, for instance ultra-low power nodes and reduced maintenance, but also raises new challenges, foremost dealing with nodes that may be left without power for various time periods. Although transient computing has been demonstrated on microcontrollers, reports on experiments with wireless sensor nodes are still scarce in the literature. In this paper, we describe our experiments with solar, thermal, and RF energy harvesting sources that are used to power sensor nodes (including wireless ones without energy storage, but with transient computing capabilities. The results show that the selected solar and thermal energy sources can operate both the wired and wireless nodes without energy storage, whereas in our specific implementation, the developed RF energy source can only be used for the selected nodes without wireless connectivity.

  1. The Impact of Socioeconomic Status on Achievement of High School Students Participating in a One-to-One Laptop Computer Program

    Science.gov (United States)

    Weers, Anthony J.

    2012-01-01

    The purpose of this study was to determine the impact of socioeconomic status on the achievement of high school students participating in a one-to-one laptop computer program. Students living in poverty struggle to achieve in schools across the country, educators must address this issue. The independent variable in this study is socioeconomic…

  2. Evolving Pedagogical Perceptions of Teachers Integrating Ubiquitous Computing in Their Classrooms: A Case Study of the South Dakota Laptop Program

    Science.gov (United States)

    Pogany, Wade S.

    2009-01-01

    With technology changing the world at a rapid rate, the impact of ubiquitous computing in the classroom has had an influence on education. As the number of one-to-one laptop initiatives grows, the need for further research on the effects of teaching and learning also increases. This case study sought to examine changes in teaching that resulted…

  3. Student Perceptions of the Value of a University Laptop Program

    Science.gov (United States)

    Orr, Claudia; Sherony, Bruce; Steinhaus, Carol

    2008-01-01

    In the fall of 2000, when a mandatory laptop program was initiated at a Midwest regional university, a faculty research team began a longitudinal study to determine student perceptions of the value of the program. Value was defined as usefulness of the computer, reasonable price for the computer and the quality of the computer. A survey of 1,000…

  4. Energy Aware Computing in Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    In this work the idea of cooperation is applied to wireless communication systems. It is generally accepted that energy consumption is a significant design constraint for mobile handheld systems. We propose a novel method of cooperative task computing by distributing tasks among terminals over...... the unreliable wireless link. Principles of multi–processor energy aware task scheduling are used exploiting performance scalable technologies such as Dynamic Voltage Scaling (DVS). We introduce a novel mechanism referred to as D2VS and here it is shown by means of simulation that savings of 40% can be achieved....

  5. 11th International Conference On Broad-Band Wireless Computing, Communication and Applications

    CERN Document Server

    Xhafa, Fatos; Yim, Kangbin

    2017-01-01

    The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pave the way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary. The aim of the volume is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of broadband and wireless computing. This proceedings volume presents the results of the 11th International Conference on Broad-Band Wireless Computing, Communication And Applications (BWCCA-2016), held November 5-7, 2016, at Soonchunhyang University, Asan, Korea. .

  6. Ubiquitous wireless ECG recording: a powerful tool physicians should embrace.

    Science.gov (United States)

    Saxon, Leslie A

    2013-04-01

    The use of smart phones has increased dramatically and there are nearly a billion users on 3G and 4G networks worldwide. Nearly 60% of the U.S. population uses smart phones to access the internet, and smart phone sales now surpass those of desktop and laptop computers. The speed of wireless communication technology on 3G and 4G networks and the widespread adoption and use of iOS equipped smart phones (Apple Inc., Cupertino, CA, USA) provide infrastructure for the transmission of wireless biomedical data, including ECG data. These technologies provide an unprecedented opportunity for physicians to continually access data that can be used to detect issues before symptoms occur or to have definitive data when symptoms are present. The technology also greatly empowers and enables the possibility for unprecedented patient participation in their own medical education and health status as well as that of their social network. As patient advocates, physicians and particularly cardiac electrophysiologists should embrace the future and promise of wireless ECG recording, a technology solution that can truly scale across the global population. © 2013 Wiley Periodicals, Inc.

  7. Wireless Zigbee strain gage sensor system for structural health monitoring

    Science.gov (United States)

    Ide, Hiroshi; Abdi, Frank; Miraj, Rashid; Dang, Chau; Takahashi, Tatsuya; Sauer, Bruce

    2009-05-01

    A compact cell phone size radio frequency (ZigBee) wireless strain measurement sensor system to measure the structural strain deformation was developed. The developed system provides an accurate strain measurement data stream to the Internet for further Diagnostic and Prognostic (DPS) correlation. Existing methods of structural measurement by strain sensors (gauges) do not completely satisfy problems posed by continuous structural health monitoring. The need for efficient health monitoring methods with real-time requirements to bidirectional data flow from sensors and to a commanding device is becoming critical for keeping our daily life safety. The use of full-field strain measurement techniques could reduce costly experimental programs through better understanding of material behavior. Wireless sensor-network technology is a monitoring method that is estimated to grow rapidly providing potential for cost savings over traditional wired sensors. The many of currently available wireless monitoring methods have: the proactive and constant data rate character of the data streams rather than traditional reactive, event-driven data delivery; mostly static node placement on structures with limited number of nodes. Alpha STAR Electronics' wireless sensor network system, ASWN, addresses some of these deficiencies, making the system easier to operate. The ASWN strain measurement system utilizes off-the-shelf sensors, namely strain gauges, with an analog-to-digital converter/amplifier and ZigBee radio chips to keep cost lower. Strain data is captured by the sensor, converted to digital form and delivered to the ZigBee radio chip, which in turn broadcasts the information using wireless protocols to a Personal Data Assistant (PDA) or Laptop/Desktop computers. From here, data is forwarded to remote computers for higher-level analysis and feedback using traditional cellular and satellite communication or the Ethernet infrastructure. This system offers a compact size, lower cost

  8. The Role of Wireless Computing Technology in the Design of Schools.

    Science.gov (United States)

    Nair, Prakash

    2003-01-01

    After briefly describing the educational advantages of wireless networks using mobile computers, discusses the technical, operational, financial aspects of wireless local area networks (WLAN). Provides examples of school facilities designed for the use of WLAN. Includes a glossary of WLAN-related terms. (Contains 12 references.)

  9. Performance Evaluation of a Mobile Wireless Computational Grid ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2015-12-01

    Dec 1, 2015 ... Abstract. This work developed and simulated a mathematical model for a mobile wireless computational Grid ... which mobile modes will process the tasks .... evaluation are analytical modelling, simulation ... MATLAB 7.10.0.

  10. Wireless Sensor Network for Indoor Air Quality Monitoring

    Directory of Open Access Journals (Sweden)

    Jun Li

    2014-06-01

    Full Text Available Indoor air quality monitoring system consists of wireless sensor device, nRF24L01 wireless transceiver modules, C8051MCU, STM32103 remote monitoring platform, alarm device and data server. Distributed in the interior space of wireless sensors measure parameters of the local air quality, wireless transceiver module of the MCU to transmit data to the remote monitoring platform for analysis which displayed and stored field environment data or charts. The data collecting from wireless sensors to be send by wireless Access Point to the remote data server based on B/S architecture, intelligent terminals such as mobile phone, laptop, tablet PC on the Internet monitor indoor air quality in real-time. When site environment air quality index data exceeds the threshold in the monitoring device, the remote monitoring platform sends out the alarm SMS signal to inform user by GSM module. Indoor air quality monitoring system uses modular design method, has the portability and scalability has the low manufacture cost, real-time monitoring data and man-machine interaction.

  11. Thermal mapping on male genital and skin tissues of laptop thermal sources and electromagnetic interaction.

    Science.gov (United States)

    Safari, Mahdi; Mosleminiya, Navid; Abdolali, Ali

    2017-10-01

    Since the development of communication devices and expansion of their applications, there have been concerns about their harmful health effects. The main aim of this study was to investigate laptop thermal effects caused by exposure to electromagnetic fields and thermal sources simultaneously; propose a nondestructive, replicable process that is less expensive than clinical measurements; and to study the effects of positioning any new device near the human body in steady state conditions to ensure safety by U.S. and European standard thresholds. A computer simulation was designed to obtain laptop heat flux from SolidWorks flow simulation. Increase in body temperature due to heat flux was calculated, and antenna radiation was calculated using Computer Simulation Technology (CST) Microwave Studio software. Steady state temperature and specific absorption rate (SAR) distribution in user's body, and heat flux beneath the laptop, were obtained from simulations. The laptop in its high performance mode caused 420 (W/m 2 ) peak two-dimensional heat flux beneath it. The cumulative effect of laptop in high performance mode and 1 W antenna radiation resulted in temperatures of 42.9, 38.1, and 37.2 °C in lap skin, scrotum, and testis, that is, 5.6, 2.1, and 1.4 °C increase in temperature, respectively. Also, 1 W antenna radiation caused 0.37 × 10 -3 and 0.13 × 10 -1 (W/kg) peak three-dimensional SAR at 2.4 and 5 GHz, respectively, which could be ignored in reference to standards and temperature rise due to laptop use. Bioelectromagnetics. 38:550-558, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  12. Wireless power transfer for electric vehicles and mobile devices

    CERN Document Server

    Rim, Chun T

    2017-01-01

    From mobile, cable-free re-charging of electric vehicles, smart phones and laptops to collecting solar electricity from orbiting solar farms, wireless power transfer (WPT) technologies offer consumers and society enormous benefits. Written by innovators in the field, this comprehensive resource explains the fundamental principles and latest advances in WPT and illustrates key applications of this emergent technology.

  13. Uses of Laptops in English as Second Language Classrooms as Part of a One-to-One Laptop Program

    Directory of Open Access Journals (Sweden)

    Guliz Turgut

    2012-04-01

    Full Text Available One-to-one laptop programs, where each student has their own laptop to use in classroom, are becoming popular in schools especially in Australia and the Unites States. The purpose of the study was to contribute to the limited knowledgebase explaining the implementation of laptop programs specifically with English language learners. Four ESL classroom teachers, six ESL students, and three school administrators participated in individually conducted, semi-structured interviews. Additionally, a total of twelve observations were completed in four ESL classrooms. Data was interpreted through Grounded Theory and open-, axial-, and selective-coding was used for coding. Three themes emerged from data analysis. The first theme focused on explaining how teacherlaptops were used. Results indicated that use of teacher-laptops ranged from making instruction visual to playing music to create a soothing classroom environment. The second theme explained use of student-laptops and indicated that they were mainly used to develop English language skills and complete projects. The third and last theme portrayed some concerns teachers and students had about technical issues and overreliance on laptops impacting instruction and classroom culture unfavorably. Implications are discussed while reporting findings of the study. The study concludes with limitations of the study and suggestions for future research

  14. Wideband and UWB Antennas for Wireless Applications: A Comprehensive Review

    Directory of Open Access Journals (Sweden)

    Renato Cicchetti

    2017-01-01

    Full Text Available A comprehensive review concerning the geometry, the manufacturing technologies, the materials, and the numerical techniques, adopted for the analysis and design of wideband and ultrawideband (UWB antennas for wireless applications, is presented. Planar, printed, dielectric, and wearable antennas, achievable on laminate (rigid and flexible, and textile dielectric substrates are taken into account. The performances of small, low-profile, and dielectric resonator antennas are illustrated paying particular attention to the application areas concerning portable devices (mobile phones, tablets, glasses, laptops, wearable computers, etc. and radio base stations. This information provides a guidance to the selection of the different antenna geometries in terms of bandwidth, gain, field polarization, time-domain response, dimensions, and materials useful for their realization and integration in modern communication systems.

  15. GPU-Based FFT Computation for Multi-Gigabit WirelessHD Baseband Processing

    Directory of Open Access Journals (Sweden)

    Nicholas Hinitt

    2010-01-01

    Full Text Available The next generation Graphics Processing Units (GPUs are being considered for non-graphics applications. Millimeter wave (60 Ghz wireless networks that are capable of multi-gigabit per second (Gbps transfer rates require a significant baseband throughput. In this work, we consider the baseband of WirelessHD, a 60 GHz communications system, which can provide a data rate of up to 3.8 Gbps over a short range wireless link. Thus, we explore the feasibility of achieving gigabit baseband throughput using the GPUs. One of the most computationally intensive functions commonly used in baseband communications, the Fast Fourier Transform (FFT algorithm, is implemented on an NVIDIA GPU using their general-purpose computing platform called the Compute Unified Device Architecture (CUDA. The paper, first, investigates the implementation of an FFT algorithm using the GPU hardware and exploiting the computational capability available. It then outlines the limitations discovered and the methods used to overcome these challenges. Finally a new algorithm to compute FFT is proposed, which reduces interprocessor communication. It is further optimized by improving memory access, enabling the processing rate to exceed 4 Gbps, achieving a processing time of a 512-point FFT in less than 200 ns using a two-GPU solution.

  16. A wireless computational platform for distributed computing based traffic monitoring involving mixed Eulerian-Lagrangian sensing

    KAUST Repository

    Jiang, Jiming

    2013-06-01

    This paper presents a new wireless platform designed for an integrated traffic monitoring system based on combined Lagrangian (mobile) and Eulerian (fixed) sensing. The sensor platform is built around a 32-bit ARM Cortex M4 micro-controller and a 2.4GHz 802.15.4 ISM compliant radio module, and can be interfaced with fixed traffic sensors, or receive data from vehicle transponders. The platform is specially designed and optimized to be integrated in a solar-powered wireless sensor network in which traffic flow maps are computed by the nodes directly using distributed computing. A MPPT circuitry is proposed to increase the power output of the attached solar panel. A self-recovering unit is designed to increase reliability and allow periodic hard resets, an essential requirement for sensor networks. A radio monitoring circuitry is proposed to monitor incoming and outgoing transmissions, simplifying software debug. An ongoing implementation is briefly discussed, and compared with existing platforms used in wireless sensor networks. © 2013 IEEE.

  17. Experience of wireless local area network in a radiation oncology department.

    Science.gov (United States)

    Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan

    2010-01-01

    The aim of this work is to develop a wireless local area network (LAN) between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc) for efficient patient data management and to made easy the availability of information (chair side) to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops) and stationary workstations, all equipped with wireless-fidelity (Wi-Fi) access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ) has been used. The wireless networking was configured with the Service Set Identifier (SSID), Media Access Control (MAC) address filtering, and Wired Equivalent Privacy (WEP) network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.

  18. Performance Evaluation of a Mobile Wireless Computational Grid ...

    African Journals Online (AJOL)

    This work developed and simulated a mathematical model for a mobile wireless computational Grid architecture using networks of queuing theory. This was in order to evaluate the performance of theload-balancing three tier hierarchical configuration. The throughput and resource utilizationmetrics were measured and the ...

  19. Computing Nash Equilibrium in Wireless Ad Hoc Networks

    DEFF Research Database (Denmark)

    Bulychev, Peter E.; David, Alexandre; Larsen, Kim G.

    2012-01-01

    This paper studies the problem of computing Nash equilibrium in wireless networks modeled by Weighted Timed Automata. Such formalism comes together with a logic that can be used to describe complex features such as timed energy constraints. Our contribution is a method for solving this problem...

  20. What do dental students think about mandatory laptop programs?

    Science.gov (United States)

    Hendricson, William; Eisenberg, Elise; Guest, Gary; Jones, Pamela; Johnson, Lynn; Panagakos, Fotinos; McDonald, James; Cintron, Laura

    2006-05-01

    In spite of efforts by many dental schools to provide information technology resources for students, only a handful of studies have been conducted to determine what dental students think about these initiatives. There are no reports in the literature describing students' perceptions of mandatory laptop programs, which are now being implemented by at least 25 percent of North American dental schools. In schools that have implemented laptop programs, students are required either to enroll with their own laptops that meet specifications or to purchase a laptop from the school at matriculation. In some schools, students are also required to purchase curriculum support software that is bundled with the laptop. This study was conducted to determine students' opinions at U.S. dental schools with mandatory laptop programs about these aspects of this information technology initiative: frequency of use, perceived necessity of use, note-typing during lectures, effectiveness of training, influence on study habits, benefits, implementation problems, added value in relation to added tuition costs, impact on quality of dental education, overall rating of the laptop experience, and impact of the laptop on use of other electronic curriculum resources. Responses of students at schools that purchased packaged curriculum support software from a commercial vendor were compared with students' responses at schools where faculty provided their own educational software. Responses were also compared among freshmen, sophomores, and upperclassmen in a cross-sectional sample. In 2004, approximately 800 dental students at fourteen dental schools responded to eleven questions that requested their impressions and evaluation of mandatory laptop programs and associated educational software. These questions comprised one section of the IREC Students' Questionnaire (IREC=Institutional Readiness for Electronic Curriculum) that assessed students' perceptions of various aspects of information technology

  1. Examining the Affects of Student Multitasking with Laptops during the Lecture

    Science.gov (United States)

    Kraushaar, James M.; Novak, David C.

    2010-01-01

    This paper examines undergraduate student use of laptop computers during a lecture-style class that includes substantial problem-solving activities and graphic-based content. The study includes both a self-reported use component collected from student surveys as well as a monitored use component collected via activity monitoring…

  2. Easy encryption for CERN laptops

    CERN Multimedia

    Computer Security Team

    2014-01-01

    The number of laptops stolen from or lost by CERN staff and users is not negligible. On average, four to five devices are reported lost or stolen to the CERN Fire Brigade every month.   The real number might be even higher as not everyone is aware that such thefts/losses should be reported in this way. Along with each laptop, private e-mails and personal documents, as well as MARS forms, contracts, NDAs, etc. are also lost. Fortunately, CERN has not lost any sensitive data so far (unlike other companies). In parallel with the approval by the Enlarged Directorate at its latest session of the development of a CERN-wide Data Protection Policy, the IT Department has prepared measures allowing you to protect the data on your laptop using full hard-disk encryption. While the word “encryption” might sounds complicated, the IT Department has fully automated the encryption process. For centrally managed Windows PCs, you just have to install the corresponding CMF package (“M...

  3. Wireless Handheld Computers in the Preclinical Undergraduate Curriculum

    Directory of Open Access Journals (Sweden)

    Matt Jackson

    2003-02-01

    Full Text Available This report presents the results of a pilot project using wireless PDAs as teaching tools in an undergraduate medical curriculum. This technology was used to foster a transition from a passive to an interactive learning environment in the classroom and provided a solution for the implementation of computer-based exams for a large class. Wayne State Medical School recently provided model e570 Toshiba PocketPCs® (personal digital assistants or PDAs, network interface cards, and application software developed by CampusMobility® to 20 sophomore medical students. The pilot group of preclinical students used the PDAs to access web-based course content, for communication, scheduling, to participate in interactive teaching sessions, and to complete course evaluations. Another part of this pilot has been to utilize the PDAs for computer-based exams in a wireless environment. Server authentication that restricted access during the exams and a proctoring console to monitor and record the PDA screens will be described in this report. Results of a student satisfaction survey will be presented.

  4. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  5. A solar powered wireless computer mouse: industrial design concepts

    NARCIS (Netherlands)

    Reich, N.H.; Veefkind, M.; van Sark, W.G.J.H.M.; Alsema, E.A.; Turkenburg, W.C.; Silvester, S.

    2009-01-01

    A solar powered wireless computer mouse (SPM) was chosen to serve as a case study for the evaluation and optimization of industrial design processes of photovoltaic (PV) powered consumer systems. As the design process requires expert knowledge in various technical fields, we assessed and compared

  6. Problem-based scenarios with laptops: an effective combination for cross-curricular learning in mathematics, science and language

    Directory of Open Access Journals (Sweden)

    Viktor Freiman

    2011-12-01

    Full Text Available Many educational systems consider using one-to-one access to the laptop as a way to improve teaching and learning. A two-year action research project on the use of laptop computers by New Brunswick (Canada grade 7 and 8 Francophone students aimed to better understand the impact of laptops on learning. Two problem-based learning (PBL interdisciplinary scenarios (math, science, language arts were implemented in eight experimental classes to measure and document students’ actual learning process, particularly in terms of their ability to scientifically investigate authentic problems, to reason mathematically, and to communicate. On-site observations, video-recording, journals, samples of students’ work, and interviews were used to collect qualitative data. Based on our findings, we argue that laptops in and of themselves may not automatically lead to better results on standardized tests, but rather create opportunities to enrich learning with more open-ended, constructive, collaborative, reflective, and cognitively complex learning tasks.

  7. Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, S.; Kim, Y.S.; Ye, S.H.

    2015-01-01

    This paper introduces cyber security evaluation results and a design of the wireless communication technology to apply to safeguard systems in nuclear power plants. While wireless communication technologies can generally make mobility and efficiency on plant operation, those have seldom been installed on the nuclear I&C systems due to the negative concern of unexpected outcomes that stem from electromagnetic interference and cyber attack. New design of advanced digital safeguard and I&C systems uses computer-based systems for the safeguard and safety functions. On the other hand, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. In order to employ the wireless communication technology in safeguard function, licencees assess and manage the potential for adverse effects on safeguard and safety functions so as to provide high assurance that critical functions are properly protected cyber attack. It is expected that the safeguard function, specifically on the area of real-time monitoring, logging, can be enhanced by employing the mobile safeguard devices (: smart phone, laptop, smart pad, etc). In this paper, we deal with the cyber security evaluation, which consists of threat analysis, vulnerability test, establishment of security plan, and design solutions for the wireless communication on the basis of IEEE 802.11(Wi-Fi) protocol. Proposed evaluation and design solution could be a basis for the design of wireless communication and mobile safeguard systems in nuclear power plants. (author)

  8. Minimizing the negative effects of device mobility in cell-based ad-hoc wireless computational grids

    CSIR Research Space (South Africa)

    Mudali, P

    2006-09-01

    Full Text Available This paper provides an outline of research being conducted to minimize the disruptive effects of device mobility in wireless computational grid networks. The proposed wireless grid framework uses the existing GSM cellular architecture, with emphasis...

  9. AEGIS: A Lightweight Firewall for Wireless Sensor Networks

    Science.gov (United States)

    Hossain, Mohammad Sajjad; Raghunathan, Vijay

    Firewalls are an essential component in today's networked computing systems (desktops, laptops, and servers) and provide effective protection against a variety of over-the-network security attacks. With the development of technologies such as IPv6 and 6LoWPAN that pave the way for Internet-connected embedded systems and sensor networks, these devices will soon be subject to (and need to be defended against) similar security threats. As a first step, this paper presents Aegis, a lightweight, rule-based firewall for networked embedded systems such as wireless sensor networks. Aegis is based on a semantically rich, yet simple, rule definition language. In addition, Aegis is highly efficient during operation, runs in a transparent manner from running applications, and is easy to maintain. Experimental results obtained using real sensor nodes and cycle-accurate simulations demonstrate that Aegis successfully performs gatekeeping of a sensor node's communication traffic in a flexible manner with minimal overheads.

  10. Computer Independent Data Transfer Device

    Directory of Open Access Journals (Sweden)

    Darshana Rarath

    2017-07-01

    Full Text Available In today’s era, transferring data among distinct storage devices has become one of the tasks which are done most frequently. In order to make data and information omnipresent, it needs to be shared anywhere and anytime. However the reliance of user on a PC or laptop for the same is not efficient. This paper is about the innovative way to overcome this restriction. This paper discusses the development of a portable device with the use of wired and wireless communication applications to share data and information among distinct storage devices without relying on a PC or a laptop. The proposed device is compact, comprises of a touch screen, power source and is capable of transferring all types of files. Hence, it eliminates the dependence on a PC or a laptop for transferring data.

  11. Wireless networks of opportunity in support of secure field operations

    Science.gov (United States)

    Stehle, Roy H.; Lewis, Mark

    1997-02-01

    Under funding from the Defense Advanced Research Projects Agency (DARPA) for joint military and law enforcement technologies, demonstrations of secure information transfer in support of law enforcement and military operations other than war, using wireless and wired technology, were held in September 1996 at several locations in the United States. In this paper, the network architecture, protocols, and equipment supporting the demonstration's scenarios are presented, together with initial results, including lessons learned and desired system enhancements. Wireless networks of opportunity encompassed in-building (wireless-LAN), campus-wide (Metricom Inc.), metropolitan (AMPS cellular, CDPD), and national (one- and two-way satellite) systems. Evolving DARPA-sponsored packet radio technology was incorporated. All data was encrypted, using multilevel information system security initiative (MISSI)FORTEZZA technology, for carriage over unsecured and unclassified commercial networks. The identification and authentication process inherent in the security system permitted logging for database accesses and provided an audit trail useful in evidence gathering. Wireless and wireline communications support, to and between modeled crisis management centers, was demonstrated. Mechanisms for the guarded transport of data through the secret-high military tactical Internet were included, to support joint law enforcement and crisis management missions. A secure World Wide Web (WWW) browser forms the primary, user-friendly interface for information retrieval and submission. The WWW pages were structured to be sensitive to the bandwidth, error rate, and cost of the communications medium in use (e.g., the use of and resolution for graphical data). Both still and motion compressed video were demonstrated, along with secure voice transmission from laptop computers in the field. Issues of network bandwidth, airtime costs, and deployment status are discussed.

  12. Wireless Mobile Computing and its Links to Descriptive Complexity

    Czech Academy of Sciences Publication Activity Database

    Wiedermann, Jiří; Pardubská, D.

    2008-01-01

    Roč. 19, č. 4 (2008), s. 887-913 ISSN 0129-0541 R&D Projects: GA AV ČR 1ET100300517 Institutional research plan: CEZ:AV0Z10300504 Keywords : alternating Turing machine * simulation * simultaneous time-space complexity * wireless parallel Turing machine Subject RIV: IN - Informatics, Computer Science Impact factor: 0.554, year: 2008

  13. 77 FR 51571 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers...

    Science.gov (United States)

    2012-08-24

    ... Music and Data Processing Devices, Computers, and Components Thereof; Notice of Receipt of Complaint... complaint entitled Wireless Communication Devices, Portable Music and Data Processing Devices, Computers..., portable music and data processing devices, computers, and components thereof. The complaint names as...

  14. Development of a Wireless Computer Vision Instrument to Detect Biotic Stress in Wheat

    Directory of Open Access Journals (Sweden)

    Joaquin J. Casanova

    2014-09-01

    Full Text Available Knowledge of crop abiotic and biotic stress is important for optimal irrigation management. While spectral reflectance and infrared thermometry provide a means to quantify crop stress remotely, these measurements can be cumbersome. Computer vision offers an inexpensive way to remotely detect crop stress independent of vegetation cover. This paper presents a technique using computer vision to detect disease stress in wheat. Digital images of differentially stressed wheat were segmented into soil and vegetation pixels using expectation maximization (EM. In the first season, the algorithm to segment vegetation from soil and distinguish between healthy and stressed wheat was developed and tested using digital images taken in the field and later processed on a desktop computer. In the second season, a wireless camera with near real-time computer vision capabilities was tested in conjunction with the conventional camera and desktop computer. For wheat irrigated at different levels and inoculated with wheat streak mosaic virus (WSMV, vegetation hue determined by the EM algorithm showed significant effects from irrigation level and infection. Unstressed wheat had a higher hue (118.32 than stressed wheat (111.34. In the second season, the hue and cover measured by the wireless computer vision sensor showed significant effects from infection (p = 0.0014, as did the conventional camera (p < 0.0001. Vegetation hue obtained through a wireless computer vision system in this study is a viable option for determining biotic crop stress in irrigation scheduling. Such a low-cost system could be suitable for use in the field in automated irrigation scheduling applications.

  15. Equivalence of Laptop and Tablet Administrations of the Minnesota Multiphasic Personality Inventory-2 Restructured Form.

    Science.gov (United States)

    Menton, William H; Crighton, Adam H; Tarescavage, Anthony M; Marek, Ryan J; Hicks, Adam D; Ben-Porath, Yossef S

    2017-06-01

    The present study investigated the comparability of laptop computer- and tablet-based administration modes for the Minnesota Multiphasic Personality Inventory-2-Restructured Form (MMPI-2-RF). Employing a counterbalanced within-subjects design, the MMPI-2-RF was administered via both modes to a sample of college undergraduates ( N = 133). Administration modes were compared in terms of mean scale scores, internal consistency, test-retest consistency, external validity, and administration time. Mean scores were generally similar, and scores produced via both methods appeared approximately equal in terms of internal consistency and test-retest consistency. Scores from the two modalities also evidenced highly similar patterns of associations with external criteria. Notably, tablet administration of the MMPI-2-RF was substantially longer than laptop administration in the present study (mean difference 7.2 minutes, Cohen's d = .95). Overall, results suggest that varying administration mode between laptop and tablet has a negligible influence on MMPI-2-RF scores, providing evidence that these modes of administration can be considered psychometrically equivalent.

  16. Coexistence issues for a 2.4 GHz wireless audio streaming in presence of bluetooth paging and WLAN

    Science.gov (United States)

    Pfeiffer, F.; Rashwan, M.; Biebl, E.; Napholz, B.

    2015-11-01

    Nowadays, customers expect to integrate their mobile electronic devices (smartphones and laptops) in a vehicle to form a wireless network. Typically, IEEE 802.11 is used to provide a high-speed wireless local area network (WLAN) and Bluetooth is used for cable replacement applications in a wireless personal area network (PAN). In addition, Daimler uses KLEER as third wireless technology in the unlicensed (UL) 2.4 GHz-ISM-band to transmit full CD-quality digital audio. As Bluetooth, IEEE 802.11 and KLEER are operating in the same frequency band, it has to be ensured that all three technologies can be used simultaneously without interference. In this paper, we focus on the impact of Bluetooth and IEEE 802.11 as interferer in presence of a KLEER audio transmission.

  17. ANALISIS EKUITAS MEREK LAPTOP PADA MAHASISWA INSTITUT PERTANIAN BOGOR

    Directory of Open Access Journals (Sweden)

    Ujang Sumarwan

    2010-08-01

    Full Text Available The brand has role in bridging between consumer’s expectations and company’s promises. Prestigious brand can be said that it has strong brand equity. This research had objective to analyze brand equity of laptop product among students of Bogor Agricultural University. Meanwhile, this research had detail purposes are: (1 to analyze usage behavior of laptop product, (2 to analyze brand equity elements (brand awareness, brand association, perceived quality, and brand loyalty among students of Bogor Agricultural University, and (3 to find out the correlation between top of mind and laptop brand that used by students of Bogor Agricultural University. This research used cross sectional study design with total sample were 200 students. The determination of total samples in each faculty used proportional sampling. The process to select sample was executed by convenience sampling that was selection of  the samples based on availability to fill up the questionnaire and interview that appropriated with the quota in each faculty. The brand of laptop that most used and possessed is Acer. The most possessed of laptop by sample during 10 months until 18 months. The most way of buying laptop was bought by parents in new product. On the brand awareness elements of brand product, Acer generally get the better spot then followed by Toshiba, HP Compaq, and Axioo. The testing of brand association with using Cochran test showedthat the smallest association was obtained to Acer brand. It caused the other brand, such as Toshiba, HP Compaq, and Axioo hadall associations that adhere to consumers. The perceived quality that was tested by Customer Satisfaction Index (CSI, referred that index satisfaction of samples about Acer, Toshiba, and Axioo brand had satisfied level. Meanwhile, the samples that used HP Compaq had very satisfied level. The Importance Performance Analysis (IPA showed that only Toshiba brand that was the most excellent in which none atribute which

  18. A Security Architecture for Personal Networks

    NARCIS (Netherlands)

    Jehangir, A.

    2009-01-01

    The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well as wearable computing devices such as belt computers, digital bracelets and bio-medical sensors has created an opportunity to create a wireless network to share information and resources amongst

  19. Wirelessly powered sensor networks and computational RFID

    CERN Document Server

    2013-01-01

    The Wireless Identification and Sensing Platform (WISP) is the first of a new class of RF-powered sensing and computing systems.  Rather than being powered by batteries, these sensor systems are powered by radio waves that are either deliberately broadcast or ambient.  Enabled by ongoing exponential improvements in the energy efficiency of microelectronics, RF-powered sensing and computing is rapidly moving along a trajectory from impossible (in the recent past), to feasible (today), toward practical and commonplace (in the near future). This book is a collection of key papers on RF-powered sensing and computing systems including the WISP.  Several of the papers grew out of the WISP Challenge, a program in which Intel Corporation donated WISPs to academic applicants who proposed compelling WISP-based projects.  The book also includes papers presented at the first WISP Summit, a workshop held in Berkeley, CA in association with the ACM Sensys conference, as well as other relevant papers. The book provides ...

  20. Laptop Multitasking Hinders Classroom Learning for Both Users and Nearby Peers

    Science.gov (United States)

    Sana, Faria; Weston, Tina; Cepeda, Nicholas J.

    2013-01-01

    Laptops are commonplace in university classrooms. In light of cognitive psychology theory on costs associated with multitasking, we examined the effects of in-class laptop use on student learning in a simulated classroom. We found that participants who multitasked on a laptop during a lecture scored lower on a test compared to those who did not…

  1. Analisis Peta Persepsi Pemilihan Atribut Produk Laptop Di Kalangan Mahasiswa Universitas Telkom Kota Bandung (Studi Pada Laptop Acer, Asus, Lenovo, Toshiba, HP, Samsung dan Apple

    Directory of Open Access Journals (Sweden)

    Wiwik Melwinda

    2017-04-01

    Full Text Available This research aims to find out laptop brand selection perceptual map of among Telkom University students. The object of this research study are some of incoming laptop brand in Top Brand 2016 which are Acer, Lenovo, Asus, Toshiba, HP, Samsung and Apple. The attributes of the study are design instrument, operation system, variation, feature set, specification, processor, battery resistance, product price, price resale, warranty, LCD display, storage capacity, product quality, sustainability to defect, and keyboard quality. This research used quantitative method. Research instrument used was a questionnaire, which distributed to 100 respondent sample area of the object of research. In taking a sample of this study, the researcher used Non-Probability technique by using purposive sampling method. The data analysis that used is multidimensional scalling analysis, this analysis gives perception map picture, appeared the position of each laptop brand that is close together or far apart. Laptop brand that showed in a perceptual map will display rank of the best position than another laptop brand. As perception, Apple occupies the first best position among another best laptop brands. That is proved by the rank position from respondents preference based on overall attributes which is more excellent in design, operation system, variation, feature set, specification, processor, battery resistance, product quality, and keyboard quality. For price product attribute is occupied by Lenovo as the cheapest rather than another laptop brands. Meanwhile, for the LCD display attribute, price resale, and storage capacity are occupied by Asus which get the second best rank based overall attribute.

  2. Should laptops be allowed in the classroom? Two viewpoints: viewpoint 1: laptops in classrooms facilitate curricular advancement and promote student learning and viewpoint 2: deconstructing and rethinking the use of laptops in the classroom.

    Science.gov (United States)

    Spallek, Heiko; von Bergmann, HsingChi

    2014-12-01

    This Point/Counterpoint article discusses the pros and cons of deploying one aspect of instructional technology in dental education: the use of laptops in the classroom. Two opposing viewpoints, written by different authors, evaluate the arguments. Viewpoint 1 argues that laptops in classrooms can be a catalyst for rapid curricular advancement and prepare dental graduates for the digital age of dentistry. As dental education is not limited to textual information, but includes skill development in spatial relationships and hands-on training, technology can play a transformative role in students' learning. Carefully implemented instructional technology can enhance student motivation when it transforms students from being the objects of teaching to the subjects of learning. Ubiquitous access to educational material allows for just-in-time learning and can overcome organizational barriers when, for instance, introducing interprofessional education. Viewpoint 2 argues that, in spite of widespread agreement that instructional technology leads to curricular innovation, the notion of the use of laptops in classrooms needs to be deconstructed and rethought when effective learning outcomes are sought. Analyzing the purpose, pedagogy, and learning product while applying lessons learned from K-12 implementation leads to a more complex picture of laptop integration in dental classrooms and forms the basis for questioning the value of such usage. For laptop use to contribute to student learning, rather than simply providing opportunity for students to take notes and access the Internet during class, this viewpoint emphasizes that dental educators need to think carefully about the purpose of this technology and to develop appropriate pedagogical strategies to achieve their objectives. The two viewpoints agree that significant faculty development efforts should precede any introduction of technology into the educational process and that technology alone cannot change education

  3. A GI Proposal to Display ECG Digital Signals Wirelessly Real-time Transmitted onto a Remote PC

    Directory of Open Access Journals (Sweden)

    Marius Corneliu Rosu

    2018-03-01

    Full Text Available The sensors, as wireless communication system, comply the 7-layer model Open Systems Interconnection (OSI. In this paper, a point-to-point transmission model was used. The ECG signal is transmitted from the Router Sensor (RS to an end Coordinator Node (CN plugged-in to the laptop via USB port; RS acquires ECG signal in analogical mode, and is also responsible with sampling, quantization and sending it wirelessly direct to CN. The distance between RS and CN is a single-hop transmission, and does not exceed the range of the XBeeS2Pro transceivers. The communication protocol is ZigBee. Remote viewing of the transmitted signal is performed on a Graphical Interface (GI written under MATLAB, after the signal has been digitized; the choice of MATLAB was motivated by future developments. Particular aspects will be highlighted, so that the reader to be edified about the results obtained during laboratory experiments. Recording demonstrate that the purpose exposed in title has been reached: Direct link in Real-Time was established, and the digital ECG signal received is reconstituted accurately on MATLAB GI; signal received on laptop is compared with the analog signal displayed on oscilloscope.

  4. 78 FR 24775 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2013-04-26

    ... Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers... '826 patent''). The complaint further alleges the existence of a domestic industry. The Commission's...

  5. 77 FR 38826 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2012-06-29

    ... Devices, Portable Music and Data Processing Devices, Computers and Components Thereof, Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers... further alleges the existence of a domestic industry. The Commission's notice of investigation named Apple...

  6. 78 FR 12785 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2013-02-25

    ... Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers... further alleges the existence of a domestic industry. The Commission's notice of investigation named Apple...

  7. Ad Hoc Wireless Networking and Shared Computation for Autonomous Multirobot Systems

    OpenAIRE

    Bevilacqua, Riccardo; Hall, Jason S.; Horning, James; Romano, Marcello

    2009-01-01

    The article of record as published may be located at http://dx.doi.org/10.2514/1.40734 A wireless ad hoc network is introduced that enables inter-robot communication and shared computation among multiple robots with PC/104-based single board computers running the real-time application interface patched Linux operating system. Through the use of IEEE 802.11 ad hoc technology and User Datagram Protocol, each robot is able to exchange data without the need of a centralized router ...

  8. Interactive computation of coverage regions for indoor wireless communication

    Science.gov (United States)

    Abbott, A. Lynn; Bhat, Nitin; Rappaport, Theodore S.

    1995-12-01

    This paper describes a system which assists in the strategic placement of rf base stations within buildings. Known as the site modeling tool (SMT), this system allows the user to display graphical floor plans and to select base station transceiver parameters, including location and orientation, interactively. The system then computes and highlights estimated coverage regions for each transceiver, enabling the user to assess the total coverage within the building. For single-floor operation, the user can choose between distance-dependent and partition- dependent path-loss models. Similar path-loss models are also available for the case of multiple floors. This paper describes the method used by the system to estimate coverage for both directional and omnidirectional antennas. The site modeling tool is intended to be simple to use by individuals who are not experts at wireless communication system design, and is expected to be very useful in the specification of indoor wireless systems.

  9. Portable Integrated Wireless Device Threat Assessment to Aircraft Radio Systems

    Science.gov (United States)

    Salud, Maria Theresa P.; Williams, Reuben A. (Technical Monitor)

    2004-01-01

    An assessment was conducted on multiple wireless local area network (WLAN) devices using the three wireless standards for spurious radiated emissions to determine their threat to aircraft radio navigation systems. The measurement process, data and analysis are provided for devices tested using IEEE 802.11a, IEEE 802.11b, and Bluetooth as well as data from portable laptops/tablet PCs and PDAs (grouping known as PEDs). A comparison was made between wireless LAN devices and portable electronic devices. Spurious radiated emissions were investigated in the radio frequency bands for the following aircraft systems: Instrument Landing System Localizer and Glideslope, Very High Frequency (VHF) Communication, VHF Omnidirectional Range, Traffic Collision Avoidance System, Air Traffic Control Radar Beacon System, Microwave Landing System and Global Positioning System. Since several of the contiguous navigation systems were grouped under one encompassing measurement frequency band, there were five measurement frequency bands where spurious radiated emissions data were collected for the PEDs and WLAN devices. The report also provides a comparison between emissions data and regulatory emission limit.

  10. The pen is mightier than the keyboard: advantages of longhand over laptop note taking.

    Science.gov (United States)

    Mueller, Pam A; Oppenheimer, Daniel M

    2014-06-01

    Taking notes on laptops rather than in longhand is increasingly common. Many researchers have suggested that laptop note taking is less effective than longhand note taking for learning. Prior studies have primarily focused on students' capacity for multitasking and distraction when using laptops. The present research suggests that even when laptops are used solely to take notes, they may still be impairing learning because their use results in shallower processing. In three studies, we found that students who took notes on laptops performed worse on conceptual questions than students who took notes longhand. We show that whereas taking more notes can be beneficial, laptop note takers' tendency to transcribe lectures verbatim rather than processing information and reframing it in their own words is detrimental to learning. © The Author(s) 2014.

  11. Project-X: An Initiative to Increase Student Engagement through Laptops

    Science.gov (United States)

    Deveci, Tanju; Dalton, David; Hassan, Asli; Amer, Saed Taleb; Cubero, Samuel

    2018-01-01

    Today's digital natives enthuse educators to consider the impact of technology on learning and plan proper instruction, involving the use of laptop along with other technologies. However, implementing laptop use in classrooms without adequate support from administration, IT and faculty can have limited benefits. This article presents the results…

  12. The initial response of secondary mathematics teachers to a one-to-one laptop program

    Science.gov (United States)

    Zuber, Edward Nordin; Anderson, Judy

    2013-06-01

    Studies of one-to-one programs consistently report lower use of laptops in mathematics classrooms compared to other subjects but do not elaborate reasons for these observations. This mixed-method study investigated the experiences and beliefs of 28 mathematics teachers at five secondary schools during the second year of the New South Wales Digital Education Revolution laptop program. While some mathematics teachers planned for students to use their laptops up to once a week, most reported less frequent use in the classroom. Teachers were grouped into categories "Non Adopters," "Cautious Adopters," and "Early Adopters" according to reported classroom use of laptops, then analysed for differences in confidence, knowledge, and beliefs relating to technology for teaching and learning mathematics. A prevalent belief limiting laptop use is that students authentically learn mathematics only using pen and paper. Cautious Adopters and Non Adopters expressed beliefs that laptops exacerbate classroom management problems, especially for lower-achieving students. In the context of ability-streamed classes these beliefs effectively ruled out use of laptops for entire classrooms.

  13. Put the Textbooks Away: Preparation and Support for a Middle School One-to-One Laptop Initiative

    Science.gov (United States)

    Maninger, Robert M.; Holden, Mary Elizabeth

    2009-01-01

    This study, conducted in the Southwestern United States, investigated teacher and student uses of tablet laptop computers in a one-to-one initiative involving fifth grade through eighth grade students and their teachers. The campus initiative led to higher than expected technology integration and student-teacher and student-student collaborations.…

  14. The One Laptop School: Equipping Rural Elementary Schools in South India Through Public Private Partnerships

    Directory of Open Access Journals (Sweden)

    Erik Jon Byker

    2015-11-01

    Full Text Available This article reports on a Public Private Partnership (PPP program in South India that provided information and communication technology (ICT to rural elementary schools. The article examined the current status of rural, government-run elementary schools in India by reviewing reports like the Annual Status of Education Report (ASER in India. Challenges like teacher absences, student drop-outs, lack of electricity, lack of separate toilets for genders, and a lack of teaching resources is discussed. To meet these challenges, the article describes the rise in popularity of India’s PPPs. Then the article reports on a case study of a PPP, called the SSA Foundation, which implemented a “one laptop per school” program in rural areas in the Indian States of Karnataka and Tamil Nadu. Using ethnographic data from field research, the case study includes a description of how the students in a rural Karnataka elementary school use their school’s laptop. The school was situated in a small village where most travel was non-motorized. Walking, usually without shoes, was the main form of transportation. A bicycle was considered a luxury. Most villagers worked in the surrounding ragi and millet fields; laboring, often with only simple tool blades. Wood fires were the main source of fuel for cooking. In this village, the school’s laptop became a prized possession. The case study offers a “thick description” (Geertz, 1973 of how the village school’s students used the laptop for learning basic computing skills and for learning English.

  15. Virtual Recruiting Analysis and Process Development Study: Final Report

    Science.gov (United States)

    2017-11-01

    Century, so everyone has a mobile device or tablet . They have access to all this information but sometimes you can’t specifically find the right...Integrated Reporting System MRI Mobile Recruiting Initiative; Laptop and IT solution for recruiters that uses wireless computing with 3G (third-generation...students are given a practice ASVAB (i.e., EST which is loaded on MRI recruiter laptops) and are blueprinted prior to recruiters meeting with parents

  16. Technical and Operational Analysis of the Fortress Secure Wireless Access Bridge (ES-520) in Support of Tactical Military Coalition Operations

    Science.gov (United States)

    2008-03-01

    Postgraduate School’s COASTS international field- testing and thesis research program. B. COASTS 2007 Indonesia, Malaysia , Singapore, Thailand, and the...software tools available for monitoring and testing network throughput. One Dell Laptop was loaded with the IxChariot console as shown in Figure 32...91 J. LAPTOP COMPUTERS As mentioned in the previous section, one dell laptop was loaded with the IxChariot console. Two additional laptop

  17. Development and functional demonstration of a wireless intraoral inductive tongue computer interface for severely disabled persons.

    Science.gov (United States)

    N S Andreasen Struijk, Lotte; Lontis, Eugen R; Gaihede, Michael; Caltenco, Hector A; Lund, Morten Enemark; Schioeler, Henrik; Bentsen, Bo

    2017-08-01

    Individuals with tetraplegia depend on alternative interfaces in order to control computers and other electronic equipment. Current interfaces are often limited in the number of available control commands, and may compromise the social identity of an individual due to their undesirable appearance. The purpose of this study was to implement an alternative computer interface, which was fully embedded into the oral cavity and which provided multiple control commands. The development of a wireless, intraoral, inductive tongue computer was described. The interface encompassed a 10-key keypad area and a mouse pad area. This system was embedded wirelessly into the oral cavity of the user. The functionality of the system was demonstrated in two tetraplegic individuals and two able-bodied individuals Results: The system was invisible during use and allowed the user to type on a computer using either the keypad area or the mouse pad. The maximal typing rate was 1.8 s for repetitively typing a correct character with the keypad area and 1.4 s for repetitively typing a correct character with the mouse pad area. The results suggest that this inductive tongue computer interface provides an esthetically acceptable and functionally efficient environmental control for a severely disabled user. Implications for Rehabilitation New Design, Implementation and detection methods for intra oral assistive devices. Demonstration of wireless, powering and encapsulation techniques suitable for intra oral embedment of assistive devices. Demonstration of the functionality of a rechargeable and fully embedded intra oral tongue controlled computer input device.

  18. A Computer in Your Lap.

    Science.gov (United States)

    Byers, Joseph W.

    1991-01-01

    The most useful feature of laptop computers is portability, as one elementary school principal notes. IBM and Apple are not leaders in laptop technology. Tandy and Toshiba market relatively inexpensive models offering durability, reliable software, and sufficient memory space. (MLH)

  19. The Wireless ATM Architecture

    Directory of Open Access Journals (Sweden)

    R. Palitefka

    1998-06-01

    Full Text Available An overview of the proposed wireless ATM structure is provided. Wireless communication have been developed to a level where offered services can now be extended beyond voice and data. There are already wireless LANs, cordless systems offering data services and mobile data. Wireless LAN systems are basically planned for local, on-promises and in-house networking providing short distance radio or infrared links between computer system. The main challenge of wireless ATM is to harmonise the development of broadband wireless system with service B -ISDN/ATM and ATM LANs, and offer multimedia multiservice features for the support of time-sensitive voice communication, video, desktop multimedia applications, and LAN data traffic for the wireless user.

  20. STS-48 MS Gemar uses laptop during training session in JSC's MB SMS

    Science.gov (United States)

    1991-01-01

    STS-48 Discovery, Orbiter Vehicle (OV) 103, Mission Specialist (MS) Charles D. Gemar, wearing lightweight headset, enters data into a portable laptop computer on the middeck of JSC's Motion Based (MB) Shuttle Mission Simulator (SMS). Gemar is participating in a preflight familiarization session in the MB-SMS located in the Mission Simulation and Training Facility Bldg 5. Visible to Gemar's right is a stowed extravehicular mobility unit (EMU) and on his left are forward locker mockups.

  1. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  2. Introduction of wireless, pen-based computing among visiting nurses in the inner city: a qualitative study.

    Science.gov (United States)

    Wilson, R; Fulmer, T

    1997-01-01

    The purpose of this qualitative study is to understand how a sample of visiting nurses experienced the practice of home health nursing in the inner city and how they perceived the anticipated introduction of wireless, pen-based computing into their practice. Focus groups were held with visiting nurses 1 week before the introduction of the wireless, pen-based computers. The data were analyzed using Strauss and Corbin's (1990) method for concept development. The following central concepts emerged from the focus groups with visiting nurses: "Missing contact in the field," "Consumption of time writing on forms," "Using the computer to help with the practice of home health nursing," and "Home nursing is a lifeline." These concepts, based on the commentaries by visiting nurses, help one to understand the problems encountered by visiting nurses in the delivery of home health care, identify ways to incorporate evolving technologies to enhance nursing practice, and consider approaches to computer skill acquisition.

  3. 77 FR 65580 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers...

    Science.gov (United States)

    2012-10-29

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-856] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers, and Components Thereof AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that the U.S. International...

  4. Wireless-Uplinks-Based Energy-Efficient Scheduling in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Xing Liu

    2015-01-01

    Full Text Available Mobile cloud computing (MCC combines cloud computing and mobile internet to improve the computational capabilities of resource-constrained mobile devices (MDs. In MCC, mobile users could not only improve the computational capability of MDs but also save operation consumption by offloading the mobile applications to the cloud. However, MCC faces the problem of energy efficiency because of time-varying channels when the offloading is being executed. In this paper, we address the issue of energy-efficient scheduling for wireless uplink in MCC. By introducing Lyapunov optimization, we first propose a scheduling algorithm that can dynamically choose channel to transmit data based on queue backlog and channel statistics. Then, we show that the proposed scheduling algorithm can make a tradeoff between queue backlog and energy consumption in a channel-aware MCC system. Simulation results show that the proposed scheduling algorithm can reduce the time average energy consumption for offloading compared to the existing algorithm.

  5. Handheld Devices with Wide-Area Wireless Connectivity: Applications in Astronomy Educational Technology and Remote Computational Control

    Science.gov (United States)

    Budiardja, R. D.; Lingerfelt, E. J.; Guidry, M. W.

    2003-05-01

    Wireless technology implemented with handheld devices has attractive features because of the potential to access large amounts of data and the prospect of on-the-fly computational analysis from a device that can be carried in a shirt pocket. We shall describe applications of such technology to the general paradigm of making digital wireless connections from the field to upload information and queries to network servers, executing (potentially complex) programs and controlling data analysis and/or database operations on fast network computers, and returning real-time information from this analysis to the handheld device in the field. As illustration, we shall describe several client/server programs that we have written for applications in teaching introductory astronomy. For example, one program allows static and dynamic properties of astronomical objects to be accessed in a remote observation laboratory setting using a digital cell phone or PDA. Another implements interactive quizzing over a cell phone or PDA using a 700-question introductory astronomy quiz database, thus permitting students to study for astronomy quizzes in any environment in which they have a few free minutes and a digital cell phone or wireless PDA. Another allows one to control and monitor a computation done on a Beowulf cluster by changing the parameters of the computation remotely and retrieving the result when the computation is done. The presentation will include hands-on demonstrations with real devices. *Managed by UT-Battelle, LLC, for the U.S. Department of Energy under contract DE-AC05-00OR22725.

  6. A Solar Powered Wireless Computer Mouse: Design, Assembly and Preliminary Testing of 15 Prototypes

    NARCIS (Netherlands)

    van Sark, W.G.J.H.M.; Reich, N.H.; Alsema, E.A.; Netten, M.P.; Veefkind, M.; Silvester, S.; Elzen, B.; Verwaal, M.

    2007-01-01

    The concept and design of a solar powered wireless computer mouse has been completed, and 15 prototypes have been successfully assembled. After necessary cutting, the crystalline silicon cells show satisfactory efficiency: up to 14% when implemented into the mouse device. The implemented voltage

  7. Synthesis, characterization and electrochemical performance of ...

    Indian Academy of Sciences (India)

    2017-09-06

    Sep 6, 2017 ... devices (e.g., PC and laptop computers, wireless and mobile phones, camcorders, etc.) .... axis is approximately equal to the charge transfer resistance. (Rct). .... [16] Li Y-X, Gong Z L and Yang Y 2007 J. Power Sour. 174 528.

  8. One-to-One Laptop Programs: Is Transformation Occurring in Mathematics Teaching?

    Science.gov (United States)

    Blackley, Susan; Walker, Rebecca

    2015-01-01

    There is a body of research around the uptake of digital technologies in secondary schools, and a growing body of research specifically designed to investigate the use of one-to-one laptop programs. However this research focused on the initial uptake of the digital technology or initial implementation of a one-to-one (1:1) laptop policy. Given the…

  9. Holidays Come - Passwords Go

    CERN Multimedia

    Computer Security Team

    2011-01-01

    The holiday season is approaching and with it, the best chance of losing your password!!   If you are keen to access your CERN mailbox or other computing facilities at CERN from the Internet café at your hotel, hold on and think twice. Is that local PC trustworthy? Most likely it is not. It might never have been patched, and, thus, has been infected by plenty of computer viruses long time ago. Worse, nasty people might have installed tools which aim at stealing your password once you type it. Therefore, it is better to use your own laptop or mobile phone for such activities. If you decided to connect to CERN from an untrustworthy computer and had typed in your CERN password there – please seriously consider changing your CERN password at http://cern.ch/account as soon as you have access to a trustworthy computer. However, also take care when using your own laptop or mobile device: wireless communication can be intercepted. Many wireless access points, e.g. at airports, do no...

  10. DISA Wireless E-Mail Trial

    National Research Council Canada - National Science Library

    Haney, Steven

    1997-01-01

    .... Correspondingly unique wireless modems were obtained and mated to the PCMCIA slot of notebook computers in the user/evaluation population, consisting of InfoTac and Mobedem wireless modems for use...

  11. School Technology Grows Up.

    Science.gov (United States)

    Vail, Kathleen

    2003-01-01

    Practitioners and researchers in the education technology field asked to give their vision of the future list laptop computers, personal digital assistants, electronic testing, wireless networking, and multimedia technology among the technology advances headed soon for schools. A sidebar lists 12 online resources. (MLF)

  12. Towards Perpetual Energy Operation in Wireless Communication Systems

    KAUST Repository

    Benkhelifa, Fatma

    2017-11-01

    Wireless is everywhere. Smartphones, tablets, laptops, implantable medical devices, and many other wireless devices are massively taking part of our everyday activities. On average, an actively digital consumer has three devices. However, most of these wireless devices are small equipped with batteries that are often limited and need to be replaced or recharged. This fact limits the operating lifetime of wireless devices and presents a major challenge in wireless communication. To improve the perpetual energy operation of wireless communication systems, energy harvesting (EH) from the radio frequency (RF) signals is one promising solution to make the wireless communication systems self-sustaining. Since RF signals are known to transmit information, it is interesting to study when RF signals are simultaneously used to transmit information and scavenge energy, namely simultaneous wireless information and power transfer (SWIPT). In this thesis, we specifically aim to study the SWIPT in multiple-input multiple-output (MIMO) relay communication systems and in cognitive radio (CR) networks. First, we study the SWIPT in MIMO relay systems where the relay harvests the energy from the source and uses partially/fully the harvested energy to forward the signal to the destination. For both the amplify-and-forward (AF) and decode-and-forward (DF) relaying protocols, we consider the ideal scheme where both the energy and information transfer to the relay happen simultaneously, and the practical power splitting and time switching schemes. For each scheme, we aim to maximize the achievable end-to-end rate with a certain energy constraint at the relay. Furthermore, we consider the sum rate maximization problem for the multiuser MIMO DF relay broadcasting channels with multiple EH-enabled relays, and an enhanced low complex solution is proposed based on the block diagonalization method. Finally, we study the energy and data performance of the SWIPT in CR network where either the

  13. Wireless Cybersecurity

    Science.gov (United States)

    2013-04-01

    completely change the entire landscape. For example, under the quantum computing regime, factoring prime numbers requires only polynomial time (i.e., Shor’s...AFRL-OSR-VA-TR-2013-0206 Wireless Cybersecurity Biao Chen Syracuse University April 2013 Final Report DISTRIBUTION A...19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 21-02-2013 FINAL REPORT 01-04-2009 TO 30-11-2012 Wireless Cybersecurity

  14. Noninvasive biosensor and wireless interrogating system for glucose in blood

    Science.gov (United States)

    Varadan, Vijay K.; Whitchurch, Ashwin K.; Sarukesi, K.

    2003-07-01

    Hypoglycemia-abnormal decrease in blood sugar-is a major obstacle in the management of diabetes and prevention of long-term complications, and it may impose serious effects on the brain, including impairment of memory and other cognitive functions. This paper presents the development of a non-invasive sensor with miniaturized telemetry device in a wrist-watch for monitoring glucose concentration in blood. The sensor concept is based on optical chirality of glucose level in the interstitial fluid. The wrist watch consists of a laser power source of the wavelength compatible with the glucose. A nanofilm with specific chirality is placed at the bottom of the watch. The light then passes through the film and illuminates a small area on the skin. It has been documented that there is certain concentration of sugar level is taken by the intertitial fluid from the blood stream and deposit a portion of it at the dead skin. The wrist-watch when in contact with the outer skin of the human will thus monitor the glucose concentration. A wireless monitoring system in the watch then downloads the data from the watch to a Palm or a laptop computer.

  15. A case of a laptop learning campus: how do technology choices affect perceptions?

    Directory of Open Access Journals (Sweden)

    Jennifer Percival

    2009-12-01

    Full Text Available Laptop learning programs have been developed to create ubiquitous online learning environments. Given the infancy of many programs, there is little understanding of aspects of the program are perceived to provide value to faculty and students. This paper focuses on the value proposition (with respect to perceived benefits versus capital investment for undergraduate students in a mandatory, campus-wide, comprehensive laptop learning program. Results indicate that the perceived value of the laptop for technical programs such as science, engineering, and information technology, and liberal arts programs such as business and criminology, justice, and policy studies are significantly different. This difference results in a clear need to use different laptop learning models for each type of program and that a single campus-wide model will likely prove unsatisfactory for most students. A need to better communicate the true value of industry-specific software and skills acquisition is also highlighted.

  16. Wafer-level packaging technology for RF applications based on a rigid low-loss spacer substrate

    NARCIS (Netherlands)

    Polyakov, A.

    2006-01-01

    As mobile portable devices such as cellular system/phones, smart handheld devices and laptop computers acquire wireless connectivity there is a growing demand for greater levels of RF integration. The holy grail of integration is to have a whole set of different components integrated into one chip.

  17. More Technology, Less Learning?

    Science.gov (United States)

    Kulesza, Justin; DeHondt, Gerald, II.; Nezlek, George

    2011-01-01

    Modern information technologies (presentation software, wireless laptop computers, cell phones, etc.) are purported to enhance student learning. Research to date provides an ambivalent and often conflicting set of outcomes about the effectiveness of such technologies in the context of the college classroom. Anecdotal evidence further complicates…

  18. Laptop theft: a case study on effectiveness of security mechanisms in open organizations

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    Organizations rely on physical, technical and procedural mechanisms to protect their physical assets. Of all physical assets, laptops are the probably the most troublesome to protect, since laptops are easy to remove and conceal. Organizations open to the public, such as hospitals and universities,

  19. Computer usage and national energy consumption: Results from a field-metering study

    Energy Technology Data Exchange (ETDEWEB)

    Desroches, Louis-Benoit [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Fuchs, Heidi [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Greenblatt, Jeffery [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Pratt, Stacy [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Willem, Henry [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Claybaugh, Erin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Beraki, Bereket [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Nagaraju, Mythri [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Price, Sarah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Young, Scott [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division

    2014-12-01

    The electricity consumption of miscellaneous electronic loads (MELs) in the home has grown in recent years, and is expected to continue rising. Consumer electronics, in particular, are characterized by swift technological innovation, with varying impacts on energy use. Desktop and laptop computers make up a significant share of MELs electricity consumption, but their national energy use is difficult to estimate, given uncertainties around shifting user behavior. This report analyzes usage data from 64 computers (45 desktop, 11 laptop, and 8 unknown) collected in 2012 as part of a larger field monitoring effort of 880 households in the San Francisco Bay Area, and compares our results to recent values from the literature. We find that desktop computers are used for an average of 7.3 hours per day (median = 4.2 h/d), while laptops are used for a mean 4.8 hours per day (median = 2.1 h/d). The results for laptops are likely underestimated since they can be charged in other, unmetered outlets. Average unit annual energy consumption (AEC) for desktops is estimated to be 194 kWh/yr (median = 125 kWh/yr), and for laptops 75 kWh/yr (median = 31 kWh/yr). We estimate national annual energy consumption for desktop computers to be 20 TWh. National annual energy use for laptops is estimated to be 11 TWh, markedly higher than previous estimates, likely reflective of laptops drawing more power in On mode in addition to greater market penetration. This result for laptops, however, carries relatively higher uncertainty compared to desktops. Different study methodologies and definitions, changing usage patterns, and uncertainty about how consumers use computers must be considered when interpreting our results with respect to existing analyses. Finally, as energy consumption in On mode is predominant, we outline several energy savings opportunities: improved power management (defaulting to low-power modes after periods of inactivity as well as power scaling), matching the rated power

  20. Automatic Supervision And Fault Detection In PV System By Wireless Sensors With Interfacing By Labview Program

    Directory of Open Access Journals (Sweden)

    Yousra M Abbas

    2015-08-01

    Full Text Available In this work a wireless monitoring system are designed for automatic detection localization fault in photovoltaic system. In order to avoid the use of modeling and simulation of the PV system we detected the fault by monitoring the output of each individual photovoltaic panel connected in the system by Arduino and transmit this data wirelessly to laptop then interface it by LabVIEW program which made comparison between this data and the measured data taking from reference module at the same condition. The proposed method is very simple but effective detecting and diagnosing the main faults of a PV system and was experimentally validated and has demonstrated its effectiveness in the detection and diagnosing of main faults present in the DC side of PV system.

  1. Towards the Development of an M-Learning System: A New Stage to Enhance Higher Education

    Directory of Open Access Journals (Sweden)

    Samir Abou El-Seoud

    2009-07-01

    Full Text Available With the availability of high bandwidth wireless channels such as 3G-telecommunication infrastructure and wireless LAN, mobile learning (M-learning is becoming more feasible now. M-learning can be considered as an intersection of online learning and mobile computing. Through wireless devices (such as mobile telephones, Personal Digital Assistants - PDAs, tablet PC, and laptops and wireless applications, M-learning supports an integrated access to Web content and services in education anytime and anywhere. This paper describes the analysis, design, architecture, and experimental development of "Wireless Course Management System (WCMS", that provides a wireless access to course information content. The system allows the use of the wireless Web as a medium to administer, and deliver course content, to support wireless course management, tests and student wireless communications.

  2. 2nd FTRA International Conference on Ubiquitous Computing Application and Wireless Sensor Network

    CERN Document Server

    Pan, Yi; Chao, Han-Chieh; Yi, Gangman

    2015-01-01

    IT changes everyday’s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its special tracks.

  3. Acemind new indoor full duplex optical wireless communication prototype

    Science.gov (United States)

    Bouchet, Olivier; Perrufel, Micheline; Topsu, Suat; Guan, Hongyu

    2016-09-01

    For over a century and Mr. Guglielmo Marconi invention, systems using radio waves have controlled over wireless telecommunication solutions; from Amplitude Modulation (AM) radio products to satellite communications for instance. But beyond an increasingly negative opinion face to radio waves and radio spectrum availability more and more reduced; there is an unprecedented opportunity with LED installation in displays and lighting to provide optical wireless communication solutions. As a result, technologically mature solutions are already commercially available for services such as Location Based Services (LBS), broadcast diffusion or Intelligent Transport Services (ITS). Pending finalization of the standard review process IEEE 802.15.7 r1, our paper presents the results of the European collaborative project named "ACEMIND". It offers an indoor bilateral optical wireless communication prototype having the following characteristics: use of the existing electrical infrastructure, through judicious combination with Light Fidelity (LiFi), Power Line Communication (PLC) and Ethernet to reduce the implementation cost. We propose a bilateral optical wireless communication even when the light is switched off by using Visible Light Communication (VLC) and Infra-Red Communication (IRC) combined to a remote optical switch. Dimensionally optimized LiFi module is presented in order to offer the possibility for integration inside a laptop. Finally, there is operational mechanism implementation such as OFDM/DMT to increase throughput. After the introduction, we will present the results of a market study from Orange Labs customers about their opinion on LiFi components. Then we will detail the LiFi prototype, from the physical layer aspect to MAC layer before concluding on commercial development prospects.

  4. Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    Organizations rely on physical, digital and social mechanisms to protect their IT systems. Of all IT systems, laptops are probably the most troublesome to protect, since they are easy to remove and conceal. When the thief has physical possession of the laptop, it is also difficult to protect the

  5. Laptop theft: a case study on effectiveness of security mechanisms in open organizations

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    Organizations rely on physical, technical and procedural mechanisms to protect their IT systems. Of all IT systems, laptops are the probably the most troublesome to protect, since they are easy to remove and conceal. When the thief has physical possession of the laptop, it is difficult to protect

  6. Real-time community detection in full social networks on a laptop

    Science.gov (United States)

    Chamberlain, Benjamin Paul; Levy-Kramer, Josh; Humby, Clive

    2018-01-01

    For a broad range of research and practical applications it is important to understand the allegiances, communities and structure of key players in society. One promising direction towards extracting this information is to exploit the rich relational data in digital social networks (the social graph). As global social networks (e.g., Facebook and Twitter) are very large, most approaches make use of distributed computing systems for this purpose. Distributing graph processing requires solving many difficult engineering problems, which has lead some researchers to look at single-machine solutions that are faster and easier to maintain. In this article, we present an approach for analyzing full social networks on a standard laptop, allowing for interactive exploration of the communities in the locality of a set of user specified query vertices. The key idea is that the aggregate actions of large numbers of users can be compressed into a data structure that encapsulates the edge weights between vertices in a derived graph. Local communities can be constructed by selecting vertices that are connected to the query vertices with high edge weights in the derived graph. This compression is robust to noise and allows for interactive queries of local communities in real-time, which we define to be less than the average human reaction time of 0.25s. We achieve single-machine real-time performance by compressing the neighborhood of each vertex using minhash signatures and facilitate rapid queries through Locality Sensitive Hashing. These techniques reduce query times from hours using industrial desktop machines operating on the full graph to milliseconds on standard laptops. Our method allows exploration of strongly associated regions (i.e., communities) of large graphs in real-time on a laptop. It has been deployed in software that is actively used by social network analysts and offers another channel for media owners to monetize their data, helping them to continue to provide

  7. Real-time community detection in full social networks on a laptop.

    Directory of Open Access Journals (Sweden)

    Benjamin Paul Chamberlain

    Full Text Available For a broad range of research and practical applications it is important to understand the allegiances, communities and structure of key players in society. One promising direction towards extracting this information is to exploit the rich relational data in digital social networks (the social graph. As global social networks (e.g., Facebook and Twitter are very large, most approaches make use of distributed computing systems for this purpose. Distributing graph processing requires solving many difficult engineering problems, which has lead some researchers to look at single-machine solutions that are faster and easier to maintain. In this article, we present an approach for analyzing full social networks on a standard laptop, allowing for interactive exploration of the communities in the locality of a set of user specified query vertices. The key idea is that the aggregate actions of large numbers of users can be compressed into a data structure that encapsulates the edge weights between vertices in a derived graph. Local communities can be constructed by selecting vertices that are connected to the query vertices with high edge weights in the derived graph. This compression is robust to noise and allows for interactive queries of local communities in real-time, which we define to be less than the average human reaction time of 0.25s. We achieve single-machine real-time performance by compressing the neighborhood of each vertex using minhash signatures and facilitate rapid queries through Locality Sensitive Hashing. These techniques reduce query times from hours using industrial desktop machines operating on the full graph to milliseconds on standard laptops. Our method allows exploration of strongly associated regions (i.e., communities of large graphs in real-time on a laptop. It has been deployed in software that is actively used by social network analysts and offers another channel for media owners to monetize their data, helping them to

  8. Real-time community detection in full social networks on a laptop.

    Science.gov (United States)

    Chamberlain, Benjamin Paul; Levy-Kramer, Josh; Humby, Clive; Deisenroth, Marc Peter

    2018-01-01

    For a broad range of research and practical applications it is important to understand the allegiances, communities and structure of key players in society. One promising direction towards extracting this information is to exploit the rich relational data in digital social networks (the social graph). As global social networks (e.g., Facebook and Twitter) are very large, most approaches make use of distributed computing systems for this purpose. Distributing graph processing requires solving many difficult engineering problems, which has lead some researchers to look at single-machine solutions that are faster and easier to maintain. In this article, we present an approach for analyzing full social networks on a standard laptop, allowing for interactive exploration of the communities in the locality of a set of user specified query vertices. The key idea is that the aggregate actions of large numbers of users can be compressed into a data structure that encapsulates the edge weights between vertices in a derived graph. Local communities can be constructed by selecting vertices that are connected to the query vertices with high edge weights in the derived graph. This compression is robust to noise and allows for interactive queries of local communities in real-time, which we define to be less than the average human reaction time of 0.25s. We achieve single-machine real-time performance by compressing the neighborhood of each vertex using minhash signatures and facilitate rapid queries through Locality Sensitive Hashing. These techniques reduce query times from hours using industrial desktop machines operating on the full graph to milliseconds on standard laptops. Our method allows exploration of strongly associated regions (i.e., communities) of large graphs in real-time on a laptop. It has been deployed in software that is actively used by social network analysts and offers another channel for media owners to monetize their data, helping them to continue to provide

  9. Wireless sensor platform

    Science.gov (United States)

    Joshi, Pooran C.; Killough, Stephen M.; Kuruganti, Phani Teja

    2017-08-08

    A wireless sensor platform and methods of manufacture are provided. The platform involves providing a plurality of wireless sensors, where each of the sensors is fabricated on flexible substrates using printing techniques and low temperature curing. Each of the sensors can include planar sensor elements and planar antennas defined using the printing and curing. Further, each of the sensors can include a communications system configured to encode the data from the sensors into a spread spectrum code sequence that is transmitted to a central computer(s) for use in monitoring an area associated with the sensors.

  10. Exploring Teacher Candidates' Experiences, Beliefs and Attitudes to Technology as an Instructional Learning Tool Following Instruction in a Technology-Rich Classroom

    Science.gov (United States)

    DiPetta, Tony; Woloshyn, Vera

    2009-01-01

    The use of so-called, "smart-classrooms" or "e-classrooms" where students have wireless access to the internet, electronic projection and display systems, laptops and hand-held computers are increasingly seen as a means for instructors and students in higher education to create new and personalized understandings of traditional…

  11. Three Years of the New Mexico Laptop Learning Initiative (NMLLI): Stumbling toward Innovation

    Science.gov (United States)

    Rutledge, David; Duran, James; Carroll-Miranda, Joseph

    2007-01-01

    This article presents qualitative results of the first three years of the New Mexico Laptop Learning Initiative (NMLLI). Results suggest that teachers, students, and their communities support this initiative to improve student learning. Descriptive statistics were used during year two to further understand how the laptops were being used by…

  12. Year One of Project Pulse: Pupils Using Laptops in Science and English. A Final Report. Technical Report No. 26.

    Science.gov (United States)

    McMillan, Katie; Honey, Margaret

    A year-long study was conducted with a class of 25 eighth graders, their English and science teachers, and the school computer supervisor at a school in Roselle (New Jersey). The structure and goals of the project, called PULSE, for Pupils Using Laptops in Science and English, are described. Research questions focused on the development of…

  13. Computational intelligence in wireless sensor networks recent advances and future challenges

    CERN Document Server

    Falcon, Rafael; Koeppen, Mario

    2017-01-01

    This book emphasizes the increasingly important role that Computational Intelligence (CI) methods are playing in solving a myriad of entangled Wireless Sensor Networks (WSN) related problems. The book serves as a guide for surveying several state-of-the-art WSN scenarios in which CI approaches have been employed. The reader finds in this book how CI has contributed to solve a wide range of challenging problems, ranging from balancing the cost and accuracy of heterogeneous sensor deployments to recovering from real-time sensor failures to detecting attacks launched by malicious sensor nodes and enacting CI-based security schemes. Network managers, industry experts, academicians and practitioners alike (mostly in computer engineering, computer science or applied mathematics) benefit from the spectrum of successful applications reported in this book. Senior undergraduate or graduate students may discover in this book some problems well suited for their own research endeavors. USP: Presents recent advances and fu...

  14. LAPTOP OWNERSHIP AND USE AMONG EDUCATORS: REFLECTIONS FROM SCHOOL TEACHERS IN MALAYSIA

    Directory of Open Access Journals (Sweden)

    Mas Nida Md. Khambari

    2009-07-01

    Full Text Available This research explored the experiences of owning and using laptops among three secondary school teachers in Malaysia. They were granted personal laptops by the Ministry of Education through the Teaching and Learning of Science and Mathematics in English, or known as Pengajaran dan Pembelajaran Sains dan Matematik dalam Bahasa Inggeris (PPSMI programme. This document has no comments. PPSMI was aimed at enhancing the teaching of these subjects in English with the aid of technology. The research adopted a case study qualitative approach using semi-structured interviews. Three in-depth interviews were audio recorded in the teachers’ schools, transcribed and analysed. Several themes related to the benefits and challenges of owning and using laptops emerged from these interviews. This paper, therefore, also seeks to discuss these themes in detail.

  15. Spatial Air Index Based on Largest Empty Rectangles for Non-Flat Wireless Broadcast in Pervasive Computing

    Directory of Open Access Journals (Sweden)

    Jun-Hong Shen

    2016-11-01

    Full Text Available In pervasive computing, location-based services (LBSs are valuable for mobile clients based on their current locations. LBSs use spatial window queries to enable useful applications for mobile clients. Based on skewed access patterns of mobile clients, non-flat wireless broadcast has been shown to efficiently disseminate spatial objects to mobile clients. In this paper, we consider a scenario in which spatial objects are broadcast to mobile clients over a wireless channel in a non-flat broadcast manner to process window queries. For such a scenario, we propose an efficient spatial air index method to handle window query access in non-flat wireless broadcast environments. The concept of largest empty rectangles is used to avoid unnecessary examination of the broadcast content, thus reducing the processing time for window queries. Simulation results show that the proposed spatial air index method outperforms the existing methods under various settings.

  16. Balancing the One-to-One Equation: Equity and Access in Three Laptop Programs

    Science.gov (United States)

    Warschauer, Mark; Zheng, Binbin; Niiya, Melissa; Cotten, Shelia; Farkas, George

    2014-01-01

    Seeking to improve teaching and learning and to narrow gaps between students of high and low socioeconomic status, many school districts in the United States are implementing one-to-one laptop programs. In this comparative case study, we examine one-to-one laptop programs in Colorado, California, and Alabama, all of which deployed low-cost netbook…

  17. Multimodal Transportation: The Case of Laptop from Chongqing in China to Rotterdam in Europe

    Directory of Open Access Journals (Sweden)

    Young Joon Seo

    2017-09-01

    Full Text Available Multimodal transportation is a key component of modern logistics systems, especially for long-distance transnational transportation. This paper explores the various alternative routes for laptop exports from Chongqing, China to Rotterdam, the Netherlands. It selects seven available routes for laptop transportation from Chongqing to Rotterdam. The multimodal model was adopted to demonstrate alternative routes using various factors such as transport cost, transfer cost, transit time, transport distance, document charge, port congestion surcharge, customs charge, confidence index and so on. Among possible alternative routes, the results indicate that the route 6 was the fastest routes except for the air transport (route 7, while the route 1 was the cheapest and safest way. Nonetheless, route 1 may be not suitable for the laptop transport due to the importance of timeliness. The logisticians may able to utilize this research's findings to make a balance between transit time and transport cost for effective multimodal transport of laptops from Chongqing to Rotterdam.

  18. Thermal burns on lower limb resulting from laptop use: A case report and review of literature

    Directory of Open Access Journals (Sweden)

    Nebu C Jacob

    2014-01-01

    Full Text Available We report a case of a 29-year-old man with a background history of incomplete quadriplegia, who sustained a second degree thermal burn of the lower limb from prolonged proximity to the extractor fan of his laptop. We have also reviewed all other reported cases of thermal burns associated with laptop use. This literature review highlights the variability in the extent of injury and the subsequent management of laptop induced burns.

  19. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  20. Graphite Girls in a Gigabyte World: Managing the World Wide Web in 700 Square Feet

    Science.gov (United States)

    Ogletree, Tamra; Saurino, Penelope; Johnson, Christie

    2009-01-01

    Our action research project examined the on-task and off-task behaviors of university-level student, use of wireless laptops in face-to-face classes in order to establish rules of wireless laptop etiquette in classroom settings. Participants in the case study of three university classrooms included undergraduate, graduate, and doctoral students.…

  1. Introducing laptops to children: An examination of ubiquitous computing in Grade 3 reading, language, and mathematics

    Directory of Open Access Journals (Sweden)

    Robert M. Bernard

    2008-05-01

    Full Text Available This study examines the achievement outcomes accompanying the implementation of a Grade 3 laptop or so-called ubiquitous computing program in a Quebec school district. CAT-3 reading, language, and mathematics batteries were administered at the end of Grade 2 and again at the end of Grade 3, after the first year of computer implementation. Overall gain was found in all three content areas, but was differential when compared with the norms of the CAT-3. Additionally, some evidence suggested a differential gain for lower and middle-level learners during the school year. Teachers were administered an instrument called the Technology Implementation Questionnaire (TIQ that assessed the purposes and extent of technology integration. Negative correlations were found in reading achievement gain for items associated with the higher use of communicative, evaluative, and creative uses of computers. Open-ended teacher responses indicated the need for more professional support for instructional implementations of computing. Résumé: Cette étude examine les performances accompagnant l’implantation d’un programme d’ordinateurs portables en 3 ième année du primaire, aussi appelé programme d’ubiquité computationnelle, dans une école d’un district scolaire du Québec. Des batteries de tests, CAT-3 en lecture, en langue et en mathématiques ont été administrées à la fin de la deuxième année du primaire et une autre fois à la fin de la troisième année du primaire, après un an d’implantation des ordinateurs. Un gain fut observé dans les trois matières, mais était différencié lorsque comparé aux normes du CAT-3. De plus, un gain différencié fut mis en évidence pour les apprenants de niveau inférieur et moyen durant l’année scolaire. Les enseignants ont rempli le Technology Implementation Questionnaire (TIQ qui mesure le but et l’étendue de l’intégration technologique. Des corrélations négatives ont été trouvées en

  2. Radiofrequency exposure from wireless LANs utilizing Wi-Fi technology.

    Science.gov (United States)

    Foster, Kenneth R

    2007-03-01

    This survey measured radiofrequency (RF) fields from wireless local area networks (WLANs) using Wi-Fi technology against a background of RF fields in the environment over the frequency range 75 MHz-3 GHz. A total of 356 measurements were conducted at 55 sites (including private residences, commercial spaces, health care and educational institutions, and other public spaces) in four countries (U.S., France, Germany, Sweden). Measurements were conducted under conditions that would result in the higher end of exposures from such systems. Where possible, measurements were conducted in public spaces as close as practical to the Wi-Fi access points. Additional measurements were conducted at a distance of approximately 1 m from a laptop while it was uploading and downloading large files to the WLAN. This distance was chosen to allow a useful comparison of fields in the far-field of the antenna in the laptop, and give a representative measure of the exposure that a bystander might receive from the laptop. The exposure to the user, particularly if the antenna of the client card were placed against his or her body, would require different measurement techniques beyond the scope of this study. In all cases, the measured Wi-Fi signal levels were very far below international exposure limits (IEEE C95.1-2005 and ICNIRP) and in nearly all cases far below other RF signals in the same environments. An discusses technical aspects of the IEEE 802.11 standard on which WLANs operate that are relevant to determining the levels of RF energy exposure from WLANs. Important limiting factors are the low operating power of client cards and access points, and the low duty cycle of transmission that normally characterizes their operation.

  3. Real-time monitoring of ubiquitous wireless ECG sensor node for medical care using ZigBee

    Science.gov (United States)

    Vijayalakshmi, S. R.; Muruganand, S.

    2012-01-01

    Sensor networks have the potential to impact many aspects of medical care greatly. By outfitting patients with wireless, wearable vital sign sensors, collecting detailed real-time data on physiological status can be greatly simplified. In this article, we propose the system architecture for smart sensor platform based on advanced wireless sensor networks. An emerging application for wireless sensor networks involves their use in medical care. In hospitals or clinics, outfitting every patient with tiny, wearable wireless vital sign sensors would allow doctors, nurses and other caregivers to continuously monitor the status of their patients. In an emergency or disaster scenario, the same technology would enable medics to more effectively care for a large number of casualties. First responders could receive immediate notifications on any changes in patient status, such as respiratory failure or cardiac arrest. Wireless sensor network is a set of small, autonomous devices, working together to solve different problems. It is a relatively new technology, experiencing true expansion in the past decade. People have realised that integration of small and cheap microcontrollers with sensors can result in the production of extremely useful devices, which can be used as an integral part of the sensor nets. These devices are called sensor nodes. Today, sensor nets are used in agriculture, ecology and tourism, but medicine is the area where they certainly meet the greatest potential. This article presents a medical smart sensor node platform. This article proposes a wireless two-lead EKG. These devices collect heart rate and EKG data and relay it over a short-range (300 m) wireless network to any number of receiving devices, including PDAs, laptops or ambulance-based terminals.

  4. User Interaction with Inverted-F Antennas Integrated into Laptop PCMCIA Cards

    Directory of Open Access Journals (Sweden)

    J. Guterman

    2008-06-01

    Full Text Available This paper evaluates the overall laptop integration effects on the performance of commercial 2.4 GHz Inverted-F antennas built into PCMCIA cards. A generic laptop model is used to represent the antenna housing effects while an anatomical shape homogenous human model is used to estimate the electromagnetic interaction between the antenna and the user. The antenna performance is evaluated for different card locations in terms of reflection coefficient, far-field gain pattern and radiation efficiency. The human exposure to EM radiation is analyzed in terms of Specific Absorption Rate.

  5. [A wireless smart home system based on brain-computer interface of steady state visual evoked potential].

    Science.gov (United States)

    Zhao, Li; Xing, Xiao; Guo, Xuhong; Liu, Zehua; He, Yang

    2014-10-01

    Brain-computer interface (BCI) system is a system that achieves communication and control among humans and computers and other electronic equipment with the electroencephalogram (EEG) signals. This paper describes the working theory of the wireless smart home system based on the BCI technology. We started to get the steady-state visual evoked potential (SSVEP) using the single chip microcomputer and the visual stimulation which composed by LED lamp to stimulate human eyes. Then, through building the power spectral transformation on the LabVIEW platform, we processed timely those EEG signals under different frequency stimulation so as to transfer them to different instructions. Those instructions could be received by the wireless transceiver equipment to control the household appliances and to achieve the intelligent control towards the specified devices. The experimental results showed that the correct rate for the 10 subjects reached 100%, and the control time of average single device was 4 seconds, thus this design could totally achieve the original purpose of smart home system.

  6. The wireless Web and patient care.

    Science.gov (United States)

    Bergeron, B P

    2001-01-01

    Wireless computing, when integrated with the Web, is poised to revolutionize the practice and teaching of medicine. As vendors introduce wireless Web technologies in the medical community that have been used successfully in the business and consumer markets, clinicians can expect profound increases in the amount of patient data, as well as the ease with which those data are acquired, analyzed, and disseminated. The enabling technologies involved in this transformation to the wireless Web range from the new generation of wireless PDAs, eBooks, and wireless data acquisition peripherals to new wireless network protocols. The rate-limiting step in the application of this technology in medicine is not technology per se but rather how quickly clinicians and their patients come to accept and appreciate the benefits and limitations of the application of wireless Web technology.

  7. Educational laptops in public schools: digital literacy and possibilities of transforming pedagogical practices

    Directory of Open Access Journals (Sweden)

    Carla Beatris Valentini

    2013-01-01

    Full Text Available The presence of educational laptops in the routine of students and teachers might contribute for the construction of innovative alternatives for the teaching practice. With that in mind, this paper starts with the idea that the insertion of educational laptops in 1:1 model might be a disturbing element, triggering a process of reflection and awareness of the teaching practice on teachers themselves. That could lead to redimensioning the pedagogical practice in a movement towards including the laptop significantly in the school routine. We present a case study from an exploratory perspective about the insertion of laptops in a public school (from elementary to junior high, analyzing the process of digital literacy taking place in that school community. In that sense, digital literacy implies on the interaction in social networks that allow exploration and research, teaching and criticizing in a construction process of learning and knowing mediated by digital technologies. To do so, from the non-linearity that accompanies the communication flows emerging from these technologies, students and teachers are instigated to find new meanings, where reading and writing consist in sharing knowledge and opinions and not only an assignment to hand in.

  8. On-line structural damage localization and quantification using wireless sensors

    International Nuclear Information System (INIS)

    Hsu, Ting-Yu; Huang, Shieh-Kung; Lu, Kung-Chung; Loh, Chin-Hsiung; Wang, Yang; Lynch, Jerome Peter

    2011-01-01

    In this paper, a wireless sensing system is designed to realize on-line damage localization and quantification of a structure using a frequency response function change method (FRFCM). Data interrogation algorithms are embedded in the computational core of the wireless sensing units to extract the necessary structural features, i.e. the frequency spectrum segments around eigenfrequencies, automatically from measured structural response for the FRFCM. Instead of the raw time history of the structural response, the extracted compact structural features are transmitted to the host computer. As a result, with less data transmitted from the wireless sensors, the energy consumed by the wireless transmission is reduced. To validate the performance of the proposed wireless sensing system, a six-story steel building with replaceable bracings in each story is instrumented with the wireless sensors for on-line damage detection during shaking table tests. The accuracy of the damage detection results using the wireless sensing system is verified through comparison with the results calculated from data recorded of a traditional wired monitoring system. The results demonstrate that, by taking advantage of collocated computing resources in wireless sensors, the proposed wireless sensing system can locate and quantify damage with acceptable accuracy and moderate energy efficiency

  9. The Radio Frequency Health Node Wireless Sensor System

    Science.gov (United States)

    Valencia, J. Emilio; Stanley, Priscilla C.; Mackey, Paul J.

    2009-01-01

    The Radio Frequency Health Node (RFHN) wireless sensor system differs from other wireless sensor systems in ways originally intended to enhance utility as an instrumentation system for a spacecraft. The RFHN can also be adapted to use in terrestrial applications in which there are requirements for operational flexibility and integrability into higher-level instrumentation and data acquisition systems. As shown in the figure, the heart of the system is the RFHN, which is a unit that passes commands and data between (1) one or more commercially available wireless sensor units (optionally, also including wired sensor units) and (2) command and data interfaces with a local control computer that may be part of the spacecraft or other engineering system in which the wireless sensor system is installed. In turn, the local control computer can be in radio or wire communication with a remote control computer that may be part of a higher-level system. The remote control computer, acting via the local control computer and the RFHN, cannot only monitor readout data from the sensor units but can also remotely configure (program or reprogram) the RFHN and the sensor units during operation. In a spacecraft application, the RFHN and the sensor units can also be configured more nearly directly, prior to launch, via a serial interface that includes an umbilical cable between the spacecraft and ground support equipment. In either case, the RFHN wireless sensor system has the flexibility to be configured, as required, with different numbers and types of sensors for different applications. The RFHN can be used to effect realtime transfer of data from, and commands to, the wireless sensor units. It can also store data for later retrieval by an external computer. The RFHN communicates with the wireless sensor units via a radio transceiver module. The modular design of the RFHN makes it possible to add radio transceiver modules as needed to accommodate additional sets of wireless sensor

  10. Laptops vs. Desktops in a Google Groups Environment: A Study on Collaborative Learning

    Directory of Open Access Journals (Sweden)

    Steven Lopes Abrantes

    2011-01-01

    Full Text Available Current literature on m-learning refers to the lack of studies on real use of m-learning applications and how they can compete with current desktop counterparts. The study consists of an experiment involving one hundred and twelve students of higher education and a set of learning activities that they have to accomplish. This study has the main objective to validate if the students that use laptops or desktops are in the flow experience and which of them are more in the flow experience, when using Google Groups. The used approach is based on the flow experience introduced by [1]. It was possible to conclude that students have experienced the flow state both by students using laptops or desktops, but having the laptop students a more positive effect in the flow experience.

  11. Wired vs. Wireless.

    Science.gov (United States)

    Fielding, Randall

    2000-01-01

    Presents a debate on which technology will be in tomorrow's classrooms and the pros and cons of wiring classrooms and using a wireless network. Concluding comments address the likelihood, and desirability, of placing computers throughout the entire educational process and what types of computers and capabilities are needed. (GR)

  12. An Ethical Dilemma: Talking about Plagiarism and Academic Integrity in the Digital Age

    Science.gov (United States)

    Thomas, Ebony Elizabeth; Sassi, Kelly

    2011-01-01

    Today, many students not only access the Internet through desktop and laptop computers at home or at school but also have copious amounts of information at their fingertips via portable devices (e.g., iPods, iPads, netbooks, smartphones). While some teachers welcome the proliferation of portable technologies and easy wireless Internet access, and…

  13. A Multi-Vehicles, Wireless Testbed for Networked Control, Communications and Computing

    Science.gov (United States)

    Murray, Richard; Doyle, John; Effros, Michelle; Hickey, Jason; Low, Steven

    2002-03-01

    We have constructed a testbed consisting of 4 mobile vehicles (with 4 additional vehicles being completed), each with embedded computing and communications capability for use in testing new approaches for command and control across dynamic networks. The system is being used or is planned to be used for testing of a variety of communications-related technologies, including distributed command and control algorithms, dynamically reconfigurable network topologies, source coding for real-time transmission of data in lossy environments, and multi-network communications. A unique feature of the testbed is the use of vehicles that have second order dynamics. Requiring real-time feedback algorithms to stabilize the system while performing cooperative tasks. The testbed was constructed in the Caltech Vehicles Laboratory and consists of individual vehicles with PC-based computation and controls, and multiple communications devices (802.11 wireless Ethernet, Bluetooth, and infrared). The vehicles are freely moving, wheeled platforms propelled by high performance dotted fairs. The room contains an access points for an 802.11 network, overhead visual sensing (to allow emulation of CI'S signal processing), a centralized computer for emulating certain distributed computations, and network gateways to control and manipulate communications traffic.

  14. Can laptops be left inside passenger bags if motion imaging is used in X-ray security screening?

    Science.gov (United States)

    Mendes, Marcia; Schwaninger, Adrian; Michel, Stefan

    2013-01-01

    This paper describes a study where a new X-ray machine for security screening featuring motion imaging (i.e., 5 views of a bag are shown as an image sequence) was evaluated and compared to single view imaging available on conventional X-ray screening systems. More specifically, it was investigated whether with this new technology X-ray screening of passenger bags could be enhanced to such an extent that laptops could be left inside passenger bags, without causing a significant impairment in threat detection performance. An X-ray image interpretation test was created in four different versions, manipulating the factors packing condition (laptop and bag separate vs. laptop in bag) and display condition (single vs. motion imaging). There was a highly significant and large main effect of packing condition. When laptops and bags were screened separately, threat item detection was substantially higher. For display condition, a medium effect was observed. Detection could be slightly enhanced through the application of motion imaging. There was no interaction between display and packing condition, implying that the high negative effect of leaving laptops in passenger bags could not be fully compensated by motion imaging. Additional analyses were carried out to examine effects depending on different threat categories (guns, improvised explosive devices, knives, others), the placement of the threat items (in bag vs. in laptop) and viewpoint (easy vs. difficult view). In summary, although motion imaging provides an enhancement, it is not strong enough to allow leaving laptops in bags for security screening.

  15. Can laptops be left inside passenger bags if motion imaging is used in X-ray security screening?

    Directory of Open Access Journals (Sweden)

    Marcia eMendes

    2013-10-01

    Full Text Available This paper describes a study where a new X-ray machine for security screening featuring motion imaging (i.e. 5 views of a bag are shown as an image sequence was evaluated and compared to single view imaging available on conventional X-ray screening systems. More specifically, it was investigated whether with this new technology X-ray screening of passenger bags could be enhanced to such an extent that laptops could be left inside passenger bags, without causing a significant impairment in threat detection performance. An X-ray image interpretation test was created in four different versions, manipulating the factors packing condition (laptop and bag separate vs. laptop in bag and display condition (single vs. motion imaging. There was a highly significant and large main effect of packing condition. When laptops and bags were screened separately, threat item detection was substantially higher. For display condition, a medium effect was observed. Detection could be slightly enhanced through the application of motion imaging. There was no interaction between display and packing condition, implying that the high negative effect of leaving laptops in passenger bags could not be fully compensated by motion imaging. Additional analyses were carried out to examine effects depending on different threat categories (guns, improvised explosive devices, knives, others, the placement of the threat items (in bag vs. in laptop and viewpoint (easy vs. difficult view. In summary, although motion imaging provides an enhancement, it is not strong enough to allow leaving laptops in bags for security screening.

  16. Design And Planning Of E- Learning EnvironmentE-Education System On Heterogeneous Wireless Network Control System

    Directory of Open Access Journals (Sweden)

    ThandarOo

    2015-06-01

    Full Text Available Abstract The purpose of this research is to provide a more efficient and effective communication method between teacher and student with the use of heterogeneous network. Moreover the effective use of heterogeneous network can be emphasized. The system of e-education can develop utilizing wireless network.The e-Education system can help students to communicate with their teacher more easily and effectively using a heterogeneous wireless network system. In this wireless network system students who are blind or dumb will also be able to communicate and learn from the teacher as normal students can do. All the devices or laptops will be connected on wireless LAN. Even when the teacher is not around he will be able to help his students with their study or give instructions easily by using the mobile phone to send text or voice signal. When the teacher sends information to the dumb student it will be converted into sign language for the student to be able to understand. When the dumb student sends the information to the teacher it will be converted into text for the teacher to understand. For the blind student text instructions from the teacher will be converted into audio signal using text-to-speech conversion.Thus the performance of heterogeneous wireless network model can evaluate by using Robust Optimization Method. Therefore the e-Education systems performance improves by evaluating Robust Optimization Method.

  17. Integrated 3d printed wireless sensing system for environmental monitoring

    KAUST Repository

    Farooqui, Muhammad Fahad

    2017-12-21

    Disclosed are various embodiments of a wireless sensor device for monitoring environment conditions. A wireless sensor device may comprise, for example, a computing device, printable circuitry, sensors, and antennas combined with one or more transmitters on a panel. The wireless sensor device may be configured to take environment measurements, such as temperature, gas, humidity, and wirelessly communicate the environment measurements to a remote computing device, in addition, the present disclosure relates to a method of assembling the wireless sensor device. The method may comprise printing sensors, circuitry, and antennas to a panel; folding the panel to form an enclosure comprising a plurality of side panels; and attaching the plurality of side panels to a circuit board panel.

  18. Efficient Gatherings in Wireless Sensor Networks Using Distributed Computation of Connected Dominating Sets

    Directory of Open Access Journals (Sweden)

    Vincent BOUDET

    2012-03-01

    Full Text Available In this paper, we are interested in enhancing lifetime of wireless sensor networks trying to collect data from all the nodes to a “sink”-node for non-safety critical applications. Connected Dominating Sets are used as a basis for routing messages to the sink. We present a simple distributed algorithm, which computes several CDS trying to distribute the consumption of energy over all the nodes of the network. The simulations show a significant improvement of the network lifetime.

  19. Design and development of Solar Powered Wireless Telemetering System (SPWTS) for Environmental Radiation Monitoring (ERM) of nuclear power plants

    International Nuclear Information System (INIS)

    Mariappan, Bhuvaneswari; Ramachandran, Shanmugalakshmi

    2014-01-01

    Presently, the real time environmental radiation monitoring system installed in the nuclear power plant is based on LAN. Generally data from the surveillance instrument are collected at regular intervals using a lap-top or system/units and taken to the laboratory for downloading the archival data. So a need was felt to design and develop Solar powered Wireless Telemetering System (SPWTS) for Environmental Radiation Monitoring (ERM) of Nuclear Power Plants. SPWTS is used for real-time monitoring and wireless transmission of the on-line data to the Central Control Unit (CCU) to investigate the history of monitored data. Thus, in this paper a wireless mode using Zigbee is proposed, thereby improving scalability, flexibility and continuous radiological surveillance along with data archival facility. The proposed Solar Powered Wireless Telemetering System (SPWTS) comprising of transmitter, intermediate devices and receiver units transmits the ERM data to Central Control Unit (CCU) for storage and display to RADAS unit. In order to meet the coverage distance without data loss, suitable number of repeaters/routers are configured and joined in the network. The entire wireless telemetry system is powered up by solar cells with rechargeable battery backup facility, SPWTS suitable for ERM data transmission module will replace the wired Ethernet environment by wireless mode thereby improving scalability, flexibility and continuous radiological surveillance of the gamma dose monitoring. This module also proposes solutions for wireless transmission of safety related critical data to a remote control unit. Finally, this module promotes interoperability within hierarchical framework by reducing the amount of changes that could be introduced into the existing system. (author)

  20. Wireless Testbed Bonsai

    Science.gov (United States)

    2006-02-01

    wireless sensor device network, and a about 200 Stargate nodes higher-tier multi-hop peer- to-peer 802.11b wireless network. Leading up to the full ExScal...deployment, we conducted spatial scaling tests on our higher-tier protocols on a 7 × 7 grid of Stargates nodes 45m and with 90m separations respectively...onW and its scaled version W̃ . III. EXPERIMENTAL SETUP Description of Kansei testbed. A stargate is a single board linux-based computer [7]. It uses a

  1. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  2. Simulation of Wireless Digital Communication Systems

    Directory of Open Access Journals (Sweden)

    A. Mohammed

    2004-12-01

    Full Text Available Due to the explosive demands for high speed wireless services, suchas wireless Internet, email and cellular video conferencing, digitalwireless communications has become one of the most exciting researchtopics in electrical and electronic engineering field. The never-endingdemand for such personal and multimedia services, however, demandstechnologies operating at higher data rates and broader bandwidths. Inaddition, the complexity of wireless communication and signalprocessing systems has grown considerably during the past decade.Therefore, powerful computer­aided techniques are required for theprocess of modeling, designing, analyzing and evaluating theperformance of digital wireless communication systems. In this paper wediscuss the basic propagation mechanisms affecting the performance ofwireless communication systems, and present a simple, powerful andefficient way to simulate digital wireless communication systems usingMatlab. The simulated results are compared with the theoreticalanalysis to validate the simulator. The simulator is useful inevaluating the performance of wireless multimedia services and theassociated signal processing structures and algorithms for current andnext generation wireless mobile communication systems.

  3. Voice Quality Estimation in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Petr Zach

    2015-01-01

    Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.

  4. 78 FR 34669 - Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data...

    Science.gov (United States)

    2013-06-10

    ..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... importing wireless communication devices, portable music and data processing devices, and tablet computers... certain electronic devices, including wireless communication devices, portable music and data processing...

  5. Comparison of Technology Use between Biology and Physics Teachers in a 1:1 Laptop Environment

    Science.gov (United States)

    Crook, Simon J.; Sharma, Manjula D.; Wilson, Rachel

    2015-01-01

    Using a mixed-methods approach the authors compared the associated practices of senior physics teachers (n = 7) and students (n = 53) in a 1:1 laptop environment with those of senior biology teachers (n = 10) and students (n = 125) also in a 1:1 laptop environment, in seven high schools in Sydney, NSW, Australia. They found that the physics…

  6. Perancangan Sistem Pakar Pendiagnosis Kerusakan Laptop di "Dinar Comp" Berbasis Web dengan PHP dan MySQL

    Directory of Open Access Journals (Sweden)

    Wandri Okki Saputra

    2014-01-01

    Full Text Available Saat sekarang ini laptop sudah menjadi kebutuhan di kalangan pelajar, mahasiswa, karyawan dan profesi lainya. Suatu saat laptop tersebut akan mengalami kerusakan dan diperlukan seorang pakar untuk mendiagnosis kerusakan tersebut. Aplikasi sistem pakar merupakan salah satu aplikasi untuk diagnosis kerusakan laptop seperti kemampuan seorang pakar. Dengan adanya sistem pakar, dapat membantu pengguna untuk bisa mendiagnosis kerusakan laptop tanpa harus di diagnosis oleh pakar. Dalam perancangan aplikasi, metode yang digunakan adalah metode waterfall. Metode ini sangat tepat dalam pembuatan aplikasi seperti ini karena mempunyai alur yang memungkinkan perancang untuk mengevaluasi aplikasi tanpa harus mengubah dari dasar. Sedangkan tahapan dalam pembuatan aplikasi ini menggunakan beberapa tahap yaitu studi pustaka dan bimbingan, pengambilan data dan analisa (wawancara, pengamatan dan berkas informasi, perancangan, pembuatan sistem dan terakhir implementasi. Berdasarkan hasil pengujian alpha dan betha, aplikasi yang dibangun sudah berjalan cukup maksimal, tetapi tidak menutup kemungkinan dapat terjadi kesalahan dan kekurangan pada saat aplikasi digunakan.

  7. [Mobile phone-computer wireless interactive graphics transmission technology and its medical application].

    Science.gov (United States)

    Huang, Shuo; Liu, Jing

    2010-05-01

    Application of clinical digital medical imaging has raised many tough issues to tackle, such as data storage, management, and information sharing. Here we investigated a mobile phone based medical image management system which is capable of achieving personal medical imaging information storage, management and comprehensive health information analysis. The technologies related to the management system spanning the wireless transmission technology, the technical capabilities of phone in mobile health care and management of mobile medical database were discussed. Taking medical infrared images transmission between phone and computer as an example, the working principle of the present system was demonstrated.

  8. Off the Shelf Cloud Robotics for the Smart Home: Empowering a Wireless Robot through Cloud Computing

    Directory of Open Access Journals (Sweden)

    Javier Ramírez De La Pinta

    2017-03-01

    Full Text Available In this paper, we explore the possibilities offered by the integration of home automation systems and service robots. In particular, we examine how advanced computationally expensive services can be provided by using a cloud computing approach to overcome the limitations of the hardware available at the user’s home. To this end, we integrate two wireless low-cost, off-the-shelf systems in this work, namely, the service robot Rovio and the home automation system Z-wave. Cloud computing is used to enhance the capabilities of these systems so that advanced sensing and interaction services based on image processing and voice recognition can be offered.

  9. Off the Shelf Cloud Robotics for the Smart Home: Empowering a Wireless Robot through Cloud Computing.

    Science.gov (United States)

    Ramírez De La Pinta, Javier; Maestre Torreblanca, José María; Jurado, Isabel; Reyes De Cozar, Sergio

    2017-03-06

    In this paper, we explore the possibilities offered by the integration of home automation systems and service robots. In particular, we examine how advanced computationally expensive services can be provided by using a cloud computing approach to overcome the limitations of the hardware available at the user's home. To this end, we integrate two wireless low-cost, off-the-shelf systems in this work, namely, the service robot Rovio and the home automation system Z-wave. Cloud computing is used to enhance the capabilities of these systems so that advanced sensing and interaction services based on image processing and voice recognition can be offered.

  10. Multimedia information processing in the SWAN mobile networked computing system

    Science.gov (United States)

    Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John

    1996-03-01

    Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.

  11. Adaptive Wavelet Coding Applied in a Wireless Control System.

    Science.gov (United States)

    Gama, Felipe O S; Silveira, Luiz F Q; Salazar, Andrés O

    2017-12-13

    Wireless control systems can sense, control and act on the information exchanged between the wireless sensor nodes in a control loop. However, the exchanged information becomes susceptible to the degenerative effects produced by the multipath propagation. In order to minimize the destructive effects characteristic of wireless channels, several techniques have been investigated recently. Among them, wavelet coding is a good alternative for wireless communications for its robustness to the effects of multipath and its low computational complexity. This work proposes an adaptive wavelet coding whose parameters of code rate and signal constellation can vary according to the fading level and evaluates the use of this transmission system in a control loop implemented by wireless sensor nodes. The performance of the adaptive system was evaluated in terms of bit error rate (BER) versus E b / N 0 and spectral efficiency, considering a time-varying channel with flat Rayleigh fading, and in terms of processing overhead on a control system with wireless communication. The results obtained through computational simulations and experimental tests show performance gains obtained by insertion of the adaptive wavelet coding in a control loop with nodes interconnected by wireless link. These results enable the use of this technique in a wireless link control loop.

  12. Adaptive Wavelet Coding Applied in a Wireless Control System

    Directory of Open Access Journals (Sweden)

    Felipe O. S. Gama

    2017-12-01

    Full Text Available Wireless control systems can sense, control and act on the information exchanged between the wireless sensor nodes in a control loop. However, the exchanged information becomes susceptible to the degenerative effects produced by the multipath propagation. In order to minimize the destructive effects characteristic of wireless channels, several techniques have been investigated recently. Among them, wavelet coding is a good alternative for wireless communications for its robustness to the effects of multipath and its low computational complexity. This work proposes an adaptive wavelet coding whose parameters of code rate and signal constellation can vary according to the fading level and evaluates the use of this transmission system in a control loop implemented by wireless sensor nodes. The performance of the adaptive system was evaluated in terms of bit error rate (BER versus E b / N 0 and spectral efficiency, considering a time-varying channel with flat Rayleigh fading, and in terms of processing overhead on a control system with wireless communication. The results obtained through computational simulations and experimental tests show performance gains obtained by insertion of the adaptive wavelet coding in a control loop with nodes interconnected by wireless link. These results enable the use of this technique in a wireless link control loop.

  13. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  14. A new type of intelligent wireless sensing network for health monitoring of large-size structures

    Science.gov (United States)

    Lei, Ying; Liu, Ch.; Wu, D. T.; Tang, Y. L.; Wang, J. X.; Wu, L. J.; Jiang, X. D.

    2009-07-01

    In recent years, some innovative wireless sensing systems have been proposed. However, more exploration and research on wireless sensing systems are required before wireless systems can substitute for the traditional wire-based systems. In this paper, a new type of intelligent wireless sensing network is proposed for the heath monitoring of large-size structures. Hardware design of the new wireless sensing units is first studied. The wireless sensing unit mainly consists of functional modules of: sensing interface, signal conditioning, signal digitization, computational core, wireless communication and battery management. Then, software architecture of the unit is introduced. The sensing network has a two-level cluster-tree architecture with Zigbee communication protocol. Important issues such as power saving and fault tolerance are considered in the designs of the new wireless sensing units and sensing network. Each cluster head in the network is characterized by its computational capabilities that can be used to implement the computational methodologies of structural health monitoring; making the wireless sensing units and sensing network have "intelligent" characteristics. Primary tests on the measurement data collected by the wireless system are performed. The distributed computational capacity of the intelligent sensing network is also demonstrated. It is shown that the new type of intelligent wireless sensing network provides an efficient tool for structural health monitoring of large-size structures.

  15. Introductory survey for wireless infrared communications

    Directory of Open Access Journals (Sweden)

    Munsif Ali Jatoi

    2014-08-01

    Full Text Available Wireless infrared communications can be defined as the propagation of light waves in free space using infrared radiation whose range is 400–700 nm. This range corresponds to frequencies of hundreds of terahertz, which is high for higher data rate applications. Wireless infrared is applied for higher data rates applications such as wireless computing, wireless video and wireless multimedia communication applications. Introduced by Gfeller, this field has grown with different link configurations, improved transmitter efficiency, increased receiver responsivity and various multiple access techniques for improved quality. Errors are caused because of background light, which causes degradation overall system performance. Error correction techniques are used to remove the errors caused during transmission. This study provides a brief account on field theory used for error correction in wireless infrared systems. The results are produced in terms of bit error rate and signal-to-noise ratio for various bit lengths to show the ability of encoding and decoding algorithms.

  16. Distributed Estimation, Coding, and Scheduling in Wireless Visual Sensor Networks

    Science.gov (United States)

    Yu, Chao

    2013-01-01

    In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…

  17. Women with hereditary breast cancer predispositions should avoid using their smartphones, tablets, and laptops at night.

    Science.gov (United States)

    Mortazavi, Seyed Ali Reza; Mortazavi, Seyed Mohammad Javad

    2018-02-01

    Breast cancer is the most common malignancy among women, both in the developed and developing countries. Women with mutations in the BRCA1 and BRCA2 genes have an increased risk of breast and ovarian cancers. Recent studies show that short-wavelength visible light disturb the secretion of melatonin and causes circadian rhythm disruption. We have previously studied the health effects of exposure to different levels of radiofrequency electromagnetic fields (RF-EMFs) such as mobile phones, mobile base stations, mobile phone jammers, laptop computers, and radars. Moreover, over the past several years, we investigated the health effects of exposure to the short wavelength visible light in the blue region emitted from digital screens. The reduction of melatonin secretion after exposure to blue light emitted from smartphone's screen has been reported to be associated with the negative impact of smartphone use at night on sleep. We have shown that both the blue light and RF-EMFs generated by mobile phones are linked to the disruption of the circadian rhythm in people who use their phones at night. Therefore, if women with hereditary breast cancer predispositions use their smartphones, tablets and laptops at night, disrupted circadian rhythms (suppression of melatonin caused by exposure to blue light emitted from the digital screens), amplifies the risk of breast cancer. It can be concluded that women who carry mutated BRCA1 or BRCA2, or women with family history of breast cancer should avoid using their smartphones, tablets and laptops at night. Using sunglasses with amber lenses, or smartphone applications which decrease the users' exposure to blue light before sleep, at least to some extent, can decrease the risk of circadian rhythm disruption and breast cancer.

  18. Women with hereditary breast cancer predispositions should avoid using their smartphones, tablets and laptops at night

    Directory of Open Access Journals (Sweden)

    Seyed Ali Reza Mortazavi

    2018-02-01

    Full Text Available Breast cancer is the most common malignancy among women, both in the developed and developing countries. Women with mutations in the BRCA1 and BRCA2 genes have an increased risk of breast and ovarian cancers. Recent studies show that short-wavelength visible light disturb the secretion of melatonin and causes circadian rhythm disruption. We have previously studied the health effects of exposure to different levels of radiofrequency electromagnetic fields (RF-EMFs such as mobile phones, mobile base stations, mobile phone jammers, laptop computers, and radars. Moreover, over the past several years, we investigated the health effects of exposure to the short wavelength visible light in the blue region emitted from digital screens. The reduction of melatonin secretion after exposure to blue light emitted from smartphone’s screen has been reported to be associated with the negative impact of smartphone use at night on sleep. We have shown that both the blue light and RF-EMFs generated by mobile phones are linked to the disruption of the circadian rhythm in people who use their phones at night. Therefore, if women with hereditary breast cancer predispositions use their smartphones, tablets and laptops at night, disrupted circadian rhythms (suppression of melatonin caused by exposure to blue light emitted from the digital screens, amplifies the risk of breast cancer. It can be concluded that women who carry mutated BRCA1 or BRCA2, or women with family history of breast cancer should avoid using their smartphones, tablets and laptops at night. Using sunglasses with amber lenses, or smartphone applications which decrease the users’ exposure to blue light before sleep, at least to some extent, can decrease the risk of circadian rhythm disruption and breast cancer.

  19. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  20. THE TRENDS AND USE OF COMPUTER AND INTERNET AMONG MEDICAL STUDENTS

    Directory of Open Access Journals (Sweden)

    M. Sathikumar

    2018-02-01

    Full Text Available BACKGROUND Computer-based learning is becoming more and more widespread and it has been important especially in medical subjects since lifelong learning is a goal of medical professional. The study was conducted to find out the computer literacy, computer and internet availability and the trend of use of computer, laptop and other gadget among medical students. MATERIALS AND METHODS A cross sectional descriptive study was conducted among the medical students of Jubilee Mission Medical College & Research Institute, Thrissur and SUT Academy of Medical Sciences, Thiruvananthapuram, Kerala. A total of 420 students participated in the study. RESULTS Out of the 420 students, 42.38% students had their own laptop or computer and 45.71% students were using family shared computer or laptop for their use. 80.48% students were found using mobile phones or tablets with internet facility. Most of the students, access internet for recreational facilities. Regarding e- learning 54.29% of the students participated in the study were of aware of it. Majority of medical students are of the opinion that computer and internet use should be encouraged in medical colleges. CONCLUSION Those who have participated in the study have necessary infrastructure and positive attitude about computer-based learning even though they are using it mainly for recreational purposes.

  1. Intrusion detection and monitoring for wireless networks.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  2. Secure Wireless Military Healthcare Telemedicine Enterprise System

    National Research Council Canada - National Science Library

    Lucas, Kenneth

    2003-01-01

    ...(exp TM) software and Division Tools with cross platform telemedicine systems, inclusive of computer based systems, handheld wireless PDA devices, and miniature computers, to existing DoD legacy...

  3. Secure Wireless Military Healthcare Telemedicine Enterprise System

    National Research Council Canada - National Science Library

    Lucas, Kenneth

    2002-01-01

    ...) software and Dvision Tools with cross platform telemedicine systems, inclusive of computer based systems, handheld wireless PDA devices, and miniature computers, to existing DoD legacy and developing...

  4. Fundamental gravitational limitations to quantum computing

    International Nuclear Information System (INIS)

    Gambini, R.; Porto, A.; Pullin, J.

    2006-01-01

    Lloyd has considered the ultimate limitations the fundamental laws of physics place on quantum computers. He concludes in particular that for an 'ultimate laptop' (a computer of one liter of volume and one kilogram of mass) the maximum number of operations per second is bounded by 10 51 . The limit is derived considering ordinary quantum mechanics. Here we consider additional limits that are placed by quantum gravity ideas, namely the use of a relational notion of time and fundamental gravitational limits that exist on time measurements. We then particularize for the case of an ultimate laptop and show that the maximum number of operations is further constrained to 10 47 per second. (authors)

  5. Analyzing the environmental impacts of laptop enclosures ...

    Science.gov (United States)

    The market growth of consumer electronics makes it essential for industries and policy-makers to work together to develop sustainable products. The objective of this study is to better understand how to promote environmentally sustainable consumer electronics by examining the use of various materials in laptop enclosures (excluding mounting hardware, internal components, and insulation) using screening-level life cycle assessment. The baseline material, is a fossil plastic blend of polycarbonate-acrylonitrile butadiene styrene. Alternative materials include polylactic acid, bamboo, aluminum, and various combinations of these materials known to be currently used or being considered for use in laptops. The flame retardants considered in this study are bisphenol A bis(diphenyl phosphate), triphenyl phosphate, 9,10-dihydro-9-oxa-10-phosphaphenanthrene-10-oxide, and borax-boric acid-phosphorous acid. The Tool for the Reduction and Assessment of Chemical and other environmental Impacts v2.1 was used for the assessment of impacts related to climate change, human and ecological health, and resource use. The assessment demonstrates that plastics, relative to the other materials, are currently some of the better performing materials in terms of having the lowest potential environmental impact for a greater number of impact categories based on product life cycle models developed in this study. For fossil plastics, the material performance increases with increasing post-con

  6. Some Programs Should Not Run on Laptops - Providing Programmatic Access to Applications Via Web Services

    Science.gov (United States)

    Gupta, V.; Gupta, N.; Gupta, S.; Field, E.; Maechling, P.

    2003-12-01

    Modern laptop computers, and personal computers, can provide capabilities that are, in many ways, comparable to workstations or departmental servers. However, this doesn't mean we should run all computations on our local computers. We have identified several situations in which it preferable to implement our seismological application programs in a distributed, server-based, computing model. In this model, application programs on the user's laptop, or local computer, invoke programs that run on an organizational server, and the results are returned to the invoking system. Situations in which a server-based architecture may be preferred include: (a) a program is written in a language, or written for an operating environment, that is unsupported on the local computer, (b) software libraries or utilities required to execute a program are not available on the users computer, (c) a computational program is physically too large, or computationally too expensive, to run on a users computer, (d) a user community wants to enforce a consistent method of performing a computation by standardizing on a single implementation of a program, and (e) the computational program may require current information, that is not available to all client computers. Until recently, distributed, server-based, computational capabilities were implemented using client/server architectures. In these architectures, client programs were often written in the same language, and they executed in the same computing environment, as the servers. Recently, a new distributed computational model, called Web Services, has been developed. Web Services are based on Internet standards such as XML, SOAP, WDSL, and UDDI. Web Services offer the promise of platform, and language, independent distributed computing. To investigate this new computational model, and to provide useful services to the SCEC Community, we have implemented several computational and utility programs using a Web Service architecture. We have

  7. Wireless Sensor Network Metrics for Real-Time Systems

    Science.gov (United States)

    2009-05-20

    Wireless Sensor Network Metrics for Real-Time Systems Phoebus Wei-Chih Chen Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Wireless Sensor Network Metrics for Real-Time Systems 5a. CONTRACT NUMBER 5b... wireless sensor networks (WSNs) is moving from studies of WSNs in isolation toward studies where the WSN is treated as a component of a larger system

  8. Wireless Communications in the Era of Big Data

    OpenAIRE

    Bi, Suzhi; Zhang, Rui; Ding, Zhi; Cui, Shuguang

    2015-01-01

    © 1979-2012 IEEE. The rapidly growing wave of wireless data service is pushing against the boundary of our communication network's processing power. The pervasive and exponentially increasing data traffic present imminent challenges to all aspects of wireless system design, such as spectrum efficiency, computing capabilities, and fronthaul/backhaul link capacity. In this article, we discuss the challenges and opportunities in the design of scalable wireless systems to embrace the big data era...

  9. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks.

    Science.gov (United States)

    Tu, Weijian; Xu, Xianghua; Ye, Tingcong; Cheng, Zongmao

    2017-07-04

    Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node) as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP) to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  10. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Weijian Tu

    2017-07-01

    Full Text Available Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  11. Sustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication

    Directory of Open Access Journals (Sweden)

    Jaejin Jang

    2016-08-01

    Full Text Available Wireless access points (WAPs are devices that provide Internet connectivity to devices such as desktops, laptops, smartphones, and tablets. Hence, it is important to provide sufficient availability to devices and security for the traffic that is routed by a WAP. However, attackers can decrease the network bandwidth or obtain the traffic including private data such as search histories, login information, and device usage patterns by exploiting the vulnerabilities in firmware upgrades to install malicious firmware. To address this problem, we propose a sustainable and practical firmware upgrade for a WAP using password-based authentication. The proposed upgrade protocol ensures security by adding freshness to the firmware whenever a firmware upgrade occurs. This freshness is different for each event and each firmware; therefore, even if the freshness of one firmware is exposed, the others are secure. In addition, confidentiality, integrity, and authentication are ensured. Furthermore, the proposed protocol can be easily implemented and adapted to WAPs. Experiments are performed to evaluate the upgrade time, resource usage, and code size in wired and wireless connected environments by implementing a prototype and analyzing the security of the protocol. The results show that the proposed upgrade is secure and practical.

  12. Cross-platform wireless sensor network development

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Kusy, Branislav

    Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as well as traditional desktop computers. We propose Tinylnventor, an open...

  13. Computer Security Handbook

    CERN Document Server

    Bosworth, Seymour; Whyne, Eric

    2012-01-01

    The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapter

  14. BackTrack testing wireless network security

    CERN Document Server

    Cardwell, Kevin

    2013-01-01

    Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks.All you need is some experience with networks and computers and you will be ready to go.

  15. Effect of a Laptop Initiative on Middle School Mathematics Achievement

    Science.gov (United States)

    Lambert, Edna Earl White

    2014-01-01

    In the wake of No Child Left Behind, schools continue to be evaluated according to standardized test results. Researchers suggest that technology can assist students with development and school achievement. While laptop initiative (LI) technology was being implemented by South Carolina districts in the middle schools classrooms, educational…

  16. Energy efficiency of error correcting mechanisms for wireless communications

    NARCIS (Netherlands)

    Havinga, Paul J.M.

    We consider the energy efficiency of error control mechanisms for wireless communication. Since high error rates are inevitable to the wireless environment, energy efficient error control is an important issue for mobile computing systems. Although good designed retransmission schemes can be optimal

  17. Ultra-low power high precision magnetotelluric receiver array based customized computer and wireless sensor network

    Science.gov (United States)

    Chen, R.; Xi, X.; Zhao, X.; He, L.; Yao, H.; Shen, R.

    2016-12-01

    Dense 3D magnetotelluric (MT) data acquisition owns the benefit of suppressing the static shift and topography effect, can achieve high precision and high resolution inversion for underground structure. This method may play an important role in mineral exploration, geothermal resources exploration, and hydrocarbon exploration. It's necessary to reduce the power consumption greatly of a MT signal receiver for large-scale 3D MT data acquisition while using sensor network to monitor data quality of deployed MT receivers. We adopted a series of technologies to realized above goal. At first, we designed an low-power embedded computer which can couple with other parts of MT receiver tightly and support wireless sensor network. The power consumption of our embedded computer is less than 1 watt. Then we designed 4-channel data acquisition subsystem which supports 24-bit analog-digital conversion, GPS synchronization, and real-time digital signal processing. Furthermore, we developed the power supply and power management subsystem for MT receiver. At last, a series of software, which support data acquisition, calibration, wireless sensor network, and testing, were developed. The software which runs on personal computer can monitor and control over 100 MT receivers on the field for data acquisition and quality control. The total power consumption of the receiver is about 2 watts at full operation. The standby power consumption is less than 0.1 watt. Our testing showed that the MT receiver can acquire good quality data at ground with electrical dipole length as 3 m. Over 100 MT receivers were made and used for large-scale geothermal exploration in China with great success.

  18. Integrated 3d printed wireless sensing system for environmental monitoring

    KAUST Repository

    Farooqui, Muhammad Fahad; Shamim, Atif

    2017-01-01

    transmitters on a panel. The wireless sensor device may be configured to take environment measurements, such as temperature, gas, humidity, and wirelessly communicate the environment measurements to a remote computing device, in addition, the present disclosure

  19. A solar powered wireless computer mouse. Industrial design concepts

    Energy Technology Data Exchange (ETDEWEB)

    Reich, N.H.; Van Sark, W.G.J.H.M.; Alsema, E.A.; Turkenburg, W.C. [Department of Science, Technology and Society, Copernicus Institute, Utrecht University, Heidelberglaan 2, 3584 CS Utrecht (Netherlands); Veefkind, M.; Silvester, S. [Industrial Design Engineering, Delft University of Technology, Landbergstraat 15, 2628 CE Delft (Netherlands)

    2009-02-15

    A solar powered wireless computer mouse (SPM) was chosen to serve as a case study for the evaluation and optimization of industrial design processes of photovoltaic (PV) powered consumer systems. As the design process requires expert knowledge in various technical fields, we assessed and compared the following: appropriate selection of integrated PV type, battery capacity and type, possible electronic circuitries for PV-battery coupling, and material properties concerning mechanical incorporation of PV into the encasing. Besides technical requirements, ergonomic aspects and design aesthetics with respect to good 'sun-harvesting' properties influenced the design process. This is particularly important as simulations show users can positively influence energy balances by 'sun-bathing' the PV mouse. A total of 15 SPM prototypes were manufactured and tested by actual users. Although user satisfaction proved the SPM concept to be feasible, future research still needs to address user acceptance related to product dimensions and user willingness to pro-actively 'sun-bath' PV powered products in greater detail. (author)

  20. Multi-Channel Wireless Sensor Networks: Protocols, Design and Evaluation

    OpenAIRE

    Durmaz, O.

    2009-01-01

    Pervasive systems, which are described as networked embedded systems integrated with everyday environments, are considered to have the potential to change our daily lives by creating smart surroundings and by their ubiquity, just as the Internet. In the last decade, “Wireless Sensor Networks��? have appeared as one of the real-world examples of pervasive systems by combining automated sensing, embedded computing and wireless networking into tiny embedded devices. A wireless sensor network typ...

  1. 77 FR 70464 - Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data...

    Science.gov (United States)

    2012-11-26

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-794] Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... wireless communication devices, portable music and data processing devices, and tablet computers, by reason...

  2. Bluetooth low energy: wireless connectivity for medical monitoring.

    Science.gov (United States)

    Omre, Alf Helge

    2010-03-01

    Electronic wireless sensors could cut medical costs by enabling physicians to remotely monitor vital signs such as blood pressure, blood glucose, and blood oxygenation while patients remain at home. According to the IDC report "Worldwide Bluetooth Semiconductor 2008-2012 Forecast," published November 2008, a forthcoming radio frequency communication ("wireless connectivity") standard, Bluetooth low energy, will link wireless sensors via radio signals to the 70% of cell phones and computers likely to be fitted with the next generation of Bluetooth wireless technology, leveraging a ready-built infrastructure for data transmission. Analysis of trends indicated by this data can help physicians better manage diseases such as diabetes. The technology also addresses the concerns of cost, compatibility, and interoperability that have previously stalled widespread adoption of wireless technology in medical applications. (c) 2010 Diabetes Technology Society.

  3. Graphene for future electronics

    International Nuclear Information System (INIS)

    Pasanen, Pirjo; Voutilainen, Martti; Helle, Meri; Song Xuefeng; Hakonen, Pertti J

    2012-01-01

    We discuss some aspects of how graphene could be used in mainstream electronic devices. The main focus is on signal processing applications in high-volume, industrially manufactured battery-powered devices, e.g. mobile phones and laptop computers, but we will also discuss applicability to other components like interconnects, wireless communication antennae and camera sensors, as well as novel types of signal processing devices, based on the unique physical properties of graphene.

  4. Implementation of an Embedded Web Server Application for Wireless Control of Brain Computer Interface Based Home Environments.

    Science.gov (United States)

    Aydın, Eda Akman; Bay, Ömer Faruk; Güler, İnan

    2016-01-01

    Brain Computer Interface (BCI) based environment control systems could facilitate life of people with neuromuscular diseases, reduces dependence on their caregivers, and improves their quality of life. As well as easy usage, low-cost, and robust system performance, mobility is an important functionality expected from a practical BCI system in real life. In this study, in order to enhance users' mobility, we propose internet based wireless communication between BCI system and home environment. We designed and implemented a prototype of an embedded low-cost, low power, easy to use web server which is employed in internet based wireless control of a BCI based home environment. The embedded web server provides remote access to the environmental control module through BCI and web interfaces. While the proposed system offers to BCI users enhanced mobility, it also provides remote control of the home environment by caregivers as well as the individuals in initial stages of neuromuscular disease. The input of BCI system is P300 potentials. We used Region Based Paradigm (RBP) as stimulus interface. Performance of the BCI system is evaluated on data recorded from 8 non-disabled subjects. The experimental results indicate that the proposed web server enables internet based wireless control of electrical home appliances successfully through BCIs.

  5. Analyzing Multimode Wireless Sensor Networks Using the Network Calculus

    Directory of Open Access Journals (Sweden)

    Xi Jin

    2015-01-01

    Full Text Available The network calculus is a powerful tool to analyze the performance of wireless sensor networks. But the original network calculus can only model the single-mode wireless sensor network. In this paper, we combine the original network calculus with the multimode model to analyze the maximum delay bound of the flow of interest in the multimode wireless sensor network. There are two combined methods A-MM and N-MM. The method A-MM models the whole network as a multimode component, and the method N-MM models each node as a multimode component. We prove that the maximum delay bound computed by the method A-MM is tighter than or equal to that computed by the method N-MM. Experiments show that our proposed methods can significantly decrease the analytical delay bound comparing with the separate flow analysis method. For the large-scale wireless sensor network with 32 thousands of sensor nodes, our proposed methods can decrease about 70% of the analytical delay bound.

  6. Optimizing the Number of Cooperating Terminals for Energy Aware Task Computing in Wireless Networks

    DEFF Research Database (Denmark)

    Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    It is generally accepted that energy consumption is a significant design constraint for mobile handheld systems, therefore motivations for methods optimizing the energy consumption making better use of the restricted battery resources are evident. A novel concept of distributed task computing...... is previously proposed (D2VS), where the overall idea of selective distribution of tasks among terminals is made. In this paper the optimal number of terminals for cooperative task computing in a wireless network will be investigated. The paper presents an energy model for the proposed scheme. Energy...... consumption of the terminals with respect to their workload and the overhead of distributing tasks among terminals are taken into account. The paper shows, that the number of cooperating terminals is in general limited to a few, though alternating with respect to the various system parameters....

  7. A Wireless Sensor Network with Soft Computing Localization Techniques for Track Cycling Applications.

    Science.gov (United States)

    Gharghan, Sadik Kamel; Nordin, Rosdiadee; Ismail, Mahamod

    2016-08-06

    In this paper, we propose two soft computing localization techniques for wireless sensor networks (WSNs). The two techniques, Neural Fuzzy Inference System (ANFIS) and Artificial Neural Network (ANN), focus on a range-based localization method which relies on the measurement of the received signal strength indicator (RSSI) from the three ZigBee anchor nodes distributed throughout the track cycling field. The soft computing techniques aim to estimate the distance between bicycles moving on the cycle track for outdoor and indoor velodromes. In the first approach the ANFIS was considered, whereas in the second approach the ANN was hybridized individually with three optimization algorithms, namely Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), and Backtracking Search Algorithm (BSA). The results revealed that the hybrid GSA-ANN outperforms the other methods adopted in this paper in terms of accuracy localization and distance estimation accuracy. The hybrid GSA-ANN achieves a mean absolute distance estimation error of 0.02 m and 0.2 m for outdoor and indoor velodromes, respectively.

  8. A synchronization method for wireless acquisition systems, application to brain computer interfaces.

    Science.gov (United States)

    Foerster, M; Bonnet, S; van Langhenhove, A; Porcherot, J; Charvet, G

    2013-01-01

    A synchronization method for wireless acquisition systems has been developed and implemented on a wireless ECoG recording implant and on a wireless EEG recording helmet. The presented algorithm and hardware implementation allow the precise synchronization of several data streams from several sensor nodes for applications where timing is critical like in event-related potential (ERP) studies. The proposed method has been successfully applied to obtain visual evoked potentials and compared with a reference biosignal amplifier. The control over the exact sampling frequency allows reducing synchronization errors that will otherwise accumulate during a recording. The method is scalable to several sensor nodes communicating with a shared base station.

  9. Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment

    Science.gov (United States)

    Peters, James F.; Szturm, Tony; Borkowski, Maciej; Lockery, Dan; Ramanna, Sheela; Shay, Barbara

    This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules. A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing approach to telegaming, a handicapped person (e.g., stroke patient with limited hand, finger, arm function) plays a video game by interacting with familiar instrumented objects such as cups, cutlery, soccer balls, nozzles, screw top-lids, spoons, so that the technology that makes therapeutic exercise game-playing possible is largely invisible (Archives of Physical Medicine and Rehabilitation 89:2213-2217, 2008). The basic approach to adaptive learning (AL) in the proposed telegaming environment is ethology-inspired and is quite different from the traditional approach to reinforcement learning. In biologically-inspired learning, organisms learn to achieve some goal by durable modification of behaviours in response to signals from the environment resulting from specific experiences (Animal Behavior, 1995). The term adaptive is used here in an ethological sense, where learning by an organism results from modifying behaviour in response to perceived changes in the environment. To instill adaptivity in a video game, it is assumed that learning by a video game is episodic. During an episode, the behaviour of a player is measured indirectly by tracking the occurrence of gaming events such as a hit or a miss of a target (e.g., hitting a moving ball with a game paddle). An ethogram provides a record of behaviour feature values that provide a basis a functional registry for handicapped players for gaming adaptivity. An important practical application of adaptive gaming is therapeutic rehabilitation exercise carried out in parallel with playing action video games. Enjoyable and

  10. MOLT: A Mobile Learning Tool That Makes Learning New Technical English Language Words Enjoyable

    Directory of Open Access Journals (Sweden)

    Dogan - Ibrahim

    2008-10-01

    Full Text Available There is an increase use of wireless technologies in education all over the world. In fact, wireless technologies such as laptop computers, palmtop computers, and mobile phones are revolutionizing education and transforming the traditional classroom based learning and teaching into anytime and anywhere education. This paper investigates the use of wireless technologies in education with particular reference to the potential of learning new technical English Language words using SMS text messaging. The system, developed by the authors, called Mobile Learning Tool (MOLT, has been tested with 45 first-year undergraduate students. Students’ opinions have been collected after the experiment. Our results show that students enjoyed and be happy used mobile phones to learn new technical English word. We believe that if we add the improvements or modifications students wish to see in the MOLT system, then using the MOLT system as an educational tool will contribute to motivation and success of students.

  11. A Computational Agent-Based Modeling Approach for Competitive Wireless Service Market

    KAUST Repository

    Douglas, C C

    2011-04-01

    Using an agent-based modeling method, we study market dynamism with regard to wireless cellular services that are in competition for a greater market share and profit. In the proposed model, service providers and consumers are described as agents who interact with each other and actively participate in an economically well-defined marketplace. Parameters of the model are optimized using the Levenberg-Marquardt method. The quantitative prediction capabilities of the proposed model are examined through data reproducibility using past data from the U.S. and Korean wireless service markets. Finally, we investigate a disruptive market event, namely the introduction of the iPhone into the U.S. in 2007 and the resulting changes in the modeling parameters. We predict and analyze the impacts of the introduction of the iPhone into the Korean wireless service market assuming a release date of 2Q09 based on earlier data. © 2011 IEEE.

  12. Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yi Sun

    2014-01-01

    Full Text Available With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients’ health information and doctors’ diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions.

  13. How to model wireless mesh networks topology

    International Nuclear Information System (INIS)

    Sanni, M L; Hashim, A A; Anwar, F; Ali, S; Ahmed, G S M

    2013-01-01

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  14. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  15. The short-term effects of antenna insulation thickness on path losses in wireless telemetry implants at microwave frequencies

    Directory of Open Access Journals (Sweden)

    Lukas Kneisz

    2013-07-01

    Full Text Available Various physiological parameters can be monitored non-invasively using wireless biotelemetry links. The development of sophisticated ultra low power consuming transceivers allows the transmission of large amounts of data from the inside of the body to an external receiver in real time at microwave frequencies.Antenna impedance matching is crucial for obtaining an acceptable propagation link budget in a wireless telemetry link. The dielectric properties of biological tissue induce detuning to transceiver antennas when implanted into the body. To counteract detuning problems, implant antennas are coated with biocompatible insulating material. The study investigates the propagation losses of a wireless communication link at different insulation thicknesses of medical grade silicone in the Industrial-Scientific-Medical (ISM radio band at 2.45 GHz. The wireless link consisted of an implantable unit which was placed between two pads of tissue substitute material and an external receiver which was connected to a laptop. Predefined data packets were transmitted from the implant, the received packets were analyzed, packet errors and packet losses were logged and the received signal strength indicator values (RSSI were recorded. Our results showed that the mean RSSI values of insulated transmitter antennas - embedded in tissue equivalent material - provide more safety distance to critical receiver sensitivity level than uncoated antennas.The conducted measurements let us conclude that with increasing thickness of the insulation layer, the antenna becomes less sensitive to detuning by adjacent tissue substitute material. Therefore tuned antennas are less influenced by the surrounding tissue after implantation.

  16. Wireless Sensor Networks for Long Distance Pipeline Monitoring

    OpenAIRE

    Augustine C. Azubogu; Victor E. Idigo; Schola U. Nnebe; Obinna S. Oguejiofor; Simon E.

    2013-01-01

    The main goal of this seminal paper is to introduce the application of Wireless Sensor Networks (WSN) in long distance infrastructure monitoring (in particular in pipeline infrastructure monitoring) – one of the on-going research projects by the Wireless Communication Research Group at the department of Electronic and Computer Engineering, Nnamdi Azikiwe University, Awka. The current sensor network architectures for monitoring long distance pipeline infrastructures are pr...

  17. The survey of American college students computer technology preferences & purchasing plans

    CERN Document Server

    2009-01-01

    This report presents data from a survey of more than 400 American college students.  The report presents data on student computer ownership of both PCs and laptops, purchasing plans for PCs and laptops, as well as purchasing plans for cell phones and digital cameras.  The report also provides details on how student finance their computer purchases, how much money comes from parents or guardians, and how much from the student themselves, or from their parties.  In addition to data on PCs the report provides detailed info on use of popular word processing packages such as Word, WordPerfect and Open Office.

  18. The Impact of Computer and Communications Technology on Recruiter Productivity and Quality of Life

    National Research Council Canada - National Science Library

    Blackstone, Tanja

    2003-01-01

    .... A test group of recruiters was given a set of tools, which included state of the art laptop computers, computer projection equipment, communications and database software, Internet and Intranet...

  19. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  20. Computer Architecture A Quantitative Approach

    CERN Document Server

    Hennessy, John L

    2011-01-01

    The computing world today is in the middle of a revolution: mobile clients and cloud computing have emerged as the dominant paradigms driving programming and hardware innovation today. The Fifth Edition of Computer Architecture focuses on this dramatic shift, exploring the ways in which software and technology in the cloud are accessed by cell phones, tablets, laptops, and other mobile computing devices. Each chapter includes two real-world examples, one mobile and one datacenter, to illustrate this revolutionary change.Updated to cover the mobile computing revolutionEmphasizes the two most im

  1. Functional Testing of Wireless Sensor Node Designs

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Madsen, Jan

    2007-01-01

    Wireless sensor networks are networked embedded computer systems with stringent power, performance, cost and form-factor requirements along with numerous other constraints related to their pervasiveness and ubiquitousness. Therefore, only a systematic design methdology coupled with an efficient...... test approach can enable their conformance to design and deployment specifications. We discuss off-line, hierarchical, functional testing of complete wireless sensor nodes containing configurable logic through a combination of FPGA-based board test and Software-Based Self-Test (SBST) techniques...

  2. Advanced Wireless Sensor Nodes - MSFC

    Science.gov (United States)

    Varnavas, Kosta; Richeson, Jeff

    2017-01-01

    NASA field center Marshall Space Flight Center (Huntsville, AL), has invested in advanced wireless sensor technology development. Developments for a wireless microcontroller back-end were primarily focused on the commercial Synapse Wireless family of devices. These devices have many useful features for NASA applications, good characteristics and the ability to be programmed Over-The-Air (OTA). The effort has focused on two widely used sensor types, mechanical strain gauges and thermal sensors. Mechanical strain gauges are used extensively in NASA structural testing and even on vehicle instrumentation systems. Additionally, thermal monitoring with many types of sensors is extensively used. These thermal sensors include thermocouples of all types, resistive temperature devices (RTDs), diodes and other thermal sensor types. The wireless thermal board will accommodate all of these types of sensor inputs to an analog front end. The analog front end on each of the sensors interfaces to the Synapse wireless microcontroller, based on the Atmel Atmega128 device. Once the analog sensor output data is digitized by the onboard analog to digital converter (A/D), the data is available for analysis, computation or transmission. Various hardware features allow custom embedded software to manage battery power to enhance battery life. This technology development fits nicely into using numerous additional sensor front ends, including some of the low-cost printed circuit board capacitive moisture content sensors currently being developed at Auburn University.

  3. 1st International Conference on Recent Cognizance in Wireless Communication & Image Processing

    CERN Document Server

    Srivastava, Vishnu; Singh, Ghanshyam; Bhatnagar, Deepak

    2016-01-01

    This volume comprises the proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. It brings together content from academicians, researchers, and industry experts in areas of Wireless Communication and Image Processing. The volume provides a snapshot of current progress in computational creativity and a glimpse of future possibilities. The proceedings include two kinds of paper submissions: (i) regular papers addressing foundation issues, describing original research on creative systems development and modeling; and (ii) position papers describing work-in-progress or research directions for computational creativity. This work will be useful to professionals and researchers working in the core areas of wireless communications and image processing.

  4. Explorer-II: Wireless Self-Powered Visual and NDE Robotic Inspection System for Live Gas Distribution Mains

    Energy Technology Data Exchange (ETDEWEB)

    Carnegie Mellon University

    2008-09-30

    and their arrangement, still allow the robot to configure itself to perform any-angle (up to 90 deg) turns in any orientation (incl. vertical), and enable the live launching and recovery of the system using custom fittings and a (to be developed) launch-chamber/-tube. The battery modules are used to power the system, by providing power to the robot's bus. The support modules perform the functions of centration for the rest of the train as well as odometry pickups using incremental encoding schemes. The electronics architecture is based on a distributed (8-bit) microprocessor architecture (at least 1 in ea. module) communicating to a (one of two) 32-bit SBC, which manages all video-processing, posture and motion control as well as CAN and wireless communications. The operator controls the entire system from an off-board (laptop) controller, which is in constant wireless communication with the robot train in the pipe. The sensor modules collect data and forward it to the robot operator computer (via the CAN-wireless communications chain), who then transfers it to a dedicated NDE data-storage and post-processing computer for further (real-time or off-line) analysis. The prototype robot system was built and tested indoors and outdoors, outfitted with a Remote-Field Eddy Current (RFEC) sensor integrated as its main NDE sensor modality. An angled launcher, allowing for live launching and retrieval, was also built to suit custom angled launch-fittings from TDW. The prototype vehicle and launcher systems are shown. The complete system, including the in-pipe robot train, launcher, integrated NDE-sensor and real-time video and control console and NDE-data collection and -processing and real-time display, were demonstrated to all sponsors prior to proceeding into final field-trials--the individual components and setting for said acceptance demonstration are shown. The launcher-tube was also used to verify that the vehicle system is capable of operating in high

  5. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...... link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  6. Computer Security: Agility for computers

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2014-01-01

    I have just made an inventory of all the digital gadgets connected to my wireless network at home: two Windows laptops, two tablets of different generations, my two kids’ iPods , one iPhone, an Apple TV, an old iMac, the Wii U, a Sony TV, a Sony stereo, the Wi-Fi router (of course!), a Network Attached Storage and two IP telephones. I’m sure other people have many more...   In the future, I could even have an internet-connected car or coffee-machine or a smart meter (see “Hacking control systems, switching lights off!”), and I could eventually even connect my solar panels to my Wi-Fi network. That’s quite some phase-space for vulnerabilities waiting to be exploited by attackers! Therefore, locking down my Wi-Fi router and blocking all incoming access was essential, but my kids randomly browsing the web still posed an insider threat… Thus, patching and keeping all systems up to date became important, too. But given the number of de...

  7. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  8. A wireless potentiostat for mobile chemical sensing and biosensing.

    Science.gov (United States)

    Steinberg, Matthew D; Kassal, Petar; Kereković, Irena; Steinberg, Ivana Murković

    2015-10-01

    Wireless chemical sensors are used as analytical devices in homeland defence, home-based healthcare, food logistics and more generally for the Sensor Internet of Things (SIoT). Presented here is a battery-powered and highly portable credit-card size potentiostat that is suitable for performing mobile and wearable amperometric electrochemical measurements with seamless wireless data transfer to mobile computing devices. The mobile electrochemical analytical system has been evaluated in the laboratory with a model redox system - the reduction of hexacyanoferrate(III) - and also with commercially available enzymatic blood-glucose test-strips. The potentiostat communicates wirelessly with mobile devices such as tablets or Smartphones by near-field communication (NFC) or with personal computers by radio-frequency identification (RFID), and thus provides a solution to the 'missing link' in connectivity that often exists between low-cost mobile and wearable chemical sensors and ubiquitous mobile computing products. The mobile potentiostat has been evaluated in the laboratory with a set of proof-of-concept experiments, and its analytical performance compared with a commercial laboratory potentiostat (R(2)=0.9999). These first experimental results demonstrate the functionality of the wireless potentiostat and suggest that the device could be suitable for wearable and point-of-sample analytical measurements. We conclude that the wireless potentiostat could contribute significantly to the advancement of mobile chemical sensor research and adoption, in particular for wearable sensors in healthcare and sport physiology, for wound monitoring and in mobile point-of-sample diagnostics as well as more generally as a part of the Sensor Internet of Things. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  10. Transmission Delay Based Control over Networks with Wireless Links

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    To achieve the mobility of computers during communication, the TCP connections between fixed host and mobile host may often traverse wired and wireless networks, and the recovery of losses due to wireless transmission error is much different from congestion control. The paper analyzes the side effect of RTT estimation while making the TCP source to handle congestion and wireless error losses properly. Then present a strategy using information feedback by the last hop acknowledgement and monitoring the queuing level of the wired bottleneck link by calculating the changes in transmission delay along the path. With the identification of the early stage of congestion, it can respond to wired congestion quickly while keeping wireless link more reliable, and make TCP react to the different packets losses more appropriately.

  11. Fading and interference mitigation in wireless communications

    CERN Document Server

    Panic, Stefan; Anastasov, Jelena; Spalevic, Petar

    2013-01-01

    The rapid advancement of various wireless communication system services has created the need to analyze the possibility of their performance improvement. Introducing the basic principles of digital communications performance analysis and its mathematical formalization, Fading and Interference Mitigation in Wireless Communications will help you stay up to date with recent developments in the performance analysis of space diversity reception over fading channels in the presence of cochannel interference.The book presents a unified method for computing the performance of digital communication sys

  12. Wireless Augmented Reality Prototype (WARP)

    Science.gov (United States)

    Devereaux, A. S.

    1999-01-01

    Initiated in January, 1997, under NASA's Office of Life and Microgravity Sciences and Applications, the Wireless Augmented Reality Prototype (WARP) is a means to leverage recent advances in communications, displays, imaging sensors, biosensors, voice recognition and microelectronics to develop a hands-free, tetherless system capable of real-time personal display and control of computer system resources. Using WARP, an astronaut may efficiently operate and monitor any computer-controllable activity inside or outside the vehicle or station. The WARP concept is a lightweight, unobtrusive heads-up display with a wireless wearable control unit. Connectivity to the external system is achieved through a high-rate radio link from the WARP personal unit to a base station unit installed into any system PC. The radio link has been specially engineered to operate within the high- interference, high-multipath environment of a space shuttle or space station module. Through this virtual terminal, the astronaut will be able to view and manipulate imagery, text or video, using voice commands to control the terminal operations. WARP's hands-free access to computer-based instruction texts, diagrams and checklists replaces juggling manuals and clipboards, and tetherless computer system access allows free motion throughout a cabin while monitoring and operating equipment.

  13. 2014 International Conference on Wireless Communications, Networking and Applications

    CERN Document Server

    2016-01-01

    This book is based on a series of conferences on Wireless Communications, Networking and Applications that have been held on December 27-28, 2014 in Shenzhen, China. The meetings themselves were a response to technological developments in the areas of wireless communications, networking and applications and facilitate researchers, engineers and students to share the latest research results and the advanced research methods of the field. The broad variety of disciplines involved in this research and the differences in approaching the basic problems are probably typical of a developing field of interdisciplinary research. However, some main areas of research and development in the emerging areas of wireless communication technology can now be identified. The contributions to this book are mainly selected from the papers of the conference on wireless communications, networking and applications and reflect the main areas of interest: Section 1 - Emerging Topics in Wireless and Mobile Computing and Communications...

  14. Development of an extremely compact impedance-based wireless sensing device

    International Nuclear Information System (INIS)

    Overly, Timothy G S; Park, Gyuhae; Farinholt, Kevin M; Farrar, Charles R

    2008-01-01

    This paper describes the development of the next generation of an extremely compact, wireless impedance sensor node for use in structural health monitoring (SHM) and piezoelectric active-sensor self-diagnostics. The sensor node uses a recently developed, low-cost integrated circuit that can measure and record the electrical impedance of a piezoelectric transducer. The sensor node also integrates several components, including a microcontroller for local computing, telemetry for wirelessly transmitting data, multiplexers for managing up to seven piezoelectric transducers per node, energy harvesting and storage mediums, and a wireless triggering circuit into one package to truly realize a comprehensive, self-contained wireless active-sensor node for various SHM applications. It is estimated that the developed sensor node requires less than 60 mW of total power for measurement, computation, and transmission. In addition, the sensor node is equipped with active-sensor self-diagnostic capabilities that can monitor the condition of piezoelectric transducers used in SHM applications. The performance of this miniaturized device is compared to our previous results and its broader capabilities are demonstrated

  15. Computer Security: USB sticks - the silent killers

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    You've just found a USB stick in Restaurant 1. You'd like to return it … but who is the owner? Maybe the contents can tell you? Connect it to your laptop, and you might figure it out. But hold on, what if its content is dangerous…?   USB sticks are an excellent vehicle for infecting countless PCs and laptops. Years ago, several dozen laptops were infected during a conference when someone passed around a USB stick with flight departure information. Unfortunately, this stick was infected. Similarly, we have seen a domino effect of infections in the FP and EN departments after some USB sticks made the rounds, infecting one PC after another. In the end, a massive number of PCs had to be reinstalled. Some USB sticks are even worse. They pretend to be “just a keyboard” (named “RubberDucky”) and, once inserted, they execute a pre-programmed sequence of keystrokes intended to extract information from your computer or take ...

  16. Passive Classification of Wireless NICs during Rate Switching

    OpenAIRE

    Beyah RaheemA; Copeland JohnA; Corbett CheritaL

    2008-01-01

    Abstract Computer networks have become increasingly ubiquitous. However, with the increase in networked applications, there has also been an increase in difficulty to manage and secure these networks. The proliferation of 802.11 wireless networks has heightened this problem by extending networks beyond physical boundaries. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC). This mechanism can be applied to support the detection of unauthorize...

  17. Design and construction of wireless personal computer based fuel ...

    African Journals Online (AJOL)

    Results of the different fuel levels obtained through wireless medium are graphical represented on the PC display for monitoring and prompt actions. The PC interface was made possible using C++ programming language. Keywords: Monitoring system, fuel level, floater, transceiver and Radio frequency. Nigerian Journal of ...

  18. A new scheme for maximizing the lifetime of heterogeneous wireless sensor networks

    OpenAIRE

    Aldaihani, Reem; AboElFotoh, Hosam

    2016-01-01

    Heterogeneous wireless sensor network consists of wireless sensor nodes with different abilities, such as different computing power and different initial energy. We present in this paper a new scheme for maximizing heterogeneous WSN lifetime. The proposed scheme employs two types of sensor nodes that are named (consistent with IEEE 802.15.4 standard) Full Function Device (FFD) and Reduced Function Device (RFD). The FFDs are the expensive sensor nodes with high power and computational capabili...

  19. Measurements on an autonomous wireless payload at 635 km distance using a sensitive radio telescope

    NARCIS (Netherlands)

    Bentum, Marinus Jan; Leijtens, Johan; Verhoeven, Chris; van der Marel, Hans

    2011-01-01

    The Delfi-C3 spacecraft carries the first autonomous wireless payload in space. This payload is a wireless sun sensor developed by TNO in the Netherlands. The data captured by the sensor is wirelessly transported to the central computer system inside the spacecraft. Since no additional power supply

  20. Real-Time and Secure Wireless Health Monitoring

    Science.gov (United States)

    Dağtaş, S.; Pekhteryev, G.; Şahinoğlu, Z.; Çam, H.; Challa, N.

    2008-01-01

    We present a framework for a wireless health monitoring system using wireless networks such as ZigBee. Vital signals are collected and processed using a 3-tiered architecture. The first stage is the mobile device carried on the body that runs a number of wired and wireless probes. This device is also designed to perform some basic processing such as the heart rate and fatal failure detection. At the second stage, further processing is performed by a local server using the raw data transmitted by the mobile device continuously. The raw data is also stored at this server. The processed data as well as the analysis results are then transmitted to the service provider center for diagnostic reviews as well as storage. The main advantages of the proposed framework are (1) the ability to detect signals wirelessly within a body sensor network (BSN), (2) low-power and reliable data transmission through ZigBee network nodes, (3) secure transmission of medical data over BSN, (4) efficient channel allocation for medical data transmission over wireless networks, and (5) optimized analysis of data using an adaptive architecture that maximizes the utility of processing and computational capacity at each platform. PMID:18497866

  1. Automatic Mitigation of Sensor Variations for Signal Strength Based Location Systems

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2006-01-01

    n the area of pervasive computing a key concept is context-awareness. One type of context information is location information of wireless network clients. Research in indoor localization of wireless network clients based on signal strength is receiving a lot of attention. However, not much...... of this research is directed towards handling the issue of adapting a signal strength based indoor localization system to the hardware and software of a specific wireless network client, be it a tag, PDA or laptop. Therefore current indoor localization systems need to be manually adapted to work optimally...... with specific hardware and software. A second problem is that for a specific hardware there will be more than one driver available and they will have different properties when used for localization. Therefore the contribution of this paper is twofold. First, an automatic system for evaluating the fitness...

  2. Use of a wireless local area network in an orthodontic clinic.

    Science.gov (United States)

    Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M

    2005-06-01

    Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.

  3. Value of wireless personal digital assistants for practice: perceptions of advanced practice nurses.

    Science.gov (United States)

    Garrett, Bernard; Klein, Gerri

    2008-08-01

    The aims were to explore advanced practice nurses' perceptions on wireless Personal Digital Assistant technologies, to establish the type and range of tools that would be useful to support their practice and to identify any requirements and limitations that may impact the implementation of wireless Personal Digital Assistants in practice. The wireless Personal Digital Assistant is becoming established as a hand-held computing tool for healthcare professionals. The reflections of advanced practice nurses' about the value of wireless Personal Digital Assistants and its potential to contribute to improved patient care has not been investigated. A qualitative interpretivist design was used to explore advanced practice nurses' perceptions on the value of wireless Personal Digital Assistant technologies to support their practice. The data were collected using survey questionnaires and individual and focus group interviews with nurse practitioners, clinical nurse specialists and information technology managers based in British Columbia, Canada. An open-coding content analysis was performed using qualitative data analysis software. Wireless Personal Digital Assistant's use supports the principles of pervasivity and is a technology rapidly being adopted by advanced practice nurses. Some nurses indicated a reluctance to integrate wireless Personal Digital Assistant technologies into their practices because of the cost and the short technological life cycle of these devices. Many of the barriers which precluded the use of wireless networks within facilities are being removed. Nurses demonstrated a complex understanding of wireless Personal Digital Assistant technologies and gave good rationales for its integration in their practice. Nurses identified improved client care as the major benefit of this technology in practice and the type and range of tools they identified included clinical reference tools such as drug and diagnostic/laboratory reference applications and wireless

  4. IF-MANET: Interoperable framework for heterogeneous mobile ad hoc networks

    OpenAIRE

    Hassan, H.

    2015-01-01

    The advances in low power micro-processors, wireless networks and embedded systems have raised the need to utilize the significant resources of mobile devices. These devices for example, smart phones, tablets, laptops, wearables, and sensors are gaining enormous processing power, storage capacity and wireless bandwidth. In addition, the advancement in wireless mobile technology has created a new communication paradigm via which a wireless network can be created without any priori infrastructu...

  5. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  6. Review of wireless and wearable electroencephalogram systems and brain-computer interfaces--a mini-review.

    Science.gov (United States)

    Lin, Chin-Teng; Ko, Li-Wei; Chang, Meng-Hsiu; Duann, Jeng-Ren; Chen, Jing-Ying; Su, Tung-Ping; Jung, Tzyy-Ping

    2010-01-01

    Biomedical signal monitoring systems have rapidly advanced in recent years, propelled by significant advances in electronic and information technologies. Brain-computer interface (BCI) is one of the important research branches and has become a hot topic in the study of neural engineering, rehabilitation, and brain science. Traditionally, most BCI systems use bulky, wired laboratory-oriented sensing equipments to measure brain activity under well-controlled conditions within a confined space. Using bulky sensing equipments not only is uncomfortable and inconvenient for users, but also impedes their ability to perform routine tasks in daily operational environments. Furthermore, owing to large data volumes, signal processing of BCI systems is often performed off-line using high-end personal computers, hindering the applications of BCI in real-world environments. To be practical for routine use by unconstrained, freely-moving users, BCI systems must be noninvasive, nonintrusive, lightweight and capable of online signal processing. This work reviews recent online BCI systems, focusing especially on wearable, wireless and real-time systems. Copyright 2009 S. Karger AG, Basel.

  7. IR wireless cluster synapses of HYDRA very large neural networks

    Science.gov (United States)

    Jannson, Tomasz; Forrester, Thomas

    2008-04-01

    RF/IR wireless (virtual) synapses are critical components of HYDRA (Hyper-Distributed Robotic Autonomy) neural networks, already discussed in two earlier papers. The HYDRA network has the potential to be very large, up to 10 11-neurons and 10 18-synapses, based on already established technologies (cellular RF telephony and IR-wireless LANs). It is organized into almost fully connected IR-wireless clusters. The HYDRA neurons and synapses are very flexible, simple, and low-cost. They can be modified into a broad variety of biologically-inspired brain-like computing capabilities. In this third paper, we focus on neural hardware in general, and on IR-wireless synapses in particular. Such synapses, based on LED/LD-connections, dominate the HYDRA neural cluster.

  8. 78 FR 16865 - Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data...

    Science.gov (United States)

    2013-03-19

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-794] Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... certain electronic devices, including wireless communication devices, portable music and data processing...

  9. Passive Classification of Wireless NICs during Rate Switching

    Directory of Open Access Journals (Sweden)

    Cherita L. Corbett

    2008-02-01

    Full Text Available Computer networks have become increasingly ubiquitous. However, with the increase in networked applications, there has also been an increase in difficulty to manage and secure these networks. The proliferation of 802.11 wireless networks has heightened this problem by extending networks beyond physical boundaries. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC. This mechanism can be applied to support the detection of unauthorized systems that use NICs which are different from that of a legitimate system. We focus on rate switching, a vaguely specified mechanism required by the 802.11 standard that is implemented in the hardware and software of the wireless NIC. We show that the implementation of this function influences the transmission patterns of a wireless stream, which are observable through traffic analysis. Our mechanism for NIC identification uses signal processing to analyze the periodicity embedded in the wireless traffic caused by rate switching. A stable spectral profile is created from the periodic components of the traffic and used for the identity of the wireless NIC. We show that we can distinguish between NICs manufactured by different vendors and NICs manufactured by the same vendor using their spectral profiles.

  10. Passive Classification of Wireless NICs during Rate Switching

    Directory of Open Access Journals (Sweden)

    Beyah RaheemA

    2008-01-01

    Full Text Available Abstract Computer networks have become increasingly ubiquitous. However, with the increase in networked applications, there has also been an increase in difficulty to manage and secure these networks. The proliferation of 802.11 wireless networks has heightened this problem by extending networks beyond physical boundaries. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC. This mechanism can be applied to support the detection of unauthorized systems that use NICs which are different from that of a legitimate system. We focus on rate switching, a vaguely specified mechanism required by the 802.11 standard that is implemented in the hardware and software of the wireless NIC. We show that the implementation of this function influences the transmission patterns of a wireless stream, which are observable through traffic analysis. Our mechanism for NIC identification uses signal processing to analyze the periodicity embedded in the wireless traffic caused by rate switching. A stable spectral profile is created from the periodic components of the traffic and used for the identity of the wireless NIC. We show that we can distinguish between NICs manufactured by different vendors and NICs manufactured by the same vendor using their spectral profiles.

  11. Help is in your pocket: the potential accuracy of smartphone- and laptop-based remotely guided resuscitative telesonography.

    Science.gov (United States)

    McBeth, Paul; Crawford, Innes; Tiruta, Corina; Xiao, Zhengwen; Zhu, George Qiaohao; Shuster, Michael; Sewell, Les; Panebianco, Nova; Lautner, David; Nicolaou, Savvas; Ball, Chad G; Blaivas, Michael; Dente, Christopher J; Wyrzykowski, Amy D; Kirkpatrick, Andrew W

    2013-12-01

    Ultrasound (US) examination has many uses in resuscitation, but to use it to its full effectiveness typically requires a trained and proficient user. We sought to use information technology advances to remotely guide US-naive examiners (UNEs) using a portable battery-powered tele-US system mentored using either a smartphone or laptop computer. A cohort of UNEs (5 tactical emergency medicine technicians, 10 ski-patrollers, and 4 nurses) was guided to perform partial or complete Extended Focused Assessment with Sonography of Trauma (EFAST) examinations on both a healthy volunteer and on a US phantom, while being mentored by a remote examiner who viewed the US images over either an iPhone(®) (Apple, Cupertino, CA) or a laptop computer with an inlaid depiction of the US probe and the "patient," derived from a videocamera mounted on the UNE's head. Examinations were recorded as still images and over-read from a Web site by seven expert reviewers (ERs) (three surgeons, two emergentologists, and two radiologists). Examination goals were to identify lung sliding (LS) documented by color power Doppler (CPD) in the human and to identify intraperitoneal (IP) fluid in the phantom. All UNEs were successfully mentored to easily and clearly identify both LS (19 determinations) and IP fluid (14 determinations), as assessed in real time by the remote mentor. ERs confirmed IP fluid in 95 of 98 determinations (97%), with 100% of ERs perceiving clinical utility for the abdominal Focused Assessment with Sonography of Trauma. Based on single still CPD images, 70% of ERs agreed on the presence or absence of LS. In 16 out of 19 cases, over 70% of the ERs felt the EFAST exam was clinically useful. UNEs can confidently be guided to obtain critical findings using simple information technology resources, based on the receiving/transmitting device found in most trauma surgeons' pocket or briefcase. Global US mentoring requires only Internet connectivity and initiative.

  12. When computers were human

    CERN Document Server

    Grier, David Alan

    2013-01-01

    Before Palm Pilots and iPods, PCs and laptops, the term ""computer"" referred to the people who did scientific calculations by hand. These workers were neither calculating geniuses nor idiot savants but knowledgeable people who, in other circumstances, might have become scientists in their own right. When Computers Were Human represents the first in-depth account of this little-known, 200-year epoch in the history of science and technology. Beginning with the story of his own grandmother, who was trained as a human computer, David Alan Grier provides a poignant introduction to the wider wo

  13. Effects of Using Simultaneous Prompting and Computer-Assisted Instruction during Small Group Instruction

    Science.gov (United States)

    Ozen, Arzu; Ergenekon, Yasemin; Ulke-Kurkcuoglu, Burcu

    2017-01-01

    The current study investigated the relation between simultaneous prompting (SP), computer-assisted instruction (CAI), and the receptive identification of target pictures (presented on laptop computer) for four preschool students with developmental disabilities. The students' acquisition of nontarget information through observational learning also…

  14. Introduction to Xgrid: Cluster Computing for Everyone

    OpenAIRE

    Breen, Barbara J.; Lindner, John F.

    2010-01-01

    Xgrid is the first distributed computing architecture built into a desktop operating system. It allows you to run a single job across multiple computers at once. All you need is at least one Macintosh computer running Mac OS X v10.4 or later. (Mac OS X Server is not required.) We provide explicit instructions and example code to get you started, including examples of how to distribute your computing jobs, even if your initial cluster consists of just two old laptops in your basement.

  15. Worm epidemics in wireless ad hoc networks

    Energy Technology Data Exchange (ETDEWEB)

    Nekovee, Maziar [BT Research, Polaris 134, Adastral Park, Martlesham, Suffolk IP5 3RE (United Kingdom); Centre for Computational Science, University College London, 20 Gordon Street, London WC1H 0AJ (United Kingdom)

    2007-06-15

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  16. Worm epidemics in wireless ad hoc networks

    Science.gov (United States)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  17. Worm epidemics in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Nekovee, Maziar

    2007-01-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet

  18. Energy-efficient digital and wireless IC design for wireless smart sensing

    Science.gov (United States)

    Zhou, Jun; Huang, Xiongchuan; Wang, Chao; Tae-Hyoung Kim, Tony; Lian, Yong

    2017-10-01

    Wireless smart sensing is now widely used in various applications such as health monitoring and structural monitoring. In conventional wireless sensor nodes, significant power is consumed in wirelessly transmitting the raw data. Smart sensing adds local intelligence to the sensor node and reduces the amount of wireless data transmission via on-node digital signal processing. While the total power consumption is reduced compared to conventional wireless sensing, the power consumption of the digital processing becomes as dominant as wireless data transmission. This paper reviews the state-of-the-art energy-efficient digital and wireless IC design techniques for reducing the power consumption of the wireless smart sensor node to prolong battery life and enable self-powered applications.

  19. Towards Self-Powered Wireless Sensor Networks

    OpenAIRE

    SPENZA, DORA

    2013-01-01

    Ubiquitous computing aims at creating smart environments in which computational and communication capabilities permeate the word at all scales, improving the human experience and quality of life in a totally unobtrusive yet completely reliable manner. According to this vision, an huge variety of smart devices and products (e.g., wireless sensor nodes, mobile phones, cameras, sensors, home appliances and industrial machines) are interconnected to realize a network of distributed agents that co...

  20. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    National Research Council Canada - National Science Library

    Kessel, Adam; Goodwin, Shane

    2005-01-01

    The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...

  1. Automated mode shape estimation in agent-based wireless sensor networks

    Science.gov (United States)

    Zimmerman, Andrew T.; Lynch, Jerome P.

    2010-04-01

    Recent advances in wireless sensing technology have made it possible to deploy dense networks of sensing transducers within large structural systems. Because these networks leverage the embedded computing power and agent-based abilities integral to many wireless sensing devices, it is possible to analyze sensor data autonomously and in-network. In this study, market-based techniques are used to autonomously estimate mode shapes within a network of agent-based wireless sensors. Specifically, recent work in both decentralized Frequency Domain Decomposition and market-based resource allocation is leveraged to create a mode shape estimation algorithm derived from free-market principles. This algorithm allows an agent-based wireless sensor network to autonomously shift emphasis between improving mode shape accuracy and limiting the consumption of certain scarce network resources: processing time, storage capacity, and power consumption. The developed algorithm is validated by successfully estimating mode shapes using a network of wireless sensor prototypes deployed on the mezzanine balcony of Hill Auditorium, located on the University of Michigan campus.

  2. Study of Wireless Authentication Center with Mixed Encryption in WSN

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2016-01-01

    Full Text Available WSN (wireless sensor network has been used in a wide range of applications nowadays. Sensor networks may often relay critical data; thus, security must be a high priority. However, due to their limited computational, energy, and storage resources, sensor nodes are vulnerable to attack. So how to protect sensor nodes from attacks without raising computational capability and energy consumption is a worthwhile issue. A WAC (wireless authentication center with mixed encryption named “MEWAC” is proposed. MEWAC is based on MCU (Microcontroller Unit and WiFi (Wireless Fidelity module and uses RSA, AES (Advanced Encryption Standard, and SHA-1 (Secure Hash Algorithm 1 to provide high performance authentication and data encryption services for sensor nodes. The experimental results show that MEWAC has the advantages of low cost, low power consumption, good performance, and stability; moreover, the authentication protocol improves the security of WSN and reduces the overhead in node authentication.

  3. From computers to ubiquitous computing by 2010: health care.

    Science.gov (United States)

    Aziz, Omer; Lo, Benny; Pansiot, Julien; Atallah, Louis; Yang, Guang-Zhong; Darzi, Ara

    2008-10-28

    Over the past decade, miniaturization and cost reduction in semiconductors have led to computers smaller in size than a pinhead with powerful processing abilities that are affordable enough to be disposable. Similar advances in wireless communication, sensor design and energy storage have meant that the concept of a truly pervasive 'wireless sensor network', used to monitor environments and objects within them, has become a reality. The need for a wireless sensor network designed specifically for human body monitoring has led to the development of wireless 'body sensor network' (BSN) platforms composed of tiny integrated microsensors with on-board processing and wireless data transfer capability. The ubiquitous computing abilities of BSNs offer the prospect of continuous monitoring of human health in any environment, be it home, hospital, outdoors or the workplace. This pervasive technology comes at a time when Western world health care costs have sharply risen, reflected by increasing expenditure on health care as a proportion of gross domestic product over the last 20 years. Drivers of this rise include an ageing post 'baby boom' population, higher incidence of chronic disease and the need for earlier diagnosis. This paper outlines the role of pervasive health care technologies in providing more efficient health care.

  4. Burn injury caused by laptop computers | Sharma | Annals of ...

    African Journals Online (AJOL)

    If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs. Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link ...

  5. Electricity unplugged

    Science.gov (United States)

    Karalis, Aristeidis

    2009-02-01

    The judge was driving back late one cold winter night. Entering the garage, the battery-charging indicator in his wirelessly powered electric car came on. "Home at last," crossed his mind. He swiped his personal smartcard on the front-door detector to be let in. He heard a "charging" beep from his mobile phone. The blinking cursor on the half-finished e-mail on the laptop had been waiting all day on the side table. He picked the computer up and walked towards his desk. "Good evening, your honour. Your wirelessly heated robe," said the butler-robot as it approached from the kitchen. Putting on the electric garment, he sat on the medical desk chair. His artificial heart was now beating faster.

  6. A wireless computational platform for distributed computing based traffic monitoring involving mixed Eulerian-Lagrangian sensing

    KAUST Repository

    Jiang, Jiming; Claudel, Christian G.

    2013-01-01

    .4GHz 802.15.4 ISM compliant radio module, and can be interfaced with fixed traffic sensors, or receive data from vehicle transponders. The platform is specially designed and optimized to be integrated in a solar-powered wireless sensor network in which

  7. THE LOOK OF THE MONITOR STUDENT IN CONTEXT OF CONTINUED FORMATION TO/IN THE USE OF EDUCATIONAL LAPTOPS

    Directory of Open Access Journals (Sweden)

    Maria Cristina Lima Paniago Lopes

    2013-10-01

    Full Text Available This research has the objective of relating an experience of continued formation with a group of monitors composed by 5 students from a High School situated in the rural area next to Campo Grande in the state of MS. The presented data are partial results from a research in development. It is a qualitative and collaborative research in the sense that the experiences of the monitor students and supervisors teachers are valorized and shared inside a social context. The results show that the monitor student formation contributes to his critical thinking in relation to the insertion of the laptops inside the classroom and to understand the sense of partnership, collaboration and socialization of experiences at the change of knowledge and learning. The acquaintanceship seems to be a positive fact in the monitor students’ reports in the sense of fellowship with teachers and the other colleagues. The monitor students’ speech permits to state that the teachers use the laptop in classroom offering the student an environment of creative and participative learning. It is interesting to notice that the monitor students recognize the positive results from the other students in the developed activities using the laptops, with possibilities of more interest at the content and more interaction among the partners. We believe that the formation of the monitor students has contributed to a collective action at the pedagogical practice among students and teachers in the sense of opening space to change experiences, sharing knowledge and dialogues more interactive. Keywords: Monitor student. PROUCA. Laptops. Literacy. Pedagogical Practice. Continued Formation.

  8. Computation of the Mutual Inductance between Air-Cored Coils of Wireless Power Transformer

    International Nuclear Information System (INIS)

    Anele, A O; Hamam, Y; Djouani, K; Chassagne, L; Alayli, Y; Linares, J

    2015-01-01

    Wireless power transfer system is a modern technology which allows the transfer of electric power between the air-cored coils of its transformer via high frequency magnetic fields. However, due to its coil separation distance and misalignment, maximum power transfer is not guaranteed. Based on a more efficient and general model available in the literature, rederived mathematical models for evaluating the mutual inductance between circular coils with and without lateral and angular misalignment are presented. Rather than presenting results numerically, the computed results are graphically implemented using MATLAB codes. The results are compared with the published ones and clarification regarding the errors made are presented. In conclusion, this study shows that power transfer efficiency of the system can be improved if a higher frequency alternating current is supplied to the primary coil, the reactive parts of the coils are compensated with capacitors and ferrite cores are added to the coils. (paper)

  9. Future Computer, Communication, Control and Automation

    CERN Document Server

    2011 International Conference on Computer, Communication, Control and Automation

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011). 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011) has been held in Zhuhai, China, November 19-20, 2011. This volume topics covered include wireless communications, advances in wireless video, wireless sensors networking, security in wireless networks, network measurement and management, hybrid and discrete-event systems, internet analytics and automation, robotic system and applications, reconfigurable automation systems, machine vision in automation. We hope that researchers, graduate students and other interested readers benefit scientifically from the proceedings and also find it stimulating in the process.

  10. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  11. Receiver-Assisted Congestion Control to Achieve High Throughput in Lossy Wireless Networks

    Science.gov (United States)

    Shi, Kai; Shu, Yantai; Yang, Oliver; Luo, Jiarong

    2010-04-01

    Many applications would require fast data transfer in high-speed wireless networks nowadays. However, due to its conservative congestion control algorithm, Transmission Control Protocol (TCP) cannot effectively utilize the network capacity in lossy wireless networks. In this paper, we propose a receiver-assisted congestion control mechanism (RACC) in which the sender performs loss-based control, while the receiver is performing delay-based control. The receiver measures the network bandwidth based on the packet interarrival interval and uses it to compute a congestion window size deemed appropriate for the sender. After receiving the advertised value feedback from the receiver, the sender then uses the additive increase and multiplicative decrease (AIMD) mechanism to compute the correct congestion window size to be used. By integrating the loss-based and the delay-based congestion controls, our mechanism can mitigate the effect of wireless losses, alleviate the timeout effect, and therefore make better use of network bandwidth. Simulation and experiment results in various scenarios show that our mechanism can outperform conventional TCP in high-speed and lossy wireless environments.

  12. Simulation Of Wireless Networked Control System Using TRUETIME And MATLAB

    Directory of Open Access Journals (Sweden)

    Nyan Phyo Aung

    2015-08-01

    Full Text Available Wireless networked control systems WNCS are attracting an increasing research interests in the past decade. Wireless networked control system WNCS is composed of a group of distributed sensors and actuators that communicate through wireless link which achieves distributed sensing and executing tasks. This is particularly relevant for the areas of communication control and computing where successful design of WNCS brings about new challenges to the researchers. The primary motivation of this survey paper is to examine the design issues and to provide directions for successful simulation and implementation of WNCS. The paper also as well reviews some simulation tools for such systems.

  13. Mastering wireless penetration testing for highly secured environments

    CERN Document Server

    Johns, Aaron

    2015-01-01

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.

  14. The wireless sensor network monitoring system for regional environmental nuclear radiation

    International Nuclear Information System (INIS)

    Liu Chong; Liu Dao; Wang Yaojun; Xie Yuxi; Song Lingling

    2012-01-01

    The wireless sensor network (WSN) technology has been utilized to design a new regional environmental radiation monitoring system based on the wireless sensor networks to meet the special requirements of monitoring the nuclear radiation in certain regions, and realize the wireless transmission of measurement data, information processing and integrated measurement of the nuclear radiation and the corresponding environmental parameters in real time. The system can be applied to the wireless monitoring of nuclear radiation dose in the nuclear radiation environment. The measured data and the distribution of radiation dose can be vividly displayed on the graphical interface in the host computer. The system has functioned with the wireless transmission and control, the data storage, the historical data inquiry, the node remote control. The experimental results show that the system has the advantages of low power consumption, stable performance, network flexibility, range of measurement and so on. (authors)

  15. A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faisal Kaleem

    2013-01-01

    Full Text Available A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.

  16. Analog design of wireless control for home equipment

    Science.gov (United States)

    Zheng, Shiyong; Li, Zhao; Li, Biqing; Jiang, Suping

    2018-04-01

    This design consists of a STC89C52 microcontroller, a serial Bluetooth module and the Android system. Production of STC89C52 controlled by single-chip computer telephone systems. The system is composed of mobile phone Android system as a master in the family centre,via serial Bluetooth module pass instructions and information to implement wireless transceiver using STC89C52 MCU wireless Bluetooth transmission to control homedevices. System high reliability, low cost easy to use, stong applicability and other characerristics, can be used in single-user family, has great significance.

  17. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prasan Kumar Sahoo

    2012-09-01

    Full Text Available Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.

  18. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    Science.gov (United States)

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734

  19. Efficient security mechanisms for mHealth applications using wireless body sensor networks.

    Science.gov (United States)

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.

  20. Household wireless electroencephalogram hat

    Science.gov (United States)

    Szu, Harold; Hsu, Charles; Moon, Gyu; Yamakawa, Takeshi; Tran, Binh

    2012-06-01

    We applied Compressive Sensing to design an affordable, convenient Brain Machine Interface (BMI) measuring the high spatial density, and real-time process of Electroencephalogram (EEG) brainwaves by a Smartphone. It is useful for therapeutic and mental health monitoring, learning disability biofeedback, handicap interfaces, and war gaming. Its spec is adequate for a biomedical laboratory, without the cables hanging over the head and tethered to a fixed computer terminal. Our improved the intrinsic signal to noise ratio (SNR) by using the non-uniform placement of the measuring electrodes to create the proximity of measurement to the source effect. We computing a spatiotemporal average the larger magnitude of EEG data centers in 0.3 second taking on tethered laboratory data, using fuzzy logic, and computing the inside brainwave sources, by Independent Component Analysis (ICA). Consequently, we can overlay them together by non-uniform electrode distribution enhancing the signal noise ratio and therefore the degree of sparseness by threshold. We overcame the conflicting requirements between a high spatial electrode density and precise temporal resolution (beyond Event Related Potential (ERP) P300 brainwave at 0.3 sec), and Smartphone wireless bottleneck of spatiotemporal throughput rate. Our main contribution in this paper is the quality and the speed of iterative compressed image recovery algorithm based on a Block Sparse Code (Baranuick et al, IEEE/IT 2008). As a result, we achieved real-time wireless dynamic measurement of EEG brainwaves, matching well with traditionally tethered high density EEG.

  1. Wireless mesh networks.

    Science.gov (United States)

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

  2. A survey of energy saving techniques for mobile computers

    NARCIS (Netherlands)

    Smit, Gerardus Johannes Maria; Havinga, Paul J.M.

    1997-01-01

    Portable products such as pagers, cordless and digital cellular telephones, personal audio equipment, and laptop computers are increasingly being used. Because these applications are battery powered, reducing power consumption is vital. In this report we first give a survey of techniques for

  3. A Wireless Monitoring Sub-nA Resolution Test Platform for Nanostructure Sensors

    Science.gov (United States)

    Jang, Chi Woong; Byun, Young Tae; Lee, Taikjin; Woo, Deok Ha; Lee, Seok; Jhon, Young Min

    2013-01-01

    We have constructed a wireless monitoring test platform with a sub-nA resolution signal amplification/processing circuit (SAPC) and a wireless communication network to test the real-time remote monitoring of the signals from carbon nanotube (CNT) sensors. The operation characteristics of the CNT sensors can also be measured by the ISD-VSD curve with the SAPC. The SAPC signals are transmitted to a personal computer by Bluetooth communication and the signals from the computer are transmitted to smart phones by Wi-Fi communication, in such a way that the signals from the sensors can be remotely monitored through a web browser. Successful remote monitoring of signals from a CNT sensor was achieved with the wireless monitoring test platform for detection of 0.15% methanol vapor with 0.5 nA resolution and 7 Hz sampling rate. PMID:23783735

  4. A Wireless Monitoring Sub-nA Resolution Test Platform for Nanostructure Sensors

    Directory of Open Access Journals (Sweden)

    Young Min Jhon

    2013-06-01

    Full Text Available We have constructed a wireless monitoring test platform with a sub-nA resolution signal amplification/processing circuit (SAPC and a wireless communication network to test the real-time remote monitoring of the signals from carbon nanotube (CNT sensors. The operation characteristics of the CNT sensors can also be measured by the ISD-VSD curve with the SAPC. The SAPC signals are transmitted to a personal computer by Bluetooth communication and the signals from the computer are transmitted to smart phones by Wi-Fi communication, in such a way that the signals from the sensors can be remotely monitored through a web browser. Successful remote monitoring of signals from a CNT sensor was achieved with the wireless monitoring test platform for detection of 0.15% methanol vapor with 0.5 nA resolution and 7 Hz sampling rate.

  5. Microcontroller-based wireless recorder for biomedical signals.

    Science.gov (United States)

    Chien, C-N; Hsu, H-W; Jang, J-K; Rau, C-L; Jaw, F-S

    2005-01-01

    A portable multichannel system is described for the recording of biomedical signals wirelessly. Instead of using the conversional time-division analog-modulation method, the technique of digital multiplexing was applied to increase the number of signal channels to 4. Detailed design considerations and functional allocation of the system is discussed. The frontend unit was modularly designed to condition the input signal in an optimal manner. Then, the microcontroller handled the tasks of data conversion, wireless transmission, as well as providing the ability of simple preprocessing such as waveform averaging or rectification. The low-power nature of this microcontroller affords the benefit of battery operation and hence, patient isolation of the system. Finally, a single-chip receiver, which compatible with the RF transmitter of the microcontroller, was used to implement a compact interface with the host computer. An application of this portable recorder for low-back pain studies is shown. This device can simultaneously record one ECG and two surface EMG wirelessly, thus, is helpful in relieving patients' anxiety devising clinical measurement. Such an approach, microcontroller-based wireless measurement, could be an important trend for biomedical instrumentation and we help that this paper could be useful for other colleagues.

  6. Investigating the Benefits and Challenges of Using Laptop Computers in Higher Education Classrooms / Étude sur les avantages et les défis associés à l'utilisation d'ordinateurs portables dans les salles de classe d'enseignement supérieur

    Directory of Open Access Journals (Sweden)

    Robin Holding Kay

    2014-05-01

    Full Text Available The purpose of this study was to investigate the benefits and challenges using laptop computers (hereafter referred to as laptops inside and outside higher education classrooms. Quantitative and qualitative data were collected from 156 university students (54 males, 102 females enrolled in either education or communication studies. Benefits of using laptops in class were active note taking, particularly when instructors provided materials ahead of time, searching for academic resources, use of subject-specific software, communicating and sharing information with peers, and engaging with online interactive tools. Challenges of using laptops inside the class included surfing the web for personal reasons, social networking with peers and, to a lesser extent, entertainment in the form of watching video podcasts or playing games. Benefits were reported far more often than challenges inside the classroom. Benefits of using laptops outside of class included collaboration with peers, increased productivity, and conducting research. Challenges of using laptops outside of class included surfing the web for personal reasons, social networking, and entertainment. Benefits and challenges were reported equally often outside the classroom. More research needs to be conducted on the extent to which distractions impede learning and productivity inside and outside the class. Cette étude avait pour but d’examiner les avantages et les défis associés à l'utilisation d’ordinateurs portables à l'intérieur et à l'extérieur des salles de classe d’enseignement supérieur. Des données quantitatives et qualitatives ont été recueillies auprès de 156 étudiants universitaires (54 hommes, 102 femmes inscrits dans des programmes d’éducation ou de communication. Les avantages de l'utilisation d’ordinateurs portables en classe incluaient la prise active de notes, en particulier lorsque les instructeurs fournissaient la documentation à l'avance, la

  7. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  8. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  9. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  10. Laptops Meet Schools, One-One Draw: M-Learning for Secondary Students with Literacy Difficulties

    Science.gov (United States)

    Conway, Paul F.; Amberson, Jessica

    2011-01-01

    Mobile technology-enhanced literacy initiatives have become a focus of efforts to support learning for students with literacy difficulties. The "Laptops Initiative for Post-Primary Students with Dyslexia or other Reading/Writing Difficulties" offers insights into and addresses questions about ICT policy making regarding m-learning technologies for…

  11. A mobile-agent-based wireless sensing network for structural monitoring applications

    International Nuclear Information System (INIS)

    Taylor, Stuart G; Farinholt, Kevin M; Figueiredo, Eloi; Moro, Erik A; Park, Gyuhae; Farrar, Charles R; Flynn, Eric B; Mascarenas, David L; Todd, Michael D

    2009-01-01

    A new wireless sensing network paradigm is presented for structural monitoring applications. In this approach, both power and data interrogation commands are conveyed via a mobile agent that is sent to sensor nodes to perform intended interrogations, which can alleviate several limitations of the traditional sensing networks. Furthermore, the mobile agent provides computational power to make near real-time assessments on the structural conditions. This paper will discuss such prototype systems, which are used to interrogate impedance-based sensors for structural health monitoring applications. Our wireless sensor node is specifically designed to accept various energy sources, including wireless energy transmission, and to be wirelessly triggered on an as-needed basis by the mobile agent or other sensor nodes. The capabilities of this proposed sensing network paradigm are demonstrated in the laboratory and the field

  12. Intelligent Control in Automation Based on Wireless Traffic Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr; Milos Manic

    2007-08-01

    Wireless technology is a central component of many factory automation infrastructures in both the commercial and government sectors, providing connectivity among various components in industrial realms (distributed sensors, machines, mobile process controllers). However wireless technologies provide more threats to computer security than wired environments. The advantageous features of Bluetooth technology resulted in Bluetooth units shipments climbing to five million per week at the end of 2005 [1, 2]. This is why the real-time interpretation and understanding of Bluetooth traffic behavior is critical in both maintaining the integrity of computer systems and increasing the efficient use of this technology in control type applications. Although neuro-fuzzy approaches have been applied to wireless 802.11 behavior analysis in the past, a significantly different Bluetooth protocol framework has not been extensively explored using this technology. This paper presents a new neurofuzzy traffic analysis algorithm of this still new territory of Bluetooth traffic. Further enhancements of this algorithm are presented along with the comparison against the traditional, numerical approach. Through test examples, interesting Bluetooth traffic behavior characteristics were captured, and the comparative elegance of this computationally inexpensive approach was demonstrated. This analysis can be used to provide directions for future development and use of this prevailing technology in various control type applications, as well as making the use of it more secure.

  13. Intelligent Control in Automation Based on Wireless Traffic Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr; Milos Manic

    2007-09-01

    Wireless technology is a central component of many factory automation infrastructures in both the commercial and government sectors, providing connectivity among various components in industrial realms (distributed sensors, machines, mobile process controllers). However wireless technologies provide more threats to computer security than wired environments. The advantageous features of Bluetooth technology resulted in Bluetooth units shipments climbing to five million per week at the end of 2005 [1, 2]. This is why the real-time interpretation and understanding of Bluetooth traffic behavior is critical in both maintaining the integrity of computer systems and increasing the efficient use of this technology in control type applications. Although neuro-fuzzy approaches have been applied to wireless 802.11 behavior analysis in the past, a significantly different Bluetooth protocol framework has not been extensively explored using this technology. This paper presents a new neurofuzzy traffic analysis algorithm of this still new territory of Bluetooth traffic. Further enhancements of this algorithm are presented along with the comparison against the traditional, numerical approach. Through test examples, interesting Bluetooth traffic behavior characteristics were captured, and the comparative elegance of this computationally inexpensive approach was demonstrated. This analysis can be used to provide directions for future development and use of this prevailing technology in various control type applications, as well as making the use of it more secure.

  14. An ad hoc wireless sensor network for tele medicine applications

    International Nuclear Information System (INIS)

    Sheltami, Tarek R.; Mahmoud, Ashraf S.; Abu-Amara, Marwan H.

    2007-01-01

    Recent advances in embedded computing systems have led to the emergence of wireless sensor networks (SNETs), consisting of small, battery-powered motes with limited computation and radio communication capabilities. SNETs permit data gathering and computation to be deeply embedded in the physical environment. Large scale ad hoc sensor networks (ASNET), when deployed among mobile patients, can provide dynamic data query architecture to allow medical specialists to monitor patients at any place via the web or cellular network. In case of an emergency, doctors and/or nurses will be contacted automatically through their handheld personal digital assistants (PDAs) or cellular phones. In specific, the proposed network consists of sensor nodes at the first layer whose responsibility is to measure, collect and communicate, via wired or wireless interface, readings to a microcontroller presenting the second layer of architecture. Deployed microcontrollers process incoming readings and report to a central system via a wireless interface. The implemented network distinguishes between periodic sensor readings and critical or event driven readings where higher priorities is given for the latter. In this paper we implement 3 special cases for tracking and monitoring patients and doctors using SNETs. In addition, the performance of a large scale of our implementation has been tested by means of mathematical analysis. (author)

  15. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  16. Wireless local area network in a prehospital environment

    Directory of Open Access Journals (Sweden)

    Grimes Gary J

    2004-08-01

    Full Text Available Abstract Background Wireless local area networks (WLANs are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER. The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  17. Active node determination for correlated data gathering in wireless sensor networks

    OpenAIRE

    Karasabun, Efe

    2009-01-01

    Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilkent University, 2009. Thesis (Master's) -- Bilkent University, 2009. Includes bibliographical references leaves 53-55. In wireless sensor network applications where data gathered by different sensor nodes is correlated, not all sensor nodes need to be active for the wireless sensor network to be functional. However, the sensor nodes that are selected as active should form a co...

  18. Market-Based Resource Allocation in a Wirelessly Integrated Naval Engineering Plant

    Science.gov (United States)

    2009-12-01

    available wireless nodes will be developed. Using a multi-agent approach based on free market economics (termed market based control) will be explored...as battery power, data storage capacity, MPU time, wireless bandwidth, etc.) required to perform complex computational tasks are available only in a...network. One approach to this problem is to apply free-market economics to help allocate these resources. Free-market economies can be thought of as

  19. A Computational Agent-Based Modeling Approach for Competitive Wireless Service Market

    KAUST Repository

    Douglas, C C; Hyoseop Lee,; Wonsuck Lee,

    2011-01-01

    Using an agent-based modeling method, we study market dynamism with regard to wireless cellular services that are in competition for a greater market share and profit. In the proposed model, service providers and consumers are described as agents

  20. Wireless Handheld Scanners Integrated with Waste Tracking

    International Nuclear Information System (INIS)

    Anderson, Robert Stephen

    2000-01-01

    The US Department of Energy (DOE) Idaho National Engineering and Environmental Laboratory (INEEL) has embraced mobile wireless technology to help the disposition of hazardous and mixed radiological waste. The following paper describes one application the INEEL developed to increase the data accuracy and near-real time reporting requirements for waste management. With the continuous operational demands at the ''site'', it was difficult to sustain an accurate, up-to-date database required for regulatory compliance audits and reporting. Incorporating wireless mobile technology, the INEEL was able to increase the accuracy while reducing the data delay times previously encountered. Installation issues prolonged the project along with obstacles encountered with operations personnel. However, the success of this project was found in persistence and management support as well as the technology itself. Future wireless, mobile computing will continue at the INEEL for years to come based on a successful project that was able to integrate new technology to an existing waste management system with proven, increased data accuracy

  1. Effect of Value Congruence, Brand Distinctiveness, Brand Social, Brand Warmth, and Memorable Brand Experience on Customer-Brand Identification and Brand Loyalty (Case Study: Brand of ACER Laptop)

    Science.gov (United States)

    Susanty, Aries; Tresnaningrum, Aprilia

    2018-02-01

    This study has several purposes. First, this study aims to investigate the effect of consumer-brand value congruence, brand distinctiveness, brand social benefit, brand warmth, and memorable brand experience on customer-brand identification (CBI). We call all of those factors as the antecedent factor of CBI. Second, this study aims to investigate the effect of CBI on customer loyalty. Third, investigate the role of product involvement as a moderating variable of the relationship between brand distinctiveness, brand social benefit, brand warmth, memorable brand experience and CBI. This research used primary data collected through closed questionnaires using a Likert scale of 1 - 5. The total sample size was 273 respondents located in Semarang City who has or has been using Acer Laptop for minimal one year. This research was conducted using Partial Least Square (PLS) method through SmartPLS 3.0 software. The result of data processing indicated that all of the antecedent factors of CBI have the positive and significant effect on CBI of the user of Acer Laptop. In this case, among the five antecedent factors of CBI, value congruence has the greatest effect on CBI of the user of Acer Laptop. The result of data processing also indicated that CBI has the positive and significant effect on brand loyalty of user of Acer Laptop. This study fails to prove the role of product involvement as a moderating variable of the relationship between brand distinctiveness, brand social benefit, brand warmth, memorable brand experience and CBI of the user of Acer Laptop. Moreover, based on the result of hypothesis testing, this study gives some recommendation to Acer Laptop to develop or create some features which are match with the value of user of Laptop Acer in Semarang City.

  2. Effect of Value Congruence, Brand Distinctiveness, Brand Social, Brand Warmth, and Memorable Brand Experience on Customer-Brand Identification and Brand Loyalty (Case Study: Brand of ACER Laptop

    Directory of Open Access Journals (Sweden)

    Susanty Aries

    2018-01-01

    Full Text Available This study has several purposes. First, this study aims to investigate the effect of consumer–brand value congruence, brand distinctiveness, brand social benefit, brand warmth, and memorable brand experience on customer-brand identification (CBI. We call all of those factors as the antecedent factor of CBI. Second, this study aims to investigate the effect of CBI on customer loyalty. Third, investigate the role of product involvement as a moderating variable of the relationship between brand distinctiveness, brand social benefit, brand warmth, memorable brand experience and CBI. This research used primary data collected through closed questionnaires using a Likert scale of 1 - 5. The total sample size was 273 respondents located in Semarang City who has or has been using Acer Laptop for minimal one year. This research was conducted using Partial Least Square (PLS method through SmartPLS 3.0 software. The result of data processing indicated that all of the antecedent factors of CBI have the positive and significant effect on CBI of the user of Acer Laptop. In this case, among the five antecedent factors of CBI, value congruence has the greatest effect on CBI of the user of Acer Laptop. The result of data processing also indicated that CBI has the positive and significant effect on brand loyalty of user of Acer Laptop. This study fails to prove the role of product involvement as a moderating variable of the relationship between brand distinctiveness, brand social benefit, brand warmth, memorable brand experience and CBI of the user of Acer Laptop. Moreover, based on the result of hypothesis testing, this study gives some recommendation to Acer Laptop to develop or create some features which are match with the value of user of Laptop Acer in Semarang City.

  3. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    Science.gov (United States)

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  4. One-to-One Laptop Teacher Education: Does Involvement Affect Candidate Technology Skills and Dispositions?

    Science.gov (United States)

    Donovan, Loretta; Green, Tim; Hansen, Laurie E.

    2012-01-01

    This study compares teacher candidates' initial and changed beliefs, dispositions, and uses of technology in two credential program models: a one-to-one laptop program with ubiquitous technology use and a traditional credential program in which students are expected to have specific technology experiences and requirements in each course (a model…

  5. Visual ergonomics and computer work--is it all about computer glasses?

    Science.gov (United States)

    Jonsson, Christina

    2012-01-01

    The Swedish Provisions on Work with Display Screen Equipment and the EU Directive on the minimum safety and health requirements for work with display screen equipment cover several important visual ergonomics aspects. But a review of cases and questions to the Swedish Work Environment Authority clearly shows that most attention is given to the demands for eyesight tests and special computer glasses. Other important visual ergonomics factors are at risk of being neglected. Today computers are used everywhere, both at work and at home. Computers can be laptops, PDA's, tablet computers, smart phones, etc. The demands on eyesight tests and computer glasses still apply but the visual demands and the visual ergonomics conditions are quite different compared to the use of a stationary computer. Based on this review, we raise the question if the demand on the employer to provide the employees with computer glasses is outdated.

  6. 76 FR 45860 - In the Matter of Certain Electronic Devices, Including Wireless Communication Devices, Portable...

    Science.gov (United States)

    2011-08-01

    ..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... electronic devices, including wireless communication devices, portable music and data processing devices, and...''). The complaint further alleges that an industry in the United States exists or is in the process of...

  7. Efficient Evaluation of Wireless Real-Time Control Networks

    Directory of Open Access Journals (Sweden)

    Peter Horvath

    2015-02-01

    Full Text Available In this paper, we present a system simulation framework for the design and performance evaluation of complex wireless cyber-physical systems. We describe the simulator architecture and the specific developments that are required to simulate cyber-physical systems relying on multi-channel, multihop mesh networks. We introduce realistic and efficient physical layer models and a system simulation methodology, which provides statistically significant performance evaluation results with low computational complexity. The capabilities of the proposed framework are illustrated in the example of WirelessHART, a centralized, real-time, multi-hop mesh network designed for industrial control and monitor applications.

  8. Wireless sensing and vibration control with increased redundancy and robustness design.

    Science.gov (United States)

    Li, Peng; Li, Luyu; Song, Gangbing; Yu, Yan

    2014-11-01

    Control systems with long distance sensor and actuator wiring have the problem of high system cost and increased sensor noise. Wireless sensor network (WSN)-based control systems are an alternative solution involving lower setup and maintenance costs and reduced sensor noise. However, WSN-based control systems also encounter problems such as possible data loss, irregular sampling periods (due to the uncertainty of the wireless channel), and the possibility of sensor breakdown (due to the increased complexity of the overall control system). In this paper, a wireless microcontroller-based control system is designed and implemented to wirelessly perform vibration control. The wireless microcontroller-based system is quite different from regular control systems due to its limited speed and computational power. Hardware, software, and control algorithm design are described in detail to demonstrate this prototype. Model and system state compensation is used in the wireless control system to solve the problems of data loss and sensor breakdown. A positive position feedback controller is used as the control law for the task of active vibration suppression. Both wired and wireless controllers are implemented. The results show that the WSN-based control system can be successfully used to suppress the vibration and produces resilient results in the presence of sensor failure.

  9. Wireless Wide Area Networks for School Districts.

    Science.gov (United States)

    Nair, Prakash

    This paper considers a basic question that many schools districts face in attempting to develop affordable, expandable district-wide computer networks that are resistant to obsolescence: Should these wide area networks (WANs) employ wireless technology, stick to venerable hard-wired solutions, or combine both. This publication explores the…

  10. Prediction-based Dynamic Energy Management in Wireless Sensor Networks

    Science.gov (United States)

    Wang, Xue; Ma, Jun-Jie; Wang, Sheng; Bi, Dao-Wei

    2007-01-01

    Energy consumption is a critical constraint in wireless sensor networks. Focusing on the energy efficiency problem of wireless sensor networks, this paper proposes a method of prediction-based dynamic energy management. A particle filter was introduced to predict a target state, which was adopted to awaken wireless sensor nodes so that their sleep time was prolonged. With the distributed computing capability of nodes, an optimization approach of distributed genetic algorithm and simulated annealing was proposed to minimize the energy consumption of measurement. Considering the application of target tracking, we implemented target position prediction, node sleep scheduling and optimal sensing node selection. Moreover, a routing scheme of forwarding nodes was presented to achieve extra energy conservation. Experimental results of target tracking verified that energy-efficiency is enhanced by prediction-based dynamic energy management.

  11. Algorithm for Wireless Sensor Networks Based on Grid Management

    Directory of Open Access Journals (Sweden)

    Geng Zhang

    2014-05-01

    Full Text Available This paper analyzes the key issues for wireless sensor network trust model and describes a method to build a wireless sensor network, such as the definition of trust for wireless sensor networks, computing and credibility of trust model application. And for the problem that nodes are vulnerable to attack, this paper proposed a grid-based trust algorithm by deep exploration trust model within the framework of credit management. Algorithm for node reliability screening and rotation schedule to cover parallel manner based on the implementation of the nodes within the area covered by trust. And analyze the results of the size of trust threshold has great influence on the safety and quality of coverage throughout the coverage area. The simulation tests the validity and correctness of the algorithm.

  12. Prediction-based Dynamic Energy Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Dao-Wei Bi

    2007-03-01

    Full Text Available Energy consumption is a critical constraint in wireless sensor networks. Focusing on the energy efficiency problem of wireless sensor networks, this paper proposes a method of prediction-based dynamic energy management. A particle filter was introduced to predict a target state, which was adopted to awaken wireless sensor nodes so that their sleep time was prolonged. With the distributed computing capability of nodes, an optimization approach of distributed genetic algorithm and simulated annealing was proposed to minimize the energy consumption of measurement. Considering the application of target tracking, we implemented target position prediction, node sleep scheduling and optimal sensing node selection. Moreover, a routing scheme of forwarding nodes was presented to achieve extra energy conservation. Experimental results of target tracking verified that energy-efficiency is enhanced by prediction-based dynamic energy management.

  13. Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Bakar, Kamalrulnizam Abu; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks. PMID:22368490

  14. Multipath routing in wireless sensor networks: survey and research challenges.

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Abu Bakar, Kamalrulnizam; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks.

  15. Temperature estimation of induction machines based on wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Y. Huang

    2018-04-01

    Full Text Available In this paper, a fourth-order Kalman filter (KF algorithm is implemented in the wireless sensor node to estimate the temperatures of the stator winding, the rotor cage and the stator core in the induction machine. Three separate wireless sensor nodes are used as the data acquisition systems for different input signals. Six Hall sensors are used to acquire the three-phase stator currents and voltages of the induction machine. All of them are processed to root mean square (rms in ampere and volt. A rotary encoder is mounted for the rotor speed and Pt-1000 is used for the temperature of the coolant air. The processed signals in the physical unit are transmitted wirelessly to the host wireless sensor node, where the KF is implemented with fixed-point arithmetic in Contiki OS. Time-division multiple access (TDMA is used to make the wireless transmission more stable. Compared to the floating-point implementation, the fixed-point implementation has the same estimation accuracy at only about one-fifth of the computation time. The temperature estimation system can work under any work condition as long as there are currents through the machine. It can also be rebooted for estimation even when wireless transmission has collapsed or packages are missing.

  16. A Comparative Study of Wireless Sensor Networks and Their Routing Protocols

    Directory of Open Access Journals (Sweden)

    Subhajit Pal

    2010-11-01

    Full Text Available Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs. Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  17. Software defined wireless sensor networks application opportunities for efficient network management: a survey

    CSIR Research Space (South Africa)

    Modieginyane, KM

    2017-03-01

    Full Text Available Wireless Sensor Networks (WSNs) are commonly used information technologies of modern networking and computing platforms. Today's network computing applications are faced with a high demand of powerful network functionalities. Functional network...

  18. Conceptual Considerations for Reducing the Computational Complexity in Software Defined Radio using Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Kristensen, Jesper Michael; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    the expected increase in complexity leading to a decrease in energy efficiency, cooperative wireless networks are introduced. Cooperative wireless networks enables the concept of resource sharing. Resource sharing is interpreted as collaborative signal processing. This interpretation leads to the concept...... of a distributed signal processor. OFDM and the principle of FFT is described as an example of collaborative signal processing....

  19. Defense Department funds advanced military wireless networks research

    OpenAIRE

    Crumbley, Liz

    2005-01-01

    The U.S. Department of Defense has awarded a $246,000 Defense University Research Instrumentation Program (DURIP) grant to researchers in Virginia Tech's Bradley Department of Electrical and Computer Engineering for advanced research on wireless communications networks that are critical during military maneuvers.

  20. The Audacity of Fiber-Wireless (FiWi) Networks

    Science.gov (United States)

    Maier, Martin; Ghazisaidi, Navid; Reisslein, Martin

    A plethora of enabling optical and wireless technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi) broadband access networks. After overviewing key enabling radio-over-fiber (RoF) and radio-and-fiber (R&F) technologies and briefly surveying the state of the art of FiWi networks, we introduce an Ethernet-based access-metro FiWi network, called SuperMAN, that integrates next-generation WiFi and WiMAX networks with WDM-enhanced EPON and RPR networks. Throughout the paper we pay close attention to the technical challenges and opportunities of FiWi networks, but also elaborate on their societal benefits and potential to shift the current research focus from optical-wireless networking to the exploitation of personal and in-home computing facilities to create new unforeseen services and applications as we are about to enter the Petabyte age.

  1. MARGINAL EXPENSE OIL WELL WIRELESS SURVEILLANCE MEOWS

    Energy Technology Data Exchange (ETDEWEB)

    Mason M. Medizade; John R. Ridgely; Donald G. Nelson

    2004-11-01

    A marginal expense oil well wireless surveillance system to monitor system performance and production from rod-pumped wells in real time from wells operated by Vaquero Energy in the Edison Field, Main Area of Kern County in California has been successfully designed and field tested. The surveillance system includes a proprietary flow sensor, a programmable transmitting unit, a base receiver and receiving antenna, and a base station computer equipped with software to interpret the data. First, the system design is presented. Second, field data obtained from three wells is shown. Results of the study show that an effective, cost competitive, real-time wireless surveillance system can be introduced to oil fields across the United States and the world.

  2. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  3. 75 FR 33303 - Comment Sought on Measurement of Mobile Broadband Network Performance and Coverage

    Science.gov (United States)

    2010-06-11

    ... on fixed residential and small business Internet broadband services. With that public notice, the...., smartphone, feature phones, laptop, wireless modem) itself have on end-user experienced network performance...

  4. Security in Wireless Sensor Networks Employing MACGSP6

    Science.gov (United States)

    Nitipaichit, Yuttasart

    2010-01-01

    Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…

  5. Energy efficiency of error correction on wireless systems

    NARCIS (Netherlands)

    Havinga, Paul J.M.

    1999-01-01

    Since high error rates are inevitable to the wireless environment, energy-efficient error-control is an important issue for mobile computing systems. We have studied the energy efficiency of two different error correction mechanisms and have measured the efficiency of an implementation in software.

  6. A wireless lingual feedback device to reduce overpressures in seated posture: a feasibility study.

    Directory of Open Access Journals (Sweden)

    Olivier Chenu

    2009-10-01

    Full Text Available Pressure sores are localized injuries to the skin and underlying tissues and are mainly resulting from overpressure. Paraplegic peoples are particularly subjects to pressure sores because of long-time seated postures and sensory deprivation at the lower limbs.Here we report outcomes of a feasibility trial involving a biofeedback system aimed at reducing buttock overpressure whilst an individual is seated. The system consists of (1 pressure sensors, (2 a laptop coupling sensors and actuator (3 a wireless Tongue Display Unit (TDU consisting of a circuit embedded in a dental retainer with electrodes put in contact with the tongue. The principle consists in (1 detecting overpressures in people who are seated over long periods of time, (2 estimating a postural change that could reduce these overpressures and (3 communicating this change through directional information transmitted by the TDU.Twenty-four healthy subjects voluntarily participated in this study. Twelve healthy subjects initially formed the experimental group (EG and were seated on a chair with the wireless TDU inside their mouth. They were asked to follow TDU orders that were randomly spread throughout the session. They were evaluated during two experimental sessions during which 20 electro-stimulations were sent. Twelve other subjects, added retrospectively, formed the control group (CG. These subjects participated in one session of the same experiment without any biofeedback.Three dependent variables were computed: (1 the ability of subjects to reach target posture (EG versus CG, (2 high pressure reductions after a biofeedback (EG versus CG and (3 the level of these reductions relative to their initial values (EG only. Results show (1 that EG reached target postures in 90.2% of the trials, against 5,3% in the CG, (2 a significant reduction in overpressures in the EG compared to the CG and (3, for the EG, that the higher the initial pressures were, the more they were decreased

  7. A Wireless Lingual Feedback Device to Reduce Overpressures in Seated Posture: A Feasibility Study

    Science.gov (United States)

    Chenu, Olivier; Vuillerme, Nicolas; Demongeot, Jacques; Payan, Yohan

    2009-01-01

    Background Pressure sores are localized injuries to the skin and underlying tissues and are mainly resulting from overpressure. Paraplegic peoples are particularly subjects to pressure sores because of long-time seated postures and sensory deprivation at the lower limbs. Methodology/Principal Findings Here we report outcomes of a feasibility trial involving a biofeedback system aimed at reducing buttock overpressure whilst an individual is seated. The system consists of (1) pressure sensors, (2) a laptop coupling sensors and actuator (3) a wireless Tongue Display Unit (TDU) consisting of a circuit embedded in a dental retainer with electrodes put in contact with the tongue. The principle consists in (1) detecting overpressures in people who are seated over long periods of time, (2) estimating a postural change that could reduce these overpressures and (3) communicating this change through directional information transmitted by the TDU.Twenty-four healthy subjects voluntarily participated in this study. Twelve healthy subjects initially formed the experimental group (EG) and were seated on a chair with the wireless TDU inside their mouth. They were asked to follow TDU orders that were randomly spread throughout the session. They were evaluated during two experimental sessions during which 20 electro-stimulations were sent. Twelve other subjects, added retrospectively, formed the control group (CG). These subjects participated in one session of the same experiment without any biofeedback.Three dependent variables were computed: (1) the ability of subjects to reach target posture (EG versus CG), (2) high pressure reductions after a biofeedback (EG versus CG) and (3) the level of these reductions relative to their initial values (EG only). Results show (1) that EG reached target postures in 90.2% of the trials, against 5,3% in the CG, (2) a significant reduction in overpressures in the EG compared to the CG and (3), for the EG, that the higher the initial pressures

  8. Flood and Traffic Wireless Monitoring System for Smart Cities

    KAUST Repository

    Mousa, Mustafa

    2016-01-01

    The convergence of computation, communication and sensing has led to the emergence of Wireless Sensor Networks (WSNs), which allow distributed monitoring of physical phenomena over extended areas. In this thesis, we focus on a dual flood and traffic

  9. Multi-sink mobile wireless sensor networks: dissemination protocols, design and evaluation

    NARCIS (Netherlands)

    Erman-Tüysüz, A.

    2011-01-01

    In pervasive systems, as they are getting smaller and smaller, computers can be found just about everywhere, but their presence is not noticed because the technologies are often embedded within items. One of the smallest and well known embedded computers is a wireless sensor node, which is a passive

  10. Scaling Laws for Heterogeneous Wireless Networks

    Science.gov (United States)

    2009-09-01

    planned and the size of communication networks that are fundamentally understood. On the one hand, wireline networks (like the Internet) have grown from...Franceschetti, Marco D. Migliore, and Paolo Minero . The capacity of wireless networks: Information-theoretic and physical limits. In Proceedings of the...Allerton Conference on Communication, Control, and Computing, September 2007. [12] Massimo Franceschetti, Marco D. Migliore, and Paolo Minero . The

  11. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  12. Simulating Real-Time Aspects of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Christian Nastasi

    2010-01-01

    Full Text Available Wireless Sensor Networks (WSNs technology has been mainly used in the applications with low-frequency sampling and little computational complexity. Recently, new classes of WSN-based applications with different characteristics are being considered, including process control, industrial automation and visual surveillance. Such new applications usually involve relatively heavy computations and also present real-time requirements as bounded end-to- end delay and guaranteed Quality of Service. It becomes then necessary to employ proper resource management policies, not only for communication resources but also jointly for computing resources, in the design and development of such WSN-based applications. In this context, simulation can play a critical role, together with analytical models, for validating a system design against the parameters of Quality of Service demanded for. In this paper, we present RTNS, a publicly available free simulation tool which includes Operating System aspects in wireless distributed applications. RTNS extends the well-known NS-2 simulator with models of the CPU, the Real-Time Operating System and the application tasks, to take into account delays due to the computation in addition to the communication. We demonstrate the benefits of RTNS by presenting our simulation study for a complex WSN-based multi-view vision system for real-time event detection.

  13. A Wireless Implantable Switched-Capacitor Based Optogenetic Stimulating System

    Science.gov (United States)

    Lee, Hyung-Min; Kwon, Ki-Yong; Li, Wen

    2015-01-01

    This paper presents a power-efficient implantable optogenetic interface using a wireless switched-capacitor based stimulating (SCS) system. The SCS efficiently charges storage capacitors directly from an inductive link and periodically discharges them into an array of micro-LEDs, providing high instantaneous power without affecting wireless link and system supply voltage. A custom-designed computer interface in LabVIEW environment wirelessly controls stimulation parameters through the inductive link, and an optrode array enables simultaneous neural recording along with optical stimulation. The 4-channel SCS system prototype has been implemented in a 0.35-μm CMOS process and combined with the optrode array. In vivo experiments involving light-induced local field potentials verified the efficacy of the SCS system. An implantable version of the SCS system with flexible hermetic sealing is under development for chronic experiments. PMID:25570099

  14. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  15. Virtual View Image over Wireless Visual Sensor Network

    Directory of Open Access Journals (Sweden)

    Gamantyo Hendrantoro

    2011-12-01

    Full Text Available In general, visual sensors are applied to build virtual view images. When number of visual sensors increases then quantity and quality of the information improves. However, the view images generation is a challenging task in Wireless Visual Sensor Network environment due to energy restriction, computation complexity, and bandwidth limitation. Hence this paper presents a new method of virtual view images generation from selected cameras on Wireless Visual Sensor Network. The aim of the paper is to meet bandwidth and energy limitations without reducing information quality. The experiment results showed that this method could minimize number of transmitted imageries with sufficient information.

  16. Research, Designing And Manufacture Of Gamma Dosimeter Wireless Data Transfer

    International Nuclear Information System (INIS)

    Bui Trong Duy; Phan Quoc Minh; Dinh Thi Hien; Ngo Duc Tin; Le Trong Nghia

    2013-01-01

    The system equipment of wireless data transmission Gamma dosimeter consist of standard RF Gamma dosimeter wireless data transmission and wireless data transceiver connection with a computer via RS232 port. The system is designed based on the PIC processor, Geiger-Muller (GM) counter tube used to measure Gamma radiation and measured results show the equivalent dose rate in microsievert units of the SI system. The data has been displayed on the LCD screen of the meter and at the same time has been sent to the wireless receiving host computer located in the control room at distance of about 300 m via standard RF. The equipment used high-voltage 300-500 VDC. The GM counting tube used as radiation detectors to convert quantum Gamma radiation into electrical impulses, these impulses are counted continuously by microprocessor to compute the counter speed of average dose as well as equivalence dose. The processor automatically set measurement time depends on the different dose rates: In the natural foundation, time is approximately 36 seconds, when the dose rate increases, the time reduced to 1 second. The cumulative dose rate values are displayed on the LCD screen with the unit of measurement for dose rate is µSv/h and µSv for the cumulative dose, the measurement range is set automatically according to the scale of: from 10 to 100 µSv/h. All the electronic components function of low power consumption of about 10 mA plus the consumption of RF module about 20 mA when working in the sending state and 1 mA in standby state. Such devices can operate with type 9 V Alkaline battery placed inside while using portable mode, displaying the results on the LCD screen which does not release data on the host computer. In case meter is fixed to measure continuous for long days, the device will be linked to 9 VDC power, supplied from a rectifier 220 VAC mains to the 9 VDC source. (author)

  17. Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers

    Science.gov (United States)

    Jordan, Jakob; Ippen, Tammo; Helias, Moritz; Kitayama, Itaru; Sato, Mitsuhisa; Igarashi, Jun; Diesmann, Markus; Kunkel, Susanne

    2018-01-01

    State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems. PMID:29503613

  18. Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers.

    Science.gov (United States)

    Jordan, Jakob; Ippen, Tammo; Helias, Moritz; Kitayama, Itaru; Sato, Mitsuhisa; Igarashi, Jun; Diesmann, Markus; Kunkel, Susanne

    2018-01-01

    State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems.

  19. Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers

    Directory of Open Access Journals (Sweden)

    Jakob Jordan

    2018-02-01

    Full Text Available State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems.

  20. Fatal collision? Are wireless headsets a risk in treating patients?

    Science.gov (United States)

    Sage, Cindy; Hardell, Lennart

    2018-02-05

    Wireless-enabled headsets that connect to the internet can provide remote transcribing of patient examination notes. Audio and video can be captured and transmitted by wireless signals sent from the computer screen in the frame of the glasses. But using wireless glass-type devices can expose the user to a specific absorption rates (SAR) of 1.11-1.46 W/kg of radiofrequency radiation. That RF intensity is as high as or higher than RF emissions of some cell phones. Prolonged use of cell phones used ipsilaterally at the head has been associated with statistically significant increased risk of glioma and acoustic neuroma. Using wireless glasses for extended periods to teach, to perform surgery, or conduct patient exams will expose the medical professional to similar RF exposures which may impair brain performance, cognition and judgment, concentration and attention and increase the risk for brain tumors. The quality of medical care may be compromised by extended use of wireless-embedded devices in health care settings. Both medical professionals and their patients should know the risks of such devices and have a choice about allowing their use during patient exams. Transmission of sensitive patient data over wireless networks may increase the risk of hacking and security breaches leading to losses of private patient medical and financial data that are strictly protected under HIPPA health information privacy laws.

  1. Scalable Coverage Maintenance for Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jun Lu

    2007-06-01

    Full Text Available Owing to numerous potential applications, wireless sensor networks have been attracting significant research effort recently. The critical challenge that wireless sensor networks often face is to sustain long-term operation on limited battery energy. Coverage maintenance schemes can effectively prolong network lifetime by selecting and employing a subset of sensors in the network to provide sufficient sensing coverage over a target region. We envision future wireless sensor networks composed of a vast number of miniaturized sensors in exceedingly high density. Therefore, the key issue of coverage maintenance for future sensor networks is the scalability to sensor deployment density. In this paper, we propose a novel coverage maintenance scheme, scalable coverage maintenance (SCOM, which is scalable to sensor deployment density in terms of communication overhead (i.e., number of transmitted and received beacons and computational complexity (i.e., time and space complexity. In addition, SCOM achieves high energy efficiency and load balancing over different sensors. We have validated our claims through both analysis and simulations.

  2. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  3. A Novel Intelligent Transportation Control Supported by Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Zhe Qian

    2013-05-01

    Full Text Available With the development of wireless sensor unit, and improvement of real-time and quality of wireless communication, the intelligent transportation control system employ these technologies to realize sensing, positioning, computing, and communication for voiding collisions. This paper discusses the framework of transportation control system, and emphases TDOA positioning algorithm and the new weighted least square optimization method. The simulation result shows that, our method achieves high-accuracy of positioning, which can satisfy the need of transportation control. Finally, we outline the urgent work need to address in the future.

  4. Enabling Wireless Avionics Intra-Communications

    Science.gov (United States)

    Torres, Omar; Nguyen, Truong; Mackenzie, Anne

    2016-01-01

    The Electromagnetics and Sensors Branch of NASA Langley Research Center (LaRC) is investigating the potential of an all-wireless aircraft as part of the ECON (Efficient Reconfigurable Cockpit Design and Fleet Operations using Software Intensive, Networked and Wireless Enabled Architecture) seedling proposal, which is funded by the Convergent Aeronautics Solutions (CAS) project, Transformative Aeronautics Concepts (TAC) program, and NASA Aeronautics Research Institute (NARI). The project consists of a brief effort carried out by a small team in the Electromagnetic Environment Effects (E3) laboratory with the intention of exposing some of the challenges faced by a wireless communication system inside the reflective cavity of an aircraft and to explore potential solutions that take advantage of that environment for constructive gain. The research effort was named EWAIC for "Enabling Wireless Aircraft Intra-communications." The E3 laboratory is a research facility that includes three electromagnetic reverberation chambers and equipment that allow testing and generation of test data for the investigation of wireless systems in reflective environments. Using these chambers, the EWAIC team developed a set of tests and setups that allow the intentional variation of intensity of a multipath field to reproduce the environment of the various bays and cabins of large transport aircraft. This setup, in essence, simulates an aircraft environment that allows the investigation and testing of wireless communication protocols that can effectively be used as a tool to mitigate some of the risks inherent to an aircraft wireless system for critical functions. In addition, the EWAIC team initiated the development of a computational modeling tool to illustrate the propagation of EM waves inside the reflective cabins and bays of aircraft and to obtain quantifiable information regarding the degradation of signals in aircraft subassemblies. The nose landing gear of a UAV CAD model was used

  5. 1st International Conference on Computational Intelligence and Informatics

    CERN Document Server

    Prasad, V; Rani, B; Udgata, Siba; Raju, K

    2017-01-01

    The book covers a variety of topics which include data mining and data warehousing, high performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, image processing, computer networks, wireless networks, social networks, wireless sensor networks, information and network security, web security, internet of things, bioinformatics and geoinformatics. The book is a collection of best papers submitted in the First International Conference on Computational Intelligence and Informatics (ICCII 2016) held during 28-30 May 2016 at JNTUH CEH, Hyderabad, India. It was hosted by Department of Computer Science and Engineering, JNTUH College of Engineering in association with Division V (Education & Research) CSI, India. .

  6. The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Narasimha Shashidhar

    2015-12-01

    Full Text Available A node replication attack against a wireless sensor network involves surreptitious efforts by an adversary to insert duplicate sensor nodes into the network while avoiding detection. Due to the lack of tamper-resistant hardware and the low cost of sensor nodes, launching replication attacks takes little effort to carry out. Naturally, detecting these replica nodes is a very important task and has been studied extensively. In this paper, we propose a novel distributed, randomized sensor duplicate detection algorithm called Discard to detect node replicas in group-deployed wireless sensor networks. Our protocol is an epidemic, self-organizing duplicate detection scheme, which exhibits emergent properties. Epidemic schemes have found diverse applications in distributed computing: load balancing, topology management, audio and video streaming, computing aggregate functions, failure detection, network and resource monitoring, to name a few. To the best of our knowledge, our algorithm is the first attempt at exploring the potential of this paradigm to detect replicas in a wireless sensor network. Through analysis and simulation, we show that our scheme achieves robust replica detection with substantially lower communication, computational and storage requirements than prior schemes in the literature.

  7. PROGRAM ACARA ANAK LAPTOP SI UNYIL DI TRANS7

    Directory of Open Access Journals (Sweden)

    Mahardini -

    2016-01-01

    Full Text Available This study is to explore the strategy of awakening of The Unyil ‘Indonesian puppet film at television’. “The Unyil” is one of the popular children’s show on 1980's era until the early 1990's. Meanwhile “Laptop Si Unyil” premiered in Trans7 broadcast on March 19, 2007. The main characters used in this program is a puppet show “The Unyil”. This study focuses on the finding of new concept of ‘The Unyil’ in order to be able to re-life. Some perspectives would be analyzed such as program theme, style of storytelling, the use of narrator, and narrative structure. Keywords: program theme, narrative structure, style of storytelling, the use of anarrator.

  8. Radiation area monitoring by wireless-communicating area monitor with surveillance camera

    International Nuclear Information System (INIS)

    Shimura, Mitsuo; Kobayashi, Hiromitsu; Kitahara, Hideki; Kobayashi, Hironobu; Okamoto, Shinji

    2004-01-01

    Aiming at a dose reduction and a work efficiency improvement for nuclear power plants that have high dose regions, we have developed our system of wireless-communicating Area Monitor with Surveillance Camera, and have performed an on-site test. Now we are implementing this Area Monitor with Surveillance Camera for a use as a TV camera in the controlled-area, which enables a personal computer to simultaneously display two or more dose values and site live images on the screen. For the radiation detector of this Area Monitor System, our wireless-communicating dosimeter is utilized. Image data are transmitted via a wireless Local Area Network (LAN). As a test result, image transmission of a maximum of 20 frames per second has been realized, which shows that this concept is a practical application. Remote-site monitoring also has been realized from an office desk located within the non-controlled area, adopting a Japan's wireless phone system, PHS (Personal Handy Phone) for the transmission interface. (author)

  9. Keyboards: from Typewriters to Tablet Computers

    Directory of Open Access Journals (Sweden)

    Gintautas Grigas

    2014-06-01

    Full Text Available The evolution of Lithuanian keyboards is reviewed. Keyboards are divided up to three categories according to flexibility of their adaptation for typing of Lithuanian texts: 1 mechanical typewriter keyboards (heavily adaptable, 2 electromechanical desktop or laptop computer keyboards, and 3 programmable touch screen tablet computer keyboards (easily adaptable. It is discussed how they were adapted for Lithuanian language, with solutions in other languages are compared. Both successful and unsuccessful solutions are discussed. The reasons of failures as well as their negative impact on writing culture and formation of bad habits in the work with computer are analyzed. The recommendations how to improve current situation are presented.

  10. Low power design of wireless endoscopy compression/communication architecture

    Directory of Open Access Journals (Sweden)

    Zitouni Abdelkrim

    2018-05-01

    Full Text Available A wireless endoscopy capsule represents an efficient device interesting on the examination of digestive diseases. Many performance criteria’s (silicon area, dissipated power, image quality, computational time, etc. need to be deeply studied.In this paper, our interest is the optimization of the indicated criteria. The proposed methodology is based on exploring the advantages of the DCT/DWT transforms by combining them into single architecture. For arithmetic operations, the MCLA technique is used. This architecture integrates also a CABAC entropy coder that supports all binarization schemes. AMBA/I2C architecture is developed for assuring optimized communication.The comparisons of the proposed architecture with the most popular methods explained in related works show efficient results in terms dissipated power, hardware cost, and computation speed. Keywords: Wireless endoscopy capsule, DCT/DWT image compression, CABAC entropy coder, AMBA/I2C multi-bus architecture

  11. A Survey of Students Participating in a Computer-Assisted Education Programme

    Science.gov (United States)

    Yel, Elif Binboga; Korhan, Orhan

    2015-01-01

    This paper mainly examines anthropometric data, data regarding the habits, experiences, and attitudes of the students about their tablet/laptop/desktop computer use, in addition to self-reported musculoskeletal discomfort levels and frequencies of students participating in a tablet-assisted interactive education programme. A two-part questionnaire…

  12. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  13. Integrated wireless systems: The future has arrived (Keynote Address)

    Science.gov (United States)

    Rivoir, Roberto

    2005-06-01

    It is believed that we are just at the beginning with wireless, and that a new age is dawning for this breakthrough technology. Thanks to several years of industrial manufacturing in mass-market applications such as cellular phones, wireless technology has nowadays reached a level of maturity that, combined with other achievements arising from different fields, such as information technology, artificial intelligence, pervasive computing, science of new materials, and micro-electro-mechanical systems (MEMS), will enable the realization of a networked stream-flow of real-time information, that will accompany us in our daily life, in a total seamless, transparent fashion. As almost any application scenario will require the deployment of complex, miniaturized, almost "invisible" systems, operating with different wireless standards, hard technological challenges will have to be faced for designing and fabricating ultra-low-cost, reconfigurable, and multi-mode heterogeneous smart micro-devices. But ongoing, unending progresses on wireless technology keeps the promise of helping to solve important societal problems in the health-care, safety, security, industry, environment sectors, and in general opening the possibility for an improved quality of life at work, on travel, at home, practically "everywhere, anytime".

  14. Electronic Devices, Methods, and Computer Program Products for Selecting an Antenna Element Based on a Wireless Communication Performance Criterion

    DEFF Research Database (Denmark)

    2014-01-01

    A method of operating an electronic device includes providing a plurality of antenna elements, evaluating a wireless communication performance criterion to obtain a performance evaluation, and assigning a first one of the plurality of antenna elements to a main wireless signal reception...... and transmission path and a second one of the plurality of antenna elements to a diversity wireless signal reception path based on the performance evaluation....

  15. Biomedical Wireless Ambulatory Crew Monitor

    Science.gov (United States)

    Chmiel, Alan; Humphreys, Brad

    2009-01-01

    A compact, ambulatory biometric data acquisition system has been developed for space and commercial terrestrial use. BioWATCH (Bio medical Wireless and Ambulatory Telemetry for Crew Health) acquires signals from biomedical sensors using acquisition modules attached to a common data and power bus. Several slots allow the user to configure the unit by inserting sensor-specific modules. The data are then sent real-time from the unit over any commercially implemented wireless network including 802.11b/g, WCDMA, 3G. This system has a distributed computing hierarchy and has a common data controller on each sensor module. This allows for the modularity of the device along with the tailored ability to control the cards using a relatively small master processor. The distributed nature of this system affords the modularity, size, and power consumption that betters the current state of the art in medical ambulatory data acquisition. A new company was created to market this technology.

  16. ATLAS Overview Week at Brookhaven

    CERN Multimedia

    Pilcher, J

    Over 200 ATLAS participants gathered at Brookhaven National Laboratory during the first week of June for our annual overview week. Some system communities arrived early and held meetings on Saturday and Sunday, and the detector interface group (DIG) and Technical Coordination also took advantage of the time to discuss issues of interest for all detector systems. Sunday was also marked by a workshop on the possibilities for heavy ion physics with ATLAS. Beginning on Monday, and for the rest of the week, sessions were held in common in the well equipped Berkner Hall auditorium complex. Laptop computers became the norm for presentations and a wireless network kept laptop owners well connected. Most lunches and dinners were held on the lawn outside Berkner Hall. The weather was very cooperative and it was an extremely pleasant setting. This picture shows most of the participants from a view on the roof of Berkner Hall. Technical Coordination and Integration issues started the reports on Monday and became a...

  17. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  18. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Jingwei Liu

    2016-05-01

    Full Text Available Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  19. Low power radio communication platform for wireless sensor network

    NARCIS (Netherlands)

    Dutta, R.; Bentum, Marinus Jan; van der Zee, Ronan A.R.; Kokkeler, Andre B.J.

    2009-01-01

    Wireless sensor networks are predicted to be the most versatile, popular and useful technology in the near future. A large number of applications are targeted which will hugely benefit from a network of tiny computers with few sensors, radio communication platform, intelligent networking and

  20. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  1. Computer technology and computer programming research and strategies

    CERN Document Server

    Antonakos, James L

    2011-01-01

    Covering a broad range of new topics in computer technology and programming, this volume discusses encryption techniques, SQL generation, Web 2.0 technologies, and visual sensor networks. It also examines reconfigurable computing, video streaming, animation techniques, and more. Readers will learn about an educational tool and game to help students learn computer programming. The book also explores a new medical technology paradigm centered on wireless technology and cloud computing designed to overcome the problems of increasing health technology costs.

  2. Smartphone Household Wireless Electroencephalogram Hat

    Directory of Open Access Journals (Sweden)

    Harold Szu

    2013-01-01

    Full Text Available Rudimentary brain machine interface has existed for the gaming industry. Here, we propose a wireless, real-time, and smartphone-based electroencephalogram (EEG system for homecare applications. The system uses high-density dry electrodes and compressive sensing strategies to overcome conflicting requirements between spatial electrode density, temporal resolution, and spatiotemporal throughput rate. Spatial sparseness is addressed by close proximity between active electrodes and desired source locations and using an adaptive selection of N active among 10N passive electrodes to form m-organized random linear combinations of readouts, m≪N≪10N. Temporal sparseness is addressed via parallel frame differences in hardware. During the design phase, we took tethered laboratory EEG dataset and applied fuzzy logic to compute (a spatiotemporal average of larger magnitude EEG data centers in 0.3 second intervals and (b inside brainwave sources by Independent Component Analysis blind deconvolution without knowing the impulse response function. Our main contributions are the fidelity of quality wireless EEG data compared to original tethered data and the speed of compressive image recovery. We have compared our recovery of ill-posed inverse data against results using Block Sparse Code. Future work includes development of strategies to filter unwanted artifact from high-density EEGs (i.e., facial muscle-related events and wireless environmental electromagnetic interferences.

  3. The Application of RPL Routing Protocol in Low Power Wireless Sensor and Lossy Networks

    Directory of Open Access Journals (Sweden)

    Xun Yang

    2014-05-01

    Full Text Available With the continuous development of computer information technology, wireless sensor has been successfully changed the mode of human life, at the same time, as one of the technologies continues to improve the future life, how to better integration with the RPL routing protocols together become one of research focuses in the current climate. This paper start from the wireless sensor network, briefly discusses the concept, followed by systematic exposition of RPL routing protocol developed background, relevant standards, working principle, topology and related terms, and finally explore the RPL routing protocol in wireless sensor low power lossy network applications.

  4. A Computational Study on the Magnetic Resonance Coupling Technique for Wireless Power Transfer

    Directory of Open Access Journals (Sweden)

    Zakaria N.A.

    2017-01-01

    Full Text Available Non-radiative wireless power transfer (WPT system using magnetic resonance coupling (MRC technique has recently been a topic of discussion among researchers. This technique discussed more scenarios in mid-range field of wireless power transmission reflected to the distance and efficiency. The WPT system efficiency varies when the coupling distance between two coils involved changes. This could lead to a decisive issue of high efficient power transfer. This paper presents case studies on the relationship of operating range with the efficiency of the MRC technique. Demonstrative WPT system operates at two different frequencies are projected in order to verify performance. The resonance frequencies used are less than 100MHz within range of 10cm to 20cm.

  5. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  6. mm-Wave Hybrid Photonic Wireless Links for Ultra-High Speed Wireless Transmissions

    DEFF Research Database (Denmark)

    Rommel, Simon; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso

    Hybrid photonic-wireless transmission schemes in the mm-wave frequency range are promising candidates to enable the multi-gigabit per second data communications required from wireless and mobile networks of the 5th and future generations. Large FCC spectrum allocations for wireless transmission...

  7. 77 FR 60720 - Certain Electronic Devices, Including Wireless Commmunication Devices, Portable Music and Data...

    Science.gov (United States)

    2012-10-04

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-794] Certain Electronic Devices, Including Wireless Commmunication Devices, Portable Music and Data Processing Devices, and Tablet Computers... communication devices, portable music and data processing devices, and tablet computers, imported by Apple Inc...

  8. Imaging the Messier objects remotely from your laptop

    CERN Document Server

    Adam, Len

    2018-01-01

    This is a guide for anyone interested in practical astronomy but intimidated by the idea of investing in a telescope. It explores the world of remote observing, which requires nothing more than a laptop and an Internet connection. The book aims to make readers comfortable navigating the plethora of online equipment at their disposal and to show that a challenge like imaging the Messier objects can be fun, simple, and achievable for all. In this text, all 110 Messier objects are discussed, each one remotely imaged with clear instructions on what telescope and camera combinations give the best results. Common astronomical phrases and units are all explained and illustrated to help newcomers get a grasp of terminology. Tidbits of history and quotes from Messier and other astronomers round out this beginner-friendly read, which also features a handy Quick Reference Image Library.

  9. Real-time video streaming in mobile cloud over heterogeneous wireless networks

    Science.gov (United States)

    Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos

    2012-06-01

    Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets

  10. A fully integrated wireless system for intracranial direct cortical stimulation, real-time electrocorticography data transmission, and smart cage for wireless battery recharge.

    Science.gov (United States)

    Piangerelli, Marco; Ciavarro, Marco; Paris, Antonino; Marchetti, Stefano; Cristiani, Paolo; Puttilli, Cosimo; Torres, Napoleon; Benabid, Alim Louis; Romanelli, Pantaleo

    2014-01-01

    Wireless transmission of cortical signals is an essential step to improve the safety of epilepsy procedures requiring seizure focus localization and to provide chronic recording of brain activity for Brain Computer Interface (BCI) applications. Our group developed a fully implantable and externally rechargeable device, able to provide wireless electrocorticographic (ECoG) recording and cortical stimulation (CS). The first prototype of a wireless multi-channel very low power ECoG system was custom-designed to be implanted on non-human primates. The device, named ECOGIW-16E, is housed in a compact hermetically sealed Polyether ether ketone (PEEK) enclosure, allowing seamless battery recharge. ECOGIW-16E is recharged in a wireless fashion using a special cage designed to facilitate the recharge process in monkeys and developed in accordance with guidelines for accommodation of animals by Council of Europe (ETS123). The inductively recharging cage is made up of nylon and provides a thoroughly novel experimental setting on freely moving animals. The combination of wireless cable-free ECoG and external seamless battery recharge solves the problems and shortcomings caused by the presence of cables leaving the skull, providing a safer and easier way to monitor patients and to perform ECoG recording on primates. Data transmission exploits the newly available Medical Implant Communication Service band (MICS): 402-405 MHz. ECOGIW-16E was implanted over the left sensorimotor cortex of a macaca fascicularis to assess the feasibility of wireless ECoG monitoring and brain mapping through CS. With this device, we were able to record the everyday life ECoG signal from a monkey and to deliver focal brain stimulation with movement elicitation.

  11. A Fully-Integrated Wireless System for Intracranial Direct Cortical Stimulation, Real-Time Electrocorticography Data Trasmission and Smart Cage for Wireless Battery Recharge

    Directory of Open Access Journals (Sweden)

    Marco ePiangerelli

    2014-08-01

    Full Text Available Wireless transmission of cortical signals is an essential step to improve the safety of epilepsy procedures requiring seizure focus localization and to provide chronic recording of brain activity for Brain Computer Interface(BCI applications .Our group developed a fully implantable and externally rechargeable device, able to provide wireless electrocorticographic (ECoG recording and cortical stimulation (CS. The first prototype of a wireless multi-channel very low power ECoG system was custom-designed to be implanted on non-human primates. The device,named ECOGIW-16E, is housed in a compact hermetically sealed Polyether ether ketone (PEEK enclosure, allowing seamless battery recharge. ECOGIW-16E is recharged in a wireless fashion using a special cage designed to facilitate the recharge process in monkeys and , developed in accordance with guidelines for accommodation of animals by Council of Europe (ETS123. The inductively recharging cage is made of nylon and provides a thoroughly novel experimental setting on freely moving animals. The combination of wireless cable-free ECoG and external seamless battery recharge solve the problems and shortcomings caused by the presence of cables leaving the skull,providing a safer and easier way to monitor patients and to perform ECoG recording on primates. Data transmission exploits the newly available Medical Implant Communication Service band (MICS: 402-405 MHz. ECOGW-16E was implanted over the left sensorimotor cortex of a macaca fascicularis to assess the feasibility of wireless ECoG monitoring and brain mapping through CS. With this device we were able to record the everyday life ECoG signal from a monkey and to deliver focal brain stimulation with movement elicitation.

  12. Development of fast wireless detection system for fixed offshore platform

    Science.gov (United States)

    Li, Zhigang; Yu, Yan; Jiao, Dong; Wang, Jie; Li, Zhirui; Ou, Jinping

    2011-04-01

    -performance computation unit, wireless transceiver unit, mobile power unit and embedded data analysis software, can totally control multi-wireless collection nodes, receive and analyze data, parameter identification. Data is transmitted at the 2.4GHz wireless communication channel, every sensing data channel in charge of data transmission is in a stable frequency band, control channel responsible for the control of power parameters is in a public frequency band. The test is initially conducted for the designed system, experimental results show that the system has good application prospects and practical value with fast arrangement, high sampling rate, high resolution, capacity of low frequency detection.

  13. Wireless sensor network

    Science.gov (United States)

    Perotti, Jose M.; Lucena, Angel R.; Mullenix, Pamela A.; Mata, Carlos T.

    2006-05-01

    Current and future requirements of aerospace sensors and transducers demand the design and development of a new family of sensing devices, with emphasis on reduced weight, power consumption, and physical size. This new generation of sensors and transducers will possess a certain degree of intelligence in order to provide the end user with critical data in a more efficient manner. Communication between networks of traditional or next-generation sensors can be accomplished by a Wireless Sensor Network (WSN) developed by NASA's Instrumentation Branch and ASRC Aerospace Corporation at Kennedy Space Center (KSC), consisting of at least one central station and several remote stations and their associated software. The central station is application-dependent and can be implemented on different computer hardware, including industrial, handheld, or PC-104 single-board computers, on a variety of operating systems: embedded Windows, Linux, VxWorks, etc. The central stations and remote stations share a similar radio frequency (RF) core module hardware that is modular in design. The main components of the remote stations are an RF core module, a sensor interface module, batteries, and a power management module. These modules are stackable, and a common bus provides the flexibility to stack other modules for additional memory, increased processing, etc. WSN can automatically reconfigure to an alternate frequency if interference is encountered during operation. In addition, the base station will autonomously search for a remote station that was perceived to be lost, using relay stations and alternate frequencies. Several wireless remote-station types were developed and tested in the laboratory to support different sensing technologies, such as resistive temperature devices, silicon diodes, strain gauges, pressure transducers, and hydrogen leak detectors.

  14. Secure Intra-Body Wireless Communications (SIWiC) System Project

    Science.gov (United States)

    Ahmad, Aftab; Doggett, Terrence P.

    2011-01-01

    SIWiC System is a project to investigate, design and implement future wireless networks of implantable sensors in the body. This futuristic project is designed to make use of the emerging and yet-to-emerge technologies, including ultra-wide band (UWB) for wireless communications, smart implantable sensors, ultra low power networking protocols, security and privacy for bandwidth and power deficient devices and quantum computing. Progress in each of these fronts is hindered by the needs of breakthrough. But, as we will see in this paper, these major challenges are being met or will be met in near future. SIWiC system is a network of in-situ wireless devices that are implanted to coordinate sensed data inside the body, such as symptoms monitoring collected internally, or biometric data collected of an outside object from within the intra-body network. One node has the capability of communicating outside the body to send data or alarm to a relevant authority, e.g., a remote physician.

  15. Wireless application guidelines for usability design and evaluation for developing countries

    International Nuclear Information System (INIS)

    Khoja, S.A.; Ursani, A.A.; Ali, A.

    2009-01-01

    The aim of this paper is to provide guidelines for designing wireless applications. These guidelines are developed with the help of Human Computer Interaction based Usability Evaluation surveys and tests results. These guidelines will help in making wireless applications more usable and attractive for users and will help designers to plan effective interactive applications. The guidelines presented in the paper have been derived from the results of surveys, usability tests and SET (Summative Evaluation Tests) carried out over 200 people of Karachi, Pakistan, from different walks of life with different academic and professional backgrounds, making imperative suggestions not only to improve the usability of exciting features given in wireless and mobile products, but also provide suggestions to improve usability of basic components such as, text, navigation, interactivity, multimedia, control and behavior. (author)

  16. Research on the Application of Wireless Network in Collecting Road Traffic Information

    Institute of Scientific and Technical Information of China (English)

    DU Hui-jiang

    2015-01-01

    Due to the characteristics of variability and dispersion in traffic information, to get the reliable real-time traffic information has been a bottleneck in the development of intelligent transportation systems. However, with the development of wireless network technology and mobile Internet, the mobile phones are rapidly developed and more popular, so it is possible to get road traffic information by locating the mobile phones in vehicles. The system structure for the road traffic information collection is designed based on wireless network and mobile phones in vehicles, and the vehicle recognition and its information computation methods are given and discussed. Also the simulation is done for vehicle recognition and computation based on fuzzy cluster analysis method and the results are obtained and analyzed.

  17. New ergonomic headset for Tongue-Drive System with wireless smartphone interface.

    Science.gov (United States)

    Park, Hangue; Kim, Jeonghee; Huo, Xueliang; Hwang, In-O; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless tongue-operated assistive technology (AT), developed for people with severe physical disabilities to control their environment using their tongue motion. We have developed a new ergonomic headset for the TDS with a user-friendly smartphone interface, through which users will be able to wirelessly control various devices, access computers, and drive wheelchairs. This headset design is expected to act as a flexible and multifunctional communication interface for the TDS and improve its usability, accessibility, aesthetics, and convenience for the end users.

  18. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    Science.gov (United States)

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  19. Wireless adiabatic power transfer

    International Nuclear Information System (INIS)

    Rangelov, A.A.; Suchowski, H.; Silberberg, Y.; Vitanov, N.V.

    2011-01-01

    Research highlights: → Efficient and robust mid-range wireless energy transfer between two coils. → The adiabatic energy transfer is analogous to adiabatic passage in quantum optics. → Wireless energy transfer is insensitive to any resonant constraints. → Wireless energy transfer is insensitive to noise in the neighborhood of the coils. - Abstract: We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  20. SECURITY IN THE ERA OF MOBILE WIRELESS ENTERPRISES

    Directory of Open Access Journals (Sweden)

    STEGĂROIU CARINA-ELENA

    2014-02-01

    Full Text Available In modern times, the mobility of people and data are becoming essential to business. An important role in this development is played by wireless technology, but the risks to users of wireless technology have increased as the service has become more popular. As mobility and the use of smaller, personal devices increases, it is obvious that the security must be implemented as close to the source as possible, meaning in all end devices, but such solutions are difficult to deploy and very hard to manage. Wireless security is just an aspect of computer security, however organizations may be particularly vulnerable to security breaches. There are effective countermeasures (like disabling open switchports during switch configuration and VLAN configuration to limit network access that are available to protect both the network and the information it contains, but such countermeasures must be applied uniformly to all network devices. Consequently, a security policy must be described and written down to allow managers as well as technicians to react correctly to undesired circumstances

  1. Wireless communication technology NFC

    OpenAIRE

    MÁROVÁ, Kateřina

    2014-01-01

    Aim of this bachelor thesis is to handle the issue of new wireless communication technology NFC (Near Field Communication) including a comparison of advantages and disadvantages of NFC with other wireless technologies (Bluetooth, Wi-Fi, etc.). NFC is a technology for wireless communications between different electronic devices, one of which is typically a mobile phone. Near Field Communication allows wireless communication at very short distance by approaching or enclosing two devices and can...

  2. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  3. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  4. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  5. Thermoelectric powered wireless sensors for spent fuel monitoring

    International Nuclear Information System (INIS)

    Carstens, T.; Corradini, M.; Blanchard, J.; Ma, Z.

    2011-01-01

    This paper describes using thermoelectric generators to power wireless sensors to monitor spent nuclear fuel during dry-cask storage. OrigenArp was used to determine the decay heat of the spent fuel at different times during the service life of the dry-cask. The Engineering Equation Solver computer program modeled the temperatures inside the spent fuel storage facility during its service life. The temperature distribution in a thermoelectric generator and heat sink was calculated using the computer program Finite Element Heat Transfer. From these temperature distributions the power produced by the thermoelectric generator was determined as a function of the service life of the dry-cask. In addition, an estimation of the path loss experienced by the wireless signal can be made based on materials and thickness of the structure. Once the path loss is known, the transmission power and thermoelectric generator power requirements can be determined. This analysis estimates that a thermoelectric generator can produce enough power for a sensor to function and transmit data from inside the dry-cask throughout its service life. (authors)

  6. Address autoconfiguration in wireless ad hoc networks : Protocols and techniques

    NARCIS (Netherlands)

    Cempaka Wangi, N.I.; Prasad, R.V.; Jacobsson, M.; Niemegeers, I.

    2008-01-01

    With the advent of smaller devices having higher computational capacity and wireless communication capabilities, the world is becoming completely networked. Although, the mobile nature of these devices provides ubiquitous services, it also poses many challenges. In this article, we look in depth at

  7. Wireless and real-time structural damage detection: A novel decentralized method for wireless sensor networks

    Science.gov (United States)

    Avci, Onur; Abdeljaber, Osama; Kiranyaz, Serkan; Hussein, Mohammed; Inman, Daniel J.

    2018-06-01

    Being an alternative to conventional wired sensors, wireless sensor networks (WSNs) are extensively used in Structural Health Monitoring (SHM) applications. Most of the Structural Damage Detection (SDD) approaches available in the SHM literature are centralized as they require transferring data from all sensors within the network to a single processing unit to evaluate the structural condition. These methods are found predominantly feasible for wired SHM systems; however, transmission and synchronization of huge data sets in WSNs has been found to be arduous. As such, the application of centralized methods with WSNs has been a challenge for engineers. In this paper, the authors are presenting a novel application of 1D Convolutional Neural Networks (1D CNNs) on WSNs for SDD purposes. The SDD is successfully performed completely wireless and real-time under ambient conditions. As a result of this, a decentralized damage detection method suitable for wireless SHM systems is proposed. The proposed method is based on 1D CNNs and it involves training an individual 1D CNN for each wireless sensor in the network in a format where each CNN is assigned to process the locally-available data only, eliminating the need for data transmission and synchronization. The proposed damage detection method operates directly on the raw ambient vibration condition signals without any filtering or preprocessing. Moreover, the proposed approach requires minimal computational time and power since 1D CNNs merge both feature extraction and classification tasks into a single learning block. This ability is prevailingly cost-effective and evidently practical in WSNs considering the hardware systems have been occasionally reported to suffer from limited power supply in these networks. To display the capability and verify the success of the proposed method, large-scale experiments conducted on a laboratory structure equipped with a state-of-the-art WSN are reported.

  8. Place-Specific Computing

    DEFF Research Database (Denmark)

    Messeter, Jörn

    2009-01-01

    An increased interest in the notion of place has evolved in interaction design based on the proliferation of wireless infrastructures, developments in digital media, and a ‘spatial turn’ in computing. In this article, place-specific computing is suggested as a genre of interaction design that add......An increased interest in the notion of place has evolved in interaction design based on the proliferation of wireless infrastructures, developments in digital media, and a ‘spatial turn’ in computing. In this article, place-specific computing is suggested as a genre of interaction design...... that addresses the shaping of interactions among people, place-specific resources and global socio-technical networks, mediated by digital technology, and influenced by the structuring conditions of place. The theoretical grounding for place-specific computing is located in the meeting between conceptions...... of place in human geography and recent research in interaction design focusing on embodied interaction. Central themes in this grounding revolve around place and its relation to embodiment and practice, as well as the social, cultural and material aspects conditioning the enactment of place. Selected...

  9. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  10. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  11. Design of on-board Bluetooth wireless network system based on fault-tolerant technology

    Science.gov (United States)

    You, Zheng; Zhang, Xiangqi; Yu, Shijie; Tian, Hexiang

    2007-11-01

    In this paper, the Bluetooth wireless data transmission technology is applied in on-board computer system, to realize wireless data transmission between peripherals of the micro-satellite integrating electronic system, and in view of the high demand of reliability of a micro-satellite, a design of Bluetooth wireless network based on fault-tolerant technology is introduced. The reliability of two fault-tolerant systems is estimated firstly using Markov model, then the structural design of this fault-tolerant system is introduced; several protocols are established to make the system operate correctly, some related problems are listed and analyzed, with emphasis on Fault Auto-diagnosis System, Active-standby switch design and Data-Integrity process.

  12. Intelligent distributed computing

    CERN Document Server

    Thampi, Sabu

    2015-01-01

    This book contains a selection of refereed and revised papers of the Intelligent Distributed Computing Track originally presented at the third International Symposium on Intelligent Informatics (ISI-2014), September 24-27, 2014, Delhi, India.  The papers selected for this Track cover several Distributed Computing and related topics including Peer-to-Peer Networks, Cloud Computing, Mobile Clouds, Wireless Sensor Networks, and their applications.

  13. 7th China Conference on Wireless Sensor Networks

    CERN Document Server

    Cui, Li; Guo, Zhongwen

    2014-01-01

    Advanced Technologies in Ad Hoc and Sensor Networks collects selected papers from the 7th China Conference on Wireless Sensor Networks (CWSN2013) held in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of “Advances in wireless sensor networks of China”. The selected works can help promote development of sensor network technology towards interconnectivity, resource sharing, flexibility and high efficiency. Researchers and engineers in the field of sensor networks can benefit from the book. Xue Wang is a professor at Tsinghua University; Li Cui is a professor at Institute of Computing Technology, Chinese Academy of Sciences; Zhongwen Guo is a professor at Ocean University of China.

  14. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  15. Ultra low power signal oriented approach for wireless health monitoring.

    Science.gov (United States)

    Marinkovic, Stevan; Popovici, Emanuel

    2012-01-01

    In recent years there is growing pressure on the medical sector to reduce costs while maintaining or even improving the quality of care. A potential solution to this problem is real time and/or remote patient monitoring by using mobile devices. To achieve this, medical sensors with wireless communication, computational and energy harvesting capabilities are networked on, or in, the human body forming what is commonly called a Wireless Body Area Network (WBAN). We present the implementation of a novel Wake Up Receiver (WUR) in the context of standardised wireless protocols, in a signal-oriented WBAN environment and present a novel protocol intended for wireless health monitoring (WhMAC). WhMAC is a TDMA-based protocol with very low power consumption. It utilises WBAN-specific features and a novel ultra low power wake up receiver technology, to achieve flexible and at the same time very low power wireless data transfer of physiological signals. As the main application is in the medical domain, or personal health monitoring, the protocol caters for different types of medical sensors. We define four sensor modes, in which the sensors can transmit data, depending on the sensor type and emergency level. A full power dissipation model is provided for the protocol, with individual hardware and application parameters. Finally, an example application shows the reduction in the power consumption for different data monitoring scenarios.

  16. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  17. Development of a High-Sensitivity Wireless Accelerometer for Structural Health Monitoring.

    Science.gov (United States)

    Zhu, Li; Fu, Yuguang; Chow, Raymond; Spencer, Billie F; Park, Jong Woong; Mechitov, Kirill

    2018-01-17

    Structural health monitoring (SHM) is playing an increasingly important role in ensuring the safety of structures. A shift of SHM research away from traditional wired methods toward the use of wireless smart sensors (WSS) has been motivated by the attractive features of wireless smart sensor networks (WSSN). The progress achieved in Micro Electro-Mechanical System (MEMS) technologies and wireless data transmission, has extended the effectiveness and range of applicability of WSSNs. One of the most common sensors employed in SHM strategies is the accelerometer; however, most accelerometers in WSS nodes have inadequate resolution for measurement of the typical accelerations found in many SHM applications. In this study, a high-resolution and low-noise tri-axial digital MEMS accelerometer is incorporated in a next-generation WSS platform, the Xnode. In addition to meeting the acceleration sensing demands of large-scale civil infrastructure applications, this new WSS node provides powerful hardware and a robust software framework to enable edge computing that can deliver actionable information. Hardware and software integration challenges are presented, and the associate resolutions are discussed. The performance of the wireless accelerometer is demonstrated experimentally through comparison with high-sensitivity wired accelerometers. This new high-sensitivity wireless accelerometer will extend the use of WSSN to a broader class of SHM applications.

  18. Development of a High-Sensitivity Wireless Accelerometer for Structural Health Monitoring

    Science.gov (United States)

    Zhu, Li; Fu, Yuguang; Chow, Raymond; Spencer, Billie F.; Park, Jong Woong; Mechitov, Kirill

    2018-01-01

    Structural health monitoring (SHM) is playing an increasingly important role in ensuring the safety of structures. A shift of SHM research away from traditional wired methods toward the use of wireless smart sensors (WSS) has been motivated by the attractive features of wireless smart sensor networks (WSSN). The progress achieved in Micro Electro-Mechanical System (MEMS) technologies and wireless data transmission, has extended the effectiveness and range of applicability of WSSNs. One of the most common sensors employed in SHM strategies is the accelerometer; however, most accelerometers in WSS nodes have inadequate resolution for measurement of the typical accelerations found in many SHM applications. In this study, a high-resolution and low-noise tri-axial digital MEMS accelerometer is incorporated in a next-generation WSS platform, the Xnode. In addition to meeting the acceleration sensing demands of large-scale civil infrastructure applications, this new WSS node provides powerful hardware and a robust software framework to enable edge computing that can deliver actionable information. Hardware and software integration challenges are presented, and the associate resolutions are discussed. The performance of the wireless accelerometer is demonstrated experimentally through comparison with high-sensitivity wired accelerometers. This new high-sensitivity wireless accelerometer will extend the use of WSSN to a broader class of SHM applications. PMID:29342102

  19. An Improved Ant Colony Broadcasting Algorithm for Wireless Sensor Networks

    OpenAIRE

    Nan Jiang; Rigui Zhou; Shuqun Yang; Qiulin Ding

    2009-01-01

    Recent advances in nano-technology have made it possible to develop a large variety of Micro Electro-Mechanical Systems (MEMS)-miniaturized low-power devices that integrate sensing, special-purpose computing, and wireless communications capabilities. A sensor network is a collection of many small devices, each with sensing, computation, and communication capability. It has many potential applications, such as building surveillance and environmental monitoring. Broadcasting is defined that com...

  20. Applying systemic-structural activity theory to design of human-computer interaction systems

    CERN Document Server

    Bedny, Gregory Z; Bedny, Inna

    2015-01-01

    Human-Computer Interaction (HCI) is an interdisciplinary field that has gained recognition as an important field in ergonomics. HCI draws on ideas and theoretical concepts from computer science, psychology, industrial design, and other fields. Human-Computer Interaction is no longer limited to trained software users. Today people interact with various devices such as mobile phones, tablets, and laptops. How can you make such interaction user friendly, even when user proficiency levels vary? This book explores methods for assessing the psychological complexity of computer-based tasks. It also p

  1. Computer-assisted upper extremity training using interactive biking exercise (iBikE) platform.

    Science.gov (United States)

    Jeong, In Cheol; Finkelstein, Joseph

    2012-01-01

    Upper extremity exercise training has been shown to improve clinical outcomes in different chronic health conditions. Arm-operated bicycles are frequently used to facilitate upper extremity training however effective use of these devices at patient homes is hampered by lack of remote connectivity with clinical rehabilitation team, inability to monitor exercise progress in real time using simple graphical representation, and absence of an alert system which would prevent exertion levels exceeding those approved by the clinical rehabilitation team. We developed an interactive biking exercise (iBikE) platform aimed at addressing these limitations. The platform uses a miniature wireless 3-axis accelerometer mounted on a patient wrist that transmits the cycling acceleration data to a laptop. The laptop screen presents an exercise dashboard to the patient in real time allowing easy graphical visualization of exercise progress and presentation of exercise parameters in relation to prescribed targets. The iBikE platform is programmed to alert the patient when exercise intensity exceeds the levels recommended by the patient care provider. The iBikE platform has been tested in 7 healthy volunteers (age range: 26-50 years) and shown to reliably reflect exercise progress and to generate alerts at pre-setup levels. Implementation of remote connectivity with patient rehabilitation team is warranted for future extension and evaluation efforts.

  2. Adaptive resource allocation scheme using sliding window subchannel gain computation: context of OFDMA wireless mobiles systems

    International Nuclear Information System (INIS)

    Khelifa, F.; Samet, A.; Ben Hassen, W.; Afif, M.

    2011-01-01

    Multiuser diversity combined with Orthogonal Frequency Division Multiple Access (OFDMA) are a promising technique for achieving high downlink capacities in new generation of cellular and wireless network systems. The total capacity of OFDMA based-system is maximized when each subchannel is assigned to the mobile station with the best channel to noise ratio for that subchannel with power is uniformly distributed between all subchannels. A contiguous method for subchannel construction is adopted in IEEE 802.16 m standard in order to reduce OFDMA system complexity. In this context, new subchannel gain computation method, can contribute, jointly with optimal assignment subchannel to maximize total system capacity. In this paper, two new methods have been proposed in order to achieve a better trade-off between fairness and efficiency use of resources. Numerical results show that proposed algorithms provide low complexity, higher total system capacity and fairness among users compared to others recent methods.

  3. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  4. Wireless Sensor Network Handles Image Data

    Science.gov (United States)

    2008-01-01

    To relay data from remote locations for NASA s Earth sciences research, Goddard Space Flight Center contributed to the development of "microservers" (wireless sensor network nodes), which are now used commercially as a quick and affordable means to capture and distribute geographical information, including rich sets of aerial and street-level imagery. NASA began this work out of a necessity for real-time recovery of remote sensor data. These microservers work much like a wireless office network, relaying information between devices. The key difference, however, is that instead of linking workstations within one office, the interconnected microservers operate miles away from one another. This attribute traces back to the technology s original use: The microservers were originally designed for seismology on remote glaciers and ice streams in Alaska, Greenland, and Antarctica-acquiring, storing, and relaying data wirelessly between ground sensors. The microservers boast three key attributes. First, a researcher in the field can establish a "managed network" of microservers and rapidly see the data streams (recovered wirelessly) on a field computer. This rapid feedback permits the researcher to reconfigure the network for different purposes over the course of a field campaign. Second, through careful power management, the microservers can dwell unsupervised in the field for up to 2 years, collecting tremendous amounts of data at a research location. The third attribute is the exciting potential to deploy a microserver network that works in synchrony with robotic explorers (e.g., providing ground truth validation for satellites, supporting rovers as they traverse the local environment). Managed networks of remote microservers that relay data unsupervised for up to 2 years can drastically reduce the costs of field instrumentation and data rec

  5. Design and Implementation of Mobile Car with Wireless Video Monitoring System Based on STC89C52

    Directory of Open Access Journals (Sweden)

    Yang Hong

    2014-05-01

    Full Text Available With the rapid development of wireless networks and image acquisition technology, wireless video transmission technology has been widely applied in various communication systems. The traditional video monitoring technology is restricted by some conditions such as layout, environmental, the relatively large volume, cost, and so on. In view of this problem, this paper proposes a method that the mobile car can be equipped with wireless video monitoring system. The mobile car which has some functions such as detection, video acquisition and wireless data transmission is developed based on STC89C52 Micro Control Unit (MCU and WiFi router. Firstly, information such as image, temperature and humidity is processed by the MCU and communicated with the router, and then returned by the WiFi router to the host computer phone. Secondly, control information issued by the host computer phone is received by WiFi router and sent to the MCU, and then the MCU sends relevant instructions. Lastly, the wireless transmission of video images and the remote control of the car are realized. The results prove that the system has some features such as simple operation, high stability, fast response, low cost, strong flexibility, widely application, and so on. The system has certain practical value and popularization value.

  6. Internal model control for industrial wireless plant using WirelessHART hardware-in-the-loop simulator.

    Science.gov (United States)

    Tran, Chung Duc; Ibrahim, Rosdiazli; Asirvadam, Vijanth Sagayan; Saad, Nordin; Sabo Miya, Hassan

    2018-04-01

    The emergence of wireless technologies such as WirelessHART and ISA100 Wireless for deployment at industrial process plants has urged the need for research and development in wireless control. This is in view of the fact that the recent application is mainly in monitoring domain due to lack of confidence in control aspect. WirelessHART has an edge over its counterpart as it is based on the successful Wired HART protocol with over 30 million devices as of 2009. Recent works on control have primarily focused on maintaining the traditional PID control structure which is proven not adequate for the wireless environment. In contrast, Internal Model Control (IMC), a promising technique for delay compensation, disturbance rejection and setpoint tracking has not been investigated in the context of WirelessHART. Therefore, this paper discusses the control design using IMC approach with a focus on wireless processes. The simulation and experimental results using real-time WirelessHART hardware-in-the-loop simulator (WH-HILS) indicate that the proposed approach is more robust to delay variation of the network than the PID. Copyright © 2017. Published by Elsevier Ltd.

  7. Optimizing Energy and Modulation Selection in Multi-Resolution Modulation For Wireless Video Broadcast/Multicast

    KAUST Repository

    She, James

    2009-11-01

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the multi-user channel diversity problem. The power allocation and modulation selection problem, however, is subject to a high computational complexity due to the nonlinear formulation and huge solution space. This paper introduces a dynamic programming framework with conditioned parsing, which significantly reduces the search space. The optimized result is further verified with experiments using real video content. The proposed approach effectively serves as a generalized and practical optimization framework that can gauge and optimize a scalable wireless video broadcast/multicast based on multi-resolution modulation in any BWA network.

  8. Optimizing Energy and Modulation Selection in Multi-Resolution Modulation For Wireless Video Broadcast/Multicast

    KAUST Repository

    She, James; Ho, Pin-Han; Shihada, Basem

    2009-01-01

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the multi-user channel diversity problem. The power allocation and modulation selection problem, however, is subject to a high computational complexity due to the nonlinear formulation and huge solution space. This paper introduces a dynamic programming framework with conditioned parsing, which significantly reduces the search space. The optimized result is further verified with experiments using real video content. The proposed approach effectively serves as a generalized and practical optimization framework that can gauge and optimize a scalable wireless video broadcast/multicast based on multi-resolution modulation in any BWA network.

  9. A video wireless capsule endoscopy system powered wirelessly: design, analysis and experiment

    International Nuclear Information System (INIS)

    Pan, Guobing; Chen, Jiaoliao; Xin, Wenhui; Yan, Guozheng

    2011-01-01

    Wireless capsule endoscopy (WCE), as a relatively new technology, has brought about a revolution in the diagnosis of gastrointestinal (GI) tract diseases. However, the existing WCE systems are not widely applied in clinic because of the low frame rate and low image resolution. A video WCE system based on a wireless power supply is developed in this paper. This WCE system consists of a video capsule endoscope (CE), a wireless power transmission device, a receiving box and an image processing station. Powered wirelessly, the video CE has the abilities of imaging the GI tract and transmitting the images wirelessly at a frame rate of 30 frames per second (f/s). A mathematical prototype was built to analyze the power transmission system, and some experiments were performed to test the capability of energy transferring. The results showed that the wireless electric power supply system had the ability to transfer more than 136 mW power, which was enough for the working of a video CE. In in vitro experiments, the video CE produced clear images of the small intestine of a pig with the resolution of 320 × 240, and transmitted NTSC format video outside the body. Because of the wireless power supply, the video WCE system with high frame rate and high resolution becomes feasible, and provides a novel solution for the diagnosis of the GI tract in clinic

  10. Wireless Headset Communication System

    Science.gov (United States)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  11. Don't Let Your COWS Be an Udder (Utter) Disaster: Wirelessness and Education Test the Electromagnetic Spectrum

    Science.gov (United States)

    Huber, Joe; Gillan, Bud

    2004-01-01

    Just when thinking about the Internet and other tidal waves of technology have found their places in schools, along comes a brash new upstart called wirelessness. This discussion takes on more simple task of providing more useful information to schools in their quest for being wireless, including the use of COWS (computer on wheels) is related to…

  12. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  13. Network Coding on Heterogeneous Multi-Core Processors for Wireless Sensor Networks

    Science.gov (United States)

    Kim, Deokho; Park, Karam; Ro, Won W.

    2011-01-01

    While network coding is well known for its efficiency and usefulness in wireless sensor networks, the excessive costs associated with decoding computation and complexity still hinder its adoption into practical use. On the other hand, high-performance microprocessors with heterogeneous multi-cores would be used as processing nodes of the wireless sensor networks in the near future. To this end, this paper introduces an efficient network coding algorithm developed for the heterogenous multi-core processors. The proposed idea is fully tested on one of the currently available heterogeneous multi-core processors referred to as the Cell Broadband Engine. PMID:22164053

  14. Online vehicle and atmospheric pollution monitoring using GIS and wireless sensor networks

    International Nuclear Information System (INIS)

    Cordova-Lopez, L E; Mason, A; Cullen, J D; Shaw, A; Al-Shamma'a, A I

    2007-01-01

    A Geographical Information System (GIS) is a computer system designed to integrate, store, edit, analyse, share and display geographically referenced data. A wireless sensor network (WSN) is a wireless network of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions. This paper presents the integration of these two technologies to create a system able to detect measure and transmit information regarding the presence and quantities of internal combustion derived pollution and the geographical location in real time with the aim of creating pollution maps in urban environments

  15. An Empirical Look at Business Students' Attitudes towards Laptop Computers in the Classroom

    Science.gov (United States)

    Dykstra, DeVee E.; Tracy, Daniel L.; Wergin, Rand

    2013-01-01

    Mobile computing technology has proliferated across university campuses with the goals of enhancing student learning outcomes and making courses more accessible. An increasing amount of research has been conducted about mobile computing's benefits in classroom settings. Yet, the research is still in its infancy. The purpose of this paper is to add…

  16. Novel Concepts of Cooperative Wireless Networking

    DEFF Research Database (Denmark)

    Zhang, Qi

    2008-01-01

    ; secondly, the increasing density of the wireless devices makes cooperation possible; last, the cost of information exchange (i.e. transmission power, transmission time, spectrum, etc.) is very low if information exchange over short-range link is needed. Cooperation changes the way of information delivery......Although wireless networks have achieved great success in the lastest two decades, the current wireless networks have difficulties to fulll users' ever-increasing expectations and needs. It is mainly due to available spectrum resource scarcity, limited battery capacity of wireless device......, unreliable wireless radio link, etc. To tackle these issues, a new telecommunication paradigm has been proposed, referred to as cooperative wireless networking [1]. The basic idea of cooperative wireless networking is that wireless devices work together to achieve their individual goals or one common goal...

  17. Electromagnetic Interference Analysis of Cabinet for Wireless HART Communication

    International Nuclear Information System (INIS)

    Choo, Jaeyul; Jeong, Sang Yong; Kim, Hyung Tae; Yu, Yeong Jin; Park, Hyun Shin; Jeong, Choong Heui

    2015-01-01

    Among the protocols of the wireless communication, the wireless HART communication using the carrier frequency of 2.4 GHz has attracted a lot of interest due to the convenient monitoring and measurement of the variables of nuclear power plants. However the application of the wireless communication to nuclear power plants poses an ongoing challenge due to the unwanted electromagnetic interference (EMI) caused by wireless devices, which would cause the detrimental malfunctioning to adjacent equipment. Especially the EMI problem in the cabinet containing digital instrument and control (I and C) devices is crucial to safety functions and should thus be treated electromagnetically before the use of the wireless communication in nuclear power plants is approved. The mode-matching method has been widely used in electromagnetic analysis due to the reduced computing time by the fast convergence in series solutions. Inspired by this, we perform the electromagnetic scattering analyses of an open cabinet using the modematching method. The resulting information of the electric (E) and magnetic (H) fields enables us to estimate how much the digital I and C in the cabinet is influenced by the external electromagnetic source. The mode-matching method was applied to the scattering analysis of the open cabinet for the digital I and C in nuclear power plants. The mathematical expressions with the unknown modal coefficients for electromagnetic field distributions were formulated based on Helmholtz's equation in conjunction with both the separation of variables and the Fourier transforms. We then determined the modal coefficients from the boundary conditions for electric and magnetic field continuities

  18. Electromagnetic Interference Analysis of Cabinet for Wireless HART Communication

    Energy Technology Data Exchange (ETDEWEB)

    Choo, Jaeyul; Jeong, Sang Yong; Kim, Hyung Tae; Yu, Yeong Jin; Park, Hyun Shin; Jeong, Choong Heui [Korea Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-10-15

    Among the protocols of the wireless communication, the wireless HART communication using the carrier frequency of 2.4 GHz has attracted a lot of interest due to the convenient monitoring and measurement of the variables of nuclear power plants. However the application of the wireless communication to nuclear power plants poses an ongoing challenge due to the unwanted electromagnetic interference (EMI) caused by wireless devices, which would cause the detrimental malfunctioning to adjacent equipment. Especially the EMI problem in the cabinet containing digital instrument and control (I and C) devices is crucial to safety functions and should thus be treated electromagnetically before the use of the wireless communication in nuclear power plants is approved. The mode-matching method has been widely used in electromagnetic analysis due to the reduced computing time by the fast convergence in series solutions. Inspired by this, we perform the electromagnetic scattering analyses of an open cabinet using the modematching method. The resulting information of the electric (E) and magnetic (H) fields enables us to estimate how much the digital I and C in the cabinet is influenced by the external electromagnetic source. The mode-matching method was applied to the scattering analysis of the open cabinet for the digital I and C in nuclear power plants. The mathematical expressions with the unknown modal coefficients for electromagnetic field distributions were formulated based on Helmholtz's equation in conjunction with both the separation of variables and the Fourier transforms. We then determined the modal coefficients from the boundary conditions for electric and magnetic field continuities.

  19. Selection of bi-level image compression method for reduction of communication energy in wireless visual sensor networks

    Science.gov (United States)

    Khursheed, Khursheed; Imran, Muhammad; Ahmad, Naeem; O'Nils, Mattias

    2012-06-01

    Wireless Visual Sensor Network (WVSN) is an emerging field which combines image sensor, on board computation unit, communication component and energy source. Compared to the traditional wireless sensor network, which operates on one dimensional data, such as temperature, pressure values etc., WVSN operates on two dimensional data (images) which requires higher processing power and communication bandwidth. Normally, WVSNs are deployed in areas where installation of wired solutions is not feasible. The energy budget in these networks is limited to the batteries, because of the wireless nature of the application. Due to the limited availability of energy, the processing at Visual Sensor Nodes (VSN) and communication from VSN to server should consume as low energy as possible. Transmission of raw images wirelessly consumes a lot of energy and requires higher communication bandwidth. Data compression methods reduce data efficiently and hence will be effective in reducing communication cost in WVSN. In this paper, we have compared the compression efficiency and complexity of six well known bi-level image compression methods. The focus is to determine the compression algorithms which can efficiently compress bi-level images and their computational complexity is suitable for computational platform used in WVSNs. These results can be used as a road map for selection of compression methods for different sets of constraints in WVSN.

  20. Security of fixed and wireless computer networks

    NARCIS (Netherlands)

    Verschuren, J.; Degen, A.J.G.; Veugen, P.J.M.

    2003-01-01

    A few decades ago, most computers were stand-alone machines: they were able to process information using their own resources. Later, computer systems were connected to each other enabling a computer system to exchange data with another computer and to use resources of another computer. With the

  1. The opportunistic transmission of wireless worms between mobile devices

    Science.gov (United States)

    Rhodes, C. J.; Nekovee, M.

    2008-12-01

    The ubiquity of portable wireless-enabled computing and communications devices has stimulated the emergence of malicious codes (wireless worms) that are capable of spreading between spatially proximal devices. The potential exists for worms to be opportunistically transmitted between devices as they move around, so human mobility patterns will have an impact on epidemic spread. The scenario we address in this paper is proximity attacks from fleetingly in-contact wireless devices with short-range communication range, such as Bluetooth-enabled smart phones. An individual-based model of mobile devices is introduced and the effect of population characteristics and device behaviour on the outbreak dynamics is investigated. The model uses straight-line motion to achieve population, though it is recognised that this is a highly simplified representation of human mobility patterns. We show that the contact rate can be derived from the underlying mobility model and, through extensive simulation, that mass-action epidemic models remain applicable to worm spreading in the low density regime studied here. The model gives useful analytical expressions against which more refined simulations of worm spread can be developed and tested.

  2. Reliable Routing Protocols for Dynamic Wireless Ad Hoc and Sensor Networks

    NARCIS (Netherlands)

    Wu Jian, W.J.

    2007-01-01

    The vision of ubiquitous computing requires the development of devices and technologies, which can be pervasive without being intrusive. The basic components of such a smart environment will be small nodes with sensing and wireless communications capabilities, able to organize flexibly into a

  3. Wireless Interconnect in Multilayer Chip-Area-Networks for Future Multimaterial High-Speed Systems Design

    Directory of Open Access Journals (Sweden)

    Oluwole John Famoriji

    2017-01-01

    Full Text Available Wireless chip area network which enables wireless communication among chips fosters development in wireless communication and it is envisioned that future hardware system and developmental functionality will require multimaterial. However, the traditional system architecture is limited by channel bandwidth-limited interfaces, throughput, delay, and power consumption and as a result limits the efficiency and system performance. Wireless interconnect has been proposed to overcome scalability and performance limitations of multihop wired architectures. Characterization and modeling of channel become more important for specification of choice of modulation or demodulation techniques, channel bandwidths, and other mitigation techniques for channel distortion and interference such as equalization. This paper presents an analytical channel model for characterization, modeling, and analysis of wireless chip-to-chip or interchip interconnects in wireless chip area network with a particular focus on large-scale analysis. The proposed model accounts for both static and dynamic channel losses/attenuation in high-speed systems. Simulation and evaluation of the model with experimental data conducted in a computer desktop casing depict that proposed model matched measurement data very closely. The transmission of EM waves via a medium introduces molecular absorption due to various molecules within the material substance. This model is a representative of channel loss profile in wireless chip-area-network communication and good for future electronic circuits and high-speed systems design.

  4. Approximate Inference for Wireless Communications

    DEFF Research Database (Denmark)

    Hansen, Morten

    This thesis investigates signal processing techniques for wireless communication receivers. The aim is to improve the performance or reduce the computationally complexity of these, where the primary focus area is cellular systems such as Global System for Mobile communications (GSM) (and extensions...... to the optimal one, which usually requires an unacceptable high complexity. Some of the treated approximate methods are based on QL-factorization of the channel matrix. In the work presented in this thesis it is proven how the QL-factorization of frequency-selective channels asymptotically provides the minimum...

  5. Foundations of wireless and electronics

    CERN Document Server

    Scroggie, M G

    1984-01-01

    Foundations of Wireless and Electronics, 10th Edition covers the cathode-ray and microwave tubes; modern pulse methods; f.m. detectors; basic processes of transmission; and reception, computers, and non-sinusoidal signal amplification. The book starts by giving a general overview of a complete electronic system, electricity and circuits, capacitance, and inductance. The text also discusses alternating currents (a.c.), including the frequency and phase of a.c.; the capacitance and inductance in a.c. circuits; and the capacitance and inductance in a series. Diodes, triode, transistor equivalent

  6. Graphical Model Theory for Wireless Sensor Networks

    International Nuclear Information System (INIS)

    Davis, William B.

    2002-01-01

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm

  7. A low-cost test-bed for real-time landmark tracking

    Science.gov (United States)

    Csaszar, Ambrus; Hanan, Jay C.; Moreels, Pierre; Assad, Christopher

    2007-04-01

    A low-cost vehicle test-bed system was developed to iteratively test, refine and demonstrate navigation algorithms before attempting to transfer the algorithms to more advanced rover prototypes. The platform used here was a modified radio controlled (RC) car. A microcontroller board and onboard laptop computer allow for either autonomous or remote operation via a computer workstation. The sensors onboard the vehicle represent the types currently used on NASA-JPL rover prototypes. For dead-reckoning navigation, optical wheel encoders, a single axis gyroscope, and 2-axis accelerometer were used. An ultrasound ranger is available to calculate distance as a substitute for the stereo vision systems presently used on rovers. The prototype also carries a small laptop computer with a USB camera and wireless transmitter to send real time video to an off-board computer. A real-time user interface was implemented that combines an automatic image feature selector, tracking parameter controls, streaming video viewer, and user generated or autonomous driving commands. Using the test-bed, real-time landmark tracking was demonstrated by autonomously driving the vehicle through the JPL Mars yard. The algorithms tracked rocks as waypoints. This generated coordinates calculating relative motion and visually servoing to science targets. A limitation for the current system is serial computing-each additional landmark is tracked in order-but since each landmark is tracked independently, if transferred to appropriate parallel hardware, adding targets would not significantly diminish system speed.

  8. Passive wireless tags for tongue controlled assistive technology interfaces

    Science.gov (United States)

    Rakibet, Osman O.; Horne, Robert J.; Kelly, Stephen W.

    2016-01-01

    Tongue control with low profile, passive mouth tags is demonstrated as a human–device interface by communicating values of tongue-tag separation over a wireless link. Confusion matrices are provided to demonstrate user accuracy in targeting by tongue position. Accuracy is found to increase dramatically after short training sequences with errors falling close to 1% in magnitude with zero missed targets. The rate at which users are able to learn accurate targeting with high accuracy indicates that this is an intuitive device to operate. The significance of the work is that innovative very unobtrusive, wireless tags can be used to provide intuitive human–computer interfaces based on low cost and disposable mouth mounted technology. With the development of an appropriate reading system, control of assistive devices such as computer mice or wheelchairs could be possible for tetraplegics and others who retain fine motor control capability of their tongues. The tags contain no battery and are intended to fit directly on the hard palate, detecting tongue position in the mouth with no need for tongue piercings. PMID:27222736

  9. A Wireless Camera Node with Passive Self-righting Mechanism for Capturing Surrounding View

    OpenAIRE

    Kawabata, Kuniaki; Sato, Hideo; Suzuki, Tsuyoshi; Tobe, Yoshito

    2010-01-01

    In this report, we have proposed a sensor node and related wireless network for information gathering in disaster areas. We have described a “camera node” prototype developed on this basis, containing a camera with a fisheye lens, a passive self-righting mechanism to maintain the camera orientation, and the systems capability for construction of an ad hoc wireless network, together with a GPS adaptor and an embedded computer timer to identify its position and imaging time. The camera node...

  10. Just ask Siri? A pilot study comparing smartphone digital assistants and laptop Google searches for smoking cessation advice.

    Science.gov (United States)

    Boyd, Matt; Wilson, Nick

    2018-01-01

    To compare voice-activated internet searches by smartphone (two digital assistants) with laptop ones for information and advice related to smoking cessation. Responses to 80 questions on a range of topics related to smoking cessation (including the FAQ from a NHS website), compared for quality. Smartphone and internet searches as performed in New Zealand. Ranked responses to the questions. Google laptop internet searches came first (or first equal) for best quality smoking cessation advice for 83% (66/80) of the responses. Voiced questions to Google Assistant ("OK Google") came first/first equal 76% of the time vs Siri (Apple) at 28%. Google and Google Assistant were statistically significantly better than Siri searches (odds ratio 12.4 and 8.5 respectively, pGoogle internet searches and Google Assistant were found to be significantly superior to the Siri digital assistant for smoking cessation information. While expert content was returned over half the time, there is still substantial room for improvement in how these software systems deliver smoking cessation advice.

  11. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  12. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  13. Home Computers and Child Outcomes: Short-Term Impacts from a Randomized Experiment in Peru. NBER Working Paper No. 18818

    Science.gov (United States)

    Beuermann, Diether W.; Cristia, Julian P.; Cruz-Aguayo, Yyannu; Cueto, Santiago; Malamud, Ofer

    2013-01-01

    This paper presents results from a randomized control trial in which approximately 1,000 OLPC XO laptops were provided for home use to children attending primary schools in Lima, Peru. The intervention increased access and use of home computers, with some substitution away from computer use outside the home. Beneficiaries were more likely to…

  14. A Field Programmable Gate Array-Based Reconfigurable Smart-Sensor Network for Wireless Monitoring of New Generation Computer Numerically Controlled Machines

    Directory of Open Access Journals (Sweden)

    Ion Stiharu

    2010-08-01

    Full Text Available Computer numerically controlled (CNC machines have evolved to adapt to increasing technological and industrial requirements. To cover these needs, new generation machines have to perform monitoring strategies by incorporating multiple sensors. Since in most of applications the online Processing of the variables is essential, the use of smart sensors is necessary. The contribution of this work is the development of a wireless network platform of reconfigurable smart sensors for CNC machine applications complying with the measurement requirements of new generation CNC machines. Four different smart sensors are put under test in the network and their corresponding signal processing techniques are implemented in a Field Programmable Gate Array (FPGA-based sensor node.

  15. A Field Programmable Gate Array-Based Reconfigurable Smart-Sensor Network for Wireless Monitoring of New Generation Computer Numerically Controlled Machines

    Science.gov (United States)

    Moreno-Tapia, Sandra Veronica; Vera-Salas, Luis Alberto; Osornio-Rios, Roque Alfredo; Dominguez-Gonzalez, Aurelio; Stiharu, Ion; de Jesus Romero-Troncoso, Rene

    2010-01-01

    Computer numerically controlled (CNC) machines have evolved to adapt to increasing technological and industrial requirements. To cover these needs, new generation machines have to perform monitoring strategies by incorporating multiple sensors. Since in most of applications the online Processing of the variables is essential, the use of smart sensors is necessary. The contribution of this work is the development of a wireless network platform of reconfigurable smart sensors for CNC machine applications complying with the measurement requirements of new generation CNC machines. Four different smart sensors are put under test in the network and their corresponding signal processing techniques are implemented in a Field Programmable Gate Array (FPGA)-based sensor node. PMID:22163602

  16. Wireless Sensor Network for Medical Applications

    OpenAIRE

    Hanady S.Ahmed; Abduladhem A. Ali

    2015-01-01

    This work presents a healthcare monitoring system that can be used in an intensive care room. Biological information represented by ECG signals is achieved by ECG acquisition part . AD620 Instrumentation Amplifier selected due to its low current noise. The ECG signals of patients in the intensive care room are measured through wireless nodes. A base node is connected to the nursing room computer via a USB port , and is programmed with a specific firmware. The ECG signals are trans...

  17. Finding Waves: Techniques for a Successful Wireless Site Survey

    Science.gov (United States)

    Shanafelt, Michael

    2004-01-01

    Wireless Local Area Networks are the most widely adopted networking technology to hit the market in the last three years. They have the potential to make network applications and the Internet available anywhere on a campus so that students and faculty are no longer tethered to their offices or shared computer laboratories in order to connect to a…

  18. W-NINE: A Two-Stage Emulation Platform for Mobile and Wireless Systems

    Directory of Open Access Journals (Sweden)

    Emmanuel Conchon

    2010-01-01

    Full Text Available More and more applications and protocols are now running on wireless networks. Testing the implementation of such applications and protocols is a real challenge as the position of the mobile terminals and environmental effects strongly affect the overall performance. Network emulation is often perceived as a good trade-off between experiments on operational wireless networks and discrete-event simulations on Opnet or ns-2. However, ensuring repeatability and realism in network emulation while taking into account mobility in a wireless environment is very difficult. This paper proposes a network emulation platform, called W-NINE, based on off-line computations preceding online pattern-based traffic shaping. The underlying concepts of repeatability, dynamicity, accuracy, and realism are defined in the emulation context. Two different simple case studies illustrate the validity of our approach with respect to these concepts.

  19. Effect of Gender on Computer Use and Attitudes of College Seniors

    Science.gov (United States)

    McCoy, Leah P.; Heafner, Tina L.

    Male and female students have historically had different computer attitudes and levels of computer use. These equity issues are of interest to researchers and practitioners who seek to understand why a digital divide exists between men and women. In this study, these questions were examined in an intensive computing environment in which all students at one university were issued identical laptop computers and used them extensively for 4 years. Self-reported computer use was examined for effects of gender. Attitudes toward computers were also assessed and compared for male and female students. The results indicated that when the technological environment was institutionally equalized for male and female students, many traditional findings of gender differences were not evident.

  20. Intelligent Wireless Sensor Network

    OpenAIRE

    Saeed, Bakhtiar I.; Mehrdadi, Bruce

    2010-01-01

    In recent years, there has been significant increase in utilisation of embedded-microcontrollers in broad range of applications extending from commercial products to industrial process system monitoring. Furthermore, improvements in speed, size and power consumption of microcontrollers with added wireless capabilities has provided new generation of applications. These include versatile and\\ud low cost solutions in wireless sensor networking applications such as wireless system monitoring and ...

  1. Self-powered information measuring wireless networks using the distribution of tasks within multicore processors

    Science.gov (United States)

    Zhuravska, Iryna M.; Koretska, Oleksandra O.; Musiyenko, Maksym P.; Surtel, Wojciech; Assembay, Azat; Kovalev, Vladimir; Tleshova, Akmaral

    2017-08-01

    The article contains basic approaches to develop the self-powered information measuring wireless networks (SPIM-WN) using the distribution of tasks within multicore processors critical applying based on the interaction of movable components - as in the direction of data transmission as wireless transfer of energy coming from polymetric sensors. Base mathematic model of scheduling tasks within multiprocessor systems was modernized to schedule and allocate tasks between cores of one-crystal computer (SoC) to increase energy efficiency SPIM-WN objects.

  2. Data-Dependent Fingerprints for Wireless Device Authentication

    Science.gov (United States)

    2014-05-20

    conventional wireless local area network ( WLAN ). To verify that the node can be trusted, the DMN transmits a challenge, which is essentially a request for...varactor diode chosen for the application is the Skyworks SMV1236, which is a silicon hyperabrupt junction device with a high quality factor. The...and computes the MSD between each estimate and the correct response vector x using (7), with the result allowing application of the authentication

  3. Astronomy with a home computer

    CERN Document Server

    Monks, Neale

    2005-01-01

    Here is a one-volume guide to just about everything computer-related for amateur astronomers! Today's amateur astronomy is inextricably linked to personal computers. Computer-controlled "go-to" telescopes are inexpensive. CCD and webcam imaging make intensive use of the technology for capturing and processing images. Planetarium software provides information and an easy interface for telescopes. The Internet offers links to other astronomers, information, and software. The list goes on and on. Find out here how to choose the best planetarium program: are commercial versions really better than freeware? Learn how to optimise a go-to telescope, or connect it to a lap-top. Discover how to choose the best webcam and use it with your telescope. Create a mosaic of the Moon, or high-resolution images of the planets... Astronomy with a Home Computer is designed for every amateur astronomer who owns a home computer, whether it is running Microsoft Windows, Mac O/S or Linux. It doesn't matter what kind of telescope you...

  4. NOVEL APPLICATIONS FOR EMERGING MARKETS USING TELEVISION AS A UBIQUITOUS DEVICE

    DEFF Research Database (Denmark)

    Pal, Arpan

    2013-01-01

    – personal computer (including laptop and tablet), television and mobile (including smart phone). For emerging market countries like India, personal computers are not yet affordable to masses and most of the people are not savvy or skilled enough to operate a personal computer. Mobile phones, though being...... connected to the internet-world in a low-cost manner, it has the potential of becoming the ―Ubiquitous Computing Screen‖ for the home. The emerging markets are characterized by some unique issues like low bandwidth / low Quality-of-Service (QoS) of the available wireless networks, extreme cost...... solutions for seamlessly blending Internet with broadcasting content. To this end, in this thesis a novel application development framework is proposed first on top of a low-cost over-the-top box that uses television as a ubiquitous device with a focus on emerging markets. Then an end-to-end solution...

  5. Distributed computing for macromolecular crystallography.

    Science.gov (United States)

    Krissinel, Evgeny; Uski, Ville; Lebedev, Andrey; Winn, Martyn; Ballard, Charles

    2018-02-01

    Modern crystallographic computing is characterized by the growing role of automated structure-solution pipelines, which represent complex expert systems utilizing a number of program components, decision makers and databases. They also require considerable computational resources and regular database maintenance, which is increasingly more difficult to provide at the level of individual desktop-based CCP4 setups. On the other hand, there is a significant growth in data processed in the field, which brings up the issue of centralized facilities for keeping both the data collected and structure-solution projects. The paradigm of distributed computing and data management offers a convenient approach to tackling these problems, which has become more attractive in recent years owing to the popularity of mobile devices such as tablets and ultra-portable laptops. In this article, an overview is given of developments by CCP4 aimed at bringing distributed crystallographic computations to a wide crystallographic community.

  6. Full-scale experimental validation of decentralized damage identification using wireless smart sensors

    International Nuclear Information System (INIS)

    Jang, Shinae; Sim, Sung-Han; Jo, Hongki; Spencer Jr, Billie F

    2012-01-01

    Wireless smart sensor networks (WSSN) facilitate a new paradigm for structural health monitoring (SHM) of civil infrastructure. Conventionally, SHM systems employing wired sensors and centralized data acquisition have been used to characterize the state of a structure; however, widespread implementation has been limited due to high costs and difficulties in installation. WSSN offer a unique opportunity to overcome such difficulties. Recent developments have realized low-cost, smart sensors with on-board computation and wireless communication capabilities, making deployment of a dense array of sensors on large civil structures both economical and feasible. Wireless smart sensors (WSS) have shown their tremendous potential for SHM in recent full-scale bridge monitoring examples. However, structural damage identification using on-board computation capability in a WSSN, a primary objective of SHM, has yet to reach its full potential. This paper presents full-scale validation of a damage identification strategy using a decentralized network of Imote2 nodes on a historic steel truss bridge. A total of 24 WSS nodes with 144 sensor channels are deployed on the bridge to validate the developed damage identification software. The performance of this decentralized damage identification strategy is demonstrated on the WSSN by comparing its results with those from the traditional centralized approach, as well as visual inspection. (paper)

  7. WISH: a Wireless Mobile Multimedia Information System in Healthcare using RFID.

    Science.gov (United States)

    Yu, Weider D; Ray, Pradeep; Motoc, Tiberiu

    2008-05-01

    It is important to improve the efficiency of healthcare-related operations and the associated costs. Healthcare organizations are constantly under increased pressure to streamline operations and provide enhanced services to their patients. Wireless mobile computing technology has the potential to provide the desired benefits and would be a critical part of today's healthcare information system. In this paper, a system is presented to better facilitate the functions of physicians and medical staff in healthcare by using modern wireless mobile technology, Radio Frequency Identification (RFID) tools, and multimedia streaming. The paper includes a case study of the development of such a system in the context of healthcare in the United States. The results of the study show how wireless mobile multimedia systems can be developed for the improvement of the quality and efficiency in healthcare for other nations as well. Our testing data show a time reduction of more than 50% in the daily activities of hospital staff.

  8. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  9. Analyzing energy consumption of wireless networks. A model-based approach

    Energy Technology Data Exchange (ETDEWEB)

    Yue, Haidi

    2013-03-04

    During the last decades, wireless networking has been continuously a hot topic both in academy and in industry. Many different wireless networks have been introduced like wireless local area networks, wireless personal networks, wireless ad hoc networks, and wireless sensor networks. If these networks want to have a long term usability, the power consumed by the wireless devices in each of these networks needs to be managed efficiently. Hence, a lot of effort has been carried out for the analysis and improvement of energy efficiency, either for a specific network layer (protocol), or new cross-layer designs. In this thesis, we apply model-based approach for the analysis of energy consumption of different wireless protocols. The protocols under consideration are: one leader election protocol, one routing protocol, and two medium access control protocols. By model-based approach we mean that all these four protocols are formalized as some formal models, more precisely, as discrete-time Markov chains (DTMCs), Markov decision processes (MDPs), or stochastic timed automata (STA). For the first two models, DTMCs and MDPs, we model them in PRISM, a prominent model checker for probabilistic model checking, and apply model checking technique to analyze them. Model checking belongs to the family of formal methods. It discovers exhaustively all possible (reachable) states of the models, and checks whether these models meet a given specification. Specifications are system properties that we want to study, usually expressed by some logics, for instance, probabilistic computer tree logic (PCTL). However, while model checking relies on rigorous mathematical foundations and automatically explores the entire state space of a model, its applicability is also limited by the so-called state space explosion problem -- even systems of moderate size often yield models with an exponentially larger state space that thwart their analysis. Hence for the STA models in this thesis, since there

  10. Wireless next generation networks a virtue-based trust model

    CERN Document Server

    Harvey, Melissa

    2014-01-01

    This SpringerBrief proposes a trust model motivated by virtue epistemology, addressing the need for a more efficient and flexible trust model for wireless next generation networks. This theory of trust simplifies the computation and communication overhead of strictly cognitive-computational models of trust. Both the advantages and the challenges of virtue-based trust models are discussed. This brief offers new research and a general theory of rationality that enables users to interpret trust and reason as complementary mechanisms that guide our rational conduct at two different epistemic level

  11. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  12. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  13. An analysis of java-based mobile agent platforms for wireless sensor networks

    NARCIS (Netherlands)

    Aiello, F.; Fortino, G.; Galzarano, S.; Gravina, R.; Guerrieri, A.

    2011-01-01

    Wireless sensor networks (WSNs) represent a new form of pervasive and ubiquitous computing systems successfully exploited in many different application areas within which they will play an increasingly important role in future. However, the development of applications for WSNs is an extremely

  14. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  15. Localization in Wireless Networks Foundations and Applications

    CERN Document Server

    Sanford, Jessica Feng; Slijepcevic, Sasha

    2012-01-01

    In a computational tour-de-force, this volume wipes away a host of problems related to location discovery in wireless ad-hoc sensor networks. WASNs have recognized potential in many applications that are location-dependent, yet are heavily constrained by factors such as cost and energy consumption. Their “ad-hoc” nature, with direct rather than mediated connections between a network of wireless devices, adds another layer of difficulty.   Basing this work entirely on data-driven, coordinated algorithms, the authors' aim is to present location discovery techniques that are highly accurate—and which fit user criteria. The research deploys nonparametric statistical methods and relies on the concept of joint probability to construct error (including location error) models and environmental field models. It also addresses system issues such as the broadcast and scheduling of the beacon. Reporting an impressive accuracy gain of almost 17 percent, and organized in a clear, sequential manner, this book represe...

  16. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks.

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-02-10

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches.

  17. SPLAI: Computational Finite Element Model for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ruzana Ishak

    2006-01-01

    Full Text Available Wireless sensor network refers to a group of sensors, linked by a wireless medium to perform distributed sensing task. The primary interest is their capability in monitoring the physical environment through the deployment of numerous tiny, intelligent, wireless networked sensor nodes. Our interest consists of a sensor network, which includes a few specialized nodes called processing elements that can perform some limited computational capabilities. In this paper, we propose a model called SPLAI that allows the network to compute a finite element problem where the processing elements are modeled as the nodes in the linear triangular approximation problem. Our model also considers the case of some failures of the sensors. A simulation model to visualize this network has been developed using C++ on the Windows environment.

  18. From biological and social network metaphors to coupled bio-social wireless networks

    Science.gov (United States)

    Barrett, Christopher L.; Eubank, Stephen; Anil Kumar, V.S.; Marathe, Madhav V.

    2010-01-01

    Biological and social analogies have been long applied to complex systems. Inspiration has been drawn from biological solutions to solve problems in engineering products and systems, ranging from Velcro to camouflage to robotics to adaptive and learning computing methods. In this paper, we present an overview of recent advances in understanding biological systems as networks and use this understanding to design and analyse wireless communication networks. We expand on two applications, namely cognitive sensing and control and wireless epidemiology. We discuss how our work in these two applications is motivated by biological metaphors. We believe that recent advances in computing and communications coupled with advances in health and social sciences raise the possibility of studying coupled bio-social communication networks. We argue that we can better utilise the advances in our understanding of one class of networks to better our understanding of the other. PMID:21643462

  19. Investigation of interference in multiple-input multiple-output wireless transmission at W band for an optical wireless integration system.

    Science.gov (United States)

    Li, Xinying; Yu, Jianjun; Dong, Ze; Zhang, Junwen; Chi, Nan; Yu, Jianguo

    2013-03-01

    We experimentally investigate the interference in multiple-input multiple-output (MIMO) wireless transmission by adjusting the relative locations of horn antennas (HAs) in a 100 GHz optical wireless integration system, which can deliver a 50 Gb/s polarization-division-multiplexing quadrature-phase-shift-keying signal over 80 km single-mode fiber-28 and a 2×2 MIMO wireless link. For the parallel 2×2 MIMO wireless link, each receiver HA can only get wireless power from the corresponding transmitter HA, while for the crossover ones, the receiver HA can get wireless power from two transmitter HAs. At the wireless receiver, polarization demultiplexing is realized by the constant modulus algorithm (CMA) in the digital-signal-processing part. Compared to the parallel case, wireless interference causes about 2 dB optical signal-to-noise ratio penalty at a bit-error ratio (BER) of 3.8×10(-3) for the crossover cases if similar CMA taps are employed. The increase in CMA tap length can reduce wireless interference and improve BER performance. Furthermore, more CMA taps should be adopted to overcome the severe wireless interference when two pairs of transmitter and receiver HAs have different wireless distances.

  20. Wireless Power Transmission via Sheet Medium Using Automatic Phase Adjustment of Multiple Inputs

    Science.gov (United States)

    Matsuda, Takashi; Oota, Toshifumi; Kado, Youiti; Zhang, Bing

    The wireless power transmission via sheet medium is a novel physical form of communication that utilizes the surface as a medium to provide both data and power transmission services. To efficiently transmit a relatively-large amount of electric power (several watts), we have developed a wireless power transmission system via sheet medium that concentrates the electric power on a specific spot by using phase control of multiple inputs. However, to find the optimal phases of the multiple inputs making the microwave converge on a specific spot in the sheet medium, the prior knowledge of the device's position, and the pre-experiment measuring the output power, are needed. In wireless communication area, it is known that the retrodirective array scheme can efficiently transmit the power in a self-phasing manner, which uses the pilot signals sent by the client devices. In this paper, we apply the retrodirective array scheme to the wireless power transmission system via sheet medium, and propose a power transmission scheme using the phase-adjustment of multiple inputs. To confirm the effectiveness of the proposal scheme, we evaluate its performance by computer simulation and realistic measurement. Both results show that the proposal scheme can achieve the retrodirectivity over the wireless power transmission via sheet medium.

  1. Frictional lichenified dermatosis from prolonged use of a computer mouse: Case report and review of the literature of computer-related dermatoses.

    Science.gov (United States)

    Ghasri, Pedram; Feldman, Steven R

    2010-12-15

    Despite the increasing reliance on computers and the associated health risks, computer-related dermatoses remain under-represented in the literature. This term collectively refers to four groups of cutaneous pathologies: 1) allergic contact dermatitis from exposure to certain chemicals in computer accessories, 2) various friction-induced hand lesions resulting from prolonged computer use, 3) erythema ab igne from placement of the laptop on the skin, and 4) "screen dermatitis" from excessive exposure to visual display terminals (VDTs). Within this review we also present a case of a friction-induced lichenified dermatosis in the dominant wrist of a 24-year-old female that was caused by excessive use of her computer mouse. More importantly, we review the literature of all previously reported cases of computer-related dermatoses, so as to promote recognition and appropriate management by both patients and physicians.

  2. Wireless and mobile systems in telemedicine

    Directory of Open Access Journals (Sweden)

    Reza Safdari

    2012-12-01

    Full Text Available Background: It is necessary to deploy mobile and wireless systems in healthcare, because they have many benefits for healthcare systems. The objectives of this article were introducing various systems, applications, and standards of the wireless and mobile telemedicine. Material and Methods: This review study was conducted in 2010. To conduct the study, published articles in the years 2005 to 2012, in English with an emphasis on wireless and mobile technologies in health were studied. Search was done with key words include telemedicine, wireless health systems, health and telecommunications technology in databases including Pubmed, Science Direct, Google Scholar, Web of Sciences, Proquest. The collected data were analyzed. Results: Telemedicine system in the ambulance, telemedicine systems in space, telecardiology systems, EEG system, ultrasound system are some types of wireless and mobile systems in telemedicine. PDA-based mobile and wireless telemedicine application, based PDA drug application, and patient tracking application are some of wireless and mobile applications of telemedicine. The most important standards of wireless and mobile telemedicine are HL7, DICOM, SNOMed, and ICD-9-CM. Conclusion: There are many challenges in the wireless and mobile systems in telemedicine, despite the many benefits. Slow speed in sending pictures and video, lack of attention to the privacy in the design of these systems, environmental variables and the number of users during the day are some of these challenges. It is recommended to consider these challenges during the planning and designing of wireless and mobile systems in telemedicine.

  3. Novel Congestion-Free Alternate Routing Path Scheme using Stackelberg Game Theory Model in Wireless Networks

    Directory of Open Access Journals (Sweden)

    P. Chitra

    2017-04-01

    Full Text Available Recently, wireless network technologies were designed for most of the applications. Congestion raised in the wireless network degrades the performance and reduces the throughput. Congestion-free network is quit essen- tial in the transport layer to prevent performance degradation in a wireless network. Game theory is a branch of applied mathematics and applied sciences that used in wireless network, political science, biology, computer science, philosophy and economics. e great challenges of wireless network are their congestion by various factors. E ective congestion-free alternate path routing is pretty essential to increase network performance. Stackelberg game theory model is currently employed as an e ective tool to design and formulate conges- tion issues in wireless networks. is work uses a Stackelberg game to design alternate path model to avoid congestion. In this game, leaders and followers are selected to select an alternate routing path. e correlated equilibrium is used in Stackelberg game for making better decision between non-cooperation and cooperation. Congestion was continuously monitored to increase the throughput in the network. Simulation results show that the proposed scheme could extensively improve the network performance by reducing congestion with the help of Stackelberg game and thereby enhance throughput.

  4. Study and design on USB wireless laser communication system

    Science.gov (United States)

    Wang, Aihua; Zheng, Jiansheng; Ai, Yong

    2004-04-01

    We give the definition of USB wireless laser communication system (WLCS) and the brief introduction to the protocol of USB, the standard of hardware is also given. The paper analyses the hardware and software of USB WLCS. Wireless laser communication part and USB interface circuit part are discussed in detail. We also give the periphery design of the chip AN2131Q, the control circuit to realize the transformation from parallel port to serial bus, and the circuit of laser sending and receiving of laser communication part, which are simply, cheap and workable. And then the four part of software are analyzed as followed. We have consummated the ISR in the firmware frame to develop the periphery device of USB. We have debugged and consummated the 'ezload,' and the GPD of the drivers. Windows application performs functions and schedules the corresponding API functions to let the interface practical and beautiful. The system can realize USB wireless laser communication between computers, which distance is farther than 50 meters, and top speed can be bigger than 8 Mbps. The system is of great practical sense to resolve the issues of high-speed communication among increasing districts without fiber trunk network.

  5. A campus-wide Wi-Fi service for CERN

    CERN Multimedia

    2016-01-01

    Improvements are coming to CERN’s Wi-Fi service as connectivity is improved in offices, restaurants and meeting rooms.   All Wi-Fi traffic will be routed via central controllers in CERN’s Computer Centre to provide a better managed service. (Image: Veronika McQuade/CERN) The IT department’s Communication Systems group has provided Wi-Fi connectivity at CERN for many years now but with a focus on meeting rooms, auditoriums and informal meeting places such as the restaurants. Although some buildings have Wi-Fi coverage in offices, most do not and CERN’s Wi-Fi service is lagging behind the demand driven by the growing number of tablets, lightweight laptops and other wireless-only devices. Furthermore, the current network infrastructure can’t cope with the many devices in the Main Auditorium during events such as the recent LIGO announcement and it often has difficulty handling the demand at Restaurant 1 during lunchtimes. The wireless access points d...

  6. Evaluation of wireless Local Area Networks

    Science.gov (United States)

    McBee, Charles L.

    1993-09-01

    This thesis is an in-depth evaluation of the current wireless Local Area Network (LAN) technologies. Wireless LAN's consist of three technologies: they are infrared light, microwave, and spread spectrum. When the first wireless LAN's were introduced, they were unfavorably labeled slow, expensive, and unreliable. The wireless LAN's of today are competitively priced, more secure, easier to install, and provide equal to or greater than the data throughput of unshielded twisted pair cable. Wireless LAN's are best suited for organizations that move office staff frequently, buildings that have historical significance, or buildings that have asbestos. Additionally, an organization may realize a cost savings of between $300 to $1,200 each time a node is moved. Current wireless LAN technologies have a positive effect on LAN standards being developed by the Defense Information System Agency (DISA). DoD as a whole is beginning to focus on wireless LAN's and mobile communications. If system managers want to remain successful, they need to stay abreast of this technology.

  7. Jammer Localization Using Wireless Devices with Mitigation by Self-Configuration.

    Directory of Open Access Journals (Sweden)

    Qazi Mamoon Ashraf

    Full Text Available Communication abilities of a wireless network decrease significantly in the presence of a jammer. This paper presents a reactive technique, to detect and locate the position of a jammer using a distributed collection of wireless sensor devices. We employ the theory of autonomic computing as a framework to design the same. Upon detection of a jammer, the affected nodes self-configure their power consumption which stops unnecessary waste of battery resources. The scheme then proceeds to determine the approximate location of the jammer by analysing the location of active nodes as well as the affected nodes. This is done by employing a circular curve fitting algorithm. Results indicate a high degree of accuracy in localizing a jammer has been achieved.

  8. Energy-aware scheduling of surveillance in wireless multimedia sensor networks.

    Science.gov (United States)

    Wang, Xue; Wang, Sheng; Ma, Junjie; Sun, Xinyao

    2010-01-01

    Wireless sensor networks involve a large number of sensor nodes with limited energy supply, which impacts the behavior of their application. In wireless multimedia sensor networks, sensor nodes are equipped with audio and visual information collection modules. Multimedia contents are ubiquitously retrieved in surveillance applications. To solve the energy problems during target surveillance with wireless multimedia sensor networks, an energy-aware sensor scheduling method is proposed in this paper. Sensor nodes which acquire acoustic signals are deployed randomly in the sensing fields. Target localization is based on the signal energy feature provided by multiple sensor nodes, employing particle swarm optimization (PSO). During the target surveillance procedure, sensor nodes are adaptively grouped in a totally distributed manner. Specially, the target motion information is extracted by a forecasting algorithm, which is based on the hidden Markov model (HMM). The forecasting results are utilized to awaken sensor node in the vicinity of future target position. According to the two properties, signal energy feature and residual energy, the sensor nodes decide whether to participate in target detection separately with a fuzzy control approach. Meanwhile, the local routing scheme of data transmission towards the observer is discussed. Experimental results demonstrate the efficiency of energy-aware scheduling of surveillance in wireless multimedia sensor network, where significant energy saving is achieved by the sensor awakening approach and data transmission paths are calculated with low computational complexity.

  9. Wireless coexistence and interference test method for low-power wireless sensor networks

    NARCIS (Netherlands)

    Serra, R.; Nabi, Majid

    2015-01-01

    Wireless sensor networks (WSNs) are being increasingly introduced for critical applications such as safety, security and health. One the main characteristic requirements of such networks are that they should function with relative low power. Therefore the wireless links are more vulnerable.

  10. Ubiquitous Wireless Smart Sensing and Control

    Science.gov (United States)

    Wagner, Raymond

    2013-01-01

    Need new technologies to reliably and safely have humans interact within sensored environments (integrated user interfaces, physical and cognitive augmentation, training, and human-systems integration tools). Areas of focus include: radio frequency identification (RFID), motion tracking, wireless communication, wearable computing, adaptive training and decision support systems, and tele-operations. The challenge is developing effective, low cost/mass/volume/power integrated monitoring systems to assess and control system, environmental, and operator health; and accurately determining and controlling the physical, chemical, and biological environments of the areas and associated environmental control systems.

  11. Design of A Development Platform for HW/SW Codesign of Wireless IOntegrated Sensor Nodes

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Leopold, Martin; Madsen, Jan

    2005-01-01

    Wireless integrated sensor networks are a new class of embedded computer systems which have been made possible mainly by the recent advances in the micro and the nano technology. In order to efficiently utilize the limited resources available on a sensor node, we need to optimize its key design...... parameters which is only possible by making system-level design decisions about its hardware and software (operating system and applications) architecture. In this paper, we present the design of a sensor node development platform in relation to an application of wireless integrated sensor networks for sow...

  12. On securing wireless sensor network--novel authentication scheme against DOS attacks.

    Science.gov (United States)

    Raja, K Nirmal; Beno, M Marsaline

    2014-10-01

    Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.

  13. An efficient wireless power transfer system with security considerations for electric vehicle applications

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Zhen; Chau, K. T., E-mail: ktchau@eee.hku.hk; Liu, Chunhua; Qiu, Chun; Lin, Fei [Department of Electrical and Electronic Engineering, The University of Hong Kong, Pokfulam Road, Hong Kong (China)

    2014-05-07

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  14. An efficient wireless power transfer system with security considerations for electric vehicle applications

    International Nuclear Information System (INIS)

    Zhang, Zhen; Chau, K. T.; Liu, Chunhua; Qiu, Chun; Lin, Fei

    2014-01-01

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption

  15. An efficient wireless power transfer system with security considerations for electric vehicle applications

    Science.gov (United States)

    Zhang, Zhen; Chau, K. T.; Liu, Chunhua; Qiu, Chun; Lin, Fei

    2014-05-01

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  16. [The Development of Information Centralization and Management Integration System for Monitors Based on Wireless Sensor Network].

    Science.gov (United States)

    Xu, Xiu; Zhang, Honglei; Li, Yiming; Li, Bin

    2015-07-01

    Developed the information centralization and management integration system for monitors of different brands and models with wireless sensor network technologies such as wireless location and wireless communication, based on the existing wireless network. With adaptive implementation and low cost, the system which possesses the advantages of real-time, efficiency and elaboration is able to collect status and data of the monitors, locate the monitors, and provide services with web server, video server and locating server via local network. Using an intranet computer, the clinical and device management staffs can access the status and parameters of monitors. Applications of this system provide convenience and save human resource for clinical departments, as well as promote the efficiency, accuracy and elaboration for the device management. The successful achievement of this system provides solution for integrated and elaborated management of the mobile devices including ventilator and infusion pump.

  17. Improving the Capture and Re-Use of Data with Wearable Computers

    Science.gov (United States)

    Pfarr, Barbara; Fating, Curtis C.; Green, Daniel; Powers, Edward I. (Technical Monitor)

    2001-01-01

    At the Goddard Space Flight Center, members of the Real-Time Software Engineering Branch are developing a wearable, wireless, voice-activated computer for use in a wide range of crosscutting space applications that would benefit from having instant Internet, network, and computer access with complete mobility and hands-free operations. These applications can be applied across many fields and disciplines including spacecraft fabrication, integration and testing (including environmental testing), and astronaut on-orbit control and monitoring of experiments with ground based experimenters. To satisfy the needs of NASA customers, this wearable computer needs to be connected to a wireless network, to transmit and receive real-time video over the network, and to receive updated documents via the Internet or NASA servers. The voice-activated computer, with a unique vocabulary, will allow the users to access documentation in a hands free environment and interact in real-time with remote users. We will discuss wearable computer development, hardware and software issues, wireless network limitations, video/audio solutions and difficulties in language development.

  18. Wireless sensor network: an aimless gadget or a necessary tool for natural hazards warning systems

    Science.gov (United States)

    Hloupis, George; Stavrakas, Ilias; Triantis, Dimos

    2010-05-01

    The purpose of the current study is to review the current technical and scientific state of wireless sensor networks (WSNs) with application on natural hazards. WSN have received great attention from the research community in the last few years, mainly due to the theoretical and practical efforts from challenges that led to mature solutions and adoption of standards, such as Bluetooth [2] and ZigBee [3]. Wireless technology solutions allows Micro-ElectroMechanical Systems sensors (MEMS) to be integrated (with all the necessary circuitry) to small wireless capable devices, the nodes. Available MEMS today include pressure, temperature, humidity, inertial and strain-gauge sensors as well as transducers for velocity, acceleration, vibration, flow position and inclination [4]. A WSN is composed by a large number of nodes which are deployed densely adjacent to the area under monitoring. Each node collects data which transmitted to a gateway. The main requirements that WSNs must fulfilled are quite different than those of ad-hoc networks. WSNs have to be self-organized (since the positions of individual nodes are not known in advance), they must present cooperative processing of tasks (where groups of nodes cooperate in order to provide the gathered data to the user), they require security mechanisms that are adaptive to monitoring conditions and all algorithms must be energy optimized. In this paper, the state of the art in hardware, software, algorithms and protocols for WSNs, focused on natural hazards, is surveyed. Architectures for WSNs are investigated along with their advantages and drawbacks. Available research prototypes as well as commercially proposed solutions that can be used for natural hazards monitoring and early warning systems are listed and classified. [1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey, Comput. Networks (Elsevier) 38 (4) (2002) 393-422. [2] Dursch, A.; Yen, D.C.; Shih, D.H. Bluetooth

  19. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  20. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000 model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks.