WorldWideScience

Sample records for wireless laptop computers

  1. Exposure to electromagnetic fields from laptop use of "laptop" computers.

    Science.gov (United States)

    Bellieni, C V; Pinto, I; Bogi, A; Zoppetti, N; Andreuccetti, D; Buonocore, G

    2012-01-01

    Portable computers are often used at tight contact with the body and therefore are called "laptop." The authors measured electromagnetic fields (EMFs) laptop computers produce and estimated the induced currents in the body, to assess the safety of laptop computers. The authors evaluated 5 commonly used laptop of different brands. They measured EMF exposure produced and, using validated computerized models, the authors exploited the data of one of the laptop computers (LTCs) to estimate the magnetic flux exposure of the user and of the fetus in the womb, when the laptop is used at close contact with the woman's womb. In the LTCs analyzed, EMF values (range 1.8-6 μT) are within International Commission on Non-Ionizing Radiation (NIR) Protection (ICNIRP) guidelines, but are considerably higher than the values recommended by 2 recent guidelines for computer monitors magnetic field emissions, MPR II (Swedish Board for Technical Accreditation) and TCO (Swedish Confederation of Professional Employees), and those considered risky for tumor development. When close to the body, the laptop induces currents that are within 34.2% to 49.8% ICNIRP recommendations, but not negligible, to the adult's body and to the fetus (in pregnant women). On the contrary, the power supply induces strong intracorporal electric current densities in the fetus and in the adult subject, which are respectively 182-263% and 71-483% higher than ICNIRP 98 basic restriction recommended to prevent adverse health effects. Laptop is paradoxically an improper site for the use of a LTC, which consequently should be renamed to not induce customers towards an improper use.

  2. MacSPOC: Orbital trajectory calculations on a laptop computer

    Science.gov (United States)

    Adamo, Dan

    1991-01-01

    Orbital trajectory calculations on a laptop computer are presented in the form of the viewgraphs. The following subject areas are covered: laptop computing in the Space Shuttle program; current laptop prototyping with MacSPOC; future laptop applications; and summary.

  3. Wireless laptop-based phonocardiograph and diagnosis

    Directory of Open Access Journals (Sweden)

    Amy T. Dao

    2015-08-01

    Full Text Available Auscultation is used to evaluate heart health, and can indicate when it’s needed to refer a patient to a cardiologist. Advanced phonocardiograph (PCG signal processing algorithms are developed to assist the physician in the initial diagnosis but they are primarily designed and demonstrated with research quality equipment. Therefore, there is a need to demonstrate the applicability of those techniques with consumer grade instrument. Furthermore, routine monitoring would benefit from a wireless PCG sensor that allows continuous monitoring of cardiac signals of patients in physical activity, e.g., treadmill or weight exercise. In this work, a low-cost portable and wireless healthcare monitoring system based on PCG signal is implemented to validate and evaluate the most advanced algorithms. Off-the-shelf electronics and a notebook PC are used with MATLAB codes to record and analyze PCG signals which are collected with a notebook computer in tethered and wireless mode. Physiological parameters based on the S1 and S2 signals and MATLAB codes are demonstrated. While the prototype is based on MATLAB, the later is not an absolute requirement.

  4. Wireless Laptops in English Classrooms: A SWOT Analysis from Singapore

    Science.gov (United States)

    Towndrow, Phillip A.; Vaish, Viniti

    2009-01-01

    This paper presents illustrative findings from a one-year pilot study undertaken in the English department of a high school in Singapore that was in the first year of implementing a one-to-one wireless laptop programme. The findings show that learning was often constrained by lecture-style presentations and overt test preparation. Despite…

  5. Nickel may be released from laptop computers

    DEFF Research Database (Denmark)

    Jensen, Peter; Jellesen, Morten Stendahl; Møller, Per

    2012-01-01

    Consumer nickel sensitization and dermatitis is caused by prolonged or repeated skin exposure to items that release nickel, for example jewellery, belts, buttons, watches, and mobile phones (1–3). We recently described a patient in whom primary nickel contact sensitization and dermatitis developed...... following the use of an Apple laptop computer (4). To estimate nickel release from Apple laptop computers, we investigated a random sample of 20 devices....

  6. Advanced laptop and small personal computer technology

    Science.gov (United States)

    Johnson, Roger L.

    1991-01-01

    Advanced laptop and small personal computer technology is presented in the form of the viewgraphs. The following areas of hand carried computers and mobile workstation technology are covered: background, applications, high end products, technology trends, requirements for the Control Center application, and recommendations for the future.

  7. Side-effects to the use of laptop computers

    DEFF Research Database (Denmark)

    Søholm Secher, Lisa Linnea; Vind-Kezunovic, Dina; Zachariae, Claus Otto Carl

    2010-01-01

    The use of laptop computers is increasing, and many children and young adults spend hours with their laptops on their laps daily. We report a case with erythema ab igne on the thigh of a 17-year-old girl, induced by use of laptop computers four to five hours daily for nine months....

  8. Using a Shared Workspace and Wireless Laptops to Improve Collaborative Project Learning in an Engineering Design Class

    Science.gov (United States)

    Nicol, David J.; MacLeod, Iain A.

    2005-01-01

    Two different technologies, groupware (a shared workspace) and shared wireless laptop computers, were implemented in a project design class in a civil engineering course. The research interest was in the way these technologies supported resource sharing within and across project groups and in the forms of group collaboration that resulted. The…

  9. Burn Injury Caused by Laptop Computers

    African Journals Online (AJOL)

    Smaller size, portability, and better battery power make the laptop more popular than ever before. Cases of laptop induced burning caused due to either defective ... unit, hard drive, internal CD/DVD drive, ventilation fan, and battery.[2] Recently, reports of erythema ab igne from a cellular phone have been described.[3].

  10. Using Laptop Computers in Class: A Student Motivation Perspective

    Science.gov (United States)

    Houle, Philip A.; Reed, Diana; Vaughan, Amy Grace; Clayton, Suzanne R.

    2013-01-01

    This study examined the reasons why students choose to take laptop computers into college classes. The model involved the individual student choice involving opportunity, ability and motivation. The resulting model demonstrated how some (primary) factors, such as effective learning, directly impact the laptop usage choice, and other factors…

  11. Use of laptop computers connected to internet through Wi-Fi decreases human sperm motility and increases sperm DNA fragmentation.

    Science.gov (United States)

    Avendaño, Conrado; Mata, Ariela; Sanchez Sarmiento, César A; Doncel, Gustavo F

    2012-01-01

    To evaluate the effects of laptop computers connected to local area networks wirelessly (Wi-Fi) on human spermatozoa. Prospective in vitro study. Center for reproductive medicine. Semen samples from 29 healthy donors. Motile sperm were selected by swim up. Each sperm suspension was divided into two aliquots. One sperm aliquot (experimental) from each patient was exposed to an internet-connected laptop by Wi-Fi for 4 hours, whereas the second aliquot (unexposed) was used as control, incubated under identical conditions without being exposed to the laptop. Evaluation of sperm motility, viability, and DNA fragmentation. Donor sperm samples, mostly normozoospermic, exposed ex vivo during 4 hours to a wireless internet-connected laptop showed a significant decrease in progressive sperm motility and an increase in sperm DNA fragmentation. Levels of dead sperm showed no significant differences between the two groups. To our knowledge, this is the first study to evaluate the direct impact of laptop use on human spermatozoa. Ex vivo exposure of human spermatozoa to a wireless internet-connected laptop decreased motility and induced DNA fragmentation by a nonthermal effect. We speculate that keeping a laptop connected wirelessly to the internet on the lap near the testes may result in decreased male fertility. Further in vitro and in vivo studies are needed to prove this contention. Copyright © 2012 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  12. Allergy risks with laptop computers - nickel and cobalt release.

    Science.gov (United States)

    Midander, Klara; Hurtig, Anna; Borg Tornberg, Anette; Julander, Anneli

    2016-06-01

    Laptop computers may release nickel and cobalt when they come into contact with skin. Few computer brands have been studied. To evaluate nickel and cobalt release from laptop computers belonging to several brands by using spot tests, and to quantify the release from one new computer by using artificial sweat solution. Nickel and cobalt spot tests were used on the lid and wrist supports of 31 laptop computers representing five brands. The same surfaces were tested on all computers. In addition, one new computer was bought and dismantled for release tests in artificial sweat according to the standard method described in EN1811. Thirty-nine per cent of the laptop computers were nickel spot test-positive, and 6% were positive for cobalt. The nickel on the surface could be worn off by consecutive spot testing of the same surface. The release test in artificial sweat of one computer showed that nickel and cobalt were released, although in low concentrations. As they constitute a potential source of skin exposure to metals, laptop computers should qualify as objects to be included within the restriction of nickel in REACH, following the definition of 'prolonged skin contact'. Skin contact resulting from laptop use may contribute to an accumulated skin dose of nickel that can be problematic for sensitized individuals. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  13. Exploring the Benefits and Challenges of Using Laptop Computers in Higher Education Classrooms: A Formative Analysis

    Directory of Open Access Journals (Sweden)

    Robin H. Kay

    2011-04-01

    Full Text Available Because of decreased prices, increased convenience, and wireless access, an increasing number of college and university students are using laptop computers in their classrooms. This recent trend has forced instructors to address the educational consequences of using these mobile devices. The purpose of the current study was to analyze and assess beneficial and challenging laptop behaviours in higher education classrooms. Both quantitative and qualitative data were collected from 177 undergraduate university students (89 males, 88 females. Key benefits observed include note-taking activities, in-class laptop-based academic tasks, collaboration, increased focus, improved organization and efficiency, and addressing special needs. Key challenges noted include other student’s distracting laptop behaviours, instant messaging, surfing the web, playing games, watching movies, and decreased focus. Nearly three-quarters of the students claimed that laptops were useful in supporting their academic experience. Twice as many benefits were reported compared to challenges. It is speculated that the integration of meaningful laptop activities is a critical determinant of benefits and challenges experienced in higher education classrooms.

  14. Wireless Laptops as Means for Promoting Active Learning in Large Lecture Halls

    Science.gov (United States)

    Barak, Miri; Lipson, Alberta; Lerman, Steven

    2006-01-01

    This paper reports on a study that examined the use of wireless laptops for promoting active learning in lecture halls. The study examined students' behavior in class and their perceptions of the new learning environment throughout three consecutive semesters. An online survey revealed that students have highly positive perceptions about the use…

  15. The Fundamental Reasons Why Laptop Computers should not be Used on Your Lap.

    Science.gov (United States)

    Mortazavi, S A R; Taeb, S; Mortazavi, S M J; Zarei, S; Haghani, M; Habibzadeh, P; Shojaei-Fard, M B

    2016-12-01

    As a tendency to use new technologies, gadgets such as laptop computers are becoming more popular among students, teachers, businessmen and office workers. Today laptops are a great tool for education and learning, work and personal multimedia. Millions of men, especially those in the reproductive age, are frequently using their laptop computers on the lap (thigh). Over the past several years, our lab has focused on the health effects of exposure to different sources of electromagnetic fields such as cellular phones, mobile base stations, mobile phone jammers, laptop computers, radars, dentistry cavitrons and Magnetic Resonance Imaging (MRI). Our own studies as well as the studies performed by other researchers indicate that using laptop computers on the lap adversely affects the male reproductive health. When it is placed on the lap, not only the heat from a laptop computer can warm men's scrotums, the electromagnetic fields generated by laptop's internal electronic circuits as well as the Wi-Fi Radiofrequency radiation hazards (in a Wi-Fi connected laptop) may decrease sperm quality. Furthermore, due to poor working posture, laptops should not be used on the lap for long hours.

  16. The Fundamental Reasons Why Laptop Computers should not be Used on Your Lap

    Directory of Open Access Journals (Sweden)

    Mortazavi S. A. R.

    2016-12-01

    Full Text Available As a tendency to use new technologies, gadgets such as laptop computers are becoming more popular among students, teachers, businessmen and office workers. Today laptops are a great tool for education and learning, work and personal multimedia. Millions of men, especially those in the reproductive age, are frequently using their laptop computers on the lap (thigh. Over the past several years, our lab has focused on the health effects of exposure to different sources of electromagnetic fields such as cellular phones, mobile base stations, mobile phone jammers, laptop computers, radars, dentistry cavitrons and Magnetic Resonance Imaging (MRI. Our own studies as well as the studies performed by other researchers indicate that using laptop computers on the lap adversely affects the male reproductive health. When it is placed on the lap, not only the heat from a laptop computer can warm men’s scrotums, the electromagnetic fields generated by laptop’s internal electronic circuits as well as the Wi-Fi Radiofrequency radiation hazards (in a Wi-Fi connected laptop may decrease sperm quality. Furthermore, due to poor working posture, laptops should not be used on the lap for long hours.

  17. Writing Essays on a Laptop or a Desktop Computer: Does It Matter?

    Science.gov (United States)

    Ling, Guangming; Bridgeman, Brent

    2013-01-01

    To explore the potential effect of computer type on the Test of English as a Foreign Language-Internet-Based Test (TOEFL iBT) Writing Test, a sample of 444 international students was used. The students were randomly assigned to either a laptop or a desktop computer to write two TOEFL iBT practice essays in a simulated testing environment, followed…

  18. Laptop Paintings

    Science.gov (United States)

    Gilman, Lisa

    2005-01-01

    All of the seventh-grade students in Lisa Gilman's school have laptop computers. She wanted them to use the computers not just as a research tool, but also as a tool for artistic expression. Since Impressionism is part of the seventh-grade curriculum, she had them identify parallels between the Impressionists' use of technology and artists' use of…

  19. Erythema ab igne induced by laptop computer: an emerging disease among adolescents?

    Science.gov (United States)

    Brazzelli, V; Grassi, S; Barruscotti, S; Croci, G; Borroni, G

    2015-09-17

    Erythema ab igne (EAI) was a very common disease in the past, when it occurred mainly among people who worked with fire, or in people who had used heat sources in contact with the skin for warming purposes for long time. In the last decades, with the introduction of central heating in the buildings, EAI incidence was remarkably decreased in Western Countries, and it was found almost exclusively among elderly, and in people affected by defects in thermoregulation or alteration of periphery circulation. Recently, a new slight increase of EAI prevalence has been observed, although with some new features. Here, we describe three cases of adolescents who presented with brownish, reticulated patch on the anterior surface of their thighs. An accurate medical questioning revealed that the patients used to place the lower surface of laptop computer on the extensor side of their thighs in a cross-legged position for many hours (about 6-8 hours) every days. In particular, the patients supported the laptop computer always on the same leg. Laptop computer-induced EAI was diagnosed. Only a few cases of laptop computer-induced EAI have been reported in the literature. Although EAI is poorly symptomatic and it generally evolve to complete remission after a early discontinuance of heat source exposure, chronic lesions of EAI have been regarded as precancerous lesions. Therefore, it is important to implement diagnosis and prevention measures of this disease. Dermatologists should consider new causal agents for old diseases.

  20. Practical Skills in Laptop Computer Repairs for Curriculum Innovation in Technical Education Programmes in Nigeria

    Science.gov (United States)

    Chukwuedo, Samson O.; Omofonmwan, Godwin O.

    2015-01-01

    The increase in the use of laptop computer in Nigeria with their corresponding incessant breakdown calls for the preparation of competent technicians/technologists to carry out such repairs at the downtime of the appliance. This is one of the responsibilities of technology education programmes. This study therefore determined the practical skills…

  1. The appearance of angiolipomatosis after using laptop computer on the thighs: a relationship?

    Directory of Open Access Journals (Sweden)

    Marie Caucanas

    2011-09-01

    Full Text Available A 56-year-old patient developed angiolipomatosis of the anterior part of the thighs after repeated laptop contact localisation. Histological findings exhibit an unusual inflammatory infiltrate. We postulate that the computer could favour lipoma development by a physiopathological mechanism that remains to be clarified.

  2. Burn injury caused by laptop computers | Sharma | Annals of ...

    African Journals Online (AJOL)

    If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs. Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link ...

  3. Effects of Dual Monitor Computer Work Versus Laptop Work on Cervical Muscular and Proprioceptive Characteristics of Males and Females.

    Science.gov (United States)

    Farias Zuniga, Amanda M; Côté, Julie N

    2017-06-01

    The effects of performing a 90-minute computer task with a laptop versus a dual monitor desktop workstation were investigated in healthy young male and female adults. Work-related musculoskeletal disorders are common among computer (especially female) users. Laptops have surpassed desktop computer sales, and working with multiple monitors has also become popular. However, few studies have provided objective evidence on how they affect the musculoskeletal system in both genders. Twenty-seven healthy participants (mean age = 24.6 years; 13 males) completed a 90-minute computer task while using a laptop or dual monitor (DualMon) desktop. Electromyography (EMG) from eight upper body muscles and visual strain were measured throughout the task. Neck proprioception was tested before and after the computer task using a head-repositioning test. EMG amplitude (root mean square [RMS]), variability (coefficients of variation [CV]), and normalized mutual information (NMI) were computed. Visual strain ( p computer workstation designs.

  4. Posture, Musculoskeletal Activities, and Possible Musculoskeletal Discomfort Among Children Using Laptops or Tablet Computers for Educational Purposes: A Literature Review

    Science.gov (United States)

    Binboğa, Elif; Korhan, Orhan

    2014-10-01

    Educational ergonomics focuses on the interaction between educational performance and educational design. By improving the design or pointing out the possible problems, educational ergonomics can be utilized to have positive impacts on the student performance and thus on education process. Laptops and tablet computers are becoming widely used by school children and beginning to be used effectively for educational purposes. As the latest generation of laptops and tablet computers are mobile and lightweight compared to conventional personal computers, they support student-centred interaction-based learning. However, these technologies have been introduced into schools with minimal adaptations to furniture or attention to ergonomics. There are increasing reports of an association between increased musculoskeletal (MSK) problems in children and use of such technologies. Although children are among the users of laptops and tablet computers both in their everyday lives and at schools, the literature investigating MSK activities and possible MSK discomfort regarding children using portable technologies is limited. This study reviews the literature to identify published studies that investigated posture, MSK activities, and possible MSK discomfort among children using mobile technologies (laptops or tablet computers) for educational purposes. An electronic search of the literature published in English between January 1994 and January 2014 was performed in several databases. The literature search terms were identified and combined to search the databases. The search results that the resources investigating MSK outcomes of laptop or tablet use of children are very scarce. This review points out the research gaps in this field, and identifying areas for future studies.

  5. Computer-Based Wireless Advertising Communication System

    Directory of Open Access Journals (Sweden)

    Anwar Al-Mofleh

    2009-10-01

    Full Text Available In this paper we developed a computer based wireless advertising communication system (CBWACS that enables the user to advertise whatever he wants from his own office to the screen in front of the customer via wireless communication system. This system consists of two PIC microcontrollers, transmitter, receiver, LCD, serial cable and antenna. The main advantages of the system are: the wireless structure and the system is less susceptible to noise and other interferences because it uses digital communication techniques.

  6. Collecting Sensitive Self-Report Data with Laptop Computers: Impact on the Response Tendencies of Adolescents in a Home Interview.

    Science.gov (United States)

    Supple, Andrew J.; Aquilino, William S.; Wright, Debra L.

    1999-01-01

    Explored effects of computerized, self-administered data collection techniques in research on adolescents' self-reported substance use and psychological well-being. Adolescents completing sensitive questions on only laptop computers reported higher levels of substance use and indicated higher levels of depression and irritability; they perceived…

  7. Posture, Musculoskeletal Activities, and Possible Musculoskeletal Discomfort among Children Using Laptops or Tablet Computers for Educational Purposes: A Literature Review

    Science.gov (United States)

    Binboga, Elif; Korhan, Orhan

    2014-01-01

    Educational ergonomics focuses on the interaction between educational performance and educational design. By improving the design or pointing out the possible problems, educational ergonomics can be utilized to have positive impacts on the student performance and thus on education process. Laptops and tablet computers are becoming widely used by…

  8. Evaluation and characterization of fetal exposures to low frequency magnetic fields generated by laptop computers.

    Science.gov (United States)

    Zoppetti, Nicola; Andreuccetti, Daniele; Bellieni, Carlo; Bogi, Andrea; Pinto, Iole

    2011-12-01

    Portable - or "laptop" - computers (LCs) are widely and increasingly used all over the world. Since LCs are often used in tight contact with the body even by pregnant women, fetal exposures to low frequency magnetic fields generated by these units can occur. LC emissions are usually characterized by complex waveforms and are often generated by the main AC power supply (when connected) and by the display power supply sub-system. In the present study, low frequency magnetic field emissions were measured for a set of five models of portable computers. For each of them, the magnetic flux density was characterized in terms not just of field amplitude, but also of the so called "weighted peak" (WP) index, introduced in the 2003 ICNIRP Statement on complex waveforms and confirmed in the 2010 ICNIRP Guidelines for low frequency fields. For the model of LC presenting the higher emission, a deeper analysis was also carried out, using numerical dosimetry techniques to calculate internal quantities (current density and in-situ electric field) with reference to a digital body model of a pregnant woman. Since internal quantities have complex waveforms too, the concept of WP index was extended to them, considering the ICNIRP basic restrictions defined in the 1998 Guidelines for the current density and in the 2010 Guidelines for the in-situ electric field. Induced quantities and WP indexes were computed using an appropriate original formulation of the well known Scalar Potential Finite Difference (SPFD) numerical method for electromagnetic dosimetry in quasi-static conditions. Copyright © 2011 Elsevier Ltd. All rights reserved.

  9. Introducing laptops to children: An examination of ubiquitous computing in Grade 3 reading, language, and mathematics

    Directory of Open Access Journals (Sweden)

    Robert M. Bernard

    2008-05-01

    Full Text Available This study examines the achievement outcomes accompanying the implementation of a Grade 3 laptop or so-called ubiquitous computing program in a Quebec school district. CAT-3 reading, language, and mathematics batteries were administered at the end of Grade 2 and again at the end of Grade 3, after the first year of computer implementation. Overall gain was found in all three content areas, but was differential when compared with the norms of the CAT-3. Additionally, some evidence suggested a differential gain for lower and middle-level learners during the school year. Teachers were administered an instrument called the Technology Implementation Questionnaire (TIQ that assessed the purposes and extent of technology integration. Negative correlations were found in reading achievement gain for items associated with the higher use of communicative, evaluative, and creative uses of computers. Open-ended teacher responses indicated the need for more professional support for instructional implementations of computing. Résumé: Cette étude examine les performances accompagnant l’implantation d’un programme d’ordinateurs portables en 3 ième année du primaire, aussi appelé programme d’ubiquité computationnelle, dans une école d’un district scolaire du Québec. Des batteries de tests, CAT-3 en lecture, en langue et en mathématiques ont été administrées à la fin de la deuxième année du primaire et une autre fois à la fin de la troisième année du primaire, après un an d’implantation des ordinateurs. Un gain fut observé dans les trois matières, mais était différencié lorsque comparé aux normes du CAT-3. De plus, un gain différencié fut mis en évidence pour les apprenants de niveau inférieur et moyen durant l’année scolaire. Les enseignants ont rempli le Technology Implementation Questionnaire (TIQ qui mesure le but et l’étendue de l’intégration technologique. Des corrélations négatives ont été trouvées en

  10. Efficiency using computer simulation of Reverse Threshold Model Theory on assessing a “One Laptop Per Child” computer versus desktop computer

    Directory of Open Access Journals (Sweden)

    Supat Faarungsang

    2017-04-01

    Full Text Available The Reverse Threshold Model Theory (RTMT model was introduced based on limiting factor concepts, but its efficiency compared to the Conventional Model (CM has not been published. This investigation assessed the efficiency of RTMT compared to CM using computer simulation on the “One Laptop Per Child” computer and a desktop computer. Based on probability values, it was found that RTMT was more efficient than CM among eight treatment combinations and an earlier study verified that RTMT gives complete elimination of random error. Furthermore, RTMT has several advantages over CM and is therefore proposed to be applied to most research data.

  11. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  12. One laptop per child, local refurbishment or overseas donations? Sustainability assessment of computer supply scenarios for schools in Colombia.

    Science.gov (United States)

    Streicher-Porte, Martin; Marthaler, Christian; Böni, Heinz; Schluep, Mathias; Camacho, Angel; Hilty, Lorenz M

    2009-08-01

    With the intention of bridging the 'digital divide' many programmes have been launched to provide computers for educational institutions, ranging from refurbishing second hand computers to delivering low cost new computers. The fast and economical provision of large quantities of equipment is one of the many challenges faced by such programmes. If an increase is to be achieved in the sustainability of computer supplies for schools, not only must equipment be provided, but also suitable training and maintenance delivered. Furthermore, appropriate recycling has to be ensured, so that end-of-life equipment can be dealt with properly. This study has evaluated the suitability of three computer supply scenarios to schools in Colombia: (i) 'Colombian refurbishment', -refurbishment of computers donated in Colombia, (ii) 'Overseas refurbishment', -import of computers which were donated and refurbished abroad, and (iii) 'XO Laptop', -purchase of low cost computers manufactured in Korea. The methods applied were: Material Flow Assessment, -to assess the quantities-, Life Cycle Assessment, -to assess the environmental impacts, and the application of the Multiple Attribute Utility Theory, -to analyse, evaluate and compare different scenarios. The most sustainable solution proved to be the local refurbishment of second hand computers of Colombian origin to an appropriate technical standard. The environmental impacts of such practices need to be evaluated carefully, as second hand appliances have to be maintained, require spare parts and sometimes use more energy than newer equipment. Providing schools with second hand computers from overseas and through programmes such as 'One Laptop Per Child' has the disadvantage that the potential for social improvements - such as creation of jobs and local industry involvement - is very low.

  13. Remote display performance for wireless healthcare computing.

    Science.gov (United States)

    Lai, Albert Max; Nieh, Jason; Laine, Andrew; Starren, Justin

    2004-01-01

    Organizations are beginning to recognize that health care providers are highly mobile and optimal care requires providing access to a large and dynamic body of information wherever the provider and patient are. Remote display protocols (RDP) are one way that organizations are using to deliver healthcare applications to mobile users. While many organizations have begun to use RDPs to deliver real-time access to health care information to clinicians, little formal work has been done to evaluate the performance or the effectiveness of thin-client computing with health care applications. This study examines the performance of wireless thin-client tablets with two web-based clinical applications, a text-centric, graphics-poor EMR and a graphic-rich image analysis program. The study compares the performance of two popular RDP implementations, Citrix and Microsoft Remote Desktop, with the performance of a traditional web browser in a wireless environment. For both applications, the RDPs demonstrated both higher speed and reduced bandwidth requirements than the web browser.

  14. The Impact of Socioeconomic Status on Achievement of High School Students Participating in a One-to-One Laptop Computer Program

    Science.gov (United States)

    Weers, Anthony J.

    2012-01-01

    The purpose of this study was to determine the impact of socioeconomic status on the achievement of high school students participating in a one-to-one laptop computer program. Students living in poverty struggle to achieve in schools across the country, educators must address this issue. The independent variable in this study is socioeconomic…

  15. Wirelessly powered sensor networks and computational RFID

    CERN Document Server

    2013-01-01

    The Wireless Identification and Sensing Platform (WISP) is the first of a new class of RF-powered sensing and computing systems.  Rather than being powered by batteries, these sensor systems are powered by radio waves that are either deliberately broadcast or ambient.  Enabled by ongoing exponential improvements in the energy efficiency of microelectronics, RF-powered sensing and computing is rapidly moving along a trajectory from impossible (in the recent past), to feasible (today), toward practical and commonplace (in the near future). This book is a collection of key papers on RF-powered sensing and computing systems including the WISP.  Several of the papers grew out of the WISP Challenge, a program in which Intel Corporation donated WISPs to academic applicants who proposed compelling WISP-based projects.  The book also includes papers presented at the first WISP Summit, a workshop held in Berkeley, CA in association with the ACM Sensys conference, as well as other relevant papers. The book provides ...

  16. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  17. Some Activities with Polarized Light from a Laptop LCD Screen

    Science.gov (United States)

    Fakhruddin, Hasan

    2008-01-01

    The LCD screen of a laptop computer provides a broad, bright, and extended source of polarized light. A number of demonstrations on the properties of polarized light from a laptop computer screens are presented here.

  18. Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers.

    Science.gov (United States)

    Jordan, Jakob; Ippen, Tammo; Helias, Moritz; Kitayama, Itaru; Sato, Mitsuhisa; Igarashi, Jun; Diesmann, Markus; Kunkel, Susanne

    2018-01-01

    State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems.

  19. Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers

    Science.gov (United States)

    Jordan, Jakob; Ippen, Tammo; Helias, Moritz; Kitayama, Itaru; Sato, Mitsuhisa; Igarashi, Jun; Diesmann, Markus; Kunkel, Susanne

    2018-01-01

    State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems. PMID:29503613

  20. A feasibility study on direct methanol fuel cells for laptop computers based on a cost comparison with lithium-ion batteries

    Science.gov (United States)

    Wee, Jung-Ho

    This paper compares the total cost of direct methanol fuel cell (DMFC) and lithium (Li)-ion battery systems when applied as the power supply for laptop computers in the Korean environment. The average power output and operational time of the laptop computers were assumed to be 20 W and 3000 h, respectively. Considering the status of their technologies and with certain conditions assumed, the total costs were calculated to be US140 for the Li-ion battery and US362 for DMFC. The manufacturing costs of the DMFC and Li-ion battery systems were calculated to be 16.65 W -1 and 0.77 W h -1, and the energy consumption costs to be 0.00051 W h -1 and 0.00032 W h -1, respectively. The higher fuel consumption cost of the DMFC system was due to the methanol (MeOH) crossover loss. Therefore, the requirements for DMFCs to be able to compete with Li-ion batteries in terms of energy cost include reducing the crossover level to at an order magnitude of -9 and the MeOH price to under 0.5 kg -1. Under these conditions, if the DMFC manufacturing cost could be reduced to 6.30 W -1, then the DMFC system would become at least as competitive as the Li-ion battery system for powering laptop computers in Korea.

  1. A feasibility study on direct methanol fuel cells for laptop computers based on a cost comparison with lithium-ion batteries

    International Nuclear Information System (INIS)

    Wee, Jung-Ho

    2007-01-01

    This paper compares the total cost of direct methanol fuel cell (DMFC) and lithium (Li)-ion battery systems when applied as the power supply for laptop computers in the Korean environment. The average power output and operational time of the laptop computers were assumed to be 20 W and 3000 h, respectively. Considering the status of their technologies and with certain conditions assumed, the total costs were calculated to be US$140 for the Li-ion battery and US$362 for DMFC. The manufacturing costs of the DMFC and Li-ion battery systems were calculated to be $16.65 W -1 and $0.77 W h -1 , and the energy consumption costs to be $0.00051 W h -1 and $0.00032 W h -1 , respectively. The higher fuel consumption cost of the DMFC system was due to the methanol (MeOH) crossover loss. Therefore, the requirements for DMFCs to be able to compete with Li-ion batteries in terms of energy cost include reducing the crossover level to at an order magnitude of -9 and the MeOH price to under $0.5 kg -1 . Under these conditions, if the DMFC manufacturing cost could be reduced to $6.30 W -1 , then the DMFC system would become at least as competitive as the Li-ion battery system for powering laptop computers in Korea. (author)

  2. Energy Aware Computing in Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    the unreliable wireless link. Principles of multi–processor energy aware task scheduling are used exploiting performance scalable technologies such as Dynamic Voltage Scaling (DVS). We introduce a novel mechanism referred to as D2VS and here it is shown by means of simulation that savings of 40% can be achieved....

  3. Teach yourself visually laptops

    CERN Document Server

    Gunter, Sherry Kinkoph

    2012-01-01

    The fast and easy way to learn about buying, maintaining, and troubleshooting, a laptop How do I find the right laptop for me? Now that I have a laptop, how do I set it up and maintain it? What are some tips for getting the most out of software systems? How do I begin to troubleshoot my laptop? If you are a visual learner and have ever asked yourself any of those questions, then this is just the book you need. Visual, step-by-step guidance walks you through finding the right laptop to meet your needs, getting comfortable with the latest versions of Windows and the Microsoft Office Suite, and u

  4. 77 FR 38826 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2012-06-29

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof, Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers...

  5. Peter Carey's Laptop

    Directory of Open Access Journals (Sweden)

    Rowan Wilken

    2014-03-01

    Full Text Available In 2001, the State Library of Victoria in Melbourne built on its holdings of Australian literary manuscripts by acquiring all the papers, drafts and other items associated with Peter Carey’s Booker Prize-winning novel, True History of the Kelly Gang. The centrepiece of this acquisition, and the focus of this article, is Carey’s Apple Mac Classic laptop computer. The argument that is developed in this article is that Carey’s laptop is a technological artefact that operates, especially at the time of its acquisition, as an important talisman in three interrelated senses. First, it was viewed by library staff as a key means of gaining access to the ‘true history’ of Carey’s own creative drive or creative unconscious. Second, its public display alongside other textual objects (mostly books served to reinforce a reconstructed corporate image that endeavoured to reposition the library as a vital contemporary cultural site and key player in Melbourne’s institutional gallery scene. Third, it was a crucial symbolic acquisition insofar as it spoke to certain desires within library management at that time, and which responded to similar moves at major libraries elsewhere around the world, to embrace collection digitisation as the path forward.

  6. Secure Your Wireless Network: Going Wireless Comes with Its Own Special Set of Security Concerns

    Science.gov (United States)

    Bloomquist, Jane; Musa, Atif

    2004-01-01

    Imagine a completely wireless school, an open network in which all students and staff can roam around using laptops or handheld computers to browse the Internet, access files and applications on the school server, and communicate with each other and the world via e-mail. It's a great picture--and at some schools the future is already here. But…

  7. Design and construction of wireless personal computer based fuel ...

    African Journals Online (AJOL)

    Global System for Mobile communication (GSM) firms in Nigeria operates their base stations using generator sets. These base stations are located at nationwide. This research work aim at the design and construction of Wireless personal computer (PC) based fuel level monitoring system . It focuses on the continuous ...

  8. Performance Evaluation of a Mobile Wireless Computational Grid ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2015-12-01

    Dec 1, 2015 ... This work developed and simulated a mathematical model for a mobile wireless computational Grid architecture using networks of queuing ... (response time). Thus the problem is formulated as a non-cooperative game among .... evaluation are analytical modelling, simulation and measurement [10]. In this ...

  9. A solar powered wireless computer mouse: industrial design concepts

    NARCIS (Netherlands)

    Reich, N.H.; Veefkind, M.; van Sark, W.G.J.H.M.; Alsema, E.A.; Turkenburg, W.C.; Silvester, S.

    2009-01-01

    A solar powered wireless computer mouse (SPM) was chosen to serve as a case study for the evaluation and optimization of industrial design processes of photovoltaic (PV) powered consumer systems. As the design process requires expert knowledge in various technical fields, we assessed and compared

  10. Computing Nash Equilibrium in Wireless Ad Hoc Networks

    DEFF Research Database (Denmark)

    Bulychev, Peter E.; David, Alexandre; Larsen, Kim G.

    2012-01-01

    This paper studies the problem of computing Nash equilibrium in wireless networks modeled by Weighted Timed Automata. Such formalism comes together with a logic that can be used to describe complex features such as timed energy constraints. Our contribution is a method for solving this problem us...

  11. Performance Evaluation of a Mobile Wireless Computational Grid ...

    African Journals Online (AJOL)

    This work developed and simulated a mathematical model for a mobile wireless computational Grid architecture using networks of queuing theory. This was in order to evaluate the performance of theload-balancing three tier hierarchical configuration. The throughput and resource utilizationmetrics were measured and the ...

  12. Wireless Mobile Computing and its Links to Descriptive Complexity

    Czech Academy of Sciences Publication Activity Database

    Wiedermann, Jiří; Pardubská, D.

    2008-01-01

    Roč. 19, č. 4 (2008), s. 887-913 ISSN 0129-0541 R&D Projects: GA AV ČR 1ET100300517 Institutional research plan: CEZ:AV0Z10300504 Keywords : alternating Turing machine * simulation * simultaneous time-space complexity * wireless parallel Turing machine Subject RIV: IN - Informatics, Computer Science Impact factor: 0.554, year: 2008

  13. Security of fixed and wireless computer networks

    NARCIS (Netherlands)

    Verschuren, J.; Degen, A.J.G.; Veugen, P.J.M.

    2003-01-01

    A few decades ago, most computers were stand-alone machines: they were able to process information using their own resources. Later, computer systems were connected to each other enabling a computer system to exchange data with another computer and to use resources of another computer. With the

  14. The Role of Wireless Computing Technology in the Design of Schools.

    Science.gov (United States)

    Nair, Prakash

    This document discusses integrating computers logically and affordably into a school building's infrastructure through the use of wireless technology. It begins by discussing why wireless networks using mobile computers are preferable to desktop machines in each classoom. It then explains the features of a wireless local area network (WLAN) and…

  15. What is New in Computers?

    Indian Academy of Sciences (India)

    provides services like access to the World Wide Web, computer, facsimile and video. Growth of wireless communication technologies and development of miniaturisation of portable laptops have led to a new era of the mobile computing. The prime issues focussed are: communication, computing and portability. A man with ...

  16. Computer aided wireless capsule endoscopy video segmentation.

    Science.gov (United States)

    Li, Baopu; Xu, Guoqing; Zhou, Ran; Wang, Tianfu

    2015-02-01

    Wireless capsule endoscopy (WCE) opens a new door for the digestive tract examination and diagnosis. However, the examination of its video data is tedious. This study aims to assist a physician to interpret a WCE video by segmenting it into different anatomic parts in the digestive tract. A two level WCE video segmentation scheme is proposed to locate the boundary between the stomach, small intestine, and large intestine. In the rough level, the authors utilize color feature to draw a dissimilarity curve for a WCE video and obtain an approximate boundary. Meanwhile, training data for the fine level segmentation can be collected automatically between the two approximate boundaries of organs to overcome the difficulty of training data collection in traditional approaches. In the fine level, color histogram in the HSI color space is used to segment the stomach and small intestine. Then, color uniform local binary pattern (CULBP) algorithm is applied for discrimination of the small intestine and large intestine, which includes two patterns, namely, color norm and color angle pattern. The CULBP feature is robust to variation of illumination and discriminative for classification. In order to increase the performance of support vector machine, the authors integrate it with the Adaboost approach. Finally, the authors refine the classification results to segment a WCE video into different parts, that is, the stomach, small intestine, and large intestine. The average precision and recall are 91.2% and 90.6% for the stomach/small intestine classification, 89.2% and 88.7% for the small/large intestine discrimination. Paired t-test also demonstrates a significant better performance of the proposed scheme compared to some traditional methods. The average segmentation error is 8 frames for the stomach/small intestine discrimination, and 14 frames for the small/large intestine segmentation. The results have demonstrated that the new video segmentation method can accurately locate

  17. Keep Laptop Cool with Simple Custom Riser

    Science.gov (United States)

    Rynone, William

    2012-01-01

    Although the author's netbook computer--a diminished capacity laptop computer--uses less power than its big brother, when working with it on his lap, his thighs are roasted, even in the winter. When using the unit on a flat surface, such as a table top, the bottom surface of the computer and table top become quite warm--and it is generally…

  18. 77 FR 51571 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers...

    Science.gov (United States)

    2012-08-24

    ... Music and Data Processing Devices, Computers, and Components Thereof; Notice of Receipt of Complaint... complaint entitled Wireless Communication Devices, Portable Music and Data Processing Devices, Computers..., portable music and data processing devices, computers, and components thereof. The complaint names as...

  19. 77 FR 52759 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2012-08-30

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of... communication devices, portable music and data processing devices, computers and components thereof by reason of...

  20. Feasibility of Using Commercial-Off-the-Shelf Ruggedized Laptop Computers and Independent Power Sources in a Disabled Submarine

    National Research Council Canada - National Science Library

    Kargher, R

    2001-01-01

    .... The other failed due to the failure of its keyboard. The lead-acid battery design tested supplied sufficient power to energize a computer for nearly five days and the alkaline battery pack lasted for nearly seven days...

  1. Self-reported neck symptoms and use of personal computers, laptops and cell phones among Finns aged 18-65.

    Science.gov (United States)

    Korpinen, Leena; Pääkkönen, Rauno; Gobba, Fabriziomaria

    2013-01-01

    The purpose of this study was to investigate the possible relation between self-reported neck symptoms (aches, pain or numbness) and use of computers/cell phones. The study was carried out as a cross-sectional study by posting a questionnaire to 15,000 working-age persons, and 15.1% of all respondents (6121) reported that they very often experienced physical symptoms in the neck. The results showed that they also had many other symptoms very often, and 49% used a computer daily at work and 83.9% used cell phones. We compared physical/mental symptoms of persons with symptoms in the neck quite often or more, with others. We found significant differences in the physical/mental symptoms and use of cell phones and computers. The results suggest taking into account in the future that those persons' symptoms in the neck can be associated with use of cell phones or computers. We investigated the possible relation between neck symptoms and use of computers/cell phones. We found that persons, who very often had symptoms in the neck, had also other symptoms very often (e.g. exhaustion at work). Their use of information and communication technology (e.g. computers) can associate with their symptoms.

  2. Conceptual Considerations for Reducing the Computational Complexity in Software Defined Radio using Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Kristensen, Jesper Michael; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    This paper motivates the application of Software defined radio as the enabling technology in the implementation of future wireless terminals for 4G. It outlines the advantages and disadvantages of SDR in terms of Flexibility and reconfigurability versus computational complexity. To mitigate...... the expected increase in complexity leading to a decrease in energy efficiency, cooperative wireless networks are introduced. Cooperative wireless networks enables the concept of resource sharing. Resource sharing is interpreted as collaborative signal processing. This interpretation leads to the concept...

  3. Recent Advances in Immersive Visualization of Ocean Data: Virtual Reality Through the Web on Your Laptop Computer

    Science.gov (United States)

    Hermann, A. J.; Moore, C.; Soreide, N. N.

    2002-12-01

    Ocean circulation is irrefutably three dimensional, and powerful new measurement technologies and numerical models promise to expand our three-dimensional knowledge of the dynamics further each year. Yet, most ocean data and model output is still viewed using two-dimensional maps. Immersive visualization techniques allow the investigator to view their data as a three dimensional world of surfaces and vectors which evolves through time. The experience is not unlike holding a part of the ocean basin in one's hand, turning and examining it from different angles. While immersive, three dimensional visualization has been possible for at least a decade, the technology was until recently inaccessible (both physically and financially) for most researchers. It is not yet fully appreciated by practicing oceanographers how new, inexpensive computing hardware and software (e.g. graphics cards and controllers designed for the huge PC gaming market) can be employed for immersive, three dimensional, color visualization of their increasingly huge datasets and model output. In fact, the latest developments allow immersive visualization through web servers, giving scientists the ability to "fly through" three-dimensional data stored half a world away. Here we explore what additional insight is gained through immersive visualization, describe how scientists of very modest means can easily avail themselves of the latest technology, and demonstrate its implementation on a web server for Pacific Ocean model output.

  4. 11th International Conference On Broad-Band Wireless Computing, Communication and Applications

    CERN Document Server

    Xhafa, Fatos; Yim, Kangbin

    2017-01-01

    The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pave the way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary. The aim of the volume is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of broadband and wireless computing. This proceedings volume presents the results of the 11th International Conference on Broad-Band Wireless Computing, Communication And Applications (BWCCA-2016), held November 5-7, 2016, at Soonchunhyang University, Asan, Korea. .

  5. 77 FR 28621 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2012-05-15

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of Request for Statements on the Public Interest AGENCY: U.S. International Trade Commission. ACTION: Notice...

  6. A wireless computational platform for distributed computing based traffic monitoring involving mixed Eulerian-Lagrangian sensing

    KAUST Repository

    Jiang, Jiming

    2013-06-01

    This paper presents a new wireless platform designed for an integrated traffic monitoring system based on combined Lagrangian (mobile) and Eulerian (fixed) sensing. The sensor platform is built around a 32-bit ARM Cortex M4 micro-controller and a 2.4GHz 802.15.4 ISM compliant radio module, and can be interfaced with fixed traffic sensors, or receive data from vehicle transponders. The platform is specially designed and optimized to be integrated in a solar-powered wireless sensor network in which traffic flow maps are computed by the nodes directly using distributed computing. A MPPT circuitry is proposed to increase the power output of the attached solar panel. A self-recovering unit is designed to increase reliability and allow periodic hard resets, an essential requirement for sensor networks. A radio monitoring circuitry is proposed to monitor incoming and outgoing transmissions, simplifying software debug. An ongoing implementation is briefly discussed, and compared with existing platforms used in wireless sensor networks. © 2013 IEEE.

  7. Implementing a Successful Laptop Programme.

    Science.gov (United States)

    Westwood, Pete; Dobson, Lindsey

    1999-01-01

    Describes experiences in instituting a personal ownership laptop programme for 10 and 11 year-olds. Argues that learning with laptops captivates and empowers students, making them more self-motivated and task-oriented. There is increased risk-taking, as students work at their own pace, and in their own time. Furthermore, creativity is encouraged.…

  8. Operating Wireless Sensor Nodes without Energy Storage: Experimental Results with Transient Computing

    Directory of Open Access Journals (Sweden)

    Faisal Ahmed

    2016-12-01

    Full Text Available Energy harvesting is increasingly used for powering wireless sensor network nodes. Recently, it has been suggested to combine it with the concept of transient computing whereby the wireless sensor nodes operate without energy storage capabilities. This new combined approach brings benefits, for instance ultra-low power nodes and reduced maintenance, but also raises new challenges, foremost dealing with nodes that may be left without power for various time periods. Although transient computing has been demonstrated on microcontrollers, reports on experiments with wireless sensor nodes are still scarce in the literature. In this paper, we describe our experiments with solar, thermal, and RF energy harvesting sources that are used to power sensor nodes (including wireless ones without energy storage, but with transient computing capabilities. The results show that the selected solar and thermal energy sources can operate both the wired and wireless nodes without energy storage, whereas in our specific implementation, the developed RF energy source can only be used for the selected nodes without wireless connectivity.

  9. Neuron Design in Neuromorphic Computing Systems and Its Application in Wireless Communications

    Science.gov (United States)

    2017-03-01

    NEURON DESIGN IN NEUROMORPHIC COMPUTING SYSTEMS AND ITS APPLICATION IN WIRELESS COMMUNICATIONS THE UNIVERSITY OF KANSAS CENTER FOR...2015 – SEP 2016 4. TITLE AND SUBTITLE NEURON DESIGN IN NEUROMORPHIC COMPUTING SYSTEMS AND ITS APPLICATION IN WIRELESS COMMUNICATIONS 5a. CONTRACT...22 14 General Model of Reservoir Computing System …………………………………………..23 15 Whole Layout View of the Encoder Chip……………………………………………………24 16

  10. Wireless embedded control system for atomically precise manufacturing

    KAUST Repository

    Khan, Yasser

    2011-04-01

    This paper will explore the possibilities of implementing a wireless embedded control system for atomically precise manufacturing. The manufacturing process, similar to Scanning Tunneling Microscopy, takes place within an Ultra High Vacuum (UHV) chamber at a pressure of 10-10 torr. In order to create vibration isolation, and to keep internal noise to a minimum, a wireless link inside the UHV chamber becomes essential. We present a MATLAB simulation of the problem, and then demonstrate a hardware scheme between a Gumstix computer and a Linux based laptop for controlling nano-manipulators with three degrees of freedom. © 2011 IEEE.

  11. A new framework to integrate wireless sensor networks with cloud computing

    Science.gov (United States)

    Shah, Sajjad Hussain; Khan, Fazle Kabeer; Ali, Wajid; Khan, Jamshed

    Wireless sensors networks have several applications of their own. These applications can further enhanced by integrating a local wireless sensor network to internet, which can be used in real time applications where the results of sensors are stored on the cloud. We propose an architecture that integrates a wireless sensor network to the internet using cloud technology. The resultant system is proved to be reliable, available and extensible. In this paper a new framework is proposed for WSN integration with Cloud computing model, existing WSN will be connected to the proposed framework. Three deployment layer are used to serve user request (IaaS, PaaS, SaaS) either from the library which is made from data collected from data centric DC by WSN periodically. The integration controller unit of the proposed framework integrates the sensor network and cloud computing technology which offers reliability, availability and extensibility.

  12. Exposure to radio frequency electromagnetic fields from wireless computer networks: duty factors of Wi-Fi devices operating in schools.

    Science.gov (United States)

    Khalid, M; Mee, T; Peyman, A; Addison, D; Calderon, C; Maslanyj, M; Mann, S

    2011-12-01

    The growing use of wireless local area networks (WLAN) in schools has prompted a study to investigate exposure to the radio frequency (RF) electromagnetic fields from Wi-Fi devices. International guidelines on limiting the adverse health effects of RF, such as those of ICNIRP, allow for time-averaging of exposure. Thus, as Wi-Fi signals consist of intermittent bursts of RF energy, it is important to consider the duty factors of devices in assessing the extent of exposure and compliance with guidelines. Using radio packet capture methods, the duty factor of Wi-Fi devices has been assessed in a sample of 6 primary and secondary schools during classroom lessons. For the 146 individual laptops investigated, the range of duty factors was from 0.02 to 0.91%, with a mean of 0.08% (SD 0.10%). The duty factors of access points from 7 networks ranged from 1.0% to 11.7% with a mean of 4.79% (SD 3.76%). Data gathered with transmit time measuring devices attached to laptops also showed similar results. Within the present limited sample, the range of duty factors from laptops and access points were found to be broadly similar for primary and secondary schools. Applying these duty factors to previously published results from this project, the maximum time-averaged power density from a laptop would be 220 μW m(-2), at a distance of 0.5 m and the peak localised SAR predicted in the torso region of a 10 year old child model, at 34 cm from the antenna, would be 80 μW kg(-1). Crown Copyright © 2011. Published by Elsevier Ltd. All rights reserved.

  13. A Solar Powered Wireless Computer Mouse: Design, Assembly and Preliminary Testing of 15 Prototypes

    NARCIS (Netherlands)

    van Sark, W.G.J.H.M.; Reich, N.H.; Alsema, E.A.; Netten, M.P.; Veefkind, M.; Silvester, S.; Elzen, B.; Verwaal, M.

    2007-01-01

    The concept and design of a solar powered wireless computer mouse has been completed, and 15 prototypes have been successfully assembled. After necessary cutting, the crystalline silicon cells show satisfactory efficiency: up to 14% when implemented into the mouse device. The implemented voltage

  14. 2nd FTRA International Conference on Ubiquitous Computing Application and Wireless Sensor Network

    CERN Document Server

    Pan, Yi; Chao, Han-Chieh; Yi, Gangman

    2015-01-01

    IT changes everyday’s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its special tracks.

  15. 77 FR 65580 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers...

    Science.gov (United States)

    2012-10-29

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-856] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers, and Components Thereof AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that the U.S. International...

  16. Personal digital assistants, wireless computing, smart cards, and biometrics: a hardware update for clinical practice.

    Science.gov (United States)

    Erdley, William Scott

    2006-01-01

    This paper introduces current and future information technology tools for health care with a focus on perinatal and women's health areas of nursing. The technologies include personal digital assistants, wireless computing, smart cards, biometrics, and storage cards. Strategies to incorporate these applications into practice are discussed.

  17. Development and functional demonstration of a wireless intraoral inductive tongue computer interface for severely disabled persons.

    Science.gov (United States)

    N S Andreasen Struijk, Lotte; Lontis, Eugen R; Gaihede, Michael; Caltenco, Hector A; Lund, Morten Enemark; Schioeler, Henrik; Bentsen, Bo

    2017-08-01

    Individuals with tetraplegia depend on alternative interfaces in order to control computers and other electronic equipment. Current interfaces are often limited in the number of available control commands, and may compromise the social identity of an individual due to their undesirable appearance. The purpose of this study was to implement an alternative computer interface, which was fully embedded into the oral cavity and which provided multiple control commands. The development of a wireless, intraoral, inductive tongue computer was described. The interface encompassed a 10-key keypad area and a mouse pad area. This system was embedded wirelessly into the oral cavity of the user. The functionality of the system was demonstrated in two tetraplegic individuals and two able-bodied individuals Results: The system was invisible during use and allowed the user to type on a computer using either the keypad area or the mouse pad. The maximal typing rate was 1.8 s for repetitively typing a correct character with the keypad area and 1.4 s for repetitively typing a correct character with the mouse pad area. The results suggest that this inductive tongue computer interface provides an esthetically acceptable and functionally efficient environmental control for a severely disabled user. Implications for Rehabilitation New Design, Implementation and detection methods for intra oral assistive devices. Demonstration of wireless, powering and encapsulation techniques suitable for intra oral embedment of assistive devices. Demonstration of the functionality of a rechargeable and fully embedded intra oral tongue controlled computer input device.

  18. Some Pros and Cons of Laptop Use in Class

    Science.gov (United States)

    Harris, R. W.

    2018-05-01

    We did not have laptops or computer networks in schools in 1968, when I started teaching physics. When classroom computers became available, followed by the internet, I greeted them as great educational tools. I developed my own website in order to provide reference material and assignments for my students. I found that online assignments were more likely than traditional ones to be completed. I also had my own system making password-protected grades available online. The parents loved it. I began giving some tests online. However, there is a downside to laptop use in class.

  19. GPU-Based FFT Computation for Multi-Gigabit WirelessHD Baseband Processing

    Directory of Open Access Journals (Sweden)

    Nicholas Hinitt

    2010-01-01

    Full Text Available The next generation Graphics Processing Units (GPUs are being considered for non-graphics applications. Millimeter wave (60 Ghz wireless networks that are capable of multi-gigabit per second (Gbps transfer rates require a significant baseband throughput. In this work, we consider the baseband of WirelessHD, a 60 GHz communications system, which can provide a data rate of up to 3.8 Gbps over a short range wireless link. Thus, we explore the feasibility of achieving gigabit baseband throughput using the GPUs. One of the most computationally intensive functions commonly used in baseband communications, the Fast Fourier Transform (FFT algorithm, is implemented on an NVIDIA GPU using their general-purpose computing platform called the Compute Unified Device Architecture (CUDA. The paper, first, investigates the implementation of an FFT algorithm using the GPU hardware and exploiting the computational capability available. It then outlines the limitations discovered and the methods used to overcome these challenges. Finally a new algorithm to compute FFT is proposed, which reduces interprocessor communication. It is further optimized by improving memory access, enabling the processing rate to exceed 4 Gbps, achieving a processing time of a 512-point FFT in less than 200 ns using a two-GPU solution.

  20. Everyday Personal Laptop Usage in Secondary Schools in Trinidad and Tobago

    Science.gov (United States)

    Briggs, Georgette; Blair, Erik

    2016-01-01

    The e-Connect And Learn (eCAL) programme is a Trinidad and Tobago government-led initiative, launched in 2010, that grants personal laptop computers to students entering secondary school. The purpose of this paper is to provide a snapshot of how students are using these government-issued personal laptops 3 years after the programme's launch. This…

  1. Off the Shelf Cloud Robotics for the Smart Home: Empowering a Wireless Robot through Cloud Computing

    Directory of Open Access Journals (Sweden)

    Javier Ramírez De La Pinta

    2017-03-01

    Full Text Available In this paper, we explore the possibilities offered by the integration of home automation systems and service robots. In particular, we examine how advanced computationally expensive services can be provided by using a cloud computing approach to overcome the limitations of the hardware available at the user’s home. To this end, we integrate two wireless low-cost, off-the-shelf systems in this work, namely, the service robot Rovio and the home automation system Z-wave. Cloud computing is used to enhance the capabilities of these systems so that advanced sensing and interaction services based on image processing and voice recognition can be offered.

  2. Off the Shelf Cloud Robotics for the Smart Home: Empowering a Wireless Robot through Cloud Computing.

    Science.gov (United States)

    Ramírez De La Pinta, Javier; Maestre Torreblanca, José María; Jurado, Isabel; Reyes De Cozar, Sergio

    2017-03-06

    In this paper, we explore the possibilities offered by the integration of home automation systems and service robots. In particular, we examine how advanced computationally expensive services can be provided by using a cloud computing approach to overcome the limitations of the hardware available at the user's home. To this end, we integrate two wireless low-cost, off-the-shelf systems in this work, namely, the service robot Rovio and the home automation system Z-wave. Cloud computing is used to enhance the capabilities of these systems so that advanced sensing and interaction services based on image processing and voice recognition can be offered.

  3. Off the Shelf Cloud Robotics for the Smart Home: Empowering a Wireless Robot through Cloud Computing

    Science.gov (United States)

    Ramírez De La Pinta, Javier; Maestre Torreblanca, José María; Jurado, Isabel; Reyes De Cozar, Sergio

    2017-01-01

    In this paper, we explore the possibilities offered by the integration of home automation systems and service robots. In particular, we examine how advanced computationally expensive services can be provided by using a cloud computing approach to overcome the limitations of the hardware available at the user’s home. To this end, we integrate two wireless low-cost, off-the-shelf systems in this work, namely, the service robot Rovio and the home automation system Z-wave. Cloud computing is used to enhance the capabilities of these systems so that advanced sensing and interaction services based on image processing and voice recognition can be offered. PMID:28272305

  4. A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks

    OpenAIRE

    Mohammad Nurul Afsar Shaon; Ken Ferens

    2017-01-01

    A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in the literature assume the sensors are uniformly distributed in a network, and, furthermore, they use statist...

  5. Macroeconomic consequences of the one laptop per child project

    NARCIS (Netherlands)

    James, M.J.

    Because some developing countries have adopted the One Laptop per Child (OLPC) project at the national level and others are planning to do so, the macroimplications of this idea can no longer be ignored. Accordingly, I examine whether or not full adoption of OLPC computers in primary schools

  6. Development of a Wireless Computer Vision Instrument to Detect Biotic Stress in Wheat

    Directory of Open Access Journals (Sweden)

    Joaquin J. Casanova

    2014-09-01

    Full Text Available Knowledge of crop abiotic and biotic stress is important for optimal irrigation management. While spectral reflectance and infrared thermometry provide a means to quantify crop stress remotely, these measurements can be cumbersome. Computer vision offers an inexpensive way to remotely detect crop stress independent of vegetation cover. This paper presents a technique using computer vision to detect disease stress in wheat. Digital images of differentially stressed wheat were segmented into soil and vegetation pixels using expectation maximization (EM. In the first season, the algorithm to segment vegetation from soil and distinguish between healthy and stressed wheat was developed and tested using digital images taken in the field and later processed on a desktop computer. In the second season, a wireless camera with near real-time computer vision capabilities was tested in conjunction with the conventional camera and desktop computer. For wheat irrigated at different levels and inoculated with wheat streak mosaic virus (WSMV, vegetation hue determined by the EM algorithm showed significant effects from irrigation level and infection. Unstressed wheat had a higher hue (118.32 than stressed wheat (111.34. In the second season, the hue and cover measured by the wireless computer vision sensor showed significant effects from infection (p = 0.0014, as did the conventional camera (p < 0.0001. Vegetation hue obtained through a wireless computer vision system in this study is a viable option for determining biotic crop stress in irrigation scheduling. Such a low-cost system could be suitable for use in the field in automated irrigation scheduling applications.

  7. Easy encryption for CERN laptops

    CERN Multimedia

    Computer Security Team

    2014-01-01

    The number of laptops stolen from or lost by CERN staff and users is not negligible. On average, four to five devices are reported lost or stolen to the CERN Fire Brigade every month.   The real number might be even higher as not everyone is aware that such thefts/losses should be reported in this way. Along with each laptop, private e-mails and personal documents, as well as MARS forms, contracts, NDAs, etc. are also lost. Fortunately, CERN has not lost any sensitive data so far (unlike other companies). In parallel with the approval by the Enlarged Directorate at its latest session of the development of a CERN-wide Data Protection Policy, the IT Department has prepared measures allowing you to protect the data on your laptop using full hard-disk encryption. While the word “encryption” might sounds complicated, the IT Department has fully automated the encryption process. For centrally managed Windows PCs, you just have to install the corresponding CMF package (“M...

  8. Development of a wireless computer vision instrument to detect biotic stress in wheat.

    Science.gov (United States)

    Casanova, Joaquin J; O'Shaughnessy, Susan A; Evett, Steven R; Rush, Charles M

    2014-09-23

    Knowledge of crop abiotic and biotic stress is important for optimal irrigation management. While spectral reflectance and infrared thermometry provide a means to quantify crop stress remotely, these measurements can be cumbersome. Computer vision offers an inexpensive way to remotely detect crop stress independent of vegetation cover. This paper presents a technique using computer vision to detect disease stress in wheat. Digital images of differentially stressed wheat were segmented into soil and vegetation pixels using expectation maximization (EM). In the first season, the algorithm to segment vegetation from soil and distinguish between healthy and stressed wheat was developed and tested using digital images taken in the field and later processed on a desktop computer. In the second season, a wireless camera with near real-time computer vision capabilities was tested in conjunction with the conventional camera and desktop computer. For wheat irrigated at different levels and inoculated with wheat streak mosaic virus (WSMV), vegetation hue determined by the EM algorithm showed significant effects from irrigation level and infection. Unstressed wheat had a higher hue (118.32) than stressed wheat (111.34). In the second season, the hue and cover measured by the wireless computer vision sensor showed significant effects from infection (p = 0.0014), as did the conventional camera (p irrigation scheduling. Such a low-cost system could be suitable for use in the field in automated irrigation scheduling applications.

  9. Optimizing the Number of Cooperating Terminals for Energy Aware Task Computing in Wireless Networks

    DEFF Research Database (Denmark)

    Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    It is generally accepted that energy consumption is a significant design constraint for mobile handheld systems, therefore motivations for methods optimizing the energy consumption making better use of the restricted battery resources are evident. A novel concept of distributed task computing...... is previously proposed (D2VS), where the overall idea of selective distribution of tasks among terminals is made. In this paper the optimal number of terminals for cooperative task computing in a wireless network will be investigated. The paper presents an energy model for the proposed scheme. Energy...

  10. Hybrid evolutionary computing model for mobile agents of wireless Internet multimedia

    Science.gov (United States)

    Hortos, William S.

    2001-03-01

    The ecosystem is used as an evolutionary paradigm of natural laws for the distributed information retrieval via mobile agents to allow the computational load to be added to server nodes of wireless networks, while reducing the traffic on communication links. Based on the Food Web model, a set of computational rules of natural balance form the outer stage to control the evolution of mobile agents providing multimedia services with a wireless Internet protocol WIP. The evolutionary model shows how mobile agents should behave with the WIP, in particular, how mobile agents can cooperate, compete and learn from each other, based on an underlying competition for radio network resources to establish the wireless connections to support the quality of service QoS of user requests. Mobile agents are also allowed to clone themselves, propagate and communicate with other agents. A two-layer model is proposed for agent evolution: the outer layer is based on the law of natural balancing, the inner layer is based on a discrete version of a Kohonen self-organizing feature map SOFM to distribute network resources to meet QoS requirements. The former is embedded in the higher OSI layers of the WIP, while the latter is used in the resource management procedures of Layer 2 and 3 of the protocol. Algorithms for the distributed computation of mobile agent evolutionary behavior are developed by adding a learning state to the agent evolution state diagram. When an agent is in an indeterminate state, it can communicate to other agents. Computing models can be replicated from other agents. Then the agents transitions to the mutating state to wait for a new information-retrieval goal. When a wireless terminal or station lacks a network resource, an agent in the suspending state can change its policy to submit to the environment before it transitions to the searching state. The agents learn the facts of agent state information entered into an external database. In the cloning process, two

  11. Robust Computation of Error Vector Magnitude for Wireless Standards

    DEFF Research Database (Denmark)

    Jensen, Tobias Lindstrøm; Larsen, Torben

    2013-01-01

    The modulation accuracy described by an error vector magnitude is a critical parameter in modern communication systems — defined originally as a performance metric for transmitters but now also used in receiver design and for more general signal analysis. The modulation accuracy is a measure of how...... far a test signal is from a reference signal at the symbol values when some parameters in a reconstruction model are optimized for best agreement. This paper provides an approach to computation of error vector magnitude as described in several standards from measured or simulated data. It is shown...... that the error vector magnitude optimization problem is generally non-convex. Robust estimation of the initial conditions for the optimizer is suggested, which is particularly important for a non-convex problem. A Bender decomposition approach is used to separate convex and non-convex parts of the problem...

  12. Distributed network, wireless and cloud computing enabled 3-D ultrasound; a new medical technology paradigm.

    Science.gov (United States)

    Meir, Arie; Rubinsky, Boris

    2009-11-19

    Medical technologies are indispensable to modern medicine. However, they have become exceedingly expensive and complex and are not available to the economically disadvantaged majority of the world population in underdeveloped as well as developed parts of the world. For example, according to the World Health Organization about two thirds of the world population does not have access to medical imaging. In this paper we introduce a new medical technology paradigm centered on wireless technology and cloud computing that was designed to overcome the problems of increasing health technology costs. We demonstrate the value of the concept with an example; the design of a wireless, distributed network and central (cloud) computing enabled three-dimensional (3-D) ultrasound system. Specifically, we demonstrate the feasibility of producing a 3-D high end ultrasound scan at a central computing facility using the raw data acquired at the remote patient site with an inexpensive low end ultrasound transducer designed for 2-D, through a mobile device and wireless connection link between them. Producing high-end 3D ultrasound images with simple low-end transducers reduces the cost of imaging by orders of magnitude. It also removes the requirement of having a highly trained imaging expert at the patient site, since the need for hand-eye coordination and the ability to reconstruct a 3-D mental image from 2-D scans, which is a necessity for high quality ultrasound imaging, is eliminated. This could enable relatively untrained medical workers in developing nations to administer imaging and a more accurate diagnosis, effectively saving the lives of people.

  13. Laptops in Classroom Interaction: The Dynamic Reach of the Laptoped Situation

    Science.gov (United States)

    Lindroth, Tomas; Lundin, Johan; Svensson, Lars

    2013-01-01

    Laptops and other networked technologies are commonplace at university campuses. While a range of studies researches the negative effects of multitasking, screenpeeking and other laptop related side effects this article emphasize the situational impact of student-laptop interaction. Departing from Goffman's framework on unfocused interaction and…

  14. [Mobile phone-computer wireless interactive graphics transmission technology and its medical application].

    Science.gov (United States)

    Huang, Shuo; Liu, Jing

    2010-05-01

    Application of clinical digital medical imaging has raised many tough issues to tackle, such as data storage, management, and information sharing. Here we investigated a mobile phone based medical image management system which is capable of achieving personal medical imaging information storage, management and comprehensive health information analysis. The technologies related to the management system spanning the wireless transmission technology, the technical capabilities of phone in mobile health care and management of mobile medical database were discussed. Taking medical infrared images transmission between phone and computer as an example, the working principle of the present system was demonstrated.

  15. Computing Nash Equilibrium in Wireless Ad Hoc Networks: A Simulation-Based Approach

    Directory of Open Access Journals (Sweden)

    Peter Bulychev

    2012-02-01

    Full Text Available This paper studies the problem of computing Nash equilibrium in wireless networks modeled by Weighted Timed Automata. Such formalism comes together with a logic that can be used to describe complex features such as timed energy constraints. Our contribution is a method for solving this problem using Statistical Model Checking. The method has been implemented in UPPAAL model checker and has been applied to the analysis of Aloha CSMA/CD and IEEE 802.15.4 CSMA/CA protocols.

  16. A computer-aided diagnostic system for intestinal polyps identified by wireless capsule endoscopy.

    Science.gov (United States)

    Constantinescu, Adriana Florentina; Ionescu, Mihaela; Iovănescu, Vlad Florin; Ciurea, Marius Eugen; Ionescu, Alin Gabriel; Streba, Costin Teodor; Bunescu, Marius Gabriel; Rogoveanu, Ion; Vere, Cristin Constantin

    2016-01-01

    Small bowel polyps present in images acquired by wireless capsule endoscopy are more difficult to detect using computer-aided diagnostic (CAD) systems. We aimed to identify the optimum morphological characteristics that best describe a polyp and convert them into feature vectors used for automatic detection of polyps present in images acquired by wireless capsule endoscopy (WCE). We prospectively included 54 patients with clinical indications for WCE. Initially, physicians analyzed all images acquired, identifying the frames that contained small bowel polyps. Subsequently, all images were analyzed using an automated computer-aided diagnostic system designed and implemented to convert physical characteristics into vectors of numeric values. The data set was completed with texture and color information, and then analyzed by a feed forward back propagation artificial neural network (ANN) trained to identify the presence of polyps in WCE frames. Overall, the neural network had 93.75% sensitivity, 91.38% specificity, 85.71% positive predictive value (PPV) and 96.36% negative predictive value (NPV). In comparison, physicians' diagnosis indicated 94.79% sensitivity, 93.68% specificity, 89.22% PPV and 97.02% NPV, thus showing that ANN diagnosis was similar to that of human interpretation. Computer-aided diagnostic of small bowel polyps, based on morphological features detection methods, emulation and neural networks classification, seems efficient, fast and reliable for physicians.

  17. Computational intelligence in wireless sensor networks recent advances and future challenges

    CERN Document Server

    Falcon, Rafael; Koeppen, Mario

    2017-01-01

    This book emphasizes the increasingly important role that Computational Intelligence (CI) methods are playing in solving a myriad of entangled Wireless Sensor Networks (WSN) related problems. The book serves as a guide for surveying several state-of-the-art WSN scenarios in which CI approaches have been employed. The reader finds in this book how CI has contributed to solve a wide range of challenging problems, ranging from balancing the cost and accuracy of heterogeneous sensor deployments to recovering from real-time sensor failures to detecting attacks launched by malicious sensor nodes and enacting CI-based security schemes. Network managers, industry experts, academicians and practitioners alike (mostly in computer engineering, computer science or applied mathematics) benefit from the spectrum of successful applications reported in this book. Senior undergraduate or graduate students may discover in this book some problems well suited for their own research endeavors. USP: Presents recent advances and fu...

  18. A wearable, wireless gaze tracker with integrated selection command source for human-computer interaction.

    Science.gov (United States)

    Rantanen, Ville; Vanhala, Toni; Tuisku, Outi; Niemenlehto, Pekka-Henrik; Verho, Jarmo; Surakka, Veikko; Juhola, Martti; Lekkala, Jukka

    2011-09-01

    A light-weight, wearable, wireless gaze tracker with integrated selection command source for human-computer interaction is introduced. The prototype system combines head-mounted, video-based gaze tracking with capacitive facial movement detection that enable multimodal interaction by gaze pointing and making selections with facial gestures. The system is targeted mainly to disabled people with limited mobility over their hands. The hardware was made wireless to remove the need to take off the device when moving away from the computer, and to allow future use in more mobile contexts. The algorithms responsible for determining the eye and head orientations to map gaze direction to on-screen coordinates are presented together with the one to detect movements from the measured capacitance signal. Point-and-click experiments were conducted to assess the performance of the multimodal system. The results show decent performance in laboratory and office conditions. The overall point-and-click accuracy in the multimodal experiments is comparable to the errors in previous research on head-mounted, single modality gaze tracking that does not compensate for changes in head orientation.

  19. Implementation issues for mobile-wireless infrastructure and mobile health care computing devices for a hospital ward setting.

    Science.gov (United States)

    Heslop, Liza; Weeding, Stephen; Dawson, Linda; Fisher, Julie; Howard, Andrew

    2010-08-01

    mWard is a project whose purpose is to enhance existing clinical and administrative decision support and to consider mobile computers, connected via wireless network, for bringing clinical information to the point of care. The mWard project allowed a limited number of users to test and evaluate a selected range of mobile-wireless infrastructure and mobile health care computing devices at the neuroscience ward at Southern Health's Monash Medical Centre, Victoria, Australia. Before the project commenced, the ward had two PC's which were used as terminals by all ward-based staff and numerous multi-disciplinary staff who visited the ward each day. The first stage of the research, outlined in this paper, evaluates a selected range of mobile-wireless infrastructure.

  20. Ultra-low power high precision magnetotelluric receiver array based customized computer and wireless sensor network

    Science.gov (United States)

    Chen, R.; Xi, X.; Zhao, X.; He, L.; Yao, H.; Shen, R.

    2016-12-01

    Dense 3D magnetotelluric (MT) data acquisition owns the benefit of suppressing the static shift and topography effect, can achieve high precision and high resolution inversion for underground structure. This method may play an important role in mineral exploration, geothermal resources exploration, and hydrocarbon exploration. It's necessary to reduce the power consumption greatly of a MT signal receiver for large-scale 3D MT data acquisition while using sensor network to monitor data quality of deployed MT receivers. We adopted a series of technologies to realized above goal. At first, we designed an low-power embedded computer which can couple with other parts of MT receiver tightly and support wireless sensor network. The power consumption of our embedded computer is less than 1 watt. Then we designed 4-channel data acquisition subsystem which supports 24-bit analog-digital conversion, GPS synchronization, and real-time digital signal processing. Furthermore, we developed the power supply and power management subsystem for MT receiver. At last, a series of software, which support data acquisition, calibration, wireless sensor network, and testing, were developed. The software which runs on personal computer can monitor and control over 100 MT receivers on the field for data acquisition and quality control. The total power consumption of the receiver is about 2 watts at full operation. The standby power consumption is less than 0.1 watt. Our testing showed that the MT receiver can acquire good quality data at ground with electrical dipole length as 3 m. Over 100 MT receivers were made and used for large-scale geothermal exploration in China with great success.

  1. A Multi-Vehicles, Wireless Testbed for Networked Control, Communications and Computing

    Science.gov (United States)

    Murray, Richard; Doyle, John; Effros, Michelle; Hickey, Jason; Low, Steven

    2002-03-01

    We have constructed a testbed consisting of 4 mobile vehicles (with 4 additional vehicles being completed), each with embedded computing and communications capability for use in testing new approaches for command and control across dynamic networks. The system is being used or is planned to be used for testing of a variety of communications-related technologies, including distributed command and control algorithms, dynamically reconfigurable network topologies, source coding for real-time transmission of data in lossy environments, and multi-network communications. A unique feature of the testbed is the use of vehicles that have second order dynamics. Requiring real-time feedback algorithms to stabilize the system while performing cooperative tasks. The testbed was constructed in the Caltech Vehicles Laboratory and consists of individual vehicles with PC-based computation and controls, and multiple communications devices (802.11 wireless Ethernet, Bluetooth, and infrared). The vehicles are freely moving, wheeled platforms propelled by high performance dotted fairs. The room contains an access points for an 802.11 network, overhead visual sensing (to allow emulation of CI'S signal processing), a centralized computer for emulating certain distributed computations, and network gateways to control and manipulate communications traffic.

  2. Adaptive resource allocation scheme using sliding window subchannel gain computation: context of OFDMA wireless mobiles systems

    International Nuclear Information System (INIS)

    Khelifa, F.; Samet, A.; Ben Hassen, W.; Afif, M.

    2011-01-01

    Multiuser diversity combined with Orthogonal Frequency Division Multiple Access (OFDMA) are a promising technique for achieving high downlink capacities in new generation of cellular and wireless network systems. The total capacity of OFDMA based-system is maximized when each subchannel is assigned to the mobile station with the best channel to noise ratio for that subchannel with power is uniformly distributed between all subchannels. A contiguous method for subchannel construction is adopted in IEEE 802.16 m standard in order to reduce OFDMA system complexity. In this context, new subchannel gain computation method, can contribute, jointly with optimal assignment subchannel to maximize total system capacity. In this paper, two new methods have been proposed in order to achieve a better trade-off between fairness and efficiency use of resources. Numerical results show that proposed algorithms provide low complexity, higher total system capacity and fairness among users compared to others recent methods.

  3. Introduction of wireless, pen-based computing among visiting nurses in the inner city: a qualitative study.

    Science.gov (United States)

    Wilson, R; Fulmer, T

    1997-01-01

    The purpose of this qualitative study is to understand how a sample of visiting nurses experienced the practice of home health nursing in the inner city and how they perceived the anticipated introduction of wireless, pen-based computing into their practice. Focus groups were held with visiting nurses 1 week before the introduction of the wireless, pen-based computers. The data were analyzed using Strauss and Corbin's (1990) method for concept development. The following central concepts emerged from the focus groups with visiting nurses: "Missing contact in the field," "Consumption of time writing on forms," "Using the computer to help with the practice of home health nursing," and "Home nursing is a lifeline." These concepts, based on the commentaries by visiting nurses, help one to understand the problems encountered by visiting nurses in the delivery of home health care, identify ways to incorporate evolving technologies to enhance nursing practice, and consider approaches to computer skill acquisition.

  4. Differential patterns of laptop use and associated musculoskeletal discomfort in male and female college students.

    Science.gov (United States)

    Bubric, Katherine; Hedge, Alan

    2016-11-22

    Laptop computers have surpassed desktop computers in popularity, especially among college student users. The portability of these devices raises concerns regarding healthy usage patterns in different settings and there is a need to investigate the postures with which these devices are being used and associated reports of musculoskeletal discomfort. This study investigated the configurations in which laptops are used and the prevalence of musculoskeletal discomfort associated with laptop use in a survey of college students. The purpose of this was to identify differences in discomfort and/or postural choice between males and females. A sample of 90 male and 96 female college students completed an online questionnaire consisting of demographic questions, musculoskeletal discomfort indicators and questions regarding configurations of laptop use. Over 53% of participants reported experiencing musculoskeletal discomfort while using a laptop computer, with females reporting a higher prevalence of neck discomfort (p = 0.05) and shoulder discomfort (p = 0.006) than males. Participants reported using a laptop most commonly in positions at a  desk and on a bed. Females were more likely than males to use a laptop on a bed with the computer positioned on their lap or with their legs crossed (p coffee table or ottoman in front of you". A significant proportion of college students report experiencing musculoskeletal discomfort associated with laptop computer use. Sex differences exist in both choice of configurations and musculoskeletal discomfort associated with laptop use. Due to the portability of laptop computers, they are used in a variety of configurations and environments. This study identifies a number of different ways that laptop computers are used that have not been considered in previous research. These patterns of laptop use can be used to inform future work on the impact of technology use on discomfort.

  5. Spatial Air Index Based on Largest Empty Rectangles for Non-Flat Wireless Broadcast in Pervasive Computing

    Directory of Open Access Journals (Sweden)

    Jun-Hong Shen

    2016-11-01

    Full Text Available In pervasive computing, location-based services (LBSs are valuable for mobile clients based on their current locations. LBSs use spatial window queries to enable useful applications for mobile clients. Based on skewed access patterns of mobile clients, non-flat wireless broadcast has been shown to efficiently disseminate spatial objects to mobile clients. In this paper, we consider a scenario in which spatial objects are broadcast to mobile clients over a wireless channel in a non-flat broadcast manner to process window queries. For such a scenario, we propose an efficient spatial air index method to handle window query access in non-flat wireless broadcast environments. The concept of largest empty rectangles is used to avoid unnecessary examination of the broadcast content, thus reducing the processing time for window queries. Simulation results show that the proposed spatial air index method outperforms the existing methods under various settings.

  6. A Wireless Sensor Network with Soft Computing Localization Techniques for Track Cycling Applications

    Science.gov (United States)

    Gharghan, Sadik Kamel; Nordin, Rosdiadee; Ismail, Mahamod

    2016-01-01

    In this paper, we propose two soft computing localization techniques for wireless sensor networks (WSNs). The two techniques, Neural Fuzzy Inference System (ANFIS) and Artificial Neural Network (ANN), focus on a range-based localization method which relies on the measurement of the received signal strength indicator (RSSI) from the three ZigBee anchor nodes distributed throughout the track cycling field. The soft computing techniques aim to estimate the distance between bicycles moving on the cycle track for outdoor and indoor velodromes. In the first approach the ANFIS was considered, whereas in the second approach the ANN was hybridized individually with three optimization algorithms, namely Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), and Backtracking Search Algorithm (BSA). The results revealed that the hybrid GSA-ANN outperforms the other methods adopted in this paper in terms of accuracy localization and distance estimation accuracy. The hybrid GSA-ANN achieves a mean absolute distance estimation error of 0.02 m and 0.2 m for outdoor and indoor velodromes, respectively. PMID:27509495

  7. A Wireless Sensor Network with Soft Computing Localization Techniques for Track Cycling Applications

    Directory of Open Access Journals (Sweden)

    Sadik Kamel Gharghan

    2016-08-01

    Full Text Available In this paper, we propose two soft computing localization techniques for wireless sensor networks (WSNs. The two techniques, Neural Fuzzy Inference System (ANFIS and Artificial Neural Network (ANN, focus on a range-based localization method which relies on the measurement of the received signal strength indicator (RSSI from the three ZigBee anchor nodes distributed throughout the track cycling field. The soft computing techniques aim to estimate the distance between bicycles moving on the cycle track for outdoor and indoor velodromes. In the first approach the ANFIS was considered, whereas in the second approach the ANN was hybridized individually with three optimization algorithms, namely Particle Swarm Optimization (PSO, Gravitational Search Algorithm (GSA, and Backtracking Search Algorithm (BSA. The results revealed that the hybrid GSA-ANN outperforms the other methods adopted in this paper in terms of accuracy localization and distance estimation accuracy. The hybrid GSA-ANN achieves a mean absolute distance estimation error of 0.02 m and 0.2 m for outdoor and indoor velodromes, respectively.

  8. Pervasive access to images and data--the use of computing grids and mobile/wireless devices across healthcare enterprises.

    Science.gov (United States)

    Pohjonen, Hanna; Ross, Peeter; Blickman, Johan G; Kamman, Richard

    2007-01-01

    Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented that provide computing grids and streaming-based access to image and data management functions, and system architectures that enable pervasive computing on a cost-effective basis. Finally, the implications of such technologies are investigated regarding the positive impacts on clinical workflows.

  9. Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment

    Science.gov (United States)

    Peters, James F.; Szturm, Tony; Borkowski, Maciej; Lockery, Dan; Ramanna, Sheela; Shay, Barbara

    This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules. A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing approach to telegaming, a handicapped person (e.g., stroke patient with limited hand, finger, arm function) plays a video game by interacting with familiar instrumented objects such as cups, cutlery, soccer balls, nozzles, screw top-lids, spoons, so that the technology that makes therapeutic exercise game-playing possible is largely invisible (Archives of Physical Medicine and Rehabilitation 89:2213-2217, 2008). The basic approach to adaptive learning (AL) in the proposed telegaming environment is ethology-inspired and is quite different from the traditional approach to reinforcement learning. In biologically-inspired learning, organisms learn to achieve some goal by durable modification of behaviours in response to signals from the environment resulting from specific experiences (Animal Behavior, 1995). The term adaptive is used here in an ethological sense, where learning by an organism results from modifying behaviour in response to perceived changes in the environment. To instill adaptivity in a video game, it is assumed that learning by a video game is episodic. During an episode, the behaviour of a player is measured indirectly by tracking the occurrence of gaming events such as a hit or a miss of a target (e.g., hitting a moving ball with a game paddle). An ethogram provides a record of behaviour feature values that provide a basis a functional registry for handicapped players for gaming adaptivity. An important practical application of adaptive gaming is therapeutic rehabilitation exercise carried out in parallel with playing action video games. Enjoyable and

  10. Computer-aided gastrointestinal hemorrhage detection in wireless capsule endoscopy videos.

    Science.gov (United States)

    Hassan, Ahnaf Rashik; Haque, Mohammad Ariful

    2015-12-01

    Wireless Capsule Endoscopy (WCE) can image the portions of the human gastrointestinal tract that were previously unreachable for conventional endoscopy examinations. A major drawback of this technology is that a large volume of data are to be analyzed in order to detect a disease which can be time-consuming and burdensome for the clinicians. Consequently, there is a dire need of computer-aided disease detection schemes to assist the clinicians. In this paper, we propose a real-time, computationally efficient and effective computerized bleeding detection technique applicable for WCE technology. The development of our proposed technique is based on the observation that characteristic patterns appear in the frequency spectrum of the WCE frames due to the presence of bleeding region. Discovering these discriminating patterns, we develop a texture-feature-descriptor-based-algorithm that operates on the Normalized Gray Level Co-occurrence Matrix (NGLCM) of the magnitude spectrum of the images. A new local texture descriptor called difference average that operates on NGLCM is also proposed. We also perform statistical validation of the proposed scheme. The proposed algorithm was evaluated using a publicly available WCE database. The training set consisted of 600 bleeding and 600 non-bleeding frames. This set was used to train the SVM classifier. On the other hand, 860 bleeding and 860 non-bleeding images were selected from the rest of the extracted images to form the test set. The accuracy, sensitivity and specificity obtained from our method are 99.19%, 99.41% and 98.95% respectively which are significantly higher than state-of-the-art methods. In addition, the low computational cost of our method makes it suitable for real-time implementation. This work proposes a bleeding detection algorithm that employs textural features from the magnitude spectrum of the WCE images. Experimental outcomes backed by statistical validations prove that the proposed algorithm is superior

  11. Investigating the Benefits and Challenges of Using Laptop Computers in Higher Education Classrooms / Étude sur les avantages et les défis associés à l'utilisation d'ordinateurs portables dans les salles de classe d'enseignement supérieur

    Directory of Open Access Journals (Sweden)

    Robin Holding Kay

    2014-05-01

    Full Text Available The purpose of this study was to investigate the benefits and challenges using laptop computers (hereafter referred to as laptops inside and outside higher education classrooms. Quantitative and qualitative data were collected from 156 university students (54 males, 102 females enrolled in either education or communication studies. Benefits of using laptops in class were active note taking, particularly when instructors provided materials ahead of time, searching for academic resources, use of subject-specific software, communicating and sharing information with peers, and engaging with online interactive tools. Challenges of using laptops inside the class included surfing the web for personal reasons, social networking with peers and, to a lesser extent, entertainment in the form of watching video podcasts or playing games. Benefits were reported far more often than challenges inside the classroom. Benefits of using laptops outside of class included collaboration with peers, increased productivity, and conducting research. Challenges of using laptops outside of class included surfing the web for personal reasons, social networking, and entertainment. Benefits and challenges were reported equally often outside the classroom. More research needs to be conducted on the extent to which distractions impede learning and productivity inside and outside the class. Cette étude avait pour but d’examiner les avantages et les défis associés à l'utilisation d’ordinateurs portables à l'intérieur et à l'extérieur des salles de classe d’enseignement supérieur. Des données quantitatives et qualitatives ont été recueillies auprès de 156 étudiants universitaires (54 hommes, 102 femmes inscrits dans des programmes d’éducation ou de communication. Les avantages de l'utilisation d’ordinateurs portables en classe incluaient la prise active de notes, en particulier lorsque les instructeurs fournissaient la documentation à l'avance, la

  12. Focused Ubiquity: A Purposeful Approach to Providing Students with Laptops

    Science.gov (United States)

    Keppler, Mike; Weiler, Spencer C.; Maas, Dan

    2014-01-01

    Laptops have been introduced into classroom across the nation as a way to improve teaching and learning. In 2007 Littleton Public Schools (LPS) introduced a focused approach to providing all students with a laptop at a significantly lower cost to the traditional ubiquitous laptop programs. The purpose of this study was to document the LPS model…

  13. A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Nurul Afsar Shaon

    2017-05-01

    Full Text Available A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN. Most wormhole detection schemes reported in the literature assume the sensors are uniformly distributed in a network, and, furthermore, they use statistical and topological information and special hardware for their detection. However, these schemes may perform poorly in non-uniformly distributed networks, and, moreover, they may fail to defend against “out of band” and “in band” wormhole attacks. The aim of the proposed research is to develop a detection scheme that is able to detect all kinds of wormhole attacks in both uniformly and non-uniformly distributed sensor networks. Furthermore, the proposed research does not require any special hardware and causes no significant network overhead throughout the network. Most importantly, the probable location of the malicious nodes can be identified by the proposed ANN based detection scheme. We evaluate the efficacy of the proposed detection scheme in terms of detection accuracy, false positive rate, and false negative rate. The performance of the proposed algorithm is also compared with other machine learning techniques (i.e. SVM and regularized nonlinear logistic regression (LR based detection models. The simulation results show that proposed ANN based algorithm outperforms the SVM or LR based detection schemes in terms of detection accuracy, false positive rate, and false negative rates.

  14. A wireless magnetoresistive sensing system for an intraoral tongue-computer interface.

    Science.gov (United States)

    Park, Hangue; Kiani, Mehdi; Lee, Hyung-Min; Kim, Jeonghee; Block, Jacob; Gosselin, Benoit; Ghovanloo, Maysam

    2012-12-01

    Tongue drive system (TDS) is a tongue-operated, minimally invasive, unobtrusive, and wireless assistive technology (AT) that infers users' intentions by detecting their voluntary tongue motion and translating them into user-defined commands. Here we present the new intraoral version of the TDS (iTDS), which has been implemented in the form of a dental retainer. The iTDS system-on-a-chip (SoC) features a configurable analog front-end (AFE) that reads the magnetic field variations inside the mouth from four 3-axial magnetoresistive sensors located at four corners of the iTDS printed circuit board (PCB). A dual-band transmitter (Tx) on the same chip operates at 27 and 432 MHz in the Industrial/Scientific/Medical (ISM) band to allow users to switch in the presence of external interference. The Tx streams the digitized samples to a custom-designed TDS universal interface, built from commercial off-the-shelf (COTS) components, which delivers the iTDS data to other devices such as smartphones, personal computers (PC), and powered wheelchairs (PWC). Another key block on the iTDS SoC is the power management integrated circuit (PMIC), which provides individually regulated and duty-cycled 1.8 V supplies for sensors, AFE, Tx, and digital control blocks. The PMIC also charges a 50 mAh Li-ion battery with constant current up to 4.2 V, and recovers data and clock to update its configuration register through a 13.56 MHz inductive link. The iTDS SoC has been implemented in a 0.5-μm standard CMOS process and consumes 3.7 mW on average.

  15. A Wireless Magnetoresistive Sensing System for an Intraoral Tongue-Computer Interface

    Science.gov (United States)

    Park, Hangue; Kiani, Mehdi; Lee, Hyung-Min; Kim, Jeonghee; Block, Jacob; Gosselin, Benoit; Ghovanloo, Maysam

    2015-01-01

    Tongue drive system (TDS) is a tongue-operated, minimally invasive, unobtrusive, and wireless assistive technology (AT) that infers users’ intentions by detecting their voluntary tongue motion and translating them into user-defined commands. Here we present the new intraoral version of the TDS (iTDS), which has been implemented in the form of a dental retainer. The iTDS system-on-a-chip (SoC) features a configurable analog front-end (AFE) that reads the magnetic field variations inside the mouth from four 3-axial magnetoresistive sensors located at four corners of the iTDS printed circuit board (PCB). A dual-band transmitter (Tx) on the same chip operates at 27 and 432 MHz in the Industrial/Scientific/Medical (ISM) band to allow users to switch in the presence of external interference. The Tx streams the digitized samples to a custom-designed TDS universal interface, built from commercial off-the-shelf (COTS) components, which delivers the iTDS data to other devices such as smartphones, personal computers (PC), and powered wheelchairs (PWC). Another key block on the iTDS SoC is the power management integrated circuit (PMIC), which provides individually regulated and duty-cycled 1.8 V supplies for sensors, AFE, Tx, and digital control blocks. The PMIC also charges a 50 mAh Li-ion battery with constant current up to 4.2 V, and recovers data and clock to update its configuration register through a 13.56 MHz inductive link. The iTDS SoC has been implemented in a 0.5-μm standard CMOS process and consumes 3.7 mW on average. PMID:23853258

  16. Implementation of an Embedded Web Server Application for Wireless Control of Brain Computer Interface Based Home Environments.

    Science.gov (United States)

    Aydın, Eda Akman; Bay, Ömer Faruk; Güler, İnan

    2016-01-01

    Brain Computer Interface (BCI) based environment control systems could facilitate life of people with neuromuscular diseases, reduces dependence on their caregivers, and improves their quality of life. As well as easy usage, low-cost, and robust system performance, mobility is an important functionality expected from a practical BCI system in real life. In this study, in order to enhance users' mobility, we propose internet based wireless communication between BCI system and home environment. We designed and implemented a prototype of an embedded low-cost, low power, easy to use web server which is employed in internet based wireless control of a BCI based home environment. The embedded web server provides remote access to the environmental control module through BCI and web interfaces. While the proposed system offers to BCI users enhanced mobility, it also provides remote control of the home environment by caregivers as well as the individuals in initial stages of neuromuscular disease. The input of BCI system is P300 potentials. We used Region Based Paradigm (RBP) as stimulus interface. Performance of the BCI system is evaluated on data recorded from 8 non-disabled subjects. The experimental results indicate that the proposed web server enables internet based wireless control of electrical home appliances successfully through BCIs.

  17. A Dynamic Duo: LCD Overhead Displays and Laptops as Instructional Aids in Introductory Psychology.

    Science.gov (United States)

    Ransdell, Sarah

    1989-01-01

    Describes simulation software that was used with an LCD overhead display and laptop computers for large introductory psychology courses. The use of experiment simulators to increase student interest and activity is discussed, hardware is explained, and interaction between students, instructor, and the simulation is described. (14 references) (LRW)

  18. Examining the Affects of Student Multitasking with Laptops during the Lecture

    Science.gov (United States)

    Kraushaar, James M.; Novak, David C.

    2010-01-01

    This paper examines undergraduate student use of laptop computers during a lecture-style class that includes substantial problem-solving activities and graphic-based content. The study includes both a self-reported use component collected from student surveys as well as a monitored use component collected via activity monitoring…

  19. Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, S.; Kim, Y.S.; Ye, S.H.

    2015-01-01

    This paper introduces cyber security evaluation results and a design of the wireless communication technology to apply to safeguard systems in nuclear power plants. While wireless communication technologies can generally make mobility and efficiency on plant operation, those have seldom been installed on the nuclear I&C systems due to the negative concern of unexpected outcomes that stem from electromagnetic interference and cyber attack. New design of advanced digital safeguard and I&C systems uses computer-based systems for the safeguard and safety functions. On the other hand, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. In order to employ the wireless communication technology in safeguard function, licencees assess and manage the potential for adverse effects on safeguard and safety functions so as to provide high assurance that critical functions are properly protected cyber attack. It is expected that the safeguard function, specifically on the area of real-time monitoring, logging, can be enhanced by employing the mobile safeguard devices (: smart phone, laptop, smart pad, etc). In this paper, we deal with the cyber security evaluation, which consists of threat analysis, vulnerability test, establishment of security plan, and design solutions for the wireless communication on the basis of IEEE 802.11(Wi-Fi) protocol. Proposed evaluation and design solution could be a basis for the design of wireless communication and mobile safeguard systems in nuclear power plants. (author)

  20. A Computational Agent-Based Modeling Approach for Competitive Wireless Service Market

    KAUST Repository

    Douglas, C C

    2011-04-01

    Using an agent-based modeling method, we study market dynamism with regard to wireless cellular services that are in competition for a greater market share and profit. In the proposed model, service providers and consumers are described as agents who interact with each other and actively participate in an economically well-defined marketplace. Parameters of the model are optimized using the Levenberg-Marquardt method. The quantitative prediction capabilities of the proposed model are examined through data reproducibility using past data from the U.S. and Korean wireless service markets. Finally, we investigate a disruptive market event, namely the introduction of the iPhone into the U.S. in 2007 and the resulting changes in the modeling parameters. We predict and analyze the impacts of the introduction of the iPhone into the Korean wireless service market assuming a release date of 2Q09 based on earlier data. © 2011 IEEE.

  1. Small bowel involvement in Crohn’s disease: a prospective comparison of wireless capsule endoscopy and computed tomography enteroclysis

    Science.gov (United States)

    Voderholzer, W A; Beinhoelzl, J; Rogalla, P; Murrer, S; Schachschal, G; Lochs, H; Ortner, M-A

    2005-01-01

    Background: Wireless capsule endoscopy (WCE) offers endoscopic access to the small bowel and may therefore change diagnostic and therapeutic strategies in small bowel diseases. Aim: The aim of this prospective study was to validate the gain in information and therapeutic impact of WCE in patients with Crohn’s disease. Methods: Fifty six consecutive patients with Crohn’s disease underwent computed tomography (CT) enteroclysis, and if stenoses Capsule endoscopy improves the diagnosis of small bowel Crohn’s disease. This may have significant therapeutic impact. PMID:15710985

  2. Antenna-User Interaction in MIMO-Enabled Laptops

    Directory of Open Access Journals (Sweden)

    Y. Rahmat-Samii

    2009-12-01

    Full Text Available The operation of wireless personal communication terminals very close to the user inherently faces the problem of electromagnetic (EM coupling between the device and the biological tissues. In this paper the effects of the electromagnetic antenna-human interaction is studied for a laptop MIMO antenna system, where four integrated antenna elements can operate simultaneously. Two points of view are considered: antenna performance and EM dosimetry. The first one addresses not only the degradation of the antenna performance but includes also the effect of the human proximity on the antenna characteristics, namely scattering matrix, Total Active Reflection Coefficient (TARC, radiation efficiency and envelope correlation between port signals. The exposure of the human tissues to EM radiation is expressed in terms of Specific Absorption Rate (SAR. These characteristics are evaluated as a function of the array excitation scheme (including phased array approach and MIMO-like signaling and compared to simple scenarios where all the power is radiated only by one antenna element.

  3. Oxygen Generation System Laptop Bus Controller Flight Software

    Science.gov (United States)

    Rowe, Chad; Panter, Donna

    2009-01-01

    The Oxygen Generation System Laptop Bus Controller Flight Software was developed to allow the International Space Station (ISS) program to activate specific components of the Oxygen Generation System (OGS) to perform a checkout of key hardware operation in a microgravity environment, as well as to perform preventative maintenance operations of system valves during a long period of what would otherwise be hardware dormancy. The software provides direct connectivity to the OGS Firmware Controller with pre-programmed tasks operated by on-orbit astronauts to exercise OGS valves and motors. The software is used to manipulate the pump, separator, and valves to alleviate the concerns of hardware problems due to long-term inactivity and to allow for operational verification of microgravity-sensitive components early enough so that, if problems are found, they can be addressed before the hardware is required for operation on-orbit. The decision was made to use existing on-orbit IBM ThinkPad A31p laptops and MIL-STD-1553B interface cards as the hardware configuration. The software at the time of this reporting was developed and tested for use under the Windows 2000 Professional operating system to ensure compatibility with the existing on-orbit computer systems.

  4. Problem-based scenarios with laptops: an effective combination for cross-curricular learning in mathematics, science and language

    Directory of Open Access Journals (Sweden)

    Viktor Freiman

    2011-12-01

    Full Text Available Many educational systems consider using one-to-one access to the laptop as a way to improve teaching and learning. A two-year action research project on the use of laptop computers by New Brunswick (Canada grade 7 and 8 Francophone students aimed to better understand the impact of laptops on learning. Two problem-based learning (PBL interdisciplinary scenarios (math, science, language arts were implemented in eight experimental classes to measure and document students’ actual learning process, particularly in terms of their ability to scientifically investigate authentic problems, to reason mathematically, and to communicate. On-site observations, video-recording, journals, samples of students’ work, and interviews were used to collect qualitative data. Based on our findings, we argue that laptops in and of themselves may not automatically lead to better results on standardized tests, but rather create opportunities to enrich learning with more open-ended, constructive, collaborative, reflective, and cognitively complex learning tasks.

  5. Wideband and UWB Antennas for Wireless Applications: A Comprehensive Review

    Directory of Open Access Journals (Sweden)

    Renato Cicchetti

    2017-01-01

    Full Text Available A comprehensive review concerning the geometry, the manufacturing technologies, the materials, and the numerical techniques, adopted for the analysis and design of wideband and ultrawideband (UWB antennas for wireless applications, is presented. Planar, printed, dielectric, and wearable antennas, achievable on laminate (rigid and flexible, and textile dielectric substrates are taken into account. The performances of small, low-profile, and dielectric resonator antennas are illustrated paying particular attention to the application areas concerning portable devices (mobile phones, tablets, glasses, laptops, wearable computers, etc. and radio base stations. This information provides a guidance to the selection of the different antenna geometries in terms of bandwidth, gain, field polarization, time-domain response, dimensions, and materials useful for their realization and integration in modern communication systems.

  6. Ubiquitous wireless ECG recording: a powerful tool physicians should embrace.

    Science.gov (United States)

    Saxon, Leslie A

    2013-04-01

    The use of smart phones has increased dramatically and there are nearly a billion users on 3G and 4G networks worldwide. Nearly 60% of the U.S. population uses smart phones to access the internet, and smart phone sales now surpass those of desktop and laptop computers. The speed of wireless communication technology on 3G and 4G networks and the widespread adoption and use of iOS equipped smart phones (Apple Inc., Cupertino, CA, USA) provide infrastructure for the transmission of wireless biomedical data, including ECG data. These technologies provide an unprecedented opportunity for physicians to continually access data that can be used to detect issues before symptoms occur or to have definitive data when symptoms are present. The technology also greatly empowers and enables the possibility for unprecedented patient participation in their own medical education and health status as well as that of their social network. As patient advocates, physicians and particularly cardiac electrophysiologists should embrace the future and promise of wireless ECG recording, a technology solution that can truly scale across the global population. © 2013 Wiley Periodicals, Inc.

  7. [A wireless smart home system based on brain-computer interface of steady state visual evoked potential].

    Science.gov (United States)

    Zhao, Li; Xing, Xiao; Guo, Xuhong; Liu, Zehua; He, Yang

    2014-10-01

    Brain-computer interface (BCI) system is a system that achieves communication and control among humans and computers and other electronic equipment with the electroencephalogram (EEG) signals. This paper describes the working theory of the wireless smart home system based on the BCI technology. We started to get the steady-state visual evoked potential (SSVEP) using the single chip microcomputer and the visual stimulation which composed by LED lamp to stimulate human eyes. Then, through building the power spectral transformation on the LabVIEW platform, we processed timely those EEG signals under different frequency stimulation so as to transfer them to different instructions. Those instructions could be received by the wireless transceiver equipment to control the household appliances and to achieve the intelligent control towards the specified devices. The experimental results showed that the correct rate for the 10 subjects reached 100%, and the control time of average single device was 4 seconds, thus this design could totally achieve the original purpose of smart home system.

  8. Wireless physical layer security

    OpenAIRE

    Poor, H. Vincent; Schaefer, Rafael F.

    2016-01-01

    Security is a very important issue in the design and use of wireless networks. Traditional methods of providing security in such networks are impractical for some emerging types of wireless networks due to the light computational abilities of some wireless devices [such as radio-frequency identification (RFID) tags, certain sensors, etc.] or to the very large scale or loose organizational structure of some networks. Physical layer security has the potential to address these concerns by taking...

  9. Dose estimative in operators during petroleum wells logging with nuclear wireless probes through computer modelling

    International Nuclear Information System (INIS)

    Souza, Edmilson Monteiro de; Silva, Ademir Xavier da; Lopes, Ricardo T.; Correa, Samanda Cristine Arruda; Rocha, Paula L.F.

    2011-01-01

    This paper evaluates the absorbed dose and the effective dose on operators during the petroleum well logging with nuclear wireless that uses gamma radiation sources. To obtain the data, a typical scenery of a logging procedure will be simulated with MCNPX Monte Carlo code. The simulated logging probe was the Density Gamma Probe - TRISOND produced by Robertson Geolloging. The absorbed dose values were estimated through the anthropomorphic simulator in male voxel MAX. The effective dose values were obtained using the ICRP 103

  10. Optimized Group Channel Assignment Using Computational Geometry over Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Anitha Manikandan

    2015-01-01

    Full Text Available Wireless Mesh Networks (WMNs are an evolving division in the field of wireless networks due to their ease of deployment and assured last mile connectivity. It sets out a favorable situation to guarantee the Internet connectivity to all the mobile and static nodes. A wireless environment is dynamic, heterogeneous, and unpredictable as the nodes communicate through the unguided links called channels. The number of nonoverlapping channels available is less than the number of mesh nodes; hence, the same channel will be shared among many nodes. This scarcity of the channels causes interference and degrades the performance of the network. In this paper, we have presented a group based channel assignment method to minimize the interference. We have formulated a mathematical model using Nonlinear Programming (NLP. The objective function defines the channel assignment strategy which eventually reduces the interference. We have adapted the cognitive model of Discrete Particle Swarm Optimization (DPSO, for solving the optimization function. The channel assignment problem is an NP hard problem; hence, we have taken the benefits of a stochastic approach to find a solution that is optimal or near optimal. Finally, we have performed simulations to investigate the efficiency of our proposed work.

  11. Wireless, Web-Based Interactive Control of Optical Coherence Tomography with Mobile Devices.

    Science.gov (United States)

    Mehta, Rajvi; Nankivil, Derek; Zielinski, David J; Waterman, Gar; Keller, Brenton; Limkakeng, Alexander T; Kopper, Regis; Izatt, Joseph A; Kuo, Anthony N

    2017-01-01

    Optical coherence tomography (OCT) is widely used in ophthalmology clinics and has potential for more general medical settings and remote diagnostics. In anticipation of remote applications, we developed wireless interactive control of an OCT system using mobile devices. A web-based user interface (WebUI) was developed to interact with a handheld OCT system. The WebUI consisted of key OCT displays and controls ported to a webpage using HTML and JavaScript. Client-server relationships were created between the WebUI and the OCT system computer. The WebUI was accessed on a cellular phone mounted to the handheld OCT probe to wirelessly control the OCT system. Twenty subjects were imaged using the WebUI to assess the system. System latency was measured using different connection types (wireless 802.11n only, wireless to remote virtual private network [VPN], and cellular). Using a cellular phone, the WebUI was successfully used to capture posterior eye OCT images in all subjects. Simultaneous interactivity by a remote user on a laptop was also demonstrated. On average, use of the WebUI added only 58, 95, and 170 ms to the system latency using wireless only, wireless to VPN, and cellular connections, respectively. Qualitatively, operator usage was not affected. Using a WebUI, we demonstrated wireless and remote control of an OCT system with mobile devices. The web and open source software tools used in this project make it possible for any mobile device to potentially control an OCT system through a WebUI. This platform can be a basis for remote, teleophthalmology applications using OCT.

  12. Analyzing the environmental impacts of laptop enclosures ...

    Science.gov (United States)

    The market growth of consumer electronics makes it essential for industries and policy-makers to work together to develop sustainable products. The objective of this study is to better understand how to promote environmentally sustainable consumer electronics by examining the use of various materials in laptop enclosures (excluding mounting hardware, internal components, and insulation) using screening-level life cycle assessment. The baseline material, is a fossil plastic blend of polycarbonate-acrylonitrile butadiene styrene. Alternative materials include polylactic acid, bamboo, aluminum, and various combinations of these materials known to be currently used or being considered for use in laptops. The flame retardants considered in this study are bisphenol A bis(diphenyl phosphate), triphenyl phosphate, 9,10-dihydro-9-oxa-10-phosphaphenanthrene-10-oxide, and borax-boric acid-phosphorous acid. The Tool for the Reduction and Assessment of Chemical and other environmental Impacts v2.1 was used for the assessment of impacts related to climate change, human and ecological health, and resource use. The assessment demonstrates that plastics, relative to the other materials, are currently some of the better performing materials in terms of having the lowest potential environmental impact for a greater number of impact categories based on product life cycle models developed in this study. For fossil plastics, the material performance increases with increasing post-con

  13. Combined bio-inspired/evolutionary computational methods in cross-layer protocol optimization for wireless ad hoc sensor networks

    Science.gov (United States)

    Hortos, William S.

    2011-06-01

    Published studies have focused on the application of one bio-inspired or evolutionary computational method to the functions of a single protocol layer in a wireless ad hoc sensor network (WSN). For example, swarm intelligence in the form of ant colony optimization (ACO), has been repeatedly considered for the routing of data/information among nodes, a network-layer function, while genetic algorithms (GAs) have been used to select transmission frequencies and power levels, physical-layer functions. Similarly, artificial immune systems (AISs) as well as trust models of quantized data reputation have been invoked for detection of network intrusions that cause anomalies in data and information; these act on the application and presentation layers. Most recently, a self-organizing scheduling scheme inspired by frog-calling behavior for reliable data transmission in wireless sensor networks, termed anti-phase synchronization, has been applied to realize collision-free transmissions between neighboring nodes, a function of the MAC layer. In a novel departure from previous work, the cross-layer approach to WSN protocol design suggests applying more than one evolutionary computational method to the functions of the appropriate layers to improve the QoS performance of the cross-layer design beyond that of one method applied to a single layer's functions. A baseline WSN protocol design, embedding GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layers, respectively, is constructed. Simulation results demonstrate the synergies among the bioinspired/ evolutionary methods of the proposed baseline design improve the overall QoS performance of networks over that of a single computational method.

  14. Extension to HiRLoc Algorithm for Localization Error Computation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Swati Saxena

    2013-09-01

    Full Text Available Wireless sensor networks (WSNs have gained importance in recent years as this support a large spectrum of applications such as automotive, health, military, environmental, home and office. Various algorithms have been proposed for making this technology more adaptive the existing algorithms address issues such as safety, security, power consumption, lifetime and localization. This paper presents an extension to HiRLoc algorithm and highlights its benefits. Extended HiRLoc significantly reduce the average localization error by suggesting a new method directional antenna based scheme.

  15. A WIRELESS USER-COMPUTER INTERFACE TO EXPLORE VARIOUS SOURCES OF BIOSIGNALS AND VISUAL BIOFEEDBACK FOR SEVERE MOTOR IMPAIRMENT

    Directory of Open Access Journals (Sweden)

    Ana Londral

    2013-11-01

    Full Text Available Severe speech and motor impairments caused by several neurological disorders can limit communication skills to simple yes/no replies. Variability among patients’ physical and social conditions justifies the need of providing multiple sources of signals to access to Augmentative and Alternative Communication (AAC systems. Our study presents the development of a new user-computer interface that can be controlled by the detection of various sources of biosignals. Wireless sensors are placed on the body and users learn to enhance the control of detected signals by visual biofeedback, on a switch based control approach. Experimental results in four patients with just few residual movements showed that different sensors can be placed in different body locations and detect novel communication channels, according to each person’s physiological and social condition. Especially in progressive conditions, this system can be used by therapists to anticipate progression and assess new channels for communication.

  16. Best Practices for a University Laptop Lending Program

    Directory of Open Access Journals (Sweden)

    Pamela Buzzard

    2011-10-01

    Full Text Available The University of Arizona Libraries currently circulates over three hundred pieces of equipment including laptops, netbooks, projectors and iPads. This article describes the best practices and workflows we have developed since 2003 to create a laptop/equipment lending program that is efficient and mindful of financial resources and that our student body loves and continues to support.

  17. Technical note: real-time web-based wireless visual guidance system for radiotherapy.

    Science.gov (United States)

    Lee, Danny; Kim, Siyong; Palta, Jatinder R; Kim, Taeho

    2017-06-01

    Describe a Web-based wireless visual guidance system that mitigates issues associated with hard-wired audio-visual aided patient interactive motion management systems that are cumbersome to use in routine clinical practice. Web-based wireless visual display duplicates an existing visual display of a respiratory-motion management system for visual guidance. The visual display of the existing system is sent to legacy Web clients over a private wireless network, thereby allowing a wireless setting for real-time visual guidance. In this study, active breathing coordinator (ABC) trace was used as an input for visual display, which captured and transmitted to Web clients. Virtual reality goggles require two (left and right eye view) images for visual display. We investigated the performance of Web-based wireless visual guidance by quantifying (1) the network latency of visual displays between an ABC computer display and Web clients of a laptop, an iPad mini 2 and an iPhone 6, and (2) the frame rate of visual display on the Web clients in frames per second (fps). The network latency of visual display between the ABC computer and Web clients was about 100 ms and the frame rate was 14.0 fps (laptop), 9.2 fps (iPad mini 2) and 11.2 fps (iPhone 6). In addition, visual display for virtual reality goggles was successfully shown on the iPhone 6 with 100 ms and 11.2 fps. A high network security was maintained by utilizing the private network configuration. This study demonstrated that a Web-based wireless visual guidance can be a promising technique for clinical motion management systems, which require real-time visual display of their outputs. Based on the results of this study, our approach has the potential to reduce clutter associated with wired-systems, reduce space requirements, and extend the use of medical devices from static usage to interactive and dynamic usage in a radiotherapy treatment vault.

  18. Wireless power transfer for electric vehicles and mobile devices

    CERN Document Server

    Rim, Chun T

    2017-01-01

    From mobile, cable-free re-charging of electric vehicles, smart phones and laptops to collecting solar electricity from orbiting solar farms, wireless power transfer (WPT) technologies offer consumers and society enormous benefits. Written by innovators in the field, this comprehensive resource explains the fundamental principles and latest advances in WPT and illustrates key applications of this emergent technology.

  19. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  20. Experimental Investigation of 60 GHz Transmission Characteristics Between Computers on a Conference Table for WPAN Applications

    Science.gov (United States)

    Ponchak, George E.; Amadjikpe, Arnaud L.; Choudhury, Debabani; Papapolymerou, John

    2011-01-01

    In this paper, the first measurements of the received radiated power between antennas located on a conference table to simulate the environment of antennas embedded in laptop computers for 60 GHz Wireless Personal Area Network (WPAN) applications is presented. A high gain horn antenna and a medium gain microstrip patch antenna for two linear polarizations are compared. It is shown that for a typical conference table arrangement with five computers, books, pens, and coffee cups, the antennas should be placed a minimum of 5 cm above the table, but that a height of greater than 20 cm may be required to maximize the received power in all cases.

  1. Wireless networks of opportunity in support of secure field operations

    Science.gov (United States)

    Stehle, Roy H.; Lewis, Mark

    1997-02-01

    Under funding from the Defense Advanced Research Projects Agency (DARPA) for joint military and law enforcement technologies, demonstrations of secure information transfer in support of law enforcement and military operations other than war, using wireless and wired technology, were held in September 1996 at several locations in the United States. In this paper, the network architecture, protocols, and equipment supporting the demonstration's scenarios are presented, together with initial results, including lessons learned and desired system enhancements. Wireless networks of opportunity encompassed in-building (wireless-LAN), campus-wide (Metricom Inc.), metropolitan (AMPS cellular, CDPD), and national (one- and two-way satellite) systems. Evolving DARPA-sponsored packet radio technology was incorporated. All data was encrypted, using multilevel information system security initiative (MISSI)FORTEZZA technology, for carriage over unsecured and unclassified commercial networks. The identification and authentication process inherent in the security system permitted logging for database accesses and provided an audit trail useful in evidence gathering. Wireless and wireline communications support, to and between modeled crisis management centers, was demonstrated. Mechanisms for the guarded transport of data through the secret-high military tactical Internet were included, to support joint law enforcement and crisis management missions. A secure World Wide Web (WWW) browser forms the primary, user-friendly interface for information retrieval and submission. The WWW pages were structured to be sensitive to the bandwidth, error rate, and cost of the communications medium in use (e.g., the use of and resolution for graphical data). Both still and motion compressed video were demonstrated, along with secure voice transmission from laptop computers in the field. Issues of network bandwidth, airtime costs, and deployment status are discussed.

  2. Teaching and Learning Physics in a 1:1 Laptop School

    Science.gov (United States)

    Zucker, Andrew A.; Hug, Sarah T.

    2008-12-01

    1:1 laptop programs, in which every student is provided with a personal computer to use during the school year, permit increased and routine use of powerful, user-friendly computer-based tools. Growing numbers of 1:1 programs are reshaping the roles of teachers and learners in science classrooms. At the Denver School of Science and Technology, a public charter high school where a large percentage of students come from low-income families, 1:1 laptops are used often by teachers and students. This article describes the school's use of laptops, the Internet, and related digital tools, especially for teaching and learning physics. The data are from teacher and student surveys, interviews, classroom observations, and document analyses. Physics students and teachers use an interactive digital textbook; Internet-based simulations (some developed by a Nobel Prize winner); word processors; digital drop boxes; email; formative electronic assessments; computer-based and stand-alone graphing calculators; probes and associated software; and digital video cameras to explore hypotheses, collaborate, engage in scientific inquiry, and to identify strengths and weaknesses of students' understanding of physics. Technology provides students at DSST with high-quality tools to explore scientific concepts and the experiences of teachers and students illustrate effective uses of digital technology for high school physics.

  3. Bluetooth wireless database for scoliosis clinics.

    Science.gov (United States)

    Lou, E; Fedorak, M V; Hill, D L; Raso, J V; Moreau, M J; Mahood, J K

    2003-05-01

    A database system with Bluetooth wireless connectivity has been developed so that scoliosis clinics can be run more efficiently and data can be mined for research studies without significant increases in equipment cost. The wireless database system consists of a Bluetooth-enabled laptop or PC and a Bluetooth-enabled handheld personal data assistant (PDA). Each patient has a profile in the database, which has all of his or her clinical history. Immediately prior to the examination, the orthopaedic surgeon selects a patient's profile from the database and uploads that data to the PDA over a Bluetooth wireless connection. The surgeon can view the entire clinical history of the patient while in the examination room and, at the same time, enter in any new measurements and comments from the current examination. After seeing the patient, the surgeon synchronises the newly entered information with the database wirelessly and prints a record for the chart. This combination of the database and the PDA both improves efficiency and accuracy and can save significant time, as there is less duplication of work, and no dictation is required. The equipment required to implement this solution is a Bluetooth-enabled PDA and a Bluetooth wireless transceiver for the PC or laptop.

  4. Analisis Performansi Konektifitas Pada Jaringan Wireless Broadband di Bandung

    Directory of Open Access Journals (Sweden)

    OTNIEL TONAPA

    2016-02-01

    Full Text Available Abstrak Perkembangan teknologi komunikasi Wireless mengarah ke teknologi yang berbasis jaringan IP (Internet Protocol. Access Point adalah suatu perangkat Wireless Router.  Access point membentuk hot spot, sedangkan Wireless Router mengatur lalu lintas data. Parameter yang diukur pada penelitian ini yaitu Quality of Service (QoS, antara lain pengukuran jitter, delay, dan packet loss yang dihasilkan dalam layanan paket data. Nilai jitter rata-rata sesama pengguna modem ADSL yang terhubung dengan access point pada smartphone bernilai 143.36 ms sedangkan pada laptop berada pada nilai 45.6 ms. Nilai jitter sesama penguna modem GPON, nilai rata-rata pada smartphone bernilai 133.12 ms, sedangkan pada laptop berada pada nilai 45.56 ms. Nilai rata-rata delay sesama pengguna modem ADSL pada smartphone bernilai 99.04 ms, sedangkan pada laptop sebesar 56.33 ms. Nilai rata-rata delay pada sesama pengguna modem GPON pada smartphone adalah 97.96 ms sedangkan pada laptop sebesar 56.15 ms.  Packet loss dari hasil pengujian keduanya memiliki presentase sama yaitu 1%. Kata kunci: Teknologi Digital Subscriber Line, Jaringan Optik Pasif, Dynamic Host Configuration Protocol (DHCP, Quality of Service (QoS Abstract Wireless communication technology development leading to technologies that network-based IP (Internet Protocol. Access Point Wireless Router is a device. Access point forming a hot spot, while the router manage data traffic. Parameters measured in this research is Quality of Service (QoS. among other things, measuring jitter, delay, and packet loss. resulting in packet data service. Jitter value among ADSL fellow have the average on smartphones 143.36 ms. On laptop average be at 45.6 ms. While jitter value among GPON fellow user have the average on smartphone 133.12 ms. On laptop average be at 45.56 ms. The average value of the delay to ADSL fellow users on smartphones 99.04 ms and on laptop average be at 56.33 ms. While delay value among GPON fellow user

  5. A Framework to Design the Computational Load Distribution of Wireless Sensor Networks in Power Consumption Constrained Environments.

    Science.gov (United States)

    Sánchez-Álvarez, David; Linaje, Marino; Rodríguez-Pérez, Francisco-Javier

    2018-03-23

    In this paper, we present a work based on the computational load distribution among the homogeneous nodes and the Hub/Sink of Wireless Sensor Networks (WSNs). The main contribution of the paper is an early decision support framework helping WSN designers to take decisions about computational load distribution for those WSNs where power consumption is a key issue (when we refer to "framework" in this work, we are considering it as a support tool to make decisions where the executive judgment can be included along with the set of mathematical tools of the WSN designer; this work shows the need to include the load distribution as an integral component of the WSN system for making early decisions regarding energy consumption). The framework takes advantage of the idea that balancing sensors nodes and Hub/Sink computational load can lead to improved energy consumption for the whole or at least the battery-powered nodes of the WSN. The approach is not trivial and it takes into account related issues such as the required data distribution, nodes, and Hub/Sink connectivity and availability due to their connectivity features and duty-cycle. For a practical demonstration, the proposed framework is applied to an agriculture case study, a sector very relevant in our region. In this kind of rural context, distances, low costs due to vegetable selling prices and the lack of continuous power supplies may lead to viable or inviable sensing solutions for the farmers. The proposed framework systematize and facilitates WSN designers the required complex calculations taking into account the most relevant variables regarding power consumption, avoiding full/partial/prototype implementations, and measurements of different computational load distribution potential solutions for a specific WSN.

  6. An Automatic Prediction of Epileptic Seizures Using Cloud Computing and Wireless Sensor Networks.

    Science.gov (United States)

    Sareen, Sanjay; Sood, Sandeep K; Gupta, Sunil Kumar

    2016-11-01

    Epilepsy is one of the most common neurological disorders which is characterized by the spontaneous and unforeseeable occurrence of seizures. An automatic prediction of seizure can protect the patients from accidents and save their life. In this article, we proposed a mobile-based framework that automatically predict seizures using the information contained in electroencephalography (EEG) signals. The wireless sensor technology is used to capture the EEG signals of patients. The cloud-based services are used to collect and analyze the EEG data from the patient's mobile phone. The features from the EEG signal are extracted using the fast Walsh-Hadamard transform (FWHT). The Higher Order Spectral Analysis (HOSA) is applied to FWHT coefficients in order to select the features set relevant to normal, preictal and ictal states of seizure. We subsequently exploit the selected features as input to a k-means classifier to detect epileptic seizure states in a reasonable time. The performance of the proposed model is tested on Amazon EC2 cloud and compared in terms of execution time and accuracy. The findings show that with selected HOS based features, we were able to achieve a classification accuracy of 94.6 %.

  7. Electronic Devices, Methods, and Computer Program Products for Selecting an Antenna Element Based on a Wireless Communication Performance Criterion

    DEFF Research Database (Denmark)

    2014-01-01

    A method of operating an electronic device includes providing a plurality of antenna elements, evaluating a wireless communication performance criterion to obtain a performance evaluation, and assigning a first one of the plurality of antenna elements to a main wireless signal reception and trans...

  8. Assessment of exposure to electromagnetic fields from wireless computer networks (wi-fi) in schools; results of laboratory measurements.

    Science.gov (United States)

    Peyman, A; Khalid, M; Calderon, C; Addison, D; Mee, T; Maslanyj, M; Mann, S

    2011-06-01

    Laboratory measurements have been carried out with examples of Wi-Fi devices used in UK schools to evaluate the radiofrequency power densities around them and the total emitted powers. Unlike previous studies, a 20 MHz bandwidth signal analyzer was used, enabling the whole Wi-Fi signal to be captured and monitored. The radiation patterns of the laptops had certain similarities, including a minimum toward the torso of the user and two maxima symmetrically opposed across a vertical plane bisecting the screen and keyboard. The maxima would have resulted from separate antennas mounted behind the top left and right corners of the laptop screens. The patterns for access points were more symmetrical with generally higher power densities at a given distance. The spherically-integrated radiated power (IRP) ranged from 5 to 17 mW for 15 laptops in the 2.45 GHz band and from 1 to 16 mW for eight laptops in the 5 GHz band. For practical reasons and because access points are generally wall-mounted with beams directed into the rooms, their powers were integrated over a hemisphere. These ranged from 3 to 28 mW for 12 access points at 2.4 GHz and from 3 to 29 mW for six access points at 5 GHz. In addition to the spherical measurements of IRP, power densities were measured at distances of 0.5 m and greater from the devices, and consistent with the low radiated powers, these were all much lower than the ICNIRP reference level.

  9. Performance Analysis of Power Bank Fitted with Recycled Laptop Batteries

    OpenAIRE

    Hartono, H; Sunarno, W; Sarwanto, S

    2017-01-01

    The result of observation at Science Laboratory of State Vocational High School 3 of Surakarta shows that the power capacity of power bank fitted with recycled laptop batteries was not tested. Power bank test was conducted by preparing used laptop batteries type 18650 from its packaging for a total of five cells, selecting batteries based on their physical appearance, cleaning the pole connections, testing the voltage, testing temperature when power charging from electric outlet to power bank...

  10. Hybrid brain-computer interface for biomedical cyber-physical system application using wireless embedded EEG systems.

    Science.gov (United States)

    Chai, Rifai; Naik, Ganesh R; Ling, Sai Ho; Nguyen, Hung T

    2017-01-07

    One of the key challenges of the biomedical cyber-physical system is to combine cognitive neuroscience with the integration of physical systems to assist people with disabilities. Electroencephalography (EEG) has been explored as a non-invasive method of providing assistive technology by using brain electrical signals. This paper presents a unique prototype of a hybrid brain computer interface (BCI) which senses a combination classification of mental task, steady state visual evoked potential (SSVEP) and eyes closed detection using only two EEG channels. In addition, a microcontroller based head-mounted battery-operated wireless EEG sensor combined with a separate embedded system is used to enhance portability, convenience and cost effectiveness. This experiment has been conducted with five healthy participants and five patients with tetraplegia. Generally, the results show comparable classification accuracies between healthy subjects and tetraplegia patients. For the offline artificial neural network classification for the target group of patients with tetraplegia, the hybrid BCI system combines three mental tasks, three SSVEP frequencies and eyes closed, with average classification accuracy at 74% and average information transfer rate (ITR) of the system of 27 bits/min. For the real-time testing of the intentional signal on patients with tetraplegia, the average success rate of detection is 70% and the speed of detection varies from 2 to 4 s.

  11. [Developing a home care nursing information system by utilizing wire-wireless network and mobile computing system].

    Science.gov (United States)

    Park, Jung-Ho; Park, Sung-Ae; Yoon, Soon-Nyoung; Kang, Sung-Rye

    2004-04-01

    The purpose of this study was to develop a home care nursing network system for operating home care effectively and efficiently by utilizing a wire-wireless network and mobile computing in order to record and send patients' data in real time, and by combining the headquarter office and the local offices with home care nurses over the Internet. It complements the preceding research from 1999 by adding home care nursing standard guidelines and upgrading the PDA program. Method/1 and Prototyping were adopted to develop the main network system. The detailed research process is as follows : 1)home care nursing standard guidelines for Diabetes, cancer and peritoneal-dialysis were added in 12 domains of nursing problem fields with nursing assessment/intervention algorithms. 2) complementing the PDA program was done by omitting and integrating the home care nursing algorithm path which is unnecessary and duplicated. Also, upgrading the PDA system was done by utilizing the machinery and tools where the PDA and the data transmission modem are integrated, CDMX-1X base construction, in order to reduce a transmission error or transmission failure.

  12. Equivalence of Laptop and Tablet Administrations of the Minnesota Multiphasic Personality Inventory-2 Restructured Form.

    Science.gov (United States)

    Menton, William H; Crighton, Adam H; Tarescavage, Anthony M; Marek, Ryan J; Hicks, Adam D; Ben-Porath, Yossef S

    2017-06-01

    The present study investigated the comparability of laptop computer- and tablet-based administration modes for the Minnesota Multiphasic Personality Inventory-2-Restructured Form (MMPI-2-RF). Employing a counterbalanced within-subjects design, the MMPI-2-RF was administered via both modes to a sample of college undergraduates ( N = 133). Administration modes were compared in terms of mean scale scores, internal consistency, test-retest consistency, external validity, and administration time. Mean scores were generally similar, and scores produced via both methods appeared approximately equal in terms of internal consistency and test-retest consistency. Scores from the two modalities also evidenced highly similar patterns of associations with external criteria. Notably, tablet administration of the MMPI-2-RF was substantially longer than laptop administration in the present study (mean difference 7.2 minutes, Cohen's d = .95). Overall, results suggest that varying administration mode between laptop and tablet has a negligible influence on MMPI-2-RF scores, providing evidence that these modes of administration can be considered psychometrically equivalent.

  13. The One Laptop School: Equipping Rural Elementary Schools in South India Through Public Private Partnerships

    Directory of Open Access Journals (Sweden)

    Erik Jon Byker

    2015-11-01

    Full Text Available This article reports on a Public Private Partnership (PPP program in South India that provided information and communication technology (ICT to rural elementary schools. The article examined the current status of rural, government-run elementary schools in India by reviewing reports like the Annual Status of Education Report (ASER in India. Challenges like teacher absences, student drop-outs, lack of electricity, lack of separate toilets for genders, and a lack of teaching resources is discussed. To meet these challenges, the article describes the rise in popularity of India’s PPPs. Then the article reports on a case study of a PPP, called the SSA Foundation, which implemented a “one laptop per school” program in rural areas in the Indian States of Karnataka and Tamil Nadu. Using ethnographic data from field research, the case study includes a description of how the students in a rural Karnataka elementary school use their school’s laptop. The school was situated in a small village where most travel was non-motorized. Walking, usually without shoes, was the main form of transportation. A bicycle was considered a luxury. Most villagers worked in the surrounding ragi and millet fields; laboring, often with only simple tool blades. Wood fires were the main source of fuel for cooking. In this village, the school’s laptop became a prized possession. The case study offers a “thick description” (Geertz, 1973 of how the village school’s students used the laptop for learning basic computing skills and for learning English.

  14. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  15. Design and Construction of a Brain-Like Computer: A New Class of Frequency-Fractal Computing Using Wireless Communication in a Supramolecular Organic, Inorganic System

    Directory of Open Access Journals (Sweden)

    Subrata Ghosh

    2014-01-01

    astronomically large columns project a solution. The driving principle of computing is synchronization and de-synchronization of network paths, the system drives towards highest density of coupled arguments for maximum matching. Memory is located at all layers of the hardware. Learning, computing occurs everywhere simultaneously. Since resonance chain connects all computing seeds, wireless processing is feasible without a screening effect. The computing power is increased by maximizing the density of resonance states and bandwidth of the resonance chain together. We discovered this remarkable computing while studying the human brain, so we present a new model of the human brain in terms of an experimentally determined resonance chain with bandwidth 10−15 Hz (complete brain with all sensors to 10+15 Hz (DNA along with its implementation using a pure organic synthesis of entire computer (brain jelly in our lab, software prototype as proof of concept and finally a new fourth circuit element (Hinductor based beyond Complementary metal-oxide semiconductor (CMOS hardware is also presented.

  16. A Computational Model for Path Loss in Wireless Sensor Networks in Orchard Environments

    Directory of Open Access Journals (Sweden)

    Hristos T. Anastassiu

    2014-03-01

    Full Text Available A computational model for radio wave propagation through tree orchards is presented. Trees are modeled as collections of branches, geometrically approximated by cylinders, whose dimensions are determined on the basis of measurements in a cherry orchard. Tree canopies are modeled as dielectric spheres of appropriate size. A single row of trees was modeled by creating copies of a representative tree model positioned on top of a rectangular, lossy dielectric slab that simulated the ground. The complete scattering model, including soil and trees, enhanced by periodicity conditions corresponding to the array, was characterized via a commercial computational software tool for simulating the wave propagation by means of the Finite Element Method. The attenuation of the simulated signal was compared to measurements taken in the cherry orchard, using two ZigBee receiver-transmitter modules. Near the top of the tree canopies (at 3 m, the predicted attenuation was close to the measured one—just slightly underestimated. However, at 1.5 m the solver underestimated the measured attenuation significantly, especially when leaves were present and, as distances grew longer. This suggests that the effects of scattering from neighboring tree rows need to be incorporated into the model. However, complex geometries result in ill conditioned linear systems that affect the solver’s convergence.

  17. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  18. ANALISIS EKUITAS MEREK LAPTOP PADA MAHASISWA INSTITUT PERTANIAN BOGOR

    Directory of Open Access Journals (Sweden)

    Ujang Sumarwan

    2010-08-01

    Full Text Available The brand has role in bridging between consumer’s expectations and company’s promises. Prestigious brand can be said that it has strong brand equity. This research had objective to analyze brand equity of laptop product among students of Bogor Agricultural University. Meanwhile, this research had detail purposes are: (1 to analyze usage behavior of laptop product, (2 to analyze brand equity elements (brand awareness, brand association, perceived quality, and brand loyalty among students of Bogor Agricultural University, and (3 to find out the correlation between top of mind and laptop brand that used by students of Bogor Agricultural University. This research used cross sectional study design with total sample were 200 students. The determination of total samples in each faculty used proportional sampling. The process to select sample was executed by convenience sampling that was selection of  the samples based on availability to fill up the questionnaire and interview that appropriated with the quota in each faculty. The brand of laptop that most used and possessed is Acer. The most possessed of laptop by sample during 10 months until 18 months. The most way of buying laptop was bought by parents in new product. On the brand awareness elements of brand product, Acer generally get the better spot then followed by Toshiba, HP Compaq, and Axioo. The testing of brand association with using Cochran test showedthat the smallest association was obtained to Acer brand. It caused the other brand, such as Toshiba, HP Compaq, and Axioo hadall associations that adhere to consumers. The perceived quality that was tested by Customer Satisfaction Index (CSI, referred that index satisfaction of samples about Acer, Toshiba, and Axioo brand had satisfied level. Meanwhile, the samples that used HP Compaq had very satisfied level. The Importance Performance Analysis (IPA showed that only Toshiba brand that was the most excellent in which none atribute which

  19. Linux Adventures on a Laptop. Computers in Small Libraries

    Science.gov (United States)

    Roberts, Gary

    2005-01-01

    This article discusses the pros and cons of open source software, such as Linux. It asserts that despite the technical difficulties of installing and maintaining this type of software, ultimately it is helpful in terms of knowledge acquisition and as a beneficial investment librarians can make in themselves, their libraries, and their patrons.…

  20. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  1. Effect of a Laptop Initiative on Middle School Mathematics Achievement

    Science.gov (United States)

    Lambert, Edna Earl White

    2014-01-01

    In the wake of No Child Left Behind, schools continue to be evaluated according to standardized test results. Researchers suggest that technology can assist students with development and school achievement. While laptop initiative (LI) technology was being implemented by South Carolina districts in the middle schools classrooms, educational…

  2. On-Site School Library Automation: Automation Anywhere with Laptops.

    Science.gov (United States)

    Gunn, Holly; Oxner, June

    2000-01-01

    Four years after the Halifax Regional School Board was formed through amalgamation, over 75% of its school libraries were automated. On-site automation with laptops was a quicker, more efficient way of automating than sending a shelf list to the Technical Services Department. The Eastern Shore School Library Automation Project was a successful…

  3. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  4. Ubiquitous laptop use in higher education: Multitasking and students’ perception of distraction in a European setting

    OpenAIRE

    Goyanes, Manuel; Catalán-Matamoros, Daniel

    2017-01-01

    The present study was conducted in a European setting to examine what undergraduate students do on their laptops during a traditional class and to what extent laptop usage behaviors are associated with academic success, along with social networking use and laptop use as distractions. Based on a survey of 200 Spanish graduate students from a public university, the study led to four conclusions: 1) the most prevalent laptop use during class time was for academic purposes; 2) the perception of c...

  5. Laptop Multitasking Hinders Classroom Learning for Both Users and Nearby Peers

    Science.gov (United States)

    Sana, Faria; Weston, Tina; Cepeda, Nicholas J.

    2013-01-01

    Laptops are commonplace in university classrooms. In light of cognitive psychology theory on costs associated with multitasking, we examined the effects of in-class laptop use on student learning in a simulated classroom. We found that participants who multitasked on a laptop during a lecture scored lower on a test compared to those who did not…

  6. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  7. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  8. Women with hereditary breast cancer predispositions should avoid using their smartphones, tablets, and laptops at night.

    Science.gov (United States)

    Mortazavi, Seyed Ali Reza; Mortazavi, Seyed Mohammad Javad

    2018-02-01

    Breast cancer is the most common malignancy among women, both in the developed and developing countries. Women with mutations in the BRCA1 and BRCA2 genes have an increased risk of breast and ovarian cancers. Recent studies show that short-wavelength visible light disturb the secretion of melatonin and causes circadian rhythm disruption. We have previously studied the health effects of exposure to different levels of radiofrequency electromagnetic fields (RF-EMFs) such as mobile phones, mobile base stations, mobile phone jammers, laptop computers, and radars. Moreover, over the past several years, we investigated the health effects of exposure to the short wavelength visible light in the blue region emitted from digital screens. The reduction of melatonin secretion after exposure to blue light emitted from smartphone's screen has been reported to be associated with the negative impact of smartphone use at night on sleep. We have shown that both the blue light and RF-EMFs generated by mobile phones are linked to the disruption of the circadian rhythm in people who use their phones at night. Therefore, if women with hereditary breast cancer predispositions use their smartphones, tablets and laptops at night, disrupted circadian rhythms (suppression of melatonin caused by exposure to blue light emitted from the digital screens), amplifies the risk of breast cancer. It can be concluded that women who carry mutated BRCA1 or BRCA2, or women with family history of breast cancer should avoid using their smartphones, tablets and laptops at night. Using sunglasses with amber lenses, or smartphone applications which decrease the users' exposure to blue light before sleep, at least to some extent, can decrease the risk of circadian rhythm disruption and breast cancer.

  9. Real-time community detection in full social networks on a laptop.

    Science.gov (United States)

    Chamberlain, Benjamin Paul; Levy-Kramer, Josh; Humby, Clive; Deisenroth, Marc Peter

    2018-01-01

    For a broad range of research and practical applications it is important to understand the allegiances, communities and structure of key players in society. One promising direction towards extracting this information is to exploit the rich relational data in digital social networks (the social graph). As global social networks (e.g., Facebook and Twitter) are very large, most approaches make use of distributed computing systems for this purpose. Distributing graph processing requires solving many difficult engineering problems, which has lead some researchers to look at single-machine solutions that are faster and easier to maintain. In this article, we present an approach for analyzing full social networks on a standard laptop, allowing for interactive exploration of the communities in the locality of a set of user specified query vertices. The key idea is that the aggregate actions of large numbers of users can be compressed into a data structure that encapsulates the edge weights between vertices in a derived graph. Local communities can be constructed by selecting vertices that are connected to the query vertices with high edge weights in the derived graph. This compression is robust to noise and allows for interactive queries of local communities in real-time, which we define to be less than the average human reaction time of 0.25s. We achieve single-machine real-time performance by compressing the neighborhood of each vertex using minhash signatures and facilitate rapid queries through Locality Sensitive Hashing. These techniques reduce query times from hours using industrial desktop machines operating on the full graph to milliseconds on standard laptops. Our method allows exploration of strongly associated regions (i.e., communities) of large graphs in real-time on a laptop. It has been deployed in software that is actively used by social network analysts and offers another channel for media owners to monetize their data, helping them to continue to provide

  10. Women with hereditary breast cancer predispositions should avoid using their smartphones, tablets and laptops at night

    Directory of Open Access Journals (Sweden)

    Seyed Ali Reza Mortazavi

    2018-02-01

    Full Text Available Breast cancer is the most common malignancy among women, both in the developed and developing countries. Women with mutations in the BRCA1 and BRCA2 genes have an increased risk of breast and ovarian cancers. Recent studies show that short-wavelength visible light disturb the secretion of melatonin and causes circadian rhythm disruption. We have previously studied the health effects of exposure to different levels of radiofrequency electromagnetic fields (RF-EMFs such as mobile phones, mobile base stations, mobile phone jammers, laptop computers, and radars. Moreover, over the past several years, we investigated the health effects of exposure to the short wavelength visible light in the blue region emitted from digital screens. The reduction of melatonin secretion after exposure to blue light emitted from smartphone’s screen has been reported to be associated with the negative impact of smartphone use at night on sleep. We have shown that both the blue light and RF-EMFs generated by mobile phones are linked to the disruption of the circadian rhythm in people who use their phones at night. Therefore, if women with hereditary breast cancer predispositions use their smartphones, tablets and laptops at night, disrupted circadian rhythms (suppression of melatonin caused by exposure to blue light emitted from the digital screens, amplifies the risk of breast cancer. It can be concluded that women who carry mutated BRCA1 or BRCA2, or women with family history of breast cancer should avoid using their smartphones, tablets and laptops at night. Using sunglasses with amber lenses, or smartphone applications which decrease the users’ exposure to blue light before sleep, at least to some extent, can decrease the risk of circadian rhythm disruption and breast cancer.

  11. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  12. Experience of wireless local area network in a radiation oncology department

    Directory of Open Access Journals (Sweden)

    Mandal Abhijit

    2010-01-01

    Full Text Available The aim of this work is to develop a wireless local area network (LAN between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc for efficient patient data management and to made easy the availability of information (chair side to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops and stationary workstations, all equipped with wireless-fidelity (Wi-Fi access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ has been used. The wireless networking was configured with the Service Set Identifier (SSID, Media Access Control (MAC address filtering, and Wired Equivalent Privacy (WEP network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.

  13. A Field Programmable Gate Array-Based Reconfigurable Smart-Sensor Network for Wireless Monitoring of New Generation Computer Numerically Controlled Machines

    Science.gov (United States)

    Moreno-Tapia, Sandra Veronica; Vera-Salas, Luis Alberto; Osornio-Rios, Roque Alfredo; Dominguez-Gonzalez, Aurelio; Stiharu, Ion; de Jesus Romero-Troncoso, Rene

    2010-01-01

    Computer numerically controlled (CNC) machines have evolved to adapt to increasing technological and industrial requirements. To cover these needs, new generation machines have to perform monitoring strategies by incorporating multiple sensors. Since in most of applications the online Processing of the variables is essential, the use of smart sensors is necessary. The contribution of this work is the development of a wireless network platform of reconfigurable smart sensors for CNC machine applications complying with the measurement requirements of new generation CNC machines. Four different smart sensors are put under test in the network and their corresponding signal processing techniques are implemented in a Field Programmable Gate Array (FPGA)-based sensor node. PMID:22163602

  14. A Field Programmable Gate Array-Based Reconfigurable Smart-Sensor Network for Wireless Monitoring of New Generation Computer Numerically Controlled Machines

    Directory of Open Access Journals (Sweden)

    Ion Stiharu

    2010-08-01

    Full Text Available Computer numerically controlled (CNC machines have evolved to adapt to increasing technological and industrial requirements. To cover these needs, new generation machines have to perform monitoring strategies by incorporating multiple sensors. Since in most of applications the online Processing of the variables is essential, the use of smart sensors is necessary. The contribution of this work is the development of a wireless network platform of reconfigurable smart sensors for CNC machine applications complying with the measurement requirements of new generation CNC machines. Four different smart sensors are put under test in the network and their corresponding signal processing techniques are implemented in a Field Programmable Gate Array (FPGA-based sensor node.

  15. Design and security of small wireless network

    OpenAIRE

    Žižka, Ladislav

    2012-01-01

    This thesis deals with design and security of small wireless network. Main goal of the thesis is home network design and choice of optimal solution of wireless security. The thesis has four parts. The first part describes computer networks and network components in theory. Next part deals with network design, choosing of network components and setting of them. It also describes some functionalities of alternative firmware DD-WRT. The third part presents common wireless security and network an...

  16. The pen is mightier than the keyboard: advantages of longhand over laptop note taking.

    Science.gov (United States)

    Mueller, Pam A; Oppenheimer, Daniel M

    2014-06-01

    Taking notes on laptops rather than in longhand is increasingly common. Many researchers have suggested that laptop note taking is less effective than longhand note taking for learning. Prior studies have primarily focused on students' capacity for multitasking and distraction when using laptops. The present research suggests that even when laptops are used solely to take notes, they may still be impairing learning because their use results in shallower processing. In three studies, we found that students who took notes on laptops performed worse on conceptual questions than students who took notes longhand. We show that whereas taking more notes can be beneficial, laptop note takers' tendency to transcribe lectures verbatim rather than processing information and reframing it in their own words is detrimental to learning. © The Author(s) 2014.

  17. Analisis Performansi Konektifitas Pada Jaringan Wireless Broadband di Bandung

    Directory of Open Access Journals (Sweden)

    OTNIEL TONAPA

    2014-07-01

    Kata kunci: Teknologi Digital Subscriber Line, Jaringan Optik Pasif, Dynamic Host Configuration Protocol (DHCP, Quality of Service (QoS ABSTRACTWireless communication technology development leading to technologies that network-based IP (Internet Protocol. Access Point Wireless Router is a device. Access point forming a hot spot, while the router manage data traffic. Parameters measured in this research is Quality of Service (QoS. among other things, measuring jitter, delay, and packet loss. resulting in packet data service. Jitter value among ADSL fellow have the average on smartphones 143.36 ms. On laptop average be at 45.6 ms. While jitter value among GPON fellow user have the average on smartphone 133.12 ms. On laptop average be at 45.56 ms. The average value of the delay to ADSL fellow users on smartphones 99.04 ms and on laptop average be at 56.33 ms. While delay value among GPON fellow user have the average on smartphone 97.96 ms while on laptop average be 56.15 ms. Packet loss from the test results, both have the same percentage of 1%. Keywords: Asymmetric Digital Subscriber Line (ADSL, Gigabyte Passive Optical Network (GPON, Dynamic Host Configuration Protocol (DHCP, Quality of Service (QoS

  18. Analisis Peta Persepsi Pemilihan Atribut Produk Laptop Di Kalangan Mahasiswa Universitas Telkom Kota Bandung (Studi Pada Laptop Acer, Asus, Lenovo, Toshiba, HP, Samsung dan Apple

    Directory of Open Access Journals (Sweden)

    Wiwik Melwinda

    2017-04-01

    Full Text Available This research aims to find out laptop brand selection perceptual map of among Telkom University students. The object of this research study are some of incoming laptop brand in Top Brand 2016 which are Acer, Lenovo, Asus, Toshiba, HP, Samsung and Apple. The attributes of the study are design instrument, operation system, variation, feature set, specification, processor, battery resistance, product price, price resale, warranty, LCD display, storage capacity, product quality, sustainability to defect, and keyboard quality. This research used quantitative method. Research instrument used was a questionnaire, which distributed to 100 respondent sample area of the object of research. In taking a sample of this study, the researcher used Non-Probability technique by using purposive sampling method. The data analysis that used is multidimensional scalling analysis, this analysis gives perception map picture, appeared the position of each laptop brand that is close together or far apart. Laptop brand that showed in a perceptual map will display rank of the best position than another laptop brand. As perception, Apple occupies the first best position among another best laptop brands. That is proved by the rank position from respondents preference based on overall attributes which is more excellent in design, operation system, variation, feature set, specification, processor, battery resistance, product quality, and keyboard quality. For price product attribute is occupied by Lenovo as the cheapest rather than another laptop brands. Meanwhile, for the LCD display attribute, price resale, and storage capacity are occupied by Asus which get the second best rank based overall attribute.

  19. RANCANGAN SISTEM PENGAMBILAN KEPUTUSAN DALAM MENENTUKAN PILIHAN PRODUK LAPTOP MENGGUNAKAN METODE SIMPLE ADDITIVE WEIGHT (SAW

    Directory of Open Access Journals (Sweden)

    Tri Susilowati

    2017-05-01

    Full Text Available Seiring dengan perkembangan zaman, kebutuhan masyarakatpun semakin meningkat. Begitu pula dengan kebutuhan akan teknologi.Teknologi diciptakan  untuk memberi kemudahan kepada manusia, salah satu contohnya adalah Laptop (komputer jinjing. Perkembangan produk laptop pada saat ini sudah berkembang begitu pesat dan banyak sekali persaingan. Banyaknya produk laptop yang ditawarkan, akan membuat konsumen bingung dalam hal pemilihan produk. Konsumen akan lebih selektif dan teliti untuk memutuskan dan kemudian membeli dari beberapa pilihan produk laptop yang ada. Untuk membantu konsumen dalam menentukan pilihan produk laptop, maka dibutuhkan sebuah sistem pengambilan keputusan menggunakan FMADM (Fuzzy Multiple Attribute Decission Making dengan metode SAW (Simple additive Weight. Metode ini digunakan untuk menentukan sebuah alternatif pilihan berdasarkan bobot dan kriteria yang sudah ditentukan. Kemudian dilakukan proses perankingan yang akan menentukan alternatif yang terbaik, yaitu produk laptop yang sesuai dengan keinginan konsumen. Dalam penelitian ini, diberikan 4 alternatif pilihan produk laptop yaitu Laptop merk Acer, Toshiba, Asus dan HP. Setelah dilakukan proses normalisasi untuk tiap – tiap kriteria, dan perkalian hasil normalisasi dengan bobot untuk setiap kriteria, maka didapatkan  produk Laptop merk Acer sebagai produk pilihan karena mempunyai niali akhir terbasar yaitu 0,91.

  20. Distributed Estimation, Coding, and Scheduling in Wireless Visual Sensor Networks

    Science.gov (United States)

    Yu, Chao

    2013-01-01

    In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…

  1. Flexible thermoelectric device to harvest waste heat from the laptop

    Science.gov (United States)

    Salhi, Imane; Belhora, Fouad; Hajjaji, Abdelowahed; Jay, Jacques; Boughaleb, Yahia

    2017-05-01

    Recovering waste heat from integrated circuits of a laptop using thermoelectricity effects seems to be an appropriate process to enhance its efficiency. Thermoelectricity, as an energy harvesting process, helps to gain on both sides: financially as it reduces the energy consumption and environmentally as it minimizes the carbon footprint. This paper presents a flexible thermoelectric generator module which is developed to harvest waste heat of the laptop to power up some external loads. First, a theoretical analysis of the system is provided where both thermal and electrical models are exposed. Second, an estimation of the power density harvested by only one thermoelectric leg is given. This estimation can reach 0.01 µW/cm2 and it is confirmed by a numerical simulation based on the finite element method. Afterwards, this power density is improved to become 0.4 µW/cm2 by adding a heat sink in the cold side showing that the thermal resistances of the air and of the heat sink play a crucial role in transferring the temperature gradient to the thermoelectric (TE) material. Finally, it is indicated that the power harvested can be enough to power up portion of the circuitry or other important micro-accessories by using numerous thermoelectric modules.

  2. Home and School Technology: Wired versus Wireless.

    Science.gov (United States)

    Van Horn, Royal

    2001-01-01

    Presents results of informal research on smart homes and appliances, structured home wiring, whole-house audio/video distribution, hybrid cable, and wireless networks. Computer network wiring is tricky to install unless all-in-one jacketed cable is used. Wireless phones help installers avoid pre-wiring problems in homes and schools. (MLH)

  3. 78 FR 34669 - Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data...

    Science.gov (United States)

    2013-06-10

    ..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... importing wireless communication devices, portable music and data processing devices, and tablet computers... filed by Samsung Electronics Co., Ltd. of Korea and Samsung Telecommunications America, LLC of...

  4. Introductory survey for wireless infrared communications

    Directory of Open Access Journals (Sweden)

    Munsif Ali Jatoi

    2014-08-01

    Full Text Available Wireless infrared communications can be defined as the propagation of light waves in free space using infrared radiation whose range is 400–700 nm. This range corresponds to frequencies of hundreds of terahertz, which is high for higher data rate applications. Wireless infrared is applied for higher data rates applications such as wireless computing, wireless video and wireless multimedia communication applications. Introduced by Gfeller, this field has grown with different link configurations, improved transmitter efficiency, increased receiver responsivity and various multiple access techniques for improved quality. Errors are caused because of background light, which causes degradation overall system performance. Error correction techniques are used to remove the errors caused during transmission. This study provides a brief account on field theory used for error correction in wireless infrared systems. The results are produced in terms of bit error rate and signal-to-noise ratio for various bit lengths to show the ability of encoding and decoding algorithms.

  5. Wireless Technologies, Ubiquitous Computing and Mobile Health: Application to Drug Abuse Treatment and Compliance with HIV Therapies.

    Science.gov (United States)

    Boyer, Edward W; Smelson, David; Fletcher, Richard; Ziedonis, Douglas; Picard, Rosalind W

    2010-06-01

    Beneficial advances in the treatment of substance abuse and compliance with medical therapies, including HAART, are possible with new mobile technologies related to personal physiological sensing and computational methods. When incorporated into mobile platforms that allow for ubiquitous computing, these technologies have great potential for extending the reach of behavioral interventions from clinical settings where they are learned into natural environments.

  6. Wireless Sensor Network for Indoor Air Quality Monitoring

    Directory of Open Access Journals (Sweden)

    Jun Li

    2014-06-01

    Full Text Available Indoor air quality monitoring system consists of wireless sensor device, nRF24L01 wireless transceiver modules, C8051MCU, STM32103 remote monitoring platform, alarm device and data server. Distributed in the interior space of wireless sensors measure parameters of the local air quality, wireless transceiver module of the MCU to transmit data to the remote monitoring platform for analysis which displayed and stored field environment data or charts. The data collecting from wireless sensors to be send by wireless Access Point to the remote data server based on B/S architecture, intelligent terminals such as mobile phone, laptop, tablet PC on the Internet monitor indoor air quality in real-time. When site environment air quality index data exceeds the threshold in the monitoring device, the remote monitoring platform sends out the alarm SMS signal to inform user by GSM module. Indoor air quality monitoring system uses modular design method, has the portability and scalability has the low manufacture cost, real-time monitoring data and man-machine interaction.

  7. Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    Organizations rely on physical, digital and social mechanisms to protect their IT systems. Of all IT systems, laptops are probably the most troublesome to protect, since they are easy to remove and conceal. When the thief has physical possession of the laptop, it is also difficult to protect the

  8. Laptop theft: a case study on effectiveness of security mechanisms in open organizations

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    Organizations rely on physical, technical and procedural mechanisms to protect their physical assets. Of all physical assets, laptops are the probably the most troublesome to protect, since laptops are easy to remove and conceal. Organizations open to the public, such as hospitals and universities,

  9. Laptop theft: a case study on effectiveness of security mechanisms in open organizations

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    Organizations rely on physical, technical and procedural mechanisms to protect their IT systems. Of all IT systems, laptops are the probably the most troublesome to protect, since they are easy to remove and conceal. When the thief has physical possession of the laptop, it is difficult to protect

  10. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    National Research Council Canada - National Science Library

    Kessel, Adam; Goodwin, Shane

    2005-01-01

    The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...

  11. Imaging the Messier objects remotely from your laptop

    CERN Document Server

    Adam, Len

    2018-01-01

    This is a guide for anyone interested in practical astronomy but intimidated by the idea of investing in a telescope. It explores the world of remote observing, which requires nothing more than a laptop and an Internet connection. The book aims to make readers comfortable navigating the plethora of online equipment at their disposal and to show that a challenge like imaging the Messier objects can be fun, simple, and achievable for all. In this text, all 110 Messier objects are discussed, each one remotely imaged with clear instructions on what telescope and camera combinations give the best results. Common astronomical phrases and units are all explained and illustrated to help newcomers get a grasp of terminology. Tidbits of history and quotes from Messier and other astronomers round out this beginner-friendly read, which also features a handy Quick Reference Image Library.

  12. Quality-of-service sensitivity to bio-inspired/evolutionary computational methods for intrusion detection in wireless ad hoc multimedia sensor networks

    Science.gov (United States)

    Hortos, William S.

    2012-06-01

    In the author's previous work, a cross-layer protocol approach to wireless sensor network (WSN) intrusion detection an identification is created with multiple bio-inspired/evolutionary computational methods applied to the functions of the protocol layers, a single method to each layer, to improve the intrusion-detection performance of the protocol over that of one method applied to only a single layer's functions. The WSN cross-layer protocol design embeds GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layer, respectively. The construct neglects to assess the net effect of the combined bioinspired methods on the quality-of-service (QoS) performance for "normal" data streams, that is, streams without intrusions. Analytic expressions of throughput, delay, and jitter, coupled with simulation results for WSNs free of intrusion attacks, are the basis for sensitivity analyses of QoS metrics for normal traffic to the bio-inspired methods.

  13. Secure Wireless Military Healthcare Telemedicine Enterprise

    National Research Council Canada - National Science Library

    Lucas, Kenneth W

    2005-01-01

    ... wireless PDA devices, and miniature computers, to existing DoD legacy and developing healthcare information systems, clinical repositories, and knowledge base systems for application at the point of care...

  14. Overview of the Meraka wireless grid test bed for evaluation of ad-hoc routing protocols

    CSIR Research Space (South Africa)

    Johnson, D

    2007-09-01

    Full Text Available - and worst-case data rate in a network with shared channel access, as the number of hops increases. However, recent work done by the same authors [3] using a real test bed, employing laptops equipped with Standard (“802.11”) based radios..., OLSR and DYMO Index Terms—ad-hoc networks, IEEE 802.11 standard, wireless grid test bed I.INTRODUCTION One of the key challenges for researchers in the field of wireless networking protocol design, is the ability to carry out...

  15. Should laptops be allowed in the classroom? Two viewpoints: viewpoint 1: laptops in classrooms facilitate curricular advancement and promote student learning and viewpoint 2: deconstructing and rethinking the use of laptops in the classroom.

    Science.gov (United States)

    Spallek, Heiko; von Bergmann, HsingChi

    2014-12-01

    This Point/Counterpoint article discusses the pros and cons of deploying one aspect of instructional technology in dental education: the use of laptops in the classroom. Two opposing viewpoints, written by different authors, evaluate the arguments. Viewpoint 1 argues that laptops in classrooms can be a catalyst for rapid curricular advancement and prepare dental graduates for the digital age of dentistry. As dental education is not limited to textual information, but includes skill development in spatial relationships and hands-on training, technology can play a transformative role in students' learning. Carefully implemented instructional technology can enhance student motivation when it transforms students from being the objects of teaching to the subjects of learning. Ubiquitous access to educational material allows for just-in-time learning and can overcome organizational barriers when, for instance, introducing interprofessional education. Viewpoint 2 argues that, in spite of widespread agreement that instructional technology leads to curricular innovation, the notion of the use of laptops in classrooms needs to be deconstructed and rethought when effective learning outcomes are sought. Analyzing the purpose, pedagogy, and learning product while applying lessons learned from K-12 implementation leads to a more complex picture of laptop integration in dental classrooms and forms the basis for questioning the value of such usage. For laptop use to contribute to student learning, rather than simply providing opportunity for students to take notes and access the Internet during class, this viewpoint emphasizes that dental educators need to think carefully about the purpose of this technology and to develop appropriate pedagogical strategies to achieve their objectives. The two viewpoints agree that significant faculty development efforts should precede any introduction of technology into the educational process and that technology alone cannot change education

  16. The initial response of secondary mathematics teachers to a one-to-one laptop program

    Science.gov (United States)

    Zuber, Edward Nordin; Anderson, Judy

    2013-06-01

    Studies of one-to-one programs consistently report lower use of laptops in mathematics classrooms compared to other subjects but do not elaborate reasons for these observations. This mixed-method study investigated the experiences and beliefs of 28 mathematics teachers at five secondary schools during the second year of the New South Wales Digital Education Revolution laptop program. While some mathematics teachers planned for students to use their laptops up to once a week, most reported less frequent use in the classroom. Teachers were grouped into categories "Non Adopters," "Cautious Adopters," and "Early Adopters" according to reported classroom use of laptops, then analysed for differences in confidence, knowledge, and beliefs relating to technology for teaching and learning mathematics. A prevalent belief limiting laptop use is that students authentically learn mathematics only using pen and paper. Cautious Adopters and Non Adopters expressed beliefs that laptops exacerbate classroom management problems, especially for lower-achieving students. In the context of ability-streamed classes these beliefs effectively ruled out use of laptops for entire classrooms.

  17. viewshed analysis of federal university of technology yola, wireless ...

    African Journals Online (AJOL)

    BARTH EKWUEME

    IDRISI 32: for line-of-sight and viewshed analysis. Hardware: i. HP Scanner; to scan the topographic map of the study area. ii. Laptop computer (HP dv6) iii. Hand held Garmin 12 GPS receiver; to obtain the coordinates of some selected points within the study area iv. Printer (HP DeskJet 2050 series). Methodology and Data ...

  18. Wireless Headset Communication System

    Science.gov (United States)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  19. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  20. Household wireless electroencephalogram hat

    Science.gov (United States)

    Szu, Harold; Hsu, Charles; Moon, Gyu; Yamakawa, Takeshi; Tran, Binh

    2012-06-01

    We applied Compressive Sensing to design an affordable, convenient Brain Machine Interface (BMI) measuring the high spatial density, and real-time process of Electroencephalogram (EEG) brainwaves by a Smartphone. It is useful for therapeutic and mental health monitoring, learning disability biofeedback, handicap interfaces, and war gaming. Its spec is adequate for a biomedical laboratory, without the cables hanging over the head and tethered to a fixed computer terminal. Our improved the intrinsic signal to noise ratio (SNR) by using the non-uniform placement of the measuring electrodes to create the proximity of measurement to the source effect. We computing a spatiotemporal average the larger magnitude of EEG data centers in 0.3 second taking on tethered laboratory data, using fuzzy logic, and computing the inside brainwave sources, by Independent Component Analysis (ICA). Consequently, we can overlay them together by non-uniform electrode distribution enhancing the signal noise ratio and therefore the degree of sparseness by threshold. We overcame the conflicting requirements between a high spatial electrode density and precise temporal resolution (beyond Event Related Potential (ERP) P300 brainwave at 0.3 sec), and Smartphone wireless bottleneck of spatiotemporal throughput rate. Our main contribution in this paper is the quality and the speed of iterative compressed image recovery algorithm based on a Block Sparse Code (Baranuick et al, IEEE/IT 2008). As a result, we achieved real-time wireless dynamic measurement of EEG brainwaves, matching well with traditionally tethered high density EEG.

  1. Dose estimative in operators during petroleum wells logging with nuclear wireless probes through computer modelling; Estimativa da dose em operadores durante procedimentos de perfilagem de pocos de petroleo com sondas wireless nucleares atraves de modelagem computacional

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Edmilson Monteiro de; Silva, Ademir Xavier da; Lopes, Ricardo T., E-mail: emonteiro@nuclear.ufrj.b, E-mail: ademir@nuclear.ufrj.b, E-mail: ricardo@lin.ufrj.b [Coordenacao dos Programas de Pos-Graduacao de Engenharia (COPPE/UFRJ), Rio de Janeiro, RJ (Brazil). Programa de Engenharia Nuclear; Lima, Inaya C.B., E-mail: inaya@lin.ufrj.b [Coordenacao dos Programas de Pos-Graduacao de Engenharia (COPPE/UFRJ), Rio de Janeiro, RJ (Brazil). Programa de Engenharia Nuclear; Instituto Politecnico do Rio de Janeiro (IPRJ/UERJ), Nova Friburgo, RJ (Brazil); Correa, Samanda Cristine Arruda, E-mail: scorrea@cnen.gov.b [Comissao Nacional de Energia Nuclear (DIAPI/CGMI/CNEN), Rio de Janeiro, RJ (Brazil); Rocha, Paula L.F., E-mail: ferrucio@acd.ufrj.b [Universidade Federal do Rio de Janeiro (UFRJ)., RJ (Brazil). Dept. de Geologia

    2011-10-26

    This paper evaluates the absorbed dose and the effective dose on operators during the petroleum well logging with nuclear wireless that uses gamma radiation sources. To obtain the data, a typical scenery of a logging procedure will be simulated with MCNPX Monte Carlo code. The simulated logging probe was the Density Gamma Probe - TRISOND produced by Robertson Geolloging. The absorbed dose values were estimated through the anthropomorphic simulator in male voxel MAX. The effective dose values were obtained using the ICRP 103

  2. Voice Quality Estimation in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Petr Zach

    2015-01-01

    Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.

  3. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  4. Advanced Wireless Sensor Nodes - MSFC

    Science.gov (United States)

    Varnavas, Kosta; Richeson, Jeff

    2017-01-01

    NASA field center Marshall Space Flight Center (Huntsville, AL), has invested in advanced wireless sensor technology development. Developments for a wireless microcontroller back-end were primarily focused on the commercial Synapse Wireless family of devices. These devices have many useful features for NASA applications, good characteristics and the ability to be programmed Over-The-Air (OTA). The effort has focused on two widely used sensor types, mechanical strain gauges and thermal sensors. Mechanical strain gauges are used extensively in NASA structural testing and even on vehicle instrumentation systems. Additionally, thermal monitoring with many types of sensors is extensively used. These thermal sensors include thermocouples of all types, resistive temperature devices (RTDs), diodes and other thermal sensor types. The wireless thermal board will accommodate all of these types of sensor inputs to an analog front end. The analog front end on each of the sensors interfaces to the Synapse wireless microcontroller, based on the Atmel Atmega128 device. Once the analog sensor output data is digitized by the onboard analog to digital converter (A/D), the data is available for analysis, computation or transmission. Various hardware features allow custom embedded software to manage battery power to enhance battery life. This technology development fits nicely into using numerous additional sensor front ends, including some of the low-cost printed circuit board capacitive moisture content sensors currently being developed at Auburn University.

  5. Multimodal Transportation: The Case of Laptop from Chongqing in China to Rotterdam in Europe

    Directory of Open Access Journals (Sweden)

    Young Joon Seo

    2017-09-01

    Full Text Available Multimodal transportation is a key component of modern logistics systems, especially for long-distance transnational transportation. This paper explores the various alternative routes for laptop exports from Chongqing, China to Rotterdam, the Netherlands. It selects seven available routes for laptop transportation from Chongqing to Rotterdam. The multimodal model was adopted to demonstrate alternative routes using various factors such as transport cost, transfer cost, transit time, transport distance, document charge, port congestion surcharge, customs charge, confidence index and so on. Among possible alternative routes, the results indicate that the route 6 was the fastest routes except for the air transport (route 7, while the route 1 was the cheapest and safest way. Nonetheless, route 1 may be not suitable for the laptop transport due to the importance of timeliness. The logisticians may able to utilize this research's findings to make a balance between transit time and transport cost for effective multimodal transport of laptops from Chongqing to Rotterdam.

  6. A case of a laptop learning campus: how do technology choices affect perceptions?

    Directory of Open Access Journals (Sweden)

    Jennifer Percival

    2009-12-01

    Full Text Available Laptop learning programs have been developed to create ubiquitous online learning environments. Given the infancy of many programs, there is little understanding of aspects of the program are perceived to provide value to faculty and students. This paper focuses on the value proposition (with respect to perceived benefits versus capital investment for undergraduate students in a mandatory, campus-wide, comprehensive laptop learning program. Results indicate that the perceived value of the laptop for technical programs such as science, engineering, and information technology, and liberal arts programs such as business and criminology, justice, and policy studies are significantly different. This difference results in a clear need to use different laptop learning models for each type of program and that a single campus-wide model will likely prove unsatisfactory for most students. A need to better communicate the true value of industry-specific software and skills acquisition is also highlighted.

  7. 78 FR 16865 - Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data...

    Science.gov (United States)

    2013-03-19

    ..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... Samsung Electronics Co., Ltd. of Seoul, Republic of Korea, and Samsung Telecommunications America, LLC of... certain electronic devices, including wireless communication devices, portable music and data processing...

  8. WIRELESS PHYSICAL LAYER SECURITY: PART 1

    OpenAIRE

    Saad , Walid; ZHOU , XIANGYUN; Debbah , Mérouane; Poor , H. Vincent

    2015-01-01

    This is an editorial; International audience; The ongoing paradigm shift from classical centralized wireless technologies toward distributed large-scale networks such as the Internet of Things has introduced new security challenges that cannot be fully handled via traditional cryptgraphic means. In such emerging wireless environments , devices have limited capabilities and are not controlled by a central control center; thus, the implementation of computationally expensive cryptographic techn...

  9. BackTrack testing wireless network security

    CERN Document Server

    Cardwell, Kevin

    2013-01-01

    Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks.All you need is some experience with networks and computers and you will be ready to go.

  10. Fading and interference mitigation in wireless communications

    CERN Document Server

    Panic, Stefan; Anastasov, Jelena; Spalevic, Petar

    2013-01-01

    The rapid advancement of various wireless communication system services has created the need to analyze the possibility of their performance improvement. Introducing the basic principles of digital communications performance analysis and its mathematical formalization, Fading and Interference Mitigation in Wireless Communications will help you stay up to date with recent developments in the performance analysis of space diversity reception over fading channels in the presence of cochannel interference.The book presents a unified method for computing the performance of digital communication sys

  11. Wireless sensor data acquisition on remote locations

    OpenAIRE

    Apat, Mark

    2010-01-01

    Systems for remote wireless acquisition of sensor data are an important field of technology which combines knowledge from computer science and electronics. Development of such systems is facilitated by wireless standards like ZigBee which improve and simplify such a development. This diploma thesis describes the design and realization of a ZigBee standard based system and the corresponding application for data acquisition and control of remote sensors. The system is capable of acquiring va...

  12. A Wireless Sensor Enabled by Wireless Power

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-01-01

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network. PMID:23443370

  13. A Wireless Sensor Enabled by Wireless Power

    Directory of Open Access Journals (Sweden)

    Da-Sheng Lee

    2012-11-01

    Full Text Available Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  14. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  15. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Many wireless technologies are already available for sensor applications. It is inevitable that many non-interoperable wireless technologies between 400 MHz and 5.8...

  16. Simulation of Wireless Digital Communication Systems

    Directory of Open Access Journals (Sweden)

    A. Mohammed

    2004-12-01

    Full Text Available Due to the explosive demands for high speed wireless services, suchas wireless Internet, email and cellular video conferencing, digitalwireless communications has become one of the most exciting researchtopics in electrical and electronic engineering field. The never-endingdemand for such personal and multimedia services, however, demandstechnologies operating at higher data rates and broader bandwidths. Inaddition, the complexity of wireless communication and signalprocessing systems has grown considerably during the past decade.Therefore, powerful computer­aided techniques are required for theprocess of modeling, designing, analyzing and evaluating theperformance of digital wireless communication systems. In this paper wediscuss the basic propagation mechanisms affecting the performance ofwireless communication systems, and present a simple, powerful andefficient way to simulate digital wireless communication systems usingMatlab. The simulated results are compared with the theoreticalanalysis to validate the simulator. The simulator is useful inevaluating the performance of wireless multimedia services and theassociated signal processing structures and algorithms for current andnext generation wireless mobile communication systems.

  17. One Laptop per Child and its Implications for the Process of Written Language Learning: A Case Study in Brazil

    Directory of Open Access Journals (Sweden)

    Silvia de Oliveira Kist

    2013-08-01

    Full Text Available This is a case study on the reading and writing practices of six year old children engaged in the daily use of digital technology, conducted in a public school in Porto Alegre (RS/Brazil and made possible by the One Laptop per Child (OLPC project. Its aim was to investigate the practices carried out by students and the possibilities and conditions under which the computer can become a tool that enables them to enter the “literate world”. The students’ practices were examined based on three units of analysis: practices proposed by a teacher, spontaneous practices and representative cases. These practices were categorized into three areas: literacy, fluency of written language and technological fluency. The research began with a theoretical proposal that had to be modified as a result of the study, and emphasizes the importance of pedagogical proposals for children in the initial process of written language learning.

  18. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  19. Coexistence issues for a 2.4 GHz wireless audio streaming in presence of bluetooth paging and WLAN

    Science.gov (United States)

    Pfeiffer, F.; Rashwan, M.; Biebl, E.; Napholz, B.

    2015-11-01

    Nowadays, customers expect to integrate their mobile electronic devices (smartphones and laptops) in a vehicle to form a wireless network. Typically, IEEE 802.11 is used to provide a high-speed wireless local area network (WLAN) and Bluetooth is used for cable replacement applications in a wireless personal area network (PAN). In addition, Daimler uses KLEER as third wireless technology in the unlicensed (UL) 2.4 GHz-ISM-band to transmit full CD-quality digital audio. As Bluetooth, IEEE 802.11 and KLEER are operating in the same frequency band, it has to be ensured that all three technologies can be used simultaneously without interference. In this paper, we focus on the impact of Bluetooth and IEEE 802.11 as interferer in presence of a KLEER audio transmission.

  20. Help is in your pocket: the potential accuracy of smartphone- and laptop-based remotely guided resuscitative telesonography.

    Science.gov (United States)

    McBeth, Paul; Crawford, Innes; Tiruta, Corina; Xiao, Zhengwen; Zhu, George Qiaohao; Shuster, Michael; Sewell, Les; Panebianco, Nova; Lautner, David; Nicolaou, Savvas; Ball, Chad G; Blaivas, Michael; Dente, Christopher J; Wyrzykowski, Amy D; Kirkpatrick, Andrew W

    2013-12-01

    Ultrasound (US) examination has many uses in resuscitation, but to use it to its full effectiveness typically requires a trained and proficient user. We sought to use information technology advances to remotely guide US-naive examiners (UNEs) using a portable battery-powered tele-US system mentored using either a smartphone or laptop computer. A cohort of UNEs (5 tactical emergency medicine technicians, 10 ski-patrollers, and 4 nurses) was guided to perform partial or complete Extended Focused Assessment with Sonography of Trauma (EFAST) examinations on both a healthy volunteer and on a US phantom, while being mentored by a remote examiner who viewed the US images over either an iPhone(®) (Apple, Cupertino, CA) or a laptop computer with an inlaid depiction of the US probe and the "patient," derived from a videocamera mounted on the UNE's head. Examinations were recorded as still images and over-read from a Web site by seven expert reviewers (ERs) (three surgeons, two emergentologists, and two radiologists). Examination goals were to identify lung sliding (LS) documented by color power Doppler (CPD) in the human and to identify intraperitoneal (IP) fluid in the phantom. All UNEs were successfully mentored to easily and clearly identify both LS (19 determinations) and IP fluid (14 determinations), as assessed in real time by the remote mentor. ERs confirmed IP fluid in 95 of 98 determinations (97%), with 100% of ERs perceiving clinical utility for the abdominal Focused Assessment with Sonography of Trauma. Based on single still CPD images, 70% of ERs agreed on the presence or absence of LS. In 16 out of 19 cases, over 70% of the ERs felt the EFAST exam was clinically useful. UNEs can confidently be guided to obtain critical findings using simple information technology resources, based on the receiving/transmitting device found in most trauma surgeons' pocket or briefcase. Global US mentoring requires only Internet connectivity and initiative.

  1. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  2. Measurements on an autonomous wireless payload at 635 km distance using a sensitive radio telescope

    NARCIS (Netherlands)

    Bentum, Marinus Jan; Leijtens, Johan; Verhoeven, Chris; van der Marel, Hans

    2011-01-01

    The Delfi-C3 spacecraft carries the first autonomous wireless payload in space. This payload is a wireless sun sensor developed by TNO in the Netherlands. The data captured by the sensor is wirelessly transported to the central computer system inside the spacecraft. Since no additional power supply

  3. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireles...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  4. Energy efficiency of error correcting mechanisms for wireless communications

    NARCIS (Netherlands)

    Havinga, Paul J.M.

    We consider the energy efficiency of error control mechanisms for wireless communication. Since high error rates are inevitable to the wireless environment, energy efficient error control is an important issue for mobile computing systems. Although good designed retransmission schemes can be optimal

  5. Power Analysis of an Enterprise Wireless Communication Architecture

    Science.gov (United States)

    2017-09-01

    ANALYSIS OF AN ENTERPRISE WIRELESS COMMUNICATION ARCHITECTURE by Howen Q. Fernando September 2017 Thesis Advisor: Ronald Giachetti Second...TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE POWER ANALYSIS OF AN ENTERPRISE WIRELESS COMMUNICATION ARCHITECTURE 5. FUNDING NUMBERS 6...develops and analyzes a model to demonstrate that an enterprise computing architecture for Software Defined Radios results in significant power savings

  6. Computing Battery Lifetime Distributions

    NARCIS (Netherlands)

    Cloth, L.; Haverkort, Boudewijn R.H.M.; Jongerden, M.R.

    The usage of mobile devices like cell phones, navigation systems, or laptop computers, is limited by the lifetime of the included batteries. This lifetime depends naturally on the rate at which energy is consumed, however, it also depends on the usage pattern of the battery. Continuous drawing of a

  7. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...

  8. Preservice Teachers' Perceptions about Using Mobile Phones and Laptops in Education as Mobile Learning Tools

    Science.gov (United States)

    Sad, Süleyman Nihat; Göktas, Özlem

    2014-01-01

    The purpose of this research was to investigate preservice teachers' perceptions about using m-phones and laptops in education as mobile learning tools. A total of 1087 preservice teachers participated in the study. The results indicated that preservice teachers perceived laptops potentially stronger than m-phones as m-learning tools. In…

  9. Pre-Service Teachers' Reflections: The Influence of School 1:1 Laptop Programs on Their Developing Teaching Practice

    Science.gov (United States)

    Blackley, Susan; Walker, Rebecca

    2017-01-01

    Throughout Australia, many government and non-government schools have implemented a one-laptop-per-student (1:1) policy. Whilst there was initial interest in the implementation of these programs, little has been done to track the uptake of digital learning technologies afforded by access to the laptops. This study examined pre-service teachers'…

  10. Intrusion detection and monitoring for wireless networks.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  11. Biomedical Wireless Ambulatory Crew Monitor

    Science.gov (United States)

    Chmiel, Alan; Humphreys, Brad

    2009-01-01

    A compact, ambulatory biometric data acquisition system has been developed for space and commercial terrestrial use. BioWATCH (Bio medical Wireless and Ambulatory Telemetry for Crew Health) acquires signals from biomedical sensors using acquisition modules attached to a common data and power bus. Several slots allow the user to configure the unit by inserting sensor-specific modules. The data are then sent real-time from the unit over any commercially implemented wireless network including 802.11b/g, WCDMA, 3G. This system has a distributed computing hierarchy and has a common data controller on each sensor module. This allows for the modularity of the device along with the tailored ability to control the cards using a relatively small master processor. The distributed nature of this system affords the modularity, size, and power consumption that betters the current state of the art in medical ambulatory data acquisition. A new company was created to market this technology.

  12. Wireless Augmented Reality Communication System

    Science.gov (United States)

    Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)

    2016-01-01

    The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.

  13. How to model wireless mesh networks topology

    International Nuclear Information System (INIS)

    Sanni, M L; Hashim, A A; Anwar, F; Ali, S; Ahmed, G S M

    2013-01-01

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  14. Growth of wireless technology in healthcare institutions.

    Science.gov (United States)

    Riha, Chris

    2006-01-01

    As wireless technologies evolve and interoperate, the practical application for healthcare providers and organizations grows exponentially. By providing increased access to patient data, decision-making tools (e.g., computer aided decision systems such as ECG analysis programs), error reduction systems (i.e., pharmaceutical error prevention software), the benefits of wireless technology can be immense. However, as with all technological innovations, wireless systems must be carefully planned and managed. As the wireless spectrum becomes more crowded with both complementary and competing systems, bandwidth utilization and the potential for interference grows greatly. Clinical engineering personnel need to be actively involved in the management of wireless system management within a healthcare facility to avoid interference problems that could disrupt patient care, especially as the deployment of wireless systems expands. Additionally, public exposure to RF energy in a healthcare setting may need to be monitored and evaluated as the utilization of this energy spectrum continues to grow. All manufacturers of RF emitting devices are required to list the specific absorption rate of their specific device. However, there is no monitoring of the cumulative effect of multiple devices and systems. As of press time, this has not been an issue. But it is something to consider as we continue to find useful applications for this technology.

  15. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  16. Integrated 3d printed wireless sensing system for environmental monitoring

    KAUST Repository

    Farooqui, Muhammad Fahad

    2017-12-21

    Disclosed are various embodiments of a wireless sensor device for monitoring environment conditions. A wireless sensor device may comprise, for example, a computing device, printable circuitry, sensors, and antennas combined with one or more transmitters on a panel. The wireless sensor device may be configured to take environment measurements, such as temperature, gas, humidity, and wirelessly communicate the environment measurements to a remote computing device, in addition, the present disclosure relates to a method of assembling the wireless sensor device. The method may comprise printing sensors, circuitry, and antennas to a panel; folding the panel to form an enclosure comprising a plurality of side panels; and attaching the plurality of side panels to a circuit board panel.

  17. Investigating Students' Perceptions on Laptop Initiative in Higher Education: An Extension of the Technology Acceptance Model

    Science.gov (United States)

    Elwood, Susan; Changchit, Chuleeporn; Cutshall, Robert

    2006-01-01

    Purpose: This study aims to examine students' perceptions and their acceptance towards implementing a laptop program. Design/methodology/approach: Extensive research has been carried out on the technology acceptance model (TAM) to better understand the behavioral intention of individuals to accept and use technology. Therefore, the TAM was adopted…

  18. Teaching with Laptops for the First Time: Lessons from a Social Science Classroom

    Science.gov (United States)

    Granberg, Ellen; Witte, James

    2005-01-01

    This chapter describes the experience of two faculty members who implemented laptop technology in a lower-division social science course. The authors focus on the pragmatic issues associated with incorporating this technology into the social science classroom and recommend several strategies and resources.

  19. Educational laptops in public schools: digital literacy and possibilities of transforming pedagogical practices

    Directory of Open Access Journals (Sweden)

    Carla Beatris Valentini

    2013-01-01

    Full Text Available The presence of educational laptops in the routine of students and teachers might contribute for the construction of innovative alternatives for the teaching practice. With that in mind, this paper starts with the idea that the insertion of educational laptops in 1:1 model might be a disturbing element, triggering a process of reflection and awareness of the teaching practice on teachers themselves. That could lead to redimensioning the pedagogical practice in a movement towards including the laptop significantly in the school routine. We present a case study from an exploratory perspective about the insertion of laptops in a public school (from elementary to junior high, analyzing the process of digital literacy taking place in that school community. In that sense, digital literacy implies on the interaction in social networks that allow exploration and research, teaching and criticizing in a construction process of learning and knowing mediated by digital technologies. To do so, from the non-linearity that accompanies the communication flows emerging from these technologies, students and teachers are instigated to find new meanings, where reading and writing consist in sharing knowledge and opinions and not only an assignment to hand in.

  20. Learning in One-to-One Laptop Environments: A Meta-Analysis and Research Synthesis

    Science.gov (United States)

    Zheng, Binbin; Warschauer, Mark; Lin, Chin-Hsi; Chang, Chi

    2016-01-01

    Over the past decade, the number of one-to-one laptop programs in schools has steadily increased. Despite the growth of such programs, there is little consensus about whether they contribute to improved educational outcomes. This article reviews 65 journal articles and 31 doctoral dissertations published from January 2001 to May 2015 to examine…

  1. Accessing Flexible Learning Opportunities: Children's and Young People's Use of Laptops in a Paediatric Hospital

    Science.gov (United States)

    Nisselle, Amy; Hanns, Shaun; Green, Julie; Jones, Tony

    2012-01-01

    Hospitalised children and young people not only face challenges to their health but also to their continued education and social connections. These challenges can impact on future life trajectories, so it is crucial to maintain learning and socialising. Educational technologies, such as laptops and iPads, are used in the multidisciplinary…

  2. A new type of intelligent wireless sensing network for health monitoring of large-size structures

    Science.gov (United States)

    Lei, Ying; Liu, Ch.; Wu, D. T.; Tang, Y. L.; Wang, J. X.; Wu, L. J.; Jiang, X. D.

    2009-07-01

    In recent years, some innovative wireless sensing systems have been proposed. However, more exploration and research on wireless sensing systems are required before wireless systems can substitute for the traditional wire-based systems. In this paper, a new type of intelligent wireless sensing network is proposed for the heath monitoring of large-size structures. Hardware design of the new wireless sensing units is first studied. The wireless sensing unit mainly consists of functional modules of: sensing interface, signal conditioning, signal digitization, computational core, wireless communication and battery management. Then, software architecture of the unit is introduced. The sensing network has a two-level cluster-tree architecture with Zigbee communication protocol. Important issues such as power saving and fault tolerance are considered in the designs of the new wireless sensing units and sensing network. Each cluster head in the network is characterized by its computational capabilities that can be used to implement the computational methodologies of structural health monitoring; making the wireless sensing units and sensing network have "intelligent" characteristics. Primary tests on the measurement data collected by the wireless system are performed. The distributed computational capacity of the intelligent sensing network is also demonstrated. It is shown that the new type of intelligent wireless sensing network provides an efficient tool for structural health monitoring of large-size structures.

  3. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  4. Wireless Interconnects for Intra-chip & Inter-chip Transmission

    Science.gov (United States)

    Narde, Rounak Singh

    With the emergence of Internet of Things and information revolution, the demand of high performance computing systems is increasing. The copper interconnects inside the computing chips have evolved into a sophisticated network of interconnects known as Network on Chip (NoC) comprising of routers, switches, repeaters, just like computer networks. When network on chip is implemented on a large scale like in Multicore Multichip (MCMC) systems for High Performance Computing (HPC) systems, length of interconnects increases and so are the problems like power dissipation, interconnect delays, clock synchronization and electrical noise. In this thesis, wireless interconnects are chosen as the substitute for wired copper interconnects. Wireless interconnects offer easy integration with CMOS fabrication and chip packaging. Using wireless interconnects working at unlicensed mm-wave band (57-64GHz), high data rate of Gbps can be achieved. This thesis presents study of transmission between zigzag antennas as wireless interconnects for Multichip multicores (MCMC) systems and 3D IC. For MCMC systems, a four-chips 16-cores model is analyzed with only four wireless interconnects in three configurations with different antenna orientations and locations. Return loss and transmission coefficients are simulated in ANSYS HFSS. Moreover, wireless interconnects are designed, fabricated and tested on a 6'' silicon wafer with resistivity of 55O-cm using a basic standard CMOS process. Wireless interconnect are designed to work at 30GHz using ANSYS HFSS. The fabricated antennas are resonating around 20GHz with a return loss of less than -10dB. The transmission coefficients between antenna pair within a 20mm x 20mm silicon die is found to be varying between -45dB to -55dB. Furthermore, wireless interconnect approach is extended for 3D IC. Wireless interconnects are implemented as zigzag antenna. This thesis extends the work of analyzing the wireless interconnects in 3D IC with different

  5. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  6. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  7. Mastering wireless penetration testing for highly secured environments

    CERN Document Server

    Johns, Aaron

    2015-01-01

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.

  8. Understanding Ziegler–Natta Catalysis Through Your Laptop

    Indian Academy of Sciences (India)

    vealed, underlining the importance of computational chem- istry in attacking important problems of the day. .... models suggested that the dimeric species Ti2Cl8 can bind to the. (104) surface [1–5]. These models. 2. Here .... to this lies in the fact that 'donor' is a loose definition. Anything that binds to the titanium center can ...

  9. Colombia's laptop warrior — connectivity for peace and progress ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-02-03

    Feb 3, 2011 ... Breaking news and other information is regularly downloaded from the Internet onto computer diskettes. Almendra then sends the diskettes by local minibus to an Indigenous radio station that lacks Internet access. Combining public radio and telecentre services thus extends ACIN's reach into the remoter ...

  10. Wireless Augmented Reality Prototype (WARP)

    Science.gov (United States)

    Devereaux, A. S.

    1999-01-01

    Initiated in January, 1997, under NASA's Office of Life and Microgravity Sciences and Applications, the Wireless Augmented Reality Prototype (WARP) is a means to leverage recent advances in communications, displays, imaging sensors, biosensors, voice recognition and microelectronics to develop a hands-free, tetherless system capable of real-time personal display and control of computer system resources. Using WARP, an astronaut may efficiently operate and monitor any computer-controllable activity inside or outside the vehicle or station. The WARP concept is a lightweight, unobtrusive heads-up display with a wireless wearable control unit. Connectivity to the external system is achieved through a high-rate radio link from the WARP personal unit to a base station unit installed into any system PC. The radio link has been specially engineered to operate within the high- interference, high-multipath environment of a space shuttle or space station module. Through this virtual terminal, the astronaut will be able to view and manipulate imagery, text or video, using voice commands to control the terminal operations. WARP's hands-free access to computer-based instruction texts, diagrams and checklists replaces juggling manuals and clipboards, and tetherless computer system access allows free motion throughout a cabin while monitoring and operating equipment.

  11. Towards Perpetual Energy Operation in Wireless Communication Systems

    KAUST Repository

    Benkhelifa, Fatma

    2017-11-01

    Wireless is everywhere. Smartphones, tablets, laptops, implantable medical devices, and many other wireless devices are massively taking part of our everyday activities. On average, an actively digital consumer has three devices. However, most of these wireless devices are small equipped with batteries that are often limited and need to be replaced or recharged. This fact limits the operating lifetime of wireless devices and presents a major challenge in wireless communication. To improve the perpetual energy operation of wireless communication systems, energy harvesting (EH) from the radio frequency (RF) signals is one promising solution to make the wireless communication systems self-sustaining. Since RF signals are known to transmit information, it is interesting to study when RF signals are simultaneously used to transmit information and scavenge energy, namely simultaneous wireless information and power transfer (SWIPT). In this thesis, we specifically aim to study the SWIPT in multiple-input multiple-output (MIMO) relay communication systems and in cognitive radio (CR) networks. First, we study the SWIPT in MIMO relay systems where the relay harvests the energy from the source and uses partially/fully the harvested energy to forward the signal to the destination. For both the amplify-and-forward (AF) and decode-and-forward (DF) relaying protocols, we consider the ideal scheme where both the energy and information transfer to the relay happen simultaneously, and the practical power splitting and time switching schemes. For each scheme, we aim to maximize the achievable end-to-end rate with a certain energy constraint at the relay. Furthermore, we consider the sum rate maximization problem for the multiuser MIMO DF relay broadcasting channels with multiple EH-enabled relays, and an enhanced low complex solution is proposed based on the block diagonalization method. Finally, we study the energy and data performance of the SWIPT in CR network where either the

  12. Smartphone Household Wireless Electroencephalogram Hat

    Directory of Open Access Journals (Sweden)

    Harold Szu

    2013-01-01

    Full Text Available Rudimentary brain machine interface has existed for the gaming industry. Here, we propose a wireless, real-time, and smartphone-based electroencephalogram (EEG system for homecare applications. The system uses high-density dry electrodes and compressive sensing strategies to overcome conflicting requirements between spatial electrode density, temporal resolution, and spatiotemporal throughput rate. Spatial sparseness is addressed by close proximity between active electrodes and desired source locations and using an adaptive selection of N active among 10N passive electrodes to form m-organized random linear combinations of readouts, m≪N≪10N. Temporal sparseness is addressed via parallel frame differences in hardware. During the design phase, we took tethered laboratory EEG dataset and applied fuzzy logic to compute (a spatiotemporal average of larger magnitude EEG data centers in 0.3 second intervals and (b inside brainwave sources by Independent Component Analysis blind deconvolution without knowing the impulse response function. Our main contributions are the fidelity of quality wireless EEG data compared to original tethered data and the speed of compressive image recovery. We have compared our recovery of ill-posed inverse data against results using Block Sparse Code. Future work includes development of strategies to filter unwanted artifact from high-density EEGs (i.e., facial muscle-related events and wireless environmental electromagnetic interferences.

  13. Adaptive Wavelet Coding Applied in a Wireless Control System

    Science.gov (United States)

    Gama, Felipe O. S.; O. Salazar, Andrés

    2017-01-01

    Wireless control systems can sense, control and act on the information exchanged between the wireless sensor nodes in a control loop. However, the exchanged information becomes susceptible to the degenerative effects produced by the multipath propagation. In order to minimize the destructive effects characteristic of wireless channels, several techniques have been investigated recently. Among them, wavelet coding is a good alternative for wireless communications for its robustness to the effects of multipath and its low computational complexity. This work proposes an adaptive wavelet coding whose parameters of code rate and signal constellation can vary according to the fading level and evaluates the use of this transmission system in a control loop implemented by wireless sensor nodes. The performance of the adaptive system was evaluated in terms of bit error rate (BER) versus Eb/N0 and spectral efficiency, considering a time-varying channel with flat Rayleigh fading, and in terms of processing overhead on a control system with wireless communication. The results obtained through computational simulations and experimental tests show performance gains obtained by insertion of the adaptive wavelet coding in a control loop with nodes interconnected by wireless link. These results enable the use of this technique in a wireless link control loop. PMID:29236048

  14. Adaptive Wavelet Coding Applied in a Wireless Control System

    Directory of Open Access Journals (Sweden)

    Felipe O. S. Gama

    2017-12-01

    Full Text Available Wireless control systems can sense, control and act on the information exchanged between the wireless sensor nodes in a control loop. However, the exchanged information becomes susceptible to the degenerative effects produced by the multipath propagation. In order to minimize the destructive effects characteristic of wireless channels, several techniques have been investigated recently. Among them, wavelet coding is a good alternative for wireless communications for its robustness to the effects of multipath and its low computational complexity. This work proposes an adaptive wavelet coding whose parameters of code rate and signal constellation can vary according to the fading level and evaluates the use of this transmission system in a control loop implemented by wireless sensor nodes. The performance of the adaptive system was evaluated in terms of bit error rate (BER versus E b / N 0 and spectral efficiency, considering a time-varying channel with flat Rayleigh fading, and in terms of processing overhead on a control system with wireless communication. The results obtained through computational simulations and experimental tests show performance gains obtained by insertion of the adaptive wavelet coding in a control loop with nodes interconnected by wireless link. These results enable the use of this technique in a wireless link control loop.

  15. Radiofrequency exposure from wireless LANs utilizing Wi-Fi technology.

    Science.gov (United States)

    Foster, Kenneth R

    2007-03-01

    This survey measured radiofrequency (RF) fields from wireless local area networks (WLANs) using Wi-Fi technology against a background of RF fields in the environment over the frequency range 75 MHz-3 GHz. A total of 356 measurements were conducted at 55 sites (including private residences, commercial spaces, health care and educational institutions, and other public spaces) in four countries (U.S., France, Germany, Sweden). Measurements were conducted under conditions that would result in the higher end of exposures from such systems. Where possible, measurements were conducted in public spaces as close as practical to the Wi-Fi access points. Additional measurements were conducted at a distance of approximately 1 m from a laptop while it was uploading and downloading large files to the WLAN. This distance was chosen to allow a useful comparison of fields in the far-field of the antenna in the laptop, and give a representative measure of the exposure that a bystander might receive from the laptop. The exposure to the user, particularly if the antenna of the client card were placed against his or her body, would require different measurement techniques beyond the scope of this study. In all cases, the measured Wi-Fi signal levels were very far below international exposure limits (IEEE C95.1-2005 and ICNIRP) and in nearly all cases far below other RF signals in the same environments. An discusses technical aspects of the IEEE 802.11 standard on which WLANs operate that are relevant to determining the levels of RF energy exposure from WLANs. Important limiting factors are the low operating power of client cards and access points, and the low duty cycle of transmission that normally characterizes their operation.

  16. Wireless Wide Area Networks for School Districts.

    Science.gov (United States)

    Nair, Prakash

    This paper considers a basic question that many schools districts face in attempting to develop affordable, expandable district-wide computer networks that are resistant to obsolescence: Should these wide area networks (WANs) employ wireless technology, stick to venerable hard-wired solutions, or combine both. This publication explores the…

  17. A Decade of Mobile Computing for Students

    Science.gov (United States)

    Jenny, Frederick J.

    2005-01-01

    This paper describes the mobile computing at Grove City College, a small, private, liberal arts institution in Western Pennsylvania. They have entered their second decade of mobile computing for students in the school of about 2200. Each incoming freshman receives a laptop computing and inkjet printer during the fall orientation, all a benefit of…

  18. Can laptops be left inside passenger bags if motion imaging is used in X-ray security screening?

    Directory of Open Access Journals (Sweden)

    Marcia eMendes

    2013-10-01

    Full Text Available This paper describes a study where a new X-ray machine for security screening featuring motion imaging (i.e. 5 views of a bag are shown as an image sequence was evaluated and compared to single view imaging available on conventional X-ray screening systems. More specifically, it was investigated whether with this new technology X-ray screening of passenger bags could be enhanced to such an extent that laptops could be left inside passenger bags, without causing a significant impairment in threat detection performance. An X-ray image interpretation test was created in four different versions, manipulating the factors packing condition (laptop and bag separate vs. laptop in bag and display condition (single vs. motion imaging. There was a highly significant and large main effect of packing condition. When laptops and bags were screened separately, threat item detection was substantially higher. For display condition, a medium effect was observed. Detection could be slightly enhanced through the application of motion imaging. There was no interaction between display and packing condition, implying that the high negative effect of leaving laptops in passenger bags could not be fully compensated by motion imaging. Additional analyses were carried out to examine effects depending on different threat categories (guns, improvised explosive devices, knives, others, the placement of the threat items (in bag vs. in laptop and viewpoint (easy vs. difficult view. In summary, although motion imaging provides an enhancement, it is not strong enough to allow leaving laptops in bags for security screening.

  19. Can laptops be left inside passenger bags if motion imaging is used in X-ray security screening?

    Science.gov (United States)

    Mendes, Marcia; Schwaninger, Adrian; Michel, Stefan

    2013-01-01

    This paper describes a study where a new X-ray machine for security screening featuring motion imaging (i.e., 5 views of a bag are shown as an image sequence) was evaluated and compared to single view imaging available on conventional X-ray screening systems. More specifically, it was investigated whether with this new technology X-ray screening of passenger bags could be enhanced to such an extent that laptops could be left inside passenger bags, without causing a significant impairment in threat detection performance. An X-ray image interpretation test was created in four different versions, manipulating the factors packing condition (laptop and bag separate vs. laptop in bag) and display condition (single vs. motion imaging). There was a highly significant and large main effect of packing condition. When laptops and bags were screened separately, threat item detection was substantially higher. For display condition, a medium effect was observed. Detection could be slightly enhanced through the application of motion imaging. There was no interaction between display and packing condition, implying that the high negative effect of leaving laptops in passenger bags could not be fully compensated by motion imaging. Additional analyses were carried out to examine effects depending on different threat categories (guns, improvised explosive devices, knives, others), the placement of the threat items (in bag vs. in laptop) and viewpoint (easy vs. difficult view). In summary, although motion imaging provides an enhancement, it is not strong enough to allow leaving laptops in bags for security screening.

  20. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  1. Wireless world widens nurse call options.

    Science.gov (United States)

    Baillie, Jonathan

    2014-01-01

    With wireless technology now an integral part of all our lives, and miniaturisation of computing power having made even hand-held portable devices such as mobile phones powerful tools in their own right, HEJ editor, Jonathan Baillie, spoke to specialist in wireless nurse call systems, Courtney-Thorne, to discuss some of its key recent product innovations, and see what impact it feels developments such as 'cloud' technology will have on the bringing of more technology into the nurse call sector as 'nurse and carer tools'.

  2. Foundations of wireless and electronics

    CERN Document Server

    Scroggie, M G

    1984-01-01

    Foundations of Wireless and Electronics, 10th Edition covers the cathode-ray and microwave tubes; modern pulse methods; f.m. detectors; basic processes of transmission; and reception, computers, and non-sinusoidal signal amplification. The book starts by giving a general overview of a complete electronic system, electricity and circuits, capacitance, and inductance. The text also discusses alternating currents (a.c.), including the frequency and phase of a.c.; the capacitance and inductance in a.c. circuits; and the capacitance and inductance in a series. Diodes, triode, transistor equivalent

  3. The theories and key technologies for the new generation mine wireless information system

    Energy Technology Data Exchange (ETDEWEB)

    Yang, W.; Feng, X.; Cheng, S.; Sun, J. [Beijing Jiaotong University, Beijing (China). Key Laboratory of ARP Optical Network and Advanced Telecommunication Network

    2004-07-01

    Breaking through the traditional mine wireless communication theories and technologies, combining advanced wireless communication technologies, wireless network technologies with optical fiber communication technologies have been proposed to construct a new generation mine wireless information system. This has a full range of functions such as managing mobile communications, vehicle positioning and navigation, personnel positioning and tracing, wireless multimedia surveillance, mobile computing and mine environment parameters monitoring. The relevant theories and key technologies were proposed. The urgency to do research work for China is stressed. 10 refs., 2 figs.

  4. 2014 International Conference on Wireless Communications, Networking and Applications

    CERN Document Server

    2016-01-01

    This book is based on a series of conferences on Wireless Communications, Networking and Applications that have been held on December 27-28, 2014 in Shenzhen, China. The meetings themselves were a response to technological developments in the areas of wireless communications, networking and applications and facilitate researchers, engineers and students to share the latest research results and the advanced research methods of the field. The broad variety of disciplines involved in this research and the differences in approaching the basic problems are probably typical of a developing field of interdisciplinary research. However, some main areas of research and development in the emerging areas of wireless communication technology can now be identified. The contributions to this book are mainly selected from the papers of the conference on wireless communications, networking and applications and reflect the main areas of interest: Section 1 - Emerging Topics in Wireless and Mobile Computing and Communications...

  5. Bluetooth low energy: wireless connectivity for medical monitoring.

    Science.gov (United States)

    Omre, Alf Helge

    2010-03-01

    Electronic wireless sensors could cut medical costs by enabling physicians to remotely monitor vital signs such as blood pressure, blood glucose, and blood oxygenation while patients remain at home. According to the IDC report "Worldwide Bluetooth Semiconductor 2008-2012 Forecast," published November 2008, a forthcoming radio frequency communication ("wireless connectivity") standard, Bluetooth low energy, will link wireless sensors via radio signals to the 70% of cell phones and computers likely to be fitted with the next generation of Bluetooth wireless technology, leveraging a ready-built infrastructure for data transmission. Analysis of trends indicated by this data can help physicians better manage diseases such as diabetes. The technology also addresses the concerns of cost, compatibility, and interoperability that have previously stalled widespread adoption of wireless technology in medical applications. (c) 2010 Diabetes Technology Society.

  6. Functional Testing of Wireless Sensor Node Designs

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Madsen, Jan

    2007-01-01

    Wireless sensor networks are networked embedded computer systems with stringent power, performance, cost and form-factor requirements along with numerous other constraints related to their pervasiveness and ubiquitousness. Therefore, only a systematic design methdology coupled with an efficient...... test approach can enable their conformance to design and deployment specifications. We discuss off-line, hierarchical, functional testing of complete wireless sensor nodes containing configurable logic through a combination of FPGA-based board test and Software-Based Self-Test (SBST) techniques....... The proposed functional test methodology has been applied to a COTS-based sensor node development platform and can be applied, in general, for testing all types of wireless sensor node designs....

  7. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  8. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Weijian Tu

    2017-07-01

    Full Text Available Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  9. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks.

    Science.gov (United States)

    Tu, Weijian; Xu, Xianghua; Ye, Tingcong; Cheng, Zongmao

    2017-07-04

    Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node) as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP) to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  10. Quick Lookup Laptops in the Library: Leveraging Linux with a SLAX LiveCD

    OpenAIRE

    Kevin Beswick; Dan Scott

    2008-01-01

    This article discusses the experiences over the past year at Laurentian University in deploying a Linux live CD solution to create customized kiosk browsers on 'quick lookup' laptops. This provides security, reliability, ease of use, and improved response time compared to other options. We explain why we chose this solution, reveal techniques we used to achieve some of our goals, and reflect on possible future iterations of this project.

  11. Quick Lookup Laptops in the Library: Leveraging Linux with a SLAX LiveCD

    Directory of Open Access Journals (Sweden)

    Kevin Beswick

    2008-03-01

    Full Text Available This article discusses the experiences over the past year at Laurentian University in deploying a Linux live CD solution to create customized kiosk browsers on 'quick lookup' laptops. This provides security, reliability, ease of use, and improved response time compared to other options. We explain why we chose this solution, reveal techniques we used to achieve some of our goals, and reflect on possible future iterations of this project.

  12. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  13. Perancangan Sistem Pakar Pendiagnosis Kerusakan Laptop di "Dinar Comp" Berbasis Web dengan PHP dan MySQL

    Directory of Open Access Journals (Sweden)

    Wandri Okki Saputra

    2014-01-01

    Full Text Available Saat sekarang ini laptop sudah menjadi kebutuhan di kalangan pelajar, mahasiswa, karyawan dan profesi lainya. Suatu saat laptop tersebut akan mengalami kerusakan dan diperlukan seorang pakar untuk mendiagnosis kerusakan tersebut. Aplikasi sistem pakar merupakan salah satu aplikasi untuk diagnosis kerusakan laptop seperti kemampuan seorang pakar. Dengan adanya sistem pakar, dapat membantu pengguna untuk bisa mendiagnosis kerusakan laptop tanpa harus di diagnosis oleh pakar. Dalam perancangan aplikasi, metode yang digunakan adalah metode waterfall. Metode ini sangat tepat dalam pembuatan aplikasi seperti ini karena mempunyai alur yang memungkinkan perancang untuk mengevaluasi aplikasi tanpa harus mengubah dari dasar. Sedangkan tahapan dalam pembuatan aplikasi ini menggunakan beberapa tahap yaitu studi pustaka dan bimbingan, pengambilan data dan analisa (wawancara, pengamatan dan berkas informasi, perancangan, pembuatan sistem dan terakhir implementasi. Berdasarkan hasil pengujian alpha dan betha, aplikasi yang dibangun sudah berjalan cukup maksimal, tetapi tidak menutup kemungkinan dapat terjadi kesalahan dan kekurangan pada saat aplikasi digunakan.

  14. 77 FR 70464 - Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data...

    Science.gov (United States)

    2012-11-26

    ..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... Samsung Electronics Co., Ltd. of Korea and Samsung Telecommunications America, LLC of Richardson, Texas... wireless communication devices, portable music and data processing devices, and tablet computers, by reason...

  15. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  16. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  17. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  18. Optical and wireless technologies

    CERN Document Server

    Tiwari, Manish; Singh, Ghanshyam; Minzioni, Paolo

    2018-01-01

    This book presents selected papers from 1st International Conference on Optical and Wireless Technologies, providing insights into the analytical, experimental, and developmental aspects of systems, techniques, and devices in these spheres. It explores the combined use of various optical and wireless technologies in next-generation networking applications, and discusses the latest developments in applications such as photonics, high-speed communication systems and networks, visible light communication, nanophotonics, and wireless and multiple-input-multiple-output (MIMO) systems. The book will serve as a valuable reference resource for academics and researchers across the globe.

  19. HIGHLIGHTING CHANGES IN TWO RUSSIAN SCHOOLS WITH SUCCESSFUL ONE-TO-ONE LAPTOP PROGRAMS: MOSCOW AND NIZHNY NOVGOROD CASE STUDIES

    Directory of Open Access Journals (Sweden)

    Daniel Light

    2013-01-01

    Full Text Available One-to-one educational model of mobile learning at school is essential part of Innovative education reform and modernization of Russian educational system [1]. This study provides analysis of integrating technology in Russian schools by taking a close look at how laptops were used in the classrooms on a daily basis. And how the laptops and information resources had become a daily part of learning in the classroom that in turn supported changes in the overall learning. 

  20. Acemind new indoor full duplex optical wireless communication prototype

    Science.gov (United States)

    Bouchet, Olivier; Perrufel, Micheline; Topsu, Suat; Guan, Hongyu

    2016-09-01

    For over a century and Mr. Guglielmo Marconi invention, systems using radio waves have controlled over wireless telecommunication solutions; from Amplitude Modulation (AM) radio products to satellite communications for instance. But beyond an increasingly negative opinion face to radio waves and radio spectrum availability more and more reduced; there is an unprecedented opportunity with LED installation in displays and lighting to provide optical wireless communication solutions. As a result, technologically mature solutions are already commercially available for services such as Location Based Services (LBS), broadcast diffusion or Intelligent Transport Services (ITS). Pending finalization of the standard review process IEEE 802.15.7 r1, our paper presents the results of the European collaborative project named "ACEMIND". It offers an indoor bilateral optical wireless communication prototype having the following characteristics: use of the existing electrical infrastructure, through judicious combination with Light Fidelity (LiFi), Power Line Communication (PLC) and Ethernet to reduce the implementation cost. We propose a bilateral optical wireless communication even when the light is switched off by using Visible Light Communication (VLC) and Infra-Red Communication (IRC) combined to a remote optical switch. Dimensionally optimized LiFi module is presented in order to offer the possibility for integration inside a laptop. Finally, there is operational mechanism implementation such as OFDM/DMT to increase throughput. After the introduction, we will present the results of a market study from Orange Labs customers about their opinion on LiFi components. Then we will detail the LiFi prototype, from the physical layer aspect to MAC layer before concluding on commercial development prospects.

  1. Automatic Supervision And Fault Detection In PV System By Wireless Sensors With Interfacing By Labview Program

    Directory of Open Access Journals (Sweden)

    Yousra M Abbas

    2015-08-01

    Full Text Available In this work a wireless monitoring system are designed for automatic detection localization fault in photovoltaic system. In order to avoid the use of modeling and simulation of the PV system we detected the fault by monitoring the output of each individual photovoltaic panel connected in the system by Arduino and transmit this data wirelessly to laptop then interface it by LabVIEW program which made comparison between this data and the measured data taking from reference module at the same condition. The proposed method is very simple but effective detecting and diagnosing the main faults of a PV system and was experimentally validated and has demonstrated its effectiveness in the detection and diagnosing of main faults present in the DC side of PV system.

  2. Computer Security Handbook

    CERN Document Server

    Bosworth, Seymour; Whyne, Eric

    2012-01-01

    The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapter

  3. Wireless capsule endoscopy

    Science.gov (United States)

    Iddan, Gavriel; Meron, Gavriel; Glukhovsky, Arkady; Swain, Paul

    2000-05-01

    We have developed a new type of endoscopy, which for the first time allows painless endoscopic imaging of the whole of the small bowel. This procedure involves a wireless capsule endoscope and we describe here its successful testing in humans.

  4. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  5. Wireless radio a history

    CERN Document Server

    Coe, Lewis

    2006-01-01

    ""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.

  6. Wireless Networks Security

    OpenAIRE

    Jenko, Marko

    2016-01-01

    In this thesis we deal with security, penetration testing and different types of attacks on wireless networks. We theoretically familiarize with the field of wireless networks, security mechanisms and the most used security standards. Then we systematically overview the field of penetration testing. We divide the penetration testing on types and different methodologies. We explain the tasks of the provider and the subscriber in penetration testing. Description of the process of conducting the...

  7. A design of an interface board between a MRC thermistor probe and a personal computer.

    Science.gov (United States)

    2013-09-01

    The main purpose of this project was to design and build a prototype of an interface board between an MRC temperature probe : (thermistor array) and a personal laptop computer. This interface board replaces and significantly improve the capabilities ...

  8. Software defined wireless sensor networks application opportunities for efficient network management: a survey

    CSIR Research Space (South Africa)

    Modieginyane, KM

    2017-03-01

    Full Text Available Wireless Sensor Networks (WSNs) are commonly used information technologies of modern networking and computing platforms. Today's network computing applications are faced with a high demand of powerful network functionalities. Functional network...

  9. 77 FR 60720 - Certain Electronic Devices, Including Wireless Commmunication Devices, Portable Music and Data...

    Science.gov (United States)

    2012-10-04

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-794] Certain Electronic Devices, Including Wireless Commmunication Devices, Portable Music and Data Processing Devices, and Tablet Computers... communication devices, portable music and data processing devices, and tablet computers, imported by Apple Inc...

  10. Wireless Sensor Networks for Long Distance Pipeline Monitoring

    OpenAIRE

    Augustine C. Azubogu; Victor E. Idigo; Schola U. Nnebe; Obinna S. Oguejiofor; Simon E.

    2013-01-01

    The main goal of this seminal paper is to introduce the application of Wireless Sensor Networks (WSN) in long distance infrastructure monitoring (in particular in pipeline infrastructure monitoring) – one of the on-going research projects by the Wireless Communication Research Group at the department of Electronic and Computer Engineering, Nnamdi Azikiwe University, Awka. The current sensor network architectures for monitoring long distance pipeline infrastructures are pr...

  11. High Fidelity Simulations of Large-Scale Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Onunkwo, Uzoma [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Benz, Zachary [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    The worldwide proliferation of wireless connected devices continues to accelerate. There are 10s of billions of wireless links across the planet with an additional explosion of new wireless usage anticipated as the Internet of Things develops. Wireless technologies do not only provide convenience for mobile applications, but are also extremely cost-effective to deploy. Thus, this trend towards wireless connectivity will only continue and Sandia must develop the necessary simulation technology to proactively analyze the associated emerging vulnerabilities. Wireless networks are marked by mobility and proximity-based connectivity. The de facto standard for exploratory studies of wireless networks is discrete event simulations (DES). However, the simulation of large-scale wireless networks is extremely difficult due to prohibitively large turnaround time. A path forward is to expedite simulations with parallel discrete event simulation (PDES) techniques. The mobility and distance-based connectivity associated with wireless simulations, however, typically doom PDES and fail to scale (e.g., OPNET and ns-3 simulators). We propose a PDES-based tool aimed at reducing the communication overhead between processors. The proposed solution will use light-weight processes to dynamically distribute computation workload while mitigating communication overhead associated with synchronizations. This work is vital to the analytics and validation capabilities of simulation and emulation at Sandia. We have years of experience in Sandia’s simulation and emulation projects (e.g., MINIMEGA and FIREWHEEL). Sandia’s current highly-regarded capabilities in large-scale emulations have focused on wired networks, where two assumptions prevent scalable wireless studies: (a) the connections between objects are mostly static and (b) the nodes have fixed locations.

  12. Wearable salivary uric acid mouthguard biosensor with integrated wireless electronics.

    Science.gov (United States)

    Kim, Jayoung; Imani, Somayeh; de Araujo, William R; Warchall, Julian; Valdés-Ramírez, Gabriela; Paixão, Thiago R L C; Mercier, Patrick P; Wang, Joseph

    2015-12-15

    This article demonstrates an instrumented mouthguard capable of non-invasively monitoring salivary uric acid (SUA) levels. The enzyme (uricase)-modified screen printed electrode system has been integrated onto a mouthguard platform along with anatomically-miniaturized instrumentation electronics featuring a potentiostat, microcontroller, and a Bluetooth Low Energy (BLE) transceiver. Unlike RFID-based biosensing systems, which require large proximal power sources, the developed platform enables real-time wireless transmission of the sensed information to standard smartphones, laptops, and other consumer electronics for on-demand processing, diagnostics, or storage. The mouthguard biosensor system offers high sensitivity, selectivity, and stability towards uric acid detection in human saliva, covering the concentration ranges for both healthy people and hyperuricemia patients. The new wireless mouthguard biosensor system is able to monitor SUA level in real-time and continuous fashion, and can be readily expanded to an array of sensors for different analytes to enable an attractive wearable monitoring system for diverse health and fitness applications. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. Enabling Wireless Avionics Intra-Communications

    Science.gov (United States)

    Torres, Omar; Nguyen, Truong; Mackenzie, Anne

    2016-01-01

    The Electromagnetics and Sensors Branch of NASA Langley Research Center (LaRC) is investigating the potential of an all-wireless aircraft as part of the ECON (Efficient Reconfigurable Cockpit Design and Fleet Operations using Software Intensive, Networked and Wireless Enabled Architecture) seedling proposal, which is funded by the Convergent Aeronautics Solutions (CAS) project, Transformative Aeronautics Concepts (TAC) program, and NASA Aeronautics Research Institute (NARI). The project consists of a brief effort carried out by a small team in the Electromagnetic Environment Effects (E3) laboratory with the intention of exposing some of the challenges faced by a wireless communication system inside the reflective cavity of an aircraft and to explore potential solutions that take advantage of that environment for constructive gain. The research effort was named EWAIC for "Enabling Wireless Aircraft Intra-communications." The E3 laboratory is a research facility that includes three electromagnetic reverberation chambers and equipment that allow testing and generation of test data for the investigation of wireless systems in reflective environments. Using these chambers, the EWAIC team developed a set of tests and setups that allow the intentional variation of intensity of a multipath field to reproduce the environment of the various bays and cabins of large transport aircraft. This setup, in essence, simulates an aircraft environment that allows the investigation and testing of wireless communication protocols that can effectively be used as a tool to mitigate some of the risks inherent to an aircraft wireless system for critical functions. In addition, the EWAIC team initiated the development of a computational modeling tool to illustrate the propagation of EM waves inside the reflective cabins and bays of aircraft and to obtain quantifiable information regarding the degradation of signals in aircraft subassemblies. The nose landing gear of a UAV CAD model was used

  14. The design and evaluation of a 5.8 ghz laptop-based radar system

    Science.gov (United States)

    Teng, Kevin Chi-Ming

    This project involves design and analysis of a 5.8 GHz laptop-based radar system. The radar system measures Doppler, ranging and forming Synthetic Aperture Radar (SAR) images utilizing Matlab software provided from MIT Open Courseware and performs data acquisition and signal processing. The main purpose of this work is to bring new perspective to the existing radar project by increasing the ISM band frequency from 2.4 GHz to 5.8 GHz and to carry out a series of experiments on the implementation of the radar kit. Demonstrating the radar at higher operating frequency is capable of providing accurate data results in Doppler, ranging and SAR images.

  15. The Design and Evaluation of a 5.8 GHz Laptop-Based Radar System

    OpenAIRE

    Teng, Kevin Chi-Ming

    2013-01-01

    This project involves design and analysis of a 5.8 GHz laptop-based radar system. The radar system measures Doppler, ranging and forming Synthetic Aperture Radar (SAR) images utilizing Matlab software provided from MIT Open Courseware and performs data acquisition and signal processing. The main purpose of this work is to bring new perspective to the existing radar project by increasing the ISM band frequency from 2.4 GHz to 5.8 GHz and to carry out a series of experiments on the implementati...

  16. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  17. EXPERIMENTAL PERFORMANCE ANALYSIS OF WIRELESS ...

    African Journals Online (AJOL)

    ABSTRACT. Wireless networking is currently being deployed for various applications. However, the application of wireless networking in healthcare remains a challenge mainly because of security and reliability concerns. This paper presents experimental results of performance analysis of a wireless network for healthcare ...

  18. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  19. Explorer-II: Wireless Self-Powered Visual and NDE Robotic Inspection System for Live Gas Distribution Mains

    Energy Technology Data Exchange (ETDEWEB)

    Carnegie Mellon University

    2008-09-30

    and their arrangement, still allow the robot to configure itself to perform any-angle (up to 90 deg) turns in any orientation (incl. vertical), and enable the live launching and recovery of the system using custom fittings and a (to be developed) launch-chamber/-tube. The battery modules are used to power the system, by providing power to the robot's bus. The support modules perform the functions of centration for the rest of the train as well as odometry pickups using incremental encoding schemes. The electronics architecture is based on a distributed (8-bit) microprocessor architecture (at least 1 in ea. module) communicating to a (one of two) 32-bit SBC, which manages all video-processing, posture and motion control as well as CAN and wireless communications. The operator controls the entire system from an off-board (laptop) controller, which is in constant wireless communication with the robot train in the pipe. The sensor modules collect data and forward it to the robot operator computer (via the CAN-wireless communications chain), who then transfers it to a dedicated NDE data-storage and post-processing computer for further (real-time or off-line) analysis. The prototype robot system was built and tested indoors and outdoors, outfitted with a Remote-Field Eddy Current (RFEC) sensor integrated as its main NDE sensor modality. An angled launcher, allowing for live launching and retrieval, was also built to suit custom angled launch-fittings from TDW. The prototype vehicle and launcher systems are shown. The complete system, including the in-pipe robot train, launcher, integrated NDE-sensor and real-time video and control console and NDE-data collection and -processing and real-time display, were demonstrated to all sponsors prior to proceeding into final field-trials--the individual components and setting for said acceptance demonstration are shown. The launcher-tube was also used to verify that the vehicle system is capable of operating in high

  20. Fiber wireless networks

    Science.gov (United States)

    Nirmalathas, A.; Bakaul, M.; Lim, C.; Novak, D.; Waterhouse, R.

    2005-11-01

    Broadband wireless networks based on a number of new frequency windows at higher microwave and millimeter-wave frequencies have been actively pursued to provide ultra-high bandwidth services over a wireless networks. These networks will have a large number of antenna base-stations with high throughput. Significant reductions in antenna base-station complexity can be achieved if most of the signal routing and switching functions centralized at a central office in the network. In such a network, fiber feed networks can be effectively deployed to provide high bandwidth interconnections between multiple antenna base-stations and the central office. With wavelength division multiplexing, efficient optical fiber feed network architectures could be realised to provide interconnection to a large number of antenna base-stations. In this paper, we present an over view of our recent research into system technologies for fiber wireless networks.

  1. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  2. EMG amplifier with wireless data transmission

    Science.gov (United States)

    Kowalski, Grzegorz; Wildner, Krzysztof

    2017-08-01

    Wireless medical diagnostics is a trend in modern technology used in medicine. This paper presents a concept of realization, architecture of hardware and software implementation of an elecromyography signal (EMG) amplifier with wireless data transmission. This amplifier consists of three components: analogue processing of bioelectric signal module, micro-controller circuit and an application enabling data acquisition via a personal computer. The analogue bioelectric signal processing circuit receives electromyography signals from the skin surface, followed by initial analogue processing and preparation of the signals for further digital processing. The second module is a micro-controller circuit designed to wirelessly transmit the electromyography signals from the analogue signal converter to a personal computer. Its purpose is to eliminate the need for wired connections between the patient and the data logging device. The third block is a computer application designed to display the transmitted electromyography signals, as well as data capture and analysis. Its purpose is to provide a graphical representation of the collected data. The entire device has been thoroughly tested to ensure proper functioning. In use, the device displayed the captured electromyography signal from the arm of the patient. Amplitude- frequency characteristics were set in order to investigate the bandwidth and the overall gain of the device.

  3. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  4. Performance analysis of wireless sensor networks in geophysical sensing applications

    Science.gov (United States)

    Uligere Narasimhamurthy, Adithya

    Performance is an important criteria to consider before switching from a wired network to a wireless sensing network. Performance is especially important in geophysical sensing where the quality of the sensing system is measured by the precision of the acquired signal. Can a wireless sensing network maintain the same reliability and quality metrics that a wired system provides? Our work focuses on evaluating the wireless GeoMote sensor motes that were developed by previous computer science graduate students at Mines. Specifically, we conducted a set of experiments, namely WalkAway and Linear Array experiments, to characterize the performance of the wireless motes. The motes were also equipped with the Sticking Heartbeat Aperture Resynchronization Protocol (SHARP), a time synchronization protocol developed by a previous computer science graduate student at Mines. This protocol should automatically synchronize the mote's internal clocks and reduce time synchronization errors. We also collected passive data to evaluate the response of GeoMotes to various frequency components associated with the seismic waves. With the data collected from these experiments, we evaluated the performance of the SHARP protocol and compared the performance of our GeoMote wireless system against the industry standard wired seismograph system (Geometric-Geode). Using arrival time analysis and seismic velocity calculations, we set out to answer the following question. Can our wireless sensing system (GeoMotes) perform similarly to a traditional wired system in a realistic scenario?

  5. Wireless communications algorithmic techniques

    CERN Document Server

    Vitetta, Giorgio; Colavolpe, Giulio; Pancaldi, Fabrizio; Martin, Philippa A

    2013-01-01

    This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It focuses on single user systems, so ignoring multiple access techniques. Moreover, emphasis is put on single-input single-output (SISO) systems, although some relevant topics about multiple-input multiple-output (MIMO) systems are also illustrated.Comprehensive wireless specific guide to algorithmic techniquesProvides a detailed analysis of channel equalization and channel coding for wi

  6. Wireless optical telecommunications

    CERN Document Server

    Bouchet, Olivier

    2013-01-01

    Wireless optical communication refers to communication based on the unguided propagation of optical waves. The past 30 years have seen significant improvements in this technique - a wireless communication solution for the current millennium - that offers an alternative to radio systems; a technique that could gain attractiveness due to recent concerns regarding the potential effects of radiofrequency waves on human health.The aim of this book is to look at the free space optics that are already used for the exchange of current information; its many benefits, such as incorporating chan

  7. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  8. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  9. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  10. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  11. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  12. Design And Planning Of E- Learning EnvironmentE-Education System On Heterogeneous Wireless Network Control System

    Directory of Open Access Journals (Sweden)

    ThandarOo

    2015-06-01

    Full Text Available Abstract The purpose of this research is to provide a more efficient and effective communication method between teacher and student with the use of heterogeneous network. Moreover the effective use of heterogeneous network can be emphasized. The system of e-education can develop utilizing wireless network.The e-Education system can help students to communicate with their teacher more easily and effectively using a heterogeneous wireless network system. In this wireless network system students who are blind or dumb will also be able to communicate and learn from the teacher as normal students can do. All the devices or laptops will be connected on wireless LAN. Even when the teacher is not around he will be able to help his students with their study or give instructions easily by using the mobile phone to send text or voice signal. When the teacher sends information to the dumb student it will be converted into sign language for the student to be able to understand. When the dumb student sends the information to the teacher it will be converted into text for the teacher to understand. For the blind student text instructions from the teacher will be converted into audio signal using text-to-speech conversion.Thus the performance of heterogeneous wireless network model can evaluate by using Robust Optimization Method. Therefore the e-Education systems performance improves by evaluating Robust Optimization Method.

  13. Resource management in wireless networking

    CERN Document Server

    Cardei, Mihaela; Du, Ding-Zhu

    2005-01-01

    This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.Survey chapters give an excellent introduction to key topics in resource management for wireless networks, while experts will be satisfied by the technical depth of the knowledge imparted in chapters exploring hot research topics.The subject area discussed in this book is very relevant today, considering the recent remarkable growth of wireless networking and the convergence of wireless personal communications, internet technologies and real-time multimedia.This volume is a very good companion for practitioners working on implementing solutions for multimedia and Quality of Service - sensitive applications over wireless networks.Written for:Researchers, faculty members, students...

  14. WiFiSiM: An Educational Tool for the Study and Design of Wireless Networks

    Science.gov (United States)

    Mateo Sanguino, T. J.; Serrano Lopez, C.; Marquez Hernandez, F. A.

    2013-01-01

    A new educational simulation tool designed for the generic study of wireless networks, the Wireless Fidelity Simulator (WiFiSim), is presented in this paper. The goal of this work was to create and implement a didactic tool to improve the teaching and learning of computer networks by means of two complementary strategies: simulating the behavior…

  15. When computers were human

    CERN Document Server

    Grier, David Alan

    2013-01-01

    Before Palm Pilots and iPods, PCs and laptops, the term ""computer"" referred to the people who did scientific calculations by hand. These workers were neither calculating geniuses nor idiot savants but knowledgeable people who, in other circumstances, might have become scientists in their own right. When Computers Were Human represents the first in-depth account of this little-known, 200-year epoch in the history of science and technology. Beginning with the story of his own grandmother, who was trained as a human computer, David Alan Grier provides a poignant introduction to the wider wo

  16. Wireless Distributed Antenna MIMO

    DEFF Research Database (Denmark)

    2015-01-01

    The present disclosure relates to system applications of multicore optical fibers. One embodiment relates to a base transceiver station for a wireless telecommunication system comprising a plurality of antenna units arranged in a MIMO configuration and adapted for transmission and/or reception...

  17. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  18. Wireless Remote Control System

    Directory of Open Access Journals (Sweden)

    Adrian Tigauan

    2012-06-01

    Full Text Available This paper presents the design of a wireless remote control system based on the ZigBee communication protocol. Gathering data from sensors or performing control tasks through wireless communication is advantageous in situations in which the use of cables is impractical. An Atmega328 microcontroller (from slave device is used for gathering data from the sensors and transmitting it to a coordinator device with the help of the XBee modules. The ZigBee standard is suitable for low-cost, low-data-rate and low-power wireless networks implementations. The XBee-PRO module, designed to meet ZigBee standards, requires minimal power for reliable data exchange between devices over a distance of up to 1600m outdoors. A key component of the ZigBee protocol is the ability to support networking and this can be used in a wireless remote control system. This system may be employed e.g. to control temperature and humidity (SHT11 sensor and light intensity (TSL230 sensor levels inside a commercial greenhouse.

  19. Subsurface Wireless Sensor Networks

    Science.gov (United States)

    Niemeier, J. J.; Davies, J. L.; Kruger, A.

    2008-12-01

    Conventional thinking holds that underground- and underwater radio communication is not possible, except at very low frequencies employing very long antennas and high transmit power. However, researchers at The University of Iowa have demonstrated that using inexpensive, low-power radios, it is in fact possible to achieve reliable underground radio communication over distances of several meters. This allows for creating underground wireless sensor networks. A proof-of-concept network was established at The University of Iowa, where nodes that measure soil moisture content are buried over a 20×20 m area (up to 1 m deep). The nodes organize themselves into a wireless sensor network, reconfigure routes as radio link quality waxes and wanes, cooperate in routing data packets to a surface base station, and so on. In an agricultural research setting, an advantage of such buried wireless sensor networks is that, if nodes were buried deep enough, they may be left in place during agricultural field work. Power consumption is an important issue in wireless sensor networks. This is especially true in a buried network where battery replacement is a major undertaking. The focus of continuing research is developing methods of inductively recharging buried sensor batteries.

  20. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  1. Development of fast wireless detection system for fixed offshore platform

    Science.gov (United States)

    Li, Zhigang; Yu, Yan; Jiao, Dong; Wang, Jie; Li, Zhirui; Ou, Jinping

    2011-04-01

    -performance computation unit, wireless transceiver unit, mobile power unit and embedded data analysis software, can totally control multi-wireless collection nodes, receive and analyze data, parameter identification. Data is transmitted at the 2.4GHz wireless communication channel, every sensing data channel in charge of data transmission is in a stable frequency band, control channel responsible for the control of power parameters is in a public frequency band. The test is initially conducted for the designed system, experimental results show that the system has good application prospects and practical value with fast arrangement, high sampling rate, high resolution, capacity of low frequency detection.

  2. Computer Security: Agility for computers

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2014-01-01

    I have just made an inventory of all the digital gadgets connected to my wireless network at home: two Windows laptops, two tablets of different generations, my two kids’ iPods , one iPhone, an Apple TV, an old iMac, the Wii U, a Sony TV, a Sony stereo, the Wi-Fi router (of course!), a Network Attached Storage and two IP telephones. I’m sure other people have many more...   In the future, I could even have an internet-connected car or coffee-machine or a smart meter (see “Hacking control systems, switching lights off!”), and I could eventually even connect my solar panels to my Wi-Fi network. That’s quite some phase-space for vulnerabilities waiting to be exploited by attackers! Therefore, locking down my Wi-Fi router and blocking all incoming access was essential, but my kids randomly browsing the web still posed an insider threat… Thus, patching and keeping all systems up to date became important, too. But given the number of de...

  3. Distractions in the Wireless Classroom

    Science.gov (United States)

    Bugeja, Michael J.

    2007-01-01

    This article describes the difficulty faced by educators in fighting inappropriate use of technology among students inside the classrooms. It is not uncommon for teachers to find some of their students logging on to MySpace and eBay during lectures. Due to these types of scenarios, some teachers have started to ban laptops and cellular phones…

  4. NASA Bluetooth Wireless Communications

    Science.gov (United States)

    Miller, Robert D.

    2007-01-01

    NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.

  5. Open-Source Python Tools for Deploying Interactive GIS Dashboards for a Billion Datapoints on a Laptop

    Science.gov (United States)

    Steinberg, P. D.; Bednar, J. A.; Rudiger, P.; Stevens, J. L. R.; Ball, C. E.; Christensen, S. D.; Pothina, D.

    2017-12-01

    The rich variety of software libraries available in the Python scientific ecosystem provides a flexible and powerful alternative to traditional integrated GIS (geographic information system) programs. Each such library focuses on doing a certain set of general-purpose tasks well, and Python makes it relatively simple to glue the libraries together to solve a wide range of complex, open-ended problems in Earth science. However, choosing an appropriate set of libraries can be challenging, and it is difficult to predict how much "glue code" will be needed for any particular combination of libraries and tasks. Here we present a set of libraries that have been designed to work well together to build interactive analyses and visualizations of large geographic datasets, in standard web browsers. The resulting workflows run on ordinary laptops even for billions of data points, and easily scale up to larger compute clusters when available. The declarative top-level interface used in these libraries means that even complex, fully interactive applications can be built and deployed as web services using only a few dozen lines of code, making it simple to create and share custom interactive applications even for datasets too large for most traditional GIS systems. The libraries we will cover include GeoViews (HoloViews extended for geographic applications) for declaring visualizable/plottable objects, Bokeh for building visual web applications from GeoViews objects, Datashader for rendering arbitrarily large datasets faithfully as fixed-size images, Param for specifying user-modifiable parameters that model your domain, Xarray for computing with n-dimensional array data, Dask for flexibly dispatching computational tasks across processors, and Numba for compiling array-based Python code down to fast machine code. We will show how to use the resulting workflow with static datasets and with simulators such as GSSHA or AdH, allowing you to deploy flexible, high-performance web

  6. MARGINAL EXPENSE OIL WELL WIRELESS SURVEILLANCE MEOWS

    Energy Technology Data Exchange (ETDEWEB)

    Mason M. Medizade; John R. Ridgely; Donald G. Nelson

    2004-11-01

    A marginal expense oil well wireless surveillance system to monitor system performance and production from rod-pumped wells in real time from wells operated by Vaquero Energy in the Edison Field, Main Area of Kern County in California has been successfully designed and field tested. The surveillance system includes a proprietary flow sensor, a programmable transmitting unit, a base receiver and receiving antenna, and a base station computer equipped with software to interpret the data. First, the system design is presented. Second, field data obtained from three wells is shown. Results of the study show that an effective, cost competitive, real-time wireless surveillance system can be introduced to oil fields across the United States and the world.

  7. Modular, bluetooth enabled, wireless electroencephalograph (EEG) platform.

    Science.gov (United States)

    Lovelace, Joseph A; Witt, Tyler S; Beyette, Fred R

    2013-01-01

    A design for a modular, compact, and accurate wireless electroencephalograph (EEG) system is proposed. EEG is the only non-invasive measure for neuronal function of the brain. Using a number of digital signal processing (DSP) techniques, this neuronal function can be acquired and processed into meaningful representations of brain activity. The system described here utilizes Bluetooth to wirelessly transmit the digitized brain signal for an end application use. In this way, the system is portable, and modular in terms of the device to which it can interface. Brain Computer Interface (BCI) has become a popular extension of EEG systems in modern research. This design serves as a platform for applications using BCI capability.

  8. Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Bakar, Kamalrulnizam Abu; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks. PMID:22368490

  9. Multipath routing in wireless sensor networks: survey and research challenges.

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Abu Bakar, Kamalrulnizam; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks.

  10. Fatal collision? Are wireless headsets a risk in treating patients?

    Science.gov (United States)

    Sage, Cindy; Hardell, Lennart

    2018-02-05

    Wireless-enabled headsets that connect to the internet can provide remote transcribing of patient examination notes. Audio and video can be captured and transmitted by wireless signals sent from the computer screen in the frame of the glasses. But using wireless glass-type devices can expose the user to a specific absorption rates (SAR) of 1.11-1.46 W/kg of radiofrequency radiation. That RF intensity is as high as or higher than RF emissions of some cell phones. Prolonged use of cell phones used ipsilaterally at the head has been associated with statistically significant increased risk of glioma and acoustic neuroma. Using wireless glasses for extended periods to teach, to perform surgery, or conduct patient exams will expose the medical professional to similar RF exposures which may impair brain performance, cognition and judgment, concentration and attention and increase the risk for brain tumors. The quality of medical care may be compromised by extended use of wireless-embedded devices in health care settings. Both medical professionals and their patients should know the risks of such devices and have a choice about allowing their use during patient exams. Transmission of sensitive patient data over wireless networks may increase the risk of hacking and security breaches leading to losses of private patient medical and financial data that are strictly protected under HIPPA health information privacy laws.

  11. Passive Classification of Wireless NICs during Rate Switching

    Directory of Open Access Journals (Sweden)

    Cherita L. Corbett

    2008-02-01

    Full Text Available Computer networks have become increasingly ubiquitous. However, with the increase in networked applications, there has also been an increase in difficulty to manage and secure these networks. The proliferation of 802.11 wireless networks has heightened this problem by extending networks beyond physical boundaries. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC. This mechanism can be applied to support the detection of unauthorized systems that use NICs which are different from that of a legitimate system. We focus on rate switching, a vaguely specified mechanism required by the 802.11 standard that is implemented in the hardware and software of the wireless NIC. We show that the implementation of this function influences the transmission patterns of a wireless stream, which are observable through traffic analysis. Our mechanism for NIC identification uses signal processing to analyze the periodicity embedded in the wireless traffic caused by rate switching. A stable spectral profile is created from the periodic components of the traffic and used for the identity of the wireless NIC. We show that we can distinguish between NICs manufactured by different vendors and NICs manufactured by the same vendor using their spectral profiles.

  12. Passive Classification of Wireless NICs during Rate Switching

    Directory of Open Access Journals (Sweden)

    Beyah RaheemA

    2008-01-01

    Full Text Available Abstract Computer networks have become increasingly ubiquitous. However, with the increase in networked applications, there has also been an increase in difficulty to manage and secure these networks. The proliferation of 802.11 wireless networks has heightened this problem by extending networks beyond physical boundaries. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC. This mechanism can be applied to support the detection of unauthorized systems that use NICs which are different from that of a legitimate system. We focus on rate switching, a vaguely specified mechanism required by the 802.11 standard that is implemented in the hardware and software of the wireless NIC. We show that the implementation of this function influences the transmission patterns of a wireless stream, which are observable through traffic analysis. Our mechanism for NIC identification uses signal processing to analyze the periodicity embedded in the wireless traffic caused by rate switching. A stable spectral profile is created from the periodic components of the traffic and used for the identity of the wireless NIC. We show that we can distinguish between NICs manufactured by different vendors and NICs manufactured by the same vendor using their spectral profiles.

  13. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  14. Real-time monitoring of ubiquitous wireless ECG sensor node for medical care using ZigBee

    Science.gov (United States)

    Vijayalakshmi, S. R.; Muruganand, S.

    2012-01-01

    Sensor networks have the potential to impact many aspects of medical care greatly. By outfitting patients with wireless, wearable vital sign sensors, collecting detailed real-time data on physiological status can be greatly simplified. In this article, we propose the system architecture for smart sensor platform based on advanced wireless sensor networks. An emerging application for wireless sensor networks involves their use in medical care. In hospitals or clinics, outfitting every patient with tiny, wearable wireless vital sign sensors would allow doctors, nurses and other caregivers to continuously monitor the status of their patients. In an emergency or disaster scenario, the same technology would enable medics to more effectively care for a large number of casualties. First responders could receive immediate notifications on any changes in patient status, such as respiratory failure or cardiac arrest. Wireless sensor network is a set of small, autonomous devices, working together to solve different problems. It is a relatively new technology, experiencing true expansion in the past decade. People have realised that integration of small and cheap microcontrollers with sensors can result in the production of extremely useful devices, which can be used as an integral part of the sensor nets. These devices are called sensor nodes. Today, sensor nets are used in agriculture, ecology and tourism, but medicine is the area where they certainly meet the greatest potential. This article presents a medical smart sensor node platform. This article proposes a wireless two-lead EKG. These devices collect heart rate and EKG data and relay it over a short-range (300 m) wireless network to any number of receiving devices, including PDAs, laptops or ambulance-based terminals.

  15. Title One Laptop on Each Desk: Teaching Methods in Technology Rich Classrooms

    Directory of Open Access Journals (Sweden)

    Catarina Player-Koro

    2015-11-01

    Full Text Available This article takes its point of departure from the main findings from research in four upper secondary schools in a 1:1 initiative (one laptop per student and reports on a deeper analysis of four classrooms that are part of the empirical study. This study aims to investigate how teaching and learning in technology-rich classrooms are structured and thus contribute to the development of knowledge about the impact of technology on the structuring of teaching and learning in educational practices.Bernstein’s theoretical concept of the pedagogic discourse is used to make visible how the main incentive for teaching methods is the evaluation system that recontextualises traditional discourses about teaching and learning. The conclusion is that fundamental transformations of education is less about technology and more about the changing of the structures and discourses concerningteaching, learning and education.

  16. An Evaluation of the Impact of 1:1 Laptops on Student Attainment in Senior High School Sciences

    Science.gov (United States)

    Crook, Simon J.; Sharma, Manjula D.; Wilson, Rachel

    2015-01-01

    Our study capitalized on a unique natural experiment rather than a researcher-designed, randomized experiment whereby, thanks to the Australian Government's Digital Education Revolution, half of grade 9 students in 2008 received laptops and half did not. Consequently in late 2011, when these students sat for their grade 12 external examinations…

  17. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  18. Study of Wireless Authentication Center with Mixed Encryption in WSN

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2016-01-01

    Full Text Available WSN (wireless sensor network has been used in a wide range of applications nowadays. Sensor networks may often relay critical data; thus, security must be a high priority. However, due to their limited computational, energy, and storage resources, sensor nodes are vulnerable to attack. So how to protect sensor nodes from attacks without raising computational capability and energy consumption is a worthwhile issue. A WAC (wireless authentication center with mixed encryption named “MEWAC” is proposed. MEWAC is based on MCU (Microcontroller Unit and WiFi (Wireless Fidelity module and uses RSA, AES (Advanced Encryption Standard, and SHA-1 (Secure Hash Algorithm 1 to provide high performance authentication and data encryption services for sensor nodes. The experimental results show that MEWAC has the advantages of low cost, low power consumption, good performance, and stability; moreover, the authentication protocol improves the security of WSN and reduces the overhead in node authentication.

  19. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  20. An Assessment of Emerging Wireless Broadband Technologies

    National Research Council Canada - National Science Library

    Fountanas, Leonidas

    2001-01-01

    ... technologies in providing broadband services today, emerging wireless broadband technologies are expected to significantly increase their market share over the next years, Deploying a wireless network...

  1. COMPUTING

    CERN Document Server

    M. Kasemann

    Overview In autumn the main focus was to process and handle CRAFT data and to perform the Summer08 MC production. The operational aspects were well covered by regular Computing Shifts, experts on duty and Computing Run Coordination. At the Computing Resource Board (CRB) in October a model to account for service work at Tier 2s was approved. The computing resources for 2009 were reviewed for presentation at the C-RRB. The quarterly resource monitoring is continuing. Facilities/Infrastructure operations Operations during CRAFT data taking ran fine. This proved to be a very valuable experience for T0 workflows and operations. The transfers of custodial data to most T1s went smoothly. A first round of reprocessing started at the Tier-1 centers end of November; it will take about two weeks. The Computing Shifts procedure was tested full scale during this period and proved to be very efficient: 30 Computing Shifts Persons (CSP) and 10 Computing Resources Coordinators (CRC). The shift program for the shut down w...

  2. Wireless Sensor Portal Technology Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Recognizing the needs and challenges facing NASA Earth Science for data input, manipulation and distribution, Mobitrum is proposing a ? Wireless Sensor Portal...

  3. Adaptive Wireless Transceiver, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  4. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because....... This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  5. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  6. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless......Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because...

  7. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  8. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction CMS distributed computing system performed well during the 2011 start-up. The events in 2011 have more pile-up and are more complex than last year; this results in longer reconstruction times and harder events to simulate. Significant increases in computing capacity were delivered in April for all computing tiers, and the utilisation and load is close to the planning predictions. All computing centre tiers performed their expected functionalities. Heavy-Ion Programme The CMS Heavy-Ion Programme had a very strong showing at the Quark Matter conference. A large number of analyses were shown. The dedicated heavy-ion reconstruction facility at the Vanderbilt Tier-2 is still involved in some commissioning activities, but is available for processing and analysis. Facilities and Infrastructure Operations Facility and Infrastructure operations have been active with operations and several important deployment tasks. Facilities participated in the testing and deployment of WMAgent and WorkQueue+Request...

  9. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview During the past three months activities were focused on data operations, testing and re-enforcing shift and operational procedures for data production and transfer, MC production and on user support. Planning of the computing resources in view of the new LHC calendar in ongoing. Two new task forces were created for supporting the integration work: Site Commissioning, which develops tools helping distributed sites to monitor job and data workflows, and Analysis Support, collecting the user experience and feedback during analysis activities and developing tools to increase efficiency. The development plan for DMWM for 2009/2011 was developed at the beginning of the year, based on the requirements from the Physics, Computing and Offline groups (see Offline section). The Computing management meeting at FermiLab on February 19th and 20th was an excellent opportunity discussing the impact and for addressing issues and solutions to the main challenges facing CMS computing. The lack of manpower is particul...

  10. COMPUTING

    CERN Multimedia

    P. McBride

    The Computing Project is preparing for a busy year where the primary emphasis of the project moves towards steady operations. Following the very successful completion of Computing Software and Analysis challenge, CSA06, last fall, we have reorganized and established four groups in computing area: Commissioning, User Support, Facility/Infrastructure Operations and Data Operations. These groups work closely together with groups from the Offline Project in planning for data processing and operations. Monte Carlo production has continued since CSA06, with about 30M events produced each month to be used for HLT studies and physics validation. Monte Carlo production will continue throughout the year in the preparation of large samples for physics and detector studies ramping to 50 M events/month for CSA07. Commissioning of the full CMS computing system is a major goal for 2007. Site monitoring is an important commissioning component and work is ongoing to devise CMS specific tests to be included in Service Availa...

  11. A cluster-based architecture to structure the topology of parallel wireless sensor networks.

    Science.gov (United States)

    Lloret, Jaime; Garcia, Miguel; Bri, Diana; Diaz, Juan R

    2009-01-01

    A wireless sensor network is a self-configuring network of mobile nodes connected by wireless links where the nodes have limited capacity and energy. In many cases, the application environment requires the design of an exclusive network topology for a particular case. Cluster-based network developments and proposals in existence have been designed to build a network for just one type of node, where all nodes can communicate with any other nodes in their coverage area. Let us suppose a set of clusters of sensor nodes where each cluster is formed by different types of nodes (e.g., they could be classified by the sensed parameter using different transmitting interfaces, by the node profile or by the type of device: laptops, PDAs, sensor etc.) and exclusive networks, as virtual networks, are needed with the same type of sensed data, or the same type of devices, or even the same type of profiles. In this paper, we propose an algorithm that is able to structure the topology of different wireless sensor networks to coexist in the same environment. It allows control and management of the topology of each network. The architecture operation and the protocol messages will be described. Measurements from a real test-bench will show that the designed protocol has low bandwidth consumption and also demonstrates the viability and the scalability of the proposed architecture. Our ccluster-based algorithm is compared with other algorithms reported in the literature in terms of architecture and protocol measurements.

  12. Value of wireless personal digital assistants for practice: perceptions of advanced practice nurses.

    Science.gov (United States)

    Garrett, Bernard; Klein, Gerri

    2008-08-01

    The aims were to explore advanced practice nurses' perceptions on wireless Personal Digital Assistant technologies, to establish the type and range of tools that would be useful to support their practice and to identify any requirements and limitations that may impact the implementation of wireless Personal Digital Assistants in practice. The wireless Personal Digital Assistant is becoming established as a hand-held computing tool for healthcare professionals. The reflections of advanced practice nurses' about the value of wireless Personal Digital Assistants and its potential to contribute to improved patient care has not been investigated. A qualitative interpretivist design was used to explore advanced practice nurses' perceptions on the value of wireless Personal Digital Assistant technologies to support their practice. The data were collected using survey questionnaires and individual and focus group interviews with nurse practitioners, clinical nurse specialists and information technology managers based in British Columbia, Canada. An open-coding content analysis was performed using qualitative data analysis software. Wireless Personal Digital Assistant's use supports the principles of pervasivity and is a technology rapidly being adopted by advanced practice nurses. Some nurses indicated a reluctance to integrate wireless Personal Digital Assistant technologies into their practices because of the cost and the short technological life cycle of these devices. Many of the barriers which precluded the use of wireless networks within facilities are being removed. Nurses demonstrated a complex understanding of wireless Personal Digital Assistant technologies and gave good rationales for its integration in their practice. Nurses identified improved client care as the major benefit of this technology in practice and the type and range of tools they identified included clinical reference tools such as drug and diagnostic/laboratory reference applications and wireless

  13. Wireless Self-powered Visual and NDE Robotic Inspection System for Live Gas Distribution Mains

    Energy Technology Data Exchange (ETDEWEB)

    Susan Burkett; Hagen Schempf

    2006-01-31

    recovery of the system using custom fittings and a (to be developed) launch-chamber/-tube. The battery modules are used to power the system, by providing power to the robot's bus. The support modules perform the functions of centration for the rest of the train as well as odometry pickups using incremental encoding schemes. The electronics architecture is based on a distributed (8-bit) microprocessor architecture (at least 1 in ea. module) communicating to a (one of two) 32-bit SBC, which manages all video-processing, posture and motion control as well as CAN and wireless communications. The operator controls the entire system from an off-board (laptop) controller, which is in constant wireless communication with the robot train in the pipe. The sensor modules collect data and forward it to the robot operator computer (via the CAN-wireless communications chain), who then transfers it to a dedicated NDE data-storage and post-processing computer for further (real-time or off-line) analysis. CMU has fully designed every module in terms of the mechanical, electrical and software elements (architecture only). Substantial effort has gone into pre-prototyping to uncover mechanical, electrical and software issues for critical elements of the design. Design requirements for sensor-providers were also detailed and finalized and provided to them for inclusion in their designs. CMU is expecting to start 2006 with a detailed design effort for both mechanical and electrical components, followed by procurement and fabrication efforts in late winter/spring 2006. The assembly and integration efforts will occupy all of the spring and summer of 2006. Software development will also be a major effort in 2006, and will result in porting and debugging of code on the module- and train-levels in late summer and Fall of 2006. Final pipe mock-up testing is expected in late fall and early winter 2006 with an acceptance demonstration of the robot train (with a sensor-module mock-up) planned to Do

  14. 1st International Conference on Recent Cognizance in Wireless Communication & Image Processing

    CERN Document Server

    Srivastava, Vishnu; Singh, Ghanshyam; Bhatnagar, Deepak

    2016-01-01

    This volume comprises the proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. It brings together content from academicians, researchers, and industry experts in areas of Wireless Communication and Image Processing. The volume provides a snapshot of current progress in computational creativity and a glimpse of future possibilities. The proceedings include two kinds of paper submissions: (i) regular papers addressing foundation issues, describing original research on creative systems development and modeling; and (ii) position papers describing work-in-progress or research directions for computational creativity. This work will be useful to professionals and researchers working in the core areas of wireless communications and image processing.

  15. A Bi-directional Energy Splitable Model for Energy Optimization in Wireless Sensor Networks

    OpenAIRE

    Rajeswari, A; Kalaivaani, P.T

    2011-01-01

    Wireless Sensor Networks is a budding  prototype of networking and computing, where a node may be self powered and individual node have the capability to sense and compute and communicate. Wireless Sensor Networks have been proposed for variety of applications such as Industrial control and monitoring and home automation and consumer electronics and security andMilitary sensing, Asset tracking and supply chain management, Intelligent Agriculture, Missile directing, Fire alarming, Landslide Wa...

  16. Wireless Handheld Scanners Integrated with Waste Tracking

    International Nuclear Information System (INIS)

    Anderson, Robert Stephen

    2000-01-01

    The US Department of Energy (DOE) Idaho National Engineering and Environmental Laboratory (INEEL) has embraced mobile wireless technology to help the disposition of hazardous and mixed radiological waste. The following paper describes one application the INEEL developed to increase the data accuracy and near-real time reporting requirements for waste management. With the continuous operational demands at the ''site'', it was difficult to sustain an accurate, up-to-date database required for regulatory compliance audits and reporting. Incorporating wireless mobile technology, the INEEL was able to increase the accuracy while reducing the data delay times previously encountered. Installation issues prolonged the project along with obstacles encountered with operations personnel. However, the success of this project was found in persistence and management support as well as the technology itself. Future wireless, mobile computing will continue at the INEEL for years to come based on a successful project that was able to integrate new technology to an existing waste management system with proven, increased data accuracy

  17. Wireless Structural Sensing for Health Monitoring and Control Applications

    Science.gov (United States)

    Lynch, J. P.

    2003-12-01

    The economic and societal impact of civil structures under-performing during large earthquakes can be significant. While in recent years the structural engineering community has made great strides in advancing knowledge of structural behavior under extreme loads, a need still exists for the rapid assessment of structural performance during seismic events. Numerous options are commercially available to facility owners who wish to install a structural monitoring system within their structures. However, these structural monitoring systems are defined by their use of coaxial cables for the transfer of response measurements from sensors to centralized data servers. The installation and maintenance of cables within a civil structure often drive system costs high thereby preventing widespread industry adoption. In response to these limitations, the integration of information technologies such as wireless communications and microcontrollers have been explored for the creation of alternative structural monitoring systems defined by low installation costs and decentralized computational frameworks. In particular, a novel wireless structural monitoring system assembled from a dense network of inexpensive wireless sensing units has been designed and fabricated. The wireless sensing unit architecture consists of three functional components: a data acquisition interface for the collection of data from attached sensors, a computational core for data interrogation, and a wireless communication channel for the transfer of data to the sensor network. The use of wireless modems drastically reduces the efforts and costs of system installations rendering the technology attractive for widespread adoption in a broad class of civil structures. A second innovation of the system is the inclusion of computational power within each wireless sensing unit allowing for local execution of embedded engineering analyses. In particular, analyses for the detection of damage in structures (structural

  18. Design and Optimisation Problems in Wireless Sensor Networks

    Indian Academy of Sciences (India)

    Premkumar Karumbu,1.05 ECE,,+91-9448227167

    2010-11-14

    Nov 14, 2010 ... Nodes contain pieces of a distributed signal processing algorithm. Computations are performed on the measurements ... Potential Applications of Wireless Sensor Networks. Environment monitoring .... Minimise detection delay s.t. a false alarm probability bound, i.e., min E((˜U − T)I{ ˜T≥T}) subject to. Pr (.

  19. Address autoconfiguration in wireless ad hoc networks : Protocols and techniques

    NARCIS (Netherlands)

    Cempaka Wangi, N.I.; Prasad, R.V.; Jacobsson, M.; Niemegeers, I.

    2008-01-01

    With the advent of smaller devices having higher computational capacity and wireless communication capabilities, the world is becoming completely networked. Although, the mobile nature of these devices provides ubiquitous services, it also poses many challenges. In this article, we look in depth at

  20. Energy efficiency of error correction on wireless systems

    NARCIS (Netherlands)

    Havinga, Paul J.M.

    1999-01-01

    Since high error rates are inevitable to the wireless environment, energy-efficient error-control is an important issue for mobile computing systems. We have studied the energy efficiency of two different error correction mechanisms and have measured the efficiency of an implementation in software.

  1. Low power radio communication platform for wireless sensor network

    NARCIS (Netherlands)

    Dutta, R.; Bentum, Marinus Jan; van der Zee, Ronan A.R.; Kokkeler, Andre B.J.

    2009-01-01

    Wireless sensor networks are predicted to be the most versatile, popular and useful technology in the near future. A large number of applications are targeted which will hugely benefit from a network of tiny computers with few sensors, radio communication platform, intelligent networking and

  2. Security in Wireless Sensor Networks Employing MACGSP6

    Science.gov (United States)

    Nitipaichit, Yuttasart

    2010-01-01

    Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…

  3. Performance Modeling for Heterogeneous Wireless Networks with Multiservice Overflow Traffic

    DEFF Research Database (Denmark)

    Huang, Qian; Ko, King-Tim; Iversen, Villy Bæk

    2009-01-01

    . Multiservice loss analysis based on multi-dimensional Markov chain becomes intractable in these networks due to intensive computations required. This paper focuses on performance modeling for heterogeneous wireless networks based on a hierarchical overlay infrastructure. A method based on decomposition...

  4. Enabling multimode wireless access networks using remote radio heads

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2012-01-01

    the advantages of using distributed base station architectures to provide multimode capabilities. In particular, it focuses on the radio unit, commonly known in industry as remote radio head. Multimode radio units capable of operating according to different wireless standards (WCDMA, LTE and WiMAX) can be proven....... © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering....

  5. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing activity had ramped down after the completion of the reprocessing of the 2012 data and parked data, but is increasing with new simulation samples for analysis and upgrade studies. Much of the Computing effort is currently involved in activities to improve the computing system in preparation for 2015. Operations Office Since the beginning of 2013, the Computing Operations team successfully re-processed the 2012 data in record time, not only by using opportunistic resources like the San Diego Supercomputer Center which was accessible, to re-process the primary datasets HTMHT and MultiJet in Run2012D much earlier than planned. The Heavy-Ion data-taking period was successfully concluded in February collecting almost 500 T. Figure 3: Number of events per month (data) In LS1, our emphasis is to increase efficiency and flexibility of the infrastructure and operation. Computing Operations is working on separating disk and tape at the Tier-1 sites and the full implementation of the xrootd federation ...

  6. Green Wireless Power Transfer Networks

    NARCIS (Netherlands)

    Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.

    2016-01-01

    wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.

  7. Wireless Networks: a brief introduction

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Networks: a brief introduction. Wireless communication: What? Why? How many types? What is cell? Is it different from fixed landline structure? 1G systems: FDMA/FDD and Analog FM [voice comm]. (Introduced in 1983 in Chicago by AMPS). 2G systems: 3 ...

  8. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  9. COMPUTING

    CERN Multimedia

    M. Kasemann P. McBride Edited by M-C. Sawley with contributions from: P. Kreuzer D. Bonacorsi S. Belforte F. Wuerthwein L. Bauerdick K. Lassila-Perini M-C. Sawley

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the comput...

  10. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion An activity that is still in progress is computing for the heavy-ion program. The heavy-ion events are collected without zero suppression, so the event size is much large at roughly 11 MB per event of RAW. The central collisions are more complex and...

  11. Bežična mrežna tehnologija Bluetooth / Wireless networking technology Bluetooth

    Directory of Open Access Journals (Sweden)

    Jelena Opačić

    2003-05-01

    Full Text Available U narednim godinama raznovrsni uređaji, od ćelijskih telefona i laptopova do personalnih digitalnih pomoćnih sredstava i kućnih aparata, biće u mogućnosti da komuniciraju i budu međusobno povezani korišćenjem nove visoko-brzinske mikrotalasne, bežične, link tehnologije male snage nazvane Bluetooth. Sadržaj ovog rada čine pregled tehnologije, standardizacija i primena Bluetootha. / In the years to come, variety of devices, from cell phones and laptops to personal digital assistants and household appliances, will be capable of communicating and interoperating with one another using a new high-speed low-power microwave wireless link technology called Bluetooth. The overview of this technology, standardization and application of Bluetooth are the contents of this paper.

  12. A Novel Intelligent Transportation Control Supported by Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Zhe Qian

    2013-05-01

    Full Text Available With the development of wireless sensor unit, and improvement of real-time and quality of wireless communication, the intelligent transportation control system employ these technologies to realize sensing, positioning, computing, and communication for voiding collisions. This paper discusses the framework of transportation control system, and emphases TDOA positioning algorithm and the new weighted least square optimization method. The simulation result shows that, our method achieves high-accuracy of positioning, which can satisfy the need of transportation control. Finally, we outline the urgent work need to address in the future.

  13. Virtual View Image over Wireless Visual Sensor Network

    Directory of Open Access Journals (Sweden)

    Gamantyo Hendrantoro

    2011-12-01

    Full Text Available In general, visual sensors are applied to build virtual view images. When number of visual sensors increases then quantity and quality of the information improves. However, the view images generation is a challenging task in Wireless Visual Sensor Network environment due to energy restriction, computation complexity, and bandwidth limitation. Hence this paper presents a new method of virtual view images generation from selected cameras on Wireless Visual Sensor Network. The aim of the paper is to meet bandwidth and energy limitations without reducing information quality. The experiment results showed that this method could minimize number of transmitted imageries with sufficient information.

  14. Nonlinear Gossip Algorithms for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chao Shi

    2014-01-01

    Full Text Available We study some nonlinear gossip algorithms for wireless sensor networks. Firstly, two types of nonlinear single gossip algorithms are proposed. By using Lyapunov theory, Lagrange mean value theorem, and stochastic Lasalle’s invariance principle, we prove that the nonlinear single gossip algorithms can converge to the average of initial states with probability one. Secondly, two types of nonlinear multigossip algorithms are also presented and the convergence is proved by the same methods. Finally, computer simulation is also given to show the validity of the theoretical results.

  15. Ubiquitous Wireless Smart Sensing and Control

    Science.gov (United States)

    Wagner, Raymond

    2013-01-01

    Need new technologies to reliably and safely have humans interact within sensored environments (integrated user interfaces, physical and cognitive augmentation, training, and human-systems integration tools). Areas of focus include: radio frequency identification (RFID), motion tracking, wireless communication, wearable computing, adaptive training and decision support systems, and tele-operations. The challenge is developing effective, low cost/mass/volume/power integrated monitoring systems to assess and control system, environmental, and operator health; and accurately determining and controlling the physical, chemical, and biological environments of the areas and associated environmental control systems.

  16. Investigating wireless power transfer

    Science.gov (United States)

    St John, Stuart A.

    2017-09-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.

  17. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  18. Wireless installation standard

    International Nuclear Information System (INIS)

    Lim, Hwang Bin

    2007-12-01

    This is divided six parts which are radio regulation law on securing of radio resource, use of radio resource, protection of radio resource, radio regulation enforcement ordinance with securing, distribution and assignment of radio regulation, radio regulation enforcement regulation on utility of radio resource and technical qualification examination, a wireless installation regulation of technique standard and safety facility standard, radio regulation such as certification regulation of information communicative machines and regulation of radio station on compliance of signal security, radio equipment in radio station, standard frequency station and emergency communication.

  19. Graphical Model Theory for Wireless Sensor Networks

    International Nuclear Information System (INIS)

    Davis, William B.

    2002-01-01

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm

  20. Graphical Model Theory for Wireless Sensor Networks

    Energy Technology Data Exchange (ETDEWEB)

    Davis, William B.

    2002-12-08

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm.

  1. Wireless local area network in a prehospital environment

    Directory of Open Access Journals (Sweden)

    Grimes Gary J

    2004-08-01

    Full Text Available Abstract Background Wireless local area networks (WLANs are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER. The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  2. Algorithm for Wireless Sensor Networks Based on Grid Management

    Directory of Open Access Journals (Sweden)

    Geng Zhang

    2014-05-01

    Full Text Available This paper analyzes the key issues for wireless sensor network trust model and describes a method to build a wireless sensor network, such as the definition of trust for wireless sensor networks, computing and credibility of trust model application. And for the problem that nodes are vulnerable to attack, this paper proposed a grid-based trust algorithm by deep exploration trust model within the framework of credit management. Algorithm for node reliability screening and rotation schedule to cover parallel manner based on the implementation of the nodes within the area covered by trust. And analyze the results of the size of trust threshold has great influence on the safety and quality of coverage throughout the coverage area. The simulation tests the validity and correctness of the algorithm.

  3. A wireless implantable switched-capacitor based optogenetic stimulating system.

    Science.gov (United States)

    Lee, Hyung-Min; Kwon, Ki-Yong; Li, Wen; Ghovanloo, Maysam

    2014-01-01

    This paper presents a power-efficient implantable optogenetic interface using a wireless switched-capacitor based stimulating (SCS) system. The SCS efficiently charges storage capacitors directly from an inductive link and periodically discharges them into an array of micro-LEDs, providing high instantaneous power without affecting wireless link and system supply voltage. A custom-designed computer interface in LabVIEW environment wirelessly controls stimulation parameters through the inductive link, and an optrode array enables simultaneous neural recording along with optical stimulation. The 4-channel SCS system prototype has been implemented in a 0.35-μm CMOS process and combined with the optrode array. In vivo experiments involving light-induced local field potentials verified the efficacy of the SCS system. An implantable version of the SCS system with flexible hermetic sealing is under development for chronic experiments.

  4. A Novel Situation Specific Network Security for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Al-Rousan

    2015-03-01

    Full Text Available Researchers have come up with many high level security protocols and key management algorithms that can be applied for different types of networks. The main characteristics of wireless sensor networks that are limited computation and power made it difficult to apply these secure key management algorithms since it consumes much power and resources. Sensors in the field at different periods of time of their life time need higher level of security more than other times - sensors in a battlefield need higher security when it is war time. In our research we developed an adaptive security protocol for two-layer clustered heterogeneous wireless sensor networks that can toggle between five different modes of operation, each with different security level. Each level of security has its own encryption/decryption algorithm and specified key length depending on the situation of the application and the situation for the wireless sensor networks.

  5. A Wireless Implantable Switched-Capacitor Based Optogenetic Stimulating System

    Science.gov (United States)

    Lee, Hyung-Min; Kwon, Ki-Yong; Li, Wen

    2015-01-01

    This paper presents a power-efficient implantable optogenetic interface using a wireless switched-capacitor based stimulating (SCS) system. The SCS efficiently charges storage capacitors directly from an inductive link and periodically discharges them into an array of micro-LEDs, providing high instantaneous power without affecting wireless link and system supply voltage. A custom-designed computer interface in LabVIEW environment wirelessly controls stimulation parameters through the inductive link, and an optrode array enables simultaneous neural recording along with optical stimulation. The 4-channel SCS system prototype has been implemented in a 0.35-μm CMOS process and combined with the optrode array. In vivo experiments involving light-induced local field potentials verified the efficacy of the SCS system. An implantable version of the SCS system with flexible hermetic sealing is under development for chronic experiments. PMID:25570099

  6. COMPUTING

    CERN Multimedia

    P. McBride

    It has been a very active year for the computing project with strong contributions from members of the global community. The project has focused on site preparation and Monte Carlo production. The operations group has begun processing data from P5 as part of the global data commissioning. Improvements in transfer rates and site availability have been seen as computing sites across the globe prepare for large scale production and analysis as part of CSA07. Preparations for the upcoming Computing Software and Analysis Challenge CSA07 are progressing. Ian Fisk and Neil Geddes have been appointed as coordinators for the challenge. CSA07 will include production tests of the Tier-0 production system, reprocessing at the Tier-1 sites and Monte Carlo production at the Tier-2 sites. At the same time there will be a large analysis exercise at the Tier-2 centres. Pre-production simulation of the Monte Carlo events for the challenge is beginning. Scale tests of the Tier-0 will begin in mid-July and the challenge it...

  7. COMPUTING

    CERN Multimedia

    M. Kasemann

    CCRC’08 challenges and CSA08 During the February campaign of the Common Computing readiness challenges (CCRC’08), the CMS computing team had achieved very good results. The link between the detector site and the Tier0 was tested by gradually increasing the number of parallel transfer streams well beyond the target. Tests covered the global robustness at the Tier0, processing a massive number of very large files and with a high writing speed to tapes.  Other tests covered the links between the different Tiers of the distributed infrastructure and the pre-staging and reprocessing capacity of the Tier1’s: response time, data transfer rate and success rate for Tape to Buffer staging of files kept exclusively on Tape were measured. In all cases, coordination with the sites was efficient and no serious problem was found. These successful preparations prepared the ground for the second phase of the CCRC’08 campaign, in May. The Computing Software and Analysis challen...

  8. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion The Tier 0 infrastructure was able to repack and promptly reconstruct heavy-ion collision data. Two copies were made of the data at CERN using a large CASTOR disk pool, and the core physics sample was replicated ...

  9. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the co...

  10. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

    Introduction Computing continued with a high level of activity over the winter in preparation for conferences and the start of the 2012 run. 2012 brings new challenges with a new energy, more complex events, and the need to make the best use of the available time before the Long Shutdown. We expect to be resource constrained on all tiers of the computing system in 2012 and are working to ensure the high-priority goals of CMS are not impacted. Heavy ions After a successful 2011 heavy-ion run, the programme is moving to analysis. During the run, the CAF resources were well used for prompt analysis. Since then in 2012 on average 200 job slots have been used continuously at Vanderbilt for analysis workflows. Operations Office As of 2012, the Computing Project emphasis has moved from commissioning to operation of the various systems. This is reflected in the new organisation structure where the Facilities and Data Operations tasks have been merged into a common Operations Office, which now covers everything ...

  11. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction During the past six months, Computing participated in the STEP09 exercise, had a major involvement in the October exercise and has been working with CMS sites on improving open issues relevant for data taking. At the same time operations for MC production, real data reconstruction and re-reconstructions and data transfers at large scales were performed. STEP09 was successfully conducted in June as a joint exercise with ATLAS and the other experiments. It gave good indication about the readiness of the WLCG infrastructure with the two major LHC experiments stressing the reading, writing and processing of physics data. The October Exercise, in contrast, was conducted as an all-CMS exercise, where Physics, Computing and Offline worked on a common plan to exercise all steps to efficiently access and analyze data. As one of the major results, the CMS Tier-2s demonstrated to be fully capable for performing data analysis. In recent weeks, efforts were devoted to CMS Computing readiness. All th...

  12. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction The first data taking period of November produced a first scientific paper, and this is a very satisfactory step for Computing. It also gave the invaluable opportunity to learn and debrief from this first, intense period, and make the necessary adaptations. The alarm procedures between different groups (DAQ, Physics, T0 processing, Alignment/calibration, T1 and T2 communications) have been reinforced. A major effort has also been invested into remodeling and optimizing operator tasks in all activities in Computing, in parallel with the recruitment of new Cat A operators. The teams are being completed and by mid year the new tasks will have been assigned. CRB (Computing Resource Board) The Board met twice since last CMS week. In December it reviewed the experience of the November data-taking period and could measure the positive improvements made for the site readiness. It also reviewed the policy under which Tier-2 are associated with Physics Groups. Such associations are decided twice per ye...

  13. Wireless Control LEGO NXT robot using voice commands

    OpenAIRE

    David Be; Cinhtia González; Manuel Escalante; Michel García; Carlos Miranda; Sergio Gonzalez

    2011-01-01

    This paper presents a wireless interface to control a LEGO NXT robot using voice commands through a computer. To perform speech recognition is used CSLU TOOLKIT with a corpus of Mexican Spanish voice, recognized commands are sent via Bluetooth from computer to robot, programming and motion routines to control the motors are done using Java and LeJOS NXJ. The interface consists of two main modules interconnected through the implementation of sockets: the voice recognition module and the wirele...

  14. PFLOTRAN: Reactive Flow & Transport Code for Use on Laptops to Leadership-Class Supercomputers

    Energy Technology Data Exchange (ETDEWEB)

    Hammond, Glenn E.; Lichtner, Peter C.; Lu, Chuan; Mills, Richard T.

    2012-04-18

    PFLOTRAN, a next-generation reactive flow and transport code for modeling subsurface processes, has been designed from the ground up to run efficiently on machines ranging from leadership-class supercomputers to laptops. Based on an object-oriented design, the code is easily extensible to incorporate additional processes. It can interface seamlessly with Fortran 9X, C and C++ codes. Domain decomposition parallelism is employed, with the PETSc parallel framework used to manage parallel solvers, data structures and communication. Features of the code include a modular input file, implementation of high-performance I/O using parallel HDF5, ability to perform multiple realization simulations with multiple processors per realization in a seamless manner, and multiple modes for multiphase flow and multicomponent geochemical transport. Chemical reactions currently implemented in the code include homogeneous aqueous complexing reactions and heterogeneous mineral precipitation/dissolution, ion exchange, surface complexation and a multirate kinetic sorption model. PFLOTRAN has demonstrated petascale performance using 2{sup 17} processor cores with over 2 billion degrees of freedom. Accomplishments achieved to date include applications to the Hanford 300 Area and modeling CO{sub 2} sequestration in deep geologic formations.

  15. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  16. Don't Let Your COWS Be an Udder (Utter) Disaster: Wirelessness and Education Test the Electromagnetic Spectrum

    Science.gov (United States)

    Huber, Joe; Gillan, Bud

    2004-01-01

    Just when thinking about the Internet and other tidal waves of technology have found their places in schools, along comes a brash new upstart called wirelessness. This discussion takes on more simple task of providing more useful information to schools in their quest for being wireless, including the use of COWS (computer on wheels) is related to…

  17. Ultra low power signal oriented approach for wireless health monitoring.

    Science.gov (United States)

    Marinkovic, Stevan; Popovici, Emanuel

    2012-01-01

    In recent years there is growing pressure on the medical sector to reduce costs while maintaining or even improving the quality of care. A potential solution to this problem is real time and/or remote patient monitoring by using mobile devices. To achieve this, medical sensors with wireless communication, computational and energy harvesting capabilities are networked on, or in, the human body forming what is commonly called a Wireless Body Area Network (WBAN). We present the implementation of a novel Wake Up Receiver (WUR) in the context of standardised wireless protocols, in a signal-oriented WBAN environment and present a novel protocol intended for wireless health monitoring (WhMAC). WhMAC is a TDMA-based protocol with very low power consumption. It utilises WBAN-specific features and a novel ultra low power wake up receiver technology, to achieve flexible and at the same time very low power wireless data transfer of physiological signals. As the main application is in the medical domain, or personal health monitoring, the protocol caters for different types of medical sensors. We define four sensor modes, in which the sensors can transmit data, depending on the sensor type and emergency level. A full power dissipation model is provided for the protocol, with individual hardware and application parameters. Finally, an example application shows the reduction in the power consumption for different data monitoring scenarios.

  18. Pengaruh Motivasi, Persepsi, Pembelajaran, Kepercayaan Dan Sikap Konsumen Terhadap Keputusan Pembelian Produk Laptop Merek Asus Pada Pengunjung Plaza Medan Fair

    OpenAIRE

    Sufatma, Ayu

    2015-01-01

    The purpose of this research is to identify and analyze the influence of motivation (X1), Perception (X2), Learning (X3), Belief and Attitude (X4) consumers on product purchasing decisions on brand laptop Asus visitors Plaza Medan Fair Medan.This study is a quantitative descriptive research. Where the variable measured with Likert.scale, analytical method used is descriptive and statistical analysis method that uses multiple linear regression analysis, significant testing simultaneous partial...

  19. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  20. Structural processing for wireless communications

    CERN Document Server

    Lu, Jianhua; Ge, Ning

    2015-01-01

    This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.

  1. Radio Relays Improve Wireless Products

    Science.gov (United States)

    2009-01-01

    Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.

  2. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  3. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  4. Microwave materials for wireless applications

    CERN Document Server

    Cruickshank, David B

    2011-01-01

    This practical resource offers you an in-depth, up-to-date understanding of the use of microwave magnetic materials for cutting-edge wireless applications. The book discusses device applications used in wireless infrastructure base stations, point-to-point radio links, and a range of more specialized microwave systems. You find detailed discussions on the attributes of each family of magnetic materials with respect to specific wireless applications. Moreover, the book addresses two of the hottest topics in the field today - insertion loss and intermodulation. This comprehensive reference also

  5. COMPUTING

    CERN Multimedia

    Matthias Kasemann

    Overview The main focus during the summer was to handle data coming from the detector and to perform Monte Carlo production. The lessons learned during the CCRC and CSA08 challenges in May were addressed by dedicated PADA campaigns lead by the Integration team. Big improvements were achieved in the stability and reliability of the CMS Tier1 and Tier2 centres by regular and systematic follow-up of faults and errors with the help of the Savannah bug tracking system. In preparation for data taking the roles of a Computing Run Coordinator and regular computing shifts monitoring the services and infrastructure as well as interfacing to the data operations tasks are being defined. The shift plan until the end of 2008 is being put together. User support worked on documentation and organized several training sessions. The ECoM task force delivered the report on “Use Cases for Start-up of pp Data-Taking” with recommendations and a set of tests to be performed for trigger rates much higher than the ...

  6. COMPUTING

    CERN Multimedia

    P. MacBride

    The Computing Software and Analysis Challenge CSA07 has been the main focus of the Computing Project for the past few months. Activities began over the summer with the preparation of the Monte Carlo data sets for the challenge and tests of the new production system at the Tier-0 at CERN. The pre-challenge Monte Carlo production was done in several steps: physics generation, detector simulation, digitization, conversion to RAW format and the samples were run through the High Level Trigger (HLT). The data was then merged into three "Soups": Chowder (ALPGEN), Stew (Filtered Pythia) and Gumbo (Pythia). The challenge officially started when the first Chowder events were reconstructed on the Tier-0 on October 3rd. The data operations teams were very busy during the the challenge period. The MC production teams continued with signal production and processing while the Tier-0 and Tier-1 teams worked on splitting the Soups into Primary Data Sets (PDS), reconstruction and skimming. The storage sys...

  7. COMPUTING

    CERN Document Server

    2010-01-01

    Introduction Just two months after the “LHC First Physics” event of 30th March, the analysis of the O(200) million 7 TeV collision events in CMS accumulated during the first 60 days is well under way. The consistency of the CMS computing model has been confirmed during these first weeks of data taking. This model is based on a hierarchy of use-cases deployed between the different tiers and, in particular, the distribution of RECO data to T1s, who then serve data on request to T2s, along a topology known as “fat tree”. Indeed, during this period this model was further extended by almost full “mesh” commissioning, meaning that RECO data were shipped to T2s whenever possible, enabling additional physics analyses compared with the “fat tree” model. Computing activities at the CMS Analysis Facility (CAF) have been marked by a good time response for a load almost evenly shared between ALCA (Alignment and Calibration tasks - highest p...

  8. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing operation has been lower as the Run 1 samples are completing and smaller samples for upgrades and preparations are ramping up. Much of the computing activity is focusing on preparations for Run 2 and improvements in data access and flexibility of using resources. Operations Office Data processing was slow in the second half of 2013 with only the legacy re-reconstruction pass of 2011 data being processed at the sites.   Figure 1: MC production and processing was more in demand with a peak of over 750 Million GEN-SIM events in a single month.   Figure 2: The transfer system worked reliably and efficiently and transferred on average close to 520 TB per week with peaks at close to 1.2 PB.   Figure 3: The volume of data moved between CMS sites in the last six months   The tape utilisation was a focus for the operation teams with frequent deletion campaigns from deprecated 7 TeV MC GEN-SIM samples to INVALID datasets, which could be cleaned up...

  9. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

      Introduction Computing activity has been running at a sustained, high rate as we collect data at high luminosity, process simulation, and begin to process the parked data. The system is functional, though a number of improvements are planned during LS1. Many of the changes will impact users, we hope only in positive ways. We are trying to improve the distributed analysis tools as well as the ability to access more data samples more transparently.  Operations Office Figure 2: Number of events per month, for 2012 Since the June CMS Week, Computing Operations teams successfully completed data re-reconstruction passes and finished the CMSSW_53X MC campaign with over three billion events available in AOD format. Recorded data was successfully processed in parallel, exceeding 1.2 billion raw physics events per month for the first time in October 2012 due to the increase in data-parking rate. In parallel, large efforts were dedicated to WMAgent development and integrati...

  10. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction A large fraction of the effort was focused during the last period into the preparation and monitoring of the February tests of Common VO Computing Readiness Challenge 08. CCRC08 is being run by the WLCG collaboration in two phases, between the centres and all experiments. The February test is dedicated to functionality tests, while the May challenge will consist of running at all centres and with full workflows. For this first period, a number of functionality checks of the computing power, data repositories and archives as well as network links are planned. This will help assess the reliability of the systems under a variety of loads, and identifying possible bottlenecks. Many tests are scheduled together with other VOs, allowing the full scale stress test. The data rates (writing, accessing and transfer¬ring) are being checked under a variety of loads and operating conditions, as well as the reliability and transfer rates of the links between Tier-0 and Tier-1s. In addition, the capa...

  11. COMPUTING

    CERN Multimedia

    Contributions from I. Fisk

    2012-01-01

    Introduction The start of the 2012 run has been busy for Computing. We have reconstructed, archived, and served a larger sample of new data than in 2011, and we are in the process of producing an even larger new sample of simulations at 8 TeV. The running conditions and system performance are largely what was anticipated in the plan, thanks to the hard work and preparation of many people. Heavy ions Heavy Ions has been actively analysing data and preparing for conferences.  Operations Office Figure 6: Transfers from all sites in the last 90 days For ICHEP and the Upgrade efforts, we needed to produce and process record amounts of MC samples while supporting the very successful data-taking. This was a large burden, especially on the team members. Nevertheless the last three months were very successful and the total output was phenomenal, thanks to our dedicated site admins who keep the sites operational and the computing project members who spend countless hours nursing the...

  12. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  13. Autonomic Context-Aware Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nídia G. S. Campos

    2015-01-01

    Full Text Available Autonomic Computing allows systems like wireless sensor networks (WSN to self-manage computing resources in order to extend their autonomy as much as possible. In addition, contextualization tasks can fuse two or more different sensor data into a more meaningful information. Since these tasks usually run in a single centralized context server (e.g., sink node, the massive volume of data generated by the wireless sensors can lead to a huge information overload in such server. Here we propose DAIM, a distributed autonomic inference machine distributed which allows the sensor nodes to do self-management and contextualization tasks based on fuzzy logic. We have evaluated DAIM in a real sensor network taking into account other inference machines. Experimental results illustrate that DAIM is an energy-efficient contextualization method for WSN, reducing 48.8% of the number of messages sent to the context servers while saving 19.5% of the total amount of energy spent in the network.

  14. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction The Computing Team successfully completed the storage, initial processing, and distribution for analysis of proton-proton data in 2011. There are still a variety of activities ongoing to support winter conference activities and preparations for 2012. Heavy ions The heavy-ion run for 2011 started in early November and has already demonstrated good machine performance and success of some of the more advanced workflows planned for 2011. Data collection will continue until early December. Facilities and Infrastructure Operations Operational and deployment support for WMAgent and WorkQueue+Request Manager components, routinely used in production by Data Operations, are provided. The GlideInWMS and components installation are now deployed at CERN, which is added to the GlideInWMS factory placed in the US. There has been new operational collaboration between the CERN team and the UCSD GlideIn factory operators, covering each others time zones by monitoring/debugging pilot jobs sent from the facto...

  15. Advanced Wireless Integrated Navy Network

    National Research Council Canada - National Science Library

    Stutzman, Warren; Habayeb, Rick

    2005-01-01

    Quarterly progress report No. I on AWINN hardware and software configurations of smart, wideband, multi-function antennas, secure configurable platform, close-in command and control for Sea Basing visualization of wireless...

  16. Wireless Damage Location Sensing System

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant Douglas (Inventor)

    2012-01-01

    A wireless damage location sensing system uses a geometric-patterned wireless sensor that resonates in the presence of a time-varying magnetic field to generate a harmonic response that will experience a change when the sensor experiences a change in its geometric pattern. The sensing system also includes a magnetic field response recorder for wirelessly transmitting the time-varying magnetic field and for wirelessly detecting the harmonic response. The sensing system compares the actual harmonic response to a plurality of predetermined harmonic responses. Each predetermined harmonic response is associated with a severing of the sensor at a corresponding known location thereof so that a match between the actual harmonic response and one of the predetermined harmonic responses defines the known location of the severing that is associated therewith.

  17. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  18. The Application of RPL Routing Protocol in Low Power Wireless Sensor and Lossy Networks

    Directory of Open Access Journals (Sweden)

    Xun Yang

    2014-05-01

    Full Text Available With the continuous development of computer information technology, wireless sensor has been successfully changed the mode of human life, at the same time, as one of the technologies continues to improve the future life, how to better integration with the RPL routing protocols together become one of research focuses in the current climate. This paper start from the wireless sensor network, briefly discusses the concept, followed by systematic exposition of RPL routing protocol developed background, relevant standards, working principle, topology and related terms, and finally explore the RPL routing protocol in wireless sensor low power lossy network applications.

  19. Wireless cortical implantable systems

    CERN Document Server

    Majidzadeh Bafar, Vahid

    2013-01-01

    Wireless Cortical Implantable Systems examines the design for data acquisition and transmission in cortical implants. The first part of the book covers existing system-level cortical implants, as well as future devices. The authors discuss the major constraints in terms of microelectronic integration. The second part of the book focuses on system-level as well as circuit and system level solutions to the development of ultra low-power and low-noise microelectronics for cortical implants. Existing solutions are presented and novel methods and solutions proposed. The third part of the book focuses on the usage of digital impulse radio ultra wide-band transmission as an efficient method to transmit cortically neural recorded data at high data-rate to the outside world. Original architectural and circuit and system solutions are discussed.

  20. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  1. Wireless Josephson amplifier

    International Nuclear Information System (INIS)

    Narla, A.; Sliwa, K. M.; Hatridge, M.; Shankar, S.; Frunzio, L.; Schoelkopf, R. J.; Devoret, M. H.

    2014-01-01

    Josephson junction parametric amplifiers are playing a crucial role in the readout chain in superconducting quantum information experiments. However, their integration with current 3D cavity implementations poses the problem of transitioning between waveguide, coax cables, and planar circuits. Moreover, Josephson amplifiers require auxiliary microwave components, like directional couplers and/or hybrids, that are sources of spurious losses and impedance mismatches that limit measurement efficiency and amplifier tunability. We have developed a wireless architecture for these parametric amplifiers that eliminates superfluous microwave components and interconnects. This greatly simplifies their assembly and integration into experiments. We present an experimental realization of such a device operating in the 9–11 GHz band with about 100 MHz of amplitude gain-bandwidth product, on par with devices mounted in conventional sample holders. The simpler impedance environment presented to the amplifier also results in increased amplifier tunability.

  2. Analyzing Multimode Wireless Sensor Networks Using the Network Calculus

    Directory of Open Access Journals (Sweden)

    Xi Jin

    2015-01-01

    Full Text Available The network calculus is a powerful tool to analyze the performance of wireless sensor networks. But the original network calculus can only model the single-mode wireless sensor network. In this paper, we combine the original network calculus with the multimode model to analyze the maximum delay bound of the flow of interest in the multimode wireless sensor network. There are two combined methods A-MM and N-MM. The method A-MM models the whole network as a multimode component, and the method N-MM models each node as a multimode component. We prove that the maximum delay bound computed by the method A-MM is tighter than or equal to that computed by the method N-MM. Experiments show that our proposed methods can significantly decrease the analytical delay bound comparing with the separate flow analysis method. For the large-scale wireless sensor network with 32 thousands of sensor nodes, our proposed methods can decrease about 70% of the analytical delay bound.

  3. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  4. Wireless Communications in Reverberant Environments

    Science.gov (United States)

    2015-01-01

    solutions exist which can be tailored to meet the needs nearly any wireless application. Some notable current solutions include USRPs [27] and GNURadio ...tailored to meet the needs nearly any wireless application. Some notable current solutions include USRPs [27] and GNURadio [28]. For this effort, the WARPv3...en.wikipedia.org/wiki/List of software-defined radios [27] “Ettus research.” [Online]. Available: http://www.ettus.com [28] “ Gnuradio .” [Online]. Available: http

  5. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  6. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  7. Cross-platform wireless sensor network development

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Kusy, Branislav

    Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as well as traditional desktop computers. We propose Tinylnventor, an open......-source development environment that takes a holistic approach to implementing sensor network applications. Users build applications using a drag-and-drop visual programming language Open Blocks, a language that Google selected for its App Inventor for Android. Tinylnventor uses cross-platform programming concepts......, such as threads and common network operations, to provide a unified environment from which it generates application binaries for the respective platforms. We demonstrate through an application example that Tinylnventor is both simple to use and powerful in expressing complex applications....

  8. COMPUTING

    CERN Multimedia

    M. Kasemann

    CMS relies on a well functioning, distributed computing infrastructure. The Site Availability Monitoring (SAM) and the Job Robot submission have been very instrumental for site commissioning in order to increase availability of more sites such that they are available to participate in CSA07 and are ready to be used for analysis. The commissioning process has been further developed, including "lessons learned" documentation via the CMS twiki. Recently the visualization, presentation and summarizing of SAM tests for sites has been redesigned, it is now developed by the central ARDA project of WLCG. Work to test the new gLite Workload Management System was performed; a 4 times increase in throughput with respect to LCG Resource Broker is observed. CMS has designed and launched a new-generation traffic load generator called "LoadTest" to commission and to keep exercised all data transfer routes in the CMS PhE-DEx topology. Since mid-February, a transfer volume of about 12 P...

  9. A survey of energy saving techniques for mobile computers

    NARCIS (Netherlands)

    Smit, Gerardus Johannes Maria; Havinga, Paul J.M.

    1997-01-01

    Portable products such as pagers, cordless and digital cellular telephones, personal audio equipment, and laptop computers are increasingly being used. Because these applications are battery powered, reducing power consumption is vital. In this report we first give a survey of techniques for

  10. Developing a New Wireless Sensor Network Platform and Its Application in Precision Agriculture

    OpenAIRE

    Aquino-Santos, Raúl; González-Potes, Apolinar; Edwards-Block, Arthur; Virgen-Ortiz, Raúl Alejandro

    2011-01-01

    Wireless sensor networks are gaining greater attention from the research community and industrial professionals because these small pieces of “smart dust” offer great advantages due to their small size, low power consumption, easy integration and support for “green” applications. Green applications are considered a hot topic in intelligent environments, ubiquitous and pervasive computing. This work evaluates a new wireless sensor network platform and its application in precision agriculture, ...

  11. Wireless sensor networks for monitoring physiological signals of multiple patients.

    Science.gov (United States)

    Dilmaghani, R S; Bobarshad, H; Ghavami, M; Choobkar, S; Wolfe, C

    2011-08-01

    This paper presents the design of a novel wireless sensor network structure to monitor patients with chronic diseases in their own homes through a remote monitoring system of physiological signals. Currently, most of the monitoring systems send patients' data to a hospital with the aid of personal computers (PC) located in the patients' home. Here, we present a new design which eliminates the need for a PC. The proposed remote monitoring system is a wireless sensor network with the nodes of the network installed in the patients' homes. These nodes are then connected to a central node located at a hospital through an Internet connection. The nodes of the proposed wireless sensor network are created by using a combination of ECG sensors, MSP430 microcontrollers, a CC2500 low-power wireless radio, and a network protocol called the SimpliciTI protocol. ECG signals are first sampled by a small portable device which each patient carries. The captured signals are then wirelessly transmitted to an access point located within the patients' home. This connectivity is based on wireless data transmission at 2.4-GHz frequency. The access point is also a small box attached to the Internet through a home asynchronous digital subscriber line router. Afterwards, the data are sent to the hospital via the Internet in real time for analysis and/or storage. The benefits of this remote monitoring are wide ranging: the patients can continue their normal lives, they do not need a PC all of the time, their risk of infection is reduced, costs significantly decrease for the hospital, and clinicians can check data in a short time.

  12. Wireless Technologies Bridging the Digital Divide in Education

    Directory of Open Access Journals (Sweden)

    Gerard Smyth

    2006-06-01

    Full Text Available The objective of this paper is to demonstrate how the latest wireless standards and technologies may overcome the digital divide in education in the developed and developing worlds. The concept of the digital divide is discussed in the traditional socio-economic sense and expanded in terms of the learner's location, age, culture and background. It is important that we understand the full extent and complexities of this division if we are to effectively bridge it. Why and how the digital divide may be bridged is examined. Apart from the inherent inequalities that need to be addressed from an ethical perspective, it is very much in the interests of governments and citizens globally that Information and Communications Technology (ICT is made available to all as quickly and cost-effectively as possible. New forms of wireless protocols are overcoming challenges of terrain, infrastructure and finance. It is proposed that, by leveraging open broadband wireless standards, like Wireless Fidelity (Wi-Fi* and Worldwide Interoperability for Microwave Access (WiMAX*, and implementing Mobile Computing architecture, it is now possible to make dramatic strides in this direction. The paper continues with a general overview of these wireless standards and technologies followed by an in-depth look at Wi-Fi and WiMAX. The paper goes on to give examples of the Innovation Centre's involvement in delivering solutions and new usage models for eLearning that utilize the latest wireless standards and technologies. The challenges and successes of these projects are outlined and metrics are presented where available.

  13. Development of a Assistive Human-Computer device Based On Electro-Oculogram for Disabled People

    Directory of Open Access Journals (Sweden)

    Sima Soltani

    2014-01-01

    Full Text Available Objective: In the study, a novel wearable miniaturized human computer interface system was designed and implemented. It allowed disabled people, who are not able to move their limbs voluntarily and speech overtly, to express their intentions and feelings just by moving their eyes. Materials & Methods: The developed system that is installed on a pair of glasses, records the electrooculogram signal and transfers the digitized data wirelessly to a laptop. Realtime analysis of the signals allows users to utilize two high performance graphical user interfaces a keypad and a game, just by their eye movements. The performance of the developed system was tested on six normal people, who typed a total number of 1071 characters successfully, to evaluate accuracy and rate of typing. It was also tested by four people with quadriplegia and cerebral palsy who performed a computer game by using their eye movements. Results: According to results of the experiments on normal people, the accuracy of recognizing the user's intention was obtained 94.1% and the average rate of communication was 7.72 characters per minute. Evaluating the usability of the system for disabled people showed that they were able to perform the computer game using their eyes. The percentage of success was evaluated as an average of 58.7%. Conclusion: The proposed system recorded and processed elecrooculogram signals with appropriate quality. The final prototype of the system was 2.6 cm× 4.5 cm in size and weighted only 15 grams. The total power consumption was measured as 123 mW. The designed keypad provided selection of each character by minimum eye movements. The system assures high performance for communication as well as high level of mobility and comfort for everyday use.

  14. Effect of Value Congruence, Brand Distinctiveness, Brand Social, Brand Warmth, and Memorable Brand Experience on Customer-Brand Identification and Brand Loyalty (Case Study: Brand of ACER Laptop)

    Science.gov (United States)

    Susanty, Aries; Tresnaningrum, Aprilia

    2018-02-01

    This study has several purposes. First, this study aims to investigate the effect of consumer-brand value congruence, brand distinctiveness, brand social benefit, brand warmth, and memorable brand experience on customer-brand identification (CBI). We call all of those factors as the antecedent factor of CBI. Second, this study aims to investigate the effect of CBI on customer loyalty. Third, investigate the role of product involvement as a moderating variable of the relationship between brand distinctiveness, brand social benefit, brand warmth, memorable brand experience and CBI. This research used primary data collected through closed questionnaires using a Likert scale of 1 - 5. The total sample size was 273 respondents located in Semarang City who has or has been using Acer Laptop for minimal one year. This research was conducted using Partial Least Square (PLS) method through SmartPLS 3.0 software. The result of data processing indicated that all of the antecedent factors of CBI have the positive and significant effect on CBI of the user of Acer Laptop. In this case, among the five antecedent factors of CBI, value congruence has the greatest effect on CBI of the user of Acer Laptop. The result of data processing also indicated that CBI has the positive and significant effect on brand loyalty of user of Acer Laptop. This study fails to prove the role of product involvement as a moderating variable of the relationship between brand distinctiveness, brand social benefit, brand warmth, memorable brand experience and CBI of the user of Acer Laptop. Moreover, based on the result of hypothesis testing, this study gives some recommendation to Acer Laptop to develop or create some features which are match with the value of user of Laptop Acer in Semarang City.

  15. Effect of Value Congruence, Brand Distinctiveness, Brand Social, Brand Warmth, and Memorable Brand Experience on Customer-Brand Identification and Brand Loyalty (Case Study: Brand of ACER Laptop

    Directory of Open Access Journals (Sweden)

    Susanty Aries

    2018-01-01

    Full Text Available This study has several purposes. First, this study aims to investigate the effect of consumer–brand value congruence, brand distinctiveness, brand social benefit, brand warmth, and memorable brand experience on customer-brand identification (CBI. We call all of those factors as the antecedent factor of CBI. Second, this study aims to investigate the effect of CBI on customer loyalty. Third, investigate the role of product involvement as a moderating variable of the relationship between brand distinctiveness, brand social benefit, brand warmth, memorable brand experience and CBI. This research used primary data collected through closed questionnaires using a Likert scale of 1 - 5. The total sample size was 273 respondents located in Semarang City who has or has been using Acer Laptop for minimal one year. This research was conducted using Partial Least Square (PLS method through SmartPLS 3.0 software. The result of data processing indicated that all of the antecedent factors of CBI have the positive and significant effect on CBI of the user of Acer Laptop. In this case, among the five antecedent factors of CBI, value congruence has the greatest effect on CBI of the user of Acer Laptop. The result of data processing also indicated that CBI has the positive and significant effect on brand loyalty of user of Acer Laptop. This study fails to prove the role of product involvement as a moderating variable of the relationship between brand distinctiveness, brand social benefit, brand warmth, memorable brand experience and CBI of the user of Acer Laptop. Moreover, based on the result of hypothesis testing, this study gives some recommendation to Acer Laptop to develop or create some features which are match with the value of user of Laptop Acer in Semarang City.

  16. Wireless 3D Chocolate Printer

    Directory of Open Access Journals (Sweden)

    FROILAN G. DESTREZA

    2014-02-01

    Full Text Available This study is for the BSHRM Students of Batangas State University (BatStateU ARASOF for the researchers believe that the Wireless 3D Chocolate Printer would be helpful in their degree program especially on making creative, artistic, personalized and decorative chocolate designs. The researchers used the Prototyping model as procedural method for the successful development and implementation of the hardware and software. This method has five phases which are the following: quick plan, quick design, prototype construction, delivery and feedback and communication. This study was evaluated by the BSHRM Students and the assessment of the respondents regarding the software and hardware application are all excellent in terms of Accuracy, Effecitveness, Efficiency, Maintainability, Reliability and User-friendliness. Also, the overall level of acceptability of the design project as evaluated by the respondents is excellent. With regard to the observation about the best raw material to use in 3D printing, the chocolate is good to use as the printed material is slightly distorted,durable and very easy to prepare; the icing is also good to use as the printed material is not distorted and is very durable but consumes time to prepare; the flour is not good as the printed material is distorted, not durable but it is easy to prepare. The computation of the economic viability level of 3d printer with reference to ROI is 37.14%. The recommendation of the researchers in the design project are as follows: adding a cooling system so that the raw material will be more durable, development of a more simplified version and improving the extrusion process wherein the user do not need to stop the printing process just to replace the empty syringe with a new one.

  17. Technology Diffusion and Innovations in Music Education in a Notebook Computer Environment.

    Science.gov (United States)

    Hagen, Sara L.

    Valley City State University (North Dakota) was the second university in the nation to adopt a notebook computer environment, supplying every faculty, staff member, administrator, and student with a laptop computer and 24-hour access to the World Wide Web. This paper outlines the innovations made in the music department to accommodate the infusion…

  18. Compute-and-forward on a line network with random access

    NARCIS (Netherlands)

    Ren, Zhijie; Goseling, Jasper; Weber, Jos; Gastpar, Michael

    Signal superposition and broadcast are important features of the wireless medium. Compute-and-Forward, also known as Physical Layer Network Coding (PLNC), is a technique exploiting these features in order to improve performance of wireless networks. More precisely, it allows wireless terminals to

  19. Traffic Profiling in Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Kirykos, Georgios

    2006-01-01

    .... Wireless sensor networks pose unique challenges and limitations to the traditional schemes, which are used in the other wireless networks for security protection, and are due mainly to the increased...

  20. CMOS circuits for passive wireless microsystems

    CERN Document Server

    Yuan, Fei

    2011-01-01

    Here is a comprehensive examination of CMOS circuits for passive wireless microsystems. Covers design challenges, fundamental issues of ultra-low power wireless communications, radio-frequency power harvesting, and advanced design techniques, and more.

  1. Wireless Sensor Portal Technology, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Mobitrum Corporation has demonstrated the feasibility in the Phase I of " A Wireless Sensor Portal Technology" and proposes a Phase II effort to develop a wireless...

  2. Kali Linux wireless penetration testing beginner's guide

    CERN Document Server

    Ramachandran, Vivek

    2015-01-01

    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

  3. The Utilization of Wireless Handheld Computers with MEDLINE is an Effective Mechanism for Answering Clinical Questions at the Point of Care. A Review of: Hauser, Susan E., Dina Demner-Fushman, Joshua L. Jacobs, Susanne M. Humphrey, Glenn Ford, and George R. Thoma. “Using Wireless Handheld Computers to Seek Information at the Point of Care: An Evaluation by Clinicians.” Journal of the American Medical Informatics Association 14.6 (Nov./Dec. 2007: 807-15.

    Directory of Open Access Journals (Sweden)

    Martha Ingrid Preddie

    2008-09-01

    Full Text Available Objective – To assess the effectiveness of wireless handheld computers (HHCs for information retrieval in clinical environments and the role of MEDLINE in answering clinical questions at the point of care. Design – A prospective single-cohort study.Setting – Teaching rounds in the intensive care units and general medicine wards in two hospitals associated with a university’s school of medicine in the United States. Subjects – Five internal medicine residents with training in evidence-based practice.Methods – While accompanying medical teams on teaching rounds for approximately four consecutive weeks, each resident used MD on Tap (an application for handheld computers on a TreoTM 650 PDA/cell phone to find answers in real time, to questions that were raised by members of the medical teams. Using a special version of MD on Tap, each resident initialized a UserID. Serving as evaluators, the residents described and categorized clinical scenarios and recognized questions. They also formulated search terms, searched MEDLINE and identified citations determined to be useful for answering the questions. An intermediate server collected details of all MEDLINE search query transactions, including system response time, the user (based on UserIDs, citations selected for viewing, the saving of citations to HHC memory, as well as use of the Linkout and Notes features. In addition evaluators submitted daily summaries. These summaries included information on the scenarios, clinical questions, evidence-based methodology (EBM category, the team member who was the source of the question, the PubMed Identifiers (PMIDs of relevant citations, and comments. At the end of the data collection period, each evaluator submitted a summary report consisting of a qualitative and quantitative evaluation of his experience using MEDLINE via the handheld device to find relevant evidence based information at the point of care. The report also focused on the usefulness

  4. Wireless Physical Layer Security with CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2017-09-01

    Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users. Physical layer security is one of the most promising solutions that were proposed to enhance the security of next generation wireless systems. The fundamental idea behind this technique is to exploit the randomness and the fluctuations of the wireless channel to achieve security without conditional assumptions on the computational capabilities of the eavesdropper. In fact, while these elements have traditionally been associated with signal deterioration, physical layer security uses them to ensure the confidentiality of the users. Nevertheless, these technical virtues rely heavily on perhaps idealistic channel state information assumptions. In that regard, the aim of this thesis is to look at the physical layer security paradigm from the channel uncertainty perspective. In particular, we discuss the ergodic secrecy capacity of different wiretap channels when the transmitter is hampered by the imperfect knowledge of the channel state information (CSI). We consider two prevalent causes of uncertainty for the CSI at transmitter (CSIT); either an error of estimation occurs at the transmitter and he can only base his coding and the transmission strategies on a noisy version of the CSI, or the CSI feedback link has a limited capacity and the legitimate receivers can only inform the transmitter about the quantized CSI. We investigate both the single-user multiple-input multiple-output (MIMO) wiretap channel and the multi-user broadcast wiretap channel. In the latter scenario, we distinguish between two situations: multiple messages transmission and common message transmission. We also discuss the broadcast channel with confidential messages (BCCM) where the transmitter has one common message to be transmitted to two users and one

  5. Intelligent distributed computing

    CERN Document Server

    Thampi, Sabu

    2015-01-01

    This book contains a selection of refereed and revised papers of the Intelligent Distributed Computing Track originally presented at the third International Symposium on Intelligent Informatics (ISI-2014), September 24-27, 2014, Delhi, India.  The papers selected for this Track cover several Distributed Computing and related topics including Peer-to-Peer Networks, Cloud Computing, Mobile Clouds, Wireless Sensor Networks, and their applications.

  6. Wireless Remote Monitoring System for Cultural Heritage

    Directory of Open Access Journals (Sweden)

    Allan HUYNH

    2010-07-01

    Full Text Available Existing systems to collect temperature and relative humidity data at cultural heritage buildings require technical knowledge by people who are working with it, which is very seldom that they do have. The systems available today also require manual downloading of the collected data from the sensor to a computer for central storage and for further analysis. In this paper a wireless remote sensor network based on the ZigBee technology together with a simplified data collection system is presented. The system does not require any knowledge by the building administrator after the network is deployed. The wireless sensor device will automatically join available network when the user wants to expand the network. The collected data will be automatically and periodically synchronized to a remote main server via an Internet connection. The data can be used for centralized monitoring and other purpose. The power consumption of the sensor module is also minimized and the battery lifetime is estimated up to 10 years.

  7. Wireless Sensor Network Based Smart Parking System

    Directory of Open Access Journals (Sweden)

    Jeffrey JOSEPH

    2014-01-01

    Full Text Available Ambient Intelligence is a vision in which various devices come together and process information from multiple sources in order to exert control on the physical environment. In addition to computation and control, communication plays a crucial role in the overall functionality of such a system. Wireless Sensor Networks are one such class of networks, which meet these criteria. These networks consist of spatially distributed sensor motes which work in a co-operative manner to sense and control the environment. In this work, an implementation of an energy-efficient and cost-effective, wireless sensor networks based vehicle parking system for a multi-floor indoor parking facility has been introduced. The system monitors the availability of free parking slots and guides the vehicle to the nearest free slot. The amount of time the vehicle has been parked is monitored for billing purposes. The status of the motes (dead/alive is also recorded. Information like slot allocated, directions to the slot and billing data is sent as a message to customer’s mobile phones. This paper extends our previous work 1 with the development of a low cost sensor mote, about one tenth the cost of a commercially available mote, keeping in mind the price sensitive markets of the developing countries.

  8. Radiation detection and wireless networked early warning

    Science.gov (United States)

    Burns, David A.; Litz, Marc S.; Carroll, James J.; Katsis, Dimosthenis

    2012-06-01

    We have designed a compact, wireless, GPS-enabled array of inexpensive radiation sensors based on scintillation counting. Each sensor has a scintillator, photomultiplier tube, and pulse-counting circuit that includes a comparator, digital potentiometer and microcontroller. This design provides a high level of sensitivity and reliability. A 0.2 m2 PV panel powers each sensor providing a maintenance-free 24/7 energy source. The sensor can be mounted within a roadway light-post and monitor radiological activity along transport routes. Each sensor wirelessly transmits real-time data (as counts per second) up to 2 miles with a XBee radio module, and the data is received by a XBee receive-module on a computer. Data collection software logs the information from all sensors and provides real-time identification of radiation events. Measurements performed to-date demonstrate the ability of a sensor to detect a 20 μCi source at 3.5 meters when packaged with a PVT (plastic) scintillator, and 7 meters for a sensor with a CsI crystal (more expensive but ~5 times more sensitive). It is calculated that the sensor-architecture can detect sources moving as fast as 130 km/h based on the current data rate and statistical bounds of 3-sigma threshold detection. The sensor array is suitable for identifying and tracking a radiation threat from a dirty bomb along roadways.

  9. Track classification within wireless sensor network

    Science.gov (United States)

    Doumerc, Robin; Pannetier, Benjamin; Moras, Julien; Dezert, Jean; Canevet, Loic

    2017-05-01

    In this paper, we present our study on track classification by taking into account environmental information and target estimated states. The tracker uses several motion model adapted to different target dynamics (pedestrian, ground vehicle and SUAV, i.e. small unmanned aerial vehicle) and works in centralized architecture. The main idea is to explore both: classification given by heterogeneous sensors and classification obtained with our fusion module. The fusion module, presented in his paper, provides a class on each track according to track location, velocity and associated uncertainty. To model the likelihood on each class, a fuzzy approach is used considering constraints on target capability to move in the environment. Then the evidential reasoning approach based on Dempster-Shafer Theory (DST) is used to perform a time integration of this classifier output. The fusion rules are tested and compared on real data obtained with our wireless sensor network.In order to handle realistic ground target tracking scenarios, we use an autonomous smart computer deposited in the surveillance area. After the calibration step of the heterogeneous sensor network, our system is able to handle real data from a wireless ground sensor network. The performance of this system is evaluated in a real exercise for intelligence operation ("hunter hunt" scenario).

  10. STUDY & SURVEY ON WIRELESS CHARGING & TECHNOLOGY

    OpenAIRE

    Harshal Sharma*

    2016-01-01

    In the modern world, we have often heard a word- wireless charging technology. Actually what is it all about? So this paper is giving you the whole package about wireless charging technology. Wireless charging is a technology through which power is transmitted through an air gap to the electrical devices for the motive of replenishment of energy. At present wireless charging techniques and development of commercial products have provided a promise to address the energy bottleneck of portable ...

  11. A Forensic Readiness Model for Wireless Networks

    OpenAIRE

    Ngobeni, Sipho; Venter, Hein; Burke, Ivan

    2010-01-01

    International audience; Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environme...

  12. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  13. Low power design of wireless endoscopy compression/communication architecture

    Directory of Open Access Journals (Sweden)

    Zitouni Abdelkrim

    2018-05-01

    Full Text Available A wireless endoscopy capsule represents an efficient device interesting on the examination of digestive diseases. Many performance criteria’s (silicon area, dissipated power, image quality, computational time, etc. need to be deeply studied.In this paper, our interest is the optimization of the indicated criteria. The proposed methodology is based on exploring the advantages of the DCT/DWT transforms by combining them into single architecture. For arithmetic operations, the MCLA technique is used. This architecture integrates also a CABAC entropy coder that supports all binarization schemes. AMBA/I2C architecture is developed for assuring optimized communication.The comparisons of the proposed architecture with the most popular methods explained in related works show efficient results in terms dissipated power, hardware cost, and computation speed. Keywords: Wireless endoscopy capsule, DCT/DWT image compression, CABAC entropy coder, AMBA/I2C multi-bus architecture

  14. Improving SCTP Performance by Jitter-Based Congestion Control over Wired-Wireless Networks

    Directory of Open Access Journals (Sweden)

    Chen Jyh-Ming

    2011-01-01

    Full Text Available With the advances of wireless communication technologies, wireless networks gradually become the most adopted communication networks in the new generation Internet. Computing devices and mobile devices may be equipped with multiple wired and/or wireless network interfaces. Stream Control Transmission Protocol (SCTP has been proposed for reliable data transport and its multihoming feature makes use of network interfaces effectively to improve performance and reliability. However, like TCP, SCTP suffers unnecessary performance degradation over wired-wireless heterogeneous networks. The main reason is that the original congestion control scheme of SCTP cannot differentiate loss events so that SCTP reduces the congestion window inappropriately. In order to solve this problem and improve performance, we propose a jitter-based congestion control scheme with end-to-end semantics over wired-wireless networks. Besides, we solved ineffective jitter ratio problem which may cause original jitter-based congestion control scheme to misjudge congestion loss as wireless loss. Available bandwidth estimation scheme will be integrated into our congestion control mechanism to make the bottleneck more stabilized. Simulation experiments reveal that our scheme (JSCTP gives prominence to improve performance effectively over wired-wireless networks.

  15. Wireless sensing and vibration control with increased redundancy and robustness design.

    Science.gov (United States)

    Li, Peng; Li, Luyu; Song, Gangbing; Yu, Yan

    2014-11-01

    Control systems with long distance sensor and actuator wiring have the problem of high system cost and increased sensor noise. Wireless sensor network (WSN)-based control systems are an alternative solution involving lower setup and maintenance costs and reduced sensor noise. However, WSN-based control systems also encounter problems such as possible data loss, irregular sampling periods (due to the uncertainty of the wireless channel), and the possibility of sensor breakdown (due to the increased complexity of the overall control system). In this paper, a wireless microcontroller-based control system is designed and implemented to wirelessly perform vibration control. The wireless microcontroller-based system is quite different from regular control systems due to its limited speed and computational power. Hardware, software, and control algorithm design are described in detail to demonstrate this prototype. Model and system state compensation is used in the wireless control system to solve the problems of data loss and sensor breakdown. A positive position feedback controller is used as the control law for the task of active vibration suppression. Both wired and wireless controllers are implemented. The results show that the WSN-based control system can be successfully used to suppress the vibration and produces resilient results in the presence of sensor failure.

  16. The survey of American college students computer technology preferences & purchasing plans

    CERN Document Server

    2009-01-01

    This report presents data from a survey of more than 400 American college students.  The report presents data on student computer ownership of both PCs and laptops, purchasing plans for PCs and laptops, as well as purchasing plans for cell phones and digital cameras.  The report also provides details on how student finance their computer purchases, how much money comes from parents or guardians, and how much from the student themselves, or from their parties.  In addition to data on PCs the report provides detailed info on use of popular word processing packages such as Word, WordPerfect and Open Office.

  17. Techniques for Wireless Applications

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-05-01

    Switching techniques have been first proposed as a spacial diversity techniques. These techniques have been shown to reduce considerably the processing load while letting multi-antenna systems achieve a specific target performance. In this thesis, we take a different look at the switching schemes by implementing them for different other wireless applications. More specifically, this thesis consists of three main parts, where the first part considers a multiuser environment and an adaptive scheduling algorithm based on the switching with post-selection scheme for statistically independent but non-identically distributed channel conditions. The performance of this switched based scheduler is investigated and a multitude of performance metrics are presented. In a second part, we propose and analyze the performance of three switched-based algorithms for interference reduction in the downlink of over-loaded femtocells. For instance, performance metrics are derived in closed-form and these metrics are used to compare these three proposed schemes. Finally in a third part, a switch based opportunistic channel access scheme is proposed for a cognitive radio system and its performance is analyzed in terms of two new proposed metrics namely the average cognitive radio access and the waiting time duration.

  18. Wireless capsule endo bronchoscopy

    Directory of Open Access Journals (Sweden)

    Baratz DM

    2014-03-01

    Full Text Available No abstract available. Article truncated at 150 words. Case Presentation History of Present Illness A 67 year-old man presents 10 days after swallowing a capsule endoscopy camera that was never retrieved. The wireless capsule was swallowed asymptomatically for evaluation of heme positive stools after negative upper and lower endoscopies. Patient noted that the evening after swallowing the camera he developed mild shortness of breath and cough. The cough and shortness of breath were persistent and worsened while lying down and when moving positions. He denied prior issues with swallowing or aspiration. Review of Systems Negative other than what is noted above. PMH, SH, and FH Past medical history: coronary artery disease, peripheral vascular disease, hyperlipidemia Surgical history: femoral-popliteal bypass, previous shoulder and back surgery Social history: 1 pack/day of cigarettes for 50 years, prior alcohol usage but not current, no illicit drugs Family history: no pulmonary diseases Physical Exam Vital signs: temperature 36.7º C, heart rate 86 beats per minute ...

  19. WIRELESS FIDELITY (Wi-Fi) BROADBAND NETWORK ...

    African Journals Online (AJOL)

    ES Obe

    categorized into two types: fixed and mobile wireless. The broadband fixed wireless network technologies .... 3.0 WIRELESS FIDELITYF (Wi-Fi). NETWORK IMPLEMENTATION. A Wi-Fi enabled device such as a PC, game .... Amateur radio, video senders, and cordless phones, can cause significant additional interference.

  20. WirelessHART modeling and performance evaluation

    NARCIS (Netherlands)

    Remke, Anne Katharina Ingrid; Wu, Xian

    2013-01-01

    In process industries wired supervisory and control networks are more and more replaced by wireless systems. Wireless communication inevitably introduces time delays and message losses, which may degrade the system reliability and performance. WirelessHART, as the first international standard for

  1. Leveraging Big Data Analytics for Cache-Enabled Wireless Networks

    OpenAIRE

    Abdel Kader, Manhal; Bastug, Ejder; Bennis, Mehdi; zeydan, engin; Karatep, Alper; Salih Er, Ahmet; Debbah, Merouane

    2015-01-01

    International audience; While 5G wireless networks are expected to handle the ever growing data avalanche, classical deployment/optimiza-tion approaches such as hyper-dense deployment of base stations or having more bandwidth are cost-inefficient, and are therefore seen as stopgaps. In this regard, context-aware approaches which exploits human predictability, recent advances in storage, edge/cloud computing and big data analytics are needed. In this article, we approach this problem from a pr...

  2. New Applications for the Testing and Visualization of Wireless Networks

    Science.gov (United States)

    2005-03-01

    networks. • Assist with pointing directional antennas in complex network architectures. These applications are capable of reporting wireless network...mechanism for clean shutdown of the iperf client as dictated by the user’s interaction with the GPSIPerf executable were a little more complex . A...distributed computing frameworks created by the Object Management Group (ref. 9). Mico (ref. 10) is an open source implementation of the CORBA

  3. K-best decoders for 5G+ wireless communication

    CERN Document Server

    Rahman, Mehnaz

    2017-01-01

    This book discusses new, efficient and hardware realizable algorithms that can attain the performance of beyond 5G wireless communication. The authors explain topics gradually, stepping from basic MIMO detection to optimized schemes for both hard and soft domain MIMO detection and also to the feasible VLSI implementation, scalable to any MIMO configuration (including massive MIMO, used in satellite/space communication). The techniques described in this book enable readers to implement real designs, with reduced computational complexity and improved performance.

  4. Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring

    OpenAIRE

    Darwish, Ashraf; Hassanien, Aboul Ella

    2011-01-01

    Wireless sensor network (WSN) technologies are considered one of the key research areas in computer science and the healthcare application industries for improving the quality of life. The purpose of this paper is to provide a snapshot of current developments and future direction of research on wearable and implantable body area network systems for continuous monitoring of patients. This paper explains the important role of body sensor networks in medicine to minimize the need for caregivers ...

  5. Integrated wireless systems: The future has arrived (Keynote Address)

    Science.gov (United States)

    Rivoir, Roberto

    2005-06-01

    It is believed that we are just at the beginning with wireless, and that a new age is dawning for this breakthrough technology. Thanks to several years of industrial manufacturing in mass-market applications such as cellular phones, wireless technology has nowadays reached a level of maturity that, combined with other achievements arising from different fields, such as information technology, artificial intelligence, pervasive computing, science of new materials, and micro-electro-mechanical systems (MEMS), will enable the realization of a networked stream-flow of real-time information, that will accompany us in our daily life, in a total seamless, transparent fashion. As almost any application scenario will require the deployment of complex, miniaturized, almost "invisible" systems, operating with different wireless standards, hard technological challenges will have to be faced for designing and fabricating ultra-low-cost, reconfigurable, and multi-mode heterogeneous smart micro-devices. But ongoing, unending progresses on wireless technology keeps the promise of helping to solve important societal problems in the health-care, safety, security, industry, environment sectors, and in general opening the possibility for an improved quality of life at work, on travel, at home, practically "everywhere, anytime".

  6. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  7. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  8. Multi-sink mobile wireless sensor networks: dissemination protocols, design and evaluation

    NARCIS (Netherlands)

    Erman-Tüysüz, A.

    2011-01-01

    In pervasive systems, as they are getting smaller and smaller, computers can be found just about everywhere, but their presence is not noticed because the technologies are often embedded within items. One of the smallest and well known embedded computers is a wireless sensor node, which is a passive

  9. 75 FR 68619 - In the Matter of Certain Wireless Communication Devices, Portable Music and Data Processing...

    Science.gov (United States)

    2010-11-08

    ... Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of... within the United States after importation of certain wireless communication devices, portable music and... music and data processing devices, computers and components thereof that infringe one or more of claim...

  10. Intelligent Control in Automation Based on Wireless Traffic Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr; Milos Manic

    2007-08-01

    Wireless technology is a central component of many factory automation infrastructures in both the commercial and government sectors, providing connectivity among various components in industrial realms (distributed sensors, machines, mobile process controllers). However wireless technologies provide more threats to computer security than wired environments. The advantageous features of Bluetooth technology resulted in Bluetooth units shipments climbing to five million per week at the end of 2005 [1, 2]. This is why the real-time interpretation and understanding of Bluetooth traffic behavior is critical in both maintaining the integrity of computer systems and increasing the efficient use of this technology in control type applications. Although neuro-fuzzy approaches have been applied to wireless 802.11 behavior analysis in the past, a significantly different Bluetooth protocol framework has not been extensively explored using this technology. This paper presents a new neurofuzzy traffic analysis algorithm of this still new territory of Bluetooth traffic. Further enhancements of this algorithm are presented along with the comparison against the traditional, numerical approach. Through test examples, interesting Bluetooth traffic behavior characteristics were captured, and the comparative elegance of this computationally inexpensive approach was demonstrated. This analysis can be used to provide directions for future development and use of this prevailing technology in various control type applications, as well as making the use of it more secure.

  11. Intelligent Control in Automation Based on Wireless Traffic Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr; Milos Manic

    2007-09-01

    Wireless technology is a central component of many factory automation infrastructures in both the commercial and government sectors, providing connectivity among various components in industrial realms (distributed sensors, machines, mobile process controllers). However wireless technologies provide more threats to computer security than wired environments. The advantageous features of Bluetooth technology resulted in Bluetooth units shipments climbing to five million per week at the end of 2005 [1, 2]. This is why the real-time interpretation and understanding of Bluetooth traffic behavior is critical in both maintaining the integrity of computer systems and increasing the efficient use of this technology in control type applications. Although neuro-fuzzy approaches have been applied to wireless 802.11 behavior analysis in the past, a significantly different Bluetooth protocol framework has not been extensively explored using this technology. This paper presents a new neurofuzzy traffic analysis algorithm of this still new territory of Bluetooth traffic. Further enhancements of this algorithm are presented along with the comparison against the traditional, numerical approach. Through test examples, interesting Bluetooth traffic behavior characteristics were captured, and the comparative elegance of this computationally inexpensive approach was demonstrated. This analysis can be used to provide directions for future development and use of this prevailing technology in various control type applications, as well as making the use of it more secure.

  12. An ad hoc wireless sensor network for tele medicine applications

    International Nuclear Information System (INIS)

    Sheltami, Tarek R.; Mahmoud, Ashraf S.; Abu-Amara, Marwan H.

    2007-01-01

    Recent advances in embedded computing systems have led to the emergence of wireless sensor networks (SNETs), consisting of small, battery-powered motes with limited computation and radio communication capabilities. SNETs permit data gathering and computation to be deeply embedded in the physical environment. Large scale ad hoc sensor networks (ASNET), when deployed among mobile patients, can provide dynamic data query architecture to allow medical specialists to monitor patients at any place via the web or cellular network. In case of an emergency, doctors and/or nurses will be contacted automatically through their handheld personal digital assistants (PDAs) or cellular phones. In specific, the proposed network consists of sensor nodes at the first layer whose responsibility is to measure, collect and communicate, via wired or wireless interface, readings to a microcontroller presenting the second layer of architecture. Deployed microcontrollers process incoming readings and report to a central system via a wireless interface. The implemented network distinguishes between periodic sensor readings and critical or event driven readings where higher priorities is given for the latter. In this paper we implement 3 special cases for tracking and monitoring patients and doctors using SNETs. In addition, the performance of a large scale of our implementation has been tested by means of mathematical analysis. (author)

  13. Wireless device monitoring systems and monitoring devices, and associated methods

    Science.gov (United States)

    McCown, Steven H; Derr, Kurt W; Rohde, Kenneth W

    2014-05-27

    Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.

  14. Impact of wireless link quality across communication layers

    OpenAIRE

    Zhou, J.

    2010-01-01

    Nowadays, wireless networks are used in most of the applications with radio technologies being used in all kinds of wireless networks. In all wireless links, the transmitted packets can be lost. How to identify the quality of a certain wireless link and achieve the best delivery performance over a certain wireless network is an open issue. In this thesis, the performance of wireless mesh network, wireless sensor network and cellular network have been investigated by the method of measurements...

  15. 1st International Conference on Computational Intelligence and Informatics

    CERN Document Server

    Prasad, V; Rani, B; Udgata, Siba; Raju, K

    2017-01-01

    The book covers a variety of topics which include data mining and data warehousing, high performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, image processing, computer networks, wireless networks, social networks, wireless sensor networks, information and network security, web security, internet of things, bioinformatics and geoinformatics. The book is a collection of best papers submitted in the First International Conference on Computational Intelligence and Informatics (ICCII 2016) held during 28-30 May 2016 at JNTUH CEH, Hyderabad, India. It was hosted by Department of Computer Science and Engineering, JNTUH College of Engineering in association with Division V (Education & Research) CSI, India. .

  16. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prasan Kumar Sahoo

    2012-09-01

    Full Text Available Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.

  17. Efficient security mechanisms for mHealth applications using wireless body sensor networks.

    Science.gov (United States)

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.

  18. Just ask Siri? A pilot study comparing smartphone digital assistants and laptop Google searches for smoking cessation advice.

    Science.gov (United States)

    Boyd, Matt; Wilson, Nick

    2018-01-01

    To compare voice-activated internet searches by smartphone (two digital assistants) with laptop ones for information and advice related to smoking cessation. Responses to 80 questions on a range of topics related to smoking cessation (including the FAQ from a NHS website), compared for quality. Smartphone and internet searches as performed in New Zealand. Ranked responses to the questions. Google laptop internet searches came first (or first equal) for best quality smoking cessation advice for 83% (66/80) of the responses. Voiced questions to Google Assistant ("OK Google") came first/first equal 76% of the time vs Siri (Apple) at 28%. Google and Google Assistant were statistically significantly better than Siri searches (odds ratio 12.4 and 8.5 respectively, pGoogle internet searches and Google Assistant were found to be significantly superior to the Siri digital assistant for smoking cessation information. While expert content was returned over half the time, there is still substantial room for improvement in how these software systems deliver smoking cessation advice.

  19. A Comparative Study of Wireless Sensor Networks and Their Routing Protocols

    Directory of Open Access Journals (Sweden)

    Subhajit Pal

    2010-11-01

    Full Text Available Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs. Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  20. [The Development of Information Centralization and Management Integration System for Monitors Based on Wireless Sensor Network].

    Science.gov (United States)

    Xu, Xiu; Zhang, Honglei; Li, Yiming; Li, Bin

    2015-07-01

    Developed the information centralization and management integration system for monitors of different brands and models with wireless sensor network technologies such as wireless location and wireless communication, based on the existing wireless network. With adaptive implementation and low cost, the system which possesses the advantages of real-time, efficiency and elaboration is able to collect status and data of the monitors, locate the monitors, and provide services with web server, video server and locating server via local network. Using an intranet computer, the clinical and device management staffs can access the status and parameters of monitors. Applications of this system provide convenience and save human resource for clinical departments, as well as promote the efficiency, accuracy and elaboration for the device management. The successful achievement of this system provides solution for integrated and elaborated management of the mobile devices including ventilator and infusion pump.

  1. A comparative study of wireless sensor networks and their routing protocols.

    Science.gov (United States)

    Bhattacharyya, Debnath; Kim, Tai-hoon; Pal, Subhajit

    2010-01-01

    Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs). Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  2. Optimizing Energy and Modulation Selection in Multi-Resolution Modulation For Wireless Video Broadcast/Multicast

    KAUST Repository

    She, James

    2009-11-01

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the multi-user channel diversity problem. The power allocation and modulation selection problem, however, is subject to a high computational complexity due to the nonlinear formulation and huge solution space. This paper introduces a dynamic programming framework with conditioned parsing, which significantly reduces the search space. The optimized result is further verified with experiments using real video content. The proposed approach effectively serves as a generalized and practical optimization framework that can gauge and optimize a scalable wireless video broadcast/multicast based on multi-resolution modulation in any BWA network.

  3. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  4. A mobile-agent based wireless sensing network for structural monitoring applications

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Stuart G [Los Alamos National Laboratory; Farinholt, Kevin M [Los Alamos National Laboratory; Figueiredo, Eloi [Los Alamos National Laboratory; Park, Gyuhae [Los Alamos National Laboratory; Farrar, Charles R [Los Alamos National Laboratory; Flynn, Eric B [UCSD; Mascarenas, David L [UCSD; Todd, Michael D [UCSD

    2008-01-01

    A new wireless sensing network paradigm is presented for structural monitoring applications. In this approach, both power and data interrogation commands are conveyed via a mobile agent that is sent to sensor nodes to perform intended interrogations, which can alleviate several limitations of the traditional sensing networks. Furthermore, the mobile agent provides computational power to make near real-time assessments on the structural conditions. This paper will discuss such prototype systems, which are used to interrogate impedance-based sensors for structural health monitoring applications. Our wireless sensor node is specifically designed to accept various energy sources, including wireless energy transmission, and to be wirelessly triggered on an as-needed basis by the mobile agent or other sensor nodes. The capabilities of this proposed sensing network paradigm are demonstrated in the laboratory and the field.

  5. Wireless Augmented Reality Communication System

    Science.gov (United States)

    Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)

    2017-01-01

    A portable unit is for video communication to select a user name in a user name network. A transceiver wirelessly accesses a communication network through a wireless connection to a general purpose node coupled to the communication network. A user interface can receive user input to log on to a user name network through the communication network. The user name network has a plurality of user names, at least one of the plurality of user names is associated with a remote portable unit, logged on to the user name network and available for video communication.

  6. OFDM systems for wireless communications

    CERN Document Server

    Narasimhamurthy, Adarsh

    2010-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is

  7. Embracing interference in wireless systems

    CERN Document Server

    Gollakota, Shyamnath

    2014-01-01

    The wireless medium is a shared resource. If nearby devices transmit at thesame time, their signals interfere, resulting in a collision. In traditionalnetworks, collisions cause the loss of the transmitted information. For thisreason, wireless networks have been designed with the assumption thatinterference is intrinsically harmful and must be avoided.This book, a revised version of the author's award-winning Ph.D.dissertation, takes an alternate approach: Instead of viewing interferenceas an inherently counterproductive phenomenon that should to be avoided, wedesign practical systems that tra

  8. The Wireless Nursing Call System

    DEFF Research Database (Denmark)

    Jensen, Casper Bruun

    2006-01-01

    This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight into the cha......This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight...

  9. Artificial intelligence in wireless communications

    CERN Document Server

    Rondeau, Thomas W

    2009-01-01

    This cutting-edge resource offers practical overview of cognitive radio, a paradigm for wireless communications in which a network or a wireless node changes its transmission or reception parameters. The alteration of parameters is based on the active monitoring of several factors in the external and internal radio environment. This book offers a detailed description of cognitive radio and its individual parts. Practitioners learn how the basic processing elements and their capabilities are implemented as modular components. Moreover, the book explains how each component can be developed and t

  10. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  11. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  12. Dynamic spectrum auction in wireless communication

    CERN Document Server

    Chen, Yanjiao

    2015-01-01

    This brief explores current research on dynamic spectrum auctions, focusing on fundamental auction theory, characteristics of the spectrum market, spectrum auction architecture and possible auction mechanisms. The brief explains how dynamic spectrum auctions, which enable new users to gain spectrum access and existing spectrum owners to obtain financial benefits, can greatly improve spectrum efficiency by resolving the artificial spectrum shortage. It examines why operators and users face significant challenges due to specialty of the spectrum market and the related requirements imposed on the auction mechanism design. Concise and up-to-date, Dynamic Spectrum Auction in Wireless Communication is designed for researchers and professionals in computer science or electrical engineering. Students studying networking will also find this brief a valuable resource.

  13. Capacity Bounds for Parallel Optical Wireless Channels

    KAUST Repository

    Chaaban, Anas

    2016-01-01

    A system consisting of parallel optical wireless channels with a total average intensity constraint is studied. Capacity upper and lower bounds for this system are derived. Under perfect channel-state information at the transmitter (CSIT), the bounds have to be optimized with respect to the power allocation over the parallel channels. The optimization of the lower bound is non-convex, however, the KKT conditions can be used to find a list of possible solutions one of which is optimal. The optimal solution can then be found by an exhaustive search algorithm, which is computationally expensive. To overcome this, we propose low-complexity power allocation algorithms which are nearly optimal. The optimized capacity lower bound nearly coincides with the capacity at high SNR. Without CSIT, our capacity bounds lead to upper and lower bounds on the outage probability. The outage probability bounds meet at high SNR. The system with average and peak intensity constraints is also discussed.

  14. Efficient Wireless Charger Deployment for Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jehn-Ruey Jiang

    2016-08-01

    Full Text Available A wireless rechargeable sensor network (WRSN consists of sensor nodes that can harvest energy emitted from wireless chargers for refilling their batteries so that the WRSN can operate sustainably. This paper assumes wireless chargers are equipped with directional antennas, and are deployed on grid points of a fixed height to propose two heuristic algorithms solving the following wireless charger deployment optimization (WCDO problem: how to deploy as few as possible chargers to make the WRSN sustainable. Both algorithms model the charging space of chargers as a cone and calculate charging efficiency according power regression expressions complying with the Friis transmission equation. The two algorithms are the greedy cone covering (GCC algorithm and the adaptive cone covering (ACC algorithm. The GCC (respectively, ACC algorithm greedily (respectively, adaptively generates candidate cones to cover as many as possible sensor nodes. Both algorithms then greedily select the fewest number of candidate cones, each of which corresponds to the deployment of a charger, to have approximate solutions to the WCDO problem. We perform experiments, conduct simulations and do analyses for the algorithms to compare them in terms of the time complexity, the number of chargers deployed, and the execution time.

  15. Wireless Ways: Business and Personal Applications of Wireless Technology.

    Science.gov (United States)

    Chung, Joe

    2001-01-01

    Describes the Art Technology Group (ATG), an electronic business and customer management company, and the work they have done with wireless technology. Highlights include designing virtual offices and supporting the resulting virtual community; the mobility it allows; problems with bandwidth; and display issues. (LRW)

  16. Wireless distributed functional electrical stimulation system.

    Science.gov (United States)

    Jovičić, Nenad S; Saranovac, Lazar V; Popović, Dejan B

    2012-08-09

    The control of movement in humans is hierarchical and distributed and uses feedback. An assistive system could be best integrated into the therapy of a human with a central nervous system lesion if the system is controlled in a similar manner. Here, we present a novel wireless architecture and routing protocol for a distributed functional electrical stimulation system that enables control of movement. The new system comprises a set of miniature battery-powered devices with stimulating and sensing functionality mounted on the body of the subject. The devices communicate wirelessly with one coordinator device, which is connected to a host computer. The control algorithm runs on the computer in open- or closed-loop form. A prototype of the system was designed using commercial, off-the-shelf components. The propagation characteristics of electromagnetic waves and the distributed nature of the system were considered during the development of a two-hop routing protocol, which was implemented in the prototype's software. The outcomes of this research include a novel system architecture and routing protocol and a functional prototype based on commercial, off-the-shelf components. A proof-of-concept study was performed on a hemiplegic subject with paresis of the right arm. The subject was tasked with generating a fully functional palmar grasp (closing of the fingers). One node was used to provide this movement, while a second node controlled the activation of extensor muscles to eliminate undesired wrist flexion. The system was tested with the open- and closed-loop control algorithms. The system fulfilled technical and application requirements. The novel communication protocol enabled reliable real-time use of the system in both closed- and open-loop forms. The testing on a patient showed that the multi-node system could operate effectively to generate functional movement.

  17. Wireless distributed functional electrical stimulation system

    Directory of Open Access Journals (Sweden)

    Jovičić Nenad S

    2012-08-01

    Full Text Available Abstract Background The control of movement in humans is hierarchical and distributed and uses feedback. An assistive system could be best integrated into the therapy of a human with a central nervous system lesion if the system is controlled in a similar manner. Here, we present a novel wireless architecture and routing protocol for a distributed functional electrical stimulation system that enables control of movement. Methods The new system comprises a set of miniature battery-powered devices with stimulating and sensing functionality mounted on the body of the subject. The devices communicate wirelessly with one coordinator device, which is connected to a host computer. The control algorithm runs on the computer in open- or closed-loop form. A prototype of the system was designed using commercial, off-the-shelf components. The propagation characteristics of electromagnetic waves and the distributed nature of the system were considered during the development of a two-hop routing protocol, which was implemented in the prototype’s software. Results The outcomes of this research include a novel system architecture and routing protocol and a functional prototype based on commercial, off-the-shelf components. A proof-of-concept study was performed on a hemiplegic subject with paresis of the right arm. The subject was tasked with generating a fully functional palmar grasp (closing of the fingers. One node was used to provide this movement, while a second node controlled the activation of extensor muscles to eliminate undesired wrist flexion. The system was tested with the open- and closed-loop control algorithms. Conclusions The system fulfilled technical and application requirements. The novel communication protocol enabled reliable real-time use of the system in both closed- and open-loop forms. The testing on a patient showed that the multi-node system could operate effectively to generate functional movement.

  18. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...

  19. Efficient and automatic wireless geohazard monitoring

    Science.gov (United States)

    Rubin, Marc J.

    and power consumption) without subjugating recovered signal quality. Another benefit of RTV is its simplicity and low computational overhead; by sampling directly in compressed form, RTV vastly decreases the amount of memory space and computation time required for on-mote compression. Third, in Chapter 5, we present and evaluate our custom, low-cost, Arduino-based wireless hardware (i.e., GeoMoteShield) developed for wireless seismic data acquisition. In particular, we first provide details regarding the motivation, design, and implementation of our custom GeoMoteShield and then compare our custom hardware against two much more expensive systems, i.e., a traditional wired seismograph and a "from-the-ground-up" wireless mote developed by SmartGeo colleagues. We validate our custom WSN of nine GeoMoteShields using controlled lab tests and then further evaluate the WSN's performance during two seismic field tests, i.e., a "walk-away" test and a seismic refraction survey. Results show that our low-cost, Arduino-based GeoMoteShield performs comparably to a much more expensive wired system and a "from the ground up" wireless mote in terms of signal precision, accuracy, and time synchronization. Finally, in Chapter 6, we provide a broad literature review and discussion of how, when, and why scientific work matters in geohazardous risk scenarios. This work is geared towards scientists conducting research within fields involving geohazard risk assessment and mitigation. In particular, this chapter reviews three topics from Science, Technology, Engineering, and Policy (STEP): 1) risk, scientific uncertainty, and policy, 2) society's perceptions of risk, and 3) the effectiveness of risk communication. Though this chapter is not intended to be a comprehensive STEP literature survey, it addresses many pertinent questions and provides guidance to scientists and engineers operating in such fields. In short, this chapter aims to answer three main questions, i.e., 1) "when does

  20. Computer usage and national energy consumption: Results from a field-metering study

    Energy Technology Data Exchange (ETDEWEB)

    Desroches, Louis-Benoit [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Fuchs, Heidi [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Greenblatt, Jeffery [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Pratt, Stacy [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Willem, Henry [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Claybaugh, Erin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Beraki, Bereket [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Nagaraju, Mythri [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Price, Sarah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division; Young, Scott [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Analysis & Environmental Impacts Dept., Environmental Energy Technologies Division

    2014-12-01

    The electricity consumption of miscellaneous electronic loads (MELs) in the home has grown in recent years, and is expected to continue rising. Consumer electronics, in particular, are characterized by swift technological innovation, with varying impacts on energy use. Desktop and laptop computers make up a significant share of MELs electricity consumption, but their national energy use is difficult to estimate, given uncertainties around shifting user behavior. This report analyzes usage data from 64 computers (45 desktop, 11 laptop, and 8 unknown) collected in 2012 as part of a larger field monitoring effort of 880 households in the San Francisco Bay Area, and compares our results to recent values from the literature. We find that desktop computers are used for an average of 7.3 hours per day (median = 4.2 h/d), while laptops are used for a mean 4.8 hours per day (median = 2.1 h/d). The results for laptops are likely underestimated since they can be charged in other, unmetered outlets. Average unit annual energy consumption (AEC) for desktops is estimated to be 194 kWh/yr (median = 125 kWh/yr), and for laptops 75 kWh/yr (median = 31 kWh/yr). We estimate national annual energy consumption for desktop computers to be 20 TWh. National annual energy use for laptops is estimated to be 11 TWh, markedly higher than previous estimates, likely reflective of laptops drawing more power in On mode in addition to greater market penetration. This result for laptops, however, carries relatively higher uncertainty compared to desktops. Different study methodologies and definitions, changing usage patterns, and uncertainty about how consumers use computers must be considered when interpreting our results with respect to existing analyses. Finally, as energy consumption in On mode is predominant, we outline several energy savings opportunities: improved power management (defaulting to low-power modes after periods of inactivity as well as power scaling), matching the rated power