WorldWideScience

Sample records for wireless local loop

  1. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  2. A forensic readiness model for Wireless Local Area Networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility...

  3. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    National Research Council Canada - National Science Library

    Kessel, Adam; Goodwin, Shane

    2005-01-01

    The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...

  4. Method and system for localization in a wireless network

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Dil, B.J.

    2011-01-01

    The present invention relates to a method and system for localization in wireless networks. More in particular, the present invention is relates to Received Signal Strength (RSS) based localization in wireless networks, such as localization based on Radio Interferometric Positioning (RIP). Unlike

  5. A digital wireless system for closed-loop inhibition of nociceptive signals

    Science.gov (United States)

    Zuo, Chao; Yang, Xiaofei; Wang, Yang; Hagains, Christopher E.; Li, Ai-Ling; Peng, Yuan B.; Chiao, J.-C.

    2012-10-01

    Neurostimulation of the spinal cord or brain has been used to inhibit nociceptive signals in pain management applications. Nevertheless, most of the current neurostimulation models are based on open-loop system designs. There is a lack of closed-loop systems for neurostimulation in research with small freely-moving animals and in future clinical applications. Based on our previously developed analog wireless system for closed-loop neurostimulation, a digital wireless system with real-time feedback between recorder and stimulator modules has been developed to achieve multi-channel communication. The wireless system includes a wearable recording module, a wearable stimulation module and a transceiver connected to a computer for real-time and off-line data processing, display and storage. To validate our system, wide dynamic range neurons in the spinal cord dorsal horn have been recorded from anesthetized rats in response to graded mechanical stimuli (brush, pressure and pinch) applied in the hind paw. The identified nociceptive signals were used to automatically trigger electrical stimulation at the periaqueductal gray in real time to inhibit their own activities by the closed-loop design. Our digital wireless closed-loop system has provided a simplified and efficient method for further study of pain processing in freely-moving animals and potential clinical application in patients. Groups 1, 2 and 3 contributed equally to this project.

  6. Wireless local area network. A new technology of network

    International Nuclear Information System (INIS)

    Wu Yunjun; Zhao Zongtao

    2003-01-01

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  7. Localization Algorithms of Underwater Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Han, Guangjie; Jiang, Jinfang; Shu, Lei; Xu, Yongjun; Wang, Feng

    2012-01-01

    In Underwater Wireless Sensor Networks (UWSNs), localization is one of most important technologies since it plays a critical role in many applications. Motivated by widespread adoption of localization, in this paper, we present a comprehensive survey of localization algorithms. First, we classify localization algorithms into three categories based on sensor nodes’ mobility: stationary localization algorithms, mobile localization algorithms and hybrid localization algorithms. Moreover, we compare the localization algorithms in detail and analyze future research directions of localization algorithms in UWSNs. PMID:22438752

  8. La-CTP: Loop-Aware Routing for Energy-Harvesting Wireless Sensor Networks.

    Science.gov (United States)

    Sun, Guodong; Shang, Xinna; Zuo, Yan

    2018-02-02

    In emerging energy-harvesting wireless sensor networks (EH-WSN), the sensor nodes can harvest environmental energy to drive their operation, releasing the user's burden in terms of frequent battery replacement, and even enabling perpetual sensing systems. In EH-WSN applications, usually, the node in energy-harvesting or recharging state has to stop working until it completes the energy replenishment. However, such temporary departures of recharging nodes severely impact the packet routing, and one immediate result is the routing loop problem. Controlling loops in connectivity-intermittent EH-WSN in an efficient way is a big challenge in practice, and so far, users still lack of effective and practicable routing protocols with loop handling. Based on the Collection Tree Protocol (CTP) widely used in traditional wireless sensor networks, this paper proposes a loop-aware routing protocol for real-world EH-WSNs, called La-CTP, which involves a new parent updating metric and a proactive, adaptive beaconing scheme to effectively suppress the occurrence of loops and unlock unavoidable loops, respectively. We constructed a 100-node testbed to evaluate La-CTP, and the experimental results showed its efficacy and efficiency.

  9. Data security in wireless local area network

    International Nuclear Information System (INIS)

    Kishk, A.M.A

    2010-01-01

    The ever increasing demand for performance and data security improvement in wireless local area network (W LAN) has motivated increasing the difficulties to crack the system by man-in -the middle attacks. There are two primary and main objectives of this thesis to enhance data security in WLAN. The first objective is the enhancement of identities-exchange and key-exchange during authentication process. The second objective is the investigation of a proposed symmetrical encryption algorithm based on key-updating to enhance the performance of data-security in WLAN. The current asymmetrical encryption algorithms are used to authenticate the devices in WLAN to each other. They are used to exchange the identities and the keys in a secret channel during the authentication process. This thesis investigates the problems of identities- exchange. The enhancement of the identities-exchange and key-exchange stages during the authentication process has been suggested and studied in the thesis to solve the drawbacks of the traditional asymmetrical encryption algorithms.Next the investigation of a proposed symmetrical encryption to encrypt the data during the data exchange process gives a new approach to increase the difficulties to the man in the middle attacks to crack the system.The key updating with each packet is the new approach to solve the problem of the fixed key used to encrypt / decrypt the data with all packets in WLAN.A Comparative study between the proposed symmetrical encryption algorithms and the other algorithms is presented in the thesis. Proposed symmetrical encryption algorithm is applied on a text, voice, and image messages as practical applications of the proposed symmetrical encryption algorithm. Finally, the man-in-the middle attacks can broadcast noise signals in WLAN channels to prevent the data to reach correctly to the end-user. The quality of the received image is measured for the proposed and the traditional symmetrical encryption algorithms to

  10. Power Impact of Loop Buffer Schemes for Biomedical Wireless Sensor Nodes

    Directory of Open Access Journals (Sweden)

    Francky Catthoor

    2012-11-01

    Full Text Available Instruction memory organisations are pointed out as one of the major sources of energy consumption in embedded systems. As these systems are characterised by restrictive resources and a low-energy budget, any enhancement in this component allows not only to decrease the energy consumption but also to have a better distribution of the energy budget throughout the system. Loop buffering is an effective scheme to reduce energy consumption in instruction memory organisations. In this paper, the loop buffer concept is applied in real-life embedded applications that are widely used in biomedical Wireless Sensor Nodes, to show which scheme of loop buffer is more suitable for applications with certain behaviour. Post-layout simulations demonstrate that a trade-off exists between the complexity of the loop buffer architecture and the energy savings of utilising it. Therefore, the use of loop buffer architectures in order to optimise the instructionmemory organisation from the energy efficiency point of view should be evaluated carefully, taking into account two factors: (1 the percentage of the execution time of the application that is related to the execution of the loops, and (2 the distribution of the execution time percentage over each one of the loops that form the application.

  11. Recent Advances in Wireless Indoor Localization Techniques and System

    Directory of Open Access Journals (Sweden)

    Zahid Farid

    2013-01-01

    Full Text Available The advances in localization based technologies and the increasing importance of ubiquitous computing and context-dependent information have led to a growing business interest in location-based applications and services. Today, most application requirements are locating or real-time tracking of physical belongings inside buildings accurately; thus, the demand for indoor localization services has become a key prerequisite in some markets. Moreover, indoor localization technologies address the inadequacy of global positioning system inside a closed environment, like buildings. Based on this, though, this paper aims to provide the reader with a review of the recent advances in wireless indoor localization techniques and system to deliver a better understanding of state-of-the-art technologies and motivate new research efforts in this promising field. For this purpose, existing wireless localization position system and location estimation schemes are reviewed, as we also compare the related techniques and systems along with a conclusion and future trends.

  12. Localization and Communication for UWB-based Wireless Sensor Networks

    NARCIS (Netherlands)

    Wang, Y.

    2011-01-01

    The great demand for location-aware wireless sensor networks (WSNs) motivates the research in this thesis. The unique characteristics of WSNs impose numerous challenges on localization and communication. In this thesis, we handle some key challenges and provide affordable solutions. Impulse radio

  13. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir

    2018-02-28

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  14. Improved Grid-Scan Localization Algorithm for Wireless Sensor Networks

    OpenAIRE

    Nallanthighal, Raghava Srinivasa; Chinta, Veeranjaneyulu

    2014-01-01

    Localization is a fundamental and crucial service for various applications in wireless sensor networks (WSNs). In this paper an improved grid-scan localization algorithm has been proposed. In the proposed algorithm, information about 1-hop, 2-hop, and farther neighboring anchors has been collected that estimates the region using 1-hop anchors. Then, this estimated region is divided into a grid array, finding valid grids using 1-hop and 2-hop anchors information. In addition to that the farthe...

  15. Twistor Parametrization of Locally BPS Super-Wilson Loops

    Directory of Open Access Journals (Sweden)

    Cristian Vergu

    2017-01-01

    Full Text Available We consider the kinematics of the locally BPS super-Wilson loop in N=4 super-Yang-Mills with scalar coupling from a twistorial point of view. We find that the kinematics can be described either as supersymmetrized pure spinors or as a point in the product of two super-Grassmannian manifolds G2∣2(4∣4×G2∣2(4∣4. In this description of the kinematics the scalar–scalar correlation function appearing in the one-loop evaluation of the super-Wilson loop can be neatly written as a sum of four superdeterminants.

  16. Design of a Child Localization System on RFID and Wireless Sensor Networks

    OpenAIRE

    Chao Chen

    2010-01-01

    Radio Frequency Identification (RFID) and wireless sensor networks are wireless technologies that rapidly emerge and show great potential. Combining RFID and wireless sensor networks provides a cost-efficient way to expand the RFID system's range and to enable an RFID system in areas without a network infrastructure. These two technologies are employed to build a wireless localization system in a children's theme park. The main purpose of this child localization system is to track and locate ...

  17. A digital phase locked loop based signal and symbol recovery system for wireless channel

    CERN Document Server

    Purkayastha, Basab Bijoy

    2015-01-01

    The book reports two approaches of implementation of the essential components of a Digital Phase Locked Loop based system for dealing with wireless channels showing Nakagami-m fading. It is mostly observed in mobile communication. In the first approach, the structure of a Digital phase locked loop (DPLL) based on Zero Crossing (ZC) algorithm is proposed. In a modified form, the structure of a DPLL based systems for dealing with Nakagami-m fading based on Least Square Polynomial Fitting Filter is proposed, which operates at moderate sampling frequencies. A sixth order Least Square Polynomial Fitting (LSPF) block and Roots Approximator (RA) for better phase-frequency detection has been implemented as a replacement of Phase Frequency Detector (PFD) and Loop Filter (LF) of a traditional DPLL, which has helped to attain optimum performance of DPLL. The results of simulation of the proposed DPLL with Nakagami-m fading and QPSK modulation is discussed in detail which shows that the proposed method provides better pe...

  18. Broadband Loop Antenna on Soft Contact Lens for Wireless Ocular Physiological Monitoring

    Directory of Open Access Journals (Sweden)

    Ssu-Han Ting

    2014-01-01

    Full Text Available This paper presents a novel loop antenna with broadband for wireless ocular physiological monitoring (WOPM. The antenna is fabricated on a thin-film poly-para-xylylene C (parylene C substrate with a small thickness of 11 μm and dimension of π×6.5×6.5 mm2. With the advantage of small size, the proposed antenna is suitable to apply to the soft contact lens and transmit the signal in microelectromechanical Systems (MEMS. Because the pig's eye and human's eye have similar parameters of conductivity and permittivity, the experimental results are obtained by applying the proposed antenna on the pig's eye and cover from 1.54 to 6 GHz for ISM band (2.4 and 5.8 GHz applications. The measured antenna radiation patterns, antenna gains, and radiation efficiency will be demonstrated in this paper, which are suitable for application of wireless ocular physiological monitoring.

  19. One-loop Yukawa couplings in local models

    Energy Technology Data Exchange (ETDEWEB)

    Conlon, Joseph P. [Rudolf Peierls Center for Theoretical Physics, Oxford (United Kingdom); Balliol College, Oxford (United Kingdom); Goodsell, Mark [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Palti, Eran [Centre de Physique Theorique, Ecole Polytechnique, CNRS, Palaiseau (France)

    2010-07-15

    We calculate the one-loop Yukawa couplings and threshold corrections for supersymmetric local models of branes at singularities in type IIB string theory. We compute the corrections coming both from wavefunction and vertex renormalisation. The former comes in the IR from conventional field theory running and in the UV from threshold corrections that cause it to run from the winding scale associated to the full Calabi-Yau volume. The vertex correction is naively absent as it appears to correspond to superpotential renormalisation. However, we find that while the Wilsonian superpotential is not renormalised there is a physical vertex correction in the 1PI action associated to light particle loops. (orig.)

  20. One-loop Yukawa Couplings in Local Models

    CERN Document Server

    Conlon, Joseph P; Palti, Eran; 10.1007

    2010-01-01

    We calculate the one-loop Yukawa couplings and threshold corrections for supersymmetric local models of branes at singularities in type IIB string theory. We compute the corrections coming both from wavefunction and vertex renormalisation. The former comes in the IR from conventional field theory running and in the UV from threshold corrections that cause it to run from the winding scale associated to the full Calabi-Yau volume. The vertex correction is naively absent as it appears to correspond to superpotential renormalisation. However, we find that while the Wilsonian superpotential is not renormalised there is a physical vertex correction in the 1PI action associated to light particle loops.

  1. Neighborhood Kalman Estimation for Distributed Localization in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaochu Wang

    2016-01-01

    Full Text Available Accurate location information plays an important role in the performance of wireless sensor networks since many mission applications depend on it. This paper proposes a fully distributed localization algorithm based on the concept of data fusion, allowing the full intranodes information including the correlations among estimates to take part in the algorithm. By properly constructing and updating the estimates as well as the corresponding covariance matrices, the algorithm can fuse intranodes information to generate more accurate estimates on the sensor locations with a fast speed. Finally, numerical simulations are given as examples to demonstrate the effectiveness of the algorithm.

  2. A wirelessly-powered homecage with animal behavior analysis and closed-loop power control.

    Science.gov (United States)

    Yaoyao Jia; Zheyuan Wang; Canales, Daniel; Tinkler, Morgan; Chia-Chun Hsu; Madsen, Teresa E; Mirbozorgi, S Abdollah; Rainnie, Donald; Ghovanloo, Maysam

    2016-08-01

    This paper presents a new EnerCage-homecage system, EnerCage-HC2, for longitudinal electrophysiology data acquisition experiments on small freely moving animal subjects, such as rodents. EnerCage-HC2 is equipped with multi-coil wireless power transmission (WPT), closed-loop power control, bidirectional data communication via Bluetooth Low Energy (BLE), and Microsoft Kinect® based animal behavior tracking and analysis. The EnerCage-HC2 achieves a homogeneous power transfer efficiency (PTE) of 14% on average, with ~42 mW power delivered to the load (PDL) at a nominal height of 7 cm by the closed-loop power control mechanism. The Microsoft Kinect® behavioral analysis algorithm can not only track the animal position in real-time but also classify 5 different types of rodent behaviors: standstill, walking, grooming, rearing, and rotating. A proof-of-concept in vivo experiment was conducted on two awake freely behaving rats while successfully operating a one-channel stimulator and generating an ethogram.

  3. Reputation-based secure sensor localization in wireless sensor networks.

    Science.gov (United States)

    He, Jingsha; Xu, Jing; Zhu, Xingye; Zhang, Yuqiang; Zhang, Ting; Fu, Wanqing

    2014-01-01

    Location information of sensor nodes in wireless sensor networks (WSNs) is very important, for it makes information that is collected and reported by the sensor nodes spatially meaningful for applications. Since most current sensor localization schemes rely on location information that is provided by beacon nodes for the regular sensor nodes to locate themselves, the accuracy of localization depends on the accuracy of location information from the beacon nodes. Therefore, the security and reliability of the beacon nodes become critical in the localization of regular sensor nodes. In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. In our proposed scheme, the reputation of each beacon node is evaluated based on a reputation evaluation model so that regular sensor nodes can get credible location information from highly reputable beacon nodes to accomplish localization. We also perform a set of simulation experiments to demonstrate the effectiveness of the proposed reputation-based security scheme. And our simulation results show that the proposed security scheme can enhance the security and, hence, improve the accuracy of sensor localization in hostile or untrusted environments.

  4. Saliency-Based Bleeding Localization for Wireless Capsule Endoscopy Diagnosis

    Directory of Open Access Journals (Sweden)

    Hongda Chen

    2017-01-01

    Full Text Available Stomach bleeding is a kind of gastrointestinal disease which can be diagnosed noninvasively by wireless capsule endoscopy (WCE. However, it requires much time for physicians to scan large amount of WCE images. Alternatively, computer-assisted bleeding localization systems are developed where color, edge, and intensity features are defined to distinguish lesions from normal tissues. This paper proposes a saliency-based localization system where three saliency maps are computed: phase congruency-based edge saliency map derived from Log-Gabor filter bands, intensity histogram-guided intensity saliency map, and red proportion-based saliency map. Fusing the three maps together, the proposed system can detect bleeding regions by thresholding the fused saliency map. Results demonstrate the accuracy of 98.97% for our system to mark bleeding regions.

  5. The loop I superbubble and the local interstellar magnetic field

    International Nuclear Information System (INIS)

    Frisch, Priscilla Chapman

    2014-01-01

    Recent data on the interstellar magnetic field in the low density nearby interstellar medium suggest a new perspective for understanding interstellar clouds within 40 pc. The directions of the local interstellar magnetic field found from measurements of optically polarized starlight and the very local field found from the Ribbon of energetic neutral atoms discovered by IBEX nearly agree. The geometrical relation between the local magnetic field, the positions and kinematics of local interstellar clouds, and the Loop I S1 superbubble, suggest that the Sun is located in the boundary of this evolved superbubble. The quasiperpendicular angle between the bulk kinematics and magnetic field of the local ISM indicates that a complete picture of low density interstellar clouds needs to include information on the interstellar magnetic field.

  6. Local, distributed topology control for large-scale wireless ad-hoc networks

    NARCIS (Netherlands)

    Nieberg, T.; Hurink, Johann L.

    In this document, topology control of a large-scale, wireless network by a distributed algorithm that uses only locally available information is presented. Topology control algorithms adjust the transmission power of wireless nodes to create a desired topology. The algorithm, named local power

  7. Intersection local times, loop soups and permanental Wick powers

    CERN Document Server

    Jan, Yves Le; Rosen, Jay

    2017-01-01

    Several stochastic processes related to transient Lévy processes with potential densities u(x,y)=u(y-x), that need not be symmetric nor bounded on the diagonal, are defined and studied. They are real valued processes on a space of measures \\mathcal{V} endowed with a metric d. Sufficient conditions are obtained for the continuity of these processes on (\\mathcal{V},d). The processes include n-fold self-intersection local times of transient Lévy processes and permanental chaoses, which are `loop soup n-fold self-intersection local times' constructed from the loop soup of the Lévy process. Loop soups are also used to define permanental Wick powers, which generalizes standard Wick powers, a class of n-th order Gaussian chaoses. Dynkin type isomorphism theorems are obtained that relate the various processes. Poisson chaos processes are defined and permanental Wick powers are shown to have a Poisson chaos decomposition. Additional properties of Poisson chaos processes are studied and a martingale extension is obt...

  8. Adapting Mobile Beacon-Assisted Localization in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wei Dong

    2009-04-01

    Full Text Available The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL, to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL and Arrival and Departure Overlap (ADO when both of them use only a single mobile beacon for localization in static WSNs.

  9. Adapting mobile beacon-assisted localization in wireless sensor networks.

    Science.gov (United States)

    Teng, Guodong; Zheng, Kougen; Dong, Wei

    2009-01-01

    The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN) applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL) approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL), to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL) and Arrival and Departure Overlap (ADO) when both of them use only a single mobile beacon for localization in static WSNs.

  10. Localization of Energy Harvesting Empowered Underwater Optical Wireless Sensor Networks

    KAUST Repository

    Saeed, Nasir

    2017-12-20

    In this paper, a received signal strength (RSS) based localization technique is developed for energy harvesting underwater optical wireless sensor networks (EH-UOWSNs), where the optical noise sources and channel impairments of seawater pose significant challenges for range estimation. Energy limitation is another major problem due to the limited battery power and difficulty in replacing or recharging the battery of an underwater sensor node. In the proposed framework, sensor nodes with insufficient battery, harvest the energy and starts communicating once it has sufficient energy storage. Network localization is carried out by measuring the RSSs of active nodes, which are modeled based on the underwater optical communication channel characteristics. Thereafter, block kernel matrices are computed for the RSS based range measurements. Unlike the traditional shortest-path approach, the proposed technique reduces the shortest path estimation for each block kernel matrix. Once the complete block kernel matrices are available, a closed form localization technique is developed to find the location of every optical sensor node in the network. Furthermore, an analytical expression for Cramer Rao lower bound (CRLB) is derived as a benchmark to compare the localization performance of the proposed technique. Finally, extensive simulations show that the proposed technique outperforms the well-known network localization techniques.

  11. Design of a Child Localization System on RFID and Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chao Chen

    2010-01-01

    Full Text Available Radio Frequency Identification (RFID and wireless sensor networks are wireless technologies that rapidly emerge and show great potential. Combining RFID and wireless sensor networks provides a cost-efficient way to expand the RFID system's range and to enable an RFID system in areas without a network infrastructure. These two technologies are employed to build a wireless localization system in a children's theme park. The main purpose of this child localization system is to track and locate children within a certain range near some landmarks in the park. The design experience in this project can be exported to other applications such as object tracking and surveillance.

  12. A fully-differential phase-locked loop frequency synthesizer for 60-GHz wireless communication

    International Nuclear Information System (INIS)

    Kuang Lixue; Chi Baoyong; Chen Lei; Wang Zhihua; Jia Wen

    2014-01-01

    A 40-GHz phase-locked loop (PLL) frequency synthesizer for 60-GHz wireless communication applications is presented. The electrical characteristics of the passive components in the VCO and LO buffers are accurately extracted with an electromagnetic simulator HFSS. A differential tuning technique is utilized in the voltage controlled oscillator (VCO) to achieve higher common-mode noise rejection and better phase noise performance. The VCO and the divider chain are powered by a 1.0 V supply while the phase-frequency detector (PFD) and the charge pump (CP) are powered by a 2.5 V supply to improve the linearity. The measurement results show that the total frequency locking range of the frequency synthesizer is from 37 to 41 GHz, and the phase noise from a 40 GHz carrier is −97.2 dBc/Hz at 1 MHz offset. Implemented in 65 nm CMOS, the synthesizer consumes a DC power of 62 mW, including all the buffers. (semiconductor integrated circuits)

  13. A fully-differential phase-locked loop frequency synthesizer for 60-GHz wireless communication

    Science.gov (United States)

    Lixue, Kuang; Baoyong, Chi; Lei, Chen; Wen, Jia; Zhihua, Wang

    2014-12-01

    A 40-GHz phase-locked loop (PLL) frequency synthesizer for 60-GHz wireless communication applications is presented. The electrical characteristics of the passive components in the VCO and LO buffers are accurately extracted with an electromagnetic simulator HFSS. A differential tuning technique is utilized in the voltage controlled oscillator (VCO) to achieve higher common-mode noise rejection and better phase noise performance. The VCO and the divider chain are powered by a 1.0 V supply while the phase-frequency detector (PFD) and the charge pump (CP) are powered by a 2.5 V supply to improve the linearity. The measurement results show that the total frequency locking range of the frequency synthesizer is from 37 to 41 GHz, and the phase noise from a 40 GHz carrier is -97.2 dBc/Hz at 1 MHz offset. Implemented in 65 nm CMOS, the synthesizer consumes a DC power of 62 mW, including all the buffers.

  14. An Adaptive Impedance Matching Network with Closed Loop Control Algorithm for Inductive Wireless Power Transfer.

    Science.gov (United States)

    Miao, Zhidong; Liu, Dake; Gong, Chen

    2017-08-01

    For an inductive wireless power transfer (IWPT) system, maintaining a reasonable power transfer efficiency and a stable output power are two most challenging design issues, especially when coil distance varies. To solve these issues, this paper presents a novel adaptive impedance matching network (IMN) for IWPT system. In our adaptive IMN IWPT system, the IMN is automatically reconfigured to keep matching with the coils and to adjust the output power adapting to coil distance variation. A closed loop control algorithm is used to change the capacitors continually, which can compensate mismatches and adjust output power simultaneously. The proposed adaptive IMN IWPT system is working at 125 kHz for 2 W power delivered to load. Comparing with the series resonant IWPT system and fixed IMN IWPT system, the power transfer efficiency of our system increases up to 31.79% and 60% when the coupling coefficient varies in a large range from 0.05 to 0.8 for 2 W output power.

  15. Event localization in underwater wireless sensor networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew John Robert

    2012-08-01

    We propose m-courses (Monitoring Courses), a novel solution to localize events in an underwater wireless sensor network. These networks consists of surface gateways and relay nodes. GPS can localize the position of surface gateways which can then distribute their locations through the network using acoustic modems. Relay nodes are deployed to remain static, but these untethered nodes may drift due to water currents, resulting in disruption of communication links. We develop a novel underwater alarm system using a cyclic graph model. In the event of link failure, a series of alarm packets are broadcast in the network. These alarms are then captured by the underwater m-courses, which can also be used to assure network connectivity and identify node failures. M-courses also allow the network to localize events and identify network issues locally before forwarding results upwards to a Surface Gateway node. This reduces communication overhead and allows for efficient management of nodes in a mobile network. Our results show that m-course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% when compared to a naïve routing implementation.

  16. Correlation function of null polygonal Wilson loops with local operators

    OpenAIRE

    Alday, L. F.; Buchbinder, E. I.; Tseytlin, A. A.

    2011-01-01

    We consider the correlator of a light-like polygonal Wilson loop with n cusps with a local operator (like the dilaton or the chiral primary scalar) in planar N =4 super Yang-Mills theory. As a consequence of conformal symmetry, the main part of such correlator is a function F of 3n-11 conformal ratios. The first non-trivial case is n=4 when F depends on just one conformal ratio \\zeta. This makes the corresponding correlator one of the simplest non-trivial observables that one would like to c...

  17. Fuzzy logic congestion control in IEEE 802.11 wireless local area networks: A performance evaluation

    CSIR Research Space (South Africa)

    Nyirenda, CN

    2007-09-01

    Full Text Available In 802.11 Wireless Local Area Networks, the wired and the wireless interfaces of the Access Point are characterized by the disparity in channel capacity. This presents a significant bottleneck for traffic flowing from the wired network...

  18. Experience of wireless local area network in a radiation oncology department

    Directory of Open Access Journals (Sweden)

    Mandal Abhijit

    2010-01-01

    Full Text Available The aim of this work is to develop a wireless local area network (LAN between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc for efficient patient data management and to made easy the availability of information (chair side to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops and stationary workstations, all equipped with wireless-fidelity (Wi-Fi access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ has been used. The wireless networking was configured with the Service Set Identifier (SSID, Media Access Control (MAC address filtering, and Wired Equivalent Privacy (WEP network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.

  19. Design and initial deployment of the wireless local area networking infrastructure at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Long, John P.; Hamill, Michael J.; Mitchell, M. G.; Miller, Marc M.; Witzke, Edward L.; Wiener, Dallas J

    2006-11-01

    A major portion of the Wireless Networking Project at Sandia National Laboratories over the last few years has been to examine IEEE 802.11 wireless networking for possible use at Sandia and if practical, introduce this technology. This project team deployed 802.11a, b, and g Wireless Local Area Networking at Sandia. This report examines the basics of wireless networking and captures key results from project tests and experiments. It also records project members thoughts and designs on wireless LAN architecture and security issues. It documents some of the actions and milestones of this project, including pilot and production deployment of wireless networking equipment, and captures the team's rationale behind some of the decisions made. Finally, the report examines lessons learned, future directions, and conclusions.

  20. Wireless local area network in a prehospital environment

    Directory of Open Access Journals (Sweden)

    Grimes Gary J

    2004-08-01

    Full Text Available Abstract Background Wireless local area networks (WLANs are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER. The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  1. Wireless power pad with local power activation for portable devices

    NARCIS (Netherlands)

    Waffenschmidt, E.; Zheglov, V.

    2007-01-01

    Wireless power transfer by magnetic induction offers a simple to use way to recharge mobile devices like e.g. mobile phone, music players or medical sensors. As shown by a previous report and an existing Power Pad demonstrator, wireless inductive power transfer is possible with a good power

  2. Event Localization in Underwater Wireless Sensor Networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew

    2011-11-01

    In this thesis we consider different methods to localize events in a multi-hop wireless sensor network operating underwater using acoustic modems. The network consists of surface gateway nodes and relay nodes. Localization of surface gateways can be achieved through GPS, but we cannot rely on this technology for localizing underwater nodes. Surface Gateway nodes can distribute their locations through the network using the incoming signals by the acoustic modems from the relay nodes. Relay nodes are deployed to remain static but due to water currents, floating, and the untethered nature of the nodes, they often suffer from frequent drifting which can result in a deployed network suffering link failures. In this work, we developed a novel concept of an underwater alarming system, which adapts a cyclic graph model. In the event of link failure, a series of alarm packets are broadcasted in the network. These alarms are then captured through a novel concept of underwater Monitoring Courses (M-Courses), which can also be used to assure network connectivity and identify node faults. M-Courses also allow the network to localize events and identify network issues at a local level before forwarding any results upwards to a Surface Gateway nodes. This reduces the amount of communication overhead needed and allowing for distributed management of nodes in a network which may be constantly moving. We show that the proposed algorithms can reduce the number of send operations needed for an event to be localized in a network. We have found that M-Course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% in some cases when compared to a naive routing implementation. But this is achieved by increasing the time for an event to reach a Surface Gateway. These effects are both due to the buffering effect of M-Course routing, which allows us to efficiently deal with multiple events in an local area and we find that the performance of M

  3. An 802.11 n wireless local area network transmission scheme for wireless telemedicine applications.

    Science.gov (United States)

    Lin, C F; Hung, S I; Chiang, I H

    2010-10-01

    In this paper, an 802.11 n transmission scheme is proposed for wireless telemedicine applications. IEEE 802.11n standards, a power assignment strategy, space-time block coding (STBC), and an object composition Petri net (OCPN) model are adopted. With the proposed wireless system, G.729 audio bit streams, Joint Photographic Experts Group 2000 (JPEG 2000) clinical images, and Moving Picture Experts Group 4 (MPEG-4) video bit streams achieve a transmission bit error rate (BER) of 10-7, 10-4, and 103 simultaneously. The proposed system meets the requirements prescribed for wireless telemedicine applications. An essential feature of this proposed transmission scheme is that clinical information that requires a high quality of service (QoS) is transmitted at a high power transmission rate with significant error protection. For maximizing resource utilization and minimizing the total transmission power, STBC and adaptive modulation techniques are used in the proposed 802.11 n wireless telemedicine system. Further, low power, direct mapping (DM), low-error protection scheme, and high-level modulation are adopted for messages that can tolerate a high BER. With the proposed transmission scheme, the required reliability of communication can be achieved. Our simulation results have shown that the proposed 802.11 n transmission scheme can be used for developing effective wireless telemedicine systems.

  4. Analysis of Wireless Capsule Endoscopy Images using Local Binary Patterns

    Directory of Open Access Journals (Sweden)

    Adriana Florentina CONSTANTINESCU

    2015-06-01

    Full Text Available Wireless capsule endoscopy, the gold standard in the screening and diagnosis of small bowel diseases, is one of the most recent investigations for gastrointestinal pathology. This examination has the advantages of being non-invasive, painless, with a large clinical yield, especially for small bowel diseases, but also some disadvantages. The long time necessary for reading and interpreting all frames acquired is one of these disadvantages. This inconvenient could be improved through different methods by using software applications. In this study we have used a software application for texture analysis based on local binary pattern (LBP operator. This operator detects and removes non-informative frames in a first step, then identifies potential lesions. Our study group consisted of 33 patients from the Gastroenterology and Hepatology Centre Craiova and from the 1st Internal Medicine and Gastroenterology Clinic from the Emergency County Hospital of Craiova. The patients included in the study have corresponded to our inclusion criteria established. The exclusion criteria were represented by the contraindications of the capsule endoscopy. In the first phase of the study, we have removed the non-informative frames from the original videos obtained, and we have acquired an average reduction of 6.96% from the total number of images. In the second phase, using the same LBP operator, we have correctly identified 93.16% of telangiectasia lesions. Our study demonstrated that software applications based on LBP operator can lead to a shorter analysis time, by reducing the overall frames number, and can also provide support in diagnosis.

  5. Handoff Between a Wireless Local Area Network (WLAN and a Wide Area Network (UMTS

    Directory of Open Access Journals (Sweden)

    J. Sánchez–García

    2009-04-01

    Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.

  6. Introduction to Wireless Localization With iPhone SDK Examples

    CERN Document Server

    Chan, Eddie C L

    2012-01-01

    This book provides a comprehensive overview of the entire landscape of both outdoor and indoor wireless positioning, and guides the reader step by step in the implementation of wireless positioning applications on the iPhone. Explanations of fundamental positioning techniques are given throughout the text, along with many programming examples, providing the reader with an independent, practical, and enjoyable learning of the material while gaining a real feel for the subject.  Provides an accessible introduction to positioning technologies such as Global Positioning System and Wi-Fi posi

  7. Software-Defined Radio for Wireless Local-Area Networks

    NARCIS (Netherlands)

    Schiphorst, Roelof

    2004-01-01

    New wireless communications standards do not replace old ones, instead the number of standards keeps on increasing and by now an abundance of standards exists. Moreover there is no reason to assume that this trend will ever stop. Therefore, the software-radio concept is emerging as a potential

  8. Raspberry Pi Based Intelligent Wireless Sensor Node for Localized Torrential Rain Monitoring

    Directory of Open Access Journals (Sweden)

    Zhaozhuo Xu

    2016-01-01

    Full Text Available Wireless sensor networks are proved to be effective in long-time localized torrential rain monitoring. However, the existing widely used architecture of wireless sensor networks for rain monitoring relies on network transportation and back-end calculation, which causes delay in response to heavy rain in localized areas. Our work improves the architecture by applying logistic regression and support vector machine classification to an intelligent wireless sensor node which is created by Raspberry Pi. The sensor nodes in front-end not only obtain data from sensors, but also can analyze the probabilities of upcoming heavy rain independently and give early warnings to local clients in time. When the sensor nodes send the probability to back-end server, the burdens of network transport are released. We demonstrate by simulation results that our sensor system architecture has potentiality to increase the local response to heavy rain. The monitoring capacity is also raised.

  9. A Survey on Wireless Transmitter Localization Using Signal Strength Measurements

    Directory of Open Access Journals (Sweden)

    Henri Nurminen

    2017-01-01

    Full Text Available Knowledge of deployed transmitters’ (Tx locations in a wireless network improves many aspects of network management. Operators and building administrators are interested in locating unknown Txs for optimizing new Tx placement, detecting and removing unauthorized Txs, selecting the nearest Tx to offload traffic onto it, and constructing radio maps for indoor and outdoor navigation. This survey provides a comprehensive review of existing algorithms that estimate the location of a wireless Tx given a set of observations with the received signal strength indication. Algorithms that require the observations to be location-tagged are suitable for outdoor mapping or small-scale indoor mapping, while algorithms that allow most observations to be unlocated trade off some accuracy to enable large-scale crowdsourcing. This article presents empirical evaluation of the algorithms using numerical simulations and real-world Bluetooth Low Energy data.

  10. Wireless Local Area Network Performance Inside Aircraft Passenger Cabins

    Science.gov (United States)

    Whetten, Frank L.; Soroker, Andrew; Whetten, Dennis A.; Whetten, Frank L.; Beggs, John H.

    2005-01-01

    An examination of IEEE 802.11 wireless network performance within an aircraft fuselage is performed. This examination measured the propagated RF power along the length of the fuselage, and the associated network performance: the link speed, total throughput, and packet losses and errors. A total of four airplanes: one single-aisle and three twin-aisle airplanes were tested with 802.11a, 802.11b, and 802.11g networks.

  11. Semantic wireless localization of WiFi terminals in smart buildings

    Science.gov (United States)

    Ahmadi, H.; Polo, A.; Moriyama, T.; Salucci, M.; Viani, F.

    2016-06-01

    The wireless localization of mobile terminals in indoor scenarios by means of a semantic interpretation of the environment is addressed in this work. A training-less approach based on the real-time calibration of a simple path loss model is proposed which combines (i) the received signal strength information measured by the wireless terminal and (ii) the topological features of the localization domain. A customized evolutionary optimization technique has been designed to estimate the optimal target position that fits the complex wireless indoor propagation and the semantic target-environment relation, as well. The proposed approach is experimentally validated in a real building area where the available WiFi network is opportunistically exploited for data collection. The presented results point out a reduction of the localization error obtained with the introduction of a very simple semantic interpretation of the considered scenario.

  12. A Programmable Implantable Microstimulator SoC With Wireless Telemetry: Application in Closed-Loop Endocardial Stimulation for Cardiac Pacemaker.

    Science.gov (United States)

    Shuenn-Yuh Lee; Su, M Y; Ming-Chun Liang; You-Yin Chen; Cheng-Han Hsieh; Chung-Min Yang; Hsin-Yi Lai; Jou-Wei Lin; Qiang Fang

    2011-12-01

    A low-power, wireless, and implantable microstimulator system on chip with smart powering management, immediate neural signal acquisition, and wireless rechargeable system is proposed. A system controller with parity checking handles the adjustable stimulus parameters for the stimulated objective. In the current paper, the rat's intra-cardiac electrogram is employed as the stimulated model in the animal study, and it is sensed by a low-voltage and low-power monitoring analog front end. The power management unit, which includes a rectifier, battery charging and detection, and a regulator, is used for the power control of the internal circuits. The stimulation data and required clock are extracted by a phase-locked-loop-based phase shift keying demodulator from an inductive AC signal. The full chip, which consumes 48 μW only, is fabricated in a TSMC 0.35 μm 2P4M standard CMOS process to perform the monitoring and pacing functions with inductively powered communication in the in vivo study.

  13. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    DEFF Research Database (Denmark)

    Isah, Abdullahi

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....

  14. Wilson loop's phase transition probed by non-local observable

    Directory of Open Access Journals (Sweden)

    Hui-Ling Li

    2018-04-01

    Full Text Available In order to give further insights into the holographic Van der Waals phase transition, it would be of great interest to investigate the behavior of Wilson loop across the holographic phase transition for a higher dimensional hairy black hole. We offer a possibility to proceed with a numerical calculation in order to discussion on the hairy black hole's phase transition, and show that Wilson loop can serve as a probe to detect a phase structure of the black hole. Furthermore, for a first order phase transition, we calculate numerically the Maxwell's equal area construction; and for a second order phase transition, we also study the critical exponent in order to characterize the Wilson loop's phase transition.

  15. Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Li

    2017-01-01

    Full Text Available Secure localization has become very important in wireless sensor networks. However, the conventional secure localization algorithms used in wireless sensor networks cannot deal with internal attacks and cannot identify malicious nodes. In this paper, a localization based on trust valuation, which can overcome a various attack types, such as spoofing attacks and Sybil attacks, is presented. The trust valuation is obtained via selection of the property set, which includes estimated distance, localization performance, position information of beacon nodes, and transmission time, and discussion of the threshold in the property set. In addition, the robustness of the proposed model is verified by analysis of attack intensity, localization error, and trust relationship for three typical scenes. The experimental results have shown that the proposed model is superior to the traditional secure localization models in terms of malicious nodes identification and performance improvement.

  16. Node localization algorithm of wireless sensor network for large electrical equipment monitoring application

    DEFF Research Database (Denmark)

    Chen, Qinyin; Hu, Y.; Chen, Zhe

    2016-01-01

    Node localization technology is an important technology for the Wireless Sensor Networks (WSNs) applications. An improved 3D node localization algorithm is proposed in this paper, which is based on a Multi-dimensional Scaling (MDS) node localization algorithm for large electrical equipment...... is based on the combination of node's Time of Arrival (TOA) and Angle of Arrival (AOA) measurement information. Simulation results show the proposed algorithm outperforms than the traditional Multidimensional Scaling (MDS-MAP) algorithm....

  17. Wireless Sensor Networks - Node Localization for Various Industry Problems

    International Nuclear Information System (INIS)

    Derr, Kurt; Manic, Milos

    2015-01-01

    Fast, effective monitoring following airborne releases of toxic substances is critical to mitigate risks to threatened population areas. Wireless sensor nodes at fixed predetermined locations may monitor such airborne releases and provide early warnings to the public. A challenging algorithmic problem is determining the locations to place these sensor nodes while meeting several criteria: 1) provide complete coverage of the domain, and 2) create a topology with problem dependent node densities, while 3) minimizing the number of sensor nodes. This manuscript presents a novel approach to determining optimal sensor placement, Advancing Front mEsh generation with Constrained dElaunay Triangulation and Smoothing (AFECETS) that addresses these criteria. A unique aspect of AFECETS is the ability to determine wireless sensor node locations for areas of high interest (hospitals, schools, high population density areas) that require higher density of nodes for monitoring environmental conditions, a feature that is difficult to find in other research work. The AFECETS algorithm was tested on several arbitrary shaped domains. AFECETS simulation results show that the algorithm 1) provides significant reduction in the number of nodes, in some cases over 40%, compared to an advancing front mesh generation algorithm, 2) maintains and improves optimal spacing between nodes, and 3) produces simulation run times suitable for real-time applications

  18. Towards closed-loop neuromodulation: a wireless miniaturized neural implant SoC

    Science.gov (United States)

    Liu, Wentai; Wang, Po-Min; Lo, Yi-Kai

    2017-05-01

    This work reports a platform technology toward the development of closed-loop neuromodulation. A neural implant based on the SoC developed in our laboratory is used as an example to illustrate the necessary functionalities for the efficacious implantable system. We also present an example of using the system to investigate the epidural stimulation for partial motor function recovery after spinal cord injury in a rat model. This hardware-software co-design tool demonstrate its promising potential towards an effective closed-loop neuromodulation for various biomedical applications.

  19. Experimental demonstration of a novel indoor optical wireless localization system for high-speed personal area networks.

    Science.gov (United States)

    Wang, Ke; Nirmalathas, Ampalavanapillai; Lim, Christina; Skafidas, Efstratios

    2015-04-01

    In this Letter, we propose a novel indoor localization system based on optical wireless technology. By using the same architecture as the high-speed full-duplex indoor optical wireless communication system, the "search and scan" process, and the added transmission power and beam footprint information in the "search and scan" message, indoor localization functionality is achieved. Proof-of-concept experiments are carried out, and results show that an average error of optical wireless communication system, high-speed indoor wireless personal area networks can be achieved.

  20. Wireless Magnetic-Based Closed-Loop Control of Self- Propelled Microjets

    NARCIS (Netherlands)

    Khalil, I.S.M.; Magdanz, V.; Sanchez, S.; Schmidt, O.G.; Misra, Sarthak

    2014-01-01

    In this study, we demonstrate closed-loop motion control of self-propelled microjets under the influence of external magnetic fields. We control the orientation of the microjets using external magnetic torque, whereas the linear motion towards a reference position is accomplished by the thrust and

  1. Advanced Wireless Local Area Networks in the Unlicensed Sub-1GHz ISM-bands

    NARCIS (Netherlands)

    Aust, S.H.

    2014-01-01

    This dissertation addresses the challenges of wireless local area networks (WLANs) that operate in the unlicensed sub-1GHz industrial, scientific, and medical (ISM) band. Frequencies in the 900MHz spectrum enable a wider coverage due to the longer propagation characteristics of the radio waves. To

  2. Double dipole antenna for dual-band wireless local area networks applications

    CSIR Research Space (South Africa)

    Steyn, JM

    2009-09-01

    Full Text Available A double dipole antenna design is proposed for wireless local area network (WLAN) applications. Two parallel dipoles are used to facilitate operation in both the standard WLAN frequency bands (IEEE 802.11b and IEEE 802.11a) simultaneously. The lower...

  3. Quantum loops and dynamical breaking of supersymmetry in locally supersymmetric guts

    Directory of Open Access Journals (Sweden)

    R. Arnowitt

    1983-01-01

    Full Text Available The one-loop effective potential of a locally supersymmetric grand unified theory is obtained. It is shown that local supersymmetry does not break perturbatively with loop corrections. When tree level breaking of supersymmetry is introduced at a mass scale mS ∼ 1TeV, quantum corrections are shown to protect this scale. A mechanism for generation of mS in terms of the GUT mass M and the Planck mass is discussed.

  4. Performance considerations for efficient multimedia streaming in wireless local area networks

    Science.gov (United States)

    Krishnaswamy, Dilip; Stacey, Robert J.; van Alstine, Ryan; Chimitt, William J.

    2004-11-01

    This paper presents investigates multimedia streaming over wireless local area networks. Physical layer sigmoid analytical models are presented for 802.11a/g and for 2x3 MIMO 802.11n MIMO-based systems are presented. Performance results in a wireless LAN environment are presented for traffic using UDP and TCP transport mechanisms. Packet losses are observed in WLAN environments which affects the overall throughput available. Possibilities for performance improvements with the use of 802.11e and MIMO technologies are discussed. System platform architecture performance issues for wireless video conferencing between Intel« PXA27x processor-based handheld platforms are presented and results with retry-limit adaptation are also presented.

  5. A Three-Dimensional Wireless Indoor Localization System

    Directory of Open Access Journals (Sweden)

    Ping Yi

    2014-01-01

    Full Text Available Indoor localization, an emerging technology in location based service (LBS, is now playing a more and more important role both in commercial and in civilian industry. Global position system (GPS is the most popular solution in outdoor localization field, and the accuracy is around 10 meter error in positioning. However, with complex obstacles in buildings, problems rise in the “last mile” of localization field, which encourage a momentum of indoor localization. The traditional indoor localization system is either range-based or fingerprinting-based, which requires a lot of time and efforts to do the predeployment. In this paper, we present a 3-dimensional on-demand indoor localization system (3D-ODIL, which can be fingerprint-free and deployed rapidly in a multistorey building. The 3D-ODIL consists of two phases, vertical localization and horizontal localization. On vertical direction, we propose multistorey differential (MSD algorithm and implement it to fulfill the vertical localization, which can greatly reduce the number of anchors deployed. We use enhanced field division (EFD algorithm to conduct the horizontal localization. EFD algorithm is a range-free algorithm, the main idea of which is to dynamically divide the field within different signature area and position the target. The accuracy and performance have been validated through our extensive analysis and systematic experiments.

  6. PERFORMANCE EVALUATION OF LOCAL BARRIER COVERAGE IN WIRELESS SENSOR NETWORKS

    OpenAIRE

    K. K. Kannan

    2017-01-01

    The main aim of project is to create appropriate model of coverage for movement detection applications such as intrusion detection. However it has been proved that given sensor deployment sensors cannot locally determine whether deployment provides global coverage. Making it impossible to develop localized algorithms thus limiting it Dees use in practice. In this project I am introducing the concept of local barrier coverage to address this limitation. It is motivated by the observation that ...

  7. Precise Localization of Mobile Robots via Odometry and Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Guoyu Fu

    2013-04-01

    Full Text Available Precise localization of mobile robots in uncertain environments is a fundamental and crucial issue in robotics. In this paper, to deal with the unbounded accumulated errors of dead reckoning (DR-based localization, wireless sensor network (WSN-based localization is applied to calibrate the uncertainty of odometry using a Kalman filter (KF. In addition, to further aid in obtaining precise positions and reduce uncertainty, a novel backward dead reckoning (BDR localization approach is proposed. The experimental results demonstrate the success and reliability of the proposed method.

  8. Research on Algorithm of Three-Dimensional Wireless Sensor Networks Node Localization

    Directory of Open Access Journals (Sweden)

    Jiang Minlan

    2016-01-01

    Full Text Available This paper proposes a three-dimensional wireless sensor networks node localization algorithm based on multidimensional scaling anchor nodes, which is used to realize the absolute positioning of unknown nodes by using the distance between the anchor nodes and the nodes. The core of the proposed localization algorithm is a kind of repeated optimization method based on anchor nodes which is derived from STRESS formula. The algorithm employs the Tunneling Method to solve the local minimum problem in repeated optimization, which improves the accuracy of the optimization results. The simulation results validate the effectiveness of the algorithm. Random distribution of three-dimensional wireless sensor network nodes can be accurately positioned. The results satisfy the high precision and stability requirements in three-dimensional space node location.

  9. 3D magnetic-resonance-coupling (MRC) localization of wireless capsule endoscopy

    DEFF Research Database (Denmark)

    Xia, Yongming; Zhang, Lihui; Lu, Kaiyuan

    2016-01-01

    Wireless Capsule Endoscope (WCE) enables developing actively controlled capsule for potential complex surgeries, imaging, and new medicine tests. These tasks of WCE need safe, efficient, and precise 3D localization techniques. In this paper, a new application of the magnetic resonance coupling (MRC......) technique, which has been widely developed for efficient wireless power transfer, is introduced. It is proposed that the distance dependent signal strength in a MRC system can be beneficially used for 3D localization. The new 3D-MRC localization system consists of three orthogonal emitting coils which...... are powered by a battery in the capsule, and three pairs of orthogonal receiving coils which are placed outside human body. The distances between the WCE and the receiving coils can be estimated with good accuracy by studying the signal strengths in individual receiving coils. The proposed new 3D-MRC...

  10. Dead Reckoning Localization Technique for Mobile Wireless Sensor Networks

    OpenAIRE

    Rashid, Haroon; Turuk, Ashok Kumar

    2015-01-01

    Full paper at: http://arxiv.org/pdf/1504.06797.pdfThis paper shows how a mobile node can be localized with less than three beacon nodes. It uses a technique known as dead-reckoning for localization of nodes at specific intervals

  11. Wireless magnetic-based closed-loop control of self-propelled microjets.

    Directory of Open Access Journals (Sweden)

    Islam S M Khalil

    Full Text Available In this study, we demonstrate closed-loop motion control of self-propelled microjets under the influence of external magnetic fields. We control the orientation of the microjets using external magnetic torque, whereas the linear motion towards a reference position is accomplished by the thrust and pulling magnetic forces generated by the ejecting oxygen bubbles and field gradients, respectively. The magnetic dipole moment of the microjets is characterized using the U-turn technique, and its average is calculated to be 1.3x10⁻¹⁰ A.m² at magnetic field and linear velocity of 2 mT and 100 µm/s, respectively. The characterized magnetic dipole moment is used in the realization of the magnetic force-current map of the microjets. This map in turn is used for the design of a closed-loop control system that does not depend on the exact dynamical model of the microjets and the accurate knowledge of the parameters of the magnetic system. The motion control characteristics in the transient- and steady-states depend on the concentration of the surrounding fluid (hydrogen peroxide solution and the strength of the applied magnetic field. Our control system allows us to position microjets at an average velocity of 115 µm/s, and within an average region-of-convergence of 365 µm.

  12. A Least Square-Based Self-Adaptive Localization Method for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baoguo Yu

    2016-01-01

    Full Text Available In the wireless sensor network (WSN localization methods based on Received Signal Strength Indicator (RSSI, it is usually required to determine the parameters of the radio signal propagation model before estimating the distance between the anchor node and an unknown node with reference to their communication RSSI value. And finally we use a localization algorithm to estimate the location of the unknown node. However, this localization method, though high in localization accuracy, has weaknesses such as complex working procedure and poor system versatility. Concerning these defects, a self-adaptive WSN localization method based on least square is proposed, which uses the least square criterion to estimate the parameters of radio signal propagation model, which positively reduces the computation amount in the estimation process. The experimental results show that the proposed self-adaptive localization method outputs a high processing efficiency while satisfying the high localization accuracy requirement. Conclusively, the proposed method is of definite practical value.

  13. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  14. Distributed Water Pollution Source Localization with Mobile UV-Visible Spectrometer Probes in Wireless Sensor Networks.

    Science.gov (United States)

    Ma, Junjie; Meng, Fansheng; Zhou, Yuexi; Wang, Yeyao; Shi, Ping

    2018-02-16

    Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible) spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO) procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.

  15. Distributed Water Pollution Source Localization with Mobile UV-Visible Spectrometer Probes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junjie Ma

    2018-02-01

    Full Text Available Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.

  16. Distributed Water Pollution Source Localization with Mobile UV-Visible Spectrometer Probes in Wireless Sensor Networks

    Science.gov (United States)

    Zhou, Yuexi; Wang, Yeyao; Shi, Ping

    2018-01-01

    Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible) spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO) procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths. PMID:29462929

  17. SeRLoc: Robust Localization for Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Lazos, Loukas; Poovendran, Radha

    2005-01-01

    .... We show that SeRLoc is robust against known attacks on WSNs such as the wormhole attack, the Sybil attack, and compromise of network entities and analytically compute the probability of success for each attack. We also compare the performance of SeRLoc with state-of-the-art range-independent localization schemes and show that SeRLoc has better performance.

  18. Measurement of local interfacial area concentration in boiling loop

    International Nuclear Information System (INIS)

    Kyoung, Ho Kang; Byong, Jo Yun; Goon, Cherl Park

    1995-01-01

    An accurate prediction of two-phase flow is essential to many energy systems, including nuclear reactors. To model the two-phase flow, detailed information on the internal flow structure is required. The void fraction and interfacial area concentration are important fundamental parameters characterizing the internal structure of two-phase flow. The interfacial area concentration is defined as the available interfacial area per unit volume of the two-phase mixture in calculations of the interfacial transport of mass, momentum, and energy. Although a number of studies have been made in this area, the interfacial area concentration in two-phase flow has not been sufficiently investigated either experimentally or analytically. Most existing models for interfacial area concentration are limited to area-averaged interfacial area concentration in a flow channel. And the studies on local interfacial area concentration are limited to the case of air-water two-phase flow. However, the internal flow structure of steam-water two-phase flow having various bubble sizes could be quite different from that of air-water two-phase flow, the reliability of which weak in practical applications. In this study, the local interfacial area concentration steam-water two-phase flow has been investigated experimentally in a circular boiling tube having a heating rod in the center, and for the low flow with liquid superficial velocity <1 m/s

  19. Extension to HiRLoc Algorithm for Localization Error Computation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Swati Saxena

    2013-09-01

    Full Text Available Wireless sensor networks (WSNs have gained importance in recent years as this support a large spectrum of applications such as automotive, health, military, environmental, home and office. Various algorithms have been proposed for making this technology more adaptive the existing algorithms address issues such as safety, security, power consumption, lifetime and localization. This paper presents an extension to HiRLoc algorithm and highlights its benefits. Extended HiRLoc significantly reduce the average localization error by suggesting a new method directional antenna based scheme.

  20. Interference-Aware Radio Resource Management for Local Area Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ribeiro CássioB

    2011-01-01

    Full Text Available Interference-aware multiple access is an enabler to cost-efficient and reliable high data-rate local area wireless access. In this paper, we propose an interference-aware radio resource management scheme where receivers inform about their throughput, interference, and signal levels by means of broadcast messages tied to data reception. In the proposed scheme, the conventional scheduler is extended to interference-aware operation where individual scheduling decisions are based on estimated change in system-level performance. The performance of the proposed scheme is evaluated in system simulations where it is compared to a conventional scheduler and a centralized scheduler (global optimum. The convergence of the proposed scheduler is analyzed and signaling overhead of an example implementation is characterized. The results demonstrate that the proposed scheme enables fair and efficient wireless access in challenging interference scenarios, for example, multiple networks deployed in the same geographical area and sharing a common band.

  1. An energy-efficient underground localization system based on heterogeneous wireless networks.

    Science.gov (United States)

    Yuan, Yazhou; Chen, Cailian; Guan, Xinping; Yang, Qiuling

    2015-05-26

    A precision positioning system with energy efficiency is of great necessity for guaranteeing personnel safety in underground mines. The location information of the miners' should be transmitted to the control center timely and reliably; therefore, a heterogeneous network with the backbone based on high speed Industrial Ethernet is deployed. Since the mobile wireless nodes are working in an irregular tunnel, a specific wireless propagation model cannot fit all situations. In this paper, an underground localization system is designed to enable the adaptation to kinds of harsh tunnel environments, but also to reduce the energy consumption and thus prolong the lifetime of the network. Three key techniques are developed and implemented to improve the system performance, including a step counting algorithm with accelerometers, a power control algorithm and an adaptive packets scheduling scheme. The simulation study and experimental results show the effectiveness of the proposed algorithms and the implementation.

  2. An Energy-Efficient Underground Localization System Based on Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Yazhou Yuan

    2015-05-01

    Full Text Available A precision positioning system with energy efficiency is of great necessity for guaranteeing personnel safety in underground mines. The location information of the miners’ should be transmitted to the control center timely and reliably; therefore, a heterogeneous network with the backbone based on high speed Industrial Ethernet is deployed. Since the mobile wireless nodes are working in an irregular tunnel, a specific wireless propagation model cannot fit all situations. In this paper, an underground localization system is designed to enable the adaptation to kinds of harsh tunnel environments, but also to reduce the energy consumption and thus prolong the lifetime of the network. Three key techniques are developed and implemented to improve the system performance, including a step counting algorithm with accelerometers, a power control algorithm and an adaptive packets scheduling scheme. The simulation study and experimental results show the effectiveness of the proposed algorithms and the implementation.

  3. An MEF-Based Localization Algorithm against Outliers in Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Dandan; Wan, Jiangwen; Wang, Meimei; Zhang, Qiang

    2016-07-07

    Precise localization has attracted considerable interest in Wireless Sensor Networks (WSNs) localization systems. Due to the internal or external disturbance, the existence of the outliers, including both the distance outliers and the anchor outliers, severely decreases the localization accuracy. In order to eliminate both kinds of outliers simultaneously, an outlier detection method is proposed based on the maximum entropy principle and fuzzy set theory. Since not all the outliers can be detected in the detection process, the Maximum Entropy Function (MEF) method is utilized to tolerate the errors and calculate the optimal estimated locations of unknown nodes. Simulation results demonstrate that the proposed localization method remains stable while the outliers vary. Moreover, the localization accuracy is highly improved by wisely rejecting outliers.

  4. A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Gulshan Kumar

    2017-01-01

    Full Text Available Localization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate the estimated location or try to provide false beacons. In this paper, we have proposed a methodology that will address this problem of security aspects in localization of the sensor nodes. Moreover, we have considered the network environment with random node deployment and mobility as these two conditions are less addressed in previous research works. Further, our proposed algorithm provides low overhead due to the usage of less control messages in a limited transmission range. In addition, we have also proposed an algorithm to detect the malicious anchor nodes inside the network. The simulated results show that our proposed algorithm is efficient in terms of time consumption, localization accuracy, and localization ratio in the presence of malicious nodes.

  5. Centroid Localization of Uncooperative Nodes in Wireless Networks Using a Relative Span Weighting Method

    Directory of Open Access Journals (Sweden)

    Christine Laurendeau

    2010-01-01

    Full Text Available Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target is a malicious device engaging in a security exploit or a low-battery handset in the middle of a critical emergency. Such scenarios necessitate that a radio signal source be localized by other network nodes efficiently, using minimal information. We propose two new algorithms for estimating the position of an uncooperative transmitter, based on the received signal strength (RSS of a single target message at a set of receivers whose coordinates are known. As an extension to the concept of centroid localization, our mechanisms weigh each receiver's coordinates based on the message's relative RSS at that receiver, with respect to the span of RSS values over all receivers. The weights may decrease from the highest RSS receiver either linearly or exponentially. Our simulation results demonstrate that for all but the most sparsely populated wireless networks, our exponentially weighted mechanism localizes a target node within the regulations stipulated for emergency services location accuracy.

  6. Structural Health Monitoring of Wind Turbine Blades: Acoustic Source Localization Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Omar Mabrok Bouzid

    2015-01-01

    Full Text Available Structural health monitoring (SHM is important for reducing the maintenance and operation cost of safety-critical components and systems in offshore wind turbines. This paper proposes an in situ wireless SHM system based on an acoustic emission (AE technique. By using this technique a number of challenges are introduced due to high sampling rate requirements, limitations in the communication bandwidth, memory space, and power resources. To overcome these challenges, this paper focused on two elements: (1 the use of an in situ wireless SHM technique in conjunction with the utilization of low sampling rates; (2 localization of acoustic sources which could emulate impact damage or audible cracks caused by different objects, such as tools, bird strikes, or strong hail, all of which represent abrupt AE events and could affect the structural health of a monitored wind turbine blade. The localization process is performed using features extracted from aliased AE signals based on a developed constraint localization model. To validate the performance of these elements, the proposed system was tested by testing the localization of the emulated AE sources acquired in the field.

  7. Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review

    Directory of Open Access Journals (Sweden)

    Ammar M. A. Abu Znaid

    2017-01-01

    Full Text Available The advancement of digital technology has increased the deployment of wireless sensor networks (WSNs in our daily life. However, locating sensor nodes is a challenging task in WSNs. Sensing data without an accurate location is worthless, especially in critical applications. The pioneering technique in range-free localization schemes is a sequential Monte Carlo (SMC method, which utilizes network connectivity to estimate sensor location without additional hardware. This study presents a comprehensive survey of state-of-the-art SMC localization schemes. We present the schemes as a thematic taxonomy of localization operation in SMC. Moreover, the critical characteristics of each existing scheme are analyzed to identify its advantages and disadvantages. The similarities and differences of each scheme are investigated on the basis of significant parameters, namely, localization accuracy, computational cost, communication cost, and number of samples. We discuss the challenges and direction of the future research work for each parameter.

  8. Precise Localization and Formation Control of Swarm Robots via Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Han Wu

    2014-01-01

    Full Text Available Precise localization and formation control are one of the key technologies to achieve coordination and control of swarm robots, which is also currently a bottleneck for practical applications of swarm robotic systems. Aiming at overcoming the limited individual perception and the difficulty of achieving precise localization and formation, a localization approach combining dead reckoning (DR with wireless sensor network- (WSN- based methods is proposed in this paper. Two kinds of WSN localization technologies are adopted in this paper, that is, ZigBee-based RSSI (received signal strength indication global localization and electronic tag floors for calibration of local positioning. First, the DR localization information is combined with the ZigBee-based RSSI position information using the Kalman filter method to achieve precise global localization and maintain the robot formation. Then the electronic tag floors provide the robots with their precise coordinates in some local areas and enable the robot swarm to calibrate its formation by reducing the accumulated position errors. Hence, the overall performance of localization and formation control of the swarm robotic system is improved. Both of the simulation results and the experimental results on a real schematic system are given to demonstrate the success of the proposed approach.

  9. A Novel Partial Discharge Localization Method in Substation Based on a Wireless UHF Sensor Array.

    Science.gov (United States)

    Li, Zhen; Luo, Lingen; Zhou, Nan; Sheng, Gehao; Jiang, Xiuchen

    2017-08-18

    Effective Partial Discharge (PD) localization can detect the insulation problems of the power equipment in a substation and improve the reliability of power systems. Typical Ultra-High Frequency (UHF) PD localization methods are mainly based on time difference information, which need a high sampling rate system. This paper proposes a novel PD localization method based on a received signal strength indicator (RSSI) fingerprint to quickly locate the power equipment with potential insulation defects. The proposed method consists of two stages. In the offline stage, the RSSI fingerprint data of the detection area is measured by a wireless UHF sensor array and processed by a clustering algorithm to reduce the PD interference and abnormal RSSI values. In the online stage, when PD happens, the RSSI fingerprint of PD is measured via the input of pattern recognition for PD localization. To achieve an accurate localization, the pattern recognition process is divided into two steps: a preliminary localization is implemented by cluster recognition to reduce the localization region, and the compressed sensing algorithm is used for accurate PD localization. A field test in a substation indicates that the mean localization error of the proposed method is 1.25 m, and 89.6% localization errors are less than 3 m.

  10. PlayNCool: Opportunistic Network Coding for Local Optimization of Routing in Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Pedersen, Morten Videbæk

    2013-01-01

    This paper introduces PlayNCool, an opportunistic protocol with local optimization based on network coding to increase the throughput of a wireless mesh network (WMN). PlayNCool aims to enhance current routing protocols by (i) allowing random linear network coding transmissions end-to-end, (ii...... in large scale mesh networks. We show that PlayNCool can provide gains of more than 3x in individual links, which translates into a large end-to-end throughput improvement, and that it provides higher gains when more nodes in the network contend for the channel at the MAC layer, making it particularly...... relevant for dense mesh networks....

  11. Optimization of locations of diffusion spots in indoor optical wireless local area networks

    Science.gov (United States)

    Eltokhey, Mahmoud W.; Mahmoud, K. R.; Ghassemlooy, Zabih; Obayya, Salah S. A.

    2018-03-01

    In this paper, we present a novel optimization of the locations of the diffusion spots in indoor optical wireless local area networks, based on the central force optimization (CFO) scheme. The users' performance uniformity is addressed by using the CFO algorithm, and adopting different objective function's configurations, while considering maximization and minimization of the signal to noise ratio and the delay spread, respectively. We also investigate the effect of varying the objective function's weights on the system and the users' performance as part of the adaptation process. The results show that the proposed objective function configuration-based optimization procedure offers an improvement of 65% in the standard deviation of individual receivers' performance.

  12. Constrained State Estimation for Individual Localization in Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoxue Feng

    2014-11-01

    Full Text Available Wireless body sensor networks based on ultra-wideband radio have recently received much research attention due to its wide applications in health-care, security, sports and entertainment. Accurate localization is a fundamental problem to realize the development of effective location-aware applications above. In this paper the problem of constrained state estimation for individual localization in wireless body sensor networks is addressed. Priori knowledge about geometry among the on-body nodes as additional constraint is incorporated into the traditional filtering system. The analytical expression of state estimation with linear constraint to exploit the additional information is derived. Furthermore, for nonlinear constraint, first-order and second-order linearizations via Taylor series expansion are proposed to transform the nonlinear constraint to the linear case. Examples between the first-order and second-order nonlinear constrained filters based on interacting multiple model extended kalman filter (IMM-EKF show that the second-order solution for higher order nonlinearity as present in this paper outperforms the first-order solution, and constrained IMM-EKF obtains superior estimation than IMM-EKF without constraint. Another brownian motion individual localization example also illustrates the effectiveness of constrained nonlinear iterative least square (NILS, which gets better filtering performance than NILS without constraint.

  13. Antenna Radiation Pattern Influence on the Localization Accuracy in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    COCA, E.

    2013-05-01

    Full Text Available Localization or position determination is one of the most common applications for the wireless sensor networks. Many investigations have been made during the last decade, most of the effort being concentrated in the direction of improving the accuracy of the positioning results by using complex filtering and correction algorithms, and other techniques such as radio maps or directive antennas for the reference nodes. The most common sources of errors include reflections on nearby objects, radio frequency noise, and variable characteristics of the communication channel. In the vast majority of cases, several assumptions have been made in order to simplify the computing algorithms or the complexity of nodes, and finally their cost. The omnidirectional radiation pattern of the node antennas is such an assumption. In this paper we investigate theoretically and validate by measurements the influence of the radiation pattern on the localization accuracy of a wireless sensor node network. By taking into consideration the orientation of nodes, which could be provided by a local digital compass on each node, we demonstrate that the position accuracy could be improved with a minimum of resources. All measurements were made in radio emissions controlled environment - a semi-anechoic chamber, without affecting the generality of the proposed solution.

  14. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

    CERN Document Server

    International Organization for Standardization. Geneva

    1997-01-01

    Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

  15. An Effective Cuckoo Search Algorithm for Node Localization in Wireless Sensor Network.

    Science.gov (United States)

    Cheng, Jing; Xia, Linyuan

    2016-08-31

    Localization is an essential requirement in the increasing prevalence of wireless sensor network (WSN) applications. Reducing the computational complexity, communication overhead in WSN localization is of paramount importance in order to prolong the lifetime of the energy-limited sensor nodes and improve localization performance. This paper proposes an effective Cuckoo Search (CS) algorithm for node localization. Based on the modification of step size, this approach enables the population to approach global optimal solution rapidly, and the fitness of each solution is employed to build mutation probability for avoiding local convergence. Further, the approach restricts the population in the certain range so that it can prevent the energy consumption caused by insignificant search. Extensive experiments were conducted to study the effects of parameters like anchor density, node density and communication range on the proposed algorithm with respect to average localization error and localization success ratio. In addition, a comparative study was conducted to realize the same localization task using the same network deployment. Experimental results prove that the proposed CS algorithm can not only increase convergence rate but also reduce average localization error compared with standard CS algorithm and Particle Swarm Optimization (PSO) algorithm.

  16. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2015-06-01

    Full Text Available In this paper, we address the thermal rise and Quality-of-Service (QoS provisioning issue for an intra-body Wireless Body Area Network (WBAN having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s, and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  17. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-06-15

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  18. Localizing softness and stress along loops in 3D topological metamaterials.

    Science.gov (United States)

    Baardink, Guido; Souslov, Anton; Paulose, Jayson; Vitelli, Vincenzo

    2018-01-16

    Topological states can be used to control the mechanical properties of a material along an edge or around a localized defect. The rigidity of elastic networks is characterized by a topological invariant called the polarization; materials with a well-defined uniform polarization display a dramatic range of edge softness depending on the orientation of the polarization relative to the terminating surface. However, in all 3D mechanical metamaterials proposed to date, the topological modes are mixed with bulk soft modes, which organize themselves in Weyl loops. Here, we report the design of a 3D topological metamaterial without Weyl lines and with a uniform polarization that leads to an asymmetry between the number of soft modes on opposing surfaces. We then use this construction to localize topological soft modes in interior regions of the material by including defect lines-dislocation loops-that are unique to three dimensions. We derive a general formula that relates the difference in the number of soft modes and states of self-stress localized along the dislocation loop to the handedness of the vector triad formed by the lattice polarization, Burgers vector, and dislocation-line direction. Our findings suggest a strategy for preprogramming failure and softness localized along lines in 3D, while avoiding extended soft Weyl modes.

  19. Intelligent visual localization of wireless capsule endoscopes enhanced by color information.

    Science.gov (United States)

    Dimas, George; Spyrou, Evaggelos; Iakovidis, Dimitris K; Koulaouzidis, Anastasios

    2017-10-01

    Wireless capsule endoscopy (WCE) is performed with a miniature swallowable endoscope enabling the visualization of the whole gastrointestinal (GI) tract. One of the most challenging problems in WCE is the localization of the capsule endoscope (CE) within the GI lumen. Contemporary, radiation-free localization approaches are mainly based on the use of external sensors and transit time estimation techniques, with practically low localization accuracy. Latest advances for the solution of this problem include localization approaches based solely on visual information from the CE camera. In this paper we present a novel visual localization approach based on an intelligent, artificial neural network, architecture which implements a generic visual odometry (VO) framework capable of estimating the motion of the CE in physical units. Unlike the conventional, geometric, VO approaches, the proposed one is adaptive to the geometric model of the CE used; therefore, it does not require any prior knowledge about and its intrinsic parameters. Furthermore, it exploits color as a cue to increase localization accuracy and robustness. Experiments were performed using a robotic-assisted setup providing ground truth information about the actual location of the CE. The lowest average localization error achieved is 2.70 ± 1.62 cm, which is significantly lower than the error obtained with the geometric approach. This result constitutes a promising step towards the in-vivo application of VO, which will open new horizons for accurate local treatment, including drug infusion and surgical interventions. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization

    KAUST Repository

    Saeed, Nasir

    2017-12-26

    Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs) is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS) based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB) is derived for localization accuracy of the proposed technique.

  1. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization

    Directory of Open Access Journals (Sweden)

    Nasir Saeed

    2017-12-01

    Full Text Available Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB is derived for localization accuracy of the proposed technique.

  2. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization.

    Science.gov (United States)

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y; Alouini, Mohamed-Slim

    2017-12-26

    Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs) is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS) based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB) is derived for localization accuracy of the proposed technique.

  3. High Resolution Robust GPS-free Localization for Wireless Sensor Networks and its Applications

    KAUST Repository

    Mirza, Mohammed

    2011-12-12

    In this thesis we investigate the problem of robustness and scalability w.r.t. estimating the position of randomly deployed motes/nodes of a Wireless Sensor Network (WSN) without the help of Global Positioning System (GPS) devices. We propose a few applications of range independent localization algorithms that allow the sensors to actively determine their location with high resolution without increasing the complexity of the hardware or any additional device setup. In our first application we try to present a localized and centralized cooperative spectrum sensing using RF sensor networks. This scheme collaboratively sense the spectrum and localize the whole network efficiently and with less difficulty. In second application we try to focus on how efficiently we can localize the nodes, to detect underwater threats, without the use of beacons. In third application we try to focus on 3-Dimensional localization for LTE systems. Our performance evaluation shows that these schemes lead to a significant improvement in localization accuracy compared to the state-of-art range independent localization schemes, without requiring GPS support.

  4. Sparse Localization with a Mobile Beacon Based on LU Decomposition in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunhui Zhao

    2015-09-01

    Full Text Available Node localization is the core in wireless sensor network. It can be solved by powerful beacons, which are equipped with global positioning system devices to know their location information. In this article, we present a novel sparse localization approach with a mobile beacon based on LU decomposition. Our scheme firstly translates node localization problem into a 1-sparse vector recovery problem by establishing sparse localization model. Then, LU decomposition pre-processing is adopted to solve the problem that measurement matrix does not meet the re¬stricted isometry property. Later, the 1-sparse vector can be exactly recovered by compressive sensing. Finally, as the 1-sparse vector is approximate sparse, weighted Cen¬troid scheme is introduced to accurately locate the node. Simulation and analysis show that our scheme has better localization performance and lower requirement for the mobile beacon than MAP+GC, MAP-M, and MAP-MN schemes. In addition, the obstacles and DOI have little effect on the novel scheme, and it has great localization performance under low SNR, thus, the scheme proposed is robust.

  5. Wireless Capsule Gastrointestinal Endoscopy: Direction-of-Arrival Estimation Based Localization Survey.

    Science.gov (United States)

    Dey, Nilanjan; Ashour, Amira S; Shi, Fuqian; Sherratt, R Simon

    2017-01-01

    One of the significant challenges in capsule endoscopy (CE) is to precisely determine the pathologies location. The localization process is primarily estimated using the received signal strength (RSS) from sensors in the capsule system through its movement in the gastrointestinal (GI) tract. Consequently, the wireless CE (WCE) system requires improvement to handle the lack of the capsule instantaneous localization information and to solve the relatively low transmission data rate challenges. Furthermore, the association among the capsule's transmitter position, capsule location, signal reduction, and the capsule direction should be assessed. These measurements deliver significant information for the instantaneous capsule localization systems based on time-of-arrival approach, phase difference of arrival, RSS, electromagnetic, direction of arrival (DOA), and video tracking approaches are developed to locate the WCE precisely. This review introduces the acquisition concept of the GI medical images using the endoscopy with a comprehensive description of the endoscopy system components. Capsule localization and tracking are considered to be the most important features of the WCE system, thus this paper emphasizes the most common localization systems generally, highlighting the DOA-based localization systems and discusses the required significant research challenges to be addressed.

  6. Matrix Completion Optimization for Localization in Wireless Sensor Networks for Intelligent IoT

    Directory of Open Access Journals (Sweden)

    Thu L. N. Nguyen

    2016-05-01

    Full Text Available Localization in wireless sensor networks (WSNs is one of the primary functions of the intelligent Internet of Things (IoT that offers automatically discoverable services, while the localization accuracy is a key issue to evaluate the quality of those services. In this paper, we develop a framework to solve the Euclidean distance matrix completion problem, which is an important technical problem for distance-based localization in WSNs. The sensor network localization problem is described as a low-rank dimensional Euclidean distance completion problem with known nodes. The task is to find the sensor locations through recovery of missing entries of a squared distance matrix when the dimension of the data is small compared to the number of data points. We solve a relaxation optimization problem using a modification of Newton’s method, where the cost function depends on the squared distance matrix. The solution obtained in our scheme achieves a lower complexity and can perform better if we use it as an initial guess for an interactive local search of other higher precision localization scheme. Simulation results show the effectiveness of our approach.

  7. A Localization Based Cooperative Routing Protocol for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2017-01-01

    Full Text Available Localization is one of the major aspects in underwater wireless sensor networks (UWSNs. Therefore, it is important to know the accurate position of the sensor node in large scale applications like disaster prevention, tactical surveillance, and monitoring. Due to the inefficiency of the global positioning system (GPS in UWSN, it is very difficult to localize a node in underwater environment compared to terrestrial networks. To minimize the localization error and enhance the localization coverage of the network, two routing protocols are proposed; the first one is mobile autonomous underwater vehicle (MobiL-AUV and the second one is cooperative MobiL (CO-MobiL. In MobiL-AUV, AUVs are deployed and equipped with GPS and act as reference nodes. These reference nodes are used to localize all the nonlocalized ordinary sensor nodes in order to reduce the localization error and maximize the network coverage. CO-MobiL is presented in order to improve the network throughput by using the maximal ratio combining (MRC as diversity technique which combines both signals, received from the source and received from the relay at the destination. It uses amplify-and-forward (AF mechanism to improve the signal between the source and the destination. To support our claims, extensive simulations are performed.

  8. Dynamic Fuzzy-Logic Based Path Planning for Mobility-Assisted Localization in Wireless Sensor Networks.

    Science.gov (United States)

    Alomari, Abdullah; Phillips, William; Aslam, Nauman; Comeau, Frank

    2017-08-18

    Mobile anchor path planning techniques have provided as an alternative option for node localization in wireless sensor networks (WSNs). In such context, path planning is a movement pattern where a mobile anchor node's movement is designed in order to achieve a maximum localization ratio possible with a minimum error rate. Typically, the mobility path planning is designed in advance, which is applicable when the mobile anchor has sufficient sources of energy and time. However, when the mobility movement is restricted or limited, a dynamic path planning design is needed. This paper proposes a novel distributed range-free movement mechanism for mobility-assisted localization in WSNs when the mobile anchor's movement is limited. The designed movement is formed in real-time pattern using a fuzzy-logic approach based on the information received from the network and the nodes' deployment. Our proposed model, Fuzzy-Logic based Path Planning for mobile anchor-assisted Localization in WSNs (FLPPL), offers superior results in several metrics including both localization accuracy and localization ratio in comparison to other similar works.

  9. Intelligent Local Avoided Collision (iLAC) MAC Protocol for Very High Speed Wireless Network

    Science.gov (United States)

    Hieu, Dinh Chi; Masuda, Akeo; Rabarijaona, Verotiana Hanitriniala; Shimamoto, Shigeru

    Future wireless communication systems aim at very high data rates. As the medium access control (MAC) protocol plays the central role in determining the overall performance of the wireless system, designing a suitable MAC protocol is critical to fully exploit the benefit of high speed transmission that the physical layer (PHY) offers. In the latest 802.11n standard [2], the problem of long overhead has been addressed adequately but the issue of excessive colliding transmissions, especially in congested situation, remains untouched. The procedure of setting the backoff value is the heart of the 802.11 distributed coordination function (DCF) to avoid collision in which each station makes its own decision on how to avoid collision in the next transmission. However, collision avoidance is a problem that can not be solved by a single station. In this paper, we introduce a new MAC protocol called Intelligent Local Avoided Collision (iLAC) that redefines individual rationality in choosing the backoff counter value to avoid a colliding transmission. The distinguishing feature of iLAC is that it fundamentally changes this decision making process from collision avoidance to collaborative collision prevention. As a result, stations can avoid colliding transmissions with much greater precision. Analytical solution confirms the validity of this proposal and simulation results show that the proposed algorithm outperforms the conventional algorithms by a large margin.

  10. Multi-hop localization algorithm based on grid-scanning for wireless sensor networks.

    Science.gov (United States)

    Wan, Jiangwen; Guo, Xiaolei; Yu, Ning; Wu, Yinfeng; Feng, Renjian

    2011-01-01

    For large-scale wireless sensor networks (WSNs) with a minority of anchor nodes, multi-hop localization is a popular scheme for determining the geographical positions of the normal nodes. However, in practice existing multi-hop localization methods suffer from various kinds of problems, such as poor adaptability to irregular topology, high computational complexity, low positioning accuracy, etc. To address these issues in this paper, we propose a novel Multi-hop Localization algorithm based on Grid-Scanning (MLGS). First, the factors that influence the multi-hop distance estimation are studied and a more realistic multi-hop localization model is constructed. Then, the feasible regions of the normal nodes are determined according to the intersection of bounding square rings. Finally, a verifiably good approximation scheme based on grid-scanning is developed to estimate the coordinates of the normal nodes. Additionally, the positioning accuracy of the normal nodes can be improved through neighbors' collaboration. Extensive simulations are performed in isotropic and anisotropic networks. The comparisons with some typical algorithms of node localization confirm the effectiveness and efficiency of our algorithm.

  11. Localizing softness and stress along loops in 3D topological metamaterials

    Science.gov (United States)

    Baardink, Guido; Souslov, Anton; Paulose, Jayson; Vitelli, Vincenzo

    2018-01-01

    Topological states can be used to control the mechanical properties of a material along an edge or around a localized defect. The rigidity of elastic networks is characterized by a topological invariant called the polarization; materials with a well-defined uniform polarization display a dramatic range of edge softness depending on the orientation of the polarization relative to the terminating surface. However, in all 3D mechanical metamaterials proposed to date, the topological modes are mixed with bulk soft modes, which organize themselves in Weyl loops. Here, we report the design of a 3D topological metamaterial without Weyl lines and with a uniform polarization that leads to an asymmetry between the number of soft modes on opposing surfaces. We then use this construction to localize topological soft modes in interior regions of the material by including defect lines—dislocation loops—that are unique to three dimensions. We derive a general formula that relates the difference in the number of soft modes and states of self-stress localized along the dislocation loop to the handedness of the vector triad formed by the lattice polarization, Burgers vector, and dislocation-line direction. Our findings suggest a strategy for preprogramming failure and softness localized along lines in 3D, while avoiding extended soft Weyl modes.

  12. Subjective Audio Quality over a Secure IEEE 802.11n Draft 2.0 Wireless Local Area Network

    Science.gov (United States)

    2009-03-01

    generated by a G.711 codec and transmission over an IEEE 802.11n draft 2.0 wireless local area network (WLAN). Decline in audio quality due to additional...6 2.5 Real-Time Transport Protocol ...................................................................................8 2.6 Audio Codecs ...Page 1. VoIP Audio Codec Data Rates and Typical MOS

  13. A Survey of Sound Source Localization Methods in Wireless Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Maximo Cobos

    2017-01-01

    Full Text Available Wireless acoustic sensor networks (WASNs are formed by a distributed group of acoustic-sensing devices featuring audio playing and recording capabilities. Current mobile computing platforms offer great possibilities for the design of audio-related applications involving acoustic-sensing nodes. In this context, acoustic source localization is one of the application domains that have attracted the most attention of the research community along the last decades. In general terms, the localization of acoustic sources can be achieved by studying energy and temporal and/or directional features from the incoming sound at different microphones and using a suitable model that relates those features with the spatial location of the source (or sources of interest. This paper reviews common approaches for source localization in WASNs that are focused on different types of acoustic features, namely, the energy of the incoming signals, their time of arrival (TOA or time difference of arrival (TDOA, the direction of arrival (DOA, and the steered response power (SRP resulting from combining multiple microphone signals. Additionally, we discuss methods not only aimed at localizing acoustic sources but also designed to locate the nodes themselves in the network. Finally, we discuss current challenges and frontiers in this field.

  14. GWO-LPWSN: Grey Wolf Optimization Algorithm for Node Localization Problem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    R. Rajakumar

    2017-01-01

    Full Text Available Seyedali Mirjalili et al. (2014 introduced a completely unique metaheuristic technique particularly grey wolf optimization (GWO. This algorithm mimics the social behavior of grey wolves whereas it follows the leadership hierarchy and attacking strategy. The rising issue in wireless sensor network (WSN is localization problem. The objective of this problem is to search out the geographical position of unknown nodes with the help of anchor nodes in WSN. In this work, GWO algorithm is incorporated to spot the correct position of unknown nodes, so as to handle the node localization problem. The proposed work is implemented using MATLAB 8.2 whereas nodes are deployed in a random location within the desired network area. The parameters like computation time, percentage of localized node, and minimum localization error measures are utilized to analyse the potency of GWO rule with other variants of metaheuristics algorithms such as particle swarm optimization (PSO and modified bat algorithm (MBA. The observed results convey that the GWO provides promising results compared to the PSO and MBA in terms of the quick convergence rate and success rate.

  15. An Efficient and Self-Adapting Localization in Static Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wei Dong

    2009-08-01

    Full Text Available Localization is one of the most important subjects in Wireless Sensor Networks (WSNs. To reduce the number of beacons and adopt probabilistic methods, some particle filter-based mobile beacon-assisted localization approaches have been proposed, such as Mobile Beacon-assisted Localization (MBL, Adapting MBL (A-MBL, and the method proposed by Hang et al. Some new significant problems arise in these approaches, however. The first question is which probability distribution should be selected as the dynamic model in the prediction stage. The second is whether the unknown node adopts neighbors’ observation in the update stage. The third is how to find a self-adapting mechanism to achieve more flexibility in the adapting stage. In this paper, we give the theoretical analysis and experimental evaluations to suggest which probability distribution in the dynamic model should be adopted to improve the efficiency in the prediction stage. We also give the condition for whether the unknown node should use the observations from its neighbors to improve the accuracy. Finally, we propose a Self-Adapting Mobile Beacon-assisted Localization (SA-MBL approach to achieve more flexibility and achieve almost the same performance with A-MBL.

  16. Molecular characterization of six sub population Indonesian local goats based on mitochondrial DNA D-loop

    Directory of Open Access Journals (Sweden)

    Aron Batubara

    2013-03-01

    Full Text Available Indonesian local goats were spread in some region, but there was still limited data’s known about the characteristics of its genetic diversity and origin. The Mitochondrial DNA D-loop sequences were used to study the genetic diversity and relationships of six sub population Indonesian local goats, namely, Kacang, Marica, Samosir, Jawarandu, Muara and Bengali goats. From 539 blood samples and DNA extraction collections were selected about 60 samples (10 samples each sub populations analyzed by PCR-RFLP methods, followed sequence analyzed about 5 PCR products each sub population. The results of the sequence analyses were edited and acquired about 957 bp of nucleotides length. After the alignment analyses were found 50 polymorphic sites which divided into 19 haplotype groups of mtDNA D-loop region. The value of nucleotide diversity was 0.014 ± 0.002. Analysis of Neighbour Joining with Kimura 2 Parameter methods and bootstrap test with 1000 replication indicated that each sub population groups was significantly different between one groups to the others. The maternal lineages origin of six breeds of Indonesian local goats was included to the group of lineage B. The Lineage B was the maternal origin of the haplogroup of goats in the region of East Asia, South Asia, China, Mongolia, North and South Africa, Malaysia, Indonesia, Pakistan and India.

  17. A Wireless Sensor Network with Soft Computing Localization Techniques for Track Cycling Applications

    Science.gov (United States)

    Gharghan, Sadik Kamel; Nordin, Rosdiadee; Ismail, Mahamod

    2016-01-01

    In this paper, we propose two soft computing localization techniques for wireless sensor networks (WSNs). The two techniques, Neural Fuzzy Inference System (ANFIS) and Artificial Neural Network (ANN), focus on a range-based localization method which relies on the measurement of the received signal strength indicator (RSSI) from the three ZigBee anchor nodes distributed throughout the track cycling field. The soft computing techniques aim to estimate the distance between bicycles moving on the cycle track for outdoor and indoor velodromes. In the first approach the ANFIS was considered, whereas in the second approach the ANN was hybridized individually with three optimization algorithms, namely Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), and Backtracking Search Algorithm (BSA). The results revealed that the hybrid GSA-ANN outperforms the other methods adopted in this paper in terms of accuracy localization and distance estimation accuracy. The hybrid GSA-ANN achieves a mean absolute distance estimation error of 0.02 m and 0.2 m for outdoor and indoor velodromes, respectively. PMID:27509495

  18. A Wireless Sensor Network with Soft Computing Localization Techniques for Track Cycling Applications

    Directory of Open Access Journals (Sweden)

    Sadik Kamel Gharghan

    2016-08-01

    Full Text Available In this paper, we propose two soft computing localization techniques for wireless sensor networks (WSNs. The two techniques, Neural Fuzzy Inference System (ANFIS and Artificial Neural Network (ANN, focus on a range-based localization method which relies on the measurement of the received signal strength indicator (RSSI from the three ZigBee anchor nodes distributed throughout the track cycling field. The soft computing techniques aim to estimate the distance between bicycles moving on the cycle track for outdoor and indoor velodromes. In the first approach the ANFIS was considered, whereas in the second approach the ANN was hybridized individually with three optimization algorithms, namely Particle Swarm Optimization (PSO, Gravitational Search Algorithm (GSA, and Backtracking Search Algorithm (BSA. The results revealed that the hybrid GSA-ANN outperforms the other methods adopted in this paper in terms of accuracy localization and distance estimation accuracy. The hybrid GSA-ANN achieves a mean absolute distance estimation error of 0.02 m and 0.2 m for outdoor and indoor velodromes, respectively.

  19. A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Anwar Khan

    2018-01-01

    Full Text Available Interference and energy holes formation in underwater wireless sensor networks (UWSNs threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay.

  20. A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Khan, Anwar; Ahmedy, Ismail; Anisi, Mohammad Hossein; Javaid, Nadeem; Ali, Ihsan; Khan, Nawsher; Alsaqer, Mohammed; Mahmood, Hasan

    2018-01-09

    Interference and energy holes formation in underwater wireless sensor networks (UWSNs) threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM) routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay.

  1. Signal strength based localization and path-loss exponent self-estimation in wireless networks

    NARCIS (Netherlands)

    Hu, Y.

    2017-01-01

    Wireless communications and networking are gradually permeating our life and substantially influencing every corner of this world. Wireless devices, particularly
    those of small size, will take part in this trend more widely, efficiently, seamlessly and smartly. Techniques requiring only limited

  2. Role of the EHD2 unstructured loop in dimerization, protein binding and subcellular localization.

    Directory of Open Access Journals (Sweden)

    Kriti Bahl

    Full Text Available The C-terminal Eps 15 Homology Domain proteins (EHD1-4 play important roles in regulating endocytic trafficking. EHD2 is the only family member whose crystal structure has been solved, and it contains an unstructured loop consisting of two proline-phenylalanine (PF motifs: KPFRKLNPF. In contrast, despite EHD2 having nearly 70% amino acid identity with its paralogs, EHD1, EHD3 and EHD4, the latter proteins contain a single KPF or RPF motif, but no NPF motif. In this study, we sought to define the precise role of each PF motif in EHD2's homo-dimerization, binding with the protein partners, and subcellular localization. To test the role of the NPF motif, we generated an EHD2 NPF-to-NAF mutant to mimic the homologous sequences of EHD1 and EHD3. We demonstrated that this mutant lost both its ability to dimerize and bind to Syndapin2. However, it continued to localize primarily to the cytosolic face of the plasma membrane. On the other hand, EHD2 NPF-to-APA mutants displayed normal dimerization and Syndapin2 binding, but exhibited markedly increased nuclear localization and reduced association with the plasma membrane. We then hypothesized that the single PF motif of EHD1 (that aligns with the KPF of EHD2 might be responsible for both binding and localization functions of EHD1. Indeed, the EHD1 RPF motif was required for dimerization, interaction with MICAL-L1 and Syndapin2, as well as localization to tubular recycling endosomes. Moreover, recycling assays demonstrated that EHD1 RPF-to-APA was incapable of supporting normal receptor recycling. Overall, our data suggest that the EHD2 NPF phenylalanine residue is crucial for EHD2 localization to the plasma membrane, whereas the proline residue is essential for EHD2 dimerization and binding. These studies support the recently proposed model in which the EHD2 N-terminal region may regulate the availability of the unstructured loop for interactions with neighboring EHD2 dimers, thus promoting

  3. The Enhanced Workflow and Efficiency of the Wireless Local Area Network (WLAN)-Based Direct Digital Radiography (DDR) Portable Radiography.

    Science.gov (United States)

    Ngan, Tsz-Lung; Wong, Edward Ting-Hei; Ng, Kris Lap-Shun; Jeor, Patrick Kwok-Shing; Lo, Gladys Goh

    2015-06-01

    With the implementation of the PACS in the hospital, there is an increasing demand from the clinicians for immediate access and display of radiological images. Recently, our hospital has installed the first wireless local area network (WLAN)-based direct digital radiography (DDR) portable radiography system. The DDR portable radiography system allows wireless retrieval of modality worklist and wireless transmission of portable X-ray image on the console to the Picture Archiving and Communication System (PACS), via WLAN connection of wireless fidelity (Wi-Fi). The aim of this study was to analyze the workflow and performance between the WLAN-based DDR portable radiography system and the old practice using conventional portable X-ray machine with computed radiography (CR) system. A total of 190 portable chest X-ray examinations were evaluated and timed, using the conventional portable X-ray machine with CR from March to April of 2012 and using the new DDR portable radiography system on December of 2012 (n = 97 for old system and n = 93 for DDR portable system). The time interval of image becoming available to the PACS using the WLAN-based DDR portable radiography system was significantly shorter than that of the old practice using the conventional portable X-ray machine with CR (6.8 ± 2.6 min for DDR portable system; 23 ± 10.2 min for old system; p DDR portable radiography system can enhance the workflow of portable radiography by reduction of procedural steps.

  4. Radiofrequency Field Distribution Assessment in Indoor Areas Covered by Wireless Local Area Network

    Directory of Open Access Journals (Sweden)

    HELBET, R.

    2009-02-01

    Full Text Available Electromagnetic environment becomes day by day more congested. Radio communication systems in the short range are now part of everyday life, and there is a need to also assess the pollution level due to their emission if we take into account human health and protection. There is consistent scientific evidence that environmental electromagnetic field may cause undesirable biological effects or even health hazards. Present paper aims at giving a view on exposure level due to wireless local area networks (WLAN emission solely, as part of environmental radiofrequency pollution. Highly accurate measurements were made indoor by using a frequency-selective measurement system and identifying the correct settings for an error-minimum assessment. We focused on analysis of the electric flux density distribution inside a room, in the far field of the emitting antennas, in case of a single network communication channel. We analyze the influence the network configuration parameters have on the field level. Distance from the source and traffic rate are also important parameters that affect the exposure level. Our measurements indicate that in the immediate vicinity of the WLAN stations the average field may reach as much as 13% from the present accepted reference levels given in the human exposure standards.

  5. Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wu Haitao

    2009-01-01

    Full Text Available We propose a MAC layer handoff mechanism for IEEE 802.11 Wireless Local Area Networks (WLAN to give benefit to bandwidth-greedy applications at STAs. The proposed mechanism determines an optimal AP with the maximum achievable throughput rather than the best signal condition by estimating the AP's bandwidth with a new on-the-fly measurement method, Transient Frame Capture (TFC, and predicting the actual throughput could be achieved at STAs. Since the TFC is employed based on the promiscuous mode of WLAN NIC, STAs can avoid the service degradation through the current associated AP. In addition, the proposed mechanism is a client-only solution which does not require any modification of network protocol on APs. To evaluate the performance of the proposed mechanism, we develop an analytic model to estimate reliable and accurate bandwidth of the AP and demonstrate through testbed measurement with various experimental study methods. We also validate the fairness of the proposed mechanism through simulation studies.

  6. Localization for robotic capsule looped by axially magnetized permanent-magnet ring based on hybrid strategy

    Science.gov (United States)

    Yang, Wanan; Li, Yan; Qin, Fengqing

    2015-01-01

    To actively maneuver a robotic capsule for interactive diagnosis in the gastrointestinal tract, visualizing accurate position and orientation of the capsule when it moves in the gastrointestinal tract is essential. A possible method that encloses the circuits, batteries, imaging device, etc into the capsule looped by an axially magnetized permanent-magnet ring is proposed. Based on expression of the axially magnetized permanent-magnet ring’s magnetic fields, a localization and orientation model was established. An improved hybrid strategy that combines the advantages of particle-swarm optimization, clone algorithm, and the Levenberg–Marquardt algorithm was found to solve the model. Experiments showed that the hybrid strategy has good accuracy, convergence, and real time performance. PMID:25733935

  7. Closed-Loop Estimation of Retinal Network Sensitivity by Local Empirical Linearization

    Science.gov (United States)

    2018-01-01

    Abstract Understanding how sensory systems process information depends crucially on identifying which features of the stimulus drive the response of sensory neurons, and which ones leave their response invariant. This task is made difficult by the many nonlinearities that shape sensory processing. Here, we present a novel perturbative approach to understand information processing by sensory neurons, where we linearize their collective response locally in stimulus space. We added small perturbations to reference stimuli and tested if they triggered visible changes in the responses, adapting their amplitude according to the previous responses with closed-loop experiments. We developed a local linear model that accurately predicts the sensitivity of the neural responses to these perturbations. Applying this approach to the rat retina, we estimated the optimal performance of a neural decoder and showed that the nonlinear sensitivity of the retina is consistent with an efficient encoding of stimulus information. Our approach can be used to characterize experimentally the sensitivity of neural systems to external stimuli locally, quantify experimentally the capacity of neural networks to encode sensory information, and relate their activity to behavior. PMID:29379871

  8. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  9. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  10. Secure Localization for Wireless Sensor Networks using Range-Independent Methods

    National Research Council Canada - National Science Library

    Lazos, Loukas; Poovendran, Radha

    2006-01-01

    Wireless Sensor Networks (WSNs) are envisioned to be integrated into our everyday lives, enabling a wealth of commercial applications such as environmental and habitat monitoring, disaster relief and emergency rescue operations...

  11. Strong restriction on inflationary vacua from the local gauge invariance III: Infrared regularity of graviton loops

    International Nuclear Information System (INIS)

    Tanaka, Takahiro; Urakawa, Yuko

    2014-01-01

    It has been claimed that the super-Hubble modes of the graviton generated during inflation can make loop corrections diverge. Even if we introduce an infrared (IR) cutoff at a comoving scale as an ad hoc but practical method of regularization, we encounter secular growth, which may lead to the breakdown of perturbative expansion for a sufficiently long-lasting inflation. In this paper, we show that the IR pathology concerning the graviton can be attributed to the presence of residual gauge degrees of freedom in the local observable universe, as in the case of the adiabatic curvature perturbation. We will show that choosing the Euclidean vacuum as the initial state ensures invariance under the above-mentioned residual gauge transformations. We will also show that, as long as we consider a gauge invariant quantity in the local universe, we encounter neither IR divergence nor secular growth. The argument in this paper applies to general single-field models of inflation up to a sufficiently high order in perturbation

  12. Towards improved magnetic fluid hyperthermia: major-loops to diminish variations in local heating.

    Science.gov (United States)

    Munoz-Menendez, Cristina; Serantes, David; Ruso, Juan M; Baldomir, Daniel

    2017-06-07

    In the context of using magnetic nanoparticles for heat-mediated applications, the need of an accurate knowledge of the local (at the nanoparticle level) heat generation in addition to the usually studied global counterpart has been recently highlighted. Such a need requires accurate knowledge of the links among the intrinsic particle properties, system characteristics and experimental conditions. In this work we have investigated the role of the particles' anisotropy polydispersity in relation to the amplitude (H max ) of the AC magnetic field using a Monte Carlo technique. Our results indicate that it is better to use particles with large anisotropy for enhancing global heating, whereas for achieving homogeneous local heating it is better to use lower anisotropy particles. The latter ensures that most of the system undergoes major-loop hysteresis conditions, which is the key-point. This is equivalent to say that low-anisotropy particles (i.e. with less heating capability) may be better for accurate heat-mediated applications, which goes against some research trends in the literature that seek for large anisotropy (and hence heating) values.

  13. A Research of RSSI-AM Localization Algorithm Based on Data Encryption in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wang Wei

    2014-07-01

    Full Text Available In practical application of wireless sensor networks, because of open environment, signal is easy to be attacked and traditional RSSI location technology produces errors. By analyzing the location modal of RSSI, this paper proposes a new encryption modulation algorithm: RSSI-AM, which is unlike most approaches. The location algorithm has the following advantages: simple calculation, strong security, powerful anti-interference ability and no hardware expansion required. Besides, the simulation experiment shows the location precision of ranging method based on RSSI-AM has obvious improvement compared with traditional algorithm. It can be used in the environment of wireless sensor network nodes with low cost and performance of hardware.

  14. The modelling of a digital forensic readiness approach for wireless local area networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2012-06-01

    Full Text Available of cybercrime. WLAN digital forensics is seen as not only a response to cybercrime in wireless networks, but also a means to stem the increase of cybercrime in WLANs. The challenge in WLAN digital forensics is to intercept and preserve all the communications...

  15. Sound source localization using a low-cost wireless sensor network

    NARCIS (Netherlands)

    Leeuwen, van H. (Henk); Salomons, E.L. (Etto); Teeuw, W.B. (Wouter)

    2013-01-01

    In the GoGreen project an intelligent home that is able to identify inhabitants and events that take place is created. The location of sounds that are being produced is an important feature for the context awareness of this system. A a wireless solution that uses low-cost sensor nodes and

  16. Multiple wireless protocol advertising system, enabling automatic access selection and local services

    NARCIS (Netherlands)

    Houben, S.A.; Baken, N.; Herve, P.; Smets, R.

    2006-01-01

    We examined efficiency within wireless access options for mobile devices and discovered that a classic pitfall is revisited. As with the proliferation of services in incumbents’ portfolios, leading to a number of coexisting so-called ‘stove-pipes’, we see an isomorphic phenomenon evolving in

  17. Two-loop operator matrix elements for massive fermionic local twist-2 operators in QED

    International Nuclear Information System (INIS)

    Bluemlein, J.; Freitas, A. de; Universidad Simon Bolivar, Caracas; Neerven, W.L. van

    2011-11-01

    We describe the calculation of the two--loop massive operator matrix elements with massive external fermions in QED. We investigate the factorization of the O(α 2 ) initial state corrections to e + e - annihilation into a virtual boson for large cms energies s >>m 2 e into massive operator matrix elements and the massless Wilson coefficients of the Drell-Yan process adapting the color coefficients to the case of QED, as proposed by F. A. Berends et. al. (Nucl. Phys. B 297 (1988)429). Our calculations show explicitly that the representation proposed there works at one-loop order and up to terms linear in ln (s/m 2 e ) at two-loop order. However, the two-loop constant part contains a few structural terms, which have not been obtained in previous direct calculations. (orig.)

  18. A Localization Method for Underwater Wireless Sensor Networks Based on Mobility Prediction and Particle Swarm Optimization Algorithms

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-02-01

    Full Text Available Due to their special environment, Underwater Wireless Sensor Networks (UWSNs are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO is proposed. In this method, the range-based PSO algorithm is used to locate the beacon nodes, and their velocities can be calculated. The velocity of an unknown node is calculated by using the spatial correlation of underwater object’s mobility, and then their locations can be predicted. The range-based PSO algorithm may cause considerable energy consumption and its computation complexity is a little bit high, nevertheless the number of beacon nodes is relatively smaller, so the calculation for the large number of unknown nodes is succinct, and this method can obviously decrease the energy consumption and time cost of localizing these mobile nodes. The simulation results indicate that this method has higher localization accuracy and better localization coverage rate compared with some other widely used localization methods in this field.

  19. A Localization Method for Underwater Wireless Sensor Networks Based on Mobility Prediction and Particle Swarm Optimization Algorithms.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Jiang, Shengming; Chen, Wei

    2016-02-06

    Due to their special environment, Underwater Wireless Sensor Networks (UWSNs) are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO) is proposed. In this method, the range-based PSO algorithm is used to locate the beacon nodes, and their velocities can be calculated. The velocity of an unknown node is calculated by using the spatial correlation of underwater object's mobility, and then their locations can be predicted. The range-based PSO algorithm may cause considerable energy consumption and its computation complexity is a little bit high, nevertheless the number of beacon nodes is relatively smaller, so the calculation for the large number of unknown nodes is succinct, and this method can obviously decrease the energy consumption and time cost of localizing these mobile nodes. The simulation results indicate that this method has higher localization accuracy and better localization coverage rate compared with some other widely used localization methods in this field.

  20. Improved traveling-wave efficiency in 7T human MRI using passive local loop and dipole arrays.

    Science.gov (United States)

    Yan, Xinqiang; Zhang, Xiaoliang; Gore, John C; Grissom, William A

    2017-06-01

    Traveling-wave MRI, which uses relatively small and simple RF antennae, has robust matching performance and capability for large field-of-view (FOV) imaging. However, the power efficiency of traveling-wave MRI is much lower than conventional methods, which limits its application. One simple approach to improve the power efficiency is to place passive resonators around the subject being imaged. The feasibility of this approach has been demonstrated in previous works using a single small resonant loop. In this work, we aim to explore how much the improvements can be maintained in human imaging using an array design, and whether electric dipoles can be used as local elements. First, a series of electromagnetic (EM) simulations were performed on a human model. Then RF coils were constructed and the simulation results using the best setup for head imaging were validated in MR experiments. By using the passive local loop and transverse dipole arrays, respectively, the transmit efficiency (B 1 + ) of traveling-wave MRI can be improved by 3-fold in the brain and 2-fold in the knee. The types of passive elements (loops or dipoles) should be carefully chosen for brain or knee imaging to maximize the improvement, and the enhancement depends on the local body configuration. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Characterization of subscriber local loop by measures and analysis of frequency and impulse responses

    Science.gov (United States)

    Costa, João C. W. A.; Reis, Jacklyn; Negrão, Igor; Castro, Agostinho; de Souza, Lamartine V.; Ericson, Klas; Lindqvist, Fredrik; Rius I Riu, Jaume

    2006-10-01

    This paper presents methodologies that could be used for characterizing subscriber telephone loops that carry DSL services (ADSL and ADSL2+), by determination and analysis of frequency response, time domain reflectometry, and impulse response of the line. From this analysis, the subscriber loop length, identification and location of impairments such as bridged taps, gauge changes, and open ended termination across the line are carried out. To verify the methodologies presented, results obtained from measurements are drawn and compared to results obtained from computational simulations.

  2. Extending Wireless Broadband Network Architectures with Home Gateways, Localization, and Physical Environment Surveillance

    DEFF Research Database (Denmark)

    Jelling Kristoffersen, Kåre; Kjærgaard, Mikkel Baun; Chen, Jianjun

    2005-01-01

    Adding content is seen as the next important step in the development and deployment of broadband networks. This paper proposes three different ways of adding content to wireless broadband networks. First, the home gateway is presented as the focal point for delivery of digital services to future...... homes. It must bridge across the most prevalent standard protocols for data, video, telephony and telemetry, and must be able to automatically discover new devices in a residence and allow over the air/wire provisioning, billing, management and aggregation of new services from multiple service providers...

  3. Tunable locally-optimal geographical forwarding in wireless sensor networks with sleep-wake cycling nodes

    OpenAIRE

    Naveen, K. P.; Kumar, A.

    2009-01-01

    We consider a wireless sensor network whose main function is to detect certain infrequent alarm events, and to forward alarm packets to a base station, using geographical forwarding. The nodes know their locations, and they sleep-wake cycle, waking up periodically but not synchronously. In this situation, when a node has a packet to forward to the sink, there is a trade-off between how long this node waits for a suitable neighbor to wake up and the progress the packet makes towards the sink o...

  4. The Localized Discovery and Recovery for Query Packet Losses in Wireless Sensor Networks with Distributed Detector Clusters

    Directory of Open Access Journals (Sweden)

    Ryu Miura

    2013-06-01

    Full Text Available An essential application of wireless sensor networks is to successfully respond to user queries. Query packet losses occur in the query dissemination due to wireless communication problems such as interference, multipath fading, packet collisions, etc. The losses of query messages at sensor nodes result in the failure of sensor nodes reporting the requested data. Hence, the reliable and successful dissemination of query messages to sensor nodes is a non-trivial problem. The target of this paper is to enable highly successful query delivery to sensor nodes by localized and energy-efficient discovery, and recovery of query losses. We adopt local and collective cooperation among sensor nodes to increase the success rate of distributed discoveries and recoveries. To enable the scalability in the operations of discoveries and recoveries, we employ a distributed name resolution mechanism at each sensor node to allow sensor nodes to self-detect the correlated queries and query losses, and then efficiently locally respond to the query losses. We prove that the collective discovery of query losses has a high impact on the success of query dissemination and reveal that scalability can be achieved by using the proposed approach. We further study the novel features of the cooperation and competition in the collective recovery at PHY and MAC layers, and show that the appropriate number of detectors can achieve optimal successful recovery rate. We evaluate the proposed approach with both mathematical analyses and computer simulations. The proposed approach enables a high rate of successful delivery of query messages and it results in short route lengths to recover from query losses. The proposed approach is scalable and operates in a fully distributed manner.

  5. Hop-distance relationship analysis with quasi-UDG model for node localization in wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Chen Ping

    2011-01-01

    Full Text Available Abstract In wireless sensor networks (WSNs, location information plays an important role in many fundamental services which includes geographic routing, target tracking, location-based coverage, topology control, and others. One promising approach in sensor network localization is the determination of location based on hop counts. A critical priori of this approach that directly influences the accuracy of location estimation is the hop-distance relationship. However, most of the related works on the hop-distance relationship assume the unit-disk graph (UDG model that is unrealistic in a practical scenario. In this paper, we formulate the hop-distance relationship for quasi-UDG model in WSNs where sensor nodes are randomly and independently deployed in a circular region based on a Poisson point process. Different from the UDG model, quasi-UDG model has the non-uniformity property for connectivity. We derive an approximated recursive expression for the probability of the hop count with a given geographic distance. The border effect and dependence problem are also taken into consideration. Furthermore, we give the expressions describing the distribution of distance with known hop counts for inner nodes and those suffered from the border effect where we discover the insignificance of the border effect. The analytical results are validated by simulations showing the accuracy of the employed approximation. Besides, we demonstrate the localization application of the formulated relationship and show the accuracy improvement in the WSN localization.

  6. Locating Damage Using Integrated Global-Local Approach with Wireless Sensing System and Single-Chip Impedance Measurement Device

    Directory of Open Access Journals (Sweden)

    Tzu-Hsuan Lin

    2014-01-01

    Full Text Available This study developed an integrated global-local approach for locating damage on building structures. A damage detection approach with a novel embedded frequency response function damage index (NEFDI was proposed and embedded in the Imote2.NET-based wireless structural health monitoring (SHM system to locate global damage. Local damage is then identified using an electromechanical impedance- (EMI- based damage detection method. The electromechanical impedance was measured using a single-chip impedance measurement device which has the advantages of small size, low cost, and portability. The feasibility of the proposed damage detection scheme was studied with reference to a numerical example of a six-storey shear plane frame structure and a small-scale experimental steel frame. Numerical and experimental analysis using the integrated global-local SHM approach reveals that, after NEFDI indicates the approximate location of a damaged area, the EMI-based damage detection approach can then identify the detailed damage location in the structure of the building.

  7. Locating damage using integrated global-local approach with wireless sensing system and single-chip impedance measurement device.

    Science.gov (United States)

    Lin, Tzu-Hsuan; Lu, Yung-Chi; Hung, Shih-Lin

    2014-01-01

    This study developed an integrated global-local approach for locating damage on building structures. A damage detection approach with a novel embedded frequency response function damage index (NEFDI) was proposed and embedded in the Imote2.NET-based wireless structural health monitoring (SHM) system to locate global damage. Local damage is then identified using an electromechanical impedance- (EMI-) based damage detection method. The electromechanical impedance was measured using a single-chip impedance measurement device which has the advantages of small size, low cost, and portability. The feasibility of the proposed damage detection scheme was studied with reference to a numerical example of a six-storey shear plane frame structure and a small-scale experimental steel frame. Numerical and experimental analysis using the integrated global-local SHM approach reveals that, after NEFDI indicates the approximate location of a damaged area, the EMI-based damage detection approach can then identify the detailed damage location in the structure of the building.

  8. Toward microstate counting beyond large N in localization and the dual one-loop quantum supergravity

    Science.gov (United States)

    Liu, James T.; Pando Zayas, Leopoldo A.; Rathee, Vimal; Zhao, Wenli

    2018-01-01

    The topologically twisted index for ABJM theory with gauge group U( N) k × U( N)- k has recently been shown, in the large- N limit, to reproduce the BekensteinHawking entropy of certain magnetically charged asymptotically AdS4 black holes. We numerically study the index beyond the large- N limit and provide evidence that it contains a subleading logarithmic term of the form -1 /2 log N. On the holographic side, this term naturally arises from a one-loop computation. However, we find that the contribution coming from the near horizon states does not reproduce the field theory answer. We give some possible reasons for this apparent discrepancy.

  9. Frame-Aggregated Link Adaptation Protocol for Next Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Feng Kai-Ten

    2010-01-01

    Full Text Available The performance of wireless networks is affected by channel conditions. Link Adaptation techniques have been proposed to improve the degraded network performance by adjusting the design parameters, for example, the modulation and coding schemes, in order to adapt to the dynamically changing channel conditions. Furthermore, due to the advancement of the IEEE 802.11n standard, the network goodput can be enhanced with the exploitation of its frame aggregation schemes. However, none of the existing link adaption algorithms are designed to consider the feasible number of aggregated frames that should be utilized for channel-changing environments. In this paper, a frame-aggregated link adaptation (FALA protocol is proposed to dynamically adjust system parameters in order to improve the network goodput under varying channel conditions. For the purpose of maximizing network goodput, both the optimal frame payload size and the modulation and coding schemes are jointly obtained according to the signal-to-noise ratio under specific channel conditions. The performance evaluation is conducted and compared to the existing link adaption protocols via simulations. The simulation results show that the proposed FALA protocol can effectively increase the goodput performance compared to other baseline schemes, especially under dynamically-changing environments.

  10. Wireless digital information transfer : Modelling, prediction and assessment

    NARCIS (Netherlands)

    Lager, I.E.; De Hoop, A.T.; Kikkawa, T.

    2013-01-01

    The loop-to-loop pulsed electromagnetic field wireless signal transfer is investigated with a view on its application in wireless digital information transfer. Closed-form expressions are derived for the emitted magnetic field and for the open-circuit voltage of the receiving loop in dependence on

  11. Localized and Energy-Efficient Topology Control in Wireless Sensor Networks Using Fuzzy-Logic Control Approaches

    Directory of Open Access Journals (Sweden)

    Yuanjiang Huang

    2014-01-01

    Full Text Available The sensor nodes in the Wireless Sensor Networks (WSNs are prone to failures due to many reasons, for example, running out of battery or harsh environment deployment; therefore, the WSNs are expected to be able to maintain network connectivity and tolerate certain amount of node failures. By applying fuzzy-logic approach to control the network topology, this paper aims at improving the network connectivity and fault-tolerant capability in response to node failures, while taking into account that the control approach has to be localized and energy efficient. Two fuzzy controllers are proposed in this paper: one is Learning-based Fuzzy-logic Topology Control (LFTC, of which the fuzzy controller is learnt from a training data set; another one is Rules-based Fuzzy-logic Topology Control (RFTC, of which the fuzzy controller is obtained through designing if-then rules and membership functions. Both LFTC and RFTC do not rely on location information, and they are localized. Comparing them with other three representative algorithms (LTRT, List-based, and NONE through extensive simulations, our two proposed fuzzy controllers have been proved to be very energy efficient to achieve desired node degree and improve the network connectivity when sensor nodes run out of battery or are subject to random attacks.

  12. "Closing the Loop": Overcoming barriers to locally sourcing food in Fort Collins, Colorado

    Science.gov (United States)

    DeMets, C. M.

    2012-12-01

    Environmental sustainability has become a focal point for many communities in recent years, and restaurants are seeking creative ways to become more sustainable. As many chefs realize, sourcing food locally is an important step towards sustainability and towards building a healthy, resilient community. Review of literature on sustainability in restaurants and the local food movement revealed that chefs face many barriers to sourcing their food locally, but that there are also many solutions for overcoming these barriers that chefs are in the early stages of exploring. Therefore, the purpose of this research is to identify barriers to local sourcing and investigate how some restaurants are working to overcome those barriers in the city of Fort Collins, Colorado. To do this, interviews were conducted with four subjects who guide purchasing decisions for restaurants in Fort Collins. Two of these restaurants have created successful solutions and are able to source most of their food locally. The other two are interested in and working towards sourcing locally but have not yet been able to overcome barriers, and therefore only source a few local items. Findings show that there are four barriers and nine solutions commonly identified by each of the subjects. The research found differences between those who source most of their food locally and those who have not made as much progress in local sourcing. Based on these results, two solution flowcharts were created, one for primary barriers and one for secondary barriers, for restaurants to assess where they are in the local food chain and how they can more successfully source food locally. As there are few explicit connections between this research question and climate change, it is important to consider the implicit connections that motivate and justify this research. The question of whether or not greenhouse gas emissions are lower for locally sourced food is a topic of much debate, and while there are major developments

  13. The Indoor Localization and Tracking Estimation Method of Mobile Targets in Three-Dimensional Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zixi Jia

    2015-11-01

    Full Text Available Indoor localization is a significant research area in wireless sensor networks (WSNs. Generally, the nodes of WSNs are deployed in the same plane, i.e., the floor, as the target to be positioned, which causes the sensing signal to be influenced or even blocked by unpredictable obstacles, like furniture. However, a 3D system, like Cricket, can reduce the negative impact of obstacles to the maximum extent and guarantee the sensing signal transmission by using the line of sight (LOS. However, most of the traditional localization methods are not available for the new deployment mode. In this paper, we propose the self-localization of beacons method based on the Cayley–Menger determinant, which can determine the positions of beacons stuck in the ceiling; and differential sensitivity analysis (DSA is also applied to eliminate measurement errors in measurement data fusion. Then, the calibration of beacons scheme is proposed to further refine the locations of beacons by the mobile robot. According to the robot’s motion model based on dead reckoning, which is the process of determining one’s current position, we employ the H ∞ filter and the strong tracking filter (STF to calibrate the rough locations, respectively. Lastly, the optimal node selection scheme based on geometric dilution precision (GDOP is presented here, which is able to pick the group of beacons with the minimum GDOP from all of the beacons. Then, we propose the GDOP-based weighting estimation method (GWEM to associate redundant information with the position of the target. To verify the proposed methods in the paper, we design and conduct a simulation and an experiment in an indoor setting. Compared to EKF and the H ∞ filter, the adopted STF method can more effectively calibrate the locations of beacons; GWEM can provide centimeter-level precision in 3D environments by using the combination of beacons that minimizes GDOP.

  14. Time of Arrival Based on Chirp Pulses as a means to Perform Localization in IEEE 802.15.4a Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    NAUWELAERS, B.

    2010-05-01

    Full Text Available This paper introduces the technology Time of Arrival (TOA based on chirp pulses (according to IEEE 802.15.4a as a means to perform localization in Wireless Sensor Networks (WSN's active at 2.4 GHz. Advantages and disadvantages of the technology are discussed and act as a guideline for improving localization accuracy. Tests concerning TOA are performed by means of the location engine of Nanotron. Adapting this engine leads to improved localization results. It is shown that TOA measurements are susceptible to reflections and dynamic environments.

  15. Access Point Backhaul Resource Aggregation as a Many-to-One Matching Game in Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Kawther Hassine

    2017-01-01

    Full Text Available This paper studies backhaul bandwidth aggregation in the context of a wireless local area network composed of two different types of access points: those with spare backhaul capacity (which we term providers and those in shortage of it (beneficiaries; the aim is to transfer excess capacity from providers to beneficiaries. We model the system as a matching game with many-to-one setting wherein several providers can be matched to one beneficiary and adopt the so-called deferred acceptance algorithm to reach an optimal and stable solution. We consider two flavors, when the beneficiaries are limited in their resource demands and when they are not, and two scenarios, when resources are abundant and when they are scarce. Our results show that the many-to-one setting outperforms the one-to-one case in terms of overall throughput gain, resource usage, and individual beneficiaries satisfaction by up to 50%, whether resources are scarce or abundant. As of the limited versus nonlimited case, the former ensures more fair sharing of spectral resources and higher satisfaction percentage between beneficiaries.

  16. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Chao Ding

    2017-01-01

    Full Text Available Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs, adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  17. A novel cooperative localization algorithm using enhanced particle filter technique in maritime search and rescue wireless sensor network.

    Science.gov (United States)

    Wu, Huafeng; Mei, Xiaojun; Chen, Xinqiang; Li, Junjun; Wang, Jun; Mohapatra, Prasant

    2017-09-29

    Maritime search and rescue (MSR) play a significant role in Safety of Life at Sea (SOLAS). However, it suffers from scenarios that the measurement information is inaccurate due to wave shadow effect when utilizing wireless Sensor Network (WSN) technology in MSR. In this paper, we develop a Novel Cooperative Localization Algorithm (NCLA) in MSR by using an enhanced particle filter method to reduce measurement errors on observation model caused by wave shadow effect. First, we take into account the mobility of nodes at sea to develop a motion model-Lagrangian model. Furthermore, we introduce both state model and observation model to constitute a system model for particle filter (PF). To address the impact of the wave shadow effect on the observation model, we develop an optimal parameter derived by Kullback-Leibler divergence (KLD) to mitigate the error. After the optimal parameter is acquired, an improved likelihood function is presented. Finally, the estimated position is acquired. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  18. OdoCapsule: next-generation wireless capsule endoscopy with accurate lesion localization and video stabilization capabilities.

    Science.gov (United States)

    Karargyris, Alexandros; Koulaouzidis, Anastastios

    2015-01-01

    In this paper, we propose a platform to achieve accurate localization of small-bowel lesions and endoscopic video stabilization in wireless capsule endoscopy. Current research modules rely on the use of external magnetic fields and triangulation methods to calculate the position vector of the capsule, leading to considerable error margins. Our platform, entitled OdoCapsule (a synthesis of the words Odometer and Capsule), provides real-time distance information from the point of duodenal entry to the point of exit from the small bowel. To achieve this, OdoCapsule is equipped with three miniature legs. Each leg carries a soft rubber wheel, which is made with human-compliant material. These legs are extendable and retractable thanks to a micromotor and three custom-made torsion springs. The wheels are specifically designed to function as microodometers: each rotation they perform is registered. Hence, the covered distance is measured accurately in real time. Furthermore, with its legs fully extended, OdoCapsule can stabilize itself inside the small-bowel lumen thus offering smoother video capture and better image processing. Recent ex vivo testing of this concept, using porcine small bowel and a commercially available (custom-modified) capsule endoscope, has proved its viability.

  19. Wormholes no more? Localized Wormhole Detection and Prevention in Wireless Networks

    DEFF Research Database (Denmark)

    Tassos, Dimitriou; Giannetsos, Athanasios

    2010-01-01

    localized and works by looking for simple evidence that no attack is taking place, using only connectivity information as implied by the underlying communication graph, and total absence of coordination. Unlike many existing techniques, it does not use any specialized hardware, making it extremely useful...

  20. A scalable global positioning system-free localization scheme for underwater wireless sensor networks

    KAUST Repository

    Mohammed, A.M.

    2013-05-07

    Seaweb is an acoustic communication technology that enables communication between sensor nodes. Seaweb technology utilizes the commercially available telesonar modems that has developed link and network layer firmware to provide a robust undersea communication capability. Seaweb interconnects the underwater nodes through digital signal processing-based modem by using acoustic links between the neighboring sensors. In this paper, we design and investigate a global positioning system-free passive localization protocol by integrating the innovations of levelling and localization with the Seaweb technology. This protocol uses the range data and planar trigonometry principles to estimate the positions of the underwater sensor nodes. Moreover, for precise localization, we consider more realistic conditions namely, (a) small displacement of sensor nodes due to watch circles and (b) deployment of sensor nodes over non-uniform water surface. Once the nodes are localized, we divide the whole network field into circular levels and sectors to minimize the traffic complexity and thereby increases the lifetime of the sensor nodes in the network field. We then form the mesh network inside each of the sectors that increases the reliability. The algorithm is designed in such a way that it overcomes the ambiguous nodes errata and reflected paths and therefore makes the algorithm more robust. The synthetic network geometries are so designed which can evaluate the algorithm in the presence of perfect or imperfect ranges or in case of incomplete data. A comparative study is made with the existing algorithms which proves the efficiency of our newly proposed algorithm. 2013 Mohammed et al.

  1. A GPS-free passive acoustic localization scheme for underwater wireless sensor networks

    KAUST Repository

    Mirza, Mohammed

    2011-10-01

    Seaweb is an acoustic communication technology that enables communication between sensor nodes. Seaweb interconnects the underwater nodes through digital signal processing (DSP)-based modem by using acoustic links between the neighbouring sensors. In this paper, we design and investigate a global positioning system (GPS)-free passive localization protocol using seaweb technology. This protocol uses the range data and planar trigonometry to estimate the positions of the discovered nodes. We take into consideration the small displacement of sensor nodes due to watch circles and placement of sensor nodes on non-uniform underwater surface, for precise localization. Once the nodes are localized, we divide the whole network .eld into circular levels that minimizes the traf.c complexity and thereby increases the lifetime of the sensor network .eld. We then form the mesh network inside each of the circular levels that increases the reliability. The algorithm is designed in such a way that it overcomes the ambiguous nodes errata and re.ected paths and makes the algorithm more robust. The synthetic network geometries are so designed which can evaluate the algorithm in the presence of perfect or imperfect ranges or in case of incomplete data. A comparative study is made with the existing algorithms which proves our newly proposed algorithm to be more effective. © 2011 IEEE.

  2. Secure Neighbor Discovery in Wireless Sensor Networks Using Range-Free Localization Techniques

    OpenAIRE

    Garcia-Otero, Mariano; Poblacion-Hernandez, Adrian

    2012-01-01

    Si una red inalámbrica de sensores se implementa en un entorno hostil, las limitaciones intrínsecas a los nodos conllevan muchos problemas de seguridad. En este artículo se aborda un ataque particular a los protocolos de localización y descubrimiento de vecinos, llevada a cabo por dos nodos que actúan en connivencia y establecen un "agujero de gusano" para tratar de engañar a un nodo aislado, haciéndole creer que se encuentra en la vecindad de un conjunto de nodos locales. Para contrarrestar ...

  3. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  4. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  5. Adaptive quantization of local field potentials for wireless implants in freely moving animals: an open-source neural recording device

    Science.gov (United States)

    Martinez, Dominique; Clément, Maxime; Messaoudi, Belkacem; Gervasoni, Damien; Litaudon, Philippe; Buonviso, Nathalie

    2018-04-01

    Objective. Modern neuroscience research requires electrophysiological recording of local field potentials (LFPs) in moving animals. Wireless transmission has the advantage of removing the wires between the animal and the recording equipment but is hampered by the large number of data to be sent at a relatively high rate. Approach. To reduce transmission bandwidth, we propose an encoder/decoder scheme based on adaptive non-uniform quantization. Our algorithm uses the current transmitted codeword to adapt the quantization intervals to changing statistics in LFP signals. It is thus backward adaptive and does not require the sending of side information. The computational complexity is low and similar at the encoder and decoder sides. These features allow for real-time signal recovery and facilitate hardware implementation with low-cost commercial microcontrollers. Main results. As proof-of-concept, we developed an open-source neural recording device called NeRD. The NeRD prototype digitally transmits eight channels encoded at 10 kHz with 2 bits per sample. It occupies a volume of 2  ×  2  ×  2 cm3 and weighs 8 g with a small battery allowing for 2 h 40 min of autonomy. The power dissipation is 59.4 mW for a communication range of 8 m and transmission losses below 0.1%. The small weight and low power consumption offer the possibility of mounting the entire device on the head of a rodent without resorting to a separate head-stage and battery backpack. The NeRD prototype is validated in recording LFPs in freely moving rats at 2 bits per sample while maintaining an acceptable signal-to-noise ratio (>30 dB) over a range of noisy channels. Significance. Adaptive quantization in neural implants allows for lower transmission bandwidths while retaining high signal fidelity and preserving fundamental frequencies in LFPs.

  6. EMULACIÓN DE ESCENARIOS VIRTUALES, EN UNA SDWLAN (SOFTWARE DEFINED WIRELESS LOCAL AREA NETWORK, DE UN CAMPUS UNIVERSITARIO

    Directory of Open Access Journals (Sweden)

    Gerlyn Duarte

    2015-07-01

    Full Text Available Las redes definidas por software (SDN = Software Defined Network es una arquitectura de red emergente que se destaca como una tecnología capaz de ofrecer un control más flexible y dinámico a la hora de gestionar el diseño y funciones de la red, donde se separan los planos de control y enrutamiento. Esto permite la centralización de los controles de la red basada en software. Se puede decir que es posible tener flexibilidad y rapidez al momento de configurar, implementar y administrar diferentes protocolos personalizados para los requerimientos de distintas redes. Actualmente, en una red convencional, cada conmutador y/o enrutador tienen software propietario que le dice qué hacer. SDN se centra principalmente en la parte cableada de la red de datos. Sin embargo, todas las ventajas de las SDN sólo se obtienen si se logra abarcar la totalidad de la infraestructura, desde el centro de datos al extremo de la red, permitiendo extender todos los beneficios de SDN hasta la red inalámbrica, para conseguir a su vez una red inalámbrica de área local definida por software (SDWLAN = Software Define Wireless Local Area Network. Es por ello que en el presente trabajo, se emuló parte de una SDWLAN de un campus universitario para observar la factibilidad de implementar SDN en la misma. Para la emulación se utilizó una variante del emulador Mininet que permite trabajar con redes inalámbricas. De igual forma, se efectuaron mediciones del ancho de banda de las SDWLAN emuladas, así como la interconectividad entre ellas. Se evidenció la facilidad y el rendimiento de trabajar con las herramientas de emulación de SDWLAN empleadas, permitiendo de igual forma la estructuración de distintas topologías de SDWLAN. Se comprobó que el emulador, el cual está aún en la fase beta, permite interactuar y ejecutar cualquier proceso como si se ejecutara directamente en un equipo con GNU/Linux de forma eficaz.

  7. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  8. An Improved Approach for RSSI-Based only Calibration-Free Real-Time Indoor Localization on IEEE 802.11 and 802.15.4 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Marco Passafiume

    2017-03-01

    Full Text Available Assuming a reliable and responsive spatial contextualization service is a must-have in IEEE 802.11 and 802.15.4 wireless networks, a suitable approach consists of the implementation of localization capabilities, as an additional application layer to the communication protocol stack. Considering the applicative scenario where satellite-based positioning applications are denied, such as indoor environments, and excluding data packet arrivals time measurements due to lack of time resolution, received signal strength indicator (RSSI measurements, obtained according to IEEE 802.11 and 802.15.4 data access technologies, are the unique data sources suitable for indoor geo-referencing using COTS devices. In the existing literature, many RSSI based localization systems are introduced and experimentally validated, nevertheless they require periodic calibrations and significant information fusion from different sensors that dramatically decrease overall systems reliability and their effective availability. This motivates the work presented in this paper, which introduces an approach for an RSSI-based calibration-free and real-time indoor localization. While switched-beam array-based hardware (compliant with IEEE 802.15.4 router functionality has already been presented by the author, the focus of this paper is the creation of an algorithmic layer for use with the pre-existing hardware capable to enable full localization and data contextualization over a standard 802.15.4 wireless sensor network using only RSSI information without the need of lengthy offline calibration phase. System validation reports the localization results in a typical indoor site, where the system has shown high accuracy, leading to a sub-metrical overall mean error and an almost 100% site coverage within 1 m localization error.

  9. An Improved Approach for RSSI-Based only Calibration-Free Real-Time Indoor Localization on IEEE 802.11 and 802.15.4 Wireless Networks.

    Science.gov (United States)

    Passafiume, Marco; Maddio, Stefano; Cidronali, Alessandro

    2017-03-29

    Assuming a reliable and responsive spatial contextualization service is a must-have in IEEE 802.11 and 802.15.4 wireless networks, a suitable approach consists of the implementation of localization capabilities, as an additional application layer to the communication protocol stack. Considering the applicative scenario where satellite-based positioning applications are denied, such as indoor environments, and excluding data packet arrivals time measurements due to lack of time resolution, received signal strength indicator (RSSI) measurements, obtained according to IEEE 802.11 and 802.15.4 data access technologies, are the unique data sources suitable for indoor geo-referencing using COTS devices. In the existing literature, many RSSI based localization systems are introduced and experimentally validated, nevertheless they require periodic calibrations and significant information fusion from different sensors that dramatically decrease overall systems reliability and their effective availability. This motivates the work presented in this paper, which introduces an approach for an RSSI-based calibration-free and real-time indoor localization. While switched-beam array-based hardware (compliant with IEEE 802.15.4 router functionality) has already been presented by the author, the focus of this paper is the creation of an algorithmic layer for use with the pre-existing hardware capable to enable full localization and data contextualization over a standard 802.15.4 wireless sensor network using only RSSI information without the need of lengthy offline calibration phase. System validation reports the localization results in a typical indoor site, where the system has shown high accuracy, leading to a sub-metrical overall mean error and an almost 100% site coverage within 1 m localization error.

  10. A Forensic Readiness Model for Wireless Networks

    OpenAIRE

    Ngobeni, Sipho; Venter, Hein; Burke, Ivan

    2010-01-01

    International audience; Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environme...

  11. Capacity Limit, Link Scheduling and Power Control in Wireless Networks

    Science.gov (United States)

    Zhou, Shan

    2013-01-01

    The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…

  12. Method for collecting thermocouple data via secured shell over a wireless local area network in real time.

    Science.gov (United States)

    Arnold, F; DeMallie, I; Florence, L; Kashinski, D O

    2015-03-01

    This manuscript addresses the design, hardware details, construction, and programming of an apparatus allowing an experimenter to monitor and record high-temperature thermocouple measurements of dynamic systems in real time. The apparatus uses wireless network technology to bridge the gap between a dynamic (moving) sample frame and the static laboratory frame. Our design is a custom solution applied to samples that rotate through large angular displacements where hard-wired and typical slip-ring solutions are not practical because of noise considerations. The apparatus consists of a Raspberry PI mini-Linux computer, an Arduino micro-controller, an Ocean Controls thermocouple multiplexer shield, and k-type thermocouples.

  13. Method for collecting thermocouple data via secured shell over a wireless local area network in real time

    Science.gov (United States)

    Arnold, F.; DeMallie, I.; Florence, L.; Kashinski, D. O.

    2015-03-01

    This manuscript addresses the design, hardware details, construction, and programming of an apparatus allowing an experimenter to monitor and record high-temperature thermocouple measurements of dynamic systems in real time. The apparatus uses wireless network technology to bridge the gap between a dynamic (moving) sample frame and the static laboratory frame. Our design is a custom solution applied to samples that rotate through large angular displacements where hard-wired and typical slip-ring solutions are not practical because of noise considerations. The apparatus consists of a Raspberry PI mini-Linux computer, an Arduino micro-controller, an Ocean Controls thermocouple multiplexer shield, and k-type thermocouples.

  14. Neural network-based multiuser detection for SDMA-OFDM system over IEEE 802.11n indoor wireless local area network channel models

    Science.gov (United States)

    Praveen Bagadi, Kala; Das, Susmita

    2013-10-01

    Space division multiple access - orthogonal frequency division multiplexing-based wireless communication has the potential to offer high-spectral efficiency, system performance and capacity. This article proposes an efficient blind multiuser detection (MUD) scheme using artificial neural network models such as the radial basis function. The proposed MUD technique is consistently outperforming the existing minimum mean square error and minimum bit error rate (MBER) MUDs with the performance close to the optimal maximum likelihood (ML) detector. Besides that, the computational complexity of the proposed one is comparatively lower than both the MBER and ML detectors. Further, it can also outperform MBER MUD in the overload scenario, where the number of users is more than that of the number of receiving antennas simulation-based study showing BER performance and complexity are carried out to prove the efficiency of the proposed techniques. This analysis is carried through the IEEE 802.11n standard channel models, which are designed for indoor wireless local area network applications of bandwidth up to 100 MHz at frequencies 2 and 5 GHz.

  15. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  16. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  17. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  18. Roles of the Protruding Loop of Factor B Essential for the Localization of Lipoproteins (LolB) in the Anchoring of Bacterial Triacylated Proteins to the Outer Membrane*

    Science.gov (United States)

    Hayashi, Yumi; Tsurumizu, Ryoji; Tsukahara, Jun; Takeda, Kazuki; Narita, Shin-ichiro; Mori, Makiko; Miki, Kunio; Tokuda, Hajime

    2014-01-01

    The Lol system comprising five Lol proteins, LolA through LolE, sorts Escherichia coli lipoproteins to outer membranes. The LolCDE complex, an ATP binding cassette transporter in inner membranes, releases outer membrane-specific lipoproteins in an ATP-dependent manner, causing formation of the LolA-lipoprotein complex in the periplasm. LolA transports lipoproteins through the periplasm to LolB on outer membranes. LolB is itself a lipoprotein anchored to outer membranes, although the membrane anchor is functionally dispensable. LolB then localizes lipoproteins to outer membranes through largely unknown mechanisms. The crystal structure of LolB is similar to that of LolA, and it possesses a hydrophobic cavity that accommodates acyl chains of lipoproteins. To elucidate the molecular function of LolB, a periplasmic version of LolB, mLolB, was mutagenized at various conserved residues. Despite the lack of acyl chains, most defective mutants were insoluble. However, a derivative with glutamate in place of leucine 68 was soluble and unable to localize lipoproteins to outer membranes. This leucine is present in a loop protruding from mLolB into an aqueous environment, and no analogous loop is present in LolA. Thus, leucine 68 was replaced with other residues. Replacement by acidic, but not hydrophobic, residues generated for the first time mLolB derivatives that can accept but cannot localize lipoproteins to outer membranes. Moreover, deletion of the leucine with neighboring residues impaired the lipoprotein receptor activity. Based on these observations, the roles of the protruding loop of LolB in the last step of lipoprotein sorting are discussed. PMID:24569999

  19. Roles of the protruding loop of factor B essential for the localization of lipoproteins (LolB) in the anchoring of bacterial triacylated proteins to the outer membrane.

    Science.gov (United States)

    Hayashi, Yumi; Tsurumizu, Ryoji; Tsukahara, Jun; Takeda, Kazuki; Narita, Shin-ichiro; Mori, Makiko; Miki, Kunio; Tokuda, Hajime

    2014-04-11

    The Lol system comprising five Lol proteins, LolA through LolE, sorts Escherichia coli lipoproteins to outer membranes. The LolCDE complex, an ATP binding cassette transporter in inner membranes, releases outer membrane-specific lipoproteins in an ATP-dependent manner, causing formation of the LolA-lipoprotein complex in the periplasm. LolA transports lipoproteins through the periplasm to LolB on outer membranes. LolB is itself a lipoprotein anchored to outer membranes, although the membrane anchor is functionally dispensable. LolB then localizes lipoproteins to outer membranes through largely unknown mechanisms. The crystal structure of LolB is similar to that of LolA, and it possesses a hydrophobic cavity that accommodates acyl chains of lipoproteins. To elucidate the molecular function of LolB, a periplasmic version of LolB, mLolB, was mutagenized at various conserved residues. Despite the lack of acyl chains, most defective mutants were insoluble. However, a derivative with glutamate in place of leucine 68 was soluble and unable to localize lipoproteins to outer membranes. This leucine is present in a loop protruding from mLolB into an aqueous environment, and no analogous loop is present in LolA. Thus, leucine 68 was replaced with other residues. Replacement by acidic, but not hydrophobic, residues generated for the first time mLolB derivatives that can accept but cannot localize lipoproteins to outer membranes. Moreover, deletion of the leucine with neighboring residues impaired the lipoprotein receptor activity. Based on these observations, the roles of the protruding loop of LolB in the last step of lipoprotein sorting are discussed.

  20. Superhelicity Constrains a Localized and R-Loop-Dependent Formation of G-Quadruplexes at the Upstream Region of Transcription.

    Science.gov (United States)

    Zheng, Ke-Wei; He, Yi-de; Liu, Hong-He; Li, Xin-Min; Hao, Yu-Hua; Tan, Zheng

    2017-10-20

    Transcription induces formation of intramolecular G-quadruplex structures at the upstream region of a DNA duplex by an upward transmission of negative supercoiling through the DNA. Currently the regulation of such G-quadruplex formation remains unclear. Using plasmid as a model, we demonstrate that while it is the dynamic negative supercoiling generated by a moving RNA polymerase that triggers a formation of a G-quadruplex, the constitutional superhelicity determines the potential and range of the formation of a G-quadruplex by constraining the propagation of the negative supercoiling. G-quadruplex formation is maximal in negatively supercoiled and nearly abolished in relaxed plasmids while being moderate in nicked and linear ones. The formation of a G-quadruplex strongly correlates with the presence of an R-loop. Preventing R-loop formation virtually abolished G-quadruplex formation even in the negatively supercoiled plasmid. Enzymatic action and protein binding that manipulate supercoiling or its propagation all impact the formation of G-quadruplexes. Because chromosomes and plasmids in cells in their natural form are maintained in a supercoiled state, our findings reveal a physical basis that justifies the formation and regulation of G-quadruplexes in vivo. The structural features involved in G-quadruplex formation may all serve as potential targets in clinical and therapeutic applications.

  1. Detailed modeling of local anisotropy and transverse Ku interplay regarding hysteresis loop in FeCuNbSiB nanocrystalline ribbons

    Science.gov (United States)

    Geoffroy, Olivier; Boust, Nicolas; Chazal, Hervé; Flury, Sébastien; Roudet, James

    2018-04-01

    This article focuses on the modeling of the hysteresis loop featured by Fe-Cu-Nb-Si-B nanocrystalline alloys with transverse induced anisotropy. The magnetization reversal process of a magnetic correlated volume (CV), characterized by the induced anisotropy Ku, and a deviation of the local easy magnetization direction featuring the effect of a local incoherent anisotropy Ki, is analyzed, taking account of magnetostatic interactions. Solving the equations shows that considering a unique typical kind of CV does not enable accounting for both the domain pattern and the coercivity. Actually, the classical majority CVs obeying the random anisotropy model explains well the domain pattern but considering another kind of CVs, minority, mingled with classical ones, featuring a magnitude of Ki comparable to Ku, is necessary to account for coercivity. The model has been successfully compared with experimental data.

  2. Wireless Structural Sensing for Health Monitoring and Control Applications

    Science.gov (United States)

    Lynch, J. P.

    2003-12-01

    The economic and societal impact of civil structures under-performing during large earthquakes can be significant. While in recent years the structural engineering community has made great strides in advancing knowledge of structural behavior under extreme loads, a need still exists for the rapid assessment of structural performance during seismic events. Numerous options are commercially available to facility owners who wish to install a structural monitoring system within their structures. However, these structural monitoring systems are defined by their use of coaxial cables for the transfer of response measurements from sensors to centralized data servers. The installation and maintenance of cables within a civil structure often drive system costs high thereby preventing widespread industry adoption. In response to these limitations, the integration of information technologies such as wireless communications and microcontrollers have been explored for the creation of alternative structural monitoring systems defined by low installation costs and decentralized computational frameworks. In particular, a novel wireless structural monitoring system assembled from a dense network of inexpensive wireless sensing units has been designed and fabricated. The wireless sensing unit architecture consists of three functional components: a data acquisition interface for the collection of data from attached sensors, a computational core for data interrogation, and a wireless communication channel for the transfer of data to the sensor network. The use of wireless modems drastically reduces the efforts and costs of system installations rendering the technology attractive for widespread adoption in a broad class of civil structures. A second innovation of the system is the inclusion of computational power within each wireless sensing unit allowing for local execution of embedded engineering analyses. In particular, analyses for the detection of damage in structures (structural

  3. Local momentum space and two-loop renormalizability of λφ 4 field theory in curved space-time

    Science.gov (United States)

    Bunch, T. S.

    1981-07-01

    A generalization is given of some previous work in which a momentum space representation for the Feynman propagator,G(x, y), of a scalar field in an arbitrary curved space-time was obtained. The pointsx andy are allowed to vary in a normal neighborhood of an arbitrary fixed pointz which is taken as an origin of normal coordinates and the representation is obtained by Fourier transformation in the coordinate differencex α-y α. The generality of this representation enables it to be applied to the evaluation of the divergences in any Feynman graph. As an example, the third-order (two-loop) corrections to the four-point function of λø4 field theory are shown to be renormalizable in curved space-time.

  4. Energy-efficient digital and wireless IC design for wireless smart sensing

    Science.gov (United States)

    Zhou, Jun; Huang, Xiongchuan; Wang, Chao; Tae-Hyoung Kim, Tony; Lian, Yong

    2017-10-01

    Wireless smart sensing is now widely used in various applications such as health monitoring and structural monitoring. In conventional wireless sensor nodes, significant power is consumed in wirelessly transmitting the raw data. Smart sensing adds local intelligence to the sensor node and reduces the amount of wireless data transmission via on-node digital signal processing. While the total power consumption is reduced compared to conventional wireless sensing, the power consumption of the digital processing becomes as dominant as wireless data transmission. This paper reviews the state-of-the-art energy-efficient digital and wireless IC design techniques for reducing the power consumption of the wireless smart sensor node to prolong battery life and enable self-powered applications.

  5. Adaptive Wavelet Coding Applied in a Wireless Control System

    Science.gov (United States)

    Gama, Felipe O. S.; O. Salazar, Andrés

    2017-01-01

    Wireless control systems can sense, control and act on the information exchanged between the wireless sensor nodes in a control loop. However, the exchanged information becomes susceptible to the degenerative effects produced by the multipath propagation. In order to minimize the destructive effects characteristic of wireless channels, several techniques have been investigated recently. Among them, wavelet coding is a good alternative for wireless communications for its robustness to the effects of multipath and its low computational complexity. This work proposes an adaptive wavelet coding whose parameters of code rate and signal constellation can vary according to the fading level and evaluates the use of this transmission system in a control loop implemented by wireless sensor nodes. The performance of the adaptive system was evaluated in terms of bit error rate (BER) versus Eb/N0 and spectral efficiency, considering a time-varying channel with flat Rayleigh fading, and in terms of processing overhead on a control system with wireless communication. The results obtained through computational simulations and experimental tests show performance gains obtained by insertion of the adaptive wavelet coding in a control loop with nodes interconnected by wireless link. These results enable the use of this technique in a wireless link control loop. PMID:29236048

  6. Adaptive Wavelet Coding Applied in a Wireless Control System

    Directory of Open Access Journals (Sweden)

    Felipe O. S. Gama

    2017-12-01

    Full Text Available Wireless control systems can sense, control and act on the information exchanged between the wireless sensor nodes in a control loop. However, the exchanged information becomes susceptible to the degenerative effects produced by the multipath propagation. In order to minimize the destructive effects characteristic of wireless channels, several techniques have been investigated recently. Among them, wavelet coding is a good alternative for wireless communications for its robustness to the effects of multipath and its low computational complexity. This work proposes an adaptive wavelet coding whose parameters of code rate and signal constellation can vary according to the fading level and evaluates the use of this transmission system in a control loop implemented by wireless sensor nodes. The performance of the adaptive system was evaluated in terms of bit error rate (BER versus E b / N 0 and spectral efficiency, considering a time-varying channel with flat Rayleigh fading, and in terms of processing overhead on a control system with wireless communication. The results obtained through computational simulations and experimental tests show performance gains obtained by insertion of the adaptive wavelet coding in a control loop with nodes interconnected by wireless link. These results enable the use of this technique in a wireless link control loop.

  7. 60-GHz CMOS phase-locked loops

    CERN Document Server

    Cheema, Hammad M; van Roermund, Arthur HM

    2010-01-01

    The promising high data rate wireless applications at millimeter wave frequencies in general and 60 GHz in particular have gained much attention in recent years. However, challenges related to circuit, layout and measurements during mm-wave CMOS IC design have to be overcome before they can become viable for mass market. ""60-GHz CMOS Phase-Locked Loops"" focusing on phase-locked loops for 60 GHz wireless transceivers elaborates these challenges and proposes solutions for them. The system level design to circuit level implementation of the complete PLL, along with separate implementations of i

  8. Local feedback loop of ghrelin-GH in the pig ovary: action on estradiol secretion, aromatase activity and cell apoptosis.

    Science.gov (United States)

    Rak, Agnieszka; Gregoraszczuk, Ewa Łucja

    2008-06-01

    Ghrelin is recognized as an important regulator of growth hormone (GH) secretion, food intake and a factor which controls reproduction. In the present studies, the effect of GH and insulin-like growth factor (IGF-I) on ghrelin synthesis and secretion and the effects of ghrelin on GH synthesis and secretion in cultured whole porcine follicles were studied. Ghrelin and GH levels were measured in the follicular wall and in the culture medium. Moreover, the action of combined treatment with ghrelin and GH on estradiol secretion, aromatase activity and cell apoptosis were examined. We demonstrated that ghrelin increased GH secretion but not GH synthesis by ovarian follicles. GH stimulated both ghrelin synthesis and secretion in the ovarian follicles. The increase in estradiol secretion, aromatase activity and the decrease in caspase-3 activity were noted in ghrelin alone- and ghrelin in combination with GH-treated cells. In culture treated with combination of both these hormones, all investigated parameters were similar to those noted in ghrelin alone-treated cells. In conclusion, our study provides novel evidence for the gonadal feedback loop between GH and ghrelin secretion in the ovary. However, results of the presented research suggest independent action of GH and ghrelin in the ovary.

  9. Efficient DV-HOP Localization for Wireless Cyber-Physical Social Sensing System: A Correntropy-Based Neural Network Learning Scheme

    Directory of Open Access Journals (Sweden)

    Yang Xu

    2017-01-01

    Full Text Available Integrating wireless sensor network (WSN into the emerging computing paradigm, e.g., cyber-physical social sensing (CPSS, has witnessed a growing interest, and WSN can serve as a social network while receiving more attention from the social computing research field. Then, the localization of sensor nodes has become an essential requirement for many applications over WSN. Meanwhile, the localization information of unknown nodes has strongly affected the performance of WSN. The received signal strength indication (RSSI as a typical range-based algorithm for positioning sensor nodes in WSN could achieve accurate location with hardware saving, but is sensitive to environmental noises. Moreover, the original distance vector hop (DV-HOP as an important range-free localization algorithm is simple, inexpensive and not related to the environment factors, but performs poorly when lacking anchor nodes. Motivated by these, various improved DV-HOP schemes with RSSI have been introduced, and we present a new neural network (NN-based node localization scheme, named RHOP-ELM-RCC, through the use of DV-HOP, RSSI and a regularized correntropy criterion (RCC-based extreme learning machine (ELM algorithm (ELM-RCC. Firstly, the proposed scheme employs both RSSI and DV-HOP to evaluate the distances between nodes to enhance the accuracy of distance estimation at a reasonable cost. Then, with the help of ELM featured with a fast learning speed with a good generalization performance and minimal human intervention, a single hidden layer feedforward network (SLFN on the basis of ELM-RCC is used to implement the optimization task for obtaining the location of unknown nodes. Since the RSSI may be influenced by the environmental noises and may bring estimation error, the RCC instead of the mean square error (MSE estimation, which is sensitive to noises, is exploited in ELM. Hence, it may make the estimation more robust against outliers. Additionally, the least square

  10. Efficient DV-HOP Localization for Wireless Cyber-Physical Social Sensing System: A Correntropy-Based Neural Network Learning Scheme.

    Science.gov (United States)

    Xu, Yang; Luo, Xiong; Wang, Weiping; Zhao, Wenbing

    2017-01-12

    Integrating wireless sensor network (WSN) into the emerging computing paradigm, e.g., cyber-physical social sensing (CPSS), has witnessed a growing interest, and WSN can serve as a social network while receiving more attention from the social computing research field. Then, the localization of sensor nodes has become an essential requirement for many applications over WSN. Meanwhile, the localization information of unknown nodes has strongly affected the performance of WSN. The received signal strength indication (RSSI) as a typical range-based algorithm for positioning sensor nodes in WSN could achieve accurate location with hardware saving, but is sensitive to environmental noises. Moreover, the original distance vector hop (DV-HOP) as an important range-free localization algorithm is simple, inexpensive and not related to the environment factors, but performs poorly when lacking anchor nodes. Motivated by these, various improved DV-HOP schemes with RSSI have been introduced, and we present a new neural network (NN)-based node localization scheme, named RHOP-ELM-RCC, through the use of DV-HOP, RSSI and a regularized correntropy criterion (RCC)-based extreme learning machine (ELM) algorithm (ELM-RCC). Firstly, the proposed scheme employs both RSSI and DV-HOP to evaluate the distances between nodes to enhance the accuracy of distance estimation at a reasonable cost. Then, with the help of ELM featured with a fast learning speed with a good generalization performance and minimal human intervention, a single hidden layer feedforward network (SLFN) on the basis of ELM-RCC is used to implement the optimization task for obtaining the location of unknown nodes. Since the RSSI may be influenced by the environmental noises and may bring estimation error, the RCC instead of the mean square error (MSE) estimation, which is sensitive to noises, is exploited in ELM. Hence, it may make the estimation more robust against outliers. Additionally, the least square estimation (LSE

  11. An Improved Compressive Sensing and Received Signal Strength-Based Target Localization Algorithm with Unknown Target Population for Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Jun Yan

    2017-05-01

    Full Text Available In this paper a two-phase compressive sensing (CS and received signal strength (RSS-based target localization approach is proposed to improve position accuracy by dealing with the unknown target population and the effect of grid dimensions on position error. In the coarse localization phase, by formulating target localization as a sparse signal recovery problem, grids with recovery vector components greater than a threshold are chosen as the candidate target grids. In the fine localization phase, by partitioning each candidate grid, the target position in a grid is iteratively refined by using the minimum residual error rule and the least-squares technique. When all the candidate target grids are iteratively partitioned and the measurement matrix is updated, the recovery vector is re-estimated. Threshold-based detection is employed again to determine the target grids and hence the target population. As a consequence, both the target population and the position estimation accuracy can be significantly improved. Simulation results demonstrate that the proposed approach achieves the best accuracy among all the algorithms compared.

  12. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  13. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  14. Use of Local Intelligence to Reduce Energy Consumption of Wireless Sensor Nodes in Elderly Health Monitoring Systems

    Directory of Open Access Journals (Sweden)

    Thomas J. Lampoltshammer

    2014-03-01

    Full Text Available The percentage of elderly people in European countries is increasing. Such conjuncture affects socio-economic structures and creates demands for resourceful solutions, such as Ambient Assisted Living (AAL, which is a possible methodology to foster health care for elderly people. In this context, sensor-based devices play a leading role in surveying, e.g., health conditions of elderly people, to alert care personnel in case of an incident. However, the adoption of such devices strongly depends on the comfort of wearing the devices. In most cases, the bottleneck is the battery lifetime, which impacts the effectiveness of the system. In this paper we propose an approach to reduce the energy consumption of sensors’ by use of local sensors’ intelligence. By increasing the intelligence of the sensor node, a substantial decrease in the necessary communication payload can be achieved. The results show a significant potential to preserve energy and decrease the actual size of the sensor device units.

  15. Use of Local Intelligence to Reduce Energy Consumption of Wireless Sensor Nodes in Elderly Health Monitoring Systems

    Science.gov (United States)

    Lampoltshammer, Thomas J.; de Freitas, Edison Pignaton; Nowotny, Thomas; Plank, Stefan; da Costa, João Paulo Carvalho Lustosa; Larsson, Tony; Heistracher, Thomas

    2014-01-01

    The percentage of elderly people in European countries is increasing. Such conjuncture affects socio-economic structures and creates demands for resourceful solutions, such as Ambient Assisted Living (AAL), which is a possible methodology to foster health care for elderly people. In this context, sensor-based devices play a leading role in surveying, e.g., health conditions of elderly people, to alert care personnel in case of an incident. However, the adoption of such devices strongly depends on the comfort of wearing the devices. In most cases, the bottleneck is the battery lifetime, which impacts the effectiveness of the system. In this paper we propose an approach to reduce the energy consumption of sensors' by use of local sensors' intelligence. By increasing the intelligence of the sensor node, a substantial decrease in the necessary communication payload can be achieved. The results show a significant potential to preserve energy and decrease the actual size of the sensor device units. PMID:24618777

  16. A Way Out of the Bubble Trouble?—Upon Reconstructing the Origin of the Local Bubble and Loop I via Radioisotopic Signatures on Earth

    Science.gov (United States)

    Schulreich, Michael; Breitschwerdt, Dieter; Feige, Jenny; Dettbarn, Christian

    2018-02-01

    Deep-sea archives all over the world show an enhanced concentration of the radionuclide $^{60}$Fe, isolated in layers dating from about 2.2 Myr ago. Since this comparatively long-lived isotope is not naturally produced on Earth, such an enhancement can only be attributed to extraterrestrial sources, particularly one or several nearby supernovae in the recent past. It has been speculated that these supernovae might have been involved in the formation of the Local Superbubble, our Galactic habitat. Here, we summarize our efforts in giving a quantitative evidence for this scenario. Besides analytical calculations, we present results from high-resolution hydrodynamical simulations of the Local Superbubble and its presumptive neighbor Loop I in different environments, including a self-consistently evolved supernova-driven interstellar medium. For the superbubble modeling, the time sequence and locations of the generating core-collapse supernova explosions are taken into account, which are derived from the mass spectrum of the perished members of certain, carefully preselected stellar moving groups. The release and turbulent mixing of $^{60}$Fe is followed via passive scalars, where the yields of the decaying radioisotope were adjusted according to recent stellar evolution calculations. The models are able to reproduce both the timing and the intensity of the $^{60}$Fe excess observed with rather high precision. We close with a discussion of recent developments and give future perspectives.

  17. A Way Out of the Bubble Trouble?—Upon Reconstructing the Origin of the Local Bubble and Loop I via Radioisotopic Signatures on Earth

    Directory of Open Access Journals (Sweden)

    Michael Mathias Schulreich

    2018-02-01

    Full Text Available Deep-sea archives all over the world show an enhanced concentration of the radionuclide 60Fe, isolated in layers dating from about 2.2 Myr ago. Since this comparatively long-lived isotope is not naturally produced on Earth, such an enhancement can only be attributed to extraterrestrial sources, particularly one or several nearby supernovae in the recent past. It has been speculated that these supernovae might have been involved in the formation of the Local Superbubble, our Galactic habitat. Here, we summarize our efforts in giving a quantitative evidence for this scenario. Besides analytical calculations, we present results from high-resolution hydrodynamical simulations of the Local Superbubble and its presumptive neighbor Loop I in different environments, including a self-consistently evolved supernova-driven interstellar medium. For the superbubble modeling, the time sequence and locations of the generating core-collapse supernova explosions are taken into account, which are derived from the mass spectrum of the perished members of certain, carefully preselected stellar moving groups. The release and turbulent mixing of 60Fe is followed via passive scalars, where the yields of the decaying radioisotope were adjusted according to recent stellar evolution calculations. The models are able to reproduce both the timing and the intensity of the 60Fe excess observed with rather high precision. We close with a discussion of recent developments and give future perspectives.

  18. An IQ mismatch calibration and compensation technique for wideband wireless transceivers

    International Nuclear Information System (INIS)

    Peng Jin; Zhou Liguo; Yao Heng; Yuan Fang; Shi Yin; Fang Zhi

    2014-01-01

    An IQ mismatch calibration and compensation technique based on the digital baseband for wideband wireless communication transmitters is proposed. The digital baseband transmits the signal used for IQ mismatch calibration. The signal passes through the RF transmitter path, the calibration loop (which is composed of a square power detector and a band-pass filter in the RF transceiver) and the variable gain amplifier of the receiver. The digital baseband samples the signal for IQ mismatch estimation and compensates for it. Compared with the self-calibration technique in the RF chip, the proposed technique saves area and power consumption for the wireless local area network solution. This technique has been successfully used for the 802.11n system and satisfies the requirement of the standard by achieving over 50 dB image suppression. (semiconductor integrated circuits)

  19. An IQ mismatch calibration and compensation technique for wideband wireless transceivers

    Science.gov (United States)

    Jin, Peng; Liguo, Zhou; Heng, Yao; Fang, Yuan; Zhi, Fang; Yin, Shi

    2014-08-01

    An IQ mismatch calibration and compensation technique based on the digital baseband for wideband wireless communication transmitters is proposed. The digital baseband transmits the signal used for IQ mismatch calibration. The signal passes through the RF transmitter path, the calibration loop (which is composed of a square power detector and a band-pass filter in the RF transceiver) and the variable gain amplifier of the receiver. The digital baseband samples the signal for IQ mismatch estimation and compensates for it. Compared with the self-calibration technique in the RF chip, the proposed technique saves area and power consumption for the wireless local area network solution. This technique has been successfully used for the 802.11n system and satisfies the requirement of the standard by achieving over 50 dB image suppression.

  20. Closed-Loop Feedback Computation Model of Dynamical Reputation Based on the Local Trust Evaluation in Business-to-Consumer E-Commerce

    Directory of Open Access Journals (Sweden)

    Bo Tian

    2016-02-01

    Full Text Available Trust and reputation are important factors that influence the success of both traditional transactions in physical social networks and modern e-commerce in virtual Internet environments. It is difficult to define the concept of trust and quantify it because trust has both subjective and objective characteristics at the same time. A well-reported issue with reputation management system in business-to-consumer (BtoC e-commerce is the “all good reputation” problem. In order to deal with the confusion, a new computational model of reputation is proposed in this paper. The ratings of each customer are set as basic trust score events. In addition, the time series of massive ratings are aggregated to formulate the sellers’ local temporal trust scores by Beta distribution. A logical model of trust and reputation is established based on the analysis of the dynamical relationship between trust and reputation. As for single goods with repeat transactions, an iterative mathematical model of trust and reputation is established with a closed-loop feedback mechanism. Numerical experiments on repeated transactions recorded over a period of 24 months are performed. The experimental results show that the proposed method plays guiding roles for both theoretical research into trust and reputation and the practical design of reputation systems in BtoC e-commerce.

  1. An Analysis of Electromagnetic Interference (EMI) of Ultra Wideband(UWB) and IEEE 802.11A Wireless Local Area Network (WLAN) Employing Orthogonal Frequency Division Multiplexing (OFDM)

    Science.gov (United States)

    2004-03-01

    be monitored with an electronic monitoring device that records the ambient temperature periodically. The data is collected and logged daily...Fi) Networking Handbook, McGraw-Hill: NY, 2003. [Sal02]. M.P. Salud , Investigation of RF Emissions from Wireless Networks as a Threat to Avionic

  2. Loop-to-loop coupling.

    Energy Technology Data Exchange (ETDEWEB)

    Warne, Larry Kevin; Lucero, Larry Martin; Langston, William L.; Salazar, Robert Austin; Coleman, Phillip Dale; Basilio, Lorena I.; Bacon, Larry Donald

    2012-05-01

    This report estimates inductively-coupled energy to a low-impedance load in a loop-to-loop arrangement. Both analytical models and full-wave numerical simulations are used and the resulting fields, coupled powers and energies are compared. The energies are simply estimated from the coupled powers through approximations to the energy theorem. The transmitter loop is taken to be either a circular geometry or a rectangular-loop (stripline-type) geometry that was used in an experimental setup. Simple magnetic field models are constructed and used to estimate the mutual inductance to the receiving loop, which is taken to be circular with one or several turns. Circuit elements are estimated and used to determine the coupled current and power (an equivalent antenna picture is also given). These results are compared to an electromagnetic simulation of the transmitter geometry. Simple approximate relations are also given to estimate coupled energy from the power. The effect of additional loads in the form of attached leads, forming transmission lines, are considered. The results are summarized in a set of susceptibility-type curves. Finally, we also consider drives to the cables themselves and the resulting common-to-differential mode currents in the load.

  3. Near-field wireless sensing of single and multiple open-ended micro coils

    Directory of Open Access Journals (Sweden)

    A. Yousaf

    2013-05-01

    Full Text Available In this work we present near-field wireless sensing of single and multiple open-ended micro coils using an electrically small loop antenna. Wirelessly characterized parameters of open-ended micro coils include its resonance frequency, quality factor and inductance. Moreover a wireless frequency-dependent analytical model was developed. Micro coil inductance was extracted from the wirelessly measured signal using a constraint-based least-squares approach. Wireless measurements and analytical fit of micro coils are in strong agreement which validates the analytical model. Finite element method (FEM simulations of the coupled system were done in COMSOL Multiphysics.

  4. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  5. Design and implementation of the wireless high voltage control system

    International Nuclear Information System (INIS)

    Srivastava, Saurabh; Misra, A.; Pandey, H.K.; Thakur, S.K.; Pandit, V.S.

    2011-01-01

    In this paper we will describe the implementation of the wireless link for controlling and monitoring the serial data between control PC and the interface card (general DAQ card), by replacing existing RS232 based remote control system for controlling and monitoring High Voltage Power Supply (120kV/50mA). The enhancement in the reliability is achieved by replacing old RS232 based control system with wireless system by isolating ground loop. (author)

  6. Real-time stress monitoring of highway bridges with a secured wireless sensor network.

    Science.gov (United States)

    2011-12-01

    "This collaborative research aims to develop a real-time stress monitoring system for highway bridges with a secured wireless sensor network. The near term goal is to collect wireless sensor data under different traffic patterns from local highway br...

  7. Downlink interference suppression of 802.11ac wireless network

    Directory of Open Access Journals (Sweden)

    WANG Huan

    2016-04-01

    Full Text Available In the 802.11ac wireless local area network,wireless intelligent devices(WID need to be connected to the network through the wireless access point(AP,and other wireless APs in the downlink transmission process will cause interference to the target WID.In this paper,we propose a method based on iterative minimum mean square error interference alignment,which can suppress the interference from the other wireless APs to the target WIDs.The wireless access terminal and wireless smart devices have designed linear precode and decode respectively.Under the minimum mean square error criterion and limitation the power constraint,optimal precode and decode can be received.Simulation results show that the proposed method,when the signal to noise ratio is 5 dB,the transmission rate of the unit bandwidth transmission rate is increased by 1 bit/s compared with the traditional Max-SINR algorithm.

  8. A Wireless Sensor Enabled by Wireless Power

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-01-01

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network. PMID:23443370

  9. A Wireless Sensor Enabled by Wireless Power

    Directory of Open Access Journals (Sweden)

    Da-Sheng Lee

    2012-11-01

    Full Text Available Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  10. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  11. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-01-01

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level....

  12. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Many wireless technologies are already available for sensor applications. It is inevitable that many non-interoperable wireless technologies between 400 MHz and 5.8...

  13. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  14. Application for Measurement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Miroslav MAHDAL

    2009-06-01

    Full Text Available This paper deals with wireless sensor networks, which are based on IEEE 802.15.4 standard. The development kit from Jennic company was used for wireless measuring of values and for creation of sensor network. For this purposes the sensor boards with wireless modules with marking JN5139 were used. These boards provide sensors (sensor of temperature, relative humidity and light sensor but also another interface, which helps to develop applications. Modules are programmed in Integrated Development Environment (IDE, which integrates C function library and C++ compiler and linker. The visualization application was created for monitoring of wireless sensor network. There is the possibility of local and wireless measurement. For creation of this application the SCADA/HMI system, Control Web 5 was used. This SCADA/HMI system enables to communicate with all wireless modules through base station (network's coordinator. The application also enables initialisation and network setting the any wireless module communicating with the base station. The advantage is the remote configuration and control of network. The application also enables the gathering, converting, viewing and archiving of incoming data from particular modules.

  15. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  16. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  17. The art of wireless sensor networks

    CERN Document Server

    2014-01-01

    During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.   “The Art of Wireless Sensor Networks: Volume 1: Fundamentals” focuses on the fundamentals concepts in the design, analysis, and implementation of wireless sensor networks. It covers the various layers of the lifecycle of this type of network from the physical layer up to the application layer. Its rationale is that the first volume covers contemporary design issues, tools, and protocols for radio-based two-dimensional terrestrial sensor networks. All the book chapters in this volume include up-to-date research work spanning various classic facets of the physical properties and functional behavior of wireless sensor networks, including physical layer, medium access control, data routing, topology management, mobility management, localization, task management, data management, data gathering, security, middleware, sensor technology, standards, and ...

  18. The Role of Wireless Computing Technology in the Design of Schools.

    Science.gov (United States)

    Nair, Prakash

    This document discusses integrating computers logically and affordably into a school building's infrastructure through the use of wireless technology. It begins by discussing why wireless networks using mobile computers are preferable to desktop machines in each classoom. It then explains the features of a wireless local area network (WLAN) and…

  19. Drexel Goes Wireless: Leading U.S. University Creates Fully Wireless Cyber Campus

    OpenAIRE

    Blackney, Ken; Bielec, John

    2001-01-01

    In 1997 Drexel began implementing its first CyberZone -- an area of continuous wireless network connectivity. Begun as a pilot project in the central library, CyberZones quickly proved to be both popular and practical. In 2000 Drexel became the first major university to implement a campus-wide, high-speed wireless network for all indoor and outdoor areas, including public spaces such as local train platforms and nearby cafes and restaurants. This presentation describes the technical, politica...

  20. Alternative loop rings

    CERN Document Server

    Goodaire, EG; Polcino Milies, C

    1996-01-01

    For the past ten years, alternative loop rings have intrigued mathematicians from a wide cross-section of modern algebra. As a consequence, the theory of alternative loop rings has grown tremendously. One of the main developments is the complete characterization of loops which have an alternative but not associative, loop ring. Furthermore, there is a very close relationship between the algebraic structures of loop rings and of group rings over 2-groups. Another major topic of research is the study of the unit loop of the integral loop ring. Here the interaction between loop rings and group ri

  1. Loop quantization as a continuum limit

    International Nuclear Information System (INIS)

    Manrique, Elisa; Oeckl, Robert; Weber, Axel; Zapata, Jose A

    2006-01-01

    We present an implementation of Wilson's renormalization group and a continuum limit tailored for loop quantization. The dynamics of loop-quantized theories is constructed as a continuum limit of the dynamics of effective theories. After presenting the general formalism we show as a first explicit example the 2D Ising field theory, an interacting relativistic quantum field theory with local degrees of freedom quantized by loop quantization techniques

  2. A prospective clinical study to evaluate the safety and performance of wireless localization of nonpalpable breast lesions using radiofrequency identification technology.

    Science.gov (United States)

    Dauphine, Christine; Reicher, Joshua J; Reicher, Murray A; Gondusky, Christina; Khalkhali, Iraj; Kim, Michelle

    2015-06-01

    The purpose of this study was to evaluate the safety and performance of localizing nonpalpable breast lesions using radiofrequency identification technology. Twenty consecutive women requiring preoperative localization of a breast lesion were recruited. Subjects underwent placement of both a hook wire and a radiofrequency identification tag immediately before surgery. The radiofrequency identification tag was the primary method used by the operating surgeon to localize each lesion during excision, with the hook wire serving as backup in case of tag migration or failed localization. Successful localization with removal of the intended lesion was the primary outcome measured. Tag migration and postoperative infection were also noted to assess safety. Twenty patients underwent placement of a radiofrequency identification tag, 12 under ultrasound guidance and eight with stereotactic guidance. In all cases, the radiofrequency identification tag was successfully localized by the reader at the level of the skin before incision, and the intended lesion was removed along with the radiofrequency identification tag. There were no localization failures and no postoperative infections. Tag migration did not occur before incision, but in three cases, occurred as the lesion was being retracted with fingers to make the final cut along the deep surface of the specimen. In this initial clinical study, radiofrequency tags were safe and able to successfully localize nonpalpable breast lesions. Radiofrequency identification technology may represent an alternative method to hook wire localization.

  3. Wireless physical layer security

    OpenAIRE

    Poor, H. Vincent; Schaefer, Rafael F.

    2016-01-01

    Security is a very important issue in the design and use of wireless networks. Traditional methods of providing security in such networks are impractical for some emerging types of wireless networks due to the light computational abilities of some wireless devices [such as radio-frequency identification (RFID) tags, certain sensors, etc.] or to the very large scale or loose organizational structure of some networks. Physical layer security has the potential to address these concerns by taking...

  4. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  5. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  6. SmartMIMO: An Energy-Aware Adaptive MIMO-OFDM Radio Link Control for Next-Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Dehaene Wim

    2007-01-01

    Full Text Available Multiantenna systems and more particularly those operating on multiple input and multiple output (MIMO channels are currently a must to improve wireless links spectrum efficiency and/or robustness. There exists a fundamental tradeoff between potential spectrum efficiency and robustness increase. However, multiantenna techniques also come with an overhead in silicon implementation area and power consumption due, at least, to the duplication of part of the transmitter and receiver radio front-ends. Although the area overhead may be acceptable in view of the performance improvement, low power consumption must be preserved for integration in nomadic devices. In this case, it is the tradeoff between performance (e.g., the net throughput on top of the medium access control layer and average power consumption that really matters. It has been shown that adaptive schemes were mandatory to avoid that multiantenna techniques hamper this system tradeoff. In this paper, we derive smartMIMO: an adaptive multiantenna approach which, next to simply adapting the modulation and code rate as traditionally considered, decides packet-per-packet, depending on the MIMO channel state, to use either space-division multiplexing (increasing spectrum efficiency, space-time coding (increasing robustness, or to stick to single-antenna transmission. Contrarily to many of such adaptive schemes, the focus is set on using multiantenna transmission to improve the link energy efficiency in real operation conditions. Based on a model calibrated on an existing reconfigurable multiantenna transceiver setup, the link energy efficiency with the proposed scheme is shown to be improved by up to 30% when compared to nonadaptive schemes. The average throughput is, on the other hand, improved by up to 50% when compared to single-antenna transmission.

  7. SmartMIMO: An Energy-Aware Adaptive MIMO-OFDM Radio Link Control for Next-Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wim Dehaene

    2007-12-01

    Full Text Available Multiantenna systems and more particularly those operating on multiple input and multiple output (MIMO channels are currently a must to improve wireless links spectrum efficiency and/or robustness. There exists a fundamental tradeoff between potential spectrum efficiency and robustness increase. However, multiantenna techniques also come with an overhead in silicon implementation area and power consumption due, at least, to the duplication of part of the transmitter and receiver radio front-ends. Although the area overhead may be acceptable in view of the performance improvement, low power consumption must be preserved for integration in nomadic devices. In this case, it is the tradeoff between performance (e.g., the net throughput on top of the medium access control layer and average power consumption that really matters. It has been shown that adaptive schemes were mandatory to avoid that multiantenna techniques hamper this system tradeoff. In this paper, we derive smartMIMO: an adaptive multiantenna approach which, next to simply adapting the modulation and code rate as traditionally considered, decides packet-per-packet, depending on the MIMO channel state, to use either space-division multiplexing (increasing spectrum efficiency, space-time coding (increasing robustness, or to stick to single-antenna transmission. Contrarily to many of such adaptive schemes, the focus is set on using multiantenna transmission to improve the link energy efficiency in real operation conditions. Based on a model calibrated on an existing reconfigurable multiantenna transceiver setup, the link energy efficiency with the proposed scheme is shown to be improved by up to 30% when compared to nonadaptive schemes. The average throughput is, on the other hand, improved by up to 50% when compared to single-antenna transmission.

  8. Software Defined RF Transceiver for Wireless Sensor Network Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The concept of a smart device capable of communicating and making its own local decisions for wireless sensing, monitoring control, data acquisition, tracking, and...

  9. Software Defined RF Transceiver for Wireless Sensor Network, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The concept of a smart device capable of communicating and making its own local decisions for wireless sensing, monitoring control, data acquisition, tracking, and...

  10. Voice and Video Capacity of a Secure Wireless System

    National Research Council Canada - National Science Library

    Seyba, Jason R

    2007-01-01

    .... The effects of securing the voice signal, real-time traffic originating foreign to a wireless local area network and use of an audio-only signal compared with a combined signal were all studied...

  11. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  12. Strong transcription blockage mediated by R-loop formation within a G-rich homopurine-homopyrimidine sequence localized in the vicinity of the promoter.

    Science.gov (United States)

    Belotserkovskii, Boris P; Soo Shin, Jane Hae; Hanawalt, Philip C

    2017-06-20

    Guanine-rich (G-rich) homopurine-homopyrimidine nucleotide sequences can block transcription with an efficiency that depends upon their orientation, composition and length, as well as the presence of negative supercoiling or breaks in the non-template DNA strand. We report that a G-rich sequence in the non-template strand reduces the yield of T7 RNA polymerase transcription by more than an order of magnitude when positioned close (9 bp) to the promoter, in comparison to that for a distal (∼250 bp) location of the same sequence. This transcription blockage is much less pronounced for a C-rich sequence, and is not significant for an A-rich sequence. Remarkably, the blockage is not pronounced if transcription is performed in the presence of RNase H, which specifically digests the RNA strands within RNA-DNA hybrids. The blockage also becomes less pronounced upon reduced RNA polymerase concentration. Based upon these observations and those from control experiments, we conclude that the blockage is primarily due to the formation of stable RNA-DNA hybrids (R-loops), which inhibit successive rounds of transcription. Our results could be relevant to transcription dynamics in vivo (e.g. transcription 'bursting') and may also have practical implications for the design of expression vectors. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  13. Loop Transfer Matrix and Loop Quantum Mechanics

    International Nuclear Information System (INIS)

    Savvidy, George K.

    2000-01-01

    The gonihedric model of random surfaces on a 3d Euclidean lattice has equivalent representation in terms of transfer matrix K(Q i ,Q f ), which describes the propagation of loops Q. We extend the previous construction of the loop transfer matrix to the case of nonzero self-intersection coupling constant κ. We introduce the loop generalization of Fourier transformation which allows to diagonalize transfer matrices, that depend on symmetric difference of loops only and express all eigenvalues of 3d loop transfer matrix through the correlation functions of the corresponding 2d statistical system. The loop Fourier transformation allows to carry out the analogy with quantum mechanics of point particles, to introduce conjugate loop momentum P and to define loop quantum mechanics. We also consider transfer matrix on 4d lattice which describes propagation of memebranes. This transfer matrix can also be diagonalized by using the generalized Fourier transformation, and all its eigenvalues are equal to the correlation functions of the corresponding 3d statistical system. In particular the free energy of the 4d membrane system is equal to the free energy of 3d gonihedric system of loops and is equal to the free energy of 2d Ising model. (author)

  14. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  15. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  16. Applicable approach of the wireless technology for Korean nuclear power plants

    International Nuclear Information System (INIS)

    Ko, Do Young; Lee, Soo Ill

    2013-01-01

    Highlights: • To apply wireless technology for Korean NPPs, several stipulations are proposed. • WLAN is proposed as the most appropriate wireless technology for Korean NPPs. • WLAN can be applied to the specific fields except in the control system. • An attitude survey on wireless showed that 94.7% agree with the necessity of wireless. - Abstract: Recently, many nuclear power plants (NPPs) over the world use various types of wireless systems for the advantages. Unfortunately, wireless technologies are not currently installed in any Korean NPPs because it is difficult to solve the negative impact of unexpected outcomes or failures from the influence of the wireless technologies, which is electromagnetic interference and radio-frequency interference (EMI/RFI). Moreover, a lack of desire on the part of Korean nuclear industry to implement it leads to give up benefit from the wireless technologies. To install the wireless technologies with maximum benefit and minimum risk, a systematic approach, which quantify the negative impact and prevent the influence, is essential; therefore, this paper describes an applicable research result on the wireless technology for Korean NPPs based on regulatory guides and current wireless hardware and software technologies. Also, survey on the needs for the wireless technology for Korean nuclear power plants was conducted, because the level of awareness of workers in NPPs regarding wireless technologies is very important issue. In this paper, we propose an applicable system to enhance the applicability for the wireless technology for Korean NPPs. The result based on proposed applicable system shows that wireless local area network (WLAN) is the representative candidate for Korean NPPs, which can be applied to the specific fields of radiation monitoring, voice and data communication, component monitoring and instrumentation, and wireless cameras

  17. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  18. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  19. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  20. Optical and wireless technologies

    CERN Document Server

    Tiwari, Manish; Singh, Ghanshyam; Minzioni, Paolo

    2018-01-01

    This book presents selected papers from 1st International Conference on Optical and Wireless Technologies, providing insights into the analytical, experimental, and developmental aspects of systems, techniques, and devices in these spheres. It explores the combined use of various optical and wireless technologies in next-generation networking applications, and discusses the latest developments in applications such as photonics, high-speed communication systems and networks, visible light communication, nanophotonics, and wireless and multiple-input-multiple-output (MIMO) systems. The book will serve as a valuable reference resource for academics and researchers across the globe.

  1. Wireless capsule endoscopy

    Science.gov (United States)

    Iddan, Gavriel; Meron, Gavriel; Glukhovsky, Arkady; Swain, Paul

    2000-05-01

    We have developed a new type of endoscopy, which for the first time allows painless endoscopic imaging of the whole of the small bowel. This procedure involves a wireless capsule endoscope and we describe here its successful testing in humans.

  2. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  3. Spatial ordering of nano-dislocation loops in ion-irradiated materials

    Energy Technology Data Exchange (ETDEWEB)

    Dudarev, S.L., E-mail: sergei.dudarev@ccfe.ac.uk [EURATOM/CCFE Fusion Association, Culham Centre for Fusion Energy, Oxfordshire OX14 3DB (United Kingdom); Arakawa, K. [Department of Materials Science, Faculty of Science and Engineering, Shimane University, 1060 Nishikawatsu, Matsue 690-8504 (Japan); Yi, X. [EURATOM/CCFE Fusion Association, Culham Centre for Fusion Energy, Oxfordshire OX14 3DB (United Kingdom); Department of Materials, University of Oxford, Parks Road, Oxford OX1 3PH (United Kingdom); Yao, Z. [Department of Mechanical and Materials Engineering, Queen’s University, Nicol Hall, 60 Union Street, Kingston K7L 3N6, Ontario (Canada); Jenkins, M.L. [Department of Materials, University of Oxford, Parks Road, Oxford OX1 3PH (United Kingdom); Gilbert, M.R. [EURATOM/CCFE Fusion Association, Culham Centre for Fusion Energy, Oxfordshire OX14 3DB (United Kingdom); Derlet, P.M. [Condensed Matter Theory Group, Paul Scherrer Institut, CH-5232 Villigen PSI (Switzerland)

    2014-12-15

    Defect microstructures formed in ion-irradiated metals, for example iron or tungsten, often exhibit patterns of spatially ordered nano-scale dislocation loops. We show that such ordered dislocation loop structures may form spontaneously as a result of Brownian motion of loops, biased by the angular-dependent elastic interaction between the loops. Patterns of spatially ordered loops form once the local density of loops produced by ion irradiation exceeds a critical threshold value.

  4. Wireless radio a history

    CERN Document Server

    Coe, Lewis

    2006-01-01

    ""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.

  5. Wireless Networks Security

    OpenAIRE

    Jenko, Marko

    2016-01-01

    In this thesis we deal with security, penetration testing and different types of attacks on wireless networks. We theoretically familiarize with the field of wireless networks, security mechanisms and the most used security standards. Then we systematically overview the field of penetration testing. We divide the penetration testing on types and different methodologies. We explain the tasks of the provider and the subscriber in penetration testing. Description of the process of conducting the...

  6. Linux-Based Access Point Dalam Wireless LAN

    OpenAIRE

    Witono, Timotius

    2006-01-01

    Technology 802.11 which more known as WiFi, have started to become the cablereplacement technology especially in local network so-called Wireless LAN. Mostly Wireless LAN use the Infrastructure topology, which require uses of one or more Access Points as the communication center of Mobile Stations. Existence of a high quality Access Point is an important factor to determine the quality of Wireless LAN performance. Besides using Access Point that made in factory, Access Point can be custom-bui...

  7. Convergence of wireless, wireline, and photonics next generation networks

    CERN Document Server

    Iniewski, Krzysztof

    2010-01-01

    Filled with illustrations and practical examples from industry, this book provides a brief but comprehensive introduction to the next-generation wireless networks that will soon replace more traditional wired technologies. Written by a mixture of top industrial experts and key academic professors, it is the only book available that covers both wireless networks (such as wireless local area and personal area networks) and optical networks (such as long-haul and metropolitan networks) in one volume. It gives engineers and engineering students the necessary knowledge to meet challenges of next-ge

  8. Anticipating WPS PIN Vulnerability to Secure Wireless Network

    Directory of Open Access Journals (Sweden)

    Indra Dwi Rianto

    2013-12-01

    Full Text Available WiFi Protected Setup (WPS is a standardized function supported by numerous vendors of wireless routers and access point to help set up connection to a wireless local area network. It is designed to simplify the set up and generally enabled by default. Due to design flaw, the WPS or QSS PIN is susceptible to a brute forceattack. In this paper, we test the security vulnerability occurred, evaluate the performance and give recommendations to anticipate the attack.

  9. Renormalization of loop functions for all loops

    International Nuclear Information System (INIS)

    Brandt, R.A.; Neri, F.; Sato, M.

    1981-01-01

    It is shown that the vacuum expectation values W(C 1 ,xxx, C/sub n/) of products of the traces of the path-ordered phase factors P exp[igcontour-integral/sub C/iA/sub μ/(x)dx/sup μ/] are multiplicatively renormalizable in all orders of perturbation theory. Here A/sub μ/(x) are the vector gauge field matrices in the non-Abelian gauge theory with gauge group U(N) or SU(N), and C/sub i/ are loops (closed paths). When the loops are smooth (i.e., differentiable) and simple (i.e., non-self-intersecting), it has been shown that the generally divergent loop functions W become finite functions W when expressed in terms of the renormalized coupling constant and multiplied by the factors e/sup -K/L(C/sub i/), where K is linearly divergent and L(C/sub i/) is the length of C/sub i/. It is proved here that the loop functions remain multiplicatively renormalizable even if the curves have any finite number of cusps (points of nondifferentiability) or cross points (points of self-intersection). If C/sub γ/ is a loop which is smooth and simple except for a single cusp of angle γ, then W/sub R/(C/sub γ/) = Z(γ)W(C/sub γ/) is finite for a suitable renormalization factor Z(γ) which depends on γ but on no other characteristic of C/sub γ/. This statement is made precise by introducing a regularization, or via a loop-integrand subtraction scheme specified by a normalization condition W/sub R/(C-bar/sub γ/) = 1 for an arbitrary but fixed loop C-bar/sub γ/. Next, if C/sub β/ is a loop which is smooth and simple except for a cross point of angles β, then W(C/sub β/) must be renormalized together with the loop functions of associated sets S/sup i//sub β/ = ]C/sup i/ 1 ,xxx, C/sup i//sub p/i] (i = 2,xxx,I) of loops C/sup i//sub q/ which coincide with certain parts of C/sub β/equivalentC 1 1 . Then W/sub R/(S/sup i//sub β/) = Z/sup i/j(β)W(S/sup j//sub β/) is finite for a suitable matrix Z/sup i/j

  10. Unidirectional wireless power transfer using near-field plates

    Energy Technology Data Exchange (ETDEWEB)

    Imani, Mohammadreza F., E-mail: mohamad.imani@gmail.com [Center for Metamaterials and Integrated Plasmonics, Department of Electrical and Computer Engineering, Duke University, Durham, North Carolina 27708 (United States); Grbic, Anthony [Radiation Laboratory, Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, Michigan 48109 (United States)

    2015-05-14

    One of the obstacles preventing wireless power transfer from becoming ubiquitous is their leakage of power: high-amplitude electromagnetic fields that can interfere with other electronic devices, increase health concerns, or hinder power metering. In this paper, we present near-field plates (NFPs) as a novel method to tailor the electromagnetic fields generated by a wireless power transfer system while maintaining high efficiency. NFPs are modulated arrays or surfaces designed to form prescribed near-field patterns. The NFP proposed in this paper consists of an array of loaded loops that are designed to confine the electromagnetic fields of a resonant transmitting loop to the desired direction (receiving loop) while suppressing fields in other directions. The step-by-step design procedure for this device is outlined. Two NFPs are designed and examined in full-wave simulation. Their performance is shown to be in close agreement with the design predictions, thereby verifying the proposed design and operation. A NFP is also fabricated and experimentally shown to form a unidirectional wireless power transfer link with high efficiency.

  11. Quantum Kinematics of Bosonic Vortex Loops

    International Nuclear Information System (INIS)

    Goldin, G.A.; Owczarek, R.; Sharp, D.H.

    1999-01-01

    Poisson structure for vortex filaments (loops and arcs) in 2D ideal incompressible fluid is analyzed in detail. Canonical coordinates and momenta on coadjoint orbits of the area-preserving diffeomorphism group, associated with such vortices, are found. The quantum space of states in the simplest case of ''bosonic'' vortex loops is built within a geometric quantization approach to the description of a quantum fluid. Fock-like structure and non-local creation and annihilation operators of quantum vortex filaments are introduced

  12. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  13. Coherently Enhanced Wireless Power Transfer

    Science.gov (United States)

    Krasnok, Alex; Baranov, Denis G.; Generalov, Andrey; Li, Sergey; Alù, Andrea

    2018-04-01

    Extraction of electromagnetic energy by an antenna from impinging external radiation is at the basis of wireless communications and wireless power transfer (WPT). The maximum of transferred energy is ensured when the antenna is conjugately matched, i.e., when it is resonant and it has an equal coupling with free space and its load. This condition, however, can be easily affected by changes in the environment, preventing optimal operation of a WPT system. Here, we introduce the concept of coherently enhanced WPT that allows us to bypass this difficulty and achieve dynamic control of power transfer. The approach relies on coherent excitation of the waveguide connected to the antenna load with a backward propagating signal of specific amplitude and phase. This signal creates a suitable interference pattern at the load resulting in a modification of the local wave impedance, which in turn enables conjugate matching and a largely increased amount of extracted energy. We develop a simple theoretical model describing this concept, demonstrate it with full-wave numerical simulations for the canonical example of a dipole antenna, and verify experimentally in both near-field and far-field regimes.

  14. Reactor building indoor wireless network channel quality estimation using RSSI measurement of wireless sensor network

    International Nuclear Information System (INIS)

    Merat, S.

    2008-01-01

    Expanding wireless communication network reception inside reactor buildings (RB) and service wings (SW) has always been a technical challenge for operations service team. This is driven by the volume of metal equipment inside the Reactor Buildings (RB) that blocks and somehow shields the signal throughout the link. In this study, to improve wireless reception inside the Reactor Building (RB), an experimental model using indoor localization mesh based on IEEE 802.15 is developed to implement a wireless sensor network. This experimental model estimates the distance between different nodes by measuring the RSSI (Received Signal Strength Indicator). Then by using triangulation and RSSI measurement, the validity of the estimation techniques is verified to simulate the physical environmental obstacles, which block the signal transmission. (author)

  15. Wireless distributed functional electrical stimulation system.

    Science.gov (United States)

    Jovičić, Nenad S; Saranovac, Lazar V; Popović, Dejan B

    2012-08-09

    The control of movement in humans is hierarchical and distributed and uses feedback. An assistive system could be best integrated into the therapy of a human with a central nervous system lesion if the system is controlled in a similar manner. Here, we present a novel wireless architecture and routing protocol for a distributed functional electrical stimulation system that enables control of movement. The new system comprises a set of miniature battery-powered devices with stimulating and sensing functionality mounted on the body of the subject. The devices communicate wirelessly with one coordinator device, which is connected to a host computer. The control algorithm runs on the computer in open- or closed-loop form. A prototype of the system was designed using commercial, off-the-shelf components. The propagation characteristics of electromagnetic waves and the distributed nature of the system were considered during the development of a two-hop routing protocol, which was implemented in the prototype's software. The outcomes of this research include a novel system architecture and routing protocol and a functional prototype based on commercial, off-the-shelf components. A proof-of-concept study was performed on a hemiplegic subject with paresis of the right arm. The subject was tasked with generating a fully functional palmar grasp (closing of the fingers). One node was used to provide this movement, while a second node controlled the activation of extensor muscles to eliminate undesired wrist flexion. The system was tested with the open- and closed-loop control algorithms. The system fulfilled technical and application requirements. The novel communication protocol enabled reliable real-time use of the system in both closed- and open-loop forms. The testing on a patient showed that the multi-node system could operate effectively to generate functional movement.

  16. Wireless distributed functional electrical stimulation system

    Directory of Open Access Journals (Sweden)

    Jovičić Nenad S

    2012-08-01

    Full Text Available Abstract Background The control of movement in humans is hierarchical and distributed and uses feedback. An assistive system could be best integrated into the therapy of a human with a central nervous system lesion if the system is controlled in a similar manner. Here, we present a novel wireless architecture and routing protocol for a distributed functional electrical stimulation system that enables control of movement. Methods The new system comprises a set of miniature battery-powered devices with stimulating and sensing functionality mounted on the body of the subject. The devices communicate wirelessly with one coordinator device, which is connected to a host computer. The control algorithm runs on the computer in open- or closed-loop form. A prototype of the system was designed using commercial, off-the-shelf components. The propagation characteristics of electromagnetic waves and the distributed nature of the system were considered during the development of a two-hop routing protocol, which was implemented in the prototype’s software. Results The outcomes of this research include a novel system architecture and routing protocol and a functional prototype based on commercial, off-the-shelf components. A proof-of-concept study was performed on a hemiplegic subject with paresis of the right arm. The subject was tasked with generating a fully functional palmar grasp (closing of the fingers. One node was used to provide this movement, while a second node controlled the activation of extensor muscles to eliminate undesired wrist flexion. The system was tested with the open- and closed-loop control algorithms. Conclusions The system fulfilled technical and application requirements. The novel communication protocol enabled reliable real-time use of the system in both closed- and open-loop forms. The testing on a patient showed that the multi-node system could operate effectively to generate functional movement.

  17. The market for wireless electricity: The case of India

    International Nuclear Information System (INIS)

    Kumar, Ashish; Shankar, Ravi; Momaya, Kiran; Gupte, Sandeep

    2010-01-01

    A wireless revolution has transformed telecoms in India and in other emerging markets. The electricity market, on the other hand, remains underdeveloped. We define Wireless Electricity as renewable energy produced within a few hundred meters of the point of consumption. A wireless revolution in electricity would solve the problem of electricity deficit, empower people at the bottom of the pyramid and mitigate the environmental impact of bringing hundreds of millions out of poverty as the Indian economy grows. Renewables are technically proven and economically viable in certain situations, but their use remains peripheral. The stark difference in the diffusion patterns in telecoms and electricity has been ignored by leaders in government, business and academics. We present common frameworks to explain the different directions of reform in telecoms and electricity. We explain some of the dynamics which prevent the diffusion of Wireless Electricity. We use a causal loop diagram to explain the status quo in the off-grid electricity market and propose changes which will lead to the formation of a market for Wireless Electricity. India has the entrepreneurial talent to develop this market-and the largest number of potential customers. The world will benefit as a result.

  18. EXPERIMENTAL PERFORMANCE ANALYSIS OF WIRELESS ...

    African Journals Online (AJOL)

    ABSTRACT. Wireless networking is currently being deployed for various applications. However, the application of wireless networking in healthcare remains a challenge mainly because of security and reliability concerns. This paper presents experimental results of performance analysis of a wireless network for healthcare ...

  19. Wireless LAN security management with location detection capability in hospitals.

    Science.gov (United States)

    Tanaka, K; Atarashi, H; Yamaguchi, I; Watanabe, H; Yamamoto, R; Ohe, K

    2012-01-01

    In medical institutions, unauthorized access points and terminals obstruct the stable operation of a large-scale wireless local area network (LAN) system. By establishing a real-time monitoring method to detect such unauthorized wireless devices, we can improve the efficiency of security management. We detected unauthorized wireless devices by using a centralized wireless LAN system and a location detection system at 370 access points at the University of Tokyo Hospital. By storing the detected radio signal strength and location information in a database, we evaluated the risk level from the detection history. We also evaluated the location detection performance in our hospital ward using Wi-Fi tags. The presence of electric waves outside the hospital and those emitted from portable game machines with wireless communication capability was confirmed from the detection result. The location detection performance showed an error margin of approximately 4 m in detection accuracy and approximately 5% in false detection. Therefore, it was effective to consider the radio signal strength as both an index of likelihood at the detection location and an index for the level of risk. We determined the location of wireless devices with high accuracy by filtering the detection results on the basis of radio signal strength and detection history. Results of this study showed that it would be effective to use the developed location database containing radio signal strength and detection history for security management of wireless LAN systems and more general-purpose location detection applications.

  20. Wireless networking for the dental office: current wireless standards and security protocols.

    Science.gov (United States)

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  1. Fiber wireless networks

    Science.gov (United States)

    Nirmalathas, A.; Bakaul, M.; Lim, C.; Novak, D.; Waterhouse, R.

    2005-11-01

    Broadband wireless networks based on a number of new frequency windows at higher microwave and millimeter-wave frequencies have been actively pursued to provide ultra-high bandwidth services over a wireless networks. These networks will have a large number of antenna base-stations with high throughput. Significant reductions in antenna base-station complexity can be achieved if most of the signal routing and switching functions centralized at a central office in the network. In such a network, fiber feed networks can be effectively deployed to provide high bandwidth interconnections between multiple antenna base-stations and the central office. With wavelength division multiplexing, efficient optical fiber feed network architectures could be realised to provide interconnection to a large number of antenna base-stations. In this paper, we present an over view of our recent research into system technologies for fiber wireless networks.

  2. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  3. A kinematic view of loop closure.

    Science.gov (United States)

    Coutsias, Evangelos A; Seok, Chaok; Jacobson, Matthew P; Dill, Ken A

    2004-03-01

    We consider the problem of loop closure, i.e., of finding the ensemble of possible backbone structures of a chain segment of a protein molecule that is geometrically consistent with preceding and following parts of the chain whose structures are given. We reduce this problem of determining the loop conformations of six torsions to finding the real roots of a 16th degree polynomial in one variable, based on the robotics literature on the kinematics of the equivalent rotator linkage in the most general case of oblique rotators. We provide a simple intuitive view and derivation of the polynomial for the case in which each of the three pair of torsional axes has a common point. Our method generalizes previous work on analytical loop closure in that the torsion angles need not be consecutive, and any rigid intervening segments are allowed between the free torsions. Our approach also allows for a small degree of flexibility in the bond angles and the peptide torsion angles; this substantially enlarges the space of solvable configurations as is demonstrated by an application of the method to the modeling of cyclic pentapeptides. We give further applications to two important problems. First, we show that this analytical loop closure algorithm can be efficiently combined with an existing loop-construction algorithm to sample loops longer than three residues. Second, we show that Monte Carlo minimization is made severalfold more efficient by employing the local moves generated by the loop closure algorithm, when applied to the global minimization of an eight-residue loop. Our loop closure algorithm is freely available at http://dillgroup. ucsf.edu/loop_closure/. Copyright 2004 Wiley Periodicals, Inc. J Comput Chem 25: 510-528, 2004

  4. Securing a medical wireless LAN system

    OpenAIRE

    Owens, TJ; Tachakra, S; Banitsas, KA; Istepanian, RSH

    2001-01-01

    Recently the concept of MedLAN systems dedicated to application scenarios for wireless local area networks (WLAN) in hospital A&E departments has been presented. An essential element in the acceptance of the system will be reassuring all stakeholders in the system that data transmitted using the system is secure. In order for the stakeholders to be reassured technical and managerial issues have to be addressed. Technical issues to be addressed include selection of a suitable encryption algori...

  5. On loop extensions and cohomology of loops

    OpenAIRE

    Benítez, Rolando Jiménez; Meléndez, Quitzeh Morales

    2015-01-01

    In this paper are defined cohomology-like groups that classify loop extensions satisfying a given identity in three variables for association identities, and in two variables for the case of commutativity. It is considered a large amount of identities. This groups generalize those defined in works of Nishigori [2] and of Jhonson and Leedham-Green [4]. It is computed the number of metacyclic extensions for trivial action of the quotient on the kernel in one particular case for left Bol loops a...

  6. Neutron transport in irradiation loops (IRENE loop)

    International Nuclear Information System (INIS)

    Sarsam, Maher.

    1980-09-01

    This thesis is composed of two parts with different aspects. Part one is a technical description of the loop and its main ancillary facilities as well as of the safety and operational regulations. The measurement methods on the model of the ISIS reactor and on the loop in the OSIRIS reactor are described. Part two deals with the possibility of calculating the powers dissipated by each rod of the fuel cluster, using appropriate computer codes, not only in the reflector but also in the core and to suggest a method of calculation [fr

  7. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  8. Sensitivity enhancement of remotely coupled NMR detectors using wirelessly powered parametric amplification.

    Science.gov (United States)

    Qian, Chunqi; Murphy-Boesch, Joseph; Dodd, Stephen; Koretsky, Alan

    2012-09-01

    A completely wireless detection coil with an integrated parametric amplifier has been constructed to provide local amplification and transmission of MR signals. The sample coil is one element of a parametric amplifier using a zero-bias diode that mixes the weak MR signal with a strong pump signal that is obtained from an inductively coupled external loop. The NMR sample coil develops current gain via reduction in the effective coil resistance. Higher gain can be obtained by adjusting the level of the pumping power closer to the oscillation threshold, but the gain is ultimately constrained by the bandwidth requirement of MRI experiments. A feasibility study here shows that on a NaCl/D(2) O phantom, (23) Na signals with 20 dB of gain can be readily obtained with a concomitant bandwidth of 144 kHz. This gain is high enough that the integrated coil with parametric amplifier, which is coupled inductively to external loops, can provide sensitivity approaching that of direct wire connection. Copyright © 2012 Wiley Periodicals, Inc.

  9. Randomized clinical trial comparing spinal anesthesia with local anesthesia with sedation for loop colostomy closure Ensaio clínico randomizado comparando raquianestesia com anestesia local, associadas à sedação para o fechamento de colostomia em alça

    Directory of Open Access Journals (Sweden)

    Rone Antônio Alves de Abreu

    2010-09-01

    Full Text Available CONTEXT: Recent studies have shown that local anesthesia for loop colostomy closure is as safe as spinal anesthesia for this procedure. OBJECTIVES: Randomized clinical trial to compare the results from these two techniques. METHODS: Fifty patients were randomized for loop colostomy closure using spinal anesthesia (n = 25 and using local anesthesia (n = 25. Preoperatively, the bowel was evaluated by means of colonoscopy, and bowel preparation was performed with 10% oral mannitol solution and physiological saline solution for lavage through the distal colostomy orifice. All patients were given prophylactic antibiotics (cefoxitin. Pain, analgesia, reestablishment of peristaltism or peristalsis, diet reintroduction, length of hospitalization and rehospitalization were analyzed postoperatively. RESULTS: Surgery duration and local complications were greater in the spinal anesthesia group. Conversion to general anesthesia occurred only with spinal anesthesia. There was no difference in intraoperative pain between the groups, but postoperative pain, reestablishment of peristaltism or peristalsis, diet reintroduction and length of hospitalization were lower with local anesthesia. CONCLUSIONS: Local anesthesia plus sedation offers a safer and more effective method than spinal anesthesia for loop colostomy closure.CONTEXTO: Estudos recentes têm demonstrado que a anestesia local para o fechamento de colostomia em alça é tão segura quanto a raquianestesia para estes procedimentos. OBJETIVOS: Comparar os resultados do fechamento de colostomia em alça usando essas duas técnicas. MÉTODOS: Cinquenta pacientes foram randomizados para o fechamento de colostomia em alça sob raquianestesia (n = 25 e anestesia local (n = 25. No pré-operatório, o cólon foi avaliado por colonoscopia e o preparo intestinal foi realizado com solução oral de manitol a 10% e limpeza com solução salina fisiológica através do orifício distal da colostomia. Todos os

  10. Efficient Closed-Loop Schemes for MIMO-OFDM-Based WLANs

    Directory of Open Access Journals (Sweden)

    Jiang Yi

    2006-01-01

    Full Text Available The single-input single-output (SISO orthogonal frequency-division multiplexing (OFDM systems for wireless local area networks (WLAN defined by the IEEE 802.11a standard can support data rates up to 54 Mbps. In this paper, we consider deploying two transmit and two receive antennas to increase the data rate up to 108 Mbps. Applying our recent multiple-input multiple-output (MIMO transceiver designs, that is, the geometric mean decomposition (GMD and the uniform channel decomposition (UCD schemes, we propose simple and efficient closed-loop MIMO-OFDM designs for much improved performance, compared to the standard singular value decomposition (SVD based schemes as well as the open-loop V-BLAST (vertical Bell Labs layered space-time based counterparts. In the explicit feedback mode, precoder feedback is needed for the proposed schemes. We show that the overhead of feedback can be made very moderate by using a vector quantization method. In the time-division duplex (TDD mode where the channel reciprocity is exploited, our schemes turn out to be robust against the mismatch between the uplink and downlink channels. The advantages of our schemes are demonstrated via extensive numerical examples.

  11. Wireless communications algorithmic techniques

    CERN Document Server

    Vitetta, Giorgio; Colavolpe, Giulio; Pancaldi, Fabrizio; Martin, Philippa A

    2013-01-01

    This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It focuses on single user systems, so ignoring multiple access techniques. Moreover, emphasis is put on single-input single-output (SISO) systems, although some relevant topics about multiple-input multiple-output (MIMO) systems are also illustrated.Comprehensive wireless specific guide to algorithmic techniquesProvides a detailed analysis of channel equalization and channel coding for wi

  12. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  13. Wireless optical telecommunications

    CERN Document Server

    Bouchet, Olivier

    2013-01-01

    Wireless optical communication refers to communication based on the unguided propagation of optical waves. The past 30 years have seen significant improvements in this technique - a wireless communication solution for the current millennium - that offers an alternative to radio systems; a technique that could gain attractiveness due to recent concerns regarding the potential effects of radiofrequency waves on human health.The aim of this book is to look at the free space optics that are already used for the exchange of current information; its many benefits, such as incorporating chan

  14. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  15. Distributed topology control algorithm for multihop wireless netoworks

    Science.gov (United States)

    Borbash, S. A.; Jennings, E. H.

    2002-01-01

    We present a network initialization algorithmfor wireless networks with distributed intelligence. Each node (agent) has only local, incomplete knowledge and it must make local decisions to meet a predefined global objective. Our objective is to use power control to establish a topology based onthe relative neighborhood graph which has good overall performance in terms of power usage, low interference, and reliability.

  16. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  17. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  18. Multichannel wireless ECoG array ASIC devices.

    Science.gov (United States)

    DeMichele, Glenn A; Cogan, Stuart F; Troyk, Philip R; Chen, Hongnan; Hu, Zhe

    2014-01-01

    Surgical resection of epileptogenic foci is often a beneficial treatment for patients suffering debilitating seizures arising from intractable epilepsy [1], [2], [3]. Electrodes placed subdurally on the surface of the brain in the form of an ECoG array is one of the multiple methods for localizing epileptogenic zones for the purpose of defining the region for surgical resection. Currently, transcutaneous wires from ECoG grids limit the duration of time that implanted grids can be used for diagnosis. A wireless ECoG recording and stimulation system may be a solution to extend the diagnostic period. To avoid the transcutaneous connections, a 64-channel wireless silicon recording/stimulating ASIC was developed as the electronic component of a wireless ECoG array that uses SIROF electrodes on a polyimide substrate[4]. Here we describe two new ASIC devices that have been developed and tested as part of the on-going wireless ECoG system design.

  19. Resource management in wireless networking

    CERN Document Server

    Cardei, Mihaela; Du, Ding-Zhu

    2005-01-01

    This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.Survey chapters give an excellent introduction to key topics in resource management for wireless networks, while experts will be satisfied by the technical depth of the knowledge imparted in chapters exploring hot research topics.The subject area discussed in this book is very relevant today, considering the recent remarkable growth of wireless networking and the convergence of wireless personal communications, internet technologies and real-time multimedia.This volume is a very good companion for practitioners working on implementing solutions for multimedia and Quality of Service - sensitive applications over wireless networks.Written for:Researchers, faculty members, students...

  20. MATLAB: For While Loops

    OpenAIRE

    2005-01-01

    sim tut Simulation Tutorial Interactive Media Element This interactive tutorial on MATLAB covers the For Loop and the While Loop functions. Examples are provided with step-by-step animated explanations. The interactions involve entering MATLAB instructions and observing the outcomes. Self-check questions are provided to help learners determine their level of understanding of the content presented. EC1010 Introduction to MATLAB

  1. Water loop for training

    International Nuclear Information System (INIS)

    Moeller, S.V.

    1983-02-01

    The procedures used to operate the water loop of the Institute of Nuclear Enginering (IEN) in Brazil are presented. The aim is to help future operators of the training water loop in the operation technique and in a better comprehension of the phenomena occured during the execution of an experience. (E.G.) [pt

  2. Outdoor W-Band Hybrid Photonic Wireless Link Based on an Optical SFP+ Module

    DEFF Research Database (Denmark)

    Rommel, Simon; Rodríguez Páez, Juan Sebastián; Chorchos, Łukasz

    2016-01-01

    This letter proposes aW-band hybrid photonic wireless link based on a commercial SFP+ module and experimentally demonstrates its performance. Using a free running laser as local oscillator and heterodyne photonic upconversion, good frequency stability is achieved. Outdoor wireless transmission over...... 225m with a BER below 10-6 is demonstrated and the maximum reach of the system with typical RF components is calculated, finding wireless distances above 2km to be feasible. Being based on a commercial SFP+ the proposed hybrid photonic wireless link offers seamless integration with existing...

  3. Wireless Distributed Antenna MIMO

    DEFF Research Database (Denmark)

    2015-01-01

    The present disclosure relates to system applications of multicore optical fibers. One embodiment relates to a base transceiver station for a wireless telecommunication system comprising a plurality of antenna units arranged in a MIMO configuration and adapted for transmission and/or reception...

  4. Wireless Remote Control System

    Directory of Open Access Journals (Sweden)

    Adrian Tigauan

    2012-06-01

    Full Text Available This paper presents the design of a wireless remote control system based on the ZigBee communication protocol. Gathering data from sensors or performing control tasks through wireless communication is advantageous in situations in which the use of cables is impractical. An Atmega328 microcontroller (from slave device is used for gathering data from the sensors and transmitting it to a coordinator device with the help of the XBee modules. The ZigBee standard is suitable for low-cost, low-data-rate and low-power wireless networks implementations. The XBee-PRO module, designed to meet ZigBee standards, requires minimal power for reliable data exchange between devices over a distance of up to 1600m outdoors. A key component of the ZigBee protocol is the ability to support networking and this can be used in a wireless remote control system. This system may be employed e.g. to control temperature and humidity (SHT11 sensor and light intensity (TSL230 sensor levels inside a commercial greenhouse.

  5. Subsurface Wireless Sensor Networks

    Science.gov (United States)

    Niemeier, J. J.; Davies, J. L.; Kruger, A.

    2008-12-01

    Conventional thinking holds that underground- and underwater radio communication is not possible, except at very low frequencies employing very long antennas and high transmit power. However, researchers at The University of Iowa have demonstrated that using inexpensive, low-power radios, it is in fact possible to achieve reliable underground radio communication over distances of several meters. This allows for creating underground wireless sensor networks. A proof-of-concept network was established at The University of Iowa, where nodes that measure soil moisture content are buried over a 20×20 m area (up to 1 m deep). The nodes organize themselves into a wireless sensor network, reconfigure routes as radio link quality waxes and wanes, cooperate in routing data packets to a surface base station, and so on. In an agricultural research setting, an advantage of such buried wireless sensor networks is that, if nodes were buried deep enough, they may be left in place during agricultural field work. Power consumption is an important issue in wireless sensor networks. This is especially true in a buried network where battery replacement is a major undertaking. The focus of continuing research is developing methods of inductively recharging buried sensor batteries.

  6. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  7. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  8. 76 FR 11781 - Wireless Telecommunications Bureau Seeks Comment on Petition for Declaratory Ruling Asking To...

    Science.gov (United States)

    2011-03-03

    ...In this document, the Wireless Telecommunications Bureau seeks comment on a December 3, 2010 petition for declaratory ruling (Petition) filed by CTIA-The Wireless Association (Petitioners). The Petitioners ask the Federal Communications Commission (Commission) to clarify ``the scope of Section 332(c)(3)(A)'s ban on state and local entry regulation.''

  9. The Brave New World of Wireless Technologies: A Primer for Educators.

    Science.gov (United States)

    Boerner, Gerald L.

    2002-01-01

    Discusses the use of wireless local area networks (WLANs) on college campuses. Highlights include traditional wired networks; cost, speed, and reliability; wireless networking standards; mobility; installation speed, simplicity, and flexibility; reduced cost of ownership; scalability; security issues; and a glossary of WLAN terms. (LRW)

  10. Experimental demonstration of the equivalence of inductive and strongly coupled magnetic resonance wireless power transfer

    Science.gov (United States)

    Ricketts, David S.; Chabalko, Matthew J.; Hillenius, Andrew

    2013-02-01

    In this work, we show experimentally that wireless power transfer (WPT) using strongly coupled magnetic resonance (SCMR) and traditional induction are equivalent. We demonstrate that for a given coil separation, and to within 4%, strongly coupled magnetic resonance and traditional induction produce the same theoretical efficiency of wireless power transfer versus distance. Moreover, we show that the difference between traditional induction and strongly coupled magnetic resonance is in the implementation of the impedance matching network where strongly coupled magnetic resonance uses the mini-loop impedance match. The mini-loop impedance mach provides a low-loss, high-ratio impedance transformation that makes it desirable for longer distance wireless power transfer, where large impedance transformations are needed to maximize power transfer.

  11. NASA Bluetooth Wireless Communications

    Science.gov (United States)

    Miller, Robert D.

    2007-01-01

    NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.

  12. Scalable and Hybrid Radio Resource Management for Future Wireless Networks

    DEFF Research Database (Denmark)

    Mino, E.; Luo, Jijun; Tragos, E.

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios, from local area to wide area wireless networks. The integration in a unique radio system of a cellular and local area type networks supposes...... a great advantage for the final user and for the operator, compared with the current situation, with disconnected systems, usually with different subscriptions, radio interfaces and terminals. To be a ubiquitous wireless system, the IST project WINNER II has defined three system modes. This contribution...

  13. Looped energy harvester for human motion

    Science.gov (United States)

    Geisler, M.; Boisseau, S.; Gasnier, P.; Willemin, J.; Gobbo, C.; Despesse, G.; Ait-Ali, I.; Perraud, S.

    2017-10-01

    The development of energy harvesters for smart wearables is a challenging topic, with a difficult combination of ergonomics constraints, lifetime and electrical requirements. In this work, we focus on an inertial inductive structure, composed of a magnetic ball circulating inside a closed-loop guide and converting the kinetic energy of the user’s limbs into electricity during the run. A specific induction issue related to the free self-rotation of the ball is underlined and addressed using a ferromagnetic ‘rail’ component. From a 2 g moving ball, a 5 cm-diameter 21 cm3 prototype generated up to 4.8 mW of average power when worn by someone running at 8 km h-1. This device is demonstrated to charge a 2.4 V NiMH battery and supply an acceleration and temperature Wireless Sensor Node at 20 Hz.

  14. Wireless Sensor Network for Indoor Air Quality Monitoring

    Directory of Open Access Journals (Sweden)

    Jun Li

    2014-06-01

    Full Text Available Indoor air quality monitoring system consists of wireless sensor device, nRF24L01 wireless transceiver modules, C8051MCU, STM32103 remote monitoring platform, alarm device and data server. Distributed in the interior space of wireless sensors measure parameters of the local air quality, wireless transceiver module of the MCU to transmit data to the remote monitoring platform for analysis which displayed and stored field environment data or charts. The data collecting from wireless sensors to be send by wireless Access Point to the remote data server based on B/S architecture, intelligent terminals such as mobile phone, laptop, tablet PC on the Internet monitor indoor air quality in real-time. When site environment air quality index data exceeds the threshold in the monitoring device, the remote monitoring platform sends out the alarm SMS signal to inform user by GSM module. Indoor air quality monitoring system uses modular design method, has the portability and scalability has the low manufacture cost, real-time monitoring data and man-machine interaction.

  15. Blind Loop Syndrome

    Science.gov (United States)

    ... of tissue that protrude through the intestinal wall (diverticulosis) Certain medical conditions, including Crohn's disease, radiation enteritis, ... History of radiation therapy to the abdomen Diabetes Diverticulosis of the small intestine Complications A blind loop ...

  16. Diffusion of Wilson loops

    International Nuclear Information System (INIS)

    Brzoska, A.M.; Lenz, F.; Thies, M.; Negele, J.W.

    2005-01-01

    A phenomenological analysis of the distribution of Wilson loops in SU(2) Yang-Mills theory is presented in which Wilson loop distributions are described as the result of a diffusion process on the group manifold. It is shown that, in the absence of forces, diffusion implies Casimir scaling and, conversely, exact Casimir scaling implies free diffusion. Screening processes occur if diffusion takes place in a potential. The crucial distinction between screening of fundamental and adjoint loops is formulated as a symmetry property related to the center symmetry of the underlying gauge theory. The results are expressed in terms of an effective Wilson loop action and compared with various limits of SU(2) Yang-Mills theory

  17. Mashup the OODA Loop

    National Research Council Canada - National Science Library

    Heier, Jeffrey E

    2008-01-01

    ...) processes via the Observe, Orient, Decide, and Act (OODA) Loop concept. As defined by Wikipedia, a mashup is a Website or application that combines the content from more than one source into an integrated presentation...

  18. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  19. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  20. Dechanneling by dislocation loops

    International Nuclear Information System (INIS)

    Chalant, Gerard.

    1976-09-01

    Ion implantation always induces the creation of dislocation loops. When the damage profile is determined by a backscattering technique, the dechanneling by these loops is implicitely at the origin of these measurements. The dechanneling of alpha particles by dislocation loops produced by the coalescence of quenched-in vacancies in aluminium is studied. The dechanneling and the concentration of loops were determined simultaneously. The dechanneling width around dislocation was found equal to lambda=6A, both for perfect and imperfect loops having a mean diameter d=250A. In the latter case, a dechanneling probability chi=0.34 was determined for the stacking fault, in good agreement with previous determination in gold. A general formula is proposed which takes into account the variation of lambda with the curvature (or the diameter d) of the loops. Finally, by a series of isothermal anneals, the self-diffusion energy ΔH of aluminium was measured. The value obtained ΔH=1.32+-0.10eV is in good agreement with the values obtained by other methods [fr

  1. The benefits of soft sensor and multi-rate control for the implementation of Wireless Networked Control Systems.

    Science.gov (United States)

    Mansano, Raul K; Godoy, Eduardo P; Porto, Arthur J V

    2014-12-18

    Recent advances in wireless networking technology and the proliferation of industrial wireless sensors have led to an increasing interest in using wireless networks for closed loop control. The main advantages of Wireless Networked Control Systems (WNCSs) are the reconfigurability, easy commissioning and the possibility of installation in places where cabling is impossible. Despite these advantages, there are two main problems which must be considered for practical implementations of WNCSs. One problem is the sampling period constraint of industrial wireless sensors. This problem is related to the energy cost of the wireless transmission, since the power supply is limited, which precludes the use of these sensors in several closed-loop controls. The other technological concern in WNCS is the energy efficiency of the devices. As the sensors are powered by batteries, the lowest possible consumption is required to extend battery lifetime. As a result, there is a compromise between the sensor sampling period, the sensor battery lifetime and the required control performance for the WNCS. This paper develops a model-based soft sensor to overcome these problems and enable practical implementations of WNCSs. The goal of the soft sensor is generating virtual data allowing an actuation on the process faster than the maximum sampling period available for the wireless sensor. Experimental results have shown the soft sensor is a solution to the sampling period constraint problem of wireless sensors in control applications, enabling the application of industrial wireless sensors in WNCSs. Additionally, our results demonstrated the soft sensor potential for implementing energy efficient WNCS through the battery saving of industrial wireless sensors.

  2. A Wireless Physiological Signal Monitoring System with Integrated Bluetooth and WiFi Technologies.

    Science.gov (United States)

    Yu, Sung-Nien; Cheng, Jen-Chieh

    2005-01-01

    This paper proposes a wireless patient monitoring system which integrates Bluetooth and WiFi wireless technologies. A wireless portable multi-parameter device was designated to acquire physiological signals and transmit them to a local server via Bluetooth wireless technology. Four kinds of monitor units were designed to communicate via the WiFi wireless technology, including a local monitor unit, a control center, mobile devices (personal digital assistant; PDA), and a web page. The use of various monitor units is intending to meet different medical requirements for different medical personnel. This system was demonstrated to promote the mobility and flexibility for both the patients and the medical personnel, which further improves the quality of health care.

  3. An Assessment of Emerging Wireless Broadband Technologies

    National Research Council Canada - National Science Library

    Fountanas, Leonidas

    2001-01-01

    ... technologies in providing broadband services today, emerging wireless broadband technologies are expected to significantly increase their market share over the next years, Deploying a wireless network...

  4. Wireless Sensor Portal Technology Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Recognizing the needs and challenges facing NASA Earth Science for data input, manipulation and distribution, Mobitrum is proposing a ? Wireless Sensor Portal...

  5. Adaptive Wireless Transceiver, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  6. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because....... This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  7. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  8. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless......Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because...

  9. Design of a Closed-Loop, Bidirectional Brain Machine Interface System With Energy Efficient Neural Feature Extraction and PID Control.

    Science.gov (United States)

    Liu, Xilin; Zhang, Milin; Richardson, Andrew G; Lucas, Timothy H; Van der Spiegel, Jan

    2017-08-01

    This paper presents a bidirectional brain machine interface (BMI) microsystem designed for closed-loop neuroscience research, especially experiments in freely behaving animals. The system-on-chip (SoC) consists of 16-channel neural recording front-ends, neural feature extraction units, 16-channel programmable neural stimulator back-ends, in-channel programmable closed-loop controllers, global analog-digital converters (ADC), and peripheral circuits. The proposed neural feature extraction units includes 1) an ultra low-power neural energy extraction unit enabling a 64-step natural logarithmic domain frequency tuning, and 2) a current-mode action potential (AP) detection unit with time-amplitude window discriminator. A programmable proportional-integral-derivative (PID) controller has been integrated in each channel enabling a various of closed-loop operations. The implemented ADCs include a 10-bit voltage-mode successive approximation register (SAR) ADC for the digitization of the neural feature outputs and/or local field potential (LFP) outputs, and an 8-bit current-mode SAR ADC for the digitization of the action potential outputs. The multi-mode stimulator can be programmed to perform monopolar or bipolar, symmetrical or asymmetrical charge balanced stimulation with a maximum current of 4 mA in an arbitrary channel configuration. The chip has been fabricated in 0.18 μ m CMOS technology, occupying a silicon area of 3.7 mm 2 . The chip dissipates 56 μW/ch on average. General purpose low-power microcontroller with Bluetooth module are integrated in the system to provide wireless link and SoC configuration. Methods, circuit techniques and system topology proposed in this work can be used in a wide range of relevant neurophysiology research, especially closed-loop BMI experiments.

  10. Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zahariadis Theodore

    2010-01-01

    Full Text Available Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN, which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks.

  11. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  12. Looping in OLSRv2 in Mobile Ad-Hoc Networks, Loop Suppression and Loop Correction

    Science.gov (United States)

    Speakman, Lee; Owada, Yasunori; Mase, Kenichi

    Transient routing loops have been observed to form in Mobile Ad-hoc Networks running the OLSRv2 proactive link-state routing protocol. The packets falling into loops impact the surrounding network thus degrading throughput even though only a small proportion of the traffic may enter these loops and only for a short time. This becomes significantly more evident when Link Layer Notification is used to catch broken links, inadvertently leading to an increase in the number of loops. Two methods of Loop Detection are introduced and are used to trigger either Loop Suppression by selectively and preemptively discarding the looping packets that are unlikely to reach their destination, or Loop Correction by the notification of the routing protocol to cut the link over which the packet is looping. The newly introduced Loop Suppression and Loop Correction techniques used with Link Layer Notification are shown to significantly increase network performance over plain OLSRv2 and OLSRv2 with Link Layer Notification.

  13. The Impact of Hands-On Simulation Laboratories on Teaching of Wireless Communications

    Directory of Open Access Journals (Sweden)

    Te-Shun Chou

    2017-03-01

    Full Text Available Aim/Purpose: To prepare students with both theoretical knowledge and practical skills in the field of wireless communications. Background: Teaching wireless communications and networking is not an easy task because it involves broad subjects and abstract content. Methodology: A pedagogical method that combined lectures, labs, assignments, exams, and readings was applied in a course of wireless communications. Contribution: Five wireless networking labs, related to wireless local networks, wireless security, and wireless sensor networks, were developed for students to complete all of the required hands-on lab activities. Findings: Both development and implementation of the labs achieved a successful outcome and provided students with a very effective learning experience. Students expressed that they had a better understanding of different wireless network technologies after finishing the labs. Recommendations for Practitioners: Detailed instructional lab manuals should be developed so that students can carry out hands-on activities in a step-by-step fashion. Recommendation for Researchers: Hands-on lab exercises can not only help students understand the abstract technical terms in a meaningful way, but also provide them with hands-on learning experience in terms of wireless network configuration, implementation, and evaluation. Impact on Society: With the help of a wireless network simulator, students have successfully enhanced their practical skills and it would benefit them should they decide to pursue a career in wireless network design or implementation. Future Research: Continuous revision of the labs will be made according to the feedback from students. Based on the experience, more wireless networking labs and network issues could be studied in the future.

  14. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  15. Wireless model predictive control: Application to water-level system

    Directory of Open Access Journals (Sweden)

    Ramdane Hedjar

    2016-04-01

    Full Text Available This article deals with wireless model predictive control of a water-level control system. The objective of the model predictive control algorithm is to constrain the control signal inside saturation limits and maintain the water level around the desired level. Linear modeling of any nonlinear plant leads to parameter uncertainties and non-modeled dynamics in the linearized mathematical model. These uncertainties induce a steady-state error in the output response of the water level. To eliminate this steady-state error and increase the robustness of the control algorithm, an integral action is included in the closed loop. To control the water-level system remotely, the communication between the controller and the process is performed using radio channel. To validate the proposed scheme, simulation and real-time implementation of the algorithm have been conducted, and the results show the effectiveness of wireless model predictive control with integral action.

  16. Distributed topology control algorithm to conserve energy in heterogeneous wireless mesh networks

    CSIR Research Space (South Africa)

    Aron, FO

    2008-07-01

    Full Text Available to increasing the network capacity via better spatial bandwidth reuse. In this work, the problem of topology control in a hybrid WMN of heterogeneous wireless devices with varying maximum transmission ranges is considered. A localized distributed topology...

  17. Holographic calculations of Euclidean Wilson loop correlator in Euclidean anti-de Sitter space

    Energy Technology Data Exchange (ETDEWEB)

    Ziama, Sannah [Department of Physics and Astronomy, University of Kentucky,505 Rose Street, Lexington, KY 40506-0055 (United States)

    2015-04-07

    The correlation functions of two or more Euclidean Wilson loops of various shapes in Euclidean anti-de Sitter space are computed by considering the minimal area surfaces connecting the loops. The surfaces are parametrized by Riemann theta functions associated with genus three hyperelliptic Riemann surfaces. In the case of two loops, the distance L by which they are separated can be adjusted by continuously varying a specific branch point of the auxiliary Riemann surface. When L is much larger than the characteristic size of the loops, then the loops are approximately regarded as local operators and their correlator as the correlator of two local operators. Similarly, when a loop is very small compared to the size of another loop, the small loop is considered as a local operator corresponding to a light supergravity mode.

  18. Green Wireless Power Transfer Networks

    NARCIS (Netherlands)

    Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.

    2016-01-01

    wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.

  19. Wireless Networks: a brief introduction

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Networks: a brief introduction. Wireless communication: What? Why? How many types? What is cell? Is it different from fixed landline structure? 1G systems: FDMA/FDD and Analog FM [voice comm]. (Introduced in 1983 in Chicago by AMPS). 2G systems: 3 ...

  20. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  1. Energy efficient topology for Wireless Mesh Networks | Negash ...

    African Journals Online (AJOL)

    We analyze the power control problem using coalition formation game theory employing utilities based on the coverage areas of the access points by associating a cost function with the utility as the payoff of the coalition members. Our work focuses on the access layer of a wireless mesh local area network. We show that by ...

  2. Capacity allocation in wireless communication networks - models and analyses

    NARCIS (Netherlands)

    Litjens, Remco

    2003-01-01

    This monograph has concentrated on capacity allocation in cellular and Wireless Local Area Networks, primarily with a network operator’s perspective. In the introduc- tory chapter, a reference model has been proposed for the extensive suite of capacity allocation mechanisms that can be applied at

  3. Closing global material loops

    DEFF Research Database (Denmark)

    Prosman, Ernst-Jan; Wæhrens, Brian Vejrum; Liotta, Giacomo

    2017-01-01

    Replacing virgin materials with waste materials, a practice known as Industrial Symbiosis (IS), has been identified as a key strategy for closing material loops. This article adopts a critical view on geographic proximity and external coordinators – two key enablers of IS. By ‘uncovering’ a case ...... for geographic proximity and external coordinators. In doing so, our insights into firm-level challenges of long-distance IS exchanges contribute to closing global material loops by increasing the number of potential circular pathways....

  4. Closed Loop Subspace Identification

    Directory of Open Access Journals (Sweden)

    Geir W. Nilsen

    2005-07-01

    Full Text Available A new three step closed loop subspace identifications algorithm based on an already existing algorithm and the Kalman filter properties is presented. The Kalman filter contains noise free states which implies that the states and innovation are uneorre lated. The idea is that a Kalman filter found by a good subspace identification algorithm will give an output which is sufficiently uncorrelated with the noise on the output of the actual process. Using feedback from the output of the estimated Kalman filter in the closed loop system a subspace identification algorithm can be used to estimate an unbiased model.

  5. Wireless Headset Communication System

    Science.gov (United States)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  6. Investigating wireless power transfer

    Science.gov (United States)

    St John, Stuart A.

    2017-09-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.

  7. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  8. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  9. Wireless installation standard

    International Nuclear Information System (INIS)

    Lim, Hwang Bin

    2007-12-01

    This is divided six parts which are radio regulation law on securing of radio resource, use of radio resource, protection of radio resource, radio regulation enforcement ordinance with securing, distribution and assignment of radio regulation, radio regulation enforcement regulation on utility of radio resource and technical qualification examination, a wireless installation regulation of technique standard and safety facility standard, radio regulation such as certification regulation of information communicative machines and regulation of radio station on compliance of signal security, radio equipment in radio station, standard frequency station and emergency communication.

  10. Passive wireless sensing tags NASA inflatable structures.

    Energy Technology Data Exchange (ETDEWEB)

    Brocato, Robert Wesley

    2006-03-01

    This report gives a description of several types of wireless, unpowered remote sensors. Surface acoustic wave (SAW) devices were coupled with conventional sensors to create entirely new types of sensors. These sensors report physically measurable data in the same manner as the conventional sensors, but they do it remotely and without any local power source. The sensors are measured remotely using a radar-like interrogation device, and the sensors and their related communication electronics draw all of the power needed for communicating from the radar pulse. The report covers only a description of prototype sensors and not of the manufacturing requirements of these devices.

  11. Loop Quantum Gravity

    Directory of Open Access Journals (Sweden)

    Rovelli Carlo

    1998-01-01

    Full Text Available The problem of finding the quantum theory of the gravitational field, and thus understanding what is quantum spacetime, is still open. One of the most active of the current approaches is loop quantum gravity. Loop quantum gravity is a mathematically well-defined, non-perturbative and background independent quantization of general relativity, with its conventional matter couplings. Research in loop quantum gravity today forms a vast area, ranging from mathematical foundations to physical applications. Among the most significant results obtained are: (i The computation of the physical spectra of geometrical quantities such as area and volume, which yields quantitative predictions on Planck-scale physics. (ii A derivation of the Bekenstein-Hawking black hole entropy formula. (iii An intriguing physical picture of the microstructure of quantum physical space, characterized by a polymer-like Planck scale discreteness. This discreteness emerges naturally from the quantum theory and provides a mathematically well-defined realization of Wheeler's intuition of a spacetime ``foam''. Long standing open problems within the approach (lack of a scalar product, over-completeness of the loop basis, implementation of reality conditions have been fully solved. The weak part of the approach is the treatment of the dynamics: at present there exist several proposals, which are intensely debated. Here, I provide a general overview of ideas, techniques, results and open problems of this candidate theory of quantum gravity, and a guide to the relevant literature.

  12. Justification by Infinite Loops

    NARCIS (Netherlands)

    Peijnenburg, A.J.M.; Atkinson, David

    2010-01-01

    In an earlier paper we have shown that a proposition can have a well-defined probability value, even if its justification consists of an infinite linear chain. In the present paper we demonstrate that the same holds if the justification takes the form of a closed loop. Moreover, in the limit that

  13. Improving Loop Dependence Analysis

    DEFF Research Database (Denmark)

    Jensen, Nicklas Bo; Karlsson, Sven

    2017-01-01

    Programmers can no longer depend on new processors to have significantly improved single-thread performance. Instead, gains have to come from other sources such as the compiler and its optimization passes. Advanced passes make use of information on the dependencies related to loops. We improve th...

  14. Operation of the hot test loop facilities

    International Nuclear Information System (INIS)

    Cheong, Moon Ki; Park, Choon Kyeong; Won, Soon Yeon; Yang, Sun Kyu; Cheong, Jang Whan; Cheon, Se Young; Song, Chul Hwa; Jeon, Hyeong Kil; Chang, Suk Kyu; Jeong, Heung Jun; Cho, Young Ro; Kim, Bok Duk; Min, Kyeong Ho

    1994-12-01

    The objective of this project is to obtain the available experimental data and to develop the measuring techniques through taking full advantage of the facilities. The facilities operated by the thermal hydraulics department have been maintained and repaired in order to carry out the thermal hydraulics tests necessary for providing the available data. The performance tests for double grid type bottom end piece which was improved on the debris filtering effectivity were performed using the PWR-Hot Test Loop. The CANDU-Hot Test Loop was operated to carry out the pressure drop tests and strength tests of fuel. The Cold Test Loop was used to obtain the local velocity data in subchannel within fuel bundle and to understand the characteristic of pressure drop required for improving the nuclear fuel and to develop the advanced measuring techniques. RCS Loop, which is used to measure the CHF, is presently under design and construction. B and C Loop is designed and constructed to assess the automatic depressurization safety system behavior. 4 tabs., 79 figs., 7 refs. (Author) .new

  15. Resource management for multimedia services in high data rate wireless networks

    CERN Document Server

    Zhang, Ruonan; Pan, Jianping

    2017-01-01

    This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

  16. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  17. A wireless implantable switched-capacitor based optogenetic stimulating system.

    Science.gov (United States)

    Lee, Hyung-Min; Kwon, Ki-Yong; Li, Wen; Ghovanloo, Maysam

    2014-01-01

    This paper presents a power-efficient implantable optogenetic interface using a wireless switched-capacitor based stimulating (SCS) system. The SCS efficiently charges storage capacitors directly from an inductive link and periodically discharges them into an array of micro-LEDs, providing high instantaneous power without affecting wireless link and system supply voltage. A custom-designed computer interface in LabVIEW environment wirelessly controls stimulation parameters through the inductive link, and an optrode array enables simultaneous neural recording along with optical stimulation. The 4-channel SCS system prototype has been implemented in a 0.35-μm CMOS process and combined with the optrode array. In vivo experiments involving light-induced local field potentials verified the efficacy of the SCS system. An implantable version of the SCS system with flexible hermetic sealing is under development for chronic experiments.

  18. A Wireless Implantable Switched-Capacitor Based Optogenetic Stimulating System

    Science.gov (United States)

    Lee, Hyung-Min; Kwon, Ki-Yong; Li, Wen

    2015-01-01

    This paper presents a power-efficient implantable optogenetic interface using a wireless switched-capacitor based stimulating (SCS) system. The SCS efficiently charges storage capacitors directly from an inductive link and periodically discharges them into an array of micro-LEDs, providing high instantaneous power without affecting wireless link and system supply voltage. A custom-designed computer interface in LabVIEW environment wirelessly controls stimulation parameters through the inductive link, and an optrode array enables simultaneous neural recording along with optical stimulation. The 4-channel SCS system prototype has been implemented in a 0.35-μm CMOS process and combined with the optrode array. In vivo experiments involving light-induced local field potentials verified the efficacy of the SCS system. An implantable version of the SCS system with flexible hermetic sealing is under development for chronic experiments. PMID:25570099

  19. Tracking Mobile Robot in Indoor Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Liping Zhang

    2014-01-01

    Full Text Available This work addresses the problem of tracking mobile robots in indoor wireless sensor networks (WSNs. Our approach is based on a localization scheme with RSSI (received signal strength indication which is used widely in WSN. The developed tracking system is designed for continuous estimation of the robot’s trajectory. A WSN, which is composed of many very simple and cheap wireless sensor nodes, is deployed at a specific region of interest. The wireless sensor nodes collect RSSI information sent by mobile robots. A range-based data fusion scheme is used to estimate the robot’s trajectory. Moreover, a Kalman filter is designed to improve tracking accuracy. Experiments are provided to assess the performance of the proposed scheme.

  20. Hybrid RRM Architecture for Future Wireless Networks

    DEFF Research Database (Denmark)

    Tragos, Elias; Mihovska, Albena D.; Mino, Emilio

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios from local area to wide area wireless networks. The integration of cellular and local area networks in a unique radio system will provide...... a great advantage to final users and operators, compared with the nowadays situation with many disconnected systems and users equipped with different subscriptions, radio interfaces and terminals. To this issue, the IST project WINNER II has defined three system modes suited to local, metropolitan...... and wide area respectively. The aim of this paper is twofold: first, it presents an architectural solution for scalable and hybrid radio resource management to efficiently integrate the different WINNER modes; second, it proposes a hybrid handover mechanism to exploit the availability of the different...

  1. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  2. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    International Nuclear Information System (INIS)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs

  3. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  4. Household wireless electroencephalogram hat

    Science.gov (United States)

    Szu, Harold; Hsu, Charles; Moon, Gyu; Yamakawa, Takeshi; Tran, Binh

    2012-06-01

    We applied Compressive Sensing to design an affordable, convenient Brain Machine Interface (BMI) measuring the high spatial density, and real-time process of Electroencephalogram (EEG) brainwaves by a Smartphone. It is useful for therapeutic and mental health monitoring, learning disability biofeedback, handicap interfaces, and war gaming. Its spec is adequate for a biomedical laboratory, without the cables hanging over the head and tethered to a fixed computer terminal. Our improved the intrinsic signal to noise ratio (SNR) by using the non-uniform placement of the measuring electrodes to create the proximity of measurement to the source effect. We computing a spatiotemporal average the larger magnitude of EEG data centers in 0.3 second taking on tethered laboratory data, using fuzzy logic, and computing the inside brainwave sources, by Independent Component Analysis (ICA). Consequently, we can overlay them together by non-uniform electrode distribution enhancing the signal noise ratio and therefore the degree of sparseness by threshold. We overcame the conflicting requirements between a high spatial electrode density and precise temporal resolution (beyond Event Related Potential (ERP) P300 brainwave at 0.3 sec), and Smartphone wireless bottleneck of spatiotemporal throughput rate. Our main contribution in this paper is the quality and the speed of iterative compressed image recovery algorithm based on a Block Sparse Code (Baranuick et al, IEEE/IT 2008). As a result, we achieved real-time wireless dynamic measurement of EEG brainwaves, matching well with traditionally tethered high density EEG.

  5. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  6. Converged Wireless Networking and Optimization for Next Generation Services

    Directory of Open Access Journals (Sweden)

    J. Rodriguez

    2010-01-01

    Full Text Available The Next Generation Network (NGN vision is tending towards the convergence of internet and mobile services providing the impetus for new market opportunities in combining the appealing services of internet with the roaming capability of mobile networks. However, this convergence does not go far enough, and with the emergence of new coexistence scenarios, there is a clear need to evolve the current architecture to provide cost-effective end-to-end communication. The LOOP project, a EUREKA-CELTIC driven initiative, is one piece in the jigsaw by helping European industry to sustain a leading role in telecommunications and manufacturing of high-value products and machinery by delivering pioneering converged wireless networking solutions that can be successfully demonstrated. This paper provides an overview of the LOOP project and the key achievements that have been tunneled into first prototypes for showcasing next generation services for operators and process manufacturers.

  7. Exploring Processes and Outcomes of Wireless Internet in Higher Education: A Case Study of a University's Early Experience

    Science.gov (United States)

    Lee, Lisa

    2007-01-01

    Many universities in the UK have recently started offering their staff and students free wireless Internet access through Wireless Local Area Network (WLAN) technologies, such as Wi-Fi. Based on a small empirical study of WLAN deployment in a university setting, the article explores adoption processes of the new technology by both the organisation…

  8. Transmit Power Optimisation in Wireless Network

    Directory of Open Access Journals (Sweden)

    Besnik Terziu

    2011-09-01

    Full Text Available Transmit power optimisation in wireless networks based on beamforming have emerged as a promising technique to enhance the spectrum efficiency of present and future wireless communication systems. The aim of this study is to minimise the access point power consumption in cellular networks while maintaining a targeted quality of service (QoS for the mobile terminals. In this study, the targeted quality of service is delivered to a mobile station by providing a desired level of Signal to Interference and Noise Ratio (SINR. Base-stations are coordinated across multiple cells in a multi-antenna beamforming system. This study focuses on a multi-cell multi-antenna downlink scenario where each mobile user is equipped with a single antenna, but where multiple mobile users may be active simultaneously in each cell and are separated via spatial multiplexing using beamforming. The design criteria is to minimize the total weighted transmitted power across the base-stations subject to SINR constraints at the mobile users. The main contribution of this study is to define an iterative algorithm that is capable of finding the joint optimal beamformers for all basestations, based on a correlation-based channel model, the full-correlation model. Among all correlated channel models, the correlated channel model used in this study is the most accurate, giving the best performance in terms of power consumption. The environment here in this study is chosen to be Non-Light of- Sight (NLOS condition, where a signal from a wireless transmitter passes several obstructions before arriving at a wireless receiver. Moreover there are many scatterers local to the mobile, and multiple reflections can occur among them before energy arrives at the mobile. The proposed algorithm is based on uplink-downlink duality using the Lagrangian duality theory. Time-Division Duplex (TDD is chosen as the platform for this study since it has been adopted to the latest technologies in Fourth

  9. Structural processing for wireless communications

    CERN Document Server

    Lu, Jianhua; Ge, Ning

    2015-01-01

    This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.

  10. Radio Relays Improve Wireless Products

    Science.gov (United States)

    2009-01-01

    Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.

  11. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  12. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  13. Microwave materials for wireless applications

    CERN Document Server

    Cruickshank, David B

    2011-01-01

    This practical resource offers you an in-depth, up-to-date understanding of the use of microwave magnetic materials for cutting-edge wireless applications. The book discusses device applications used in wireless infrastructure base stations, point-to-point radio links, and a range of more specialized microwave systems. You find detailed discussions on the attributes of each family of magnetic materials with respect to specific wireless applications. Moreover, the book addresses two of the hottest topics in the field today - insertion loss and intermodulation. This comprehensive reference also

  14. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  15. Computational stability appraisal of rectangular natural circulation loop: Effect of loop inclination

    International Nuclear Information System (INIS)

    Krishnani, Mayur; Basu, Dipankar N.

    2017-01-01

    Highlights: • Computational model developed for single-phase rectangular natural circulation loop. • Role of loop inclination to vertical on thermalhydraulic stability is explored. • Inclination has strong stabilizing effect due to lower effective gravitation force. • Increase in tilt angle reduces settling time and highest amplitude of oscillation. • An angle of 15° is suggested for the selected loop geometry. - Abstract: Controlling stability behavior of single-phase natural circulation loops, without significantly affecting its steady-state characteristics, is a topic of wide research interest. Present study explores the role of loop inclination on a particular loop geometry. Accordingly a 3D computational model of a rectangular loop is developed and transient conservation equations are solved to obtain the temporal variation in flow parameters. Starting from the quiescent state, simulations are performed for selected sets of operating conditions and also with a few selected inclination angles. System experiences instability at higher heater powers and also with higher sink temperatures. Inclination is found to have a strong stabilizing influence owing to the reduction in the effective gravitational acceleration and subsequent decline in local buoyancy effects. The settling time and highest amplitude of oscillations substantially reduces for a stable system with a small inclination. Typically-unstable systems can also suppress the oscillations, when subjected to tilting, within a reasonable period of time. It is possible to stabilize the loop within shorter time span by increasing the tilt angle, but at the expense of reduction in steady-state flow rate. Overall a tilt angle of 15° is suggested for the selected geometry. Results from the 3D model is compared with the predictions from an indigenous 1D code. While similar qualitative influence of inclination is observed, the 1D model predicts early appearance of the stability threshold and hence hints

  16. Ototoxicity of loop diuretics.

    Science.gov (United States)

    Rybak, L P

    1993-10-01

    The loop diuretics are drugs that increase the excretion of water and electrolytes in the urine by their action on the cells in the loop of Henle. Clinical reports of ototoxicity of these agents are reviewed, and the results of a number of studies in experimental animals are discussed. These drugs can cause either a temporary, or in some cases, a permanent loss of hearing in patients. Animal experiments show that these drugs act on the stria vascularis, producing edema of these tissues and a temporary loss of function, resulting in a decrease of the endocochlear potential. This can result in secondary effects on sound-evoked measures of hearing. As new information unfolds about protective agents, it may be possible to preserve hearing and maintain the desired therapeutic effect.

  17. Loop Quantum Cosmology

    Directory of Open Access Journals (Sweden)

    Bojowald Martin

    2008-07-01

    Full Text Available Quantum gravity is expected to be necessary in order to understand situations in which classical general relativity breaks down. In particular in cosmology one has to deal with initial singularities, i.e., the fact that the backward evolution of a classical spacetime inevitably comes to an end after a finite amount of proper time. This presents a breakdown of the classical picture and requires an extended theory for a meaningful description. Since small length scales and high curvatures are involved, quantum effects must play a role. Not only the singularity itself but also the surrounding spacetime is then modified. One particular theory is loop quantum cosmology, an application of loop quantum gravity to homogeneous systems, which removes classical singularities. Its implications can be studied at different levels. The main effects are introduced into effective classical equations, which allow one to avoid the interpretational problems of quantum theory. They give rise to new kinds of early-universe phenomenology with applications to inflation and cyclic models. To resolve classical singularities and to understand the structure of geometry around them, the quantum description is necessary. Classical evolution is then replaced by a difference equation for a wave function, which allows an extension of quantum spacetime beyond classical singularities. One main question is how these homogeneous scenarios are related to full loop quantum gravity, which can be dealt with at the level of distributional symmetric states. Finally, the new structure of spacetime arising in loop quantum gravity and its application to cosmology sheds light on more general issues, such as the nature of time.

  18. Loop Quantum Cosmology.

    Science.gov (United States)

    Bojowald, Martin

    2008-01-01

    Quantum gravity is expected to be necessary in order to understand situations in which classical general relativity breaks down. In particular in cosmology one has to deal with initial singularities, i.e., the fact that the backward evolution of a classical spacetime inevitably comes to an end after a finite amount of proper time. This presents a breakdown of the classical picture and requires an extended theory for a meaningful description. Since small length scales and high curvatures are involved, quantum effects must play a role. Not only the singularity itself but also the surrounding spacetime is then modified. One particular theory is loop quantum cosmology, an application of loop quantum gravity to homogeneous systems, which removes classical singularities. Its implications can be studied at different levels. The main effects are introduced into effective classical equations, which allow one to avoid the interpretational problems of quantum theory. They give rise to new kinds of early-universe phenomenology with applications to inflation and cyclic models. To resolve classical singularities and to understand the structure of geometry around them, the quantum description is necessary. Classical evolution is then replaced by a difference equation for a wave function, which allows an extension of quantum spacetime beyond classical singularities. One main question is how these homogeneous scenarios are related to full loop quantum gravity, which can be dealt with at the level of distributional symmetric states. Finally, the new structure of spacetime arising in loop quantum gravity and its application to cosmology sheds light on more general issues, such as the nature of time. Supplementary material is available for this article at 10.12942/lrr-2008-4.

  19. Closing the loop.

    Science.gov (United States)

    Dassau, E; Atlas, E; Phillip, M

    2010-02-01

    The dream of closing the loop is actually the dream of creating an artificial pancreas and freeing the patients from being involved with the care of their own diabetes. Insulin-dependent diabetes (type 1) is a chronic incurable disease which requires constant therapy without the possibility of any 'holidays' or insulin-free days. It means that patients have to inject insulin every day of their life, several times per day, and in order to do it safely they also have to measure their blood glucose levels several times per day. Patients need to plan their meals, their physical activities and their insulin regime - there is only very small room for spontaneous activities. This is why the desire for an artificial pancreas is so strong despite the fact that it will not cure the diabetic patients. Attempts to develop a closed-loop system started in the 1960s but never got to a clinical practical stage of development. In recent years the availability of continuous glucose sensors revived those efforts and stimulated the clinician and researchers to believe that closing the loop might be possible nowadays. Many papers have been published over the years describing several different ideas on how to close the loop. Most of the suggested systems have a sensing arm that measures the blood glucose repeatedly or continuously, an insulin delivery arm that injects insulin upon command and a computer that makes the decisions of when and how much insulin to deliver. The differences between the various published systems in the literature are mainly in their control algorithms. However, there are also differences related to the method and site of glucose measurement and insulin delivery. SC glucose measurements and insulin delivery are the most studied option but other combinations of insulin measurements and glucose delivery including intravascular and intraperitoneal (IP) are explored. We tried to select recent publications that we believe had influenced and inspired people interested

  20. Loop Quantum Cosmology

    Directory of Open Access Journals (Sweden)

    Bojowald Martin

    2005-12-01

    Full Text Available Quantum gravity is expected to be necessary in order to understand situations where classical general relativity breaks down. In particular in cosmology one has to deal with initial singularities, i.e., the fact that the backward evolution of a classical space-time inevitably comes to an end after a finite amount of proper time. This presents a breakdown of the classical picture and requires an extended theory for a meaningful description. Since small length scales and high curvatures are involved, quantum effects must play a role. Not only the singularity itself but also the surrounding space-time is then modified. One particular realization is loop quantum cosmology, an application of loop quantum gravity to homogeneous systems, which removes classical singularities. Its implications can be studied at different levels. Main effects are introduced into effective classical equations which allow to avoid interpretational problems of quantum theory. They give rise to new kinds of early universe phenomenology with applications to inflation and cyclic models. To resolve classical singularities and to understand the structure of geometry around them, the quantum description is necessary. Classical evolution is then replaced by a difference equation for a wave function which allows to extend space-time beyond classical singularities. One main question is how these homogeneous scenarios are related to full loop quantum gravity, which can be dealt with at the level of distributional symmetric states. Finally, the new structure of space-time arising in loop quantum gravity and its application to cosmology sheds new light on more general issues such as time.

  1. Advanced Wireless Integrated Navy Network

    National Research Council Canada - National Science Library

    Stutzman, Warren; Habayeb, Rick

    2005-01-01

    Quarterly progress report No. I on AWINN hardware and software configurations of smart, wideband, multi-function antennas, secure configurable platform, close-in command and control for Sea Basing visualization of wireless...

  2. Wireless Damage Location Sensing System

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant Douglas (Inventor)

    2012-01-01

    A wireless damage location sensing system uses a geometric-patterned wireless sensor that resonates in the presence of a time-varying magnetic field to generate a harmonic response that will experience a change when the sensor experiences a change in its geometric pattern. The sensing system also includes a magnetic field response recorder for wirelessly transmitting the time-varying magnetic field and for wirelessly detecting the harmonic response. The sensing system compares the actual harmonic response to a plurality of predetermined harmonic responses. Each predetermined harmonic response is associated with a severing of the sensor at a corresponding known location thereof so that a match between the actual harmonic response and one of the predetermined harmonic responses defines the known location of the severing that is associated therewith.

  3. Wireless cortical implantable systems

    CERN Document Server

    Majidzadeh Bafar, Vahid

    2013-01-01

    Wireless Cortical Implantable Systems examines the design for data acquisition and transmission in cortical implants. The first part of the book covers existing system-level cortical implants, as well as future devices. The authors discuss the major constraints in terms of microelectronic integration. The second part of the book focuses on system-level as well as circuit and system level solutions to the development of ultra low-power and low-noise microelectronics for cortical implants. Existing solutions are presented and novel methods and solutions proposed. The third part of the book focuses on the usage of digital impulse radio ultra wide-band transmission as an efficient method to transmit cortically neural recorded data at high data-rate to the outside world. Original architectural and circuit and system solutions are discussed.

  4. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  5. Wireless Josephson amplifier

    International Nuclear Information System (INIS)

    Narla, A.; Sliwa, K. M.; Hatridge, M.; Shankar, S.; Frunzio, L.; Schoelkopf, R. J.; Devoret, M. H.

    2014-01-01

    Josephson junction parametric amplifiers are playing a crucial role in the readout chain in superconducting quantum information experiments. However, their integration with current 3D cavity implementations poses the problem of transitioning between waveguide, coax cables, and planar circuits. Moreover, Josephson amplifiers require auxiliary microwave components, like directional couplers and/or hybrids, that are sources of spurious losses and impedance mismatches that limit measurement efficiency and amplifier tunability. We have developed a wireless architecture for these parametric amplifiers that eliminates superfluous microwave components and interconnects. This greatly simplifies their assembly and integration into experiments. We present an experimental realization of such a device operating in the 9–11 GHz band with about 100 MHz of amplitude gain-bandwidth product, on par with devices mounted in conventional sample holders. The simpler impedance environment presented to the amplifier also results in increased amplifier tunability.

  6. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  7. Wireless Communications in Reverberant Environments

    Science.gov (United States)

    2015-01-01

    solutions exist which can be tailored to meet the needs nearly any wireless application. Some notable current solutions include USRPs [27] and GNURadio ...tailored to meet the needs nearly any wireless application. Some notable current solutions include USRPs [27] and GNURadio [28]. For this effort, the WARPv3...en.wikipedia.org/wiki/List of software-defined radios [27] “Ettus research.” [Online]. Available: http://www.ettus.com [28] “ Gnuradio .” [Online]. Available: http

  8. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  9. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  10. Loop models on random maps via nested loops: the case of domain symmetry breaking and application to the Potts model

    Science.gov (United States)

    Borot, G.; Bouttier, J.; Guitter, E.

    2012-12-01

    We use the nested loop approach to investigate loop models on random planar maps where the domains delimited by the loops are given two alternating colors, which can be assigned different local weights, hence allowing for an explicit Z2 domain symmetry breaking. Each loop receives a non-local weight n, as well as a local bending energy which controls loop turns. By a standard cluster construction that we review, the Q = n2 Potts model on general random maps is mapped to a particular instance of this problem with domain-non-symmetric weights. We derive in full generality a set of coupled functional relations for a pair of generating series which encode the enumeration of loop configurations on maps with a boundary of a given color, and solve it by extending well-known complex analytic techniques. In the case where loops are fully packed, we analyze in detail the phase diagram of the model and derive exact equations for the position of its non-generic critical points. In particular, we underline that the critical Potts model on general random maps is not self-dual whenever Q ≠ 1. In a model with domain-symmetric weights, we also show the possibility of a spontaneous domain symmetry breaking driven by the bending energy. This article is part of ‘Lattice models and integrability’, a special issue of Journal of Physics A: Mathematical and Theoretical in honour of F Y Wu's 80th birthday.

  11. A geometrical perspective on localization

    NARCIS (Netherlands)

    Dulman, S.O.; Baggio, A.; Havinga, Paul J.M.; Langendoen, K.G.; Zhang, Ying; Ye, Yinyu

    2008-01-01

    A large number of localization algorithms for wireless sensor networks (WSNs) are evaluated against the Cramer-Rao Bound (CRB) as an indicator of how good the algorithm performs. The CRB defines the lower bound on the precision of an unbiased localization estimator. The CRB concept, borrowed from

  12. Alternative Path Communication in Wide-Scale Cluster-Tree Wireless Sensor Networks Using Inactive Periods.

    Science.gov (United States)

    Leão, Erico; Montez, Carlos; Moraes, Ricardo; Portugal, Paulo; Vasques, Francisco

    2017-05-06

    The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable technology to deploy wide-scale Wireless Sensor Networks (WSNs). These networks are usually designed to support convergecast traffic, where all communication paths go through the PAN (Personal Area Network) coordinator. Nevertheless, peer-to-peer communication relationships may be also required for different types of WSN applications. That is the typical case of sensor and actuator networks, where local control loops must be closed using a reduced number of communication hops. The use of communication schemes optimised just for the support of convergecast traffic may result in higher network congestion and in a potentially higher number of communication hops. Within this context, this paper proposes an Alternative-Route Definition (ARounD) communication scheme for WSNs. The underlying idea of ARounD is to setup alternative communication paths between specific source and destination nodes, avoiding congested cluster-tree paths. These alternative paths consider shorter inter-cluster paths, using a set of intermediate nodes to relay messages during their inactive periods in the cluster-tree network. Simulation results show that the ARounD communication scheme can significantly decrease the end-to-end communication delay, when compared to the use of standard cluster-tree communication schemes. Moreover, the ARounD communication scheme is able to reduce the network congestion around the PAN coordinator, enabling the reduction of the number of message drops due to queue overflows in the cluster-tree network.

  13. Two-loop statsum of superstrings

    Science.gov (United States)

    Morozov, A.

    1988-06-01

    We discuss, whether there is a choice of odd moduli on super-Riemann surfaces of genus p≳2, which leads to the vanishing of statistical sums of superstrings before integration over the space of even moduli. The answer is shown to be positive at least for p=2, when odd moduli are localized at ramification points. The relation between various definitions of many-loop statistical sums in superstring theory is discussed.

  14. Performance prediction of a synchronization link for distributed aerospace wireless systems.

    Science.gov (United States)

    Wang, Wen-Qin; Shao, Huaizong

    2013-01-01

    For reasons of stealth and other operational advantages, distributed aerospace wireless systems have received much attention in recent years. In a distributed aerospace wireless system, since the transmitter and receiver placed on separated platforms which use independent master oscillators, there is no cancellation of low-frequency phase noise as in the monostatic cases. Thus, high accurate time and frequency synchronization techniques are required for distributed wireless systems. The use of a dedicated synchronization link to quantify and compensate oscillator frequency instability is investigated in this paper. With the mathematical statistical models of phase noise, closed-form analytic expressions for the synchronization link performance are derived. The possible error contributions including oscillator, phase-locked loop, and receiver noise are quantified. The link synchronization performance is predicted by utilizing the knowledge of the statistical models, system error contributions, and sampling considerations. Simulation results show that effective synchronization error compensation can be achieved by using this dedicated synchronization link.

  15. Hardware-in-the-Loop Simulation of Distributed Intelligent Energy Management System for Microgrids

    Directory of Open Access Journals (Sweden)

    Dong-Jun Won

    2013-07-01

    Full Text Available Microgrids are autonomous low-voltage power distribution systems that contain multiple distributed energy resources (DERs and smart loads that can provide power system operation flexibility. To effectively control and coordinate multiple DERs and loads of microgrids, this paper proposes a distributed intelligent management system that employs a multi-agent-based control system so that delicate decision-making functions can be distributed to local intelligent agents. This paper presents the development of a hardware-in-the-loop simulation (HILS system for distributed intelligent management system for microgrids and its promising application to an emergency demand response program. In the developed HILS system, intelligent agents are developed using microcontrollers and ZigBee wireless communication technology. Power system dynamic models are implemented in real-time simulation environments using the Opal-RT system. This paper presents key features of the data communication and management schemes based on multi-agent concepts. The performance of the developed system is tested for emergency demand response program applications.

  16. LoopIng: a template-based tool for predicting the structure of protein loops.

    KAUST Repository

    Messih, Mario Abdel

    2015-08-06

    Predicting the structure of protein loops is very challenging, mainly because they are not necessarily subject to strong evolutionary pressure. This implies that, unlike the rest of the protein, standard homology modeling techniques are not very effective in modeling their structure. However, loops are often involved in protein function, hence inferring their structure is important for predicting protein structure as well as function.We describe a method, LoopIng, based on the Random Forest automated learning technique, which, given a target loop, selects a structural template for it from a database of loop candidates. Compared to the most recently available methods, LoopIng is able to achieve similar accuracy for short loops (4-10 residues) and significant enhancements for long loops (11-20 residues). The quality of the predictions is robust to errors that unavoidably affect the stem regions when these are modeled. The method returns a confidence score for the predicted template loops and has the advantage of being very fast (on average: 1 min/loop).www.biocomputing.it/loopinganna.tramontano@uniroma1.itSupplementary data are available at Bioinformatics online.

  17. Large-Scale Wireless Temperature Monitoring System for Liquefied Petroleum Gas Storage Tanks.

    Science.gov (United States)

    Fan, Guangwen; Shen, Yu; Hao, Xiaowei; Yuan, Zongming; Zhou, Zhi

    2015-09-18

    Temperature distribution is a critical indicator of the health condition for Liquefied Petroleum Gas (LPG) storage tanks. In this paper, we present a large-scale wireless temperature monitoring system to evaluate the safety of LPG storage tanks. The system includes wireless sensors networks, high temperature fiber-optic sensors, and monitoring software. Finally, a case study on real-world LPG storage tanks proves the feasibility of the system. The unique features of wireless transmission, automatic data acquisition and management, local and remote access make the developed system a good alternative for temperature monitoring of LPG storage tanks in practical applications.

  18. Large-Scale Wireless Temperature Monitoring System for Liquefied Petroleum Gas Storage Tanks

    Directory of Open Access Journals (Sweden)

    Guangwen Fan

    2015-09-01

    Full Text Available Temperature distribution is a critical indicator of the health condition for Liquefied Petroleum Gas (LPG storage tanks. In this paper, we present a large-scale wireless temperature monitoring system to evaluate the safety of LPG storage tanks. The system includes wireless sensors networks, high temperature fiber-optic sensors, and monitoring software. Finally, a case study on real-world LPG storage tanks proves the feasibility of the system. The unique features of wireless transmission, automatic data acquisition and management, local and remote access make the developed system a good alternative for temperature monitoring of LPG storage tanks in practical applications.

  19. Three-loop corrections in a covariant effective field theory

    International Nuclear Information System (INIS)

    McIntire, Jeff

    2008-01-01

    Chiral effective field theories have been used with success in the study of nuclear structure. It is of interest to systematically improve these energy functionals (particularly that of quantum hadrodynamics) through the inclusion of many-body correlations. One possible source of improvement is the loop expansion. Using the techniques of Infrared Regularization, the short-range, local dynamics at each order in the loops is absorbed into the parameterization of the underlying effective Lagrangian. The remaining nonlocal, exchange correlations must be calculated explicitly. Given that the interactions of quantum hadrodynamics are relatively soft, the loop expansion may be manageable or even perturbative in nuclear matter. This work investigates the role played by the three-loop contributions to the loop expansion for quantum hadrodynamics

  20. Feasibility of Outpatient Fully Integrated Closed-Loop Control

    Science.gov (United States)

    Kovatchev, Boris P.; Renard, Eric; Cobelli, Claudio; Zisser, Howard C.; Keith-Hynes, Patrick; Anderson, Stacey M.; Brown, Sue A.; Chernavvsky, Daniel R.; Breton, Marc D.; Farret, Anne; Pelletier, Marie-Josée; Place, Jérôme; Bruttomesso, Daniela; Del Favero, Simone; Visentin, Roberto; Filippi, Alessio; Scotton, Rachele; Avogaro, Angelo; Doyle, Francis J.

    2013-01-01

    OBJECTIVE To evaluate the feasibility of a wearable artificial pancreas system, the Diabetes Assistant (DiAs), which uses a smart phone as a closed-loop control platform. RESEARCH DESIGN AND METHODS Twenty patients with type 1 diabetes were enrolled at the Universities of Padova, Montpellier, and Virginia and at Sansum Diabetes Research Institute. Each trial continued for 42 h. The United States studies were conducted entirely in outpatient setting (e.g., hotel or guest house); studies in Italy and France were hybrid hospital–hotel admissions. A continuous glucose monitoring/pump system (Dexcom Seven Plus/Omnipod) was placed on the subject and was connected to DiAs. The patient operated the system via the DiAs user interface in open-loop mode (first 14 h of study), switching to closed-loop for the remaining 28 h. Study personnel monitored remotely via 3G or WiFi connection to DiAs and were available on site for assistance. RESULTS The total duration of proper system communication functioning was 807.5 h (274 h in open-loop and 533.5 h in closed-loop), which represented 97.7% of the total possible time from admission to discharge. This exceeded the predetermined primary end point of 80% system functionality. CONCLUSIONS This study demonstrated that a contemporary smart phone is capable of running outpatient closed-loop control and introduced a prototype system (DiAs) for further investigation. Following this proof of concept, future steps should include equipping insulin pumps and sensors with wireless capabilities, as well as studies focusing on control efficacy and patient-oriented clinical outcomes. PMID:23801798

  1. 76 FR 21742 - Wireless Telecommunications Bureau Extends Period for Filing Comments and Reply Comments on...

    Science.gov (United States)

    2011-04-18

    ...In this document, the Wireless Telecommunications Bureau extends the deadline for filing comments and reply comments in response to the Public Notice seeking comment on the December 3, 2010 petition for declaratory ruling (Petition) filed by CTIA--The Wireless Association (Petitioners). The Petitioners asked the Federal Communications Commission (Commission) to clarify ``the scope of Section 332(c)(3)(A)'s ban on state and local entry regulation.''

  2. Millimeter-wave Wireless LAN and its Extension toward 5G Heterogeneous Networks

    OpenAIRE

    Sakaguchi, Kei; Mohamed, Ehab Mahmoud; Kusano, Hideyuki; Mizukami, Makoto; Miyamoto, Shinichi; Rezagah, Roya; Takinami, Koji; Takahashi, Kazuaki; Shirakata, Naganori; Peng, Hailan; Yamamoto, Toshiaki; Namba, Shinobu

    2015-01-01

    Millimeter-wave (mmw) frequency bands, especially 60 GHz unlicensed band, are considered as a promising solution for gigabit short range wireless communication systems. IEEE standard 802.11ad, also known as WiGig, is standardized for the usage of the 60 GHz unlicensed band for wireless local area networks (WLANs). By using this mmw WLAN, multi-Gbps rate can be achieved to support bandwidth-intensive multimedia applications. Exhaustive search along with beamforming (BF) is usually used to over...

  3. On some properties of conjugacy closed loops

    International Nuclear Information System (INIS)

    Adeniran, John Olusola

    2002-07-01

    It is shown that central loops are not conjugacy closed loops but instead are loops of units in their loop algebras that are conjugacy closed. It is also shown that certain inner mappings of a conjugacy closed loop are nuclear. Some invariants of left conjugacy closed loops are obtained. (author)

  4. Parallel tiled Nussinov RNA folding loop nest generated using both dependence graph transitive closure and loop skewing.

    Science.gov (United States)

    Palkowski, Marek; Bielecki, Wlodzimierz

    2017-06-02

    RNA secondary structure prediction is a compute intensive task that lies at the core of several search algorithms in bioinformatics. Fortunately, the RNA folding approaches, such as the Nussinov base pair maximization, involve mathematical operations over affine control loops whose iteration space can be represented by the polyhedral model. Polyhedral compilation techniques have proven to be a powerful tool for optimization of dense array codes. However, classical affine loop nest transformations used with these techniques do not optimize effectively codes of dynamic programming of RNA structure predictions. The purpose of this paper is to present a novel approach allowing for generation of a parallel tiled Nussinov RNA loop nest exposing significantly higher performance than that of known related code. This effect is achieved due to improving code locality and calculation parallelization. In order to improve code locality, we apply our previously published technique of automatic loop nest tiling to all the three loops of the Nussinov loop nest. This approach first forms original rectangular 3D tiles and then corrects them to establish their validity by means of applying the transitive closure of a dependence graph. To produce parallel code, we apply the loop skewing technique to a tiled Nussinov loop nest. The technique is implemented as a part of the publicly available polyhedral source-to-source TRACO compiler. Generated code was run on modern Intel multi-core processors and coprocessors. We present the speed-up factor of generated Nussinov RNA parallel code and demonstrate that it is considerably faster than related codes in which only the two outer loops of the Nussinov loop nest are tiled.

  5. QED representation for the net of causal loops

    Science.gov (United States)

    Ciolli, Fabio; Ruzzi, Giuseppe; Vasselli, Ezio

    2015-06-01

    The present work tackles the existence of local gauge symmetries in the setting of Algebraic Quantum Field Theory (AQFT). The net of causal loops, previously introduced by the authors, is a model independent construction of a covariant net of local C*-algebras on any 4-dimensional globally hyperbolic space-time, aimed to capture structural properties of any reasonable quantum gauge theory. Representations of this net can be described by causal and covariant connection systems, and local gauge transformations arise as maps between equivalent connection systems. The present paper completes these abstract results, realizing QED as a representation of the net of causal loops in Minkowski space-time. More precisely, we map the quantum electromagnetic field Fμν, not free in general, into a representation of the net of causal loops and show that the corresponding connection system and the local gauge transformations find a counterpart in terms of Fμν.

  6. Traffic Profiling in Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Kirykos, Georgios

    2006-01-01

    .... Wireless sensor networks pose unique challenges and limitations to the traditional schemes, which are used in the other wireless networks for security protection, and are due mainly to the increased...

  7. CMOS circuits for passive wireless microsystems

    CERN Document Server

    Yuan, Fei

    2011-01-01

    Here is a comprehensive examination of CMOS circuits for passive wireless microsystems. Covers design challenges, fundamental issues of ultra-low power wireless communications, radio-frequency power harvesting, and advanced design techniques, and more.

  8. Wireless Sensor Portal Technology, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Mobitrum Corporation has demonstrated the feasibility in the Phase I of " A Wireless Sensor Portal Technology" and proposes a Phase II effort to develop a wireless...

  9. Kali Linux wireless penetration testing beginner's guide

    CERN Document Server

    Ramachandran, Vivek

    2015-01-01

    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

  10. High temperature storage loop :

    Energy Technology Data Exchange (ETDEWEB)

    Gill, David Dennis; Kolb, William J.

    2013-07-01

    A three year plan for thermal energy storage (TES) research was created at Sandia National Laboratories in the spring of 2012. This plan included a strategic goal of providing test capability for Sandia and for the nation in which to evaluate high temperature storage (>650ÀC) technology. The plan was to scope, design, and build a flow loop that would be compatible with a multitude of high temperature heat transfer/storage fluids. The High Temperature Storage Loop (HTSL) would be reconfigurable so that it was useful for not only storage testing, but also for high temperature receiver testing and high efficiency power cycle testing as well. In that way, HTSL was part of a much larger strategy for Sandia to provide a research and testing platform that would be integral for the evaluation of individual technologies funded under the SunShot program. DOEs SunShot program seeks to reduce the price of solar technologies to 6/kWhr to be cost competitive with carbon-based fuels. The HTSL project sought to provide evaluation capability for these SunShot supported technologies. This report includes the scoping, design, and budgetary costing aspects of this effort

  11. STUDY & SURVEY ON WIRELESS CHARGING & TECHNOLOGY

    OpenAIRE

    Harshal Sharma*

    2016-01-01

    In the modern world, we have often heard a word- wireless charging technology. Actually what is it all about? So this paper is giving you the whole package about wireless charging technology. Wireless charging is a technology through which power is transmitted through an air gap to the electrical devices for the motive of replenishment of energy. At present wireless charging techniques and development of commercial products have provided a promise to address the energy bottleneck of portable ...

  12. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  13. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  14. Techniques for Wireless Applications

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-05-01

    Switching techniques have been first proposed as a spacial diversity techniques. These techniques have been shown to reduce considerably the processing load while letting multi-antenna systems achieve a specific target performance. In this thesis, we take a different look at the switching schemes by implementing them for different other wireless applications. More specifically, this thesis consists of three main parts, where the first part considers a multiuser environment and an adaptive scheduling algorithm based on the switching with post-selection scheme for statistically independent but non-identically distributed channel conditions. The performance of this switched based scheduler is investigated and a multitude of performance metrics are presented. In a second part, we propose and analyze the performance of three switched-based algorithms for interference reduction in the downlink of over-loaded femtocells. For instance, performance metrics are derived in closed-form and these metrics are used to compare these three proposed schemes. Finally in a third part, a switch based opportunistic channel access scheme is proposed for a cognitive radio system and its performance is analyzed in terms of two new proposed metrics namely the average cognitive radio access and the waiting time duration.

  15. Wireless capsule endo bronchoscopy

    Directory of Open Access Journals (Sweden)

    Baratz DM

    2014-03-01

    Full Text Available No abstract available. Article truncated at 150 words. Case Presentation History of Present Illness A 67 year-old man presents 10 days after swallowing a capsule endoscopy camera that was never retrieved. The wireless capsule was swallowed asymptomatically for evaluation of heme positive stools after negative upper and lower endoscopies. Patient noted that the evening after swallowing the camera he developed mild shortness of breath and cough. The cough and shortness of breath were persistent and worsened while lying down and when moving positions. He denied prior issues with swallowing or aspiration. Review of Systems Negative other than what is noted above. PMH, SH, and FH Past medical history: coronary artery disease, peripheral vascular disease, hyperlipidemia Surgical history: femoral-popliteal bypass, previous shoulder and back surgery Social history: 1 pack/day of cigarettes for 50 years, prior alcohol usage but not current, no illicit drugs Family history: no pulmonary diseases Physical Exam Vital signs: temperature 36.7º C, heart rate 86 beats per minute ...

  16. Wideband Parameters Analysis and Validation for Indoor radio Channel at 60/70/80GHz for Gigabit Wireless Communication employing Isotropic, Horn and Omni directional Antenna

    OpenAIRE

    Affum, E.; Tchao, E. T.; Diawuo, K.; Agyekum, K.

    2013-01-01

    recently, applications of millimeter (mm) waves for high-speed broadband wireless local area network communication systems in indoor environment are increasingly gaining recognition as it provides gigabit-speed wireless communications with carrier-class performances over distances of a mile or more due to spectrum availability and wider bandwidth requirements. Collectively referred to as E-Band, the millimeter wave wireless technology present the potential to offer bandwidth delivery comparab...

  17. Advanced Wireless Sensor Nodes - MSFC

    Science.gov (United States)

    Varnavas, Kosta; Richeson, Jeff

    2017-01-01

    NASA field center Marshall Space Flight Center (Huntsville, AL), has invested in advanced wireless sensor technology development. Developments for a wireless microcontroller back-end were primarily focused on the commercial Synapse Wireless family of devices. These devices have many useful features for NASA applications, good characteristics and the ability to be programmed Over-The-Air (OTA). The effort has focused on two widely used sensor types, mechanical strain gauges and thermal sensors. Mechanical strain gauges are used extensively in NASA structural testing and even on vehicle instrumentation systems. Additionally, thermal monitoring with many types of sensors is extensively used. These thermal sensors include thermocouples of all types, resistive temperature devices (RTDs), diodes and other thermal sensor types. The wireless thermal board will accommodate all of these types of sensor inputs to an analog front end. The analog front end on each of the sensors interfaces to the Synapse wireless microcontroller, based on the Atmel Atmega128 device. Once the analog sensor output data is digitized by the onboard analog to digital converter (A/D), the data is available for analysis, computation or transmission. Various hardware features allow custom embedded software to manage battery power to enhance battery life. This technology development fits nicely into using numerous additional sensor front ends, including some of the low-cost printed circuit board capacitive moisture content sensors currently being developed at Auburn University.

  18. Wireless Communication Into MBB Heliostat Fields

    International Nuclear Information System (INIS)

    Garcia Navajas, G.

    2002-01-01

    Autonomous heliostats fields are a priority objective long time pursued by PSA. Removal of all the electric cables, trenches and related components will really mean an important cosi reduction in civil works and investment for future Solar Thermal Power Plants. Several previous developments have been required before making autonomous-heliostat fields an eventual reality. First, a new local control has been designed to adapt all heliostat components to work on 24Vdc supplied by a photovoltaic panel. Second, a specific radio modem has been designed for wireless Communications. In April 1999, the first autonomous heliostat was started up and main results were reported at the 10 SolarPACES International Symposium. The objective, fixed within the project SIREC fimded with theFEDER European Regional Development Program, has been to scale these concepts to a mini-field to demonstrate the feasibility of the wireless communication and operation with 20 MBB heliostats located at the North side of CRS facilities of PSA. A specific radio modem has been designed for this application thanks to the scientific cooperation agreement between the University of Almeria and CIEMAT. 50% of the heliostat field has been implemented with a commercial radio-modem and the other 50% with specific radio-modems to compare the performance and capabilities. The capacities of both systems will be analysed and the main data obtained from the test campaign carried out, will be showed. (Author) 12 refs

  19. WIRELESS FIDELITY (Wi-Fi) BROADBAND NETWORK ...

    African Journals Online (AJOL)

    ES Obe

    categorized into two types: fixed and mobile wireless. The broadband fixed wireless network technologies .... 3.0 WIRELESS FIDELITYF (Wi-Fi). NETWORK IMPLEMENTATION. A Wi-Fi enabled device such as a PC, game .... Amateur radio, video senders, and cordless phones, can cause significant additional interference.

  20. WirelessHART modeling and performance evaluation

    NARCIS (Netherlands)

    Remke, Anne Katharina Ingrid; Wu, Xian

    2013-01-01

    In process industries wired supervisory and control networks are more and more replaced by wireless systems. Wireless communication inevitably introduces time delays and message losses, which may degrade the system reliability and performance. WirelessHART, as the first international standard for

  1. Modeling of compact loop antennas

    International Nuclear Information System (INIS)

    Baity, F.W.

    1987-01-01

    A general compact loop antenna model which treats all elements of the antenna as lossy transmission lines has been developed. In addition to capacitively-tuned resonant double loop (RDL) antennas the model treats stub-tuned resonant double loop antennas. Calculations using the model have been compared with measurements on full-scale mockups of resonant double loop antennas for ATF and TFTR in order to refine the transmission line parameters. Results from the model are presented for RDL antenna designs for ATF, TFTR, Tore Supra, and for the Compact Ignition Tokamak

  2. Wireless device monitoring systems and monitoring devices, and associated methods

    Science.gov (United States)

    McCown, Steven H; Derr, Kurt W; Rohde, Kenneth W

    2014-05-27

    Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.

  3. Impact of wireless link quality across communication layers

    OpenAIRE

    Zhou, J.

    2010-01-01

    Nowadays, wireless networks are used in most of the applications with radio technologies being used in all kinds of wireless networks. In all wireless links, the transmitted packets can be lost. How to identify the quality of a certain wireless link and achieve the best delivery performance over a certain wireless network is an open issue. In this thesis, the performance of wireless mesh network, wireless sensor network and cellular network have been investigated by the method of measurements...

  4. Coding for MIMO-OFDM in future wireless systems

    CERN Document Server

    Ahmed, Bannour

    2015-01-01

    This book introduces the reader to the MIMO-OFDM system, in Rayleigh frequency selective-channels. Orthogonal frequency division multiplexing (OFDM) has been adopted in the wireless local-area network standards IEEE 802.11a due to its high spectral efficiency and ability to deal with frequency selective fading. The combination of OFDM with spectral efficient multiple antenna techniques makes the OFDM a good candidate to overcome the frequency selective problems.

  5. Vortex loops and Majoranas

    International Nuclear Information System (INIS)

    Chesi, Stefano; Jaffe, Arthur; Loss, Daniel; Pedrocchi, Fabio L.

    2013-01-01

    We investigate the role that vortex loops play in characterizing eigenstates of interacting Majoranas. We give some general results and then focus on ladder Hamiltonian examples as a test of further ideas. Two methods yield exact results: (i) A mapping of certain spin Hamiltonians to quartic interactions of Majoranas shows that the spectra of these two examples coincide. (ii) In cases with reflection-symmetric Hamiltonians, we use reflection positivity for Majoranas to characterize vortices in the ground states. Two additional methods suggest wider applicability of these results: (iii) Numerical evidence suggests similar behavior for certain systems without reflection symmetry. (iv) A perturbative analysis also suggests similar behavior without the assumption of reflection symmetry

  6. Dynamic PID loop control

    International Nuclear Information System (INIS)

    Pei, L.; Klebaner, A.; Theilacker, J.; Soyars, W.; Martinez, A.; Bossert, R.; DeGraff, B.; Darve, C.

    2011-01-01

    The Horizontal Test Stand (HTS) SRF Cavity and Cryomodule 1 (CM1) of eight 9-cell, 1.3GHz SRF cavities are operating at Fermilab. For the cryogenic control system, how to hold liquid level constant in the cryostat by regulation of its Joule-Thompson JT-valve is very important after cryostat cool down to 2.0 K. The 72-cell cryostat liquid level response generally takes a long time delay after regulating its JT-valve; therefore, typical PID control loop should result in some cryostat parameter oscillations. This paper presents a type of PID parameter self-optimal and Time-Delay control method used to reduce cryogenic system parameters oscillation.

  7. Closed loop reflux system

    International Nuclear Information System (INIS)

    De Witt, R.; Jepson, B.E.; Schwind, R.A.

    1975-01-01

    Sulfur isotopes are continuously separated and enriched using a closed loop reflux system wherein sulfur dioxide (SO 2 ) is reacted with sodium hydroxide (NaOH) or the like to form sodium hydrogen sulfite (NaHSO 3 ). Heavier sulfur isotopes are preferentially attracted to the NaHSO 3 , and subsequently reacted with sulfuric acid (H 2 SO 4 ) forming sodium hydrogen sulfate (NaHSO 4 ) and SO 2 gas, which contains increased concentrations of the heavier sulfur isotopes. This heavy isotope enriched SO 2 gas is subsequently separated and the NaHSO 4 is reacted with NaOH to form sodium sulfate (Na 2 SO 4 ), which is subsequently decomposed in an electrodialysis unit to form the NaOH and H 2 SO 4 components, which are used in the aforesaid reactions thereby effecting sulfur isotope separation and enrichment without objectionable loss of feed materials. (U.S.)

  8. Loop Quantum Gravity

    Directory of Open Access Journals (Sweden)

    Rovelli Carlo

    2008-07-01

    Full Text Available The problem of describing the quantum behavior of gravity, and thus understanding quantum spacetime, is still open. Loop quantum gravity is a well-developed approach to this problem. It is a mathematically well-defined background-independent quantization of general relativity, with its conventional matter couplings. Today research in loop quantum gravity forms a vast area, ranging from mathematical foundations to physical applications. Among the most significant results obtained so far are: (i The computation of the spectra of geometrical quantities such as area and volume, which yield tentative quantitative predictions for Planck-scale physics. (ii A physical picture of the microstructure of quantum spacetime, characterized by Planck-scale discreteness. Discreteness emerges as a standard quantum effect from the discrete spectra, and provides a mathematical realization of Wheeler’s “spacetime foam” intuition. (iii Control of spacetime singularities, such as those in the interior of black holes and the cosmological one. This, in particular, has opened up the possibility of a theoretical investigation into the very early universe and the spacetime regions beyond the Big Bang. (iv A derivation of the Bekenstein–Hawking black-hole entropy. (v Low-energy calculations, yielding n-point functions well defined in a background-independent context. The theory is at the roots of, or strictly related to, a number of formalisms that have been developed for describing background-independent quantum field theory, such as spin foams, group field theory, causal spin networks, and others. I give here a general overview of ideas, techniques, results and open problems of this candidate theory of quantum gravity, and a guide to the relevant literature.

  9. Loop Quantum Gravity.

    Science.gov (United States)

    Rovelli, Carlo

    2008-01-01

    The problem of describing the quantum behavior of gravity, and thus understanding quantum spacetime , is still open. Loop quantum gravity is a well-developed approach to this problem. It is a mathematically well-defined background-independent quantization of general relativity, with its conventional matter couplings. Today research in loop quantum gravity forms a vast area, ranging from mathematical foundations to physical applications. Among the most significant results obtained so far are: (i) The computation of the spectra of geometrical quantities such as area and volume, which yield tentative quantitative predictions for Planck-scale physics. (ii) A physical picture of the microstructure of quantum spacetime, characterized by Planck-scale discreteness. Discreteness emerges as a standard quantum effect from the discrete spectra, and provides a mathematical realization of Wheeler's "spacetime foam" intuition. (iii) Control of spacetime singularities, such as those in the interior of black holes and the cosmological one. This, in particular, has opened up the possibility of a theoretical investigation into the very early universe and the spacetime regions beyond the Big Bang. (iv) A derivation of the Bekenstein-Hawking black-hole entropy. (v) Low-energy calculations, yielding n -point functions well defined in a background-independent context. The theory is at the roots of, or strictly related to, a number of formalisms that have been developed for describing background-independent quantum field theory, such as spin foams, group field theory, causal spin networks, and others. I give here a general overview of ideas, techniques, results and open problems of this candidate theory of quantum gravity, and a guide to the relevant literature.

  10. Uranyl Nitrate Flow Loop

    International Nuclear Information System (INIS)

    Ladd-Lively, Jennifer L

    2008-01-01

    The objectives of the work discussed in this report were to: (1) develop a flow loop that would simulate the purified uranium-bearing aqueous stream exiting the solvent extraction process in a natural uranium conversion plant (NUCP); (2) develop a test plan that would simulate normal operation and disturbances that could be anticipated in an NUCP; (3) use the flow loop to test commercially available flowmeters for use as safeguards monitors; and (4) recommend a flowmeter for production-scale testing at an NUCP. There has been interest in safeguarding conversion plants because the intermediate products [uranium dioxide (UO 2 ), uranium tetrafluoride (UF 4 ), and uranium hexafluoride (UF 6 )] are all suitable uranium feedstocks for producing special nuclear materials. Furthermore, if safeguards are not applied virtually any nuclear weapons program can obtain these feedstocks without detection by the International Atomic Energy Agency (IAEA). Historically, IAEA had not implemented safeguards until the purified UF 6 product was declared as feedstock for enrichment plants. H. A. Elayat et al. provide a basic definition of a safeguards system: 'The function of a safeguards system on a chemical conversion plant is in general terms to verify that no useful nuclear material is being diverted to use in a nuclear weapons program'. The IAEA now considers all highly purified uranium compounds as candidates for safeguarding. DOE is currently interested in 'developing instruments, tools, strategies, and methods that could be of use to the IAEA in the application of safeguards' for materials found in the front end of the nuclear fuel cycle-prior to the production of the uranium hexafluoride or oxides that have been the traditional starting point for IAEA safeguards. Several national laboratories, including Oak Ridge, Los Alamos, Lawrence Livermore, and Brookhaven, have been involved in developing tools or techniques for safeguarding conversion plants. This study was sponsored by

  11. Wireless Augmented Reality Communication System

    Science.gov (United States)

    Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)

    2017-01-01

    A portable unit is for video communication to select a user name in a user name network. A transceiver wirelessly accesses a communication network through a wireless connection to a general purpose node coupled to the communication network. A user interface can receive user input to log on to a user name network through the communication network. The user name network has a plurality of user names, at least one of the plurality of user names is associated with a remote portable unit, logged on to the user name network and available for video communication.

  12. OFDM systems for wireless communications

    CERN Document Server

    Narasimhamurthy, Adarsh

    2010-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is

  13. Embracing interference in wireless systems

    CERN Document Server

    Gollakota, Shyamnath

    2014-01-01

    The wireless medium is a shared resource. If nearby devices transmit at thesame time, their signals interfere, resulting in a collision. In traditionalnetworks, collisions cause the loss of the transmitted information. For thisreason, wireless networks have been designed with the assumption thatinterference is intrinsically harmful and must be avoided.This book, a revised version of the author's award-winning Ph.D.dissertation, takes an alternate approach: Instead of viewing interferenceas an inherently counterproductive phenomenon that should to be avoided, wedesign practical systems that tra

  14. The Wireless Nursing Call System

    DEFF Research Database (Denmark)

    Jensen, Casper Bruun

    2006-01-01

    This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight into the cha......This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight...

  15. Artificial intelligence in wireless communications

    CERN Document Server

    Rondeau, Thomas W

    2009-01-01

    This cutting-edge resource offers practical overview of cognitive radio, a paradigm for wireless communications in which a network or a wireless node changes its transmission or reception parameters. The alteration of parameters is based on the active monitoring of several factors in the external and internal radio environment. This book offers a detailed description of cognitive radio and its individual parts. Practitioners learn how the basic processing elements and their capabilities are implemented as modular components. Moreover, the book explains how each component can be developed and t

  16. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  17. IEEE 802.11s Wireless Mesh Networks: Challenges and Perspectives

    Science.gov (United States)

    Sgora, Aggeliki; Vergados, Dimitris D.; Chatzimisios, Periklis

    A promising solution for wireless environments is the wireless mesh technology that envisages supplementing wired infrastructure with a wireless backbone for providing Internet connectivity to mobile nodes (MNs) or users in residential areas and offices. The IEEE 802.11 TGs has started to work in developing a mesh standard for local area wireless networks. Although a lot of progress has been made and a few new drafts have been released recently, there exist many issues that demand enhanced or even new solutions to 802.11s mesh networking. This paper aims to overview the latest version of the IEEE 802.11s protocol (Draft 2.02), especially the MAC and routing layers, and to point out the challenges that these networks have to overcome in these layers.

  18. Wirelessly addressable heater array for centrifugal microfluidics and Escherichia coli sterilization.

    Science.gov (United States)

    Chen, Xing; Song, Lele; Assadsangabi, Babak; Fang, Jie; Mohamed Ali, Mohamed Sultan; Takahata, Kenichi

    2013-01-01

    Localized temperature control and heater interface remain challenges in centrifugal microfluidics and integrated lab-on-a-chip devices. This paper presents a new wireless heating method that enables selective activation of micropatterned resonant heaters using external radiofrequency (RF) fields and its applications. The wireless heaters in an array are individually activated by modulating the frequency of the external field. Temperature of 93 °C is achieved in the heater when resonated with a 0.49-W RF output power. The wireless method is demonstrated to be fully effective for heating samples under spinning at high speeds, showing its applicability to centrifugal systems. Selective sterilization of Escherichia coli through the wireless heating is also demonstrated. Healthcare applications with a focus on wound sterilization are discussed along with preliminary experiments, showing promising results.

  19. [The Development of Information Centralization and Management Integration System for Monitors Based on Wireless Sensor Network].

    Science.gov (United States)

    Xu, Xiu; Zhang, Honglei; Li, Yiming; Li, Bin

    2015-07-01

    Developed the information centralization and management integration system for monitors of different brands and models with wireless sensor network technologies such as wireless location and wireless communication, based on the existing wireless network. With adaptive implementation and low cost, the system which possesses the advantages of real-time, efficiency and elaboration is able to collect status and data of the monitors, locate the monitors, and provide services with web server, video server and locating server via local network. Using an intranet computer, the clinical and device management staffs can access the status and parameters of monitors. Applications of this system provide convenience and save human resource for clinical departments, as well as promote the efficiency, accuracy and elaboration for the device management. The successful achievement of this system provides solution for integrated and elaborated management of the mobile devices including ventilator and infusion pump.

  20. Efficient Wireless Charger Deployment for Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jehn-Ruey Jiang

    2016-08-01

    Full Text Available A wireless rechargeable sensor network (WRSN consists of sensor nodes that can harvest energy emitted from wireless chargers for refilling their batteries so that the WRSN can operate sustainably. This paper assumes wireless chargers are equipped with directional antennas, and are deployed on grid points of a fixed height to propose two heuristic algorithms solving the following wireless charger deployment optimization (WCDO problem: how to deploy as few as possible chargers to make the WRSN sustainable. Both algorithms model the charging space of chargers as a cone and calculate charging efficiency according power regression expressions complying with the Friis transmission equation. The two algorithms are the greedy cone covering (GCC algorithm and the adaptive cone covering (ACC algorithm. The GCC (respectively, ACC algorithm greedily (respectively, adaptively generates candidate cones to cover as many as possible sensor nodes. Both algorithms then greedily select the fewest number of candidate cones, each of which corresponds to the deployment of a charger, to have approximate solutions to the WCDO problem. We perform experiments, conduct simulations and do analyses for the algorithms to compare them in terms of the time complexity, the number of chargers deployed, and the execution time.

  1. Wireless Ways: Business and Personal Applications of Wireless Technology.

    Science.gov (United States)

    Chung, Joe

    2001-01-01

    Describes the Art Technology Group (ATG), an electronic business and customer management company, and the work they have done with wireless technology. Highlights include designing virtual offices and supporting the resulting virtual community; the mobility it allows; problems with bandwidth; and display issues. (LRW)

  2. Loop quantum cosmology: Recent progress

    Indian Academy of Sciences (India)

    Aspects of the full theory of loop quantum gravity can be studied in a simpler context by reducing to symmetric models like cosmological ones. This leads to several applications where loop effects play a significant role when one is sensitive to the quantum regime. As a consequence, the structure of and the approach to ...

  3. RCD+: Fast loop modeling server.

    Science.gov (United States)

    López-Blanco, José Ramón; Canosa-Valls, Alejandro Jesús; Li, Yaohang; Chacón, Pablo

    2016-07-08

    Modeling loops is a critical and challenging step in protein modeling and prediction. We have developed a quick online service (http://rcd.chaconlab.org) for ab initio loop modeling combining a coarse-grained conformational search with a full-atom refinement. Our original Random Coordinate Descent (RCD) loop closure algorithm has been greatly improved to enrich the sampling distribution towards near-native conformations. These improvements include a new workflow optimization, MPI-parallelization and fast backbone angle sampling based on neighbor-dependent Ramachandran probability distributions. The server starts by efficiently searching the vast conformational space from only the loop sequence information and the environment atomic coordinates. The generated closed loop models are subsequently ranked using a fast distance-orientation dependent energy filter. Top ranked loops are refined with the Rosetta energy function to obtain accurate all-atom predictions that can be interactively inspected in an user-friendly web interface. Using standard benchmarks, the average root mean squared deviation (RMSD) is 0.8 and 1.4 Å for 8 and 12 residues loops, respectively, in the challenging modeling scenario in where the side chains of the loop environment are fully remodeled. These results are not only very competitive compared to those obtained with public state of the art methods, but also they are obtained ∼10-fold faster. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  4. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...

  5. Graphical Model Theory for Wireless Sensor Networks

    International Nuclear Information System (INIS)

    Davis, William B.

    2002-01-01

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm

  6. Graphical Model Theory for Wireless Sensor Networks

    Energy Technology Data Exchange (ETDEWEB)

    Davis, William B.

    2002-12-08

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm.

  7. Higher dimensional loop quantum cosmology

    International Nuclear Information System (INIS)

    Zhang, Xiangdong

    2016-01-01

    Loop quantum cosmology (LQC) is the symmetric sector of loop quantum gravity. In this paper, we generalize the structure of loop quantum cosmology to the theories with arbitrary spacetime dimensions. The isotropic and homogeneous cosmological model in n + 1 dimensions is quantized by the loop quantization method. Interestingly, we find that the underlying quantum theories are divided into two qualitatively different sectors according to spacetime dimensions. The effective Hamiltonian and modified dynamical equations of n + 1 dimensional LQC are obtained. Moreover, our results indicate that the classical big bang singularity is resolved in arbitrary spacetime dimensions by a quantum bounce. We also briefly discuss the similarities and differences between the n + 1 dimensional model and the 3 + 1 dimensional one. Our model serves as a first example of higher dimensional loop quantum cosmology and offers the possibility to investigate quantum gravity effects in higher dimensional cosmology. (orig.)

  8. Holographical description of BPS Wilson loops in flavored ABJM theory

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Bin [Department of Physics, and State Key Laboratory of Nuclear Physics and Technology,Peking University, 5 Yiheyuan Rd, Beijing 100871 (China); Collaborative Innovation Center of Quantum Matter,5 Yiheyuan Rd, Beijing 100871 (China); Center for High Energy Physics, Peking University,5 Yiheyuan Rd, Beijing 100871 (China); Wu, Jun-Bao [Institute of High Energy Physics, and Theoretical Physics Center for Science Facilities,Chinese Academy of Sciences, 19B Yuquan Road, Beijing 100049 (China); Zhu, Meng-Qi [SISSA,Via Bonomea 265, I 34136, Trieste (Italy)

    2014-12-22

    As holographic description of BPS Wilson loops in N=3 flavored ABJM theory with N{sub f}=k=1, BPS M2-branes in AdS{sub 4}×N(1,1) are studied in details. Two 1/3-BPS membrane configurations are found. One of them is dual to the 1/3-BPS Wilson loop of Gaiotto-Yin type. The regulated membrane action captures precisely the leading exponential behavior of the vacuum expectation values of 1/3-BPS Wilson loops in the strong coupling limit, which was computed before using supersymmetric localization technique. Moreover, there is no BPS membrane with more supersymmetries in the background, under quite natural assumption on the membrane worldvolume. This suggests that there is no Wilson loop preserving more than 1/3 supersymmetries in such flavored ABJM theory.

  9. Conformal anomaly of generalized form factors and finite loop integrals

    CERN Document Server

    Chicherin, Dmitry

    2017-01-01

    We reveal a new mechanism of conformal symmetry breaking at Born level. It occurs in generalized form factors with several local operators and an on-shell state of massless particles. The effect is due to hidden singularities on collinear configurations of the momenta. This conformal anomaly is different from the holomorphic anomaly of amplitudes. We present a number of examples in four and six dimensions. We find an application of the new conformal anomaly to finite loop momentum integrals with one or more massless legs. The collinear region around a massless leg creates a contact anomaly, made visible by the loop integration. The anomalous conformal Ward identity for an $\\ell-$loop integral is a 2nd-order differential equation whose right-hand side is an $(\\ell-1)-$loop integral. We show several examples, in particular the four-dimensional scalar double box.

  10. Ultra-miniature wireless temperature sensor for thermal medicine applications.

    Science.gov (United States)

    Khairi, Ahmad; Hung, Shih-Chang; Paramesh, Jeyanandh; Fedder, Gary; Rabin, Yoed

    2011-01-01

    This study presents a prototype design of an ultra-miniature, wireless, battery-less, and implantable temperature-sensor, with applications to thermal medicine such as cryosurgery, hyperthermia, and thermal ablation. The design aims at a sensory device smaller than 1.5 mm in diameter and 3 mm in length, to enable minimally invasive deployment through a hypodermic needle. While the new device may be used for local temperature monitoring, simultaneous data collection from an array of such sensors can be used to reconstruct the 3D temperature field in the treated area, offering a unique capability in thermal medicine. The new sensory device consists of three major subsystems: a temperature-sensing core, a wireless data-communication unit, and a wireless power reception and management unit. Power is delivered wirelessly to the implant from an external source using an inductive link. To meet size requirements while enhancing reliability and minimizing cost, the implant is fully integrated in a regular foundry CMOS technology (0.15 μm in the current study), including the implant-side inductor of the power link. A temperature-sensing core that consists of a proportional-to-absolute-temperature (PTAT) circuit has been designed and characterized. It employs a microwatt chopper stabilized op-amp and dynamic element-matched current sources to achieve high absolute accuracy. A second order sigma-delta (Σ-Δ) analog-to-digital converter (ADC) is designed to convert the temperature reading to a digital code, which is transmitted by backscatter through the same antenna used for receiving power. A high-efficiency multi-stage differential CMOS rectifier has been designed to provide a DC supply to the sensing and communication subsystems. This paper focuses on the development of the all-CMOS temperature sensing core circuitry part of the device, and briefly reviews the wireless power delivery and communication subsystems.

  11. Wireless Power for Mobile Devices

    NARCIS (Netherlands)

    Waffenschmidt, E.

    2011-01-01

    Wireless power transfer allows a convenient, easy to use battery charging of mobile phones and other mobile devices. No hassle with cables and plugs, just place the device on a pad and that’s it. Such asystem even has the potential to become a standard charging solution. Where are the limits for

  12. Socially Aware Heterogeneous Wireless Networks.

    Science.gov (United States)

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-06-11

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  13. Underwater optical wireless communication network

    Science.gov (United States)

    Arnon, Shlomi

    2010-01-01

    The growing need for underwater observation and subsea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, biogeochemical, evolutionary, and ecological changes in the sea, ocean, and lake environments, and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. Models are presented for three kinds of optical wireless communication links: (a) a line-of-sight link, (b) a modulating retroreflector link, and (c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered light it was possible to mitigate this decrease in some cases. It is concluded from the analysis that a high-data-rate underwater optical wireless network is a feasible solution for emerging applications such as UUV-to-UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  14. Data centric wireless sensor networks

    NARCIS (Netherlands)

    Dulman, S.O.; Havinga, Paul J.M.

    2005-01-01

    The vision of wirteless sensing systems requires the development of devices and technologies that can be pervasive without being intrusive. The basic component of such a smart environment will be a small node with sensing and wireless communications capabilities, able to organize itself flexibly

  15. Wireless Crew Communication Feasibility Assessment

    Science.gov (United States)

    Archer, Ronald D.; Romero, Andy; Juge, David

    2016-01-01

    Ongoing discussions with crew currently onboard the ISS as well as the crew debriefs from completed ISS missions indicate that issues associated with the lack of wireless crew communication results in increased crew task completion times and lower productivity, creates cable management issues, and increases crew frustration.

  16. Deployable Wireless Camera Penetrators

    Science.gov (United States)

    Badescu, Mircea; Jones, Jack; Sherrit, Stewart; Wu, Jiunn Jeng

    2008-01-01

    A lightweight, low-power camera dart has been designed and tested for context imaging of sampling sites and ground surveys from an aerobot or an orbiting spacecraft in a microgravity environment. The camera penetrators also can be used to image any line-of-sight surface, such as cliff walls, that is difficult to access. Tethered cameras to inspect the surfaces of planetary bodies use both power and signal transmission lines to operate. A tether adds the possibility of inadvertently anchoring the aerobot, and requires some form of station-keeping capability of the aerobot if extended examination time is required. The new camera penetrators are deployed without a tether, weigh less than 30 grams, and are disposable. They are designed to drop from any altitude with the boost in transmitting power currently demonstrated at approximately 100-m line-of-sight. The penetrators also can be deployed to monitor lander or rover operations from a distance, and can be used for surface surveys or for context information gathering from a touch-and-go sampling site. Thanks to wireless operation, the complexity of the sampling or survey mechanisms may be reduced. The penetrators may be battery powered for short-duration missions, or have solar panels for longer or intermittent duration missions. The imaging device is embedded in the penetrator, which is dropped or projected at the surface of a study site at 90 to the surface. Mirrors can be used in the design to image the ground or the horizon. Some of the camera features were tested using commercial "nanny" or "spy" camera components with the charge-coupled device (CCD) looking at a direction parallel to the ground. Figure 1 shows components of one camera that weighs less than 8 g and occupies a volume of 11 cm3. This camera could transmit a standard television signal, including sound, up to 100 m. Figure 2 shows the CAD models of a version of the penetrator. A low-volume array of such penetrator cameras could be deployed from an

  17. Toward precision holography with supersymmetric Wilson loops

    Energy Technology Data Exchange (ETDEWEB)

    Faraggi, Alberto [Instituto de Física, Pontificia Universidad Católica de Chile,Casilla 306, Santiago (Chile); Zayas, Leopoldo A. Pando [The Abdus Salam International Centre for Theoretical Physics,Strada Costiera 11, 34014 Trieste (Italy); Michigan Center for Theoretical Physics, Department of Physics,University of Michigan, Ann Arbor, MI 48109 (United States); Silva, Guillermo A. [Instituto de Física de La Plata - CONICET & Departamento de Física - UNLP,C.C. 67, 1900 La Plata (Argentina); Trancanelli, Diego [Institute of Physics, University of São Paulo,05314-970 São Paulo (Brazil)

    2016-04-11

    We consider certain 1/4 BPS Wilson loop operators in SU(N)N=4 supersymmetric Yang-Mills theory, whose expectation value can be computed exactly via supersymmetric localization. Holographically, these operators are mapped to fundamental strings in AdS{sub 5}×S{sup 5}. The string on-shell action reproduces the large N and large coupling limit of the gauge theory expectation value and, according to the AdS/CFT correspondence, there should also be a precise match between subleading corrections to these limits. We perform a test of such match at next-to-leading order in string theory, by deriving the spectrum of quantum fluctuations around the classical string solution and by computing the corresponding 1-loop effective action. We discuss in detail the supermultiplet structure of the fluctuations. To remove a possible source of ambiguity in the ghost zero mode measure, we compare the 1/4 BPS configuration with the 1/2 BPS one, dual to a circular Wilson loop. We find a discrepancy between the string theory result and the gauge theory prediction, confirming a previous result in the literature. We are able to track the modes from which this discrepancy originates, as well as the modes that by themselves would give the expected result.

  18. Two loop scalar bilinears for inflationary SQED

    Energy Technology Data Exchange (ETDEWEB)

    Prokopec, T [Institute for Theoretical Physics and Spinoza Institute, Utrecht University Leuvenlaan 4, Postbus 80.195, 3508 TD Utrecht (Netherlands); Tsamis, N C [Department of Physics, University of Crete GR-710 03 Heraklion, Hellas (Greece); Woodard, R P [Department of Physics, University of Florida Gainesville, FL 32611 (United States)

    2007-01-07

    We evaluate the one- and two-loop contributions to the expectation values of two coincident and gauge invariant scalar bilinears in the theory of massless, minimally coupled scalar quantum electrodynamics on a locally de Sitter background. One of these bilinears is the product of two covariantly differentiated scalars, the other is the product of two undifferentiated scalars. The computations are done using dimensional regularization and the Schwinger-Keldysh formalism. Our results are in perfect agreement with the stochastic predictions at this order.

  19. Wireless and mobile systems in telemedicine

    Directory of Open Access Journals (Sweden)

    Reza Safdari

    2012-12-01

    Full Text Available Background: It is necessary to deploy mobile and wireless systems in healthcare, because they have many benefits for healthcare systems. The objectives of this article were introducing various systems, applications, and standards of the wireless and mobile telemedicine. Material and Methods: This review study was conducted in 2010. To conduct the study, published articles in the years 2005 to 2012, in English with an emphasis on wireless and mobile technologies in health were studied. Search was done with key words include telemedicine, wireless health systems, health and telecommunications technology in databases including Pubmed, Science Direct, Google Scholar, Web of Sciences, Proquest. The collected data were analyzed. Results: Telemedicine system in the ambulance, telemedicine systems in space, telecardiology systems, EEG system, ultrasound system are some types of wireless and mobile systems in telemedicine. PDA-based mobile and wireless telemedicine application, based PDA drug application, and patient tracking application are some of wireless and mobile applications of telemedicine. The most important standards of wireless and mobile telemedicine are HL7, DICOM, SNOMed, and ICD-9-CM. Conclusion: There are many challenges in the wireless and mobile systems in telemedicine, despite the many benefits. Slow speed in sending pictures and video, lack of attention to the privacy in the design of these systems, environmental variables and the number of users during the day are some of these challenges. It is recommended to consider these challenges during the planning and designing of wireless and mobile systems in telemedicine.

  20. Wireless Energy Transfer Using Resonant Magnetic Induction for Electric Vehicle Charging Application

    Science.gov (United States)

    Dahal, Neelima

    The research work for this thesis is based on utilizing resonant magnetic induction for wirelessly charging electric vehicles. The background theory for electromagnetic induction between two conducting loops is given and it is shown that an RLCequivalent circuit can be used to model the loops. An analysis of the equivalent circuit is used to show how two loosely coupled loops can be made to exchange energy efficiently by operating them at a frequency which is the same as the resonant frequency of both. Furthermore, it is shown that the efficiency is the maximum for critical coupling (determined by the quality factors of the loops), and increasing the coupling beyond critical coupling causes double humps to appear in the transmission efficiency versus frequency spectrum. In the experiment, as the loops are brought closer together which increases the coupling between them, doubles humps, as expected from the equivalent circuit analysis is seen. Two models for wireless energy transfer are identified: basic model and array model. The basic model consists of the two loosely coupled loops, the transmitter and the receiver. The array model consists of a 2 x 2 array of the transmitter and three parasites, and the receiver. It is shown that the array model allows more freedom for receiver placement at the cost of degraded transmission efficiency compared to the basic model. Another important part of the thesis is software validation. HFSS-IE and 4NEC2 are the software tools used and the simulation results for wire antennas are compared against references obtained from a textbook and a PhD dissertation. It is shown that the simulations agree well with the references and also with each other.

  1. BMN correlators by loop equations

    International Nuclear Information System (INIS)

    Eynard, Bertrand; Kristjansen, Charlotte

    2002-01-01

    In the BMN approach to N=4 SYM a large class of correlators of interest are expressible in terms of expectation values of traces of words in a zero-dimensional gaussian complex matrix model. We develop a loop-equation based, analytic strategy for evaluating such expectation values to any order in the genus expansion. We reproduce the expectation values which were needed for the calculation of the one-loop, genus one correction to the anomalous dimension of BMN-operators and which were earlier obtained by combinatorial means. Furthermore, we present the expectation values needed for the calculation of the one-loop, genus two correction. (author)

  2. Optical loop framing

    International Nuclear Information System (INIS)

    Kalibjian, R.; Chong, Y.P.; Prono, D.S.; Cavagnolo, H.R.

    1984-06-01

    The ATA provides an electron beam pulse of 70-ns duration at a 1-Hz rate. Our present optical diagnostics technique involve the imaging of the visible light generated by the beam incident onto the plant of a thin sheet of material. It has already been demonstrated that the light generated has a sufficiently fast temporal reponse in performing beam diagnostics. Notwithstanding possible beam emittance degradation due to scattering in the thin sheet, the observation of beam spatial profiles with relatively high efficiencies has provided data complementary to that obtained from beam wall current monitors and from various x-ray probes and other electrical probes. The optical image sensor consists of a gated, intensified television system. The gate pulse of the image intensifier can be appropriately delayed to give frames that are time-positioned from the head to the tail of the beam with a minimum gate time of 5-ns. The spatial correlation of the time frames from pulse to pulse is very good for a stable electron beam; however, when instabilities do occur, it is difficult to properly assess the spatial composition of the head and the tail of the beam on a pulse-to-pulse basis. Multiple gating within a pulse duration becomes desirable but cannot be performed because the recycle time (20-ms) of the TV system is much longer than the beam pulse. For this reason we have developed an optical-loop framing technique that will allow the recording of two frames within one pulse duration with our present gated/intensified TV system

  3. SOUNET: Self-Organized Underwater Wireless Sensor Network.

    Science.gov (United States)

    Kim, Hee-Won; Cho, Ho-Shin

    2017-02-02

    In this paper, we propose an underwater wireless sensor network (UWSN) named SOUNET where sensor nodes form and maintain a tree-topological network for data gathering in a self-organized manner. After network topology discovery via packet flooding, the sensor nodes consistently update their parent node to ensure the best connectivity by referring to the timevarying neighbor tables. Such a persistent and self-adaptive method leads to high network connectivity without any centralized control, even when sensor nodes are added or unexpectedly lost. Furthermore, malfunctions that frequently happen in self-organized networks such as node isolation and closed loop are resolved in a simple way. Simulation results show that SOUNET outperforms other conventional schemes in terms of network connectivity, packet delivery ratio (PDR), and energy consumption throughout the network. In addition, we performed an experiment at the Gyeongcheon Lake in Korea using commercial underwater modems to verify that SOUNET works well in a real environment.

  4. SOUNET: Self-Organized Underwater Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Hee-won Kim

    2017-02-01

    Full Text Available In this paper, we propose an underwater wireless sensor network (UWSN named SOUNET where sensor nodes form and maintain a tree-topological network for data gathering in a self-organized manner. After network topology discovery via packet flooding, the sensor nodes consistently update their parent node to ensure the best connectivity by referring to the timevarying neighbor tables. Such a persistent and self-adaptive method leads to high network connectivity without any centralized control, even when sensor nodes are added or unexpectedly lost. Furthermore, malfunctions that frequently happen in self-organized networks such as node isolation and closed loop are resolved in a simple way. Simulation results show that SOUNET outperforms other conventional schemes in terms of network connectivity, packet delivery ratio (PDR, and energy consumption throughout the network. In addition, we performed an experiment at the Gyeongcheon Lake in Korea using commercial underwater modems to verify that SOUNET works well in a real environment.

  5. Wireless Sensor Platform for Cultural Heritage Monitoring and Modeling System

    Science.gov (United States)

    Bermudez, Sergio A.; Schrott, Alejandro G.; Tsukada, Masahiko; Kargere, Lucretia; Marianno, Fernando; Hamann, Hendrik F.; López, Vanessa; Leona, Marco

    2017-01-01

    Results from three years of continuous monitoring of environmental conditions using a wireless sensor platform installed at The Cloisters, the medieval branch of the New York Metropolitan Museum of Art, are presented. The platform comprises more than 200 sensors that were distributed in five galleries to assess temperature and air flow and to quantify microclimate changes using physics-based and statistical models. The wireless sensor network data shows a very stable environment within the galleries, while the dense monitoring enables localized monitoring of subtle changes in air quality trends and impact of visitors on the microclimate conditions. The high spatial and temporal resolution data serves as a baseline study to understand the impact of visitors and building operations on the long-term preservation of art objects. PMID:28858223

  6. Maximizing lifetime of wireless sensor networks using genetic approach

    DEFF Research Database (Denmark)

    Wagh, Sanjeev; Prasad, Ramjee

    2014-01-01

    the cluster head intelligently using auction data of node i.e. its local battery power, topology strength and external battery support. The network lifetime is the centre focus of the research paper which explores intelligently selection of cluster head using auction based approach. The multi......The wireless sensor networks are designed to install the smart network applications or network for emergency solutions, where human interaction is not possible. The nodes in wireless sensor networks have to self organize as per the users requirements through monitoring environments. As the sensor...... nodes are deployed in an inaccessible location for particular mission, it is difficult to exchange or recharge the nodes battery. Hence the important issues to design the sensor network for maximum time duration of network and also for low power operation of the nodes. The proposal is to select...

  7. Wireless Sensor Platform for Cultural Heritage Monitoring and Modeling System.

    Science.gov (United States)

    Klein, Levente J; Bermudez, Sergio A; Schrott, Alejandro G; Tsukada, Masahiko; Dionisi-Vici, Paolo; Kargere, Lucretia; Marianno, Fernando; Hamann, Hendrik F; López, Vanessa; Leona, Marco

    2017-08-31

    Results from three years of continuous monitoring of environmental conditions using a wireless sensor platform installed at The Cloisters, the medieval branch of the New York Metropolitan Museum of Art, are presented. The platform comprises more than 200 sensors that were distributed in five galleries to assess temperature and air flow and to quantify microclimate changes using physics-based and statistical models. The wireless sensor network data shows a very stable environment within the galleries, while the dense monitoring enables localized monitoring of subtle changes in air quality trends and impact of visitors on the microclimate conditions. The high spatial and temporal resolution data serves as a baseline study to understand the impact of visitors and building operations on the long-term preservation of art objects.

  8. Critical Infrastructure Surveillance Using SecureWireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Michael Niedermeier

    2015-11-01

    Full Text Available In this work, a secure wireless sensor network (WSN for the surveillance, monitoring and protection of critical infrastructures was developed. To guarantee the security of the system, the main focus was the implementation of a unique security concept, which includes both security on the communication level, as well as mechanisms that ensure the functional safety during its operation. While there are many theoretical approaches in various subdomains of WSNs—like network structures, communication protocols and security concepts—the construction, implementation and real-life application of these devices is still rare. This work deals with these aforementioned aspects, including all phases from concept-generation to operation of a secure wireless sensor network. While the key focus of this paper lies on the security and safety features of the WSN, the detection, localization and classification capabilities resulting from the interaction of the nodes’ different sensor types are also described.

  9. Adaptive Naive Bayes classification for wireless sensor networks

    NARCIS (Netherlands)

    Zwartjes, G.J.

    2017-01-01

    Wireless Sensor Networks are tiny devices equipped with sensors and wireless communication. These devices observe environments and communicatie about these observations. Machine Learning techniques are of interest for Wireless Sensor Network applications since they can reduce the amount of needed

  10. DOWNHOLE POWER GENERATION AND WIRELESS COMMUNICATIONS FOR INTELLIGENT COMPLETIONS APPLICATIONS

    Energy Technology Data Exchange (ETDEWEB)

    Paul Tubel

    2003-10-14

    The fourth quarter of the project was dedicated to the manufacturing of the mechanical system for wireless communications and the power generation module and inspection pre assembly of the mechanical components. Another emphasis for the quarter was the development of filter control and signal detection software. The tasks accomplished during this report period were: (1) Dimensional issues were resolved and revised drawings for manufacturing of the wireless communications gauge and power generator were completed and sent to a machine shop for manufacturing. (2) Finalized the requirements and fittings and connections for testing the tool in the Halliburton flow loop. (3) The new acoustic generator was manufactured successfully and it was delivered during this quarter. The assembly will be outsourced for plastic coating in preparation for hostile environment use. (4) The acoustic two-way communications development continued to progress. The real time firmware for the surface system was developed and the processor was able to detect and process the data frame transmitted from downhole. The analog section of the tool was also developed and it is being tested for filtering capabilities and signal detection and amplification. (5) The new transformer to drive the acoustic generator assembly was manufactured and was successfully tested. Spring mandrel design showed increased acoustic output on the pipe and was implemented. (6) PCBA board carrier with board set was tested for function and fit and is 100% complete. (7) Filter control software is complete and software to allow modification of communication parameters dynamically is 50% complete. (8) All mechanical parts to assemble the wireless gauge and power generator have been received and verified to be within specification. (9) Acoustic generator has been assembled in the tool mandrel and tested successfully. (10) The circuit required to harvest the power generated downhole has been designed and the power generator

  11. The Making of a Sustainable Wireless City? Mapping Public Wi-Fi Access in Shanghai

    Directory of Open Access Journals (Sweden)

    Mingfeng Wang

    2016-01-01

    Full Text Available In the context of the global information economy, ready access to the Internet is critical to a city’s competitiveness, which has prompted a number of cities to launch plans to establish wireless networks. Most literature on the development of wireless cities focuses on cities in Western countries, and few have discussed how Chinese cities have adopted wireless technologies in their urban infrastructure development efforts. This paper examines recent development and spatial distribution of public Wi-Fi access in Shanghai, a leading business hub in China. We mapped Wi-Fi hotspots through the government sponsored “i-Shanghai” project and China Mobile Communications Corporation (CMCC. We find that while telecommunication providers have been proactively deploying WLAN (wireless local area network,a proxy of public Wi-Fi or wireless access hotspots in Shanghai, neither government sponsored WLAN hotspots nor facilities established by CMCC could cover the old traditional neighborhoods in the central city and sub-districts in remote rural areas. We also address the development of a more sustainable wireless city in Shanghai with a particular focus on digital divide and social equity issues.

  12. A hybrid system identification methodology for wireless structural health monitoring systems based on dynamic substructuring

    Science.gov (United States)

    Dragos, Kosmas; Smarsly, Kay

    2016-04-01

    System identification has been employed in numerous structural health monitoring (SHM) applications. Traditional system identification methods usually rely on centralized processing of structural response data to extract information on structural parameters. However, in wireless SHM systems the centralized processing of structural response data introduces a significant communication bottleneck. Exploiting the merits of decentralization and on-board processing power of wireless SHM systems, many system identification methods have been successfully implemented in wireless sensor networks. While several system identification approaches for wireless SHM systems have been proposed, little attention has been paid to obtaining information on the physical parameters (e.g. stiffness, damping) of the monitored structure. This paper presents a hybrid system identification methodology suitable for wireless sensor networks based on the principles of component mode synthesis (dynamic substructuring). A numerical model of the monitored structure is embedded into the wireless sensor nodes in a distributed manner, i.e. the entire model is segmented into sub-models, each embedded into one sensor node corresponding to the substructure the sensor node is assigned to. The parameters of each sub-model are estimated by extracting local mode shapes and by applying the equations of the Craig-Bampton method on dynamic substructuring. The proposed methodology is validated in a laboratory test conducted on a four-story frame structure to demonstrate the ability of the methodology to yield accurate estimates of stiffness parameters. Finally, the test results are discussed and an outlook on future research directions is provided.

  13. A Wireless LAN and Voice Information System for Underground Coal Mine

    Directory of Open Access Journals (Sweden)

    Yu Zhang

    2014-06-01

    Full Text Available In this paper we constructed a wireless information system, and developed a wireless voice communication subsystem based on Wireless Local Area Networks (WLAN for underground coal mine, which employs Voice over IP (VoIP technology and Session Initiation Protocol (SIP to achieve wireless voice dispatching communications. The master control voice dispatching interface and call terminal software are also developed on the WLAN ground server side to manage and implement the voice dispatching communication. A testing system for voice communication was constructed in tunnels of an underground coal mine, which was used to actually test the wireless voice communication subsystem via a network analysis tool, named Clear Sight Analyzer. In tests, the actual flow charts of registration, call establishment and call removal were analyzed by capturing call signaling of SIP terminals, and the key performance indicators were evaluated in coal mine, including average subjective value of voice quality, packet loss rate, delay jitter, disorder packet transmission and end-to- end delay. Experimental results and analysis demonstrate that the wireless voice communication subsystem developed communicates well in underground coal mine environment, achieving the designed function of voice dispatching communication.

  14. Loop quantum cosmology: Recent progress

    Indian Academy of Sciences (India)

    . These techniques and their implications can be illustrated and tested in simple sit- uations by introducing symmetries, which is the origin of loop quantum cosmology. The symmetry reduction can be done in such a way that the characteristic ...

  15. A CMOS Pressure Sensor Tag Chip for Passive Wireless Applications

    Directory of Open Access Journals (Sweden)

    Fangming Deng

    2015-03-01

    Full Text Available This paper presents a novel monolithic pressure sensor tag for passive wireless applications. The proposed pressure sensor tag is based on an ultra-high frequency RFID system. The pressure sensor element is implemented in the 0.18 µm CMOS process and the membrane gap is formed by sacrificial layer release, resulting in a sensitivity of 1.2 fF/kPa within the range from 0 to 600 kPa. A three-stage rectifier adopts a chain of auxiliary floating rectifier cells to boost the gate voltage of the switching transistors, resulting in a power conversion efficiency of 53% at the low input power of −20 dBm. The capacitive sensor interface, using phase-locked loop archietcture, employs fully-digital blocks, which results in a 7.4 bits resolution and 0.8 µW power dissipation at 0.8 V supply voltage. The proposed passive wireless pressure sensor tag costs a total 3.2 µW power dissipation.

  16. Wirelessly powered stimulator and recorder for neuronal interfaces.

    Science.gov (United States)

    Nag, Sudip; Sharma, Dinesh

    2011-01-01

    Functional Electrical Stimulation (FES) is widely adopted in neuro-engineering to partially alleviate diseased functions in the brain, retina and cochlea. We present a 32-channel wirelessly powered constant current stimulator and low power recording amplifier for FES based applications. The biphasic stimulator utilizes innovative techniques for matched positive/ negative currents and thus improves charge balance. Electrode discharging scheme is added for stimulation artifact suppression. An improved low power amplifier is incorporated for evoked response measurements. Electrical performance is characterized using simulated electrode-electrolyte impedance. Closed-loop stimulation and recording experiments have been performed. Stimulation current magnitudes of 2 μA-200 μA and up to 400 Hz rate have been realized. Theory and limitation of discharging scheme is explored while suppressing artifacts down to 3 ms. Alternate anodic-first and cathodic-first stimulation pulses are adopted for enhanced charge balancing. The low power amplifier exhibits gain of 1200 and bandwidth 350 Hz-1.02 KHz. A multiplexer/ demultiplexer is used to share the front-end among 32 electrodes. The inductively coupled wireless energy harvester works at 125 KHz-135 KHz that can remotely deliver 1.4 mW at 1cm distance to an equivalent of 10K load. The system can accommodate multielectrodes with impedance up to 100 K Ω. The entire hybrid analog-digital system consumes 360 μW quiescent power. Miniaturization makes it suitable for in-vivo applications.

  17. Performance Analysis of IIUM Wireless Campus Network

    International Nuclear Information System (INIS)

    Latif, Suhaimi Abd; Masud, Mosharrof H; Anwar, Farhat

    2013-01-01

    International Islamic University Malaysia (IIUM) is one of the leading universities in the world in terms of quality of education that has been achieved due to providing numerous facilities including wireless services to every enrolled student. The quality of this wireless service is controlled and monitored by Information Technology Division (ITD), an ISO standardized organization under the university. This paper aims to investigate the constraints of wireless campus network of IIUM. It evaluates the performance of the IIUM wireless campus network in terms of delay, throughput and jitter. QualNet 5.2 simulator tool has employed to measure these performances of IIUM wireless campus network. The observation from the simulation result could be one of the influencing factors in improving wireless services for ITD and further improvement

  18. Introductory survey for wireless infrared communications

    Directory of Open Access Journals (Sweden)

    Munsif Ali Jatoi

    2014-08-01

    Full Text Available Wireless infrared communications can be defined as the propagation of light waves in free space using infrared radiation whose range is 400–700 nm. This range corresponds to frequencies of hundreds of terahertz, which is high for higher data rate applications. Wireless infrared is applied for higher data rates applications such as wireless computing, wireless video and wireless multimedia communication applications. Introduced by Gfeller, this field has grown with different link configurations, improved transmitter efficiency, increased receiver responsivity and various multiple access techniques for improved quality. Errors are caused because of background light, which causes degradation overall system performance. Error correction techniques are used to remove the errors caused during transmission. This study provides a brief account on field theory used for error correction in wireless infrared systems. The results are produced in terms of bit error rate and signal-to-noise ratio for various bit lengths to show the ability of encoding and decoding algorithms.

  19. Wireless Network Penetration Testing and Security Auditing

    Directory of Open Access Journals (Sweden)

    Wang Shao-Long

    2016-01-01

    Full Text Available IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory environment to conduct penetration tests to confirm whether our wireless network is hackable or not. WAIDPS is configured as auditing tool to view wireless attacks, such as WEP/WPA/WPA2 cracking, rouge access points, denial of service attack. WAIDPS is designed to detect wireless intrusion with additional features. Penetration testing and auditing will mitigate the risk and threatening to protect WALN.

  20. Wireless Technology Application to Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jeong Kweon; Jeong, See Chae; Jeong, Ki Hoon; Oh, Do Young; Kim, Jae Hack

    2009-01-01

    Wireless technologies are getting widely used in various industrial processes for equipment condition monitoring, process measurement and other applications. In case of Nuclear Power Plant (NPP), it is required to review applicability of the wireless technologies for maintaining plant reliability, preventing equipment failure, and reducing operation and maintenance costs. Remote sensors, mobile technology and two-way radio communication may satisfy these needs. The application of the state of the art wireless technologies in NPPs has been restricted because of the vulnerability for the Electromagnetic Interference and Radio Frequency Interference (EMI/RFI) and cyber security. It is expected that the wireless technologies can be applied to the nuclear industry after resolving these issues which most of the developers and vendors are aware of. This paper presents an overview and information on general wireless deployment in nuclear facilities for future application. It also introduces typical wireless plant monitoring system application in the existing NPPs

  1. Dynamical behaviour in coronal loops

    Science.gov (United States)

    Haisch, Bernhard M.

    1986-01-01

    Rapid variability has been found in two active region coronal loops observed by the X-ray Polychromator (XRP) and the Hard X-ray Imaging Spectrometer (HXIS) onboard the Solar Maximum Mission (SMM). There appear to be surprisingly few observations of the short-time scale behavior of hot loops, and the evidence presented herein lends support to the hypothesis that coronal heating may be impulsive and driven by flaring.

  2. Closed Loop Fluid Delivery System

    Science.gov (United States)

    2014-02-28

    loop fluid delivery system (CLFDS) will integrate a vital signs monitor ( VSM ) and high speed infusion pump (Pump) to respond quickly to drops in...Interface (GUI) shows VSM data, allows the user to select from several injury types (head, uncontrolled hemorrhage, controlled hemorrhage, and three total...the bedrock for future Closed Loop Fluid System Pre-Market Approval application(s) to FDA. 6. Major Issues Clinical study testing revealed a

  3. mm-Wave Hybrid Photonic Wireless Links for Ultra-High Speed Wireless Transmissions

    DEFF Research Database (Denmark)

    Rommel, Simon; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso

    Hybrid photonic-wireless transmission schemes in the mm-wave frequency range are promising candidates to enable the multi-gigabit per second data communications required from wireless and mobile networks of the 5th and future generations. Large FCC spectrum allocations for wireless transmission...

  4. Application and promotion of wireless charging technology

    OpenAIRE

    Yan, Kaijun

    2014-01-01

    The aim of this thesis is to study wireless charging technology and analyze the application and promotion of each technology. This technology is based on Faraday’s electromagnetic in 1830s. It is not a new technology but it is developing high speed nowadays. This thesis introduces four mainstream types of wireless charging technology and three main-stream standards, and analyzes their features and development status. Wireless charging technology has been applied to some products, suc...

  5. Computer-Based Wireless Advertising Communication System

    Directory of Open Access Journals (Sweden)

    Anwar Al-Mofleh

    2009-10-01

    Full Text Available In this paper we developed a computer based wireless advertising communication system (CBWACS that enables the user to advertise whatever he wants from his own office to the screen in front of the customer via wireless communication system. This system consists of two PIC microcontrollers, transmitter, receiver, LCD, serial cable and antenna. The main advantages of the system are: the wireless structure and the system is less susceptible to noise and other interferences because it uses digital communication techniques.

  6. Application opportunities in wireless communications. Final report

    International Nuclear Information System (INIS)

    Abbott, R.E.; Blevins, R.P.; Olmstead, C.

    1998-07-01

    This report presents the results of examinations of wireless technologies and applications that may offer potential to utilities. Five different wireless technology areas are reviewed. Three areas--Communication Networks, Monitored Security Services, and Home Automation--potentially represent new business ventures for utilities. Two areas--Automatic Vehicle Location and Automated Field-Force Management--represent wireless applications with potential for reduced operating costs and improved customer relations

  7. Design and security of small wireless network

    OpenAIRE

    Žižka, Ladislav

    2012-01-01

    This thesis deals with design and security of small wireless network. Main goal of the thesis is home network design and choice of optimal solution of wireless security. The thesis has four parts. The first part describes computer networks and network components in theory. Next part deals with network design, choosing of network components and setting of them. It also describes some functionalities of alternative firmware DD-WRT. The third part presents common wireless security and network an...

  8. Feasibility and Applications of a Wireless Firewall

    OpenAIRE

    Wilhelm, Matthias

    2016-01-01

    Most of today’s wireless communication devices operate on unlicensed bands with uncoordinated spectrum access, with the consequence that RF interference and collisions are impairing the overall performance of wireless networks. In the classical design of network protocols, both packets in a collision are considered lost, such that channel access mechanisms attempt to avoid collisions proactively. However, with the current proliferation of wireless applications, e.g., WLANs, car-to-car network...

  9. Biomedical Wireless Ambulatory Crew Monitor

    Science.gov (United States)

    Chmiel, Alan; Humphreys, Brad

    2009-01-01

    A compact, ambulatory biometric data acquisition system has been developed for space and commercial terrestrial use. BioWATCH (Bio medical Wireless and Ambulatory Telemetry for Crew Health) acquires signals from biomedical sensors using acquisition modules attached to a common data and power bus. Several slots allow the user to configure the unit by inserting sensor-specific modules. The data are then sent real-time from the unit over any commercially implemented wireless network including 802.11b/g, WCDMA, 3G. This system has a distributed computing hierarchy and has a common data controller on each sensor module. This allows for the modularity of the device along with the tailored ability to control the cards using a relatively small master processor. The distributed nature of this system affords the modularity, size, and power consumption that betters the current state of the art in medical ambulatory data acquisition. A new company was created to market this technology.

  10. Wireless Augmented Reality Communication System

    Science.gov (United States)

    Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)

    2016-01-01

    The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.

  11. Propagation Engineering in Wireless Communications

    CERN Document Server

    Ghasemi, Abdollah; Ghasemi, Farshid

    2012-01-01

    Wireless communications has seen explosive growth in recent decades, in a realm that is both broad and rapidly expanding to include satellite services, navigational aids, remote sensing, telemetering, audio and video broadcasting, high-speed data communications, mobile radio systems and much more. Propagation Engineering in Wireless Communications deals with the basic principles of radiowaves propagation for frequency bands used in radio-communications, offering descriptions of new achievements and newly developed propagation models. The book bridges the gap between theoretical calculations and approaches, and applied procedures needed for advanced radio links design. The primary objective of this two-volume set is to demonstrate the fundamentals, and to introduce propagation phenomena and mechanisms that engineers are likely to encounter in the design and evaluation of radio links of a given type and operating frequency. Volume one covers basic principles, along with tropospheric and ionospheric propagation,...

  12. Mobility needs and wireless solutions

    DEFF Research Database (Denmark)

    Saugstrup, Dan; Henten, Anders

    The main purpose of this report is to spell out a methodological approach to the analysis of user needs with respect to mobility. Furthermore, this methodological approach is used in an exemplary analysis of the relationship between user needs and technology solutions offered by different wireless...... technologies. The report is based on a research approach, emphasizing important aspects in relation to developing more user oriented mobile services and applications in a heterogeneous network environment. As a staring point, Scandinavian research within the field of social science concerning mobility...... is described and discussed. Furthermore different wireless technologies are briefly described and discussed in relation to possible transmission capacities and coverage areas. In addition to this, a preliminary framework regarding the implications of mobility on the use and development of mobile services...

  13. Passive Wireless SAW Humidity Sensors, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal describes the preliminary development of passive wireless surface acoustic wave (SAW) based humidity sensors for NASA application to distributed...

  14. EEM{sup TM} wireless supervision

    Energy Technology Data Exchange (ETDEWEB)

    Bilic, H. [Ericsson-Nikola Tesla d.d. Zagreb (Croatia)

    2000-07-01

    By adding the GSM network to the communication level of Energy Management systems, energy operating centres (EOC) can offer wireless access to the supervised equipment. Furthermore EOC can profit from rapid service development in the GSM networks. With implementation of GPRS to the GSM network EOC can instantly offer wireless access to external IP based networks such as Internet and corporate Intranets. The author describes architecture and key characteristic of Ericsson EnergyMaster{sup TM} (EEM{sup TM}) system for Energy Management, how and where to implement wireless supervision, wireless access to IP addresses and also how to implement new services provided by the GSM network. (orig.)

  15. Wireless SAW Interrogator and Sensor System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless, passive, Surface Acoustic Wave (SAW), Orthogonal Frequency Coded (OFC) temperature sensors, operating in a multi-sensor environment, developed at the...

  16. Autonomous Wireless Self-Charging for Multi-Rotor Unmanned Aerial Vehicles

    Directory of Open Access Journals (Sweden)

    Ali Bin Junaid

    2017-06-01

    Full Text Available Rotary-wing unmanned aerial vehicles (UAVs have the ability to operate in confined spaces and to hover over point of interest, but they have limited flight time and endurance. Conventional contact-based charging system for UAVs has been used, but it requires high landing accuracy for proper docking. Instead of the conventional system, autonomous wireless battery charging system for UAVs in outdoor conditions is proposed in this paper. UAVs can be wirelessly charged using the proposed charging system, regardless of yaw angle between UAVs and wireless charging pad, which can further reduce their control complexity for autonomous landing. The increased overall mission time eventually relaxes the limitations on payload and flight time. In this paper, a cost effective automatic recharging solution for UAVs in outdoor environments is proposed using wireless power transfer (WPT. This research proposes a global positioning system (GPS and vision-based closed-loop target detection and a tracking system for precise landing of quadcopters in outdoor environments. The system uses the onboard camera to detect the shape, color and position of the defined target in image frame. Based on the offset of the target from the center of the image frame, control commands are generated to track and maintain the center position. Commercially available AR.Drone. was used to demonstrate the proposed concept which is equppied with bottom camera and GPS. Experiments and analyses showed good performance, and about 75% average WPT efficiency was achieved in this research.

  17. Wilson loops en la correspondencia AdS/CFT

    OpenAIRE

    Aguilera Damia, Jeremías

    2017-01-01

    Esta tesis está abocada al estudio de operadores no locales e invariantes de gauge, denominados Wilson loops, tanto a través de técnicas propias de teoría de cuerdas como por medio de técnicas avanzadas en teorías de gauge.

  18. Closed loop two-echelon repairable item systems

    NARCIS (Netherlands)

    Spanjers, L.; van Ommeren, Jan C.W.; Zijm, Willem H.M.

    In this paper we consider closed loop two-echelon repairable item systems with repair facilities both at a number of local service centers (called bases) and at a central location (the depot). The goal of the system is to maintain a number of production facilities (one at each base) in optimal

  19. Closed-loop two-echelon repairable item systems

    NARCIS (Netherlands)

    Spanjers, L.; Zijm, Willem H.M.; van Ommeren, Jan C.W.

    2003-01-01

    In this paper we consider closed loop two-echelon repairable item systems with repair facilities both at a number of local service centers (called bases) and at a central location (the depot). The goal of the system is to maintain a number of production facilities (one at each base) in optimal

  20. Closed loop two-echelon repairable item systems

    NARCIS (Netherlands)

    Spanjers, L.; van Ommeren, Jan C.W.; Zijm, Willem H.M.; Liberopoulos, G.; Papadopoulos, C.T.; Tan, B.; MacGregor Smith, J.; Gershwin, S.B.

    2006-01-01

    In this paper we consider closed loop two-echelon epairable item systems with repair facilities both at a number of local service centers (called bases) and at a central location (the depot). The goal of the system is to maintain a number of production facilities (one at each base) in optimal

  1. Wireless 3D Chocolate Printer

    OpenAIRE

    FROILAN G. DESTREZA; FRANCIS CARLO V. SOLLESTRE; MARJORIE V. VASQUEZ; FRANCIS B. MENDOZA

    2014-01-01

    This study is for the BSHRM Students of Batangas State University (BatStateU) ARASOF for the researchers believe that the Wireless 3D Chocolate Printer would be helpful in their degree program especially on making creative, artistic, personalized and decorative chocolate designs. The researchers used the Prototyping model as procedural method for the successful development and implementation of the hardware and software. This method has five phases which are the following: quick plan, quick d...

  2. Inkjet printed wireless smart bandage

    KAUST Repository

    Farooqui, Muhammad Fahad

    2016-12-19

    Chronic wounds affect millions of patients around the world and requires a major portion of health care budget for treatment. In this article, we present an unprecedented low cost continuous wireless monitoring system, realized through inkjet printing on a standard bandage strip, which can send early warnings as well as record long term wound progression data. The smart bandage can communicate upto a distance of 60 m when worn on the body.

  3. Modern summation methods and the computation of 2- and 3-loop Feynman diagrams

    International Nuclear Information System (INIS)

    Ablinger, Jakob; Schneider, Carsten; Bluemlein, Johannes; Klein, Sebastian

    2010-06-01

    By symbolic summation methods based on difference fields we present a general strategy that transforms definite multi-sums, e.g., in terms of hypergeometric terms and harmonic sums, to indefinite nested sums and products. We succeeded in this task with all our concrete calculations of 2-loop and 3-loop massive single scale Feynman diagrams with local operator insertion. (orig.)

  4. Smartphone Household Wireless Electroencephalogram Hat

    Directory of Open Access Journals (Sweden)

    Harold Szu

    2013-01-01

    Full Text Available Rudimentary brain machine interface has existed for the gaming industry. Here, we propose a wireless, real-time, and smartphone-based electroencephalogram (EEG system for homecare applications. The system uses high-density dry electrodes and compressive sensing strategies to overcome conflicting requirements between spatial electrode density, temporal resolution, and spatiotemporal throughput rate. Spatial sparseness is addressed by close proximity between active electrodes and desired source locations and using an adaptive selection of N active among 10N passive electrodes to form m-organized random linear combinations of readouts, m≪N≪10N. Temporal sparseness is addressed via parallel frame differences in hardware. During the design phase, we took tethered laboratory EEG dataset and applied fuzzy logic to compute (a spatiotemporal average of larger magnitude EEG data centers in 0.3 second intervals and (b inside brainwave sources by Independent Component Analysis blind deconvolution without knowing the impulse response function. Our main contributions are the fidelity of quality wireless EEG data compared to original tethered data and the speed of compressive image recovery. We have compared our recovery of ill-posed inverse data against results using Block Sparse Code. Future work includes development of strategies to filter unwanted artifact from high-density EEGs (i.e., facial muscle-related events and wireless environmental electromagnetic interferences.

  5. Temperature measurement of accelerator cell solenoid loop

    International Nuclear Information System (INIS)

    Mu Fan; Dong Pan; Dai Zhiyong

    2010-01-01

    This paper presents the research on temperature measurement of solenoid loop. The measuring temperature fiber is layered in solenoid loop for the accelerator cell. When the solenoid loop is supplied with high current form a constant current source, its temperature increases rapidly. The temperature fiber can measure the temperature of the solenoid loop and get temperature measurement rule. Experiment and simulation show temperature of interior solenoid loop the highest and it decreases from the interior to the exterior of solenoid loop. To control temperature of solenoid loop under 60 degree C, simulation displays load interval of constant current source with 80 A current should be at least is 17.5 minutes. (authors)

  6. Fair packet scheduling in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2014-02-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs. TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed with the transmission only if it receives a sufficient number of grant control messages from these neighbors. A grant message indicates that the associated data packet has the lowest timestamp of all the packets pending transmission at the local transmit queue. We demonstrate that a loose ordering of timestamps among neighboring nodes is sufficient for enforcing local fairness, subsequently leading to flow rate fairness in a multi-hop WMN. We show that TMAC can be implemented using the control frames in IEEE 802.11, and thus can be easily integrated in existing 802.11-based WMNs. Our simulation results show that TMAC achieves excellent resource allocation fairness while maintaining over 90% of maximum link capacity across a large number of topologies.

  7. A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Khalid

    2017-01-01

    Full Text Available Underwater wireless sensor networks are a newly emerging wireless technology in which small size sensors with limited energy and limited memory and bandwidth are deployed in deep sea water and various monitoring operations like tactical surveillance, environmental monitoring, and data collection are performed through these tiny sensors. Underwater wireless sensor networks are used for the exploration of underwater resources, oceanographic data collection, flood or disaster prevention, tactical surveillance systems, and unmanned underwater vehicles. Sensor nodes consist of a small memory, a central processing unit, and an antenna. Underwater networks are much different from terrestrial sensor networks as radio waves cannot be used in underwater wireless sensor networks. Acoustic channels are used for communication in deep sea water. Acoustic signals have many limitations, such as limited bandwidth, higher end-to-end delay, network path loss, higher propagation delay, and dynamic topology. Usually, these limitations result in higher energy consumption with a smaller number of packets delivered. The main aim nowadays is to operate sensor nodes having a smaller battery for a longer time in the network. This survey has discussed the state-of-the-art localization based and localization-free routing protocols. Routing associated issues in the area of underwater wireless sensor networks have also been discussed.

  8. A note on the Akivis algebra of a smooth hyporeductive loop

    International Nuclear Information System (INIS)

    Issa, A.N.

    2002-05-01

    Using the fundamental tensors of a smooth loop and the differential geometric characterization of smooth hyporeductive loops, the Akivis operations of a local smooth hyporeductive loop are expressed through the two binary and the one ternary operations of the hyporeductive triple algebra (h.t.a.) associated with the given hyporeductive loop. Those Akivis operations are also given in terms of Lie brackets of a Lie algebra of vector fields with the hyporeductive decomposition which generalizes the reductive decomposition of Lie algebras. A nontrivial real two-dimensional h.t.a. is presented. (author)

  9. Evolution of nanoscale interstitial dislocation loops under coupling effect of stress and temperature

    Energy Technology Data Exchange (ETDEWEB)

    Gao, Ning; Shen, Tielong; Kurtz, Richard; Wang, Zhiguang; Gao, Fei

    2017-07-01

    The properties of nano-scale interstitial dislocation loops under the coupling effect of stress and temperature are studied using atomistic simulation methods and experiments. The decomposition of a loop by the emission of smaller loops is identified as one of the major mechanisms to release the localized stress induced by the coupling effect, which is validated by the TEM observations. The classical conservation law of Burgers vector cannot be applied during such decomposition process. The dislocation network is formed from the decomposed loops, which may initiate the irradiation creep much earlier than expected through the mechanism of climb-controlled glide of dislocations.

  10. Tritium Management Loop Design Status

    Energy Technology Data Exchange (ETDEWEB)

    Rader, Jordan D. [ORNL; Felde, David K. [ORNL; McFarlane, Joanna [ORNL; Greenwood, Michael Scott [ORNL; Qualls, A L. [ORNL; Calderoni, Pattrick [Idaho National Laboratory (INL)

    2017-12-01

    This report summarizes physical, chemical, and engineering analyses that have been done to support the development of a test loop to study tritium migration in 2LiF-BeF2 salts. The loop will operate under turbulent flow and a schematic of the apparatus has been used to develop a model in Mathcad to suggest flow parameters that should be targeted in loop operation. The introduction of tritium into the loop has been discussed as well as various means to capture or divert the tritium from egress through a test assembly. Permeation was calculated starting with a Modelica model for a transport through a nickel window into a vacuum, and modifying it for a FLiBe system with an argon sweep gas on the downstream side of the permeation interface. Results suggest that tritium removal with a simple tubular permeation device will occur readily. Although this system is idealized, it suggests that rapid measurement capability in the loop may be necessary to study and understand tritium removal from the system.

  11. Video-based measurements for wireless capsule endoscope tracking

    International Nuclear Information System (INIS)

    Spyrou, Evaggelos; Iakovidis, Dimitris K

    2014-01-01

    The wireless capsule endoscope is a swallowable medical device equipped with a miniature camera enabling the visual examination of the gastrointestinal (GI) tract. It wirelessly transmits thousands of images to an external video recording system, while its location and orientation are being tracked approximately by external sensor arrays. In this paper we investigate a video-based approach to tracking the capsule endoscope without requiring any external equipment. The proposed method involves extraction of speeded up robust features from video frames, registration of consecutive frames based on the random sample consensus algorithm, and estimation of the displacement and rotation of interest points within these frames. The results obtained by the application of this method on wireless capsule endoscopy videos indicate its effectiveness and improved performance over the state of the art. The findings of this research pave the way for a cost-effective localization and travel distance measurement of capsule endoscopes in the GI tract, which could contribute in the planning of more accurate surgical interventions. (paper)

  12. Video-based measurements for wireless capsule endoscope tracking

    Science.gov (United States)

    Spyrou, Evaggelos; Iakovidis, Dimitris K.

    2014-01-01

    The wireless capsule endoscope is a swallowable medical device equipped with a miniature camera enabling the visual examination of the gastrointestinal (GI) tract. It wirelessly transmits thousands of images to an external video recording system, while its location and orientation are being tracked approximately by external sensor arrays. In this paper we investigate a video-based approach to tracking the capsule endoscope without requiring any external equipment. The proposed method involves extraction of speeded up robust features from video frames, registration of consecutive frames based on the random sample consensus algorithm, and estimation of the displacement and rotation of interest points within these frames. The results obtained by the application of this method on wireless capsule endoscopy videos indicate its effectiveness and improved performance over the state of the art. The findings of this research pave the way for a cost-effective localization and travel distance measurement of capsule endoscopes in the GI tract, which could contribute in the planning of more accurate surgical interventions.

  13. An Implantable Wireless Neural Interface System for Simultaneous Recording and Stimulation of Peripheral Nerve with a Single Cuff Electrode

    Directory of Open Access Journals (Sweden)

    Ahnsei Shon

    2017-12-01

    Full Text Available Recently, implantable devices have become widely used in neural prostheses because they eliminate endemic drawbacks of conventional percutaneous neural interface systems. However, there are still several issues to be considered: low-efficiency wireless power transmission; wireless data communication over restricted operating distance with high power consumption; and limited functionality, working either as a neural signal recorder or as a stimulator. To overcome these issues, we suggest a novel implantable wireless neural interface system for simultaneous neural signal recording and stimulation using a single cuff electrode. By using widely available commercial off-the-shelf (COTS components, an easily reconfigurable implantable wireless neural interface system was implemented into one compact module. The implantable device includes a wireless power consortium (WPC-compliant power transmission circuit, a medical implant communication service (MICS-band-based radio link and a cuff-electrode path controller for simultaneous neural signal recording and stimulation. During in vivo experiments with rabbit models, the implantable device successfully recorded and stimulated the tibial and peroneal nerves while communicating with the external device. The proposed system can be modified for various implantable medical devices, especially such as closed-loop control based implantable neural prostheses requiring neural signal recording and stimulation at the same time.

  14. The PennBMBI: Design of a General Purpose Wireless Brain-Machine-Brain Interface System.

    Science.gov (United States)

    Liu, Xilin; Zhang, Milin; Subei, Basheer; Richardson, Andrew G; Lucas, Timothy H; Van der Spiegel, Jan

    2015-04-01

    In this paper, a general purpose wireless Brain-Machine-Brain Interface (BMBI) system is presented. The system integrates four battery-powered wireless devices for the implementation of a closed-loop sensorimotor neural interface, including a neural signal analyzer, a neural stimulator, a body-area sensor node and a graphic user interface implemented on the PC end. The neural signal analyzer features a four channel analog front-end with configurable bandpass filter, gain stage, digitization resolution, and sampling rate. The target frequency band is configurable from EEG to single unit activity. A noise floor of 4.69 μVrms is achieved over a bandwidth from 0.05 Hz to 6 kHz. Digital filtering, neural feature extraction, spike detection, sensing-stimulating modulation, and compressed sensing measurement are realized in a central processing unit integrated in the analyzer. A flash memory card is also integrated in the analyzer. A 2-channel neural stimulator with a compliance voltage up to ± 12 V is included. The stimulator is capable of delivering unipolar or bipolar, charge-balanced current pulses with programmable pulse shape, amplitude, width, pulse train frequency and latency. A multi-functional sensor node, including an accelerometer, a temperature sensor, a flexiforce sensor and a general sensor extension port has been designed. A computer interface is designed to monitor, control and configure all aforementioned devices via a wireless link, according to a custom designed communication protocol. Wireless closed-loop operation between the sensory devices, neural stimulator, and neural signal analyzer can be configured. The proposed system was designed to link two sites in the brain, bridging the brain and external hardware, as well as creating new sensory and motor pathways for clinical practice. Bench test and in vivo experiments are performed to verify the functions and performances of the system.

  15. A review of assistive listening device and digital wireless technology for hearing instruments.

    Science.gov (United States)

    Kim, Jin Sook; Kim, Chun Hyeok

    2014-12-01

    Assistive listening devices (ALDs) refer to various types of amplification equipment designed to improve the communication of individuals with hard of hearing to enhance the accessibility to speech signal when individual hearing instruments are not sufficient. There are many types of ALDs to overcome a triangle of speech to noise ratio (SNR) problems, noise, distance, and reverberation. ALDs vary in their internal electronic mechanisms ranging from simple hard-wire microphone-amplifier units to more sophisticated broadcasting systems. They usually use microphones to capture an audio source and broadcast it wirelessly over a frequency modulation (FM), infra-red, induction loop, or other transmission techniques. The seven types of ALDs are introduced including hardwire devices, FM sound system, infra-red sound system, induction loop system, telephone listening devices, television, and alert/alarm system. Further development of digital wireless technology in hearing instruments will make possible direct communication with ALDs without any accessories in the near future. There are two technology solutions for digital wireless hearing instruments improving SNR and convenience. One is near-field magnetic induction combined with Bluetooth radio frequency (RF) transmission or proprietary RF transmission and the other is proprietary RF transmission alone. Recently launched digital wireless hearing aid applying this new technology can communicate from the hearing instrument to personal computer, phones, Wi-Fi, alert systems, and ALDs via iPhone, iPad, and iPod. However, it comes with its own iOS application offering a range of features but there is no option for Android users as of this moment.

  16. A Review of Assistive Listening Device and Digital Wireless Technology for Hearing Instruments

    Science.gov (United States)

    Kim, Chun Hyeok

    2014-01-01

    Assistive listening devices (ALDs) refer to various types of amplification equipment designed to improve the communication of individuals with hard of hearing to enhance the accessibility to speech signal when individual hearing instruments are not sufficient. There are many types of ALDs to overcome a triangle of speech to noise ratio (SNR) problems, noise, distance, and reverberation. ALDs vary in their internal electronic mechanisms ranging from simple hard-wire microphone-amplifier units to more sophisticated broadcasting systems. They usually use microphones to capture an audio source and broadcast it wirelessly over a frequency modulation (FM), infra-red, induction loop, or other transmission techniques. The seven types of ALDs are introduced including hardwire devices, FM sound system, infra-red sound system, induction loop system, telephone listening devices, television, and alert/alarm system. Further development of digital wireless technology in hearing instruments will make possible direct communication with ALDs without any accessories in the near future. There are two technology solutions for digital wireless hearing instruments improving SNR and convenience. One is near-field magnetic induction combined with Bluetooth radio frequency (RF) transmission or proprietary RF transmission and the other is proprietary RF transmission alone. Recently launched digital wireless hearing aid applying this new technology can communicate from the hearing instrument to personal computer, phones, Wi-Fi, alert systems, and ALDs via iPhone, iPad, and iPod. However, it comes with its own iOS application offering a range of features but there is no option for Android users as of this moment. PMID:25566400

  17. Algebraic quantum field theory, perturbation theory, and the loop expansion

    International Nuclear Information System (INIS)

    Duetsch, M.; Fredenhagen, K.

    2001-01-01

    The perturbative treatment of quantum field theory is formulated within the framework of algebraic quantum field theory. We show that the algebra of interacting fields is additive, i.e. fully determined by its subalgebras associated to arbitrary small subregions of Minkowski space. We also give an algebraic formulation of the loop expansion by introducing a projective system A (n) of observables ''up to n loops'', where A (0) is the Poisson algebra of the classical field theory. Finally we give a local algebraic formulation for two cases of the quantum action principle and compare it with the usual formulation in terms of Green's functions. (orig.)

  18. String-nets, single- and double-stranded quantum loop gases for non-Abelian anyons

    Energy Technology Data Exchange (ETDEWEB)

    Velenich, Andrea; Chamon, Claudio [Physics Department, Boston University, 590 Commonwealth Avenue, Boston, MA 02215 (United States); Wen Xiaogang, E-mail: velenich@bu.ed [Department of Physics, Massachusetts Institute of Technology, Cambridge, MA 02215 (United States)

    2010-04-30

    String-nets and quantum loop gases are two prominent microscopic lattice models to describe topological phases. String-net condensation can give rise to both Abelian and non-Abelian anyons, whereas loop condensation usually produces Abelian anyons. It has been proposed, however, that generalized quantum loop gases with non-orthogonal inner products could support non-Abelian anyons. We detail an exact mapping between the string-net and these generalized loop models and explain how the non-orthogonal products arise. We also introduce an equivalent loop model of double-stranded nets where quantum loops with an orthogonal inner product and local interactions supports non-Abelian Fibonacci anyons. Finally, we emphasize the origin of the sign problem in systems with non-Abelian excitations and its consequences on the complexity of their ground state wavefunctions. (fast track communication)

  19. High Speed Wireless Signal Generation and Demodulation

    DEFF Research Database (Denmark)

    Caballero Jambrina, Antonio; Sambaraju, Rakesh; Zibar, Darko

    We present the experimental demonstration of high speed wireless generation, up to 40 Gb/s, in the 75-110 GHz wireless band. All-optical OFDM and photonic up-conversion are used for generation and single side-band modulation with digital coherent detection for demodulation....

  20. The Invention of the Wireless Communication Engine

    NARCIS (Netherlands)

    van der Kooij, B.J.G.

    2017-01-01

    Wireless technology, taken for granted today, was once an innovative wonder that would forever change how the world communicates. Developed by Guglielmo Marconi in the latter half of the nineteenth century, wireless telegraphy combined advancements made by Samuel Morse, William Cooke, Charles