WorldWideScience

Sample records for wireless local loop

  1. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  2. Wireless technologies for closed-loop retinal prostheses

    Science.gov (United States)

    Ng, David C.; Bai, Shun; Yang, Jiawei; Tran, Nhan; Skafidas, Efstratios

    2009-12-01

    In this paper, we discuss various technologies needed to develop retinal prostheses with wireless power and data telemetry operation. In addition to the need to communicate with the implanted device, supply of power to the retinal prosthesis is especially difficult. This is because, in the implanted state, the device is not fixed in position due to constant motion of the eye. Furthermore, a retinal prosthesis incorporating a high density electrode array of more than 1000 electrodes is expected to consume approximately 45 mW of power and require 300 kbps of image and stimulation data. The front end of the wireless power and data transmission, the antenna, needs to be small compared to the size of the eye. Also, the wireless module is expected to operate in the reactive near-field region due to small separation between the transmit and receive antennas compared to their size and corresponding operating wavelength. An inductive link is studied as a means to transfer power and for data telemetry between the implant and external unit. In this work, the use of integrated circuit and microfabrication technologies for implementing inductive links is discussed. A closed-loop approach is taken to improve performance and reach optimum operation condition. Design and simulation data are presented as the basis for development of viable wireless module prototypes.

  3. Evaluation of wireless Local Area Networks

    Science.gov (United States)

    McBee, Charles L.

    1993-09-01

    This thesis is an in-depth evaluation of the current wireless Local Area Network (LAN) technologies. Wireless LAN's consist of three technologies: they are infrared light, microwave, and spread spectrum. When the first wireless LAN's were introduced, they were unfavorably labeled slow, expensive, and unreliable. The wireless LAN's of today are competitively priced, more secure, easier to install, and provide equal to or greater than the data throughput of unshielded twisted pair cable. Wireless LAN's are best suited for organizations that move office staff frequently, buildings that have historical significance, or buildings that have asbestos. Additionally, an organization may realize a cost savings of between $300 to $1,200 each time a node is moved. Current wireless LAN technologies have a positive effect on LAN standards being developed by the Defense Information System Agency (DISA). DoD as a whole is beginning to focus on wireless LAN's and mobile communications. If system managers want to remain successful, they need to stay abreast of this technology.

  4. Wireless Sensor Network Localization Research

    OpenAIRE

    Liang Xin

    2014-01-01

    DV-Hop algorithm is one of the important range-free localization algorithms. It performs better in isotropic density senor networks, however, it brings larger location errors in random distributed networks. According to the localization principle of the DV-Hop algorithm, this paper improves the estimation of average single hop distance by using the Least Equal Square Error, and revises the estimated distance between the unknown node and the anchor node with compensation coefficient considerin...

  5. Local expressions for one-loop calculations

    International Nuclear Information System (INIS)

    Wasson, D.A.; Koonin, S.E.

    1991-01-01

    We develop local expressions for the contributions of the short-wavelength vacuum modes to the one-loop vacuum energy. These expressions significantly improve the convergence properties of various ''brute-force'' calculational methods. They also provide a continuous series of approximations that interpolate between the brute-force calculations and the derivative expansion

  6. Closed-loop multiple antenna aided wireless communications using limited feedback

    OpenAIRE

    Yang, Du

    2010-01-01

    The aim of this thesis is to study the design of closed-loop multiple antenna aided wireless communications relying on limited feedback. Multiple antennas may be employed either/both at the transmitter or/and at the receiver, here the latter periodically feeds back some information about the time-varying wireless channel using a limited number of bits. Furthermore, the transmitter then pre-processes the signals to be transmitted according to the received feedback information. This closed-loop...

  7. Internal model control for industrial wireless plant using WirelessHART hardware-in-the-loop simulator.

    Science.gov (United States)

    Tran, Chung Duc; Ibrahim, Rosdiazli; Asirvadam, Vijanth Sagayan; Saad, Nordin; Sabo Miya, Hassan

    2018-04-01

    The emergence of wireless technologies such as WirelessHART and ISA100 Wireless for deployment at industrial process plants has urged the need for research and development in wireless control. This is in view of the fact that the recent application is mainly in monitoring domain due to lack of confidence in control aspect. WirelessHART has an edge over its counterpart as it is based on the successful Wired HART protocol with over 30 million devices as of 2009. Recent works on control have primarily focused on maintaining the traditional PID control structure which is proven not adequate for the wireless environment. In contrast, Internal Model Control (IMC), a promising technique for delay compensation, disturbance rejection and setpoint tracking has not been investigated in the context of WirelessHART. Therefore, this paper discusses the control design using IMC approach with a focus on wireless processes. The simulation and experimental results using real-time WirelessHART hardware-in-the-loop simulator (WH-HILS) indicate that the proposed approach is more robust to delay variation of the network than the PID. Copyright © 2017. Published by Elsevier Ltd.

  8. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    National Research Council Canada - National Science Library

    Kessel, Adam; Goodwin, Shane

    2005-01-01

    The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...

  9. Event localization in underwater wireless sensor networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew John Robert; Jamshaid, Kamran; Shihada, Basem; Ho, Pin-Han

    2012-01-01

    We propose m-courses (Monitoring Courses), a novel solution to localize events in an underwater wireless sensor network. These networks consists of surface gateways and relay nodes. GPS can localize the position of surface gateways which can

  10. Wireless local area network. A new technology of network

    International Nuclear Information System (INIS)

    Wu Yunjun; Zhao Zongtao

    2003-01-01

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  11. Localization Algorithms of Underwater Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Han, Guangjie; Jiang, Jinfang; Shu, Lei; Xu, Yongjun; Wang, Feng

    2012-01-01

    In Underwater Wireless Sensor Networks (UWSNs), localization is one of most important technologies since it plays a critical role in many applications. Motivated by widespread adoption of localization, in this paper, we present a comprehensive survey of localization algorithms. First, we classify localization algorithms into three categories based on sensor nodes’ mobility: stationary localization algorithms, mobile localization algorithms and hybrid localization algorithms. Moreover, we compare the localization algorithms in detail and analyze future research directions of localization algorithms in UWSNs. PMID:22438752

  12. Shooter Localization in Wireless Microphone Networks

    Directory of Open Access Journals (Sweden)

    David Lindgren

    2010-01-01

    Full Text Available Shooter localization in a wireless network of microphones is studied. Both the acoustic muzzle blast (MB from the gunfire and the ballistic shock wave (SW from the bullet can be detected by the microphones and considered as measurements. The MB measurements give rise to a standard sensor network problem, similar to time difference of arrivals in cellular phone networks, and the localization accuracy is good, provided that the sensors are well synchronized compared to the MB detection accuracy. The detection times of the SW depend on both shooter position and aiming angle and may provide additional information beside the shooter location, but again this requires good synchronization. We analyze the approach to base the estimation on the time difference of MB and SW at each sensor, which becomes insensitive to synchronization inaccuracies. Cramér-Rao lower bound analysis indicates how a lower bound of the root mean square error depends on the synchronization error for the MB and the MB-SW difference, respectively. The estimation problem is formulated in a separable nonlinear least squares framework. Results from field trials with different types of ammunition show excellent accuracy using the MB-SW difference for both the position and the aiming angle of the shooter.

  13. Wireless local network architecture for Naval medical treatment facilities

    OpenAIRE

    Deason, Russell C.

    2004-01-01

    Approved for public release; distribution is unlimited In today's Navy Medicine, an approach towards wireless networks is coming into view. The idea of developing and deploying workable Wireless Local Area Networks (WLAN) throughout Naval hospitals is but just a few years down the road. Currently Naval Medical Treatment Facilities (MTF) are using wired Local Area Networks (LANs) throughout the infrastructure of each facility. Civilian hospitals and other medical treatment facilities have b...

  14. La-CTP: Loop-Aware Routing for Energy-Harvesting Wireless Sensor Networks.

    Science.gov (United States)

    Sun, Guodong; Shang, Xinna; Zuo, Yan

    2018-02-02

    In emerging energy-harvesting wireless sensor networks (EH-WSN), the sensor nodes can harvest environmental energy to drive their operation, releasing the user's burden in terms of frequent battery replacement, and even enabling perpetual sensing systems. In EH-WSN applications, usually, the node in energy-harvesting or recharging state has to stop working until it completes the energy replenishment. However, such temporary departures of recharging nodes severely impact the packet routing, and one immediate result is the routing loop problem. Controlling loops in connectivity-intermittent EH-WSN in an efficient way is a big challenge in practice, and so far, users still lack of effective and practicable routing protocols with loop handling. Based on the Collection Tree Protocol (CTP) widely used in traditional wireless sensor networks, this paper proposes a loop-aware routing protocol for real-world EH-WSNs, called La-CTP, which involves a new parent updating metric and a proactive, adaptive beaconing scheme to effectively suppress the occurrence of loops and unlock unavoidable loops, respectively. We constructed a 100-node testbed to evaluate La-CTP, and the experimental results showed its efficacy and efficiency.

  15. Data security in wireless local area network

    International Nuclear Information System (INIS)

    Kishk, A.M.A

    2010-01-01

    The ever increasing demand for performance and data security improvement in wireless local area network (W LAN) has motivated increasing the difficulties to crack the system by man-in -the middle attacks. There are two primary and main objectives of this thesis to enhance data security in WLAN. The first objective is the enhancement of identities-exchange and key-exchange during authentication process. The second objective is the investigation of a proposed symmetrical encryption algorithm based on key-updating to enhance the performance of data-security in WLAN. The current asymmetrical encryption algorithms are used to authenticate the devices in WLAN to each other. They are used to exchange the identities and the keys in a secret channel during the authentication process. This thesis investigates the problems of identities- exchange. The enhancement of the identities-exchange and key-exchange stages during the authentication process has been suggested and studied in the thesis to solve the drawbacks of the traditional asymmetrical encryption algorithms.Next the investigation of a proposed symmetrical encryption to encrypt the data during the data exchange process gives a new approach to increase the difficulties to the man in the middle attacks to crack the system.The key updating with each packet is the new approach to solve the problem of the fixed key used to encrypt / decrypt the data with all packets in WLAN.A Comparative study between the proposed symmetrical encryption algorithms and the other algorithms is presented in the thesis. Proposed symmetrical encryption algorithm is applied on a text, voice, and image messages as practical applications of the proposed symmetrical encryption algorithm. Finally, the man-in-the middle attacks can broadcast noise signals in WLAN channels to prevent the data to reach correctly to the end-user. The quality of the received image is measured for the proposed and the traditional symmetrical encryption algorithms to

  16. Localization in Wireless Networks Foundations and Applications

    CERN Document Server

    Sanford, Jessica Feng; Slijepcevic, Sasha

    2012-01-01

    In a computational tour-de-force, this volume wipes away a host of problems related to location discovery in wireless ad-hoc sensor networks. WASNs have recognized potential in many applications that are location-dependent, yet are heavily constrained by factors such as cost and energy consumption. Their “ad-hoc” nature, with direct rather than mediated connections between a network of wireless devices, adds another layer of difficulty.   Basing this work entirely on data-driven, coordinated algorithms, the authors' aim is to present location discovery techniques that are highly accurate—and which fit user criteria. The research deploys nonparametric statistical methods and relies on the concept of joint probability to construct error (including location error) models and environmental field models. It also addresses system issues such as the broadcast and scheduling of the beacon. Reporting an impressive accuracy gain of almost 17 percent, and organized in a clear, sequential manner, this book represe...

  17. Power Impact of Loop Buffer Schemes for Biomedical Wireless Sensor Nodes

    Directory of Open Access Journals (Sweden)

    Francky Catthoor

    2012-11-01

    Full Text Available Instruction memory organisations are pointed out as one of the major sources of energy consumption in embedded systems. As these systems are characterised by restrictive resources and a low-energy budget, any enhancement in this component allows not only to decrease the energy consumption but also to have a better distribution of the energy budget throughout the system. Loop buffering is an effective scheme to reduce energy consumption in instruction memory organisations. In this paper, the loop buffer concept is applied in real-life embedded applications that are widely used in biomedical Wireless Sensor Nodes, to show which scheme of loop buffer is more suitable for applications with certain behaviour. Post-layout simulations demonstrate that a trade-off exists between the complexity of the loop buffer architecture and the energy savings of utilising it. Therefore, the use of loop buffer architectures in order to optimise the instructionmemory organisation from the energy efficiency point of view should be evaluated carefully, taking into account two factors: (1 the percentage of the execution time of the application that is related to the execution of the loops, and (2 the distribution of the execution time percentage over each one of the loops that form the application.

  18. A closed loop wireless power transmission system using a commercial RFID transceiver for biomedical applications.

    Science.gov (United States)

    Kiani, Mehdi; Ghovanloo, Maysam

    2009-01-01

    This paper presents a standalone closed loop wireless power transmission system that is built around a commercial off-the-shelf (COTS) radio frequency identification (RFID) transceiver (MLX90121) operating at 13.56 MHz. It can be used for inductively powering implantable biomedical devices in a closed loop fashion. Any changes in the distance and misalignment between transmitter and receiver coils in near-field wireless power transmission can cause a significant change in the received power, which can cause either malfunction or excessive heat dissipation. RFID transceivers are often used open loop. However, their back telemetry capability can be utilized to stabilize the received voltage on the implant. Our measurements showed that the delivered power to the transponder was maintained at 1.48 mW over a range of 6 to 12 cm, while the transmitter power consumption changed from 0.3 W to 1.21 W. The closed loop system can also oppose voltage variations as a result of sudden changes in load current.

  19. An RFID-Based Closed-Loop Wireless Power Transmission System for Biomedical Applications.

    Science.gov (United States)

    Kiani, Mehdi; Ghovanloo, Maysam

    2010-04-01

    This brief presents a standalone closed-loop wireless power transmission system that is built around a commercial off-the-shelf (COTS) radio-frequency identification (RFID) reader (TRF7960) operating at 13.56 MHz. It can be used for inductively powering implantable biomedical devices in a closed loop. Any changes in the distance and misalignment between transmitter and receiver coils in near-field wireless power transmission can cause a significant change in the received power, which can cause either a malfunction or excessive heat dissipation. RFID circuits are often used in an open loop. However, their back telemetry capability can be utilized to stabilize the received voltage on the implant. Our measurements showed that the delivered power to the transponder was maintained at 11.2 mW over a range of 0.5 to 2 cm, while the transmitter power consumption changed from 78 mW to 1.1 W. The closed-loop system can also oppose voltage variations as a result of sudden changes in the load current.

  20. Radiation signatures from a locally energized flaring loop

    International Nuclear Information System (INIS)

    Emslie, A.G.; Vlahos, L.; and Institute for Plasma Research, Stanford University)

    1980-01-01

    We calculate the radiation signatures from a locally energized solar flare loop, at a variety of wavelengths. Our calculations depend strongly on the physical properties of the energy release mechanism which we qualitatively discuss

  1. Recent Advances in Wireless Indoor Localization Techniques and System

    Directory of Open Access Journals (Sweden)

    Zahid Farid

    2013-01-01

    Full Text Available The advances in localization based technologies and the increasing importance of ubiquitous computing and context-dependent information have led to a growing business interest in location-based applications and services. Today, most application requirements are locating or real-time tracking of physical belongings inside buildings accurately; thus, the demand for indoor localization services has become a key prerequisite in some markets. Moreover, indoor localization technologies address the inadequacy of global positioning system inside a closed environment, like buildings. Based on this, though, this paper aims to provide the reader with a review of the recent advances in wireless indoor localization techniques and system to deliver a better understanding of state-of-the-art technologies and motivate new research efforts in this promising field. For this purpose, existing wireless localization position system and location estimation schemes are reviewed, as we also compare the related techniques and systems along with a conclusion and future trends.

  2. Localization and Communication for UWB-based Wireless Sensor Networks

    NARCIS (Netherlands)

    Wang, Y.

    2011-01-01

    The great demand for location-aware wireless sensor networks (WSNs) motivates the research in this thesis. The unique characteristics of WSNs impose numerous challenges on localization and communication. In this thesis, we handle some key challenges and provide affordable solutions. Impulse radio

  3. A Wirelessly-Powered Homecage With Segmented Copper Foils and Closed-Loop Power Control.

    Science.gov (United States)

    Mirbozorgi, S Abdollah; Jia, Yaoyao; Canales, Daniel; Ghovanloo, Maysam

    2016-10-01

    A new wireless electrophysiology data acquisition system, built around a standard homecage, is presented in this paper, which can power up and communicate with sensors and actuators/stimulators attached to or implanted in small freely behaving animal subjects, such as rodents. Key abilities of the energized homecage (EnerCage) system is enabling longitudinal experiments with minimal operator involvement or interruption, while providing test subjects with an enriched environment closer to their natural habitat, without the burden of being tethered or carrying bulky batteries. The magnetic resonant multi-coil design used in the new EnerCage-HC2 automatically localizes the transmitted electromagnetic power from a single transmitter (Tx) coil at the bottom of the cage toward the receiver coil (Rx), carried on/in the animal body, obviating the need for tracking the animal or switching the coils. In order to increase the resonators' quality factor (Q > 166) at the desired operating frequency of 13.56 MHz, while maintaining a high self-resonance frequency [Formula: see text], they are made of wide copper foils and optimally segmented based on a set of design rules that can be adopted for experimental arenas with different shapes and dimensions. The Rx rectified voltage is regulated at a user-defined window [Formula: see text] by a Tx-Rx closed-loop power control (CLPC) mechanism that creates a volume inside the homecage with 42 mW of power delivered to the load (PDL), and a homogeneous power transfer efficiency (PTE) plane of 14% on average at ∼7 cm height, plus stability against angular mis-alignments of up to 80°.

  4. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2018-01-01

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  5. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir

    2018-02-28

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  6. Study of Hybrid Localization Noncooperative Scheme in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Irfan Dwiguna Sumitra

    2017-01-01

    Full Text Available In this paper, we evaluated the experiment and analysis measurement accuracy to determine object location based on wireless sensor network (WSN. The algorithm estimates the position of sensor nodes employing received signal strength (RSS from scattered nodes in the environment, in particular for the indoor building. Besides that, we considered another algorithm based on weight centroid localization (WCL. In particular testbed, we combined both RSS and WCL as hybrid localization in case of noncooperative scheme with considering that source nodes directly communicate only with anchor nodes. Our experimental result shows localization accuracy of more than 90% and obtained the estimation error reduction to 4% compared to existing algorithms.

  7. Design of a Child Localization System on RFID and Wireless Sensor Networks

    OpenAIRE

    Chen, Chao

    2010-01-01

    Radio Frequency Identification (RFID) and wireless sensor networks are wireless technologies that rapidly emerge and show great potential. Combining RFID and wireless sensor networks provides a cost-efficient way to expand the RFID system's range and to enable an RFID system in areas without a network infrastructure. These two technologies are employed to build a wireless localization system in a children's theme park. The main purpose of this child localization system is to track and locate ...

  8. Artillery localization using networked wireless ground sensors

    Science.gov (United States)

    Swanson, David C.

    2002-08-01

    This paper presents the results of an installation of four acoustic/seismic ground sensors built using COTS computers and networking gear and operating on a continuous basis at Yuma Proving Grounds, Arizona. A description of the design can be found as well, which is essentially a Windows 2000 PC with 24-bit data acquisition, GPS timing, and environmental sensors for wind and temperature. A 4-element square acoustic array 1.8m on a side can be used to detect the time and angle of arrival of the muzzle blast and the impact explosion. A 3-component geophone allows the seismic wave direction to be estimated. The 8th channel of the 24-bit data acquisition system has a 1-pulse-per-second time signal from the GPS. This allows acoustic/seismic 'snapshots' to be coherently related from multiple disconnected ground sensor nodes. COTS 2.4 GHz frequency hopping radios (802.11 standard) are used with either omni or yagi antennas depending on the location on the range. Localization of the artillery or impact can be done by using the time and angle of arrival of the waves at 2 or more ground sensor locations. However, this straightforward analysis can be significantly complicated by weather and wind noise and is also the subject of another research contract. This work will present a general description of the COTS ground sensor installation, show example data autonomously collected including agent-based atmospheric data, and share some of the lessons learned from operating a Windows 2000 based system continuously outdoors.

  9. One-loop Yukawa Couplings in Local Models

    CERN Document Server

    Conlon, Joseph P; Palti, Eran; 10.1007

    2010-01-01

    We calculate the one-loop Yukawa couplings and threshold corrections for supersymmetric local models of branes at singularities in type IIB string theory. We compute the corrections coming both from wavefunction and vertex renormalisation. The former comes in the IR from conventional field theory running and in the UV from threshold corrections that cause it to run from the winding scale associated to the full Calabi-Yau volume. The vertex correction is naively absent as it appears to correspond to superpotential renormalisation. However, we find that while the Wilsonian superpotential is not renormalised there is a physical vertex correction in the 1PI action associated to light particle loops.

  10. One-loop Yukawa couplings in local models

    Energy Technology Data Exchange (ETDEWEB)

    Conlon, Joseph P. [Rudolf Peierls Center for Theoretical Physics, Oxford (United Kingdom); Balliol College, Oxford (United Kingdom); Goodsell, Mark [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Palti, Eran [Centre de Physique Theorique, Ecole Polytechnique, CNRS, Palaiseau (France)

    2010-07-15

    We calculate the one-loop Yukawa couplings and threshold corrections for supersymmetric local models of branes at singularities in type IIB string theory. We compute the corrections coming both from wavefunction and vertex renormalisation. The former comes in the IR from conventional field theory running and in the UV from threshold corrections that cause it to run from the winding scale associated to the full Calabi-Yau volume. The vertex correction is naively absent as it appears to correspond to superpotential renormalisation. However, we find that while the Wilsonian superpotential is not renormalised there is a physical vertex correction in the 1PI action associated to light particle loops. (orig.)

  11. One-loop Yukawa couplings in local models

    International Nuclear Information System (INIS)

    Conlon, Joseph P.; Goodsell, Mark; Palti, Eran

    2010-07-01

    We calculate the one-loop Yukawa couplings and threshold corrections for supersymmetric local models of branes at singularities in type IIB string theory. We compute the corrections coming both from wavefunction and vertex renormalisation. The former comes in the IR from conventional field theory running and in the UV from threshold corrections that cause it to run from the winding scale associated to the full Calabi-Yau volume. The vertex correction is naively absent as it appears to correspond to superpotential renormalisation. However, we find that while the Wilsonian superpotential is not renormalised there is a physical vertex correction in the 1PI action associated to light particle loops. (orig.)

  12. Broadband Loop Antenna on Soft Contact Lens for Wireless Ocular Physiological Monitoring

    Directory of Open Access Journals (Sweden)

    Ssu-Han Ting

    2014-01-01

    Full Text Available This paper presents a novel loop antenna with broadband for wireless ocular physiological monitoring (WOPM. The antenna is fabricated on a thin-film poly-para-xylylene C (parylene C substrate with a small thickness of 11 μm and dimension of π×6.5×6.5 mm2. With the advantage of small size, the proposed antenna is suitable to apply to the soft contact lens and transmit the signal in microelectromechanical Systems (MEMS. Because the pig's eye and human's eye have similar parameters of conductivity and permittivity, the experimental results are obtained by applying the proposed antenna on the pig's eye and cover from 1.54 to 6 GHz for ISM band (2.4 and 5.8 GHz applications. The measured antenna radiation patterns, antenna gains, and radiation efficiency will be demonstrated in this paper, which are suitable for application of wireless ocular physiological monitoring.

  13. GPS-Free Localization Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2010-06-01

    Full Text Available Localization is one of the most fundamental problems in wireless sensor networks, since the locations of the sensor nodes are critical to both network operations and most application level tasks. A GPS-free localization scheme for wireless sensor networks is presented in this paper. First, we develop a standardized clustering-based approach for the local coordinate system formation wherein a multiplication factor is introduced to regulate the number of master and slave nodes and the degree of connectivity among master nodes. Second, using homogeneous coordinates, we derive a transformation matrix between two Cartesian coordinate systems to efficiently merge them into a global coordinate system and effectively overcome the flip ambiguity problem. The algorithm operates asynchronously without a centralized controller; and does not require that the location of the sensors be known a priori. A set of parameter-setting guidelines for the proposed algorithm is derived based on a probability model and the energy requirements are also investigated. A simulation analysis on a specific numerical example is conducted to validate the mathematical analytical results. We also compare the performance of the proposed algorithm under a variety multiplication factor, node density and node communication radius scenario. Experiments show that our algorithm outperforms existing mechanisms in terms of accuracy and convergence time.

  14. Multidimensional Scaling Localization Algorithm in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhang Dongyang

    2014-02-01

    Full Text Available Due to the localization algorithm in large-scale wireless sensor network exists shortcomings both in positioning accuracy and time complexity compared to traditional localization algorithm, this paper presents a fast multidimensional scaling location algorithm. By positioning algorithm for fast multidimensional scaling, fast mapping initialization, fast mapping and coordinate transform can get schematic coordinates of node, coordinates Initialize of MDS algorithm, an accurate estimate of the node coordinates and using the PRORUSTES to analysis alignment of the coordinate and final position coordinates of nodes etc. There are four steps, and the thesis gives specific implementation steps of the algorithm. Finally, compared with stochastic algorithms and classical MDS algorithm experiment, the thesis takes application of specific examples. Experimental results show that: the proposed localization algorithm has fast multidimensional scaling positioning accuracy in ensuring certain circumstances, but also greatly improves the speed of operation.

  15. A wirelessly-powered homecage with animal behavior analysis and closed-loop power control.

    Science.gov (United States)

    Yaoyao Jia; Zheyuan Wang; Canales, Daniel; Tinkler, Morgan; Chia-Chun Hsu; Madsen, Teresa E; Mirbozorgi, S Abdollah; Rainnie, Donald; Ghovanloo, Maysam

    2016-08-01

    This paper presents a new EnerCage-homecage system, EnerCage-HC2, for longitudinal electrophysiology data acquisition experiments on small freely moving animal subjects, such as rodents. EnerCage-HC2 is equipped with multi-coil wireless power transmission (WPT), closed-loop power control, bidirectional data communication via Bluetooth Low Energy (BLE), and Microsoft Kinect® based animal behavior tracking and analysis. The EnerCage-HC2 achieves a homogeneous power transfer efficiency (PTE) of 14% on average, with ~42 mW power delivered to the load (PDL) at a nominal height of 7 cm by the closed-loop power control mechanism. The Microsoft Kinect® behavioral analysis algorithm can not only track the animal position in real-time but also classify 5 different types of rodent behaviors: standstill, walking, grooming, rearing, and rotating. A proof-of-concept in vivo experiment was conducted on two awake freely behaving rats while successfully operating a one-channel stimulator and generating an ethogram.

  16. The impact of local loop and retail unbundling

    OpenAIRE

    Klein, Gordon J.; Wendel, Julia

    2014-01-01

    For more than a decade the unbundling of telecommunications networks has been used as a regulatory means to stifle competition. However, despite its assumed positive effects on market entry and competition intensity, the negative effects on network investment incentives are widely shown in the theoretical literature. Therefore broadband penetration might also be affected negatively. In our paper we concentrate on the impact of local loop unbundling and Bitstream access on broadband penetratio...

  17. The loop I superbubble and the local interstellar magnetic field

    International Nuclear Information System (INIS)

    Frisch, Priscilla Chapman

    2014-01-01

    Recent data on the interstellar magnetic field in the low density nearby interstellar medium suggest a new perspective for understanding interstellar clouds within 40 pc. The directions of the local interstellar magnetic field found from measurements of optically polarized starlight and the very local field found from the Ribbon of energetic neutral atoms discovered by IBEX nearly agree. The geometrical relation between the local magnetic field, the positions and kinematics of local interstellar clouds, and the Loop I S1 superbubble, suggest that the Sun is located in the boundary of this evolved superbubble. The quasiperpendicular angle between the bulk kinematics and magnetic field of the local ISM indicates that a complete picture of low density interstellar clouds needs to include information on the interstellar magnetic field.

  18. Reputation-based secure sensor localization in wireless sensor networks.

    Science.gov (United States)

    He, Jingsha; Xu, Jing; Zhu, Xingye; Zhang, Yuqiang; Zhang, Ting; Fu, Wanqing

    2014-01-01

    Location information of sensor nodes in wireless sensor networks (WSNs) is very important, for it makes information that is collected and reported by the sensor nodes spatially meaningful for applications. Since most current sensor localization schemes rely on location information that is provided by beacon nodes for the regular sensor nodes to locate themselves, the accuracy of localization depends on the accuracy of location information from the beacon nodes. Therefore, the security and reliability of the beacon nodes become critical in the localization of regular sensor nodes. In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. In our proposed scheme, the reputation of each beacon node is evaluated based on a reputation evaluation model so that regular sensor nodes can get credible location information from highly reputable beacon nodes to accomplish localization. We also perform a set of simulation experiments to demonstrate the effectiveness of the proposed reputation-based security scheme. And our simulation results show that the proposed security scheme can enhance the security and, hence, improve the accuracy of sensor localization in hostile or untrusted environments.

  19. Intersection local times, loop soups and permanental Wick powers

    CERN Document Server

    Jan, Yves Le; Rosen, Jay

    2017-01-01

    Several stochastic processes related to transient Lévy processes with potential densities u(x,y)=u(y-x), that need not be symmetric nor bounded on the diagonal, are defined and studied. They are real valued processes on a space of measures \\mathcal{V} endowed with a metric d. Sufficient conditions are obtained for the continuity of these processes on (\\mathcal{V},d). The processes include n-fold self-intersection local times of transient Lévy processes and permanental chaoses, which are `loop soup n-fold self-intersection local times' constructed from the loop soup of the Lévy process. Loop soups are also used to define permanental Wick powers, which generalizes standard Wick powers, a class of n-th order Gaussian chaoses. Dynkin type isomorphism theorems are obtained that relate the various processes. Poisson chaos processes are defined and permanental Wick powers are shown to have a Poisson chaos decomposition. Additional properties of Poisson chaos processes are studied and a martingale extension is obt...

  20. Local, distributed topology control for large-scale wireless ad-hoc networks

    NARCIS (Netherlands)

    Nieberg, T.; Hurink, Johann L.

    In this document, topology control of a large-scale, wireless network by a distributed algorithm that uses only locally available information is presented. Topology control algorithms adjust the transmission power of wireless nodes to create a desired topology. The algorithm, named local power

  1. Adapting Mobile Beacon-Assisted Localization in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wei Dong

    2009-04-01

    Full Text Available The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL, to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL and Arrival and Departure Overlap (ADO when both of them use only a single mobile beacon for localization in static WSNs.

  2. Adapting mobile beacon-assisted localization in wireless sensor networks.

    Science.gov (United States)

    Teng, Guodong; Zheng, Kougen; Dong, Wei

    2009-01-01

    The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN) applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL) approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL), to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL) and Arrival and Departure Overlap (ADO) when both of them use only a single mobile beacon for localization in static WSNs.

  3. Agent Collaborative Target Localization and Classification in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sheng Wang

    2007-07-01

    Full Text Available Wireless sensor networks (WSNs are autonomous networks that have beenfrequently deployed to collaboratively perform target localization and classification tasks.Their autonomous and collaborative features resemble the characteristics of agents. Suchsimilarities inspire the development of heterogeneous agent architecture for WSN in thispaper. The proposed agent architecture views WSN as multi-agent systems and mobileagents are employed to reduce in-network communication. According to the architecture,an energy based acoustic localization algorithm is proposed. In localization, estimate oftarget location is obtained by steepest descent search. The search algorithm adapts tomeasurement environments by dynamically adjusting its termination condition. With theagent architecture, target classification is accomplished by distributed support vectormachine (SVM. Mobile agents are employed for feature extraction and distributed SVMlearning to reduce communication load. Desirable learning performance is guaranteed bycombining support vectors and convex hull vectors. Fusion algorithms are designed tomerge SVM classification decisions made from various modalities. Real world experimentswith MICAz sensor nodes are conducted for vehicle localization and classification.Experimental results show the proposed agent architecture remarkably facilitates WSNdesigns and algorithm implementation. The localization and classification algorithms alsoprove to be accurate and energy efficient.

  4. Localization of Energy Harvesting Empowered Underwater Optical Wireless Sensor Networks

    KAUST Repository

    Saeed, Nasir

    2017-12-20

    In this paper, a received signal strength (RSS) based localization technique is developed for energy harvesting underwater optical wireless sensor networks (EH-UOWSNs), where the optical noise sources and channel impairments of seawater pose significant challenges for range estimation. Energy limitation is another major problem due to the limited battery power and difficulty in replacing or recharging the battery of an underwater sensor node. In the proposed framework, sensor nodes with insufficient battery, harvest the energy and starts communicating once it has sufficient energy storage. Network localization is carried out by measuring the RSSs of active nodes, which are modeled based on the underwater optical communication channel characteristics. Thereafter, block kernel matrices are computed for the RSS based range measurements. Unlike the traditional shortest-path approach, the proposed technique reduces the shortest path estimation for each block kernel matrix. Once the complete block kernel matrices are available, a closed form localization technique is developed to find the location of every optical sensor node in the network. Furthermore, an analytical expression for Cramer Rao lower bound (CRLB) is derived as a benchmark to compare the localization performance of the proposed technique. Finally, extensive simulations show that the proposed technique outperforms the well-known network localization techniques.

  5. Real-time network traffic classification technique for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.

  6. Radiation signatures from a locally energized flaring loop

    Science.gov (United States)

    Emslie, A. G.; Vlahos, L.

    1980-01-01

    The radiation signatures from a locally energized solar flare loop based on the physical properties of the energy release mechanisms were consistent with hard X-ray, microwave, and EUV observations for plausible source parameters. It was found that a suprathermal tail of high energy electrons is produced by the primary energy release, and that the number of energetic charged particles ejected into the interplanetary medium in the model is consistent with observations. The radiation signature model predicts that the intrinsic polarization of the hard X-ray burst should increase over the photon energy range of 20 to 100 keV.

  7. A novel wireless local positioning system for airport (indoor) security

    Science.gov (United States)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  8. Propagation Characteristics of International Space Station Wireless Local Area Network

    Science.gov (United States)

    Sham, Catherine C.; Hwn, Shian U.; Loh, Yin-Chung

    2005-01-01

    This paper describes the application of the Uniform Geometrical Theory of Diffraction (UTD) for Space Station Wireless Local Area Networks (WLANs) indoor propagation characteristics analysis. The verification results indicate good correlation between UTD computed and measured signal strength. It is observed that the propagation characteristics are quite different in the Space Station modules as compared with those in the typical indoor WLANs environment, such as an office building. The existing indoor propagation models are not readily applicable to the Space Station module environment. The Space Station modules can be regarded as oversized imperfect waveguides. Two distinct propagation regions separated by a breakpoint exist. The propagation exhibits the guided wave characteristics. The propagation loss in the Space Station, thus, is much smaller than that in the typical office building. The path loss model developed in this paper is applicable for Space Station WLAN RF coverage and link performance analysis.

  9. Event localization in underwater wireless sensor networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew John Robert

    2012-08-01

    We propose m-courses (Monitoring Courses), a novel solution to localize events in an underwater wireless sensor network. These networks consists of surface gateways and relay nodes. GPS can localize the position of surface gateways which can then distribute their locations through the network using acoustic modems. Relay nodes are deployed to remain static, but these untethered nodes may drift due to water currents, resulting in disruption of communication links. We develop a novel underwater alarm system using a cyclic graph model. In the event of link failure, a series of alarm packets are broadcast in the network. These alarms are then captured by the underwater m-courses, which can also be used to assure network connectivity and identify node failures. M-courses also allow the network to localize events and identify network issues locally before forwarding results upwards to a Surface Gateway node. This reduces communication overhead and allows for efficient management of nodes in a mobile network. Our results show that m-course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% when compared to a naïve routing implementation.

  10. An Adaptive Impedance Matching Network with Closed Loop Control Algorithm for Inductive Wireless Power Transfer.

    Science.gov (United States)

    Miao, Zhidong; Liu, Dake; Gong, Chen

    2017-08-01

    For an inductive wireless power transfer (IWPT) system, maintaining a reasonable power transfer efficiency and a stable output power are two most challenging design issues, especially when coil distance varies. To solve these issues, this paper presents a novel adaptive impedance matching network (IMN) for IWPT system. In our adaptive IMN IWPT system, the IMN is automatically reconfigured to keep matching with the coils and to adjust the output power adapting to coil distance variation. A closed loop control algorithm is used to change the capacitors continually, which can compensate mismatches and adjust output power simultaneously. The proposed adaptive IMN IWPT system is working at 125 kHz for 2 W power delivered to load. Comparing with the series resonant IWPT system and fixed IMN IWPT system, the power transfer efficiency of our system increases up to 31.79% and 60% when the coupling coefficient varies in a large range from 0.05 to 0.8 for 2 W output power.

  11. Reliability Measure Model for Assistive Care Loop Framework Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Venki Balasubramanian

    2010-01-01

    Full Text Available Body area wireless sensor networks (BAWSNs are time-critical systems that rely on the collective data of a group of sensor nodes. Reliable data received at the sink is based on the collective data provided by all the source sensor nodes and not on individual data. Unlike conventional reliability, the definition of retransmission is inapplicable in a BAWSN and would only lead to an elapsed data arrival that is not acceptable for time-critical application. Time-driven applications require high data reliability to maintain detection and responses. Hence, the transmission reliability for the BAWSN should be based on the critical time. In this paper, we develop a theoretical model to measure a BAWSN's transmission reliability, based on the critical time. The proposed model is evaluated through simulation and then compared with the experimental results conducted in our existing Active Care Loop Framework (ACLF. We further show the effect of the sink buffer in transmission reliability after a detailed study of various other co-existing parameters.

  12. An Adaptive Impedance Matching Network with Closed Loop Control Algorithm for Inductive Wireless Power Transfer

    Science.gov (United States)

    Miao, Zhidong; Liu, Dake

    2017-01-01

    For an inductive wireless power transfer (IWPT) system, maintaining a reasonable power transfer efficiency and a stable output power are two most challenging design issues, especially when coil distance varies. To solve these issues, this paper presents a novel adaptive impedance matching network (IMN) for IWPT system. In our adaptive IMN IWPT system, the IMN is automatically reconfigured to keep matching with the coils and to adjust the output power adapting to coil distance variation. A closed loop control algorithm is used to change the capacitors continually, which can compensate mismatches and adjust output power simultaneously. The proposed adaptive IMN IWPT system is working at 125 kHz for 2 W power delivered to load. Comparing with the series resonant IWPT system and fixed IMN IWPT system, the power transfer efficiency of our system increases up to 31.79% and 60% when the coupling coefficient varies in a large range from 0.05 to 0.8 for 2 W output power. PMID:28763011

  13. A fully-differential phase-locked loop frequency synthesizer for 60-GHz wireless communication

    International Nuclear Information System (INIS)

    Kuang Lixue; Chi Baoyong; Chen Lei; Wang Zhihua; Jia Wen

    2014-01-01

    A 40-GHz phase-locked loop (PLL) frequency synthesizer for 60-GHz wireless communication applications is presented. The electrical characteristics of the passive components in the VCO and LO buffers are accurately extracted with an electromagnetic simulator HFSS. A differential tuning technique is utilized in the voltage controlled oscillator (VCO) to achieve higher common-mode noise rejection and better phase noise performance. The VCO and the divider chain are powered by a 1.0 V supply while the phase-frequency detector (PFD) and the charge pump (CP) are powered by a 2.5 V supply to improve the linearity. The measurement results show that the total frequency locking range of the frequency synthesizer is from 37 to 41 GHz, and the phase noise from a 40 GHz carrier is −97.2 dBc/Hz at 1 MHz offset. Implemented in 65 nm CMOS, the synthesizer consumes a DC power of 62 mW, including all the buffers. (semiconductor integrated circuits)

  14. A fully-differential phase-locked loop frequency synthesizer for 60-GHz wireless communication

    Science.gov (United States)

    Lixue, Kuang; Baoyong, Chi; Lei, Chen; Wen, Jia; Zhihua, Wang

    2014-12-01

    A 40-GHz phase-locked loop (PLL) frequency synthesizer for 60-GHz wireless communication applications is presented. The electrical characteristics of the passive components in the VCO and LO buffers are accurately extracted with an electromagnetic simulator HFSS. A differential tuning technique is utilized in the voltage controlled oscillator (VCO) to achieve higher common-mode noise rejection and better phase noise performance. The VCO and the divider chain are powered by a 1.0 V supply while the phase-frequency detector (PFD) and the charge pump (CP) are powered by a 2.5 V supply to improve the linearity. The measurement results show that the total frequency locking range of the frequency synthesizer is from 37 to 41 GHz, and the phase noise from a 40 GHz carrier is -97.2 dBc/Hz at 1 MHz offset. Implemented in 65 nm CMOS, the synthesizer consumes a DC power of 62 mW, including all the buffers.

  15. Experience of wireless local area network in a radiation oncology department.

    Science.gov (United States)

    Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan

    2010-01-01

    The aim of this work is to develop a wireless local area network (LAN) between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc) for efficient patient data management and to made easy the availability of information (chair side) to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops) and stationary workstations, all equipped with wireless-fidelity (Wi-Fi) access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ) has been used. The wireless networking was configured with the Service Set Identifier (SSID), Media Access Control (MAC) address filtering, and Wired Equivalent Privacy (WEP) network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.

  16. Design and initial deployment of the wireless local area networking infrastructure at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Long, John P.; Hamill, Michael J.; Mitchell, M. G.; Miller, Marc M.; Witzke, Edward L.; Wiener, Dallas J

    2006-11-01

    A major portion of the Wireless Networking Project at Sandia National Laboratories over the last few years has been to examine IEEE 802.11 wireless networking for possible use at Sandia and if practical, introduce this technology. This project team deployed 802.11a, b, and g Wireless Local Area Networking at Sandia. This report examines the basics of wireless networking and captures key results from project tests and experiments. It also records project members thoughts and designs on wireless LAN architecture and security issues. It documents some of the actions and milestones of this project, including pilot and production deployment of wireless networking equipment, and captures the team's rationale behind some of the decisions made. Finally, the report examines lessons learned, future directions, and conclusions.

  17. Wireless local area network in a prehospital environment

    Directory of Open Access Journals (Sweden)

    Grimes Gary J

    2004-08-01

    Full Text Available Abstract Background Wireless local area networks (WLANs are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER. The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  18. Wireless power pad with local power activation for portable devices

    NARCIS (Netherlands)

    Waffenschmidt, E.; Zheglov, V.

    2007-01-01

    Wireless power transfer by magnetic induction offers a simple to use way to recharge mobile devices like e.g. mobile phone, music players or medical sensors. As shown by a previous report and an existing Power Pad demonstrator, wireless inductive power transfer is possible with a good power

  19. Event Localization in Underwater Wireless Sensor Networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew

    2011-11-01

    In this thesis we consider different methods to localize events in a multi-hop wireless sensor network operating underwater using acoustic modems. The network consists of surface gateway nodes and relay nodes. Localization of surface gateways can be achieved through GPS, but we cannot rely on this technology for localizing underwater nodes. Surface Gateway nodes can distribute their locations through the network using the incoming signals by the acoustic modems from the relay nodes. Relay nodes are deployed to remain static but due to water currents, floating, and the untethered nature of the nodes, they often suffer from frequent drifting which can result in a deployed network suffering link failures. In this work, we developed a novel concept of an underwater alarming system, which adapts a cyclic graph model. In the event of link failure, a series of alarm packets are broadcasted in the network. These alarms are then captured through a novel concept of underwater Monitoring Courses (M-Courses), which can also be used to assure network connectivity and identify node faults. M-Courses also allow the network to localize events and identify network issues at a local level before forwarding any results upwards to a Surface Gateway nodes. This reduces the amount of communication overhead needed and allowing for distributed management of nodes in a network which may be constantly moving. We show that the proposed algorithms can reduce the number of send operations needed for an event to be localized in a network. We have found that M-Course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% in some cases when compared to a naive routing implementation. But this is achieved by increasing the time for an event to reach a Surface Gateway. These effects are both due to the buffering effect of M-Course routing, which allows us to efficiently deal with multiple events in an local area and we find that the performance of M

  20. Modular high-voltage bias generator powered by dual-looped self-adaptive wireless power transmission.

    Science.gov (United States)

    Xie, Kai; Huang, An-Feng; Li, Xiao-Ping; Guo, Shi-Zhong; Zhang, Han-Lu

    2015-04-01

    We proposed a modular high-voltage (HV) bias generator powered by a novel transmitter-sharing inductive coupled wireless power transmission technology, aimed to extend the generator's flexibility and configurability. To solve the problems caused through an uncertain number of modules, a dual-looped self-adaptive control method is proposed that is capable of tracking resonance frequency while maintaining a relatively stable induction voltage for each HV module. The method combines a phase-locked loop and a current feedback loop, which ensures an accurate resonance state and a relatively constant boost ratio for each module, simplifying the architecture of the boost stage and improving the total efficiency. The prototype was built and tested. The input voltage drop of each module is less than 14% if the module number varies from 3 to 10; resonance tracking is completed within 60 ms. The efficiency of the coupling structure reaches up to 95%, whereas the total efficiency approaches 73% for a rated output. Furthermore, this technology can be used in various multi-load wireless power supply applications.

  1. On-line structural damage localization and quantification using wireless sensors

    International Nuclear Information System (INIS)

    Hsu, Ting-Yu; Huang, Shieh-Kung; Lu, Kung-Chung; Loh, Chin-Hsiung; Wang, Yang; Lynch, Jerome Peter

    2011-01-01

    In this paper, a wireless sensing system is designed to realize on-line damage localization and quantification of a structure using a frequency response function change method (FRFCM). Data interrogation algorithms are embedded in the computational core of the wireless sensing units to extract the necessary structural features, i.e. the frequency spectrum segments around eigenfrequencies, automatically from measured structural response for the FRFCM. Instead of the raw time history of the structural response, the extracted compact structural features are transmitted to the host computer. As a result, with less data transmitted from the wireless sensors, the energy consumed by the wireless transmission is reduced. To validate the performance of the proposed wireless sensing system, a six-story steel building with replaceable bracings in each story is instrumented with the wireless sensors for on-line damage detection during shaking table tests. The accuracy of the damage detection results using the wireless sensing system is verified through comparison with the results calculated from data recorded of a traditional wired monitoring system. The results demonstrate that, by taking advantage of collocated computing resources in wireless sensors, the proposed wireless sensing system can locate and quantify damage with acceptable accuracy and moderate energy efficiency

  2. Real time network traffic monitoring for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    A wireless local area network (WLAN) is an important type of wireless networks which connotes different wireless nodes in a local area network. WLANs suffer from important problems such as network load balancing, large amount of energy, and load of sampling. This paper presents a new networking traffic approach based on Compressed Sensing (CS) for improving the quality of WLANs. The proposed architecture allows reducing Data Delay Probability (DDP) to 15%, which is a good record for WLANs. The proposed architecture is increased Data Throughput (DT) to 22 % and Signal to Noise (S/N) ratio to 17 %, which provide a good background for establishing high qualified local area networks. This architecture enables continuous data acquisition and compression of WLAN's signals that are suitable for a variety of other wireless networking applications. At the transmitter side of each wireless node, an analog-CS framework is applied at the sensing step before analog to digital converter in order to generate the compressed version of the input signal. At the receiver side of wireless node, a reconstruction algorithm is applied in order to reconstruct the original signals from the compressed signals with high probability and enough accuracy. The proposed algorithm out-performs existing algorithms by achieving a good level of Quality of Service (QoS). This ability allows reducing 15 % of Bit Error Rate (BER) at each wireless node.

  3. Active damage localization for plate-like structures using wireless sensors and a distributed algorithm

    International Nuclear Information System (INIS)

    Liu, L; Yuan, F G

    2008-01-01

    Wireless structural health monitoring (SHM) systems have emerged as a promising technology for robust and cost-effective structural monitoring. However, the applications of wireless sensors on active diagnosis for structural health monitoring (SHM) have not been extensively investigated. Due to limited energy sources, battery-powered wireless sensors can only perform limited functions and are expected to operate at a low duty cycle. Conventional designs are not suitable for sensing high frequency signals, e.g. in the ultrasonic frequency range. More importantly, algorithms to detect structural damage with a vast amount of data usually require considerable processing and communication time and result in unaffordable power consumption for wireless sensors. In this study, an energy-efficient wireless sensor for supporting high frequency signals and a distributed damage localization algorithm for plate-like structures are proposed, discussed and validated to supplement recent advances made for active sensing-based SHM. First, the power consumption of a wireless sensor is discussed and identified. Then the design of a wireless sensor for active diagnosis using piezoelectric sensors is introduced. The newly developed wireless sensor utilizes an optimized combination of field programmable gate array (FPGA) and conventional microcontroller to address the tradeoff between power consumption and speed requirement. The proposed damage localization algorithm, based on an energy decay model, enables wireless sensors to be practically used in active diagnosis. The power consumption for data communication can be minimized while the power budget for data processing can still be affordable for a battery-powered wireless sensor. The Levenberg–Marquardt method is employed in a mains-powered sensor node or PC to locate damage. Experimental results and discussion on the improvement of power efficiency are given

  4. An 802.11 n wireless local area network transmission scheme for wireless telemedicine applications.

    Science.gov (United States)

    Lin, C F; Hung, S I; Chiang, I H

    2010-10-01

    In this paper, an 802.11 n transmission scheme is proposed for wireless telemedicine applications. IEEE 802.11n standards, a power assignment strategy, space-time block coding (STBC), and an object composition Petri net (OCPN) model are adopted. With the proposed wireless system, G.729 audio bit streams, Joint Photographic Experts Group 2000 (JPEG 2000) clinical images, and Moving Picture Experts Group 4 (MPEG-4) video bit streams achieve a transmission bit error rate (BER) of 10-7, 10-4, and 103 simultaneously. The proposed system meets the requirements prescribed for wireless telemedicine applications. An essential feature of this proposed transmission scheme is that clinical information that requires a high quality of service (QoS) is transmitted at a high power transmission rate with significant error protection. For maximizing resource utilization and minimizing the total transmission power, STBC and adaptive modulation techniques are used in the proposed 802.11 n wireless telemedicine system. Further, low power, direct mapping (DM), low-error protection scheme, and high-level modulation are adopted for messages that can tolerate a high BER. With the proposed transmission scheme, the required reliability of communication can be achieved. Our simulation results have shown that the proposed 802.11 n transmission scheme can be used for developing effective wireless telemedicine systems.

  5. Node localization algorithm of wireless sensor networks for large electrical equipment monitoring application

    DEFF Research Database (Denmark)

    Chen, Qinyin; Hu, Y.; Chen, Zhe

    2016-01-01

    Node localization technology is an important technology for the Wireless Sensor Networks (WSNs) applications. An improved 3D node localization algorithm is proposed in this paper, which is based on a Multi-dimensional Scaling (MDS) node localization algorithm for large electrical equipment monito...

  6. Wireless local area network for the dental office.

    Science.gov (United States)

    Mupparapu, Muralidhar

    2004-01-01

    Dental offices are no exception to the implementation of new and advanced technology, especially if it enhances productivity. In a rapidly transforming digital world, wireless technology has a special place, as it has truly "retired the wire" and contributed to the ease and efficient access to patient data and other software-based applications for diagnosis and treatment. If the office or the clinic is networked, access to patient management software, imaging software and treatment planning tools is enhanced. Access will be further enhanced and unrestricted if the entire network is wireless. As with any new, emerging technology, there will be issues that should be kept in mind before adapting to the wireless environment. Foremost is the network security involved in the installation and use of these wireless networks. This short, technical manuscript deals with standards and choices in wireless technology currently available for implementation within a dental office. The benefits of each network security protocol available to protect patient data and boost the efficiency of a modern dental office are discussed.

  7. Handoff Between a Wireless Local Area Network (WLAN and a Wide Area Network (UMTS

    Directory of Open Access Journals (Sweden)

    J. Sánchez–García

    2009-04-01

    Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.

  8. Introduction to Wireless Localization With iPhone SDK Examples

    CERN Document Server

    Chan, Eddie C L

    2012-01-01

    This book provides a comprehensive overview of the entire landscape of both outdoor and indoor wireless positioning, and guides the reader step by step in the implementation of wireless positioning applications on the iPhone. Explanations of fundamental positioning techniques are given throughout the text, along with many programming examples, providing the reader with an independent, practical, and enjoyable learning of the material while gaining a real feel for the subject.  Provides an accessible introduction to positioning technologies such as Global Positioning System and Wi-Fi posi

  9. Software-Defined Radio for Wireless Local-Area Networks

    NARCIS (Netherlands)

    Schiphorst, Roelof

    2004-01-01

    New wireless communications standards do not replace old ones, instead the number of standards keeps on increasing and by now an abundance of standards exists. Moreover there is no reason to assume that this trend will ever stop. Therefore, the software-radio concept is emerging as a potential

  10. Sparsity-Aware Wireless Networks : Localization and Sensor Selection

    NARCIS (Netherlands)

    Jamali-Rad, H.

    2014-01-01

    Wireless networks have revolutionized nowadays world by providing real time cost-efficient service and connectivity. Even such an unprecedented level of service could not fulfill the insatiable desire of the modern world for more advanced technologies. As a result, a great deal of attention has been

  11. A forensic readiness model for Wireless Local Area Networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environments, but also as a means...

  12. Raspberry Pi Based Intelligent Wireless Sensor Node for Localized Torrential Rain Monitoring

    Directory of Open Access Journals (Sweden)

    Zhaozhuo Xu

    2016-01-01

    Full Text Available Wireless sensor networks are proved to be effective in long-time localized torrential rain monitoring. However, the existing widely used architecture of wireless sensor networks for rain monitoring relies on network transportation and back-end calculation, which causes delay in response to heavy rain in localized areas. Our work improves the architecture by applying logistic regression and support vector machine classification to an intelligent wireless sensor node which is created by Raspberry Pi. The sensor nodes in front-end not only obtain data from sensors, but also can analyze the probabilities of upcoming heavy rain independently and give early warnings to local clients in time. When the sensor nodes send the probability to back-end server, the burdens of network transport are released. We demonstrate by simulation results that our sensor system architecture has potentiality to increase the local response to heavy rain. The monitoring capacity is also raised.

  13. COM-LOC: A Distributed Range-Free Localization Algorithm in Wireless Networks

    NARCIS (Netherlands)

    Dil, B.J.; Havinga, Paul J.M.; Marusic, S; Palaniswami, M; Gubbi, J.; Law, Y.W.

    2009-01-01

    This paper investigates distributed range-free localization in wireless networks using a communication protocol called sum-dist which is commonly employed by localization algorithms. With this protocol, the reference nodes flood the network in order to estimate the shortest distance between the

  14. Device localization and dynamic scan plane selection using a wireless MRI detector array

    Science.gov (United States)

    Riffe, Matthew J.; Yutzy, Stephen R.; Jiang, Yun; Twieg, Michael D.; Blumenthal, Colin J.; Hsu, Daniel P.; Pan, Li; Gilson, Wesley D.; Sunshine, Jeffrey L.; Flask, Christopher A.; Duerk, Jeffrey L.; Nakamoto, Dean; Gulani, Vikas; Griswold, Mark A.

    2013-01-01

    Purpose A prototype wireless guidance device using single sideband amplitude modulation (SSB) is presented for a 1.5T MRI system. Methods The device contained three fiducial markers each mounted to an independent receiver coil equipped with wireless SSB technology. Acquiring orthogonal projections of these markers determined the position and orientation of the device, which was used to define the scan plane for a subsequent image acquisition. Device localization and scan plane update required approximately 30 ms, so it could be interleaved with high temporal resolution imaging. Since the wireless device is used for localization and doesn’t require full imaging capability, the design of the SSB wireless system was simplified by allowing an asynchronous clock between the transmitter and receiver. Results When coupled to a high readout bandwidth, the error caused by the lack of a shared frequency reference was quantified to be less than one pixel (0.78 mm) in the projection acquisitions. Image-guidance with the prototype was demonstrated with a phantom where a needle was successfully guided to a target and contrast was delivered. Conclusion The feasibility of active tracking with a wireless detector array is demonstrated. Wireless arrays could be incorporated into devices to assist in image-guided procedures. PMID:23900921

  15. A Survey on Wireless Transmitter Localization Using Signal Strength Measurements

    Directory of Open Access Journals (Sweden)

    Henri Nurminen

    2017-01-01

    Full Text Available Knowledge of deployed transmitters’ (Tx locations in a wireless network improves many aspects of network management. Operators and building administrators are interested in locating unknown Txs for optimizing new Tx placement, detecting and removing unauthorized Txs, selecting the nearest Tx to offload traffic onto it, and constructing radio maps for indoor and outdoor navigation. This survey provides a comprehensive review of existing algorithms that estimate the location of a wireless Tx given a set of observations with the received signal strength indication. Algorithms that require the observations to be location-tagged are suitable for outdoor mapping or small-scale indoor mapping, while algorithms that allow most observations to be unlocated trade off some accuracy to enable large-scale crowdsourcing. This article presents empirical evaluation of the algorithms using numerical simulations and real-world Bluetooth Low Energy data.

  16. Wireless Local Area Network Performance Inside Aircraft Passenger Cabins

    Science.gov (United States)

    Whetten, Frank L.; Soroker, Andrew; Whetten, Dennis A.; Whetten, Frank L.; Beggs, John H.

    2005-01-01

    An examination of IEEE 802.11 wireless network performance within an aircraft fuselage is performed. This examination measured the propagated RF power along the length of the fuselage, and the associated network performance: the link speed, total throughput, and packet losses and errors. A total of four airplanes: one single-aisle and three twin-aisle airplanes were tested with 802.11a, 802.11b, and 802.11g networks.

  17. Wilson loop's phase transition probed by non-local observable

    Directory of Open Access Journals (Sweden)

    Hui-Ling Li

    2018-04-01

    Full Text Available In order to give further insights into the holographic Van der Waals phase transition, it would be of great interest to investigate the behavior of Wilson loop across the holographic phase transition for a higher dimensional hairy black hole. We offer a possibility to proceed with a numerical calculation in order to discussion on the hairy black hole's phase transition, and show that Wilson loop can serve as a probe to detect a phase structure of the black hole. Furthermore, for a first order phase transition, we calculate numerically the Maxwell's equal area construction; and for a second order phase transition, we also study the critical exponent in order to characterize the Wilson loop's phase transition.

  18. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    DEFF Research Database (Denmark)

    Isah, Abdullahi

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....

  19. Securing Wireless Local Area Networks with GoC PKI

    Science.gov (United States)

    2007-10-01

    profit de la technologie d’infrastructure à clé publique (ICP) du Gouvernement du Canada (GC) pour une authentification forte des utilisateurs...environnements protégés du GC lorsqu’il fonctionne en mode entreprise et qu’il est combiné à des certificats délivrés par l’ICP du GC et à une...on the WPA2 secured wireless link. The VPN gateway carries out VPN authentication with the same user certificates used to perform WLAN authentication

  20. Wireless Sensor Networks - Node Localization for Various Industry Problems

    International Nuclear Information System (INIS)

    Derr, Kurt; Manic, Milos

    2015-01-01

    Fast, effective monitoring following airborne releases of toxic substances is critical to mitigate risks to threatened population areas. Wireless sensor nodes at fixed predetermined locations may monitor such airborne releases and provide early warnings to the public. A challenging algorithmic problem is determining the locations to place these sensor nodes while meeting several criteria: 1) provide complete coverage of the domain, and 2) create a topology with problem dependent node densities, while 3) minimizing the number of sensor nodes. This manuscript presents a novel approach to determining optimal sensor placement, Advancing Front mEsh generation with Constrained dElaunay Triangulation and Smoothing (AFECETS) that addresses these criteria. A unique aspect of AFECETS is the ability to determine wireless sensor node locations for areas of high interest (hospitals, schools, high population density areas) that require higher density of nodes for monitoring environmental conditions, a feature that is difficult to find in other research work. The AFECETS algorithm was tested on several arbitrary shaped domains. AFECETS simulation results show that the algorithm 1) provides significant reduction in the number of nodes, in some cases over 40%, compared to an advancing front mesh generation algorithm, 2) maintains and improves optimal spacing between nodes, and 3) produces simulation run times suitable for real-time applications

  1. Advanced Wireless Local Area Networks in the Unlicensed Sub-1GHz ISM-bands

    NARCIS (Netherlands)

    Aust, S.H.

    2014-01-01

    This dissertation addresses the challenges of wireless local area networks (WLANs) that operate in the unlicensed sub-1GHz industrial, scientific, and medical (ISM) band. Frequencies in the 900MHz spectrum enable a wider coverage due to the longer propagation characteristics of the radio waves. To

  2. Distributed push-pull estimation for node localization in wireless sensor networks

    NARCIS (Netherlands)

    Dang, Viet-Hung; Le Viet Duc, L Duc; Lee, Young-Koo; Lee, Sungyoung

    A great deal of research achievements on localization in wireless sensor networks (WSNs) has been obtained in recent years. Nevertheless, its interesting challenges in terms of cost-reduction, accuracy improvement, scalability, and distributed ability design have led to the development of a new

  3. Whitepaper on New Localization Methods for 5G Wireless Systems and the Internet-of-Things

    DEFF Research Database (Denmark)

    Pedersen, Troels; Fleury, Bernard Henri

    2018-01-01

    Disruptive technologies proposed for 5G wireless systems and the IoT hold promise of providing unprecedented localization capabilities for a wide range of application scenarios and target environments. This whitepaper summarizes the expected features and resulting properties of upcoming localizat...

  4. PlayNCool: Opportunistic Network Coding for Local Optimization of Routing in Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Pedersen, Morten Videbæk

    2013-01-01

    This paper introduces PlayNCool, an opportunistic protocol with local optimization based on network coding to increase the throughput of a wireless mesh network (WMN). PlayNCool aims to enhance current routing protocols by (i) allowing random linear network coding transmissions end-to-end, (ii) r...

  5. A MIMO-OFDM Testbed for Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Conrat Jean-Marc

    2006-01-01

    Full Text Available We describe the design steps and final implementation of a MIMO OFDM prototype platform developed to enhance the performance of wireless LAN standards such as HiperLAN/2 and 802.11, using multiple transmit and multiple receive antennas. We first describe the channel measurement campaign used to characterize the indoor operational propagation environment, and analyze the influence of the channel on code design through a ray-tracing channel simulator. We also comment on some antenna and RF issues which are of importance for the final realization of the testbed. Multiple coding, decoding, and channel estimation strategies are discussed and their respective performance-complexity trade-offs are evaluated over the realistic channel obtained from the propagation studies. Finally, we present the design methodology, including cross-validation of the Matlab, C++, and VHDL components, and the final demonstrator architecture. We highlight the increased measured performance of the MIMO testbed over the single-antenna system.

  6. Improved Application of Local Models to Steel Corrosion in Lead-Bismuth Loops

    International Nuclear Information System (INIS)

    Zhang Jinsuo; Li Ning

    2003-01-01

    The corrosion of steels exposed to flowing liquid metals is influenced by local and global conditions of flow systems. The present study improves the previous local models when applied to closed loops by incorporating some global condition effects. In particular the bulk corrosion product concentration is calculated based on balancing the dissolution and precipitation in the entire closed loop. Mass transfer expressions developed in aqueous medium and an analytical expression are tested in the liquid-metal environments. The improved model is applied to a pure lead loop and produces results closer to the experimental data than the previous local models do. The model is also applied to a lead-bismuth eutectic (LBE) test loop. Systematic studies illustrate the effects of the flow rate, the oxygen concentration in LBE, and the temperature profile on the corrosion rate

  7. Anderson localization through Polyakov loops: Lattice evidence and random matrix model

    International Nuclear Information System (INIS)

    Bruckmann, Falk; Schierenberg, Sebastian; Kovacs, Tamas G.

    2011-01-01

    We investigate low-lying fermion modes in SU(2) gauge theory at temperatures above the phase transition. Both staggered and overlap spectra reveal transitions from chaotic (random matrix) to integrable (Poissonian) behavior accompanied by an increasing localization of the eigenmodes. We show that the latter are trapped by local Polyakov loop fluctuations. Islands of such ''wrong'' Polyakov loops can therefore be viewed as defects leading to Anderson localization in gauge theories. We find strong similarities in the spatial profile of these localized staggered and overlap eigenmodes. We discuss possible interpretations of this finding and present a sparse random matrix model that reproduces these features.

  8. Sequential Uniformly Reweighted Sum-Product Algorithm for Cooperative Localization in Wireless Networks

    OpenAIRE

    Li, Wei; Yang, Zhen; Hu, Haifeng

    2014-01-01

    Graphical models have been widely applied in solving distributed inference problems in wireless networks. In this paper, we formulate the cooperative localization problem in a mobile network as an inference problem on a factor graph. Using a sequential schedule of message updates, a sequential uniformly reweighted sum-product algorithm (SURW-SPA) is developed for mobile localization problems. The proposed algorithm combines the distributed nature of belief propagation (BP) with the improved p...

  9. Anchor-Free Localization Method for Mobile Targets in Coal Mine Wireless Sensor Networks

    OpenAIRE

    Pei, Zhongmin; Deng, Zhidong; Xu, Shuo; Xu, Xiao

    2009-01-01

    Severe natural conditions and complex terrain make it difficult to apply precise localization in underground mines. In this paper, an anchor-free localization method for mobile targets is proposed based on non-metric multi-dimensional scaling (Multi-dimensional Scaling: MDS) and rank sequence. Firstly, a coal mine wireless sensor network is constructed in underground mines based on the ZigBee technology. Then a non-metric MDS algorithm is imported to estimate the reference nodes’ location. Fi...

  10. A Three-Dimensional Wireless Indoor Localization System

    Directory of Open Access Journals (Sweden)

    Ping Yi

    2014-01-01

    Full Text Available Indoor localization, an emerging technology in location based service (LBS, is now playing a more and more important role both in commercial and in civilian industry. Global position system (GPS is the most popular solution in outdoor localization field, and the accuracy is around 10 meter error in positioning. However, with complex obstacles in buildings, problems rise in the “last mile” of localization field, which encourage a momentum of indoor localization. The traditional indoor localization system is either range-based or fingerprinting-based, which requires a lot of time and efforts to do the predeployment. In this paper, we present a 3-dimensional on-demand indoor localization system (3D-ODIL, which can be fingerprint-free and deployed rapidly in a multistorey building. The 3D-ODIL consists of two phases, vertical localization and horizontal localization. On vertical direction, we propose multistorey differential (MSD algorithm and implement it to fulfill the vertical localization, which can greatly reduce the number of anchors deployed. We use enhanced field division (EFD algorithm to conduct the horizontal localization. EFD algorithm is a range-free algorithm, the main idea of which is to dynamically divide the field within different signature area and position the target. The accuracy and performance have been validated through our extensive analysis and systematic experiments.

  11. A Mobile Localization Strategy for Wireless Sensor Network in NLOS Conditions

    Institute of Scientific and Technical Information of China (English)

    Long Cheng; Yan Wang; Xingming Sun; Nan Hu; Jian Zhang

    2016-01-01

    The problem of mobile localization for wireless sensor network has attracted considerable attention in recent years.The localization accuracy will drastically grade in non-line of sight (NLOS) conditions.In this paper,we propose a mobile localization strategy based on Kalman filter.The key technologies for the proposed method are the NLOS identification and mitigation.The proposed method does not need the prior knowledge of the NLOS error and it is independent of the physical measurement ways.Simulation results show that the proposed method owns the higher localization accuracy when compared with other methods.

  12. 3D magnetic-resonance-coupling (MRC) localization of wireless capsule endoscopy

    DEFF Research Database (Denmark)

    Xia, Yongming; Zhang, Lihui; Lu, Kaiyuan

    2016-01-01

    ) technique, which has been widely developed for efficient wireless power transfer, is introduced. It is proposed that the distance dependent signal strength in a MRC system can be beneficially used for 3D localization. The new 3D-MRC localization system consists of three orthogonal emitting coils which......Wireless Capsule Endoscope (WCE) enables developing actively controlled capsule for potential complex surgeries, imaging, and new medicine tests. These tasks of WCE need safe, efficient, and precise 3D localization techniques. In this paper, a new application of the magnetic resonance coupling (MRC...... are powered by a battery in the capsule, and three pairs of orthogonal receiving coils which are placed outside human body. The distances between the WCE and the receiving coils can be estimated with good accuracy by studying the signal strengths in individual receiving coils. The proposed new 3D...

  13. Supersymmetric localization for BPS black hole entropy: 1-loop partition function from vector multiplets

    International Nuclear Information System (INIS)

    Gupta, Rajesh Kumar; Ito, Yuto; Jeon, Imtak

    2015-01-01

    We use the techniques of supersymmetric localization to compute the BPS black hole entropy in N=2 supergravity. We focus on the n_v+1 vector multiplets on the black hole near horizon background which is AdS_2× S"2 space. We find the localizing saddle point of the vector multiplets by solving the localization equations, and compute the exact one-loop partition function on the saddle point. Furthermore, we propose the appropriate functional integration measure. Through this measure, the one-loop determinant is written in terms of the radius of the physical metric, which depends on the localizing saddle point value of the vector multiplets. The result for the one-loop determinant is consistent with the logarithmic corrections to the BPS black hole entropy from vector multiplets.

  14. Wireless Magnetic-Based Closed-Loop Control of Self-Propelled Microjets

    Science.gov (United States)

    Khalil, Islam S. M.; Magdanz, Veronika; Sanchez, Samuel; Schmidt, Oliver G.; Misra, Sarthak

    2014-01-01

    In this study, we demonstrate closed-loop motion control of self-propelled microjets under the influence of external magnetic fields. We control the orientation of the microjets using external magnetic torque, whereas the linear motion towards a reference position is accomplished by the thrust and pulling magnetic forces generated by the ejecting oxygen bubbles and field gradients, respectively. The magnetic dipole moment of the microjets is characterized using the U-turn technique, and its average is calculated to be 1.310−10 A.m2 at magnetic field and linear velocity of 2 mT and 100 µm/s, respectively. The characterized magnetic dipole moment is used in the realization of the magnetic force-current map of the microjets. This map in turn is used for the design of a closed-loop control system that does not depend on the exact dynamical model of the microjets and the accurate knowledge of the parameters of the magnetic system. The motion control characteristics in the transient- and steady-states depend on the concentration of the surrounding fluid (hydrogen peroxide solution) and the strength of the applied magnetic field. Our control system allows us to position microjets at an average velocity of 115 m/s, and within an average region-of-convergence of 365 m. PMID:24505244

  15. Localization of Energy Harvesting Empowered Underwater Optical Wireless Sensor Networks

    KAUST Repository

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    with insufficient battery, harvest the energy and starts communicating once it has sufficient energy storage. Network localization is carried out by measuring the RSSs of active nodes, which are modeled based on the underwater optical communication channel

  16. Investigation of High-Efficiency Wireless Power Transfer Criteria of Resonantly-Coupled Loops and Dipoles through Analysis of the Figure of Merit

    Directory of Open Access Journals (Sweden)

    Charles Moorey

    2015-10-01

    Full Text Available The efficiency of a Wireless Power Transfer (WPT system is greatly dependent on both the geometry and operating frequency of the transmitting and receiving structures. By using Coupled Mode Theory (CMT, the figure of merit is calculated for resonantly-coupled loop and dipole systems. An in-depth analysis of the figure of merit is performed with respect to the key geometric parameters of the loops and dipoles, along with the resonant frequency, in order to identify the key relationships leading to high-efficiency WPT. For systems consisting of two identical single-turn loops, it is shown that the choice of both the loop radius and resonant frequency are essential in achieving high-efficiency WPT. For the dipole geometries studied, it is shown that the choice of length is largely irrelevant and that as a result of their capacitive nature, low-MHz frequency dipoles are able to produce significantly higher figures of merit than those of the loops considered. The results of the figure of merit analysis are used to propose and subsequently compare two mid-range loop and dipole WPT systems of equal size and operating frequency, where it is shown that the dipole system is able to achieve higher efficiencies than the loop system of the distance range examined.

  17. Source localization using a non-cocentered orthogonal loop and dipole (NCOLD) array

    Institute of Scientific and Technical Information of China (English)

    Liu Zhaoting; Xu Tongyang

    2013-01-01

    A uniform array of scalar-sensors with intersensor spacings over a large aperture size generally offers enhanced resolution and source localization accuracy, but it may also lead to cyclic ambiguity. By exploiting the polarization information of impinging waves, an electromagnetic vec-tor-sensor array outperforms the unpolarized scalar-sensor array in resolving this cyclic ambiguity. However, the electromagnetic vector-sensor array usually consists of cocentered orthogonal loops and dipoles (COLD), which is easily subjected to mutual coupling across these cocentered dipoles/loops. As a result, the source localization performance of the COLD array may substantially degrade rather than being improved. This paper proposes a new source localization method with a non-cocentered orthogonal loop and dipole (NCOLD) array. The NCOLD array contains only one dipole or loop on each array grid, and the intersensor spacings are larger than a half-wave-length. Therefore, unlike the COLD array, these well separated dipoles/loops minimize the mutual coupling effects and extend the spatial aperture as well. With the NCOLD array, the proposed method can efficiently exploit the polarization information to offer high localization precision.

  18. A Least Square-Based Self-Adaptive Localization Method for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baoguo Yu

    2016-01-01

    Full Text Available In the wireless sensor network (WSN localization methods based on Received Signal Strength Indicator (RSSI, it is usually required to determine the parameters of the radio signal propagation model before estimating the distance between the anchor node and an unknown node with reference to their communication RSSI value. And finally we use a localization algorithm to estimate the location of the unknown node. However, this localization method, though high in localization accuracy, has weaknesses such as complex working procedure and poor system versatility. Concerning these defects, a self-adaptive WSN localization method based on least square is proposed, which uses the least square criterion to estimate the parameters of radio signal propagation model, which positively reduces the computation amount in the estimation process. The experimental results show that the proposed self-adaptive localization method outputs a high processing efficiency while satisfying the high localization accuracy requirement. Conclusively, the proposed method is of definite practical value.

  19. Accuracy of a wireless localization system for radiotherapy

    International Nuclear Information System (INIS)

    Balter, James M.; Wright, J. Nelson; Newell, Laurence J.; Friemel, Barry; Dimmer, Steven; Cheng, Yuki; Wong, John; Vertatschitsch, Edward; Mate, Timothy P.

    2005-01-01

    Purpose: A system has been developed for patient positioning based on real-time localization of implanted electromagnetic transponders (beacons). This study demonstrated the accuracy of the system before clinical trials. Methods and materials: We describe the overall system. The localization component consists of beacons and a source array. A rigid phantom was constructed to place the beacons at known offsets from a localization array. Tests were performed at distances of 80 and 270 mm from the array and at positions in the array plane of up to 8 cm offset. Tests were performed in air and saline to assess the effect of tissue conductivity and with multiple transponders to evaluate crosstalk. Tracking was tested using a dynamic phantom creating a circular path at varying speeds. Results: Submillimeter accuracy was maintained throughout all experiments. Precision was greater proximal to the source plane (σx = 0.006 mm, σy = 0.01 mm, σz = 0.006 mm), but continued to be submillimeter at the end of the designed tracking range at 270 mm from the array (σx = 0.27 mm, σy = 0.36 mm, σz = 0.48 mm). The introduction of saline and the use of multiple beacons did not affect accuracy. Submillimeter accuracy was maintained using the dynamic phantom at speeds of up to 3 cm/s. Conclusion: This system has demonstrated the accuracy needed for localization and monitoring of position during treatment

  20. Distributed collaborative processing in wireless sensor networks with application to target localization and beamforming

    OpenAIRE

    Béjar Haro, Benjamín

    2013-01-01

    Abstract The proliferation of wireless sensor networks and the variety of envisioned applications associated with them has motivated the development of distributed algorithms for collaborative processing over networked systems. One of the applications that has attracted the attention of the researchers is that of target localization where the nodes of the network try to estimate the position of an unknown target that lies within its coverage area. Particularly challenging is the problem of es...

  1. Distributed Water Pollution Source Localization with Mobile UV-Visible Spectrometer Probes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junjie Ma

    2018-02-01

    Full Text Available Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.

  2. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  3. Distributed Water Pollution Source Localization with Mobile UV-Visible Spectrometer Probes in Wireless Sensor Networks.

    Science.gov (United States)

    Ma, Junjie; Meng, Fansheng; Zhou, Yuexi; Wang, Yeyao; Shi, Ping

    2018-02-16

    Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible) spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO) procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.

  4. Measurement of local interfacial area concentration in boiling loop

    International Nuclear Information System (INIS)

    Kyoung, Ho Kang; Byong, Jo Yun; Goon, Cherl Park

    1995-01-01

    An accurate prediction of two-phase flow is essential to many energy systems, including nuclear reactors. To model the two-phase flow, detailed information on the internal flow structure is required. The void fraction and interfacial area concentration are important fundamental parameters characterizing the internal structure of two-phase flow. The interfacial area concentration is defined as the available interfacial area per unit volume of the two-phase mixture in calculations of the interfacial transport of mass, momentum, and energy. Although a number of studies have been made in this area, the interfacial area concentration in two-phase flow has not been sufficiently investigated either experimentally or analytically. Most existing models for interfacial area concentration are limited to area-averaged interfacial area concentration in a flow channel. And the studies on local interfacial area concentration are limited to the case of air-water two-phase flow. However, the internal flow structure of steam-water two-phase flow having various bubble sizes could be quite different from that of air-water two-phase flow, the reliability of which weak in practical applications. In this study, the local interfacial area concentration steam-water two-phase flow has been investigated experimentally in a circular boiling tube having a heating rod in the center, and for the low flow with liquid superficial velocity <1 m/s

  5. SeRLoc: Robust Localization for Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Lazos, Loukas; Poovendran, Radha

    2005-01-01

    .... We show that SeRLoc is robust against known attacks on WSNs such as the wormhole attack, the Sybil attack, and compromise of network entities and analytically compute the probability of success for each attack. We also compare the performance of SeRLoc with state-of-the-art range-independent localization schemes and show that SeRLoc has better performance.

  6. Sidelobe reduction and capacity improvement of open-loop collaborative beamforming in wireless sensor networks.

    Directory of Open Access Journals (Sweden)

    Suhanya Jayaprakasam

    Full Text Available Collaborative beamforming (CBF with a finite number of collaborating nodes (CNs produces sidelobes that are highly dependent on the collaborating nodes' locations. The sidelobes cause interference and affect the communication rate of unintended receivers located within the transmission range. Nulling is not possible in an open-loop CBF since the collaborating nodes are unable to receive feedback from the receivers. Hence, the overall sidelobe reduction is required to avoid interference in the directions of the unintended receivers. However, the impact of sidelobe reduction on the capacity improvement at the unintended receiver has never been reported in previous works. In this paper, the effect of peak sidelobe (PSL reduction in CBF on the capacity of an unintended receiver is analyzed. Three meta-heuristic optimization methods are applied to perform PSL minimization, namely genetic algorithm (GA, particle swarm algorithm (PSO and a simplified version of the PSO called the weightless swarm algorithm (WSA. An average reduction of 20 dB in PSL alongside 162% capacity improvement is achieved in the worst case scenario with the WSA optimization. It is discovered that the PSL minimization in the CBF provides capacity improvement at an unintended receiver only if the CBF cluster is small and dense.

  7. Extension to HiRLoc Algorithm for Localization Error Computation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Swati Saxena

    2013-09-01

    Full Text Available Wireless sensor networks (WSNs have gained importance in recent years as this support a large spectrum of applications such as automotive, health, military, environmental, home and office. Various algorithms have been proposed for making this technology more adaptive the existing algorithms address issues such as safety, security, power consumption, lifetime and localization. This paper presents an extension to HiRLoc algorithm and highlights its benefits. Extended HiRLoc significantly reduce the average localization error by suggesting a new method directional antenna based scheme.

  8. A Heterogeneous Wireless Identification Network for the Localization of Animals Based on Stochastic Movements

    Directory of Open Access Journals (Sweden)

    Ivana Raos

    2009-05-01

    Full Text Available The improvement in the transmission range in wireless applications without the use of batteries remains a significant challenge in identification applications. In this paper, we describe a heterogeneous wireless identification network mostly powered by kinetic energy, which allows the localization of animals in open environments. The system relies on radio communications and a global positioning system. It is made up of primary and secondary nodes. Secondary nodes are kinetic-powered and take advantage of animal movements to activate the node and transmit a specific identifier, reducing the number of batteries of the system. Primary nodes are battery-powered and gather secondary-node transmitted information to provide it, along with position and time data, to a final base station in charge of the animal monitoring. The system allows tracking based on contextual information obtained from statistical data.

  9. Interference-Aware Radio Resource Management for Local Area Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ribeiro CássioB

    2011-01-01

    Full Text Available Interference-aware multiple access is an enabler to cost-efficient and reliable high data-rate local area wireless access. In this paper, we propose an interference-aware radio resource management scheme where receivers inform about their throughput, interference, and signal levels by means of broadcast messages tied to data reception. In the proposed scheme, the conventional scheduler is extended to interference-aware operation where individual scheduling decisions are based on estimated change in system-level performance. The performance of the proposed scheme is evaluated in system simulations where it is compared to a conventional scheduler and a centralized scheduler (global optimum. The convergence of the proposed scheduler is analyzed and signaling overhead of an example implementation is characterized. The results demonstrate that the proposed scheme enables fair and efficient wireless access in challenging interference scenarios, for example, multiple networks deployed in the same geographical area and sharing a common band.

  10. Jammer Localization Using Wireless Devices with Mitigation by Self-Configuration.

    Directory of Open Access Journals (Sweden)

    Qazi Mamoon Ashraf

    Full Text Available Communication abilities of a wireless network decrease significantly in the presence of a jammer. This paper presents a reactive technique, to detect and locate the position of a jammer using a distributed collection of wireless sensor devices. We employ the theory of autonomic computing as a framework to design the same. Upon detection of a jammer, the affected nodes self-configure their power consumption which stops unnecessary waste of battery resources. The scheme then proceeds to determine the approximate location of the jammer by analysing the location of active nodes as well as the affected nodes. This is done by employing a circular curve fitting algorithm. Results indicate a high degree of accuracy in localizing a jammer has been achieved.

  11. An Energy-Efficient Underground Localization System Based on Heterogeneous Wireless Networks

    Science.gov (United States)

    Yuan, Yazhou; Chen, Cailian; Guan, Xinping; Yang, Qiuling

    2015-01-01

    A precision positioning system with energy efficiency is of great necessity for guaranteeing personnel safety in underground mines. The location information of the miners' should be transmitted to the control center timely and reliably; therefore, a heterogeneous network with the backbone based on high speed Industrial Ethernet is deployed. Since the mobile wireless nodes are working in an irregular tunnel, a specific wireless propagation model cannot fit all situations. In this paper, an underground localization system is designed to enable the adaptation to kinds of harsh tunnel environments, but also to reduce the energy consumption and thus prolong the lifetime of the network. Three key techniques are developed and implemented to improve the system performance, including a step counting algorithm with accelerometers, a power control algorithm and an adaptive packets scheduling scheme. The simulation study and experimental results show the effectiveness of the proposed algorithms and the implementation. PMID:26016918

  12. An MEF-Based Localization Algorithm against Outliers in Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Dandan; Wan, Jiangwen; Wang, Meimei; Zhang, Qiang

    2016-07-07

    Precise localization has attracted considerable interest in Wireless Sensor Networks (WSNs) localization systems. Due to the internal or external disturbance, the existence of the outliers, including both the distance outliers and the anchor outliers, severely decreases the localization accuracy. In order to eliminate both kinds of outliers simultaneously, an outlier detection method is proposed based on the maximum entropy principle and fuzzy set theory. Since not all the outliers can be detected in the detection process, the Maximum Entropy Function (MEF) method is utilized to tolerate the errors and calculate the optimal estimated locations of unknown nodes. Simulation results demonstrate that the proposed localization method remains stable while the outliers vary. Moreover, the localization accuracy is highly improved by wisely rejecting outliers.

  13. Anchor-Free Localization Method for Mobile Targets in Coal Mine Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiao Xu

    2009-04-01

    Full Text Available Severe natural conditions and complex terrain make it difficult to apply precise localization in underground mines. In this paper, an anchor-free localization method for mobile targets is proposed based on non-metric multi-dimensional scaling (Multi-dimensional Scaling: MDS and rank sequence. Firstly, a coal mine wireless sensor network is constructed in underground mines based on the ZigBee technology. Then a non-metric MDS algorithm is imported to estimate the reference nodes’ location. Finally, an improved sequence-based localization algorithm is presented to complete precise localization for mobile targets. The proposed method is tested through simulations with 100 nodes, outdoor experiments with 15 ZigBee physical nodes, and the experiments in the mine gas explosion laboratory with 12 ZigBee nodes. Experimental results show that our method has better localization accuracy and is more robust in underground mines.

  14. Anchor-free localization method for mobile targets in coal mine wireless sensor networks.

    Science.gov (United States)

    Pei, Zhongmin; Deng, Zhidong; Xu, Shuo; Xu, Xiao

    2009-01-01

    Severe natural conditions and complex terrain make it difficult to apply precise localization in underground mines. In this paper, an anchor-free localization method for mobile targets is proposed based on non-metric multi-dimensional scaling (Multi-dimensional Scaling: MDS) and rank sequence. Firstly, a coal mine wireless sensor network is constructed in underground mines based on the ZigBee technology. Then a non-metric MDS algorithm is imported to estimate the reference nodes' location. Finally, an improved sequence-based localization algorithm is presented to complete precise localization for mobile targets. The proposed method is tested through simulations with 100 nodes, outdoor experiments with 15 ZigBee physical nodes, and the experiments in the mine gas explosion laboratory with 12 ZigBee nodes. Experimental results show that our method has better localization accuracy and is more robust in underground mines.

  15. Localization in Wireless Sensor Networks: A Survey on Algorithms, Measurement Techniques, Applications and Challenges

    Directory of Open Access Journals (Sweden)

    Anup Kumar Paul

    2017-10-01

    Full Text Available Localization is an important aspect in the field of wireless sensor networks (WSNs that has developed significant research interest among academia and research community. Wireless sensor network is formed by a large number of tiny, low energy, limited processing capability and low-cost sensors that communicate with each other in ad-hoc fashion. The task of determining physical coordinates of sensor nodes in WSNs is known as localization or positioning and is a key factor in today’s communication systems to estimate the place of origin of events. As the requirement of the positioning accuracy for different applications varies, different localization methods are used in different applications and there are several challenges in some special scenarios such as forest fire detection. In this paper, we survey different measurement techniques and strategies for range based and range free localization with an emphasis on the latter. Further, we discuss different localization-based applications, where the estimation of the location information is crucial. Finally, a comprehensive discussion of the challenges such as accuracy, cost, complexity, and scalability are given.

  16. Magnetic vortex chirality determination via local hysteresis loops measurements with magnetic force microscopy

    Science.gov (United States)

    Coïsson, Marco; Barrera, Gabriele; Celegato, Federica; Manzin, Alessandra; Vinai, Franco; Tiberto, Paola

    2016-01-01

    Magnetic vortex chirality in patterned square dots has been investigated by means of a field-dependent magnetic force microscopy technique that allows to measure local hysteresis loops. The chirality affects the two loop branches independently, giving rise to curves that have different shapes and symmetries as a function of the details of the magnetisation reversal process in the square dot, that is studied both experimentally and through micromagnetic simulations. The tip-sample interaction is taken into account numerically, and exploited experimentally, to influence the side of the square where nucleation of the vortex preferably occurs, therefore providing a way to both measure and drive chirality with the present technique. PMID:27426442

  17. Modern techniques and technologies for unbundled access in the local loop

    Science.gov (United States)

    Bacis Vasile, Irina Bristena; Schiopu, Paul; Marghescu, Cristina

    2015-02-01

    The efficient and unbundled use of the existing telecommunications infrastructure represents a major goal for the development of the services offered by telecommunications providers. A major telecommunications operator can provide services to a subscriber using a copper wire pair or part of the frequency spectrum of a copper wire pair, together with other operators, through a process of unbundling access in the local loop. Since access to the vocal band is an already solved problem, concerns turn to the broadband access with xDSL service delivery on ungrouped subscriber loops; besides the legal and economic aspects involved this has become an engineering problem also. The local loop unbundling methods have a substantial technical impact. This impact should be taken into account right from the design stage and then in the standardization stage of broadband systems intended to operate on copper wire pairs in the local loop. These systems are known under the generic term of xDSL and began to be analyzed in the late 90s. xDSL became the dominant solution for providing Internet at a reasonable price for both residential and business subscribers. In this massive development scenario, certain problems will arise from the early stages of deployment, and another type of problems will occur later on when a large number of systems will be installed in a single beam.

  18. Centroid Localization of Uncooperative Nodes in Wireless Networks Using a Relative Span Weighting Method

    Directory of Open Access Journals (Sweden)

    Christine Laurendeau

    2010-01-01

    Full Text Available Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target is a malicious device engaging in a security exploit or a low-battery handset in the middle of a critical emergency. Such scenarios necessitate that a radio signal source be localized by other network nodes efficiently, using minimal information. We propose two new algorithms for estimating the position of an uncooperative transmitter, based on the received signal strength (RSS of a single target message at a set of receivers whose coordinates are known. As an extension to the concept of centroid localization, our mechanisms weigh each receiver's coordinates based on the message's relative RSS at that receiver, with respect to the span of RSS values over all receivers. The weights may decrease from the highest RSS receiver either linearly or exponentially. Our simulation results demonstrate that for all but the most sparsely populated wireless networks, our exponentially weighted mechanism localizes a target node within the regulations stipulated for emergency services location accuracy.

  19. A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Gulshan Kumar

    2017-01-01

    Full Text Available Localization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate the estimated location or try to provide false beacons. In this paper, we have proposed a methodology that will address this problem of security aspects in localization of the sensor nodes. Moreover, we have considered the network environment with random node deployment and mobility as these two conditions are less addressed in previous research works. Further, our proposed algorithm provides low overhead due to the usage of less control messages in a limited transmission range. In addition, we have also proposed an algorithm to detect the malicious anchor nodes inside the network. The simulated results show that our proposed algorithm is efficient in terms of time consumption, localization accuracy, and localization ratio in the presence of malicious nodes.

  20. Structural Health Monitoring of Wind Turbine Blades: Acoustic Source Localization Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Omar Mabrok Bouzid

    2015-01-01

    Full Text Available Structural health monitoring (SHM is important for reducing the maintenance and operation cost of safety-critical components and systems in offshore wind turbines. This paper proposes an in situ wireless SHM system based on an acoustic emission (AE technique. By using this technique a number of challenges are introduced due to high sampling rate requirements, limitations in the communication bandwidth, memory space, and power resources. To overcome these challenges, this paper focused on two elements: (1 the use of an in situ wireless SHM technique in conjunction with the utilization of low sampling rates; (2 localization of acoustic sources which could emulate impact damage or audible cracks caused by different objects, such as tools, bird strikes, or strong hail, all of which represent abrupt AE events and could affect the structural health of a monitored wind turbine blade. The localization process is performed using features extracted from aliased AE signals based on a developed constraint localization model. To validate the performance of these elements, the proposed system was tested by testing the localization of the emulated AE sources acquired in the field.

  1. Relative localization in wireless sensor networks for measurement of electric fields under HVDC transmission lines.

    Science.gov (United States)

    Cui, Yong; Wang, Qiusheng; Yuan, Haiwen; Song, Xiao; Hu, Xuemin; Zhao, Luxing

    2015-02-04

    In the wireless sensor networks (WSNs) for electric field measurement system under the High-Voltage Direct Current (HVDC) transmission lines, it is necessary to obtain the electric field distribution with multiple sensors. The location information of each sensor is essential to the correct analysis of measurement results. Compared with the existing approach which gathers the location information by manually labelling sensors during deployment, the automatic localization can reduce the workload and improve the measurement efficiency. A novel and practical range-free localization algorithm for the localization of one-dimensional linear topology wireless networks in the electric field measurement system is presented. The algorithm utilizes unknown nodes' neighbor lists based on the Received Signal Strength Indicator (RSSI) values to determine the relative locations of nodes. The algorithm is able to handle the exceptional situation of the output permutation which can effectively improve the accuracy of localization. The performance of this algorithm under real circumstances has been evaluated through several experiments with different numbers of nodes and different node deployments in the China State Grid HVDC test base. Results show that the proposed algorithm achieves an accuracy of over 96% under different conditions.

  2. Relative Localization in Wireless Sensor Networks for Measurement of Electric Fields under HVDC Transmission Lines

    Directory of Open Access Journals (Sweden)

    Yong Cui

    2015-02-01

    Full Text Available In the wireless sensor networks (WSNs for electric field measurement system under the High-Voltage Direct Current (HVDC transmission lines, it is necessary to obtain the electric field distribution with multiple sensors. The location information of each sensor is essential to the correct analysis of measurement results. Compared with the existing approach which gathers the location information by manually labelling sensors during deployment, the automatic localization can reduce the workload and improve the measurement efficiency. A novel and practical range-free localization algorithm for the localization of one-dimensional linear topology wireless networks in the electric field measurement system is presented. The algorithm utilizes unknown nodes’ neighbor lists based on the Received Signal Strength Indicator (RSSI values to determine the relative locations of nodes. The algorithm is able to handle the exceptional situation of the output permutation which can effectively improve the accuracy of localization. The performance of this algorithm under real circumstances has been evaluated through several experiments with different numbers of nodes and different node deployments in the China State Grid HVDC test base. Results show that the proposed algorithm achieves an accuracy of over 96% under different conditions.

  3. Wireless implantable chip with integrated nitinol-based pump for radio-controlled local drug delivery.

    Science.gov (United States)

    Fong, Jeffrey; Xiao, Zhiming; Takahata, Kenichi

    2015-02-21

    We demonstrate an active, implantable drug delivery device embedded with a microfluidic pump that is driven by a radio-controlled actuator for temporal drug delivery. The polyimide-packaged 10 × 10 × 2 mm(3) chip contains a micromachined pump chamber and check valves of Parylene C to force the release of the drug from a 76 μL reservoir by wirelessly activating the actuator using external radio-frequency (RF) electromagnetic fields. The rectangular-shaped spiral-coil actuator based on nitinol, a biocompatible shape-memory alloy, is developed to perform cantilever-like actuation for pumping operation. The nitinol-coil actuator itself forms a passive 185 MHz resonant circuit that serves as a self-heat source activated via RF power transfer to enable frequency-selective actuation and pumping. Experimental wireless operation of fabricated prototypes shows successful release of test agents from the devices placed in liquid and excited by radiating tuned RF fields with an output power of 1.1 W. These tests reveal a single release volume of 219 nL, suggesting a device's capacity of ~350 individual ejections of drug from its reservoir. The thermal behavior of the activated device is also reported in detail. This proof-of-concept prototype validates the effectiveness of wireless RF pumping for fully controlled, long-lasting drug delivery, a key step towards enabling patient-tailored, targeted local drug delivery through highly miniaturized implants.

  4. Local integrand representations of all two-loop amplitudes in planar SYM

    International Nuclear Information System (INIS)

    Bourjaily, Jacob L.; Trnka, Jaroslav

    2015-01-01

    We use generalized unitarity at the integrand-level to directly construct local, manifestly dual-conformally invariant formulae for all two-loop scattering amplitudes in planar, maximally supersymmetric Yang-Mills theory (SYM). This representation separates contributions into manifestly finite and manifestly divergent terms — in a way that renders all infrared-safe observables (including ratio functions) calculable without any need for regulation. These results perfectly match the all-loop BCFW recursion relations, to which we provide a closed-form solution valid through two-loop-order. Finally, we describe and document a MATHEMATICA package which implements these results, available as part of this work’s source files on the arXiv.

  5. Holography of Wilson-loop expectation values with local operator insertions

    International Nuclear Information System (INIS)

    Miwa, Akitsugu; Yoneya, Tamiaki

    2006-01-01

    We study the expectation values of Wilson-loop operators with the insertions of local operators Z J and Z-bar J for large J from the bulk viewpoint of AdS/CFT correspondence. Classical solutions of strings attached to such deformed Wilson loops at the conformal boundary are constructed and are applied to the computation of Wilson-loop expectation values. We argue that in order to have such solutions for general insertions at finite positions in the base spacetime of the gauge theory, it is crucial to interpret the holographic correspondence in the semi-classical picture as a tunneling phenomenon, as has been previously established for holographic computations of correlators of BMN operators. This also requires to use the Euclideanized AdS background and Euclidean super Yang-Mills theory

  6. Precise Localization and Formation Control of Swarm Robots via Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Han Wu

    2014-01-01

    Full Text Available Precise localization and formation control are one of the key technologies to achieve coordination and control of swarm robots, which is also currently a bottleneck for practical applications of swarm robotic systems. Aiming at overcoming the limited individual perception and the difficulty of achieving precise localization and formation, a localization approach combining dead reckoning (DR with wireless sensor network- (WSN- based methods is proposed in this paper. Two kinds of WSN localization technologies are adopted in this paper, that is, ZigBee-based RSSI (received signal strength indication global localization and electronic tag floors for calibration of local positioning. First, the DR localization information is combined with the ZigBee-based RSSI position information using the Kalman filter method to achieve precise global localization and maintain the robot formation. Then the electronic tag floors provide the robots with their precise coordinates in some local areas and enable the robot swarm to calibrate its formation by reducing the accumulated position errors. Hence, the overall performance of localization and formation control of the swarm robotic system is improved. Both of the simulation results and the experimental results on a real schematic system are given to demonstrate the success of the proposed approach.

  7. An Effective Cuckoo Search Algorithm for Node Localization in Wireless Sensor Network.

    Science.gov (United States)

    Cheng, Jing; Xia, Linyuan

    2016-08-31

    Localization is an essential requirement in the increasing prevalence of wireless sensor network (WSN) applications. Reducing the computational complexity, communication overhead in WSN localization is of paramount importance in order to prolong the lifetime of the energy-limited sensor nodes and improve localization performance. This paper proposes an effective Cuckoo Search (CS) algorithm for node localization. Based on the modification of step size, this approach enables the population to approach global optimal solution rapidly, and the fitness of each solution is employed to build mutation probability for avoiding local convergence. Further, the approach restricts the population in the certain range so that it can prevent the energy consumption caused by insignificant search. Extensive experiments were conducted to study the effects of parameters like anchor density, node density and communication range on the proposed algorithm with respect to average localization error and localization success ratio. In addition, a comparative study was conducted to realize the same localization task using the same network deployment. Experimental results prove that the proposed CS algorithm can not only increase convergence rate but also reduce average localization error compared with standard CS algorithm and Particle Swarm Optimization (PSO) algorithm.

  8. Constrained State Estimation for Individual Localization in Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoxue Feng

    2014-11-01

    Full Text Available Wireless body sensor networks based on ultra-wideband radio have recently received much research attention due to its wide applications in health-care, security, sports and entertainment. Accurate localization is a fundamental problem to realize the development of effective location-aware applications above. In this paper the problem of constrained state estimation for individual localization in wireless body sensor networks is addressed. Priori knowledge about geometry among the on-body nodes as additional constraint is incorporated into the traditional filtering system. The analytical expression of state estimation with linear constraint to exploit the additional information is derived. Furthermore, for nonlinear constraint, first-order and second-order linearizations via Taylor series expansion are proposed to transform the nonlinear constraint to the linear case. Examples between the first-order and second-order nonlinear constrained filters based on interacting multiple model extended kalman filter (IMM-EKF show that the second-order solution for higher order nonlinearity as present in this paper outperforms the first-order solution, and constrained IMM-EKF obtains superior estimation than IMM-EKF without constraint. Another brownian motion individual localization example also illustrates the effectiveness of constrained nonlinear iterative least square (NILS, which gets better filtering performance than NILS without constraint.

  9. Constrained State Estimation for Individual Localization in Wireless Body Sensor Networks

    Science.gov (United States)

    Feng, Xiaoxue; Snoussi, Hichem; Liang, Yan; Jiao, Lianmeng

    2014-01-01

    Wireless body sensor networks based on ultra-wideband radio have recently received much research attention due to its wide applications in health-care, security, sports and entertainment. Accurate localization is a fundamental problem to realize the development of effective location-aware applications above. In this paper the problem of constrained state estimation for individual localization in wireless body sensor networks is addressed. Priori knowledge about geometry among the on-body nodes as additional constraint is incorporated into the traditional filtering system. The analytical expression of state estimation with linear constraint to exploit the additional information is derived. Furthermore, for nonlinear constraint, first-order and second-order linearizations via Taylor series expansion are proposed to transform the nonlinear constraint to the linear case. Examples between the first-order and second-order nonlinear constrained filters based on interacting multiple model extended kalman filter (IMM-EKF) show that the second-order solution for higher order nonlinearity as present in this paper outperforms the first-order solution, and constrained IMM-EKF obtains superior estimation than IMM-EKF without constraint. Another brownian motion individual localization example also illustrates the effectiveness of constrained nonlinear iterative least square (NILS), which gets better filtering performance than NILS without constraint. PMID:25390408

  10. Constrained state estimation for individual localization in wireless body sensor networks.

    Science.gov (United States)

    Feng, Xiaoxue; Snoussi, Hichem; Liang, Yan; Jiao, Lianmeng

    2014-11-10

    Wireless body sensor networks based on ultra-wideband radio have recently received much research attention due to its wide applications in health-care, security, sports and entertainment. Accurate localization is a fundamental problem to realize the development of effective location-aware applications above. In this paper the problem of constrained state estimation for individual localization in wireless body sensor networks is addressed. Priori knowledge about geometry among the on-body nodes as additional constraint is incorporated into the traditional filtering system. The analytical expression of state estimation with linear constraint to exploit the additional information is derived. Furthermore, for nonlinear constraint, first-order and second-order linearizations via Taylor series expansion are proposed to transform the nonlinear constraint to the linear case. Examples between the first-order and second-order nonlinear constrained filters based on interacting multiple model extended kalman filter (IMM-EKF) show that the second-order solution for higher order nonlinearity as present in this paper outperforms the first-order solution, and constrained IMM-EKF obtains superior estimation than IMM-EKF without constraint. Another brownian motion individual localization example also illustrates the effectiveness of constrained nonlinear iterative least square (NILS), which gets better filtering performance than NILS without constraint.

  11. A Mobile Anchor Assisted Localization Algorithm Based on Regular Hexagon in Wireless Sensor Networks

    Science.gov (United States)

    Rodrigues, Joel J. P. C.

    2014-01-01

    Localization is one of the key technologies in wireless sensor networks (WSNs), since it provides fundamental support for many location-aware protocols and applications. Constraints of cost and power consumption make it infeasible to equip each sensor node in the network with a global position system (GPS) unit, especially for large-scale WSNs. A promising method to localize unknown nodes is to use several mobile anchors which are equipped with GPS units moving among unknown nodes and periodically broadcasting their current locations to help nearby unknown nodes with localization. This paper proposes a mobile anchor assisted localization algorithm based on regular hexagon (MAALRH) in two-dimensional WSNs, which can cover the whole monitoring area with a boundary compensation method. Unknown nodes calculate their positions by using trilateration. We compare the MAALRH with HILBERT, CIRCLES, and S-CURVES algorithms in terms of localization ratio, localization accuracy, and path length. Simulations show that the MAALRH can achieve high localization ratio and localization accuracy when the communication range is not smaller than the trajectory resolution. PMID:25133212

  12. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2015-06-01

    Full Text Available In this paper, we address the thermal rise and Quality-of-Service (QoS provisioning issue for an intra-body Wireless Body Area Network (WBAN having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s, and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  13. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-06-15

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  14. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization.

    Science.gov (United States)

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y; Alouini, Mohamed-Slim

    2017-12-26

    Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs) is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS) based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB) is derived for localization accuracy of the proposed technique.

  15. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization

    KAUST Repository

    Saeed, Nasir

    2017-12-26

    Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs) is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS) based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB) is derived for localization accuracy of the proposed technique.

  16. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization

    Directory of Open Access Journals (Sweden)

    Nasir Saeed

    2017-12-01

    Full Text Available Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB is derived for localization accuracy of the proposed technique.

  17. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization

    KAUST Repository

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs) is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS) based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB) is derived for localization accuracy of the proposed technique.

  18. TrackCC: A Practical Wireless Indoor Localization System Based on Less-Expensive Chips

    Directory of Open Access Journals (Sweden)

    Xiaolong Li

    2017-06-01

    Full Text Available This paper aims at proposing a new wireless indoor localization system (ILS, called TrackCC, based on a commercial type of low-power system-on-chip (SoC, nRF24LE1. This type of chip has only l output power levels and acute fluctuation for a received minimum power level in operation, which give rise to many practical challenges for designing localization algorithms. In order to address these challenges, we exploit the Markov theory to construct a ( l + 1 × ( l + 1 -sized state transition matrix to remove the fluctuation, and then propose a priority-based pattern matching algorithm to search for the most similar match in the signal map to estimate the real position of unknown nodes. The experimental results show that, compared to two existing wireless ILSs, LANDMARC and SAIL, which have meter level positioning accuracy, the proposed TrackCC can achieve the decimeter level accuracy on average in both line-of-sight (LOS and non-line-of-sight (NLOS senarios.

  19. High Resolution Robust GPS-free Localization for Wireless Sensor Networks and its Applications

    KAUST Repository

    Mirza, Mohammed

    2011-12-12

    In this thesis we investigate the problem of robustness and scalability w.r.t. estimating the position of randomly deployed motes/nodes of a Wireless Sensor Network (WSN) without the help of Global Positioning System (GPS) devices. We propose a few applications of range independent localization algorithms that allow the sensors to actively determine their location with high resolution without increasing the complexity of the hardware or any additional device setup. In our first application we try to present a localized and centralized cooperative spectrum sensing using RF sensor networks. This scheme collaboratively sense the spectrum and localize the whole network efficiently and with less difficulty. In second application we try to focus on how efficiently we can localize the nodes, to detect underwater threats, without the use of beacons. In third application we try to focus on 3-Dimensional localization for LTE systems. Our performance evaluation shows that these schemes lead to a significant improvement in localization accuracy compared to the state-of-art range independent localization schemes, without requiring GPS support.

  20. Sparse Localization with a Mobile Beacon Based on LU Decomposition in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunhui Zhao

    2015-09-01

    Full Text Available Node localization is the core in wireless sensor network. It can be solved by powerful beacons, which are equipped with global positioning system devices to know their location information. In this article, we present a novel sparse localization approach with a mobile beacon based on LU decomposition. Our scheme firstly translates node localization problem into a 1-sparse vector recovery problem by establishing sparse localization model. Then, LU decomposition pre-processing is adopted to solve the problem that measurement matrix does not meet the re¬stricted isometry property. Later, the 1-sparse vector can be exactly recovered by compressive sensing. Finally, as the 1-sparse vector is approximate sparse, weighted Cen¬troid scheme is introduced to accurately locate the node. Simulation and analysis show that our scheme has better localization performance and lower requirement for the mobile beacon than MAP+GC, MAP-M, and MAP-MN schemes. In addition, the obstacles and DOI have little effect on the novel scheme, and it has great localization performance under low SNR, thus, the scheme proposed is robust.

  1. Matrix Completion Optimization for Localization in Wireless Sensor Networks for Intelligent IoT

    Directory of Open Access Journals (Sweden)

    Thu L. N. Nguyen

    2016-05-01

    Full Text Available Localization in wireless sensor networks (WSNs is one of the primary functions of the intelligent Internet of Things (IoT that offers automatically discoverable services, while the localization accuracy is a key issue to evaluate the quality of those services. In this paper, we develop a framework to solve the Euclidean distance matrix completion problem, which is an important technical problem for distance-based localization in WSNs. The sensor network localization problem is described as a low-rank dimensional Euclidean distance completion problem with known nodes. The task is to find the sensor locations through recovery of missing entries of a squared distance matrix when the dimension of the data is small compared to the number of data points. We solve a relaxation optimization problem using a modification of Newton’s method, where the cost function depends on the squared distance matrix. The solution obtained in our scheme achieves a lower complexity and can perform better if we use it as an initial guess for an interactive local search of other higher precision localization scheme. Simulation results show the effectiveness of our approach.

  2. A Localization Based Cooperative Routing Protocol for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2017-01-01

    Full Text Available Localization is one of the major aspects in underwater wireless sensor networks (UWSNs. Therefore, it is important to know the accurate position of the sensor node in large scale applications like disaster prevention, tactical surveillance, and monitoring. Due to the inefficiency of the global positioning system (GPS in UWSN, it is very difficult to localize a node in underwater environment compared to terrestrial networks. To minimize the localization error and enhance the localization coverage of the network, two routing protocols are proposed; the first one is mobile autonomous underwater vehicle (MobiL-AUV and the second one is cooperative MobiL (CO-MobiL. In MobiL-AUV, AUVs are deployed and equipped with GPS and act as reference nodes. These reference nodes are used to localize all the nonlocalized ordinary sensor nodes in order to reduce the localization error and maximize the network coverage. CO-MobiL is presented in order to improve the network throughput by using the maximal ratio combining (MRC as diversity technique which combines both signals, received from the source and received from the relay at the destination. It uses amplify-and-forward (AF mechanism to improve the signal between the source and the destination. To support our claims, extensive simulations are performed.

  3. Exact correlators on the Wilson loop in N=4 SYM: localization, defect CFT, and integrability

    Science.gov (United States)

    Giombi, Simone; Komatsu, Shota

    2018-05-01

    We compute a set of correlation functions of operator insertions on the 1 /8 BPS Wilson loop in N=4 SYM by employing supersymmetric localization, OPE and the Gram-Schmidt orthogonalization. These correlators exhibit a simple determinant structure, are position-independent and form a topological subsector, but depend nontrivially on the 't Hooft coupling and the rank of the gauge group. When applied to the 1 /2 BPS circular (or straight) Wilson loop, our results provide an infinite family of exact defect CFT data, including the structure constants of protected defect primaries of arbitrary length inserted on the loop. At strong coupling, we show precise agreement with a direct calculation using perturbation theory around the AdS2 string worldsheet. We also explain the connection of our results to the "generalized Bremsstrahlung functions" previously computed from integrability techniques, reproducing the known results in the planar limit as well as obtaining their finite N generalization. Furthermore, we show that the correlators at large N can be recast as simple integrals of products of polynomials (known as Q-functions) that appear in the Quantum Spectral Curve approach. This suggests an interesting interplay between localization, defect CFT and integrability.

  4. The modelling of a digital forensic readiness approach for wireless local area networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2012-06-01

    Full Text Available generated by the mobile stations and to conduct a proper digital forensic investigation. This paper attempts to address this issue by proposing a wireless digital forensic readiness model designed to monitor, log and preserve wireless network traffic...

  5. Massive 3-loop ladder diagrams for quarkonic local operator matrix elements

    Energy Technology Data Exchange (ETDEWEB)

    Ablinger, Jakob; Schneider, Carsten [Johannes Kepler Univ., Linz (Austria). Research Inst. for Symbolic Computation; Bluemlein, Johannes; Hasselhuhn, Alexander; Wissbrock, Fabian [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Klein, Sebastian [Technische Hochschule Aachen (Germany). Inst. fuer Theoretische Physik

    2012-06-15

    3-loop diagrams of the ladder-type, which emerge for local quarkonic twist-2 operator matrix elements, are computed directly for general values of the Mellin variable N using Appell-function representations and applying modern summation technologies provided by the package Sigma and the method of hyperlogarithms. In some of the diagrams generalized harmonic sums with {xi} element of {l_brace}1,1/2,2{r_brace} emerge beyond the usual nested harmonic sums. As the asymptotic representation of the corresponding integrals shows, the generalized sums conspire giving well behaved expressions for large values of N. These diagrams contribute to the 3-loop heavy flavor Wilson coefficients of the structure functions in deep-inelastic scattering in the region Q{sup 2} >> m{sup 2}.

  6. Massive 3-loop ladder diagrams for quarkonic local operator matrix elements

    International Nuclear Information System (INIS)

    Ablinger, Jakob; Blümlein, Johannes; Hasselhuhn, Alexander; Klein, Sebastian; Schneider, Carsten; Wißbrock, Fabian

    2012-01-01

    3-loop diagrams of the ladder-type, which emerge for local quarkonic twist-2 operator matrix elements, are computed directly for general values of the Mellin variable N using Appell-function representations and applying modern summation technologies provided by the package Sigma and the method of hyperlogarithms. In some of the diagrams generalized harmonic sums with ξ∈{1,1/2,2} emerge beyond the usual nested harmonic sums. As the asymptotic representation of the corresponding integrals shows, the generalized sums conspire giving well behaved expressions for large values of N. These diagrams contribute to the 3-loop heavy flavor Wilson coefficients of the structure functions in deep-inelastic scattering in the region Q 2 ≫m 2 .

  7. Massive 3-loop ladder diagrams for quarkonic local operator matrix elements

    Energy Technology Data Exchange (ETDEWEB)

    Ablinger, Jakob [Research Institute for Symbolic Computation (RISC), Johannes Kepler University, Altenbergerstrasse 69, A-4040 Linz (Austria); Bluemlein, Johannes, E-mail: johannes.bluemlein@desy.de [Deutsches Elektronen-Synchrotron, DESY, Platanenallee 6, D-15738 Zeuthen (Germany); Hasselhuhn, Alexander [Deutsches Elektronen-Synchrotron, DESY, Platanenallee 6, D-15738 Zeuthen (Germany); Klein, Sebastian [Research Institut fuer Theoretische Physik E, RWTH Aachen University, D-52056 Aachen (Germany); Schneider, Carsten [Research Institute for Symbolic Computation (RISC), Johannes Kepler University, Altenbergerstrasse 69, A-4040 Linz (Austria); Wissbrock, Fabian [Deutsches Elektronen-Synchrotron, DESY, Platanenallee 6, D-15738 Zeuthen (Germany)

    2012-11-01

    3-loop diagrams of the ladder-type, which emerge for local quarkonic twist-2 operator matrix elements, are computed directly for general values of the Mellin variable N using Appell-function representations and applying modern summation technologies provided by the package Sigma and the method of hyperlogarithms. In some of the diagrams generalized harmonic sums with {xi} Element-Of {l_brace}1,1/2,2{r_brace} emerge beyond the usual nested harmonic sums. As the asymptotic representation of the corresponding integrals shows, the generalized sums conspire giving well behaved expressions for large values of N. These diagrams contribute to the 3-loop heavy flavor Wilson coefficients of the structure functions in deep-inelastic scattering in the region Q{sup 2} Much-Greater-Than m{sup 2}.

  8. Localizing softness and stress along loops in 3D topological metamaterials

    Science.gov (United States)

    Baardink, Guido; Souslov, Anton; Paulose, Jayson; Vitelli, Vincenzo

    2018-01-01

    Topological states can be used to control the mechanical properties of a material along an edge or around a localized defect. The rigidity of elastic networks is characterized by a topological invariant called the polarization; materials with a well-defined uniform polarization display a dramatic range of edge softness depending on the orientation of the polarization relative to the terminating surface. However, in all 3D mechanical metamaterials proposed to date, the topological modes are mixed with bulk soft modes, which organize themselves in Weyl loops. Here, we report the design of a 3D topological metamaterial without Weyl lines and with a uniform polarization that leads to an asymmetry between the number of soft modes on opposing surfaces. We then use this construction to localize topological soft modes in interior regions of the material by including defect lines—dislocation loops—that are unique to three dimensions. We derive a general formula that relates the difference in the number of soft modes and states of self-stress localized along the dislocation loop to the handedness of the vector triad formed by the lattice polarization, Burgers vector, and dislocation-line direction. Our findings suggest a strategy for preprogramming failure and softness localized along lines in 3D, while avoiding extended soft Weyl modes.

  9. Robust Floor Determination Algorithm for Indoor Wireless Localization Systems under Reference Node Failure

    Directory of Open Access Journals (Sweden)

    Kriangkrai Maneerat

    2016-01-01

    Full Text Available One of the challenging problems for indoor wireless multifloor positioning systems is the presence of reference node (RN failures, which cause the values of received signal strength (RSS to be missed during the online positioning phase of the location fingerprinting technique. This leads to performance degradation in terms of floor accuracy, which in turn affects other localization procedures. This paper presents a robust floor determination algorithm called Robust Mean of Sum-RSS (RMoS, which can accurately determine the floor on which mobile objects are located and can work under either the fault-free scenario or the RN-failure scenarios. The proposed fault tolerance floor algorithm is based on the mean of the summation of the strongest RSSs obtained from the IEEE 802.15.4 Wireless Sensor Networks (WSNs during the online phase. The performance of the proposed algorithm is compared with those of different floor determination algorithms in literature. The experimental results show that the proposed robust floor determination algorithm outperformed the other floor algorithms and can achieve the highest percentage of floor determination accuracy in all scenarios tested. Specifically, the proposed algorithm can achieve greater than 95% correct floor determination under the scenario in which 40% of RNs failed.

  10. Intelligent Local Avoided Collision (iLAC) MAC Protocol for Very High Speed Wireless Network

    Science.gov (United States)

    Hieu, Dinh Chi; Masuda, Akeo; Rabarijaona, Verotiana Hanitriniala; Shimamoto, Shigeru

    Future wireless communication systems aim at very high data rates. As the medium access control (MAC) protocol plays the central role in determining the overall performance of the wireless system, designing a suitable MAC protocol is critical to fully exploit the benefit of high speed transmission that the physical layer (PHY) offers. In the latest 802.11n standard [2], the problem of long overhead has been addressed adequately but the issue of excessive colliding transmissions, especially in congested situation, remains untouched. The procedure of setting the backoff value is the heart of the 802.11 distributed coordination function (DCF) to avoid collision in which each station makes its own decision on how to avoid collision in the next transmission. However, collision avoidance is a problem that can not be solved by a single station. In this paper, we introduce a new MAC protocol called Intelligent Local Avoided Collision (iLAC) that redefines individual rationality in choosing the backoff counter value to avoid a colliding transmission. The distinguishing feature of iLAC is that it fundamentally changes this decision making process from collision avoidance to collaborative collision prevention. As a result, stations can avoid colliding transmissions with much greater precision. Analytical solution confirms the validity of this proposal and simulation results show that the proposed algorithm outperforms the conventional algorithms by a large margin.

  11. Distributed Power Allocation for Wireless Sensor Network Localization: A Potential Game Approach.

    Science.gov (United States)

    Ke, Mingxing; Li, Ding; Tian, Shiwei; Zhang, Yuli; Tong, Kaixiang; Xu, Yuhua

    2018-05-08

    The problem of distributed power allocation in wireless sensor network (WSN) localization systems is investigated in this paper, using the game theoretic approach. Existing research focuses on the minimization of the localization errors of individual agent nodes over all anchor nodes subject to power budgets. When the service area and the distribution of target nodes are considered, finding the optimal trade-off between localization accuracy and power consumption is a new critical task. To cope with this issue, we propose a power allocation game where each anchor node minimizes the square position error bound (SPEB) of the service area penalized by its individual power. Meanwhile, it is proven that the power allocation game is an exact potential game which has one pure Nash equilibrium (NE) at least. In addition, we also prove the existence of an ϵ -equilibrium point, which is a refinement of NE and the better response dynamic approach can reach the end solution. Analytical and simulation results demonstrate that: (i) when prior distribution information is available, the proposed strategies have better localization accuracy than the uniform strategies; (ii) when prior distribution information is unknown, the performance of the proposed strategies outperforms power management strategies based on the second-order cone program (SOCP) for particular agent nodes after obtaining the estimated distribution of agent nodes. In addition, proposed strategies also provide an instructional trade-off between power consumption and localization accuracy.

  12. Multi-hop localization algorithm based on grid-scanning for wireless sensor networks.

    Science.gov (United States)

    Wan, Jiangwen; Guo, Xiaolei; Yu, Ning; Wu, Yinfeng; Feng, Renjian

    2011-01-01

    For large-scale wireless sensor networks (WSNs) with a minority of anchor nodes, multi-hop localization is a popular scheme for determining the geographical positions of the normal nodes. However, in practice existing multi-hop localization methods suffer from various kinds of problems, such as poor adaptability to irregular topology, high computational complexity, low positioning accuracy, etc. To address these issues in this paper, we propose a novel Multi-hop Localization algorithm based on Grid-Scanning (MLGS). First, the factors that influence the multi-hop distance estimation are studied and a more realistic multi-hop localization model is constructed. Then, the feasible regions of the normal nodes are determined according to the intersection of bounding square rings. Finally, a verifiably good approximation scheme based on grid-scanning is developed to estimate the coordinates of the normal nodes. Additionally, the positioning accuracy of the normal nodes can be improved through neighbors' collaboration. Extensive simulations are performed in isotropic and anisotropic networks. The comparisons with some typical algorithms of node localization confirm the effectiveness and efficiency of our algorithm.

  13. Molecular characterization of six sub population Indonesian local goats based on mitochondrial DNA D-loop

    Directory of Open Access Journals (Sweden)

    Aron Batubara

    2013-03-01

    Full Text Available Indonesian local goats were spread in some region, but there was still limited data’s known about the characteristics of its genetic diversity and origin. The Mitochondrial DNA D-loop sequences were used to study the genetic diversity and relationships of six sub population Indonesian local goats, namely, Kacang, Marica, Samosir, Jawarandu, Muara and Bengali goats. From 539 blood samples and DNA extraction collections were selected about 60 samples (10 samples each sub populations analyzed by PCR-RFLP methods, followed sequence analyzed about 5 PCR products each sub population. The results of the sequence analyses were edited and acquired about 957 bp of nucleotides length. After the alignment analyses were found 50 polymorphic sites which divided into 19 haplotype groups of mtDNA D-loop region. The value of nucleotide diversity was 0.014 ± 0.002. Analysis of Neighbour Joining with Kimura 2 Parameter methods and bootstrap test with 1000 replication indicated that each sub population groups was significantly different between one groups to the others. The maternal lineages origin of six breeds of Indonesian local goats was included to the group of lineage B. The Lineage B was the maternal origin of the haplogroup of goats in the region of East Asia, South Asia, China, Mongolia, North and South Africa, Malaysia, Indonesia, Pakistan and India.

  14. Feasibility analysis of loop colostomy closure in patients under local anesthesia

    Directory of Open Access Journals (Sweden)

    Abreu Rone Antônio Alves de

    2006-01-01

    Full Text Available PURPOSE: To verify prospectively the practicability of performing loop colostomy closure under local anesthesia and sedation. METHODS: In this study, 21 patients underwent this operation. Lidocaine 2% and bupivacaine 0.5% were utilized. Pain was evaluated during the operation, on the first postoperative day and at hospital discharge. Intraoperative events, postoperative complications and the acceptability of this procedure were analyzed. RESULTS: The mean duration of the operation was 133 minutes (range: 85 to 290 minutes. The mean postoperative hospitalization was four days (range: one to twelve days. No patients died. Complications occurred in two patients (9.4%: abdominal wall hematoma and operative wound infection. With regard to pain severity, scores of less than or equal to three were indicated in the intraoperative evaluation by 80% of the patients (17/21 and on the first postoperative day by 85% (18/21. At hospital discharge, 95.2% of the patients (20/21 said they were in favor of the local anesthesia technique. CONCLUSION: Loop colostomy closure under local anesthesia and sedation is feasible, safe and acceptable to patients.

  15. An Efficient and Self-Adapting Localization in Static Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wei Dong

    2009-08-01

    Full Text Available Localization is one of the most important subjects in Wireless Sensor Networks (WSNs. To reduce the number of beacons and adopt probabilistic methods, some particle filter-based mobile beacon-assisted localization approaches have been proposed, such as Mobile Beacon-assisted Localization (MBL, Adapting MBL (A-MBL, and the method proposed by Hang et al. Some new significant problems arise in these approaches, however. The first question is which probability distribution should be selected as the dynamic model in the prediction stage. The second is whether the unknown node adopts neighbors’ observation in the update stage. The third is how to find a self-adapting mechanism to achieve more flexibility in the adapting stage. In this paper, we give the theoretical analysis and experimental evaluations to suggest which probability distribution in the dynamic model should be adopted to improve the efficiency in the prediction stage. We also give the condition for whether the unknown node should use the observations from its neighbors to improve the accuracy. Finally, we propose a Self-Adapting Mobile Beacon-assisted Localization (SA-MBL approach to achieve more flexibility and achieve almost the same performance with A-MBL.

  16. A Survey of Sound Source Localization Methods in Wireless Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Maximo Cobos

    2017-01-01

    Full Text Available Wireless acoustic sensor networks (WASNs are formed by a distributed group of acoustic-sensing devices featuring audio playing and recording capabilities. Current mobile computing platforms offer great possibilities for the design of audio-related applications involving acoustic-sensing nodes. In this context, acoustic source localization is one of the application domains that have attracted the most attention of the research community along the last decades. In general terms, the localization of acoustic sources can be achieved by studying energy and temporal and/or directional features from the incoming sound at different microphones and using a suitable model that relates those features with the spatial location of the source (or sources of interest. This paper reviews common approaches for source localization in WASNs that are focused on different types of acoustic features, namely, the energy of the incoming signals, their time of arrival (TOA or time difference of arrival (TDOA, the direction of arrival (DOA, and the steered response power (SRP resulting from combining multiple microphone signals. Additionally, we discuss methods not only aimed at localizing acoustic sources but also designed to locate the nodes themselves in the network. Finally, we discuss current challenges and frontiers in this field.

  17. Localization Algorithm Based on a Spring Model (LASM for Large Scale Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shuai Li

    2008-03-01

    Full Text Available A navigation method for a lunar rover based on large scale wireless sensornetworks is proposed. To obtain high navigation accuracy and large exploration area, highnode localization accuracy and large network scale are required. However, thecomputational and communication complexity and time consumption are greatly increasedwith the increase of the network scales. A localization algorithm based on a spring model(LASM method is proposed to reduce the computational complexity, while maintainingthe localization accuracy in large scale sensor networks. The algorithm simulates thedynamics of physical spring system to estimate the positions of nodes. The sensor nodesare set as particles with masses and connected with neighbor nodes by virtual springs. Thevirtual springs will force the particles move to the original positions, the node positionscorrespondingly, from the randomly set positions. Therefore, a blind node position can bedetermined from the LASM algorithm by calculating the related forces with the neighbornodes. The computational and communication complexity are O(1 for each node, since thenumber of the neighbor nodes does not increase proportionally with the network scale size.Three patches are proposed to avoid local optimization, kick out bad nodes and deal withnode variation. Simulation results show that the computational and communicationcomplexity are almost constant despite of the increase of the network scale size. The time consumption has also been proven to remain almost constant since the calculation steps arealmost unrelated with the network scale size.

  18. GWO-LPWSN: Grey Wolf Optimization Algorithm for Node Localization Problem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    R. Rajakumar

    2017-01-01

    Full Text Available Seyedali Mirjalili et al. (2014 introduced a completely unique metaheuristic technique particularly grey wolf optimization (GWO. This algorithm mimics the social behavior of grey wolves whereas it follows the leadership hierarchy and attacking strategy. The rising issue in wireless sensor network (WSN is localization problem. The objective of this problem is to search out the geographical position of unknown nodes with the help of anchor nodes in WSN. In this work, GWO algorithm is incorporated to spot the correct position of unknown nodes, so as to handle the node localization problem. The proposed work is implemented using MATLAB 8.2 whereas nodes are deployed in a random location within the desired network area. The parameters like computation time, percentage of localized node, and minimum localization error measures are utilized to analyse the potency of GWO rule with other variants of metaheuristics algorithms such as particle swarm optimization (PSO and modified bat algorithm (MBA. The observed results convey that the GWO provides promising results compared to the PSO and MBA in terms of the quick convergence rate and success rate.

  19. Flexible phase-locked loops and millimeter wave PLL components for 60-GHz wireless networks in CMOS

    NARCIS (Netherlands)

    Cheema, H.M.

    2010-01-01

    The 60 GHz license-free frequency band offers the possibility of multi-gigabit per second wireless transmission satisfying the increasing demand of data intensive applications over short distances. Over the last decade, aggressive down-scaling of CMOS technologies coupled with an intensive research

  20. Local integrands for two-loop all-plus Yang-Mills amplitudes

    International Nuclear Information System (INIS)

    Badger, Simon; Mogull, Gustav; Peraro, Tiziano

    2016-01-01

    We express the planar five- and six-gluon two-loop Yang-Mills amplitudes with all positive helicities in compact analytic form using D-dimensional local integrands that are free of spurious singularities. The integrand is fixed from on-shell tree amplitudes in six dimensions using D-dimensional generalised unitarity cuts. The resulting expressions are shown to have manifest infrared behaviour at the integrand level. We also find simple representations of the rational terms obtained after integration in 4−2ϵ dimensions.

  1. Local integrands for two-loop all-plus Yang-Mills amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Badger, Simon; Mogull, Gustav; Peraro, Tiziano [Higgs Centre for Theoretical Physics, School of Physics and Astronomy,The University of Edinburgh, James Clerk Maxwell Building,Peter Guthrie Tait Road, Edinburgh EH9 3FD (United Kingdom)

    2016-08-09

    We express the planar five- and six-gluon two-loop Yang-Mills amplitudes with all positive helicities in compact analytic form using D-dimensional local integrands that are free of spurious singularities. The integrand is fixed from on-shell tree amplitudes in six dimensions using D-dimensional generalised unitarity cuts. The resulting expressions are shown to have manifest infrared behaviour at the integrand level. We also find simple representations of the rational terms obtained after integration in 4−2ϵ dimensions.

  2. A Wireless Sensor Network with Soft Computing Localization Techniques for Track Cycling Applications.

    Science.gov (United States)

    Gharghan, Sadik Kamel; Nordin, Rosdiadee; Ismail, Mahamod

    2016-08-06

    In this paper, we propose two soft computing localization techniques for wireless sensor networks (WSNs). The two techniques, Neural Fuzzy Inference System (ANFIS) and Artificial Neural Network (ANN), focus on a range-based localization method which relies on the measurement of the received signal strength indicator (RSSI) from the three ZigBee anchor nodes distributed throughout the track cycling field. The soft computing techniques aim to estimate the distance between bicycles moving on the cycle track for outdoor and indoor velodromes. In the first approach the ANFIS was considered, whereas in the second approach the ANN was hybridized individually with three optimization algorithms, namely Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), and Backtracking Search Algorithm (BSA). The results revealed that the hybrid GSA-ANN outperforms the other methods adopted in this paper in terms of accuracy localization and distance estimation accuracy. The hybrid GSA-ANN achieves a mean absolute distance estimation error of 0.02 m and 0.2 m for outdoor and indoor velodromes, respectively.

  3. Spatial sparsity based indoor localization in wireless sensor network for assistive healthcare.

    Science.gov (United States)

    Pourhomayoun, Mohammad; Jin, Zhanpeng; Fowler, Mark

    2012-01-01

    Indoor localization is one of the key topics in the area of wireless networks with increasing applications in assistive healthcare, where tracking the position and actions of the patient or elderly are required for medical observation or accident prevention. Most of the common indoor localization methods are based on estimating one or more location-dependent signal parameters like TOA, AOA or RSS. However, some difficulties and challenges caused by the complex scenarios within a closed space significantly limit the applicability of those existing approaches in an indoor assistive environment, such as the well-known multipath effect. In this paper, we develop a new one-stage localization method based on spatial sparsity of the x-y plane. In this method, we directly estimate the location of the emitter without going through the intermediate stage of TOA or signal strength estimation. We evaluate the performance of the proposed method using Monte Carlo simulation. The results show that the proposed method is (i) very accurate even with a small number of sensors and (ii) very effective in addressing the multi-path issues.

  4. Local hysteresis loops measurements on irradiated FeSiB patterned dots by magnetic force microscopy

    Energy Technology Data Exchange (ETDEWEB)

    Coïsson, M., E-mail: m.coisson@inrim.it [INRIM, Electromagnetism Division, strada delle Cacce 91, 10135 Torino (Italy); Barrera, G. [INRIM, Electromagnetism Division, strada delle Cacce 91, 10135 Torino (Italy); Università di Torino, Dipartimento di Chimica, via P. Giuria 9, 10125 Torino (Italy); Celegato, F.; Enrico, E.; Olivetti, E.S.; Tiberto, P.; Vinai, F. [INRIM, Electromagnetism Division, strada delle Cacce 91, 10135 Torino (Italy)

    2015-01-01

    Magnetic Force Microscopy (MFM) has been exploited to develop a technique capable of investigating the field-dependent magnetisation reversal processes in patterned systems, allowing the full reconstruction of a local hysteresis loop. Fe–Si–B dots with a lateral size of 6μm and a thickness of 250 nm have been prepared by sputtering and optical lithography. In the as-prepared state, the dots are characterised by a dense stripe domain configuration, clearly visible at the MFM. Subsequently, the dots have been thinned by means of exposition to a focussed ion beam, consisting of Ga{sup +} ions having an energy of 30 keV. The local hysteresis loops have been measured by means of the MFM-derived technique. The progressive thinning of the dots results in the disappearance of the perpendicular anisotropy responsible for the dense stripe domain configuration, with the dominance of the shape anisotropy for thickness values below ≈70nm. The results are consistent with the spin reorientation transition effect studied on similar systems in the form of continuous thin films.

  5. Local hysteresis loops measurements on irradiated FeSiB patterned dots by magnetic force microscopy

    International Nuclear Information System (INIS)

    Coïsson, M.; Barrera, G.; Celegato, F.; Enrico, E.; Olivetti, E.S.; Tiberto, P.; Vinai, F.

    2015-01-01

    Magnetic Force Microscopy (MFM) has been exploited to develop a technique capable of investigating the field-dependent magnetisation reversal processes in patterned systems, allowing the full reconstruction of a local hysteresis loop. Fe–Si–B dots with a lateral size of 6μm and a thickness of 250 nm have been prepared by sputtering and optical lithography. In the as-prepared state, the dots are characterised by a dense stripe domain configuration, clearly visible at the MFM. Subsequently, the dots have been thinned by means of exposition to a focussed ion beam, consisting of Ga + ions having an energy of 30 keV. The local hysteresis loops have been measured by means of the MFM-derived technique. The progressive thinning of the dots results in the disappearance of the perpendicular anisotropy responsible for the dense stripe domain configuration, with the dominance of the shape anisotropy for thickness values below ≈70nm. The results are consistent with the spin reorientation transition effect studied on similar systems in the form of continuous thin films

  6. Physical activity discrimination improvement using accelerometers and wireless sensor network localization - biomed 2013.

    Science.gov (United States)

    Bashford, Gregory R; Burnfield, Judith M; Perez, Lance C

    2013-01-01

    Automating documentation of physical activity data (e.g., duration and speed of walking or propelling a wheelchair) into the electronic medical record (EMR) offers promise for improving efficiency of documentation and understanding of best practices in the rehabilitation and home health settings. Commercially available devices which could be used to automate documentation of physical activities are either cumbersome to wear or lack the specificity required to differentiate activities. We have designed a novel system to differentiate and quantify physical activities, using inexpensive accelerometer-based biomechanical data technology and wireless sensor networks, a technology combination that has not been used in a rehabilitation setting to date. As a first step, a feasibility study was performed where 14 healthy young adults (mean age = 22.6 ± 2.5 years, mean height = 173 ± 10.0 cm, mean mass = 70.7 ± 11.3 kg) carried out eight different activities while wearing a biaxial accelerometer sensor. Activities were performed at each participant’s self-selected pace during a single testing session in a controlled environment. Linear discriminant analysis was performed by extracting spectral parameters from the subjects’ accelerometer patterns. It is shown that physical activity classification alone results in an average accuracy of 49.5%, but when combined with rule-based constraints using a wireless sensor network with localization capabilities in an in silico simulated room, accuracy improves to 99.3%. When fully implemented, our technology package is expected to improve goal setting, treatment interventions and patient outcomes by enhancing clinicians’ understanding of patients’ physical performance within a day and across the rehabilitation program.

  7. Investigation of various cavity configurations for metamaterial-enhanced field-localizing wireless power transfer

    Science.gov (United States)

    Bui, Huu Nguyen; Pham, Thanh Son; Ngo, Viet; Lee, Jong-Wook

    2017-09-01

    Controlling power to an unintended area is an important issue for enabling wireless power transfer (WPT) systems. The control allows us to enhance efficiency as well as suppress unnecessary flux leakage. The flux leakage from WPT can be reduced effectively via selective field localization. To realize field localization, we propose the use of cavities formed on a single metamaterial slab that acts as a defected metasurface. The cavity is formed by strong field confinement using a hybridization bandgap (HBG), which is created by wave interaction with a two-dimensional array of local resonators on the metasurface. This approach using an HBG demonstrates strong field localization around the cavity regions. Motivated by this result, we further investigate various cavity configurations for different sizes of the transmitter (Tx) and receiver (Rx) resonators. Experiments show that the area of field localization increases with the number of cavities, confirming the successful control of different cavity configurations on the metasurface. Transmission measurements of different cavities show that the number of cavities is an important parameter for efficiency, and excess cavities do not enhance the efficiency but increase unnecessary power leakage. Thus, there exists an optimum number of cavities for a given size ratio between the Tx and Rx resonators. For a 6:1 size ratio, this approach achieves efficiency improvements of 3.69× and 1.59× compared to free space and a uniform metasurface, respectively. For 10:1 and 10:2 size ratios, the efficiency improvements are 3.26× and 1.98× compared to free space and a uniform metasurface, respectively.

  8. A Hybrid DV-Hop Algorithm Using RSSI for Localization in Large-Scale Wireless Sensor Networks.

    Science.gov (United States)

    Cheikhrouhou, Omar; M Bhatti, Ghulam; Alroobaea, Roobaea

    2018-05-08

    With the increasing realization of the Internet-of-Things (IoT) and rapid proliferation of wireless sensor networks (WSN), estimating the location of wireless sensor nodes is emerging as an important issue. Traditional ranging based localization algorithms use triangulation for estimating the physical location of only those wireless nodes that are within one-hop distance from the anchor nodes. Multi-hop localization algorithms, on the other hand, aim at localizing the wireless nodes that can physically be residing at multiple hops away from anchor nodes. These latter algorithms have attracted a growing interest from research community due to the smaller number of required anchor nodes. One such algorithm, known as DV-Hop (Distance Vector Hop), has gained popularity due to its simplicity and lower cost. However, DV-Hop suffers from reduced accuracy due to the fact that it exploits only the network topology (i.e., number of hops to anchors) rather than the distances between pairs of nodes. In this paper, we propose an enhanced DV-Hop localization algorithm that also uses the RSSI values associated with links between one-hop neighbors. Moreover, we exploit already localized nodes by promoting them to become additional anchor nodes. Our simulations have shown that the proposed algorithm significantly outperforms the original DV-Hop localization algorithm and two of its recently published variants, namely RSSI Auxiliary Ranging and the Selective 3-Anchor DV-hop algorithm. More precisely, in some scenarios, the proposed algorithm improves the localization accuracy by almost 95%, 90% and 70% as compared to the basic DV-Hop, Selective 3-Anchor, and RSSI DV-Hop algorithms, respectively.

  9. A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Khan, Anwar; Ahmedy, Ismail; Anisi, Mohammad Hossein; Javaid, Nadeem; Ali, Ihsan; Khan, Nawsher; Alsaqer, Mohammed; Mahmood, Hasan

    2018-01-09

    Interference and energy holes formation in underwater wireless sensor networks (UWSNs) threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM) routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay.

  10. A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Anwar Khan

    2018-01-01

    Full Text Available Interference and energy holes formation in underwater wireless sensor networks (UWSNs threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay.

  11. Novel localized heating technique on centrifugal microfluidic disc with wireless temperature monitoring system.

    Science.gov (United States)

    Joseph, Karunan; Ibrahim, Fatimah; Cho, Jongman

    2015-01-01

    Recent advances in the field of centrifugal microfluidic disc suggest the need for electrical interface in the disc to perform active biomedical assays. In this paper, we have demonstrated an active application powered by the energy harvested from the rotation of the centrifugal microfluidic disc. A novel integration of power harvester disc onto centrifugal microfluidic disc to perform localized heating technique is the main idea of our paper. The power harvester disc utilizing electromagnetic induction mechanism generates electrical energy from the rotation of the disc. This contributes to the heat generation by the embedded heater on the localized heating disc. The main characteristic observed in our experiment is the heating pattern in relative to the rotation of the disc. The heating pattern is monitored wirelessly with a digital temperature sensing system also embedded on the disc. Maximum temperature achieved is 82 °C at rotational speed of 2000 RPM. The technique proves to be effective for continuous heating without the need to stop the centrifugal motion of the disc.

  12. Role of the EHD2 unstructured loop in dimerization, protein binding and subcellular localization.

    Directory of Open Access Journals (Sweden)

    Kriti Bahl

    Full Text Available The C-terminal Eps 15 Homology Domain proteins (EHD1-4 play important roles in regulating endocytic trafficking. EHD2 is the only family member whose crystal structure has been solved, and it contains an unstructured loop consisting of two proline-phenylalanine (PF motifs: KPFRKLNPF. In contrast, despite EHD2 having nearly 70% amino acid identity with its paralogs, EHD1, EHD3 and EHD4, the latter proteins contain a single KPF or RPF motif, but no NPF motif. In this study, we sought to define the precise role of each PF motif in EHD2's homo-dimerization, binding with the protein partners, and subcellular localization. To test the role of the NPF motif, we generated an EHD2 NPF-to-NAF mutant to mimic the homologous sequences of EHD1 and EHD3. We demonstrated that this mutant lost both its ability to dimerize and bind to Syndapin2. However, it continued to localize primarily to the cytosolic face of the plasma membrane. On the other hand, EHD2 NPF-to-APA mutants displayed normal dimerization and Syndapin2 binding, but exhibited markedly increased nuclear localization and reduced association with the plasma membrane. We then hypothesized that the single PF motif of EHD1 (that aligns with the KPF of EHD2 might be responsible for both binding and localization functions of EHD1. Indeed, the EHD1 RPF motif was required for dimerization, interaction with MICAL-L1 and Syndapin2, as well as localization to tubular recycling endosomes. Moreover, recycling assays demonstrated that EHD1 RPF-to-APA was incapable of supporting normal receptor recycling. Overall, our data suggest that the EHD2 NPF phenylalanine residue is crucial for EHD2 localization to the plasma membrane, whereas the proline residue is essential for EHD2 dimerization and binding. These studies support the recently proposed model in which the EHD2 N-terminal region may regulate the availability of the unstructured loop for interactions with neighboring EHD2 dimers, thus promoting

  13. Radiofrequency Field Distribution Assessment in Indoor Areas Covered by Wireless Local Area Network

    Directory of Open Access Journals (Sweden)

    HELBET, R.

    2009-02-01

    Full Text Available Electromagnetic environment becomes day by day more congested. Radio communication systems in the short range are now part of everyday life, and there is a need to also assess the pollution level due to their emission if we take into account human health and protection. There is consistent scientific evidence that environmental electromagnetic field may cause undesirable biological effects or even health hazards. Present paper aims at giving a view on exposure level due to wireless local area networks (WLAN emission solely, as part of environmental radiofrequency pollution. Highly accurate measurements were made indoor by using a frequency-selective measurement system and identifying the correct settings for an error-minimum assessment. We focused on analysis of the electric flux density distribution inside a room, in the far field of the emitting antennas, in case of a single network communication channel. We analyze the influence the network configuration parameters have on the field level. Distance from the source and traffic rate are also important parameters that affect the exposure level. Our measurements indicate that in the immediate vicinity of the WLAN stations the average field may reach as much as 13% from the present accepted reference levels given in the human exposure standards.

  14. Neighbor Discovery Algorithm in Wireless Local Area Networks Using Multi-beam Directional Antennas

    Science.gov (United States)

    Wang, Jin; Peng, Wei; Liu, Song

    2017-10-01

    Neighbor discovery is an important step for Wireless Local Area Networks (WLAN) and the use of multi-beam directional antennas can greatly improve the network performance. However, most neighbor discovery algorithms in WLAN, based on multi-beam directional antennas, can only work effectively in synchronous system but not in asynchro-nous system. And collisions at AP remain a bottleneck for neighbor discovery. In this paper, we propose two asynchrono-us neighbor discovery algorithms: asynchronous hierarchical scanning (AHS) and asynchronous directional scanning (ADS) algorithm. Both of them are based on three-way handshaking mechanism. AHS and ADS reduce collisions at AP to have a good performance in a hierarchical way and directional way respectively. In the end, the performance of the AHS and ADS are tested on OMNeT++. Moreover, it is analyzed that different application scenarios and the factors how to affect the performance of these algorithms. The simulation results show that AHS is suitable for the densely populated scenes around AP while ADS is suitable for that most of the neighborhood nodes are far from AP.

  15. Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wu Haitao

    2009-01-01

    Full Text Available We propose a MAC layer handoff mechanism for IEEE 802.11 Wireless Local Area Networks (WLAN to give benefit to bandwidth-greedy applications at STAs. The proposed mechanism determines an optimal AP with the maximum achievable throughput rather than the best signal condition by estimating the AP's bandwidth with a new on-the-fly measurement method, Transient Frame Capture (TFC, and predicting the actual throughput could be achieved at STAs. Since the TFC is employed based on the promiscuous mode of WLAN NIC, STAs can avoid the service degradation through the current associated AP. In addition, the proposed mechanism is a client-only solution which does not require any modification of network protocol on APs. To evaluate the performance of the proposed mechanism, we develop an analytic model to estimate reliable and accurate bandwidth of the AP and demonstrate through testbed measurement with various experimental study methods. We also validate the fairness of the proposed mechanism through simulation studies.

  16. Secure Localization for Wireless Sensor Networks using Range-Independent Methods

    National Research Council Canada - National Science Library

    Lazos, Loukas; Poovendran, Radha

    2006-01-01

    Wireless Sensor Networks (WSNs) are envisioned to be integrated into our everyday lives, enabling a wealth of commercial applications such as environmental and habitat monitoring, disaster relief and emergency rescue operations...

  17. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  18. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  19. A Research of RSSI-AM Localization Algorithm Based on Data Encryption in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wang Wei

    2014-07-01

    Full Text Available In practical application of wireless sensor networks, because of open environment, signal is easy to be attacked and traditional RSSI location technology produces errors. By analyzing the location modal of RSSI, this paper proposes a new encryption modulation algorithm: RSSI-AM, which is unlike most approaches. The location algorithm has the following advantages: simple calculation, strong security, powerful anti-interference ability and no hardware expansion required. Besides, the simulation experiment shows the location precision of ranging method based on RSSI-AM has obvious improvement compared with traditional algorithm. It can be used in the environment of wireless sensor network nodes with low cost and performance of hardware.

  20. MAC layer power management schemes for efficient energy- delay tradeoffs in wireless local area networks

    OpenAIRE

    Sarkar, Mahasweta

    2006-01-01

    In order to minimize power consumption and thereby prolong the system lifetime of battery powered wireless devices, it makes sense for such devices to transit to a very low power "Sleep" state when they are not communicating with their peers. However the main challenge of the sleep mechanism lies in the wireless nodes inability to "wake up" as soon as a packet arrives for it during its sleep state. This leads to an obvious tradeoff between power saving and packet delay. In this dissertation w...

  1. Multiple wireless protocol advertising system, enabling automatic access selection and local services

    NARCIS (Netherlands)

    Houben, S.A.; Baken, N.; Herve, P.; Smets, R.

    2006-01-01

    We examined efficiency within wireless access options for mobile devices and discovered that a classic pitfall is revisited. As with the proliferation of services in incumbents’ portfolios, leading to a number of coexisting so-called ‘stove-pipes’, we see an isomorphic phenomenon evolving in

  2. Use of a wireless local area network in an orthodontic clinic.

    Science.gov (United States)

    Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M

    2005-06-01

    Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.

  3. ns-2 extension to simulate localization system in wireless sensor networks

    CSIR Research Space (South Africa)

    Abu-Mahfouz, Adnan M

    2011-09-01

    Full Text Available The ns-2 network simulator is one of the most widely used tools by researchers to investigate the characteristics of wireless sensor networks. Academic papers focus on results and rarely include details of how ns-2 simulations are implemented...

  4. The Video Collaborative Localization of a Miner’s Lamp Based on Wireless Multimedia Sensor Networks for Underground Coal Mines

    Directory of Open Access Journals (Sweden)

    Kaiming You

    2015-09-01

    Full Text Available Based on wireless multimedia sensor networks (WMSNs deployed in an underground coal mine, a miner’s lamp video collaborative localization algorithm was proposed to locate miners in the scene of insufficient illumination and bifurcated structures of underground tunnels. In bifurcation area, several camera nodes are deployed along the longitudinal direction of tunnels, forming a collaborative cluster in wireless way to monitor and locate miners in underground tunnels. Cap-lamps are regarded as the feature of miners in the scene of insufficient illumination of underground tunnels, which means that miners can be identified by detecting their cap-lamps. A miner’s lamp will project mapping points on the imaging plane of collaborative cameras and the coordinates of mapping points are calculated by collaborative cameras. Then, multiple straight lines between the positions of collaborative cameras and their corresponding mapping points are established. To find the three-dimension (3D coordinate location of the miner’s lamp a least square method is proposed to get the optimal intersection of the multiple straight lines. Tests were carried out both in a corridor and a realistic scenario of underground tunnel, which show that the proposed miner’s lamp video collaborative localization algorithm has good effectiveness, robustness and localization accuracy in real world conditions of underground tunnels.

  5. The Video Collaborative Localization of a Miner's Lamp Based on Wireless Multimedia Sensor Networks for Underground Coal Mines.

    Science.gov (United States)

    You, Kaiming; Yang, Wei; Han, Ruisong

    2015-09-29

    Based on wireless multimedia sensor networks (WMSNs) deployed in an underground coal mine, a miner's lamp video collaborative localization algorithm was proposed to locate miners in the scene of insufficient illumination and bifurcated structures of underground tunnels. In bifurcation area, several camera nodes are deployed along the longitudinal direction of tunnels, forming a collaborative cluster in wireless way to monitor and locate miners in underground tunnels. Cap-lamps are regarded as the feature of miners in the scene of insufficient illumination of underground tunnels, which means that miners can be identified by detecting their cap-lamps. A miner's lamp will project mapping points on the imaging plane of collaborative cameras and the coordinates of mapping points are calculated by collaborative cameras. Then, multiple straight lines between the positions of collaborative cameras and their corresponding mapping points are established. To find the three-dimension (3D) coordinate location of the miner's lamp a least square method is proposed to get the optimal intersection of the multiple straight lines. Tests were carried out both in a corridor and a realistic scenario of underground tunnel, which show that the proposed miner's lamp video collaborative localization algorithm has good effectiveness, robustness and localization accuracy in real world conditions of underground tunnels.

  6. The Video Collaborative Localization of a Miner’s Lamp Based on Wireless Multimedia Sensor Networks for Underground Coal Mines

    Science.gov (United States)

    You, Kaiming; Yang, Wei; Han, Ruisong

    2015-01-01

    Based on wireless multimedia sensor networks (WMSNs) deployed in an underground coal mine, a miner’s lamp video collaborative localization algorithm was proposed to locate miners in the scene of insufficient illumination and bifurcated structures of underground tunnels. In bifurcation area, several camera nodes are deployed along the longitudinal direction of tunnels, forming a collaborative cluster in wireless way to monitor and locate miners in underground tunnels. Cap-lamps are regarded as the feature of miners in the scene of insufficient illumination of underground tunnels, which means that miners can be identified by detecting their cap-lamps. A miner’s lamp will project mapping points on the imaging plane of collaborative cameras and the coordinates of mapping points are calculated by collaborative cameras. Then, multiple straight lines between the positions of collaborative cameras and their corresponding mapping points are established. To find the three-dimension (3D) coordinate location of the miner’s lamp a least square method is proposed to get the optimal intersection of the multiple straight lines. Tests were carried out both in a corridor and a realistic scenario of underground tunnel, which show that the proposed miner’s lamp video collaborative localization algorithm has good effectiveness, robustness and localization accuracy in real world conditions of underground tunnels. PMID:26426023

  7. Two-loop operator matrix elements for massive fermionic local twist-2 operators in QED

    International Nuclear Information System (INIS)

    Bluemlein, J.; Freitas, A. de; Universidad Simon Bolivar, Caracas; Neerven, W.L. van

    2011-11-01

    We describe the calculation of the two--loop massive operator matrix elements with massive external fermions in QED. We investigate the factorization of the O(α 2 ) initial state corrections to e + e - annihilation into a virtual boson for large cms energies s >>m 2 e into massive operator matrix elements and the massless Wilson coefficients of the Drell-Yan process adapting the color coefficients to the case of QED, as proposed by F. A. Berends et. al. (Nucl. Phys. B 297 (1988)429). Our calculations show explicitly that the representation proposed there works at one-loop order and up to terms linear in ln (s/m 2 e ) at two-loop order. However, the two-loop constant part contains a few structural terms, which have not been obtained in previous direct calculations. (orig.)

  8. Design and optimization of wireless sensor networks for localization and tracking

    OpenAIRE

    Pino Povedano, Sara

    2016-01-01

    Knowledge of the position of nodes in a WSN is crucial in most wireless sensor network (WSN) applications. The gathered information needs to be associated with a particular location in a specific time instant in order to appropiately control de surveillance area. Moreover, WSNs may be used for tracking certain objects in monitoring applications, which also requires the incorporation of location information of the sensor nodes into the tracking algorithms. These requisites ma...

  9. Performance Evaluation of Localization Accuracy for a Log-Normal Shadow Fading Wireless Sensor Network under Physical Barrier Attacks.

    Science.gov (United States)

    Hussein, Ahmed Abdulqader; Rahman, Tharek A; Leow, Chee Yen

    2015-12-04

    Localization is an apparent aspect of a wireless sensor network, which is the focus of much interesting research. One of the severe conditions that needs to be taken into consideration is localizing a mobile target through a dispersed sensor network in the presence of physical barrier attacks. These attacks confuse the localization process and cause location estimation errors. Range-based methods, like the received signal strength indication (RSSI), face the major influence of this kind of attack. This paper proposes a solution based on a combination of multi-frequency multi-power localization (C-MFMPL) and step function multi-frequency multi-power localization (SF-MFMPL), including the fingerprint matching technique and lateration, to provide a robust and accurate localization technique. In addition, this paper proposes a grid coloring algorithm to detect the signal hole map in the network, which refers to the attack-prone regions, in order to carry out corrective actions. The simulation results show the enhancement and robustness of RSS localization performance in the face of log normal shadow fading effects, besides the presence of physical barrier attacks, through detecting, filtering and eliminating the effect of these attacks.

  10. A Localization Method for Underwater Wireless Sensor Networks Based on Mobility Prediction and Particle Swarm Optimization Algorithms

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-02-01

    Full Text Available Due to their special environment, Underwater Wireless Sensor Networks (UWSNs are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO is proposed. In this method, the range-based PSO algorithm is used to locate the beacon nodes, and their velocities can be calculated. The velocity of an unknown node is calculated by using the spatial correlation of underwater object’s mobility, and then their locations can be predicted. The range-based PSO algorithm may cause considerable energy consumption and its computation complexity is a little bit high, nevertheless the number of beacon nodes is relatively smaller, so the calculation for the large number of unknown nodes is succinct, and this method can obviously decrease the energy consumption and time cost of localizing these mobile nodes. The simulation results indicate that this method has higher localization accuracy and better localization coverage rate compared with some other widely used localization methods in this field.

  11. A Localization Method for Underwater Wireless Sensor Networks Based on Mobility Prediction and Particle Swarm Optimization Algorithms.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Jiang, Shengming; Chen, Wei

    2016-02-06

    Due to their special environment, Underwater Wireless Sensor Networks (UWSNs) are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO) is proposed. In this method, the range-based PSO algorithm is used to locate the beacon nodes, and their velocities can be calculated. The velocity of an unknown node is calculated by using the spatial correlation of underwater object's mobility, and then their locations can be predicted. The range-based PSO algorithm may cause considerable energy consumption and its computation complexity is a little bit high, nevertheless the number of beacon nodes is relatively smaller, so the calculation for the large number of unknown nodes is succinct, and this method can obviously decrease the energy consumption and time cost of localizing these mobile nodes. The simulation results indicate that this method has higher localization accuracy and better localization coverage rate compared with some other widely used localization methods in this field.

  12. Performance Evaluation of Localization Accuracy for a Log-Normal Shadow Fading Wireless Sensor Network under Physical Barrier Attacks

    Science.gov (United States)

    Abdulqader Hussein, Ahmed; Rahman, Tharek A.; Leow, Chee Yen

    2015-01-01

    Localization is an apparent aspect of a wireless sensor network, which is the focus of much interesting research. One of the severe conditions that needs to be taken into consideration is localizing a mobile target through a dispersed sensor network in the presence of physical barrier attacks. These attacks confuse the localization process and cause location estimation errors. Range-based methods, like the received signal strength indication (RSSI), face the major influence of this kind of attack. This paper proposes a solution based on a combination of multi-frequency multi-power localization (C-MFMPL) and step function multi-frequency multi-power localization (SF-MFMPL), including the fingerprint matching technique and lateration, to provide a robust and accurate localization technique. In addition, this paper proposes a grid coloring algorithm to detect the signal hole map in the network, which refers to the attack-prone regions, in order to carry out corrective actions. The simulation results show the enhancement and robustness of RSS localization performance in the face of log normal shadow fading effects, besides the presence of physical barrier attacks, through detecting, filtering and eliminating the effect of these attacks. PMID:26690159

  13. On strong-coupling correlation functions of circular Wilson loops and local operators

    International Nuclear Information System (INIS)

    Alday, Luis F; Tseytlin, Arkady A

    2011-01-01

    Motivated by the problem of understanding 3-point correlation functions of gauge-invariant operators in N=4 super Yang-Mills theory we consider correlators involving Wilson loops and a 'light' operator with fixed quantum numbers. At leading order in the strong-coupling expansion such correlators are given by the 'light' vertex operator evaluated on a semiclassical string world surface ending on the corresponding loops at the boundary of AdS 5 x S 5 . We study in detail the example of a correlator of two concentric circular Wilson loops and a dilaton vertex operator. The resulting expression is given by an integral of combinations of elliptic functions and can be computed analytically in some special limits. We also consider a generalization of the minimal surface ending on two circles to the case of non-zero angular momentum J in S 5 and discuss a special limit when one of the Wilson loops is effectively replaced by a 'heavy' operator with charge J. (paper)

  14. Extending Wireless Broadband Network Architectures with Home Gateways, Localization, and Physical Environment Surveillance

    DEFF Research Database (Denmark)

    Jelling Kristoffersen, Kåre; Kjærgaard, Mikkel Baun; Chen, Jianjun

    2005-01-01

    homes. It must bridge across the most prevalent standard protocols for data, video, telephony and telemetry, and must be able to automatically discover new devices in a residence and allow over the air/wire provisioning, billing, management and aggregation of new services from multiple service providers...... is initially demonstrated in a 52 DECT base station installation covering four office buildings of total 4500 m2 . Finally the paper proposes the application of a commercial off-the-shelf wireless broadband network as a sensor network, without any additional hardware, for physical intrusion detection of e...

  15. Tunable locally-optimal geographical forwarding in wireless sensor networks with sleep-wake cycling nodes

    OpenAIRE

    Naveen, K. P.; Kumar, A.

    2009-01-01

    We consider a wireless sensor network whose main function is to detect certain infrequent alarm events, and to forward alarm packets to a base station, using geographical forwarding. The nodes know their locations, and they sleep-wake cycle, waking up periodically but not synchronously. In this situation, when a node has a packet to forward to the sink, there is a trade-off between how long this node waits for a suitable neighbor to wake up and the progress the packet makes towards the sink o...

  16. The Localized Discovery and Recovery for Query Packet Losses in Wireless Sensor Networks with Distributed Detector Clusters

    Directory of Open Access Journals (Sweden)

    Ryu Miura

    2013-06-01

    Full Text Available An essential application of wireless sensor networks is to successfully respond to user queries. Query packet losses occur in the query dissemination due to wireless communication problems such as interference, multipath fading, packet collisions, etc. The losses of query messages at sensor nodes result in the failure of sensor nodes reporting the requested data. Hence, the reliable and successful dissemination of query messages to sensor nodes is a non-trivial problem. The target of this paper is to enable highly successful query delivery to sensor nodes by localized and energy-efficient discovery, and recovery of query losses. We adopt local and collective cooperation among sensor nodes to increase the success rate of distributed discoveries and recoveries. To enable the scalability in the operations of discoveries and recoveries, we employ a distributed name resolution mechanism at each sensor node to allow sensor nodes to self-detect the correlated queries and query losses, and then efficiently locally respond to the query losses. We prove that the collective discovery of query losses has a high impact on the success of query dissemination and reveal that scalability can be achieved by using the proposed approach. We further study the novel features of the cooperation and competition in the collective recovery at PHY and MAC layers, and show that the appropriate number of detectors can achieve optimal successful recovery rate. We evaluate the proposed approach with both mathematical analyses and computer simulations. The proposed approach enables a high rate of successful delivery of query messages and it results in short route lengths to recover from query losses. The proposed approach is scalable and operates in a fully distributed manner.

  17. Analysis and experiments on Fano interference using a 2D metamaterial cavity for field localized wireless power transfer

    International Nuclear Information System (INIS)

    Pham, Thanh Son; Ranaweera, Aruna Kumara; Ngo, Duc Viet; Lee, Jong-Wook

    2017-01-01

    To meet both safety and efficiency demands of future wireless power transfer (WPT) systems, field leakage to the nearby environment should be controlled below a certain level. Therefore, field localization is one of the key issues in advanced WPT systems. Recently, metamaterials have shown great potential for enhanced control of electromagnetic propagation in various environments. In this work, we investigate a locally modified metamaterial to create a two-dimensional (2D) cavity for field localization at a sub-wavelength scale. We also show that the field localization in the cavity can be explained using Fano-type interference. We believe that this is one of the first works demonstrating that Fano-type interference can be applied for resonance-coupled mid-range WPT. Using the proposed approach, we achieve a localized WPT in a region that is eight times smaller than that of a transmit coil. At a distance of 0.6 meters, the measured efficiency is 56.5%, which represents a six-fold and two-fold enhancement compared to free space and uniform metamaterial slabs, respectively. (paper)

  18. Analysis and experiments on Fano interference using a 2D metamaterial cavity for field localized wireless power transfer

    Science.gov (United States)

    Son Pham, Thanh; Kumara Ranaweera, Aruna; Viet Ngo, Duc; Lee, Jong-Wook

    2017-08-01

    To meet both safety and efficiency demands of future wireless power transfer (WPT) systems, field leakage to the nearby environment should be controlled below a certain level. Therefore, field localization is one of the key issues in advanced WPT systems. Recently, metamaterials have shown great potential for enhanced control of electromagnetic propagation in various environments. In this work, we investigate a locally modified metamaterial to create a two-dimensional (2D) cavity for field localization at a sub-wavelength scale. We also show that the field localization in the cavity can be explained using Fano-type interference. We believe that this is one of the first works demonstrating that Fano-type interference can be applied for resonance-coupled mid-range WPT. Using the proposed approach, we achieve a localized WPT in a region that is eight times smaller than that of a transmit coil. At a distance of 0.6 meters, the measured efficiency is 56.5%, which represents a six-fold and two-fold enhancement compared to free space and uniform metamaterial slabs, respectively.

  19. Securing the communication of medical information using local biometric authentication and commercial wireless links.

    Science.gov (United States)

    Ivanov, Vladimir I; Yu, Paul L; Baras, John S

    2010-09-01

    Medical information is extremely sensitive in nature - a compromise, such as eavesdropping or tampering by a malicious third party, may result in identity theft, incorrect diagnosis and treatment, and even death. Therefore, it is important to secure the transfer of medical information from the patient to the recording system. We consider a portable, wireless device transferring medical information to a remote server. We decompose this problem into two sub-problems and propose security solutions to each of them: (1) to secure the link between the patient and the portable device, and (2) to secure the link between the portable device and the network. Thus we push the limits of the network security to the edge by authenticating the user using their biometric information; authenticating the device to the network at the physical layer; and strengthening the security of the wireless link with a key exchange mechanism. The proposed authentication methods can be used for recording the readings of medical data in a central database and for accessing medical records in various settings.

  20. One-loop effective action for non-local modified Gauss-Bonnet gravity in de Sitter space

    Energy Technology Data Exchange (ETDEWEB)

    Cognola, Guido; Zerbini, Sergio [Universita di Trento (Italy); Istituto Nazionale di Fisica Nucleare Gruppo Collegato di Trento, Dipartimento di Fisica, Trento (Italy); Elizalde, Emilio [Consejo Superior de Investigaciones Cientificas (ICE/CSIC) and Institut d' Estudis Espacials de Catalunya (IEEC), Facultat Ciencies, Bellaterra (Barcelona) (Spain); Nojiri, Shin' ichi [Nagoya University, Department of Physics, Nagoya (Japan); Odintsov, Sergei D. [Consejo Superior de Investigaciones Cientificas (ICE/CSIC) and Institut d' Estudis Espacials de Catalunya (IEEC), Facultat Ciencies, Bellaterra (Barcelona) (Spain); ICREA, Barcelona (Spain); TSPU, Center of Theor. Phys., Tomsk (Russian Federation)

    2009-12-15

    We discuss the classical and quantum properties of non-local modified Gauss-Bonnet gravity in de Sitter space, using its equivalent representation via string-inspired local scalar-Gauss-Bonnet gravity with a scalar potential. A classical, multiple de Sitter universe solution is found where one of the de Sitter phases corresponds to the primordial inflationary epoch, while the other de Sitter space solution - the one with the smallest Hubble rate - describes the late-time acceleration of our universe. A Chameleon scenario for the theory under investigation is developed, and it is successfully used to show that the theory complies with gravitational tests. An explicit expression for the one-loop effective action for this non-local modified Gauss-Bonnet gravity in the de Sitter space is obtained. It is argued that this effective action might be an important step towards the solution of the cosmological constant problem. (orig.)

  1. The Wireless ATM Architecture

    Directory of Open Access Journals (Sweden)

    R. Palitefka

    1998-06-01

    Full Text Available An overview of the proposed wireless ATM structure is provided. Wireless communication have been developed to a level where offered services can now be extended beyond voice and data. There are already wireless LANs, cordless systems offering data services and mobile data. Wireless LAN systems are basically planned for local, on-promises and in-house networking providing short distance radio or infrared links between computer system. The main challenge of wireless ATM is to harmonise the development of broadband wireless system with service B -ISDN/ATM and ATM LANs, and offer multimedia multiservice features for the support of time-sensitive voice communication, video, desktop multimedia applications, and LAN data traffic for the wireless user.

  2. Accurate localization technique for smart fiber-wireless in-house networks

    NARCIS (Netherlands)

    Tangdiongga, E.; Abraha, S.T.; Crivellaro, A.; Okonkwo, C.M.; Gaudino, R.; Koonen, A.M.J.

    2012-01-01

    The use of a RoF scheme for localization purposes of mobile stations for in-house networks is presented. Using impulse radio UWB over SMF and time-of-arrival localization method, mobile stations can be localized within centimeters accuracy.

  3. Hop-distance relationship analysis with quasi-UDG model for node localization in wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Chen Ping

    2011-01-01

    Full Text Available Abstract In wireless sensor networks (WSNs, location information plays an important role in many fundamental services which includes geographic routing, target tracking, location-based coverage, topology control, and others. One promising approach in sensor network localization is the determination of location based on hop counts. A critical priori of this approach that directly influences the accuracy of location estimation is the hop-distance relationship. However, most of the related works on the hop-distance relationship assume the unit-disk graph (UDG model that is unrealistic in a practical scenario. In this paper, we formulate the hop-distance relationship for quasi-UDG model in WSNs where sensor nodes are randomly and independently deployed in a circular region based on a Poisson point process. Different from the UDG model, quasi-UDG model has the non-uniformity property for connectivity. We derive an approximated recursive expression for the probability of the hop count with a given geographic distance. The border effect and dependence problem are also taken into consideration. Furthermore, we give the expressions describing the distribution of distance with known hop counts for inner nodes and those suffered from the border effect where we discover the insignificance of the border effect. The analytical results are validated by simulations showing the accuracy of the employed approximation. Besides, we demonstrate the localization application of the formulated relationship and show the accuracy improvement in the WSN localization.

  4. Optimalization of Beacon Selection for Localization in Wireless AD-HOC Networks

    Directory of Open Access Journals (Sweden)

    Martin Matula

    2008-01-01

    Full Text Available In this paper we engage in optimalization of convenient beacons for localization position of a node in the ad-hoc network. An algorithm designed by us localizes position of moving or static node by RSS (Received Signal Strength method and trilateration. At first, localization of unknown node runs by combination of all beacons. Than optimalizating algorithmreduces the number of beacons (and repeats localization, while only three left. Its reduction is based on highest levels of received signal strength. It is only when signals are from the nearest beacons. Position localizating exactness is statistically interpreted from all localization by beacons combination and its repeating.

  5. "Closing the Loop": Overcoming barriers to locally sourcing food in Fort Collins, Colorado

    Science.gov (United States)

    DeMets, C. M.

    2012-12-01

    Environmental sustainability has become a focal point for many communities in recent years, and restaurants are seeking creative ways to become more sustainable. As many chefs realize, sourcing food locally is an important step towards sustainability and towards building a healthy, resilient community. Review of literature on sustainability in restaurants and the local food movement revealed that chefs face many barriers to sourcing their food locally, but that there are also many solutions for overcoming these barriers that chefs are in the early stages of exploring. Therefore, the purpose of this research is to identify barriers to local sourcing and investigate how some restaurants are working to overcome those barriers in the city of Fort Collins, Colorado. To do this, interviews were conducted with four subjects who guide purchasing decisions for restaurants in Fort Collins. Two of these restaurants have created successful solutions and are able to source most of their food locally. The other two are interested in and working towards sourcing locally but have not yet been able to overcome barriers, and therefore only source a few local items. Findings show that there are four barriers and nine solutions commonly identified by each of the subjects. The research found differences between those who source most of their food locally and those who have not made as much progress in local sourcing. Based on these results, two solution flowcharts were created, one for primary barriers and one for secondary barriers, for restaurants to assess where they are in the local food chain and how they can more successfully source food locally. As there are few explicit connections between this research question and climate change, it is important to consider the implicit connections that motivate and justify this research. The question of whether or not greenhouse gas emissions are lower for locally sourced food is a topic of much debate, and while there are major developments

  6. On the Impact of Localization and Density Control Algorithms in Target Tracking Applications for Wireless Sensor Networks

    Science.gov (United States)

    Campos, Andre N.; Souza, Efren L.; Nakamura, Fabiola G.; Nakamura, Eduardo F.; Rodrigues, Joel J. P. C.

    2012-01-01

    Target tracking is an important application of wireless sensor networks. The networks' ability to locate and track an object is directed linked to the nodes' ability to locate themselves. Consequently, localization systems are essential for target tracking applications. In addition, sensor networks are often deployed in remote or hostile environments. Therefore, density control algorithms are used to increase network lifetime while maintaining its sensing capabilities. In this work, we analyze the impact of localization algorithms (RPE and DPE) and density control algorithms (GAF, A3 and OGDC) on target tracking applications. We adapt the density control algorithms to address the k-coverage problem. In addition, we analyze the impact of network density, residual integration with density control, and k-coverage on both target tracking accuracy and network lifetime. Our results show that DPE is a better choice for target tracking applications than RPE. Moreover, among the evaluated density control algorithms, OGDC is the best option among the three. Although the choice of the density control algorithm has little impact on the tracking precision, OGDC outperforms GAF and A3 in terms of tracking time. PMID:22969329

  7. Localized and Energy-Efficient Topology Control in Wireless Sensor Networks Using Fuzzy-Logic Control Approaches

    Directory of Open Access Journals (Sweden)

    Yuanjiang Huang

    2014-01-01

    Full Text Available The sensor nodes in the Wireless Sensor Networks (WSNs are prone to failures due to many reasons, for example, running out of battery or harsh environment deployment; therefore, the WSNs are expected to be able to maintain network connectivity and tolerate certain amount of node failures. By applying fuzzy-logic approach to control the network topology, this paper aims at improving the network connectivity and fault-tolerant capability in response to node failures, while taking into account that the control approach has to be localized and energy efficient. Two fuzzy controllers are proposed in this paper: one is Learning-based Fuzzy-logic Topology Control (LFTC, of which the fuzzy controller is learnt from a training data set; another one is Rules-based Fuzzy-logic Topology Control (RFTC, of which the fuzzy controller is obtained through designing if-then rules and membership functions. Both LFTC and RFTC do not rely on location information, and they are localized. Comparing them with other three representative algorithms (LTRT, List-based, and NONE through extensive simulations, our two proposed fuzzy controllers have been proved to be very energy efficient to achieve desired node degree and improve the network connectivity when sensor nodes run out of battery or are subject to random attacks.

  8. Wireless digital information transfer : Modelling, prediction and assessment

    NARCIS (Netherlands)

    Lager, I.E.; De Hoop, A.T.; Kikkawa, T.

    2013-01-01

    The loop-to-loop pulsed electromagnetic field wireless signal transfer is investigated with a view on its application in wireless digital information transfer. Closed-form expressions are derived for the emitted magnetic field and for the open-circuit voltage of the receiving loop in dependence on

  9. A Robust Wireless Sensor Network Localization Algorithm in Mixed LOS/NLOS Scenario.

    Science.gov (United States)

    Li, Bing; Cui, Wei; Wang, Bin

    2015-09-16

    Localization algorithms based on received signal strength indication (RSSI) are widely used in the field of target localization due to its advantages of convenient application and independent from hardware devices. Unfortunately, the RSSI values are susceptible to fluctuate under the influence of non-line-of-sight (NLOS) in indoor space. Existing algorithms often produce unreliable estimated distances, leading to low accuracy and low effectiveness in indoor target localization. Moreover, these approaches require extra prior knowledge about the propagation model. As such, we focus on the problem of localization in mixed LOS/NLOS scenario and propose a novel localization algorithm: Gaussian mixed model based non-metric Multidimensional (GMDS). In GMDS, the RSSI is estimated using a Gaussian mixed model (GMM). The dissimilarity matrix is built to generate relative coordinates of nodes by a multi-dimensional scaling (MDS) approach. Finally, based on the anchor nodes' actual coordinates and target's relative coordinates, the target's actual coordinates can be computed via coordinate transformation. Our algorithm could perform localization estimation well without being provided with prior knowledge. The experimental verification shows that GMDS effectively reduces NLOS error and is of higher accuracy in indoor mixed LOS/NLOS localization and still remains effective when we extend single NLOS to multiple NLOS.

  10. Drifts and Environmental Disturbances in Atomic Clock Subsystems: Quantifying Local Oscillator, Control Loop, and Ion Resonance Interactions.

    Science.gov (United States)

    Enzer, Daphna G; Diener, William A; Murphy, David W; Rao, Shanti R; Tjoelker, Robert L

    2017-03-01

    Linear ion trap frequency standards are among the most stable continuously operating frequency references and clocks. Depending on the application, they have been operated with a variety of local oscillators (LOs), including quartz ultrastable oscillators, hydrogen-masers, and cryogenic sapphire oscillators. The short-, intermediate-, and long-term stability of the frequency output is a complicated function of the fundamental performances, the time dependence of environmental disturbances, the atomic interrogation algorithm, the implemented control loop, and the environmental sensitivity of the LO and the atomic system components. For applications that require moving these references out of controlled lab spaces and into less stable environments, such as fieldwork or spaceflight, a deeper understanding is needed of how disturbances at different timescales impact the various subsystems of the clock and ultimately the output stability. In this paper, we analyze which perturbations have an impact and to what degree. We also report on a computational model of a control loop, which keeps the microwave source locked to the ion resonance. This model is shown to agree with laboratory measurements of how well the feedback removes various disturbances and also with a useful analytic approach we developed for predicting these impacts.

  11. A scalable global positioning system-free localization scheme for underwater wireless sensor networks

    KAUST Repository

    Mohammed, A.M.

    2013-05-07

    Seaweb is an acoustic communication technology that enables communication between sensor nodes. Seaweb technology utilizes the commercially available telesonar modems that has developed link and network layer firmware to provide a robust undersea communication capability. Seaweb interconnects the underwater nodes through digital signal processing-based modem by using acoustic links between the neighboring sensors. In this paper, we design and investigate a global positioning system-free passive localization protocol by integrating the innovations of levelling and localization with the Seaweb technology. This protocol uses the range data and planar trigonometry principles to estimate the positions of the underwater sensor nodes. Moreover, for precise localization, we consider more realistic conditions namely, (a) small displacement of sensor nodes due to watch circles and (b) deployment of sensor nodes over non-uniform water surface. Once the nodes are localized, we divide the whole network field into circular levels and sectors to minimize the traffic complexity and thereby increases the lifetime of the sensor nodes in the network field. We then form the mesh network inside each of the sectors that increases the reliability. The algorithm is designed in such a way that it overcomes the ambiguous nodes errata and reflected paths and therefore makes the algorithm more robust. The synthetic network geometries are so designed which can evaluate the algorithm in the presence of perfect or imperfect ranges or in case of incomplete data. A comparative study is made with the existing algorithms which proves the efficiency of our newly proposed algorithm. 2013 Mohammed et al.

  12. Wormholes no more? Localized Wormhole Detection and Prevention in Wireless Networks

    DEFF Research Database (Denmark)

    Tassos, Dimitriou; Giannetsos, Athanasios

    2010-01-01

    localized and works by looking for simple evidence that no attack is taking place, using only connectivity information as implied by the underlying communication graph, and total absence of coordination. Unlike many existing techniques, it does not use any specialized hardware, making it extremely useful...... with an implementation on real sensor devices that demonstrates its efficiency in terms of memory requirements and processing overhead....

  13. Localization Improvement in Wireless Sensor Networks Using a New Statistical Channel Model

    DEFF Research Database (Denmark)

    Karimi Alavijeh, Amir; Ramezani, Hossein; Karimi Alavijeh, Ali

    2018-01-01

    of this statistical relationship, we have investigated the localization problem of a hidden node using extended Kalman filter (EKF). Compared to the conventional EKF in which the covariance matrix of measurement noise is fixed, this matrix can be updated online using the proposed model. The experimental...

  14. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Chao Ding

    2017-01-01

    Full Text Available Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs, adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  15. A novel cooperative localization algorithm using enhanced particle filter technique in maritime search and rescue wireless sensor network.

    Science.gov (United States)

    Wu, Huafeng; Mei, Xiaojun; Chen, Xinqiang; Li, Junjun; Wang, Jun; Mohapatra, Prasant

    2018-07-01

    Maritime search and rescue (MSR) play a significant role in Safety of Life at Sea (SOLAS). However, it suffers from scenarios that the measurement information is inaccurate due to wave shadow effect when utilizing wireless Sensor Network (WSN) technology in MSR. In this paper, we develop a Novel Cooperative Localization Algorithm (NCLA) in MSR by using an enhanced particle filter method to reduce measurement errors on observation model caused by wave shadow effect. First, we take into account the mobility of nodes at sea to develop a motion model-Lagrangian model. Furthermore, we introduce both state model and observation model to constitute a system model for particle filter (PF). To address the impact of the wave shadow effect on the observation model, we develop an optimal parameter derived by Kullback-Leibler divergence (KLD) to mitigate the error. After the optimal parameter is acquired, an improved likelihood function is presented. Finally, the estimated position is acquired. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  16. Access Point Backhaul Resource Aggregation as a Many-to-One Matching Game in Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Kawther Hassine

    2017-01-01

    Full Text Available This paper studies backhaul bandwidth aggregation in the context of a wireless local area network composed of two different types of access points: those with spare backhaul capacity (which we term providers and those in shortage of it (beneficiaries; the aim is to transfer excess capacity from providers to beneficiaries. We model the system as a matching game with many-to-one setting wherein several providers can be matched to one beneficiary and adopt the so-called deferred acceptance algorithm to reach an optimal and stable solution. We consider two flavors, when the beneficiaries are limited in their resource demands and when they are not, and two scenarios, when resources are abundant and when they are scarce. Our results show that the many-to-one setting outperforms the one-to-one case in terms of overall throughput gain, resource usage, and individual beneficiaries satisfaction by up to 50%, whether resources are scarce or abundant. As of the limited versus nonlimited case, the former ensures more fair sharing of spectral resources and higher satisfaction percentage between beneficiaries.

  17. A GPS-free passive acoustic localization scheme for underwater wireless sensor networks

    KAUST Repository

    Mirza, Mohammed

    2011-10-01

    Seaweb is an acoustic communication technology that enables communication between sensor nodes. Seaweb interconnects the underwater nodes through digital signal processing (DSP)-based modem by using acoustic links between the neighbouring sensors. In this paper, we design and investigate a global positioning system (GPS)-free passive localization protocol using seaweb technology. This protocol uses the range data and planar trigonometry to estimate the positions of the discovered nodes. We take into consideration the small displacement of sensor nodes due to watch circles and placement of sensor nodes on non-uniform underwater surface, for precise localization. Once the nodes are localized, we divide the whole network .eld into circular levels that minimizes the traf.c complexity and thereby increases the lifetime of the sensor network .eld. We then form the mesh network inside each of the circular levels that increases the reliability. The algorithm is designed in such a way that it overcomes the ambiguous nodes errata and re.ected paths and makes the algorithm more robust. The synthetic network geometries are so designed which can evaluate the algorithm in the presence of perfect or imperfect ranges or in case of incomplete data. A comparative study is made with the existing algorithms which proves our newly proposed algorithm to be more effective. © 2011 IEEE.

  18. Detecting PHG frames in wireless capsule endoscopy video by integrating rough global dominate-color with fine local texture features

    Science.gov (United States)

    Liu, Xiaoqi; Wang, Chengliang; Bai, Jianying; Liao, Guobin

    2018-02-01

    Portal hypertensive gastropathy (PHG) is common in gastrointestinal (GI) diseases, and a severe stage of PHG (S-PHG) is a source of gastrointestinal active bleeding. Generally, the diagnosis of PHG is made visually during endoscopic examination; compared with traditional endoscopy, (wireless capsule endoscopy) WCE with noninvasive and painless is chosen as a prevalent tool for visual observation of PHG. However, accurate measurement of WCE images with PHG is a difficult task due to faint contrast and confusing variations in background gastric mucosal tissue for physicians. Therefore, this paper proposes a comprehensive methodology to automatically detect S-PHG images in WCE video to help physicians accurately diagnose S-PHG. Firstly, a rough dominatecolor-tone extraction approach is proposed for better describing global color distribution information of gastric mucosa. Secondly, a hybrid two-layer texture acquisition model is designed by integrating co-occurrence matrix into local binary pattern to depict complex and unique gastric mucosal microstructure local variation. Finally, features of mucosal color and microstructure texture are merged into linear support vector machine to accomplish this automatic classification task. Experiments were implemented on an annotated data set including 1,050 SPHG and 1,370 normal images collected from 36 real patients of different nationalities, ages and genders. By comparison with three traditional texture extraction methods, our method, combined with experimental results, performs best in detection of S-PHG images in WCE video: the maximum of accuracy, sensitivity and specificity reach 0.90, 0.92 and 0.92 respectively.

  19. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  20. Adaptive quantization of local field potentials for wireless implants in freely moving animals: an open-source neural recording device

    Science.gov (United States)

    Martinez, Dominique; Clément, Maxime; Messaoudi, Belkacem; Gervasoni, Damien; Litaudon, Philippe; Buonviso, Nathalie

    2018-04-01

    Objective. Modern neuroscience research requires electrophysiological recording of local field potentials (LFPs) in moving animals. Wireless transmission has the advantage of removing the wires between the animal and the recording equipment but is hampered by the large number of data to be sent at a relatively high rate. Approach. To reduce transmission bandwidth, we propose an encoder/decoder scheme based on adaptive non-uniform quantization. Our algorithm uses the current transmitted codeword to adapt the quantization intervals to changing statistics in LFP signals. It is thus backward adaptive and does not require the sending of side information. The computational complexity is low and similar at the encoder and decoder sides. These features allow for real-time signal recovery and facilitate hardware implementation with low-cost commercial microcontrollers. Main results. As proof-of-concept, we developed an open-source neural recording device called NeRD. The NeRD prototype digitally transmits eight channels encoded at 10 kHz with 2 bits per sample. It occupies a volume of 2  ×  2  ×  2 cm3 and weighs 8 g with a small battery allowing for 2 h 40 min of autonomy. The power dissipation is 59.4 mW for a communication range of 8 m and transmission losses below 0.1%. The small weight and low power consumption offer the possibility of mounting the entire device on the head of a rodent without resorting to a separate head-stage and battery backpack. The NeRD prototype is validated in recording LFPs in freely moving rats at 2 bits per sample while maintaining an acceptable signal-to-noise ratio (>30 dB) over a range of noisy channels. Significance. Adaptive quantization in neural implants allows for lower transmission bandwidths while retaining high signal fidelity and preserving fundamental frequencies in LFPs.

  1. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  2. EMULACIÓN DE ESCENARIOS VIRTUALES, EN UNA SDWLAN (SOFTWARE DEFINED WIRELESS LOCAL AREA NETWORK, DE UN CAMPUS UNIVERSITARIO

    Directory of Open Access Journals (Sweden)

    Gerlyn Duarte

    2015-07-01

    Full Text Available Las redes definidas por software (SDN = Software Defined Network es una arquitectura de red emergente que se destaca como una tecnología capaz de ofrecer un control más flexible y dinámico a la hora de gestionar el diseño y funciones de la red, donde se separan los planos de control y enrutamiento. Esto permite la centralización de los controles de la red basada en software. Se puede decir que es posible tener flexibilidad y rapidez al momento de configurar, implementar y administrar diferentes protocolos personalizados para los requerimientos de distintas redes. Actualmente, en una red convencional, cada conmutador y/o enrutador tienen software propietario que le dice qué hacer. SDN se centra principalmente en la parte cableada de la red de datos. Sin embargo, todas las ventajas de las SDN sólo se obtienen si se logra abarcar la totalidad de la infraestructura, desde el centro de datos al extremo de la red, permitiendo extender todos los beneficios de SDN hasta la red inalámbrica, para conseguir a su vez una red inalámbrica de área local definida por software (SDWLAN = Software Define Wireless Local Area Network. Es por ello que en el presente trabajo, se emuló parte de una SDWLAN de un campus universitario para observar la factibilidad de implementar SDN en la misma. Para la emulación se utilizó una variante del emulador Mininet que permite trabajar con redes inalámbricas. De igual forma, se efectuaron mediciones del ancho de banda de las SDWLAN emuladas, así como la interconectividad entre ellas. Se evidenció la facilidad y el rendimiento de trabajar con las herramientas de emulación de SDWLAN empleadas, permitiendo de igual forma la estructuración de distintas topologías de SDWLAN. Se comprobó que el emulador, el cual está aún en la fase beta, permite interactuar y ejecutar cualquier proceso como si se ejecutara directamente en un equipo con GNU/Linux de forma eficaz.

  3. Loop kinematics

    International Nuclear Information System (INIS)

    Migdal, A.A.

    1982-01-01

    Basic operators acting in the loop space are introduced. The topology of this space and properties of the Stokes type loop functionals are discussed. The parametrically invariant loop calculus developed here is used in the loop dynamics

  4. An Improved Approach for RSSI-Based only Calibration-Free Real-Time Indoor Localization on IEEE 802.11 and 802.15.4 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Marco Passafiume

    2017-03-01

    Full Text Available Assuming a reliable and responsive spatial contextualization service is a must-have in IEEE 802.11 and 802.15.4 wireless networks, a suitable approach consists of the implementation of localization capabilities, as an additional application layer to the communication protocol stack. Considering the applicative scenario where satellite-based positioning applications are denied, such as indoor environments, and excluding data packet arrivals time measurements due to lack of time resolution, received signal strength indicator (RSSI measurements, obtained according to IEEE 802.11 and 802.15.4 data access technologies, are the unique data sources suitable for indoor geo-referencing using COTS devices. In the existing literature, many RSSI based localization systems are introduced and experimentally validated, nevertheless they require periodic calibrations and significant information fusion from different sensors that dramatically decrease overall systems reliability and their effective availability. This motivates the work presented in this paper, which introduces an approach for an RSSI-based calibration-free and real-time indoor localization. While switched-beam array-based hardware (compliant with IEEE 802.15.4 router functionality has already been presented by the author, the focus of this paper is the creation of an algorithmic layer for use with the pre-existing hardware capable to enable full localization and data contextualization over a standard 802.15.4 wireless sensor network using only RSSI information without the need of lengthy offline calibration phase. System validation reports the localization results in a typical indoor site, where the system has shown high accuracy, leading to a sub-metrical overall mean error and an almost 100% site coverage within 1 m localization error.

  5. An Improved Approach for RSSI-Based only Calibration-Free Real-Time Indoor Localization on IEEE 802.11 and 802.15.4 Wireless Networks.

    Science.gov (United States)

    Passafiume, Marco; Maddio, Stefano; Cidronali, Alessandro

    2017-03-29

    Assuming a reliable and responsive spatial contextualization service is a must-have in IEEE 802.11 and 802.15.4 wireless networks, a suitable approach consists of the implementation of localization capabilities, as an additional application layer to the communication protocol stack. Considering the applicative scenario where satellite-based positioning applications are denied, such as indoor environments, and excluding data packet arrivals time measurements due to lack of time resolution, received signal strength indicator (RSSI) measurements, obtained according to IEEE 802.11 and 802.15.4 data access technologies, are the unique data sources suitable for indoor geo-referencing using COTS devices. In the existing literature, many RSSI based localization systems are introduced and experimentally validated, nevertheless they require periodic calibrations and significant information fusion from different sensors that dramatically decrease overall systems reliability and their effective availability. This motivates the work presented in this paper, which introduces an approach for an RSSI-based calibration-free and real-time indoor localization. While switched-beam array-based hardware (compliant with IEEE 802.15.4 router functionality) has already been presented by the author, the focus of this paper is the creation of an algorithmic layer for use with the pre-existing hardware capable to enable full localization and data contextualization over a standard 802.15.4 wireless sensor network using only RSSI information without the need of lengthy offline calibration phase. System validation reports the localization results in a typical indoor site, where the system has shown high accuracy, leading to a sub-metrical overall mean error and an almost 100% site coverage within 1 m localization error.

  6. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  7. PDA-phone-based instant transmission of radiological images over a CDMA network by combining the PACS screen with a Bluetooth-interfaced local wireless link.

    Science.gov (United States)

    Kim, Dong Keun; Yoo, Sun K; Park, Jeong Jin; Kim, Sun Ho

    2007-06-01

    Remote teleconsultation by specialists is important for timely, correct, and specialized emergency surgical and medical decision making. In this paper, we designed a new personal digital assistant (PDA)-phone-based emergency teleradiology system by combining cellular communication with Bluetooth-interfaced local wireless links. The mobility and portability resulting from the use of PDAs and wireless communication can provide a more effective means of emergency teleconsultation without requiring the user to be limited to a fixed location. Moreover, it enables synchronized radiological image sharing between the attending physician in the emergency room and the remote specialist on picture archiving and communication system terminals without distorted image acquisition. To enable rapid and fine-quality radiological image transmission over a cellular network in a secure manner, progressive compression and security mechanisms have been incorporated. The proposed system is tested over a code division Multiple Access 1x-Evolution Data-Only network to evaluate the performance and to demonstrate the feasibility of this system in a real-world setting.

  8. Damage localization using a power-efficient distributed on-board signal processing algorithm in a wireless sensor network

    International Nuclear Information System (INIS)

    Liu, Lei; Liu, Shuntao; Yuan, Fuh-Gwo

    2012-01-01

    A distributed on-board algorithm that is embedded and executed within a group of wireless sensors to locate structural damages in isotropic plates is presented. The algorithm is based on an energy-decay model of Lamb waves and singular value decomposition (SVD) to determine damage locations. A sensor group consists of a small number of sensors, each of which independently collects wave signals and evaluates wave energy upon an external triggering signal sent from a base station. The energy values, usually a few bytes in length, are then sent to the base station to determine the presence and location of damages. In comparison with traditional centralized approaches in which whole datasets are required to be transmitted, the proposed algorithm yields much less wireless communication traffic, yet with a modest amount of computation required within sensors. Experiments have shown that the algorithm is robust to locate damage for isotropic plate structures and is very power efficient, with more than an order-of-magnitude power saving

  9. Roles of the Protruding Loop of Factor B Essential for the Localization of Lipoproteins (LolB) in the Anchoring of Bacterial Triacylated Proteins to the Outer Membrane*

    Science.gov (United States)

    Hayashi, Yumi; Tsurumizu, Ryoji; Tsukahara, Jun; Takeda, Kazuki; Narita, Shin-ichiro; Mori, Makiko; Miki, Kunio; Tokuda, Hajime

    2014-01-01

    The Lol system comprising five Lol proteins, LolA through LolE, sorts Escherichia coli lipoproteins to outer membranes. The LolCDE complex, an ATP binding cassette transporter in inner membranes, releases outer membrane-specific lipoproteins in an ATP-dependent manner, causing formation of the LolA-lipoprotein complex in the periplasm. LolA transports lipoproteins through the periplasm to LolB on outer membranes. LolB is itself a lipoprotein anchored to outer membranes, although the membrane anchor is functionally dispensable. LolB then localizes lipoproteins to outer membranes through largely unknown mechanisms. The crystal structure of LolB is similar to that of LolA, and it possesses a hydrophobic cavity that accommodates acyl chains of lipoproteins. To elucidate the molecular function of LolB, a periplasmic version of LolB, mLolB, was mutagenized at various conserved residues. Despite the lack of acyl chains, most defective mutants were insoluble. However, a derivative with glutamate in place of leucine 68 was soluble and unable to localize lipoproteins to outer membranes. This leucine is present in a loop protruding from mLolB into an aqueous environment, and no analogous loop is present in LolA. Thus, leucine 68 was replaced with other residues. Replacement by acidic, but not hydrophobic, residues generated for the first time mLolB derivatives that can accept but cannot localize lipoproteins to outer membranes. Moreover, deletion of the leucine with neighboring residues impaired the lipoprotein receptor activity. Based on these observations, the roles of the protruding loop of LolB in the last step of lipoprotein sorting are discussed. PMID:24569999

  10. Roles of the protruding loop of factor B essential for the localization of lipoproteins (LolB) in the anchoring of bacterial triacylated proteins to the outer membrane.

    Science.gov (United States)

    Hayashi, Yumi; Tsurumizu, Ryoji; Tsukahara, Jun; Takeda, Kazuki; Narita, Shin-ichiro; Mori, Makiko; Miki, Kunio; Tokuda, Hajime

    2014-04-11

    The Lol system comprising five Lol proteins, LolA through LolE, sorts Escherichia coli lipoproteins to outer membranes. The LolCDE complex, an ATP binding cassette transporter in inner membranes, releases outer membrane-specific lipoproteins in an ATP-dependent manner, causing formation of the LolA-lipoprotein complex in the periplasm. LolA transports lipoproteins through the periplasm to LolB on outer membranes. LolB is itself a lipoprotein anchored to outer membranes, although the membrane anchor is functionally dispensable. LolB then localizes lipoproteins to outer membranes through largely unknown mechanisms. The crystal structure of LolB is similar to that of LolA, and it possesses a hydrophobic cavity that accommodates acyl chains of lipoproteins. To elucidate the molecular function of LolB, a periplasmic version of LolB, mLolB, was mutagenized at various conserved residues. Despite the lack of acyl chains, most defective mutants were insoluble. However, a derivative with glutamate in place of leucine 68 was soluble and unable to localize lipoproteins to outer membranes. This leucine is present in a loop protruding from mLolB into an aqueous environment, and no analogous loop is present in LolA. Thus, leucine 68 was replaced with other residues. Replacement by acidic, but not hydrophobic, residues generated for the first time mLolB derivatives that can accept but cannot localize lipoproteins to outer membranes. Moreover, deletion of the leucine with neighboring residues impaired the lipoprotein receptor activity. Based on these observations, the roles of the protruding loop of LolB in the last step of lipoprotein sorting are discussed.

  11. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  12. Localization of ultraviolet-induced excision repair in the nucleus and the distribution of repair events in higher order chromatin loops in mammalian cells

    Energy Technology Data Exchange (ETDEWEB)

    Mullenders, L.H.F.; Zeeland, A.A. van; Natarajan, A.T.

    1987-01-01

    Several lines of evidence indicate that eukaryotic DNA is arranged in highly supercoiled domains or loops, and that the repeating loops are constrained by attachment to a nuclear skeletal structure termed the nuclear matrix. We have investigated whether the repair of DNA damage occurs in the nuclear matrix compartment. Normal human fibroblasts, ultraviolet (u.v.)-irradiated with 30 J m/sup -2/ and post-u.v. incubated in the presence of hydroxyurea, did not show any evidence for the occurrence of repair synthesis at the nuclear matrix. 5 J m/sup -2/ repair synthesis seems to initiate at the nuclear matrix, although only part of the total repair could be localized there. In u.v.-irradiated (30 J m/sup -2/) normal human fibroblast post-u.v. incubated in the presence of hydroxyurea and arabinsosylcytosine for 2h, multiple single-stranded regions are generated in a DNA loop as a result of the inhibition of the excision repair process. Preferential repair of certain domains in the chromatin was shown to occur in xeroderma pigmentosum cells of complementation group C (XP-C) in contrast to XP-D cells and Syrian hamster embryonic cells.

  13. The localization of ultraviolet-induced excision repair in the nucleus and the distribution of repair events in higher order chromatin loops in mammalian cells

    International Nuclear Information System (INIS)

    Mullenders, L.H.F.; Zeeland, A.A. van; Natarajan, A.T.

    1987-01-01

    Several lines of evidence indicate that eukaryotic DNA is arranged in highly supercoiled domains or loops, and that the repeating loops are constrained by attachment to a nuclear skeletal structure termed the nuclear matrix. We have investigated whether the repair of DNA damage occurs in the nuclear matrix compartment. Normal human fibroblasts, ultraviolet (u.v.)-irradiated with 30 J m -2 and post-u.v. incubated in the presence of hydroxyurea, did not show any evidence for the occurrence of repair synthesis at the nuclear matrix. 5 J m -2 repair synthesis seems to initiate at the nuclear matrix, although only part of the total repair could be localized there. In u.v.-irradiated (30 J m -2 ) normal human fibroblast post-u.v. incubated in the presence of hydroxyurea and arabinsosylcytosine for 2h, multiple single-stranded regions are generated in a DNA loop as a result of the inhibition of the excision repair process. Preferential repair of certain domains in the chromatin was shown to occur in xeroderma pigmentosum cells of complementation group C (XP-C) in contrast to XP-D cells and Syrian hamster embryonic cells. (author)

  14. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  15. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  16. Accurate ranging/localization technique using IR-UWB for smart fiber-wireless-in-house networks

    NARCIS (Netherlands)

    Abraha, S.T.; Tangdiongga, E.; Crivellaro, A.; Gaudino, R.; Koonen, A.M.J.

    2012-01-01

    The use of a RoF scheme for localization purposes of mobile stations for in-house networks is presented. Using impulse radio UWB over SMF and time-of-arrival localization method, mobile stations can be localized within centimeters accuracy.

  17. Superhelicity Constrains a Localized and R-Loop-Dependent Formation of G-Quadruplexes at the Upstream Region of Transcription.

    Science.gov (United States)

    Zheng, Ke-Wei; He, Yi-de; Liu, Hong-He; Li, Xin-Min; Hao, Yu-Hua; Tan, Zheng

    2017-10-20

    Transcription induces formation of intramolecular G-quadruplex structures at the upstream region of a DNA duplex by an upward transmission of negative supercoiling through the DNA. Currently the regulation of such G-quadruplex formation remains unclear. Using plasmid as a model, we demonstrate that while it is the dynamic negative supercoiling generated by a moving RNA polymerase that triggers a formation of a G-quadruplex, the constitutional superhelicity determines the potential and range of the formation of a G-quadruplex by constraining the propagation of the negative supercoiling. G-quadruplex formation is maximal in negatively supercoiled and nearly abolished in relaxed plasmids while being moderate in nicked and linear ones. The formation of a G-quadruplex strongly correlates with the presence of an R-loop. Preventing R-loop formation virtually abolished G-quadruplex formation even in the negatively supercoiled plasmid. Enzymatic action and protein binding that manipulate supercoiling or its propagation all impact the formation of G-quadruplexes. Because chromosomes and plasmids in cells in their natural form are maintained in a supercoiled state, our findings reveal a physical basis that justifies the formation and regulation of G-quadruplexes in vivo. The structural features involved in G-quadruplex formation may all serve as potential targets in clinical and therapeutic applications.

  18. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  19. Detailed modeling of local anisotropy and transverse Ku interplay regarding hysteresis loop in FeCuNbSiB nanocrystalline ribbons

    Science.gov (United States)

    Geoffroy, Olivier; Boust, Nicolas; Chazal, Hervé; Flury, Sébastien; Roudet, James

    2018-04-01

    This article focuses on the modeling of the hysteresis loop featured by Fe-Cu-Nb-Si-B nanocrystalline alloys with transverse induced anisotropy. The magnetization reversal process of a magnetic correlated volume (CV), characterized by the induced anisotropy Ku, and a deviation of the local easy magnetization direction featuring the effect of a local incoherent anisotropy Ki, is analyzed, taking account of magnetostatic interactions. Solving the equations shows that considering a unique typical kind of CV does not enable accounting for both the domain pattern and the coercivity. Actually, the classical majority CVs obeying the random anisotropy model explains well the domain pattern but considering another kind of CVs, minority, mingled with classical ones, featuring a magnitude of Ki comparable to Ku, is necessary to account for coercivity. The model has been successfully compared with experimental data.

  20. Participatory development activities at local level : case studies in villages of Central Thailand : an analysis of people's participation in the planned development process using the concept of the "Linking loops"

    NARCIS (Netherlands)

    Pongquan, S.

    1992-01-01

    Participatory development activities at local level in a sub-district located in the Central Plain of Thailand were studied employing the theoretical concept of the "linking loops" to analyze the related interactions among target group members and between the local level and superordinated

  1. Energy-efficient digital and wireless IC design for wireless smart sensing

    Science.gov (United States)

    Zhou, Jun; Huang, Xiongchuan; Wang, Chao; Tae-Hyoung Kim, Tony; Lian, Yong

    2017-10-01

    Wireless smart sensing is now widely used in various applications such as health monitoring and structural monitoring. In conventional wireless sensor nodes, significant power is consumed in wirelessly transmitting the raw data. Smart sensing adds local intelligence to the sensor node and reduces the amount of wireless data transmission via on-node digital signal processing. While the total power consumption is reduced compared to conventional wireless sensing, the power consumption of the digital processing becomes as dominant as wireless data transmission. This paper reviews the state-of-the-art energy-efficient digital and wireless IC design techniques for reducing the power consumption of the wireless smart sensor node to prolong battery life and enable self-powered applications.

  2. Wireless Cybersecurity

    Science.gov (United States)

    2013-04-01

    completely change the entire landscape. For example, under the quantum computing regime, factoring prime numbers requires only polynomial time (i.e., Shor’s...AFRL-OSR-VA-TR-2013-0206 Wireless Cybersecurity Biao Chen Syracuse University April 2013 Final Report DISTRIBUTION A...19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 21-02-2013 FINAL REPORT 01-04-2009 TO 30-11-2012 Wireless Cybersecurity

  3. Low-latency wireless data transfer for motion control

    NARCIS (Netherlands)

    Boeij, de J.; Haazen, M.H.; Smulders, P.F.M.; Lomonova, E.A.

    2009-01-01

    This paper discusses a new approach for wireless motion control. Existing wireless techniques suffer from large closed loop delays of several milliseconds, which is unacceptable in precision motion systems. These large delays are mainly caused by the protocol used, since these are optimized for

  4. Adaptive Wavelet Coding Applied in a Wireless Control System.

    Science.gov (United States)

    Gama, Felipe O S; Silveira, Luiz F Q; Salazar, Andrés O

    2017-12-13

    Wireless control systems can sense, control and act on the information exchanged between the wireless sensor nodes in a control loop. However, the exchanged information becomes susceptible to the degenerative effects produced by the multipath propagation. In order to minimize the destructive effects characteristic of wireless channels, several techniques have been investigated recently. Among them, wavelet coding is a good alternative for wireless communications for its robustness to the effects of multipath and its low computational complexity. This work proposes an adaptive wavelet coding whose parameters of code rate and signal constellation can vary according to the fading level and evaluates the use of this transmission system in a control loop implemented by wireless sensor nodes. The performance of the adaptive system was evaluated in terms of bit error rate (BER) versus E b / N 0 and spectral efficiency, considering a time-varying channel with flat Rayleigh fading, and in terms of processing overhead on a control system with wireless communication. The results obtained through computational simulations and experimental tests show performance gains obtained by insertion of the adaptive wavelet coding in a control loop with nodes interconnected by wireless link. These results enable the use of this technique in a wireless link control loop.

  5. Adaptive Wavelet Coding Applied in a Wireless Control System

    Directory of Open Access Journals (Sweden)

    Felipe O. S. Gama

    2017-12-01

    Full Text Available Wireless control systems can sense, control and act on the information exchanged between the wireless sensor nodes in a control loop. However, the exchanged information becomes susceptible to the degenerative effects produced by the multipath propagation. In order to minimize the destructive effects characteristic of wireless channels, several techniques have been investigated recently. Among them, wavelet coding is a good alternative for wireless communications for its robustness to the effects of multipath and its low computational complexity. This work proposes an adaptive wavelet coding whose parameters of code rate and signal constellation can vary according to the fading level and evaluates the use of this transmission system in a control loop implemented by wireless sensor nodes. The performance of the adaptive system was evaluated in terms of bit error rate (BER versus E b / N 0 and spectral efficiency, considering a time-varying channel with flat Rayleigh fading, and in terms of processing overhead on a control system with wireless communication. The results obtained through computational simulations and experimental tests show performance gains obtained by insertion of the adaptive wavelet coding in a control loop with nodes interconnected by wireless link. These results enable the use of this technique in a wireless link control loop.

  6. A Triple-Loop Inductive Power Transmission System for Biomedical Applications.

    Science.gov (United States)

    Lee, Byunghun; Kiani, Mehdi; Ghovanloo, Maysam

    2016-02-01

    A triple-loop wireless power transmission (WPT) system equipped with closed-loop global power control, adaptive transmitter (Tx) resonance compensation (TRC), and automatic receiver (Rx) resonance tuning (ART) is presented. This system not only opposes coupling and load variations but also compensates for changes in the environment surrounding the inductive link to enhance power transfer efficiency (PTE) in applications such as implantable medical devices (IMDs). The Tx was built around a commercial off-the-shelf (COTS) radio-frequency identification (RFID) reader, operating at 13.56 MHz. A local Tx loop finds the optimal capacitance in parallel with the Tx coil by adjusting a varactor. A global power control loop maintains the received power at a desired level in the presence of changes in coupling distance, coil misalignments, and loading. Moreover, a local Rx loop is implemented inside a power management integrated circuit (PMIC) to avoid PTE degradation due to the Rx coil surrounding environment and process variations. The PMIC was fabricated in a 0.35- μm 4M2P standard CMOS process with 2.54 mm(2) active area. Measurement results show that the proposed triple-loop system improves the overall PTE by up to 10.5% and 4.7% compared to a similar open- and single closed-loop system, respectively, at nominal coil distance of 2 cm. The added TRC and ART loops contribute 2.3% and 1.4% to the overall PTE of 13.5%, respectively. This is the first WPT system to include three loops to dynamically compensate for environment and circuit variations and improve the overall power efficiency all the way from the driver output in Tx to the load in Rx.

  7. Topological Analysis of Wireless Networks (TAWN)

    Science.gov (United States)

    2016-05-31

    19b. TELEPHONE NUMBER (Include area code) 31-05-2016 FINAL REPORT 12-02-2015 -- 31-05-2016 Topological Analysis of Wireless Networks (TAWN) Robinson...Release, Distribution Unlimited) N/A The goal of this project was to develop topological methods to detect and localize vulnerabilities of wireless... topology U U U UU 32 Michael Robinson 202-885-3681 Final Report: May 2016 Topological Analysis of Wireless Networks Principal Investigator: Prof. Michael

  8. A Large-Scale Multi-Hop Localization Algorithm Based on Regularized Extreme Learning for Wireless Networks.

    Science.gov (United States)

    Zheng, Wei; Yan, Xiaoyong; Zhao, Wei; Qian, Chengshan

    2017-12-20

    A novel large-scale multi-hop localization algorithm based on regularized extreme learning is proposed in this paper. The large-scale multi-hop localization problem is formulated as a learning problem. Unlike other similar localization algorithms, the proposed algorithm overcomes the shortcoming of the traditional algorithms which are only applicable to an isotropic network, therefore has a strong adaptability to the complex deployment environment. The proposed algorithm is composed of three stages: data acquisition, modeling and location estimation. In data acquisition stage, the training information between nodes of the given network is collected. In modeling stage, the model among the hop-counts and the physical distances between nodes is constructed using regularized extreme learning. In location estimation stage, each node finds its specific location in a distributed manner. Theoretical analysis and several experiments show that the proposed algorithm can adapt to the different topological environments with low computational cost. Furthermore, high accuracy can be achieved by this method without setting complex parameters.

  9. Bi-directional 35-Gbit/s 2D beam steered optical wireless downlink and 5-Gbit/s localized 60-GHz communication uplink for hybrid indoor wireless systems

    NARCIS (Netherlands)

    Khalid, A.M.; Baltus, P.G.M.; Dommele, A.R.; Mekonnen, K.A.; Cao, Z.; Oh, C.W.; Matters, M.K.; Koonen, A.M.J.

    2017-01-01

    We present a full-duplex dynamic indoor optical wireless system using 2D passive optical beam steering for downlink and 60-GHz communication for upstream transmission. We demonstrate 35-Gb/s NRZ-OOK downstream multicasting and 5-Gb/s NRZ-ASK upstream communication.

  10. A Way Out of the Bubble Trouble?—Upon Reconstructing the Origin of the Local Bubble and Loop I via Radioisotopic Signatures on Earth

    Directory of Open Access Journals (Sweden)

    Michael Mathias Schulreich

    2018-02-01

    Full Text Available Deep-sea archives all over the world show an enhanced concentration of the radionuclide 60Fe, isolated in layers dating from about 2.2 Myr ago. Since this comparatively long-lived isotope is not naturally produced on Earth, such an enhancement can only be attributed to extraterrestrial sources, particularly one or several nearby supernovae in the recent past. It has been speculated that these supernovae might have been involved in the formation of the Local Superbubble, our Galactic habitat. Here, we summarize our efforts in giving a quantitative evidence for this scenario. Besides analytical calculations, we present results from high-resolution hydrodynamical simulations of the Local Superbubble and its presumptive neighbor Loop I in different environments, including a self-consistently evolved supernova-driven interstellar medium. For the superbubble modeling, the time sequence and locations of the generating core-collapse supernova explosions are taken into account, which are derived from the mass spectrum of the perished members of certain, carefully preselected stellar moving groups. The release and turbulent mixing of 60Fe is followed via passive scalars, where the yields of the decaying radioisotope were adjusted according to recent stellar evolution calculations. The models are able to reproduce both the timing and the intensity of the 60Fe excess observed with rather high precision. We close with a discussion of recent developments and give future perspectives.

  11. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  12. Use of Local Intelligence to Reduce Energy Consumption of Wireless Sensor Nodes in Elderly Health Monitoring Systems

    Directory of Open Access Journals (Sweden)

    Thomas J. Lampoltshammer

    2014-03-01

    Full Text Available The percentage of elderly people in European countries is increasing. Such conjuncture affects socio-economic structures and creates demands for resourceful solutions, such as Ambient Assisted Living (AAL, which is a possible methodology to foster health care for elderly people. In this context, sensor-based devices play a leading role in surveying, e.g., health conditions of elderly people, to alert care personnel in case of an incident. However, the adoption of such devices strongly depends on the comfort of wearing the devices. In most cases, the bottleneck is the battery lifetime, which impacts the effectiveness of the system. In this paper we propose an approach to reduce the energy consumption of sensors’ by use of local sensors’ intelligence. By increasing the intelligence of the sensor node, a substantial decrease in the necessary communication payload can be achieved. The results show a significant potential to preserve energy and decrease the actual size of the sensor device units.

  13. Use of Local Intelligence to Reduce Energy Consumption of Wireless Sensor Nodes in Elderly Health Monitoring Systems

    Science.gov (United States)

    Lampoltshammer, Thomas J.; de Freitas, Edison Pignaton; Nowotny, Thomas; Plank, Stefan; da Costa, João Paulo Carvalho Lustosa; Larsson, Tony; Heistracher, Thomas

    2014-01-01

    The percentage of elderly people in European countries is increasing. Such conjuncture affects socio-economic structures and creates demands for resourceful solutions, such as Ambient Assisted Living (AAL), which is a possible methodology to foster health care for elderly people. In this context, sensor-based devices play a leading role in surveying, e.g., health conditions of elderly people, to alert care personnel in case of an incident. However, the adoption of such devices strongly depends on the comfort of wearing the devices. In most cases, the bottleneck is the battery lifetime, which impacts the effectiveness of the system. In this paper we propose an approach to reduce the energy consumption of sensors' by use of local sensors' intelligence. By increasing the intelligence of the sensor node, a substantial decrease in the necessary communication payload can be achieved. The results show a significant potential to preserve energy and decrease the actual size of the sensor device units. PMID:24618777

  14. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  15. Wireless Tots

    Science.gov (United States)

    Scott, Lee-Allison

    2003-01-01

    The first wireless technology program for preschoolers was implemented in January at the Primrose School at Bentwater in Atlanta, Georgia, a new corporate school operated by Primrose School Franchising Co. The new school serves as a testing and training facility for groundbreaking educational approaches, including emerging innovations in…

  16. Wireless Technician

    Science.gov (United States)

    Tech Directions, 2011

    2011-01-01

    One of the hottest areas in technology is invisible. Wireless communications allow people to transmit voice messages, data, and other signals through the air without physically connecting senders to receivers with cables or wires. And the technology is spreading at lightning speed. Cellular phones, personal digital assistants, and wireless…

  17. An IQ mismatch calibration and compensation technique for wideband wireless transceivers

    International Nuclear Information System (INIS)

    Peng Jin; Zhou Liguo; Yao Heng; Yuan Fang; Shi Yin; Fang Zhi

    2014-01-01

    An IQ mismatch calibration and compensation technique based on the digital baseband for wideband wireless communication transmitters is proposed. The digital baseband transmits the signal used for IQ mismatch calibration. The signal passes through the RF transmitter path, the calibration loop (which is composed of a square power detector and a band-pass filter in the RF transceiver) and the variable gain amplifier of the receiver. The digital baseband samples the signal for IQ mismatch estimation and compensates for it. Compared with the self-calibration technique in the RF chip, the proposed technique saves area and power consumption for the wireless local area network solution. This technique has been successfully used for the 802.11n system and satisfies the requirement of the standard by achieving over 50 dB image suppression. (semiconductor integrated circuits)

  18. Closed-Loop Feedback Computation Model of Dynamical Reputation Based on the Local Trust Evaluation in Business-to-Consumer E-Commerce

    Directory of Open Access Journals (Sweden)

    Bo Tian

    2016-02-01

    Full Text Available Trust and reputation are important factors that influence the success of both traditional transactions in physical social networks and modern e-commerce in virtual Internet environments. It is difficult to define the concept of trust and quantify it because trust has both subjective and objective characteristics at the same time. A well-reported issue with reputation management system in business-to-consumer (BtoC e-commerce is the “all good reputation” problem. In order to deal with the confusion, a new computational model of reputation is proposed in this paper. The ratings of each customer are set as basic trust score events. In addition, the time series of massive ratings are aggregated to formulate the sellers’ local temporal trust scores by Beta distribution. A logical model of trust and reputation is established based on the analysis of the dynamical relationship between trust and reputation. As for single goods with repeat transactions, an iterative mathematical model of trust and reputation is established with a closed-loop feedback mechanism. Numerical experiments on repeated transactions recorded over a period of 24 months are performed. The experimental results show that the proposed method plays guiding roles for both theoretical research into trust and reputation and the practical design of reputation systems in BtoC e-commerce.

  19. Cascade detection for the extraction of localized sequence features; specificity results for HIV-1 protease and structure-function results for the Schellman loop.

    Science.gov (United States)

    Newell, Nicholas E

    2011-12-15

    The extraction of the set of features most relevant to function from classified biological sequence sets is still a challenging problem. A central issue is the determination of expected counts for higher order features so that artifact features may be screened. Cascade detection (CD), a new algorithm for the extraction of localized features from sequence sets, is introduced. CD is a natural extension of the proportional modeling techniques used in contingency table analysis into the domain of feature detection. The algorithm is successfully tested on synthetic data and then applied to feature detection problems from two different domains to demonstrate its broad utility. An analysis of HIV-1 protease specificity reveals patterns of strong first-order features that group hydrophobic residues by side chain geometry and exhibit substantial symmetry about the cleavage site. Higher order results suggest that favorable cooperativity is weak by comparison and broadly distributed, but indicate possible synergies between negative charge and hydrophobicity in the substrate. Structure-function results for the Schellman loop, a helix-capping motif in proteins, contain strong first-order features and also show statistically significant cooperativities that provide new insights into the design of the motif. These include a new 'hydrophobic staple' and multiple amphipathic and electrostatic pair features. CD should prove useful not only for sequence analysis, but also for the detection of multifactor synergies in cross-classified data from clinical studies or other sources. Windows XP/7 application and data files available at: https://sites.google.com/site/cascadedetect/home. nacnewell@comcast.net Supplementary information is available at Bioinformatics online.

  20. The distributed wireless gathering problem

    NARCIS (Netherlands)

    Bonifaci, V.; Korteweg, P.; Marchetti Spaccamela, A.; Stougie, L.

    2011-01-01

    We address the problem of data gathering in a wireless network using multi-hop communication; our main goal is the analysis of simple algorithms suitable for implementation in realistic scenarios. We study the performance of distributed algorithms, which do not use any form of local coordination,

  1. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  2. Design and implementation of the wireless high voltage control system

    International Nuclear Information System (INIS)

    Srivastava, Saurabh; Misra, A.; Pandey, H.K.; Thakur, S.K.; Pandit, V.S.

    2011-01-01

    In this paper we will describe the implementation of the wireless link for controlling and monitoring the serial data between control PC and the interface card (general DAQ card), by replacing existing RS232 based remote control system for controlling and monitoring High Voltage Power Supply (120kV/50mA). The enhancement in the reliability is achieved by replacing old RS232 based control system with wireless system by isolating ground loop. (author)

  3. Real-time stress monitoring of highway bridges with a secured wireless sensor network.

    Science.gov (United States)

    2011-12-01

    "This collaborative research aims to develop a real-time stress monitoring system for highway bridges with a secured wireless sensor network. The near term goal is to collect wireless sensor data under different traffic patterns from local highway br...

  4. Wireless Power Transfer for Space Applications

    Science.gov (United States)

    Ramos, Gabriel Vazquez; Yuan, Jiann-Shiun

    2011-01-01

    This paper introduces an implementation for magnetic resonance wireless power transfer for space applications. The analysis includes an equivalent impedance study, loop material characterization, source/load resonance coupling technique, and system response behavior due to loads variability. System characterization is accomplished by executing circuit design from analytical equations and simulations using Matlab and SPICE. The theory was validated by a combination of different experiments that includes loop material consideration, resonance coupling circuits considerations, electric loads considerations and a small scale proof-of-concept prototype. Experiment results shows successful wireless power transfer for all the cases studied. The prototype provided about 4.5 W of power to the load at a separation of -5 cm from the source using a power amplifier rated for 7 W.

  5. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-01-01

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level....

  6. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  7. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  8. Wireless communication technology NFC

    OpenAIRE

    MÁROVÁ, Kateřina

    2014-01-01

    Aim of this bachelor thesis is to handle the issue of new wireless communication technology NFC (Near Field Communication) including a comparison of advantages and disadvantages of NFC with other wireless technologies (Bluetooth, Wi-Fi, etc.). NFC is a technology for wireless communications between different electronic devices, one of which is typically a mobile phone. Near Field Communication allows wireless communication at very short distance by approaching or enclosing two devices and can...

  9. Wireless sensor network for sodium leak detection

    International Nuclear Information System (INIS)

    Satya Murty, S.A.V.; Raj, Baldev; Sivalingam, Krishna M.; Ebenezer, Jemimah; Chandran, T.; Shanmugavel, M.; Rajan, K.K.

    2012-01-01

    Highlights: ► Early detection of sodium leak is mandatory in any reactor handling liquid sodium. ► Wireless sensor networking technology has been introduced for detecting sodium leak. ► We designed and developed a wireless sensor node in-house. ► We deployed a pilot wireless sensor network for handling nine sodium leak signals. - Abstract: To study the mechanical properties of Prototype Fast Breeder Reactor component materials under the influence of sodium, the IN Sodium Test (INSOT) facility has been erected and commissioned at Indira Gandhi Centre for Atomic Research. Sodium reacts violently with air/moisture leading to fire. Hence early detection of sodium leak if any is mandatory for such plants and almost 140 sodium leak detectors are placed throughout the loop. All these detectors are wired to the control room for data collection and monitoring. To reduce the cost, space and maintenance that are involved in cabling, the wireless sensor networking technology has been introduced in the sodium leak detection system of INSOT. This paper describes about the deployment details of the pilot wireless sensor network and the measures taken for the successful deployment.

  10. Wireless steganography

    Science.gov (United States)

    Agaian, Sos S.; Akopian, David; D'Souza, Sunil

    2006-02-01

    Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on Symbian TM/Series60 TM architecture. Finally, two data hiding applications developed for Symbian TM/Series60 TM mobile phones are presented.

  11. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  12. Hybrid RRM Architecture for Future Wireless Networks

    DEFF Research Database (Denmark)

    Tragos, Elias; Mihovska, Albena D.; Mino, Emilio

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios from local area to wide area wireless networks. The integration of cellular and local area networks in a unique radio system will provide a g...

  13. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  14. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  15. The art of wireless sensor networks

    CERN Document Server

    2014-01-01

    During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.   “The Art of Wireless Sensor Networks: Volume 1: Fundamentals” focuses on the fundamentals concepts in the design, analysis, and implementation of wireless sensor networks. It covers the various layers of the lifecycle of this type of network from the physical layer up to the application layer. Its rationale is that the first volume covers contemporary design issues, tools, and protocols for radio-based two-dimensional terrestrial sensor networks. All the book chapters in this volume include up-to-date research work spanning various classic facets of the physical properties and functional behavior of wireless sensor networks, including physical layer, medium access control, data routing, topology management, mobility management, localization, task management, data management, data gathering, security, middleware, sensor technology, standards, and ...

  16. The Role of Wireless Computing Technology in the Design of Schools.

    Science.gov (United States)

    Nair, Prakash

    This document discusses integrating computers logically and affordably into a school building's infrastructure through the use of wireless technology. It begins by discussing why wireless networks using mobile computers are preferable to desktop machines in each classoom. It then explains the features of a wireless local area network (WLAN) and…

  17. Loop quantization as a continuum limit

    International Nuclear Information System (INIS)

    Manrique, Elisa; Oeckl, Robert; Weber, Axel; Zapata, Jose A

    2006-01-01

    We present an implementation of Wilson's renormalization group and a continuum limit tailored for loop quantization. The dynamics of loop-quantized theories is constructed as a continuum limit of the dynamics of effective theories. After presenting the general formalism we show as a first explicit example the 2D Ising field theory, an interacting relativistic quantum field theory with local degrees of freedom quantized by loop quantization techniques

  18. Alternative loop rings

    CERN Document Server

    Goodaire, EG; Polcino Milies, C

    1996-01-01

    For the past ten years, alternative loop rings have intrigued mathematicians from a wide cross-section of modern algebra. As a consequence, the theory of alternative loop rings has grown tremendously. One of the main developments is the complete characterization of loops which have an alternative but not associative, loop ring. Furthermore, there is a very close relationship between the algebraic structures of loop rings and of group rings over 2-groups. Another major topic of research is the study of the unit loop of the integral loop ring. Here the interaction between loop rings and group ri

  19. local

    Directory of Open Access Journals (Sweden)

    Abílio Amiguinho

    2005-01-01

    Full Text Available The process of socio-educational territorialisation in rural contexts is the topic of this text. The theme corresponds to a challenge to address it having as main axis of discussion either the problem of social exclusion or that of local development. The reasons to locate the discussion in this last field of analysis are discussed in the first part of the text. Theoretical and political reasons are there articulated because the question is about projects whose intentions and practices call for the political both in the theoretical debate and in the choices that anticipate intervention. From research conducted for several years, I use contributions that aim at discuss and enlighten how school can be a potential locus of local development. Its identification and recognition as local institution (either because of those that work and live in it or because of those that act in the surrounding context are crucial steps to progressively constitute school as a partner for development. The promotion of the local values and roots, the reconstruction of socio-personal and local identities, the production of sociabilities and the equation and solution of shared problems were the dimensions of a socio-educative intervention, markedly globalising. This scenario, as it is argued, was also, intentionally, one of transformation and of deliberate change of school and of the administration of the educative territoires.

  20. A Wireless LAN and Voice Information System for Underground Coal Mine

    OpenAIRE

    Yu Zhang; Wei Yang; Dongsheng Han; Young-Il Kim

    2014-01-01

    In this paper we constructed a wireless information system, and developed a wireless voice communication subsystem based on Wireless Local Area Networks (WLAN) for underground coal mine, which employs Voice over IP (VoIP) technology and Session Initiation Protocol (SIP) to achieve wireless voice dispatching communications. The master control voice dispatching interface and call terminal software are also developed on the WLAN ground server side to manage and implement the voice dispatching co...

  1. A High-Precision RF Time-of-Flight Measurement Method based on Vernier Effect for Localization of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sang-il KO

    2011-12-01

    Full Text Available This paper presents the fundamental principles of a high-precision RF time-of-flight (ToF measurement method based on the vernier effect, which enables the improvement of time measurement resolution, for accurate distance measurement between sensor nodes in wireless sensor networks. Similar to the two scales of the vernier caliper, two heterogeneous clocks are employed to induce a new virtual time resolution that is much finer than clocks’ intrinsic time resolution. Consecutive RF signal transmission and sensing using two heterogeneous clocks generates a unique sensing pattern for the RF ToF, so that the size of the RF ToF can be estimated by comparing the measured sensing pattern with the predetermined sensing patterns for the RF ToF. RF ToF measurement experiments using this heterogeneous clock system, which has low operating frequencies of several megahertz, certify the proposed RF ToF measurement method through the evaluation of the measured sensing patterns with respect to an RF round-trip time of several nanoseconds.

  2. Wireless mesh networks.

    Science.gov (United States)

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

  3. A prospective clinical study to evaluate the safety and performance of wireless localization of nonpalpable breast lesions using radiofrequency identification technology.

    Science.gov (United States)

    Dauphine, Christine; Reicher, Joshua J; Reicher, Murray A; Gondusky, Christina; Khalkhali, Iraj; Kim, Michelle

    2015-06-01

    The purpose of this study was to evaluate the safety and performance of localizing nonpalpable breast lesions using radiofrequency identification technology. Twenty consecutive women requiring preoperative localization of a breast lesion were recruited. Subjects underwent placement of both a hook wire and a radiofrequency identification tag immediately before surgery. The radiofrequency identification tag was the primary method used by the operating surgeon to localize each lesion during excision, with the hook wire serving as backup in case of tag migration or failed localization. Successful localization with removal of the intended lesion was the primary outcome measured. Tag migration and postoperative infection were also noted to assess safety. Twenty patients underwent placement of a radiofrequency identification tag, 12 under ultrasound guidance and eight with stereotactic guidance. In all cases, the radiofrequency identification tag was successfully localized by the reader at the level of the skin before incision, and the intended lesion was removed along with the radiofrequency identification tag. There were no localization failures and no postoperative infections. Tag migration did not occur before incision, but in three cases, occurred as the lesion was being retracted with fingers to make the final cut along the deep surface of the specimen. In this initial clinical study, radiofrequency tags were safe and able to successfully localize nonpalpable breast lesions. Radiofrequency identification technology may represent an alternative method to hook wire localization.

  4. Independent SU(2)-loop variables

    International Nuclear Information System (INIS)

    Loll, R.

    1991-04-01

    We give a reduction procedure for SU(2)-trace variables and introduce a complete set of indepentent, gauge-invariant and almost local loop variables for the configuration space of SU(2)-lattice gauge theory in 2+1 dimensions. (orig.)

  5. SmartMIMO: An Energy-Aware Adaptive MIMO-OFDM Radio Link Control for Next-Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wim Dehaene

    2007-12-01

    Full Text Available Multiantenna systems and more particularly those operating on multiple input and multiple output (MIMO channels are currently a must to improve wireless links spectrum efficiency and/or robustness. There exists a fundamental tradeoff between potential spectrum efficiency and robustness increase. However, multiantenna techniques also come with an overhead in silicon implementation area and power consumption due, at least, to the duplication of part of the transmitter and receiver radio front-ends. Although the area overhead may be acceptable in view of the performance improvement, low power consumption must be preserved for integration in nomadic devices. In this case, it is the tradeoff between performance (e.g., the net throughput on top of the medium access control layer and average power consumption that really matters. It has been shown that adaptive schemes were mandatory to avoid that multiantenna techniques hamper this system tradeoff. In this paper, we derive smartMIMO: an adaptive multiantenna approach which, next to simply adapting the modulation and code rate as traditionally considered, decides packet-per-packet, depending on the MIMO channel state, to use either space-division multiplexing (increasing spectrum efficiency, space-time coding (increasing robustness, or to stick to single-antenna transmission. Contrarily to many of such adaptive schemes, the focus is set on using multiantenna transmission to improve the link energy efficiency in real operation conditions. Based on a model calibrated on an existing reconfigurable multiantenna transceiver setup, the link energy efficiency with the proposed scheme is shown to be improved by up to 30% when compared to nonadaptive schemes. The average throughput is, on the other hand, improved by up to 50% when compared to single-antenna transmission.

  6. SmartMIMO: An Energy-Aware Adaptive MIMO-OFDM Radio Link Control for Next-Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Dehaene Wim

    2007-01-01

    Full Text Available Multiantenna systems and more particularly those operating on multiple input and multiple output (MIMO channels are currently a must to improve wireless links spectrum efficiency and/or robustness. There exists a fundamental tradeoff between potential spectrum efficiency and robustness increase. However, multiantenna techniques also come with an overhead in silicon implementation area and power consumption due, at least, to the duplication of part of the transmitter and receiver radio front-ends. Although the area overhead may be acceptable in view of the performance improvement, low power consumption must be preserved for integration in nomadic devices. In this case, it is the tradeoff between performance (e.g., the net throughput on top of the medium access control layer and average power consumption that really matters. It has been shown that adaptive schemes were mandatory to avoid that multiantenna techniques hamper this system tradeoff. In this paper, we derive smartMIMO: an adaptive multiantenna approach which, next to simply adapting the modulation and code rate as traditionally considered, decides packet-per-packet, depending on the MIMO channel state, to use either space-division multiplexing (increasing spectrum efficiency, space-time coding (increasing robustness, or to stick to single-antenna transmission. Contrarily to many of such adaptive schemes, the focus is set on using multiantenna transmission to improve the link energy efficiency in real operation conditions. Based on a model calibrated on an existing reconfigurable multiantenna transceiver setup, the link energy efficiency with the proposed scheme is shown to be improved by up to 30% when compared to nonadaptive schemes. The average throughput is, on the other hand, improved by up to 50% when compared to single-antenna transmission.

  7. Intelligent Wireless Sensor Network

    OpenAIRE

    Saeed, Bakhtiar I.; Mehrdadi, Bruce

    2010-01-01

    In recent years, there has been significant increase in utilisation of embedded-microcontrollers in broad range of applications extending from commercial products to industrial process system monitoring. Furthermore, improvements in speed, size and power consumption of microcontrollers with added wireless capabilities has provided new generation of applications. These include versatile and\\ud low cost solutions in wireless sensor networking applications such as wireless system monitoring and ...

  8. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  9. Evaluation of Secure 802.1X Port-Based Network Access Authentication Over 802.11 Wireless Local Area Networks

    National Research Council Canada - National Science Library

    Ozturk, Huseyin

    2003-01-01

    ... addressed. Failing to examine the security risks of WLAN technology and to take the necessary countermeasures may result in unauthorized entry into the legacy local area networks and other attacks...

  10. Strong transcription blockage mediated by R-loop formation within a G-rich homopurine-homopyrimidine sequence localized in the vicinity of the promoter.

    Science.gov (United States)

    Belotserkovskii, Boris P; Soo Shin, Jane Hae; Hanawalt, Philip C

    2017-06-20

    Guanine-rich (G-rich) homopurine-homopyrimidine nucleotide sequences can block transcription with an efficiency that depends upon their orientation, composition and length, as well as the presence of negative supercoiling or breaks in the non-template DNA strand. We report that a G-rich sequence in the non-template strand reduces the yield of T7 RNA polymerase transcription by more than an order of magnitude when positioned close (9 bp) to the promoter, in comparison to that for a distal (∼250 bp) location of the same sequence. This transcription blockage is much less pronounced for a C-rich sequence, and is not significant for an A-rich sequence. Remarkably, the blockage is not pronounced if transcription is performed in the presence of RNase H, which specifically digests the RNA strands within RNA-DNA hybrids. The blockage also becomes less pronounced upon reduced RNA polymerase concentration. Based upon these observations and those from control experiments, we conclude that the blockage is primarily due to the formation of stable RNA-DNA hybrids (R-loops), which inhibit successive rounds of transcription. Our results could be relevant to transcription dynamics in vivo (e.g. transcription 'bursting') and may also have practical implications for the design of expression vectors. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  11. Software Defined RF Transceiver for Wireless Sensor Network, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The concept of a smart device capable of communicating and making its own local decisions for wireless sensing, monitoring control, data acquisition, tracking, and...

  12. Loop Transfer Matrix and Loop Quantum Mechanics

    International Nuclear Information System (INIS)

    Savvidy, George K.

    2000-01-01

    The gonihedric model of random surfaces on a 3d Euclidean lattice has equivalent representation in terms of transfer matrix K(Q i ,Q f ), which describes the propagation of loops Q. We extend the previous construction of the loop transfer matrix to the case of nonzero self-intersection coupling constant κ. We introduce the loop generalization of Fourier transformation which allows to diagonalize transfer matrices, that depend on symmetric difference of loops only and express all eigenvalues of 3d loop transfer matrix through the correlation functions of the corresponding 2d statistical system. The loop Fourier transformation allows to carry out the analogy with quantum mechanics of point particles, to introduce conjugate loop momentum P and to define loop quantum mechanics. We also consider transfer matrix on 4d lattice which describes propagation of memebranes. This transfer matrix can also be diagonalized by using the generalized Fourier transformation, and all its eigenvalues are equal to the correlation functions of the corresponding 3d statistical system. In particular the free energy of the 4d membrane system is equal to the free energy of 3d gonihedric system of loops and is equal to the free energy of 2d Ising model. (author)

  13. Low-power wireless infrared communications

    NARCIS (Netherlands)

    Otte, R.; Jong, de L.P.; Roermund, van A.H.M.

    1999-01-01

    Today, wireless infrared transmission has entered our homes, offices, industry and health care, with applications in the field of remote control, telemetry, and local communication. This book is about the underlying technology. As it is an outgrowth of my Ph.D. thesis, the emphasis is on fundamental

  14. MEDIAN: Wireless broadband LAN for multimedia applications

    NARCIS (Netherlands)

    Vliet, P.J. van

    1998-01-01

    MEDIAN is one of the projects in the mobile domain of the Advanced Communications Technologies and Services (ACTS) programme of the European Commission. The main obiective of the MEDIAN project is to evaluate and implement a high speed Wireless Customer Premises / Local Area Network (WCPN/WLAN)

  15. A Remote WIRELESS Facility

    Directory of Open Access Journals (Sweden)

    Kees Uiterwijk

    2007-10-01

    Full Text Available Continuing need for available distance learning facilities has led to the development of a remote lab facility focusing on wireless technology. In the field of engineering there is a student need of gaining experience in set-up, monitoring and maintenance of 802.11A/B/G based wireless LAN environments.

  16. Warming Up to Wireless

    Science.gov (United States)

    Milner, Jacob

    2005-01-01

    In districts big and small across the U.S., students, teachers, and administrators alike have come to appreciate the benefits of wireless technology. Because the technology delivers Internet signals on airborne radio frequencies, wireless networking allows users of all portable devices to move freely on a school's campus and stay connected to the…

  17. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  18. A Way Out of the Bubble Trouble? - Upon Reconstructing the Origin of the Local Bubble and Loop I via Radioisotopic Signatures on Earth

    OpenAIRE

    Schulreich, Michael Mathias; Breitschwerdt, Dieter; Feige, Jenny; Dettbarn, Christian

    2018-01-01

    Deep-sea archives all over the world show an enhanced concentration of the radionuclide $^{60}$Fe, isolated in layers dating from about 2.2 Myr ago. Since this comparatively long-lived isotope is not naturally produced on Earth, such an enhancement can only be attributed to extraterrestrial sources, particularly one or several nearby supernovae in the recent past. It has been speculated that these supernovae might have been involved in the formation of the Local Superbubble, our Galactic habi...

  19. Wireless adiabatic power transfer

    International Nuclear Information System (INIS)

    Rangelov, A.A.; Suchowski, H.; Silberberg, Y.; Vitanov, N.V.

    2011-01-01

    Research highlights: → Efficient and robust mid-range wireless energy transfer between two coils. → The adiabatic energy transfer is analogous to adiabatic passage in quantum optics. → Wireless energy transfer is insensitive to any resonant constraints. → Wireless energy transfer is insensitive to noise in the neighborhood of the coils. - Abstract: We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  20. Unpowered wireless transmission of ultrasound signals

    International Nuclear Information System (INIS)

    Huang, H; Paramo, D; Deshmukh, S

    2011-01-01

    This paper presents a wireless ultrasound sensing system that uses frequency conversion to convert the ultrasound signal to a microwave signal and transmit it directly without digitization. Constructed from a few passive microwave components, the sensor is able to sense, modulate, and transmit the full waveform of ultrasound signals wirelessly without requiring any local power source. The principle of operation of the unpowered wireless ultrasound sensor is described first, and this is followed by a detailed description of the implementation of the sensor and the sensor interrogation unit using commercially available antennas and microwave components. Validation of the sensing system using an ultrasound pitch–catch system and the power analysis model of the system are also presented

  1. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  2. The Brownian loop soup

    OpenAIRE

    Lawler, Gregory F.; Werner, Wendelin

    2003-01-01

    We define a natural conformally invariant measure on unrooted Brownian loops in the plane and study some of its properties. We relate this measure to a measure on loops rooted at a boundary point of a domain and show how this relation gives a way to ``chronologically add Brownian loops'' to simple curves in the plane.

  3. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  4. Applicable approach of the wireless technology for Korean nuclear power plants

    International Nuclear Information System (INIS)

    Ko, Do Young; Lee, Soo Ill

    2013-01-01

    Highlights: • To apply wireless technology for Korean NPPs, several stipulations are proposed. • WLAN is proposed as the most appropriate wireless technology for Korean NPPs. • WLAN can be applied to the specific fields except in the control system. • An attitude survey on wireless showed that 94.7% agree with the necessity of wireless. - Abstract: Recently, many nuclear power plants (NPPs) over the world use various types of wireless systems for the advantages. Unfortunately, wireless technologies are not currently installed in any Korean NPPs because it is difficult to solve the negative impact of unexpected outcomes or failures from the influence of the wireless technologies, which is electromagnetic interference and radio-frequency interference (EMI/RFI). Moreover, a lack of desire on the part of Korean nuclear industry to implement it leads to give up benefit from the wireless technologies. To install the wireless technologies with maximum benefit and minimum risk, a systematic approach, which quantify the negative impact and prevent the influence, is essential; therefore, this paper describes an applicable research result on the wireless technology for Korean NPPs based on regulatory guides and current wireless hardware and software technologies. Also, survey on the needs for the wireless technology for Korean nuclear power plants was conducted, because the level of awareness of workers in NPPs regarding wireless technologies is very important issue. In this paper, we propose an applicable system to enhance the applicability for the wireless technology for Korean NPPs. The result based on proposed applicable system shows that wireless local area network (WLAN) is the representative candidate for Korean NPPs, which can be applied to the specific fields of radiation monitoring, voice and data communication, component monitoring and instrumentation, and wireless cameras

  5. Applicable approach of the wireless technology for Korean nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ko, Do Young, E-mail: kodoyoung@khnp.co.kr; Lee, Soo Ill

    2013-12-15

    Highlights: • To apply wireless technology for Korean NPPs, several stipulations are proposed. • WLAN is proposed as the most appropriate wireless technology for Korean NPPs. • WLAN can be applied to the specific fields except in the control system. • An attitude survey on wireless showed that 94.7% agree with the necessity of wireless. - Abstract: Recently, many nuclear power plants (NPPs) over the world use various types of wireless systems for the advantages. Unfortunately, wireless technologies are not currently installed in any Korean NPPs because it is difficult to solve the negative impact of unexpected outcomes or failures from the influence of the wireless technologies, which is electromagnetic interference and radio-frequency interference (EMI/RFI). Moreover, a lack of desire on the part of Korean nuclear industry to implement it leads to give up benefit from the wireless technologies. To install the wireless technologies with maximum benefit and minimum risk, a systematic approach, which quantify the negative impact and prevent the influence, is essential; therefore, this paper describes an applicable research result on the wireless technology for Korean NPPs based on regulatory guides and current wireless hardware and software technologies. Also, survey on the needs for the wireless technology for Korean nuclear power plants was conducted, because the level of awareness of workers in NPPs regarding wireless technologies is very important issue. In this paper, we propose an applicable system to enhance the applicability for the wireless technology for Korean NPPs. The result based on proposed applicable system shows that wireless local area network (WLAN) is the representative candidate for Korean NPPs, which can be applied to the specific fields of radiation monitoring, voice and data communication, component monitoring and instrumentation, and wireless cameras.

  6. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  7. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  8. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  9. Convergence of wireless, wireline, and photonics next generation networks

    CERN Document Server

    Iniewski, Krzysztof

    2010-01-01

    Filled with illustrations and practical examples from industry, this book provides a brief but comprehensive introduction to the next-generation wireless networks that will soon replace more traditional wired technologies. Written by a mixture of top industrial experts and key academic professors, it is the only book available that covers both wireless networks (such as wireless local area and personal area networks) and optical networks (such as long-haul and metropolitan networks) in one volume. It gives engineers and engineering students the necessary knowledge to meet challenges of next-ge

  10. Wireless radio a history

    CERN Document Server

    Coe, Lewis

    2006-01-01

    ""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.

  11. Renormalization of loop functions for all loops

    International Nuclear Information System (INIS)

    Brandt, R.A.; Neri, F.; Sato, M.

    1981-01-01

    It is shown that the vacuum expectation values W(C 1 ,xxx, C/sub n/) of products of the traces of the path-ordered phase factors P exp[igcontour-integral/sub C/iA/sub μ/(x)dx/sup μ/] are multiplicatively renormalizable in all orders of perturbation theory. Here A/sub μ/(x) are the vector gauge field matrices in the non-Abelian gauge theory with gauge group U(N) or SU(N), and C/sub i/ are loops (closed paths). When the loops are smooth (i.e., differentiable) and simple (i.e., non-self-intersecting), it has been shown that the generally divergent loop functions W become finite functions W when expressed in terms of the renormalized coupling constant and multiplied by the factors e/sup -K/L(C/sub i/), where K is linearly divergent and L(C/sub i/) is the length of C/sub i/. It is proved here that the loop functions remain multiplicatively renormalizable even if the curves have any finite number of cusps (points of nondifferentiability) or cross points (points of self-intersection). If C/sub γ/ is a loop which is smooth and simple except for a single cusp of angle γ, then W/sub R/(C/sub γ/) = Z(γ)W(C/sub γ/) is finite for a suitable renormalization factor Z(γ) which depends on γ but on no other characteristic of C/sub γ/. This statement is made precise by introducing a regularization, or via a loop-integrand subtraction scheme specified by a normalization condition W/sub R/(C-bar/sub γ/) = 1 for an arbitrary but fixed loop C-bar/sub γ/. Next, if C/sub β/ is a loop which is smooth and simple except for a cross point of angles β, then W(C/sub β/) must be renormalized together with the loop functions of associated sets S/sup i//sub β/ = ]C/sup i/ 1 ,xxx, C/sup i//sub p/i] (i = 2,xxx,I) of loops C/sup i//sub q/ which coincide with certain parts of C/sub β/equivalentC 1 1 . Then W/sub R/(S/sup i//sub β/) = Z/sup i/j(β)W(S/sup j//sub β/) is finite for a suitable matrix Z/sup i/j

  12. Quantum Kinematics of Bosonic Vortex Loops

    International Nuclear Information System (INIS)

    Goldin, G.A.; Owczarek, R.; Sharp, D.H.

    1999-01-01

    Poisson structure for vortex filaments (loops and arcs) in 2D ideal incompressible fluid is analyzed in detail. Canonical coordinates and momenta on coadjoint orbits of the area-preserving diffeomorphism group, associated with such vortices, are found. The quantum space of states in the simplest case of ''bosonic'' vortex loops is built within a geometric quantization approach to the description of a quantum fluid. Fock-like structure and non-local creation and annihilation operators of quantum vortex filaments are introduced

  13. An Inductively-Powered Wireless Neural Recording System with a Charge Sampling Analog Front-End.

    Science.gov (United States)

    Lee, Seung Bae; Lee, Byunghun; Kiani, Mehdi; Mahmoudi, Babak; Gross, Robert; Ghovanloo, Maysam

    2016-01-15

    An inductively-powered wireless integrated neural recording system (WINeR-7) is presented for wireless and battery less neural recording from freely-behaving animal subjects inside a wirelessly-powered standard homecage. The WINeR-7 system employs a novel wide-swing dual slope charge sampling (DSCS) analog front-end (AFE) architecture, which performs amplification, filtering, sampling, and analog-to-time conversion (ATC) with minimal interference and small amount of power. The output of the DSCS-AFE produces a pseudo-digital pulse width modulated (PWM) signal. A circular shift register (CSR) time division multiplexes (TDM) the PWM pulses to create a TDM-PWM signal, which is fed into an on-chip 915 MHz transmitter (Tx). The AFE and Tx are supplied at 1.8 V and 4.2 V, respectively, by a power management block, which includes a high efficiency active rectifier and automatic resonance tuning (ART), operating at 13.56 MHz. The 8-ch system-on-a-chip (SoC) was fabricated in a 0.35-μm CMOS process, occupying 5.0 × 2.5 mm 2 and consumed 51.4 mW. For each channel, the sampling rate is 21.48 kHz and the power consumption is 19.3 μW. In vivo experiments were conducted on freely behaving rats in an energized homecage by continuously delivering 51.4 mW to the WINeR-7 system in a closed-loop fashion and recording local field potentials (LFP).

  14. Anticipating WPS PIN Vulnerability to Secure Wireless Network

    Directory of Open Access Journals (Sweden)

    Indra Dwi Rianto

    2013-12-01

    Full Text Available WiFi Protected Setup (WPS is a standardized function supported by numerous vendors of wireless routers and access point to help set up connection to a wireless local area network. It is designed to simplify the set up and generally enabled by default. Due to design flaw, the WPS or QSS PIN is susceptible to a brute forceattack. In this paper, we test the security vulnerability occurred, evaluate the performance and give recommendations to anticipate the attack.

  15. Unidirectional wireless power transfer using near-field plates

    Energy Technology Data Exchange (ETDEWEB)

    Imani, Mohammadreza F., E-mail: mohamad.imani@gmail.com [Center for Metamaterials and Integrated Plasmonics, Department of Electrical and Computer Engineering, Duke University, Durham, North Carolina 27708 (United States); Grbic, Anthony [Radiation Laboratory, Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, Michigan 48109 (United States)

    2015-05-14

    One of the obstacles preventing wireless power transfer from becoming ubiquitous is their leakage of power: high-amplitude electromagnetic fields that can interfere with other electronic devices, increase health concerns, or hinder power metering. In this paper, we present near-field plates (NFPs) as a novel method to tailor the electromagnetic fields generated by a wireless power transfer system while maintaining high efficiency. NFPs are modulated arrays or surfaces designed to form prescribed near-field patterns. The NFP proposed in this paper consists of an array of loaded loops that are designed to confine the electromagnetic fields of a resonant transmitting loop to the desired direction (receiving loop) while suppressing fields in other directions. The step-by-step design procedure for this device is outlined. Two NFPs are designed and examined in full-wave simulation. Their performance is shown to be in close agreement with the design predictions, thereby verifying the proposed design and operation. A NFP is also fabricated and experimentally shown to form a unidirectional wireless power transfer link with high efficiency.

  16. Unidirectional wireless power transfer using near-field plates

    International Nuclear Information System (INIS)

    Imani, Mohammadreza F.; Grbic, Anthony

    2015-01-01

    One of the obstacles preventing wireless power transfer from becoming ubiquitous is their leakage of power: high-amplitude electromagnetic fields that can interfere with other electronic devices, increase health concerns, or hinder power metering. In this paper, we present near-field plates (NFPs) as a novel method to tailor the electromagnetic fields generated by a wireless power transfer system while maintaining high efficiency. NFPs are modulated arrays or surfaces designed to form prescribed near-field patterns. The NFP proposed in this paper consists of an array of loaded loops that are designed to confine the electromagnetic fields of a resonant transmitting loop to the desired direction (receiving loop) while suppressing fields in other directions. The step-by-step design procedure for this device is outlined. Two NFPs are designed and examined in full-wave simulation. Their performance is shown to be in close agreement with the design predictions, thereby verifying the proposed design and operation. A NFP is also fabricated and experimentally shown to form a unidirectional wireless power transfer link with high efficiency

  17. Random walk loop soup

    OpenAIRE

    Lawler, Gregory F.; Ferreras, José A. Trujillo

    2004-01-01

    The Brownian loop soup introduced in Lawler and Werner (2004) is a Poissonian realization from a sigma-finite measure on unrooted loops. This measure satisfies both conformal invariance and a restriction property. In this paper, we define a random walk loop soup and show that it converges to the Brownian loop soup. In fact, we give a strong approximation result making use of the strong approximation result of Koml\\'os, Major, and Tusn\\'ady. To make the paper self-contained, we include a proof...

  18. Randomized clinical trial comparing spinal anesthesia with local anesthesia with sedation for loop colostomy closure Ensaio clínico randomizado comparando raquianestesia com anestesia local, associadas à sedação para o fechamento de colostomia em alça

    Directory of Open Access Journals (Sweden)

    Rone Antônio Alves de Abreu

    2010-09-01

    Full Text Available CONTEXT: Recent studies have shown that local anesthesia for loop colostomy closure is as safe as spinal anesthesia for this procedure. OBJECTIVES: Randomized clinical trial to compare the results from these two techniques. METHODS: Fifty patients were randomized for loop colostomy closure using spinal anesthesia (n = 25 and using local anesthesia (n = 25. Preoperatively, the bowel was evaluated by means of colonoscopy, and bowel preparation was performed with 10% oral mannitol solution and physiological saline solution for lavage through the distal colostomy orifice. All patients were given prophylactic antibiotics (cefoxitin. Pain, analgesia, reestablishment of peristaltism or peristalsis, diet reintroduction, length of hospitalization and rehospitalization were analyzed postoperatively. RESULTS: Surgery duration and local complications were greater in the spinal anesthesia group. Conversion to general anesthesia occurred only with spinal anesthesia. There was no difference in intraoperative pain between the groups, but postoperative pain, reestablishment of peristaltism or peristalsis, diet reintroduction and length of hospitalization were lower with local anesthesia. CONCLUSIONS: Local anesthesia plus sedation offers a safer and more effective method than spinal anesthesia for loop colostomy closure.CONTEXTO: Estudos recentes têm demonstrado que a anestesia local para o fechamento de colostomia em alça é tão segura quanto a raquianestesia para estes procedimentos. OBJETIVOS: Comparar os resultados do fechamento de colostomia em alça usando essas duas técnicas. MÉTODOS: Cinquenta pacientes foram randomizados para o fechamento de colostomia em alça sob raquianestesia (n = 25 e anestesia local (n = 25. No pré-operatório, o cólon foi avaliado por colonoscopia e o preparo intestinal foi realizado com solução oral de manitol a 10% e limpeza com solução salina fisiológica através do orifício distal da colostomia. Todos os

  19. Evolution of Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  20. A kinematic view of loop closure.

    Science.gov (United States)

    Coutsias, Evangelos A; Seok, Chaok; Jacobson, Matthew P; Dill, Ken A

    2004-03-01

    We consider the problem of loop closure, i.e., of finding the ensemble of possible backbone structures of a chain segment of a protein molecule that is geometrically consistent with preceding and following parts of the chain whose structures are given. We reduce this problem of determining the loop conformations of six torsions to finding the real roots of a 16th degree polynomial in one variable, based on the robotics literature on the kinematics of the equivalent rotator linkage in the most general case of oblique rotators. We provide a simple intuitive view and derivation of the polynomial for the case in which each of the three pair of torsional axes has a common point. Our method generalizes previous work on analytical loop closure in that the torsion angles need not be consecutive, and any rigid intervening segments are allowed between the free torsions. Our approach also allows for a small degree of flexibility in the bond angles and the peptide torsion angles; this substantially enlarges the space of solvable configurations as is demonstrated by an application of the method to the modeling of cyclic pentapeptides. We give further applications to two important problems. First, we show that this analytical loop closure algorithm can be efficiently combined with an existing loop-construction algorithm to sample loops longer than three residues. Second, we show that Monte Carlo minimization is made severalfold more efficient by employing the local moves generated by the loop closure algorithm, when applied to the global minimization of an eight-residue loop. Our loop closure algorithm is freely available at http://dillgroup. ucsf.edu/loop_closure/. Copyright 2004 Wiley Periodicals, Inc. J Comput Chem 25: 510-528, 2004

  1. On loop extensions and cohomology of loops

    OpenAIRE

    Benítez, Rolando Jiménez; Meléndez, Quitzeh Morales

    2015-01-01

    In this paper are defined cohomology-like groups that classify loop extensions satisfying a given identity in three variables for association identities, and in two variables for the case of commutativity. It is considered a large amount of identities. This groups generalize those defined in works of Nishigori [2] and of Jhonson and Leedham-Green [4]. It is computed the number of metacyclic extensions for trivial action of the quotient on the kernel in one particular case for left Bol loops a...

  2. Neutron transport in irradiation loops (IRENE loop)

    International Nuclear Information System (INIS)

    Sarsam, Maher.

    1980-09-01

    This thesis is composed of two parts with different aspects. Part one is a technical description of the loop and its main ancillary facilities as well as of the safety and operational regulations. The measurement methods on the model of the ISIS reactor and on the loop in the OSIRIS reactor are described. Part two deals with the possibility of calculating the powers dissipated by each rod of the fuel cluster, using appropriate computer codes, not only in the reflector but also in the core and to suggest a method of calculation [fr

  3. Reactor building indoor wireless network channel quality estimation using RSSI measurement of wireless sensor network

    International Nuclear Information System (INIS)

    Merat, S.

    2008-01-01

    Expanding wireless communication network reception inside reactor buildings (RB) and service wings (SW) has always been a technical challenge for operations service team. This is driven by the volume of metal equipment inside the Reactor Buildings (RB) that blocks and somehow shields the signal throughout the link. In this study, to improve wireless reception inside the Reactor Building (RB), an experimental model using indoor localization mesh based on IEEE 802.15 is developed to implement a wireless sensor network. This experimental model estimates the distance between different nodes by measuring the RSSI (Received Signal Strength Indicator). Then by using triangulation and RSSI measurement, the validity of the estimation techniques is verified to simulate the physical environmental obstacles, which block the signal transmission. (author)

  4. Reactor building indoor wireless network channel quality estimation using RSSI measurement of wireless sensor network

    Energy Technology Data Exchange (ETDEWEB)

    Merat, S. [Wardrop Engineering Inc., Toronto, Ontario (Canada)

    2008-07-01

    Expanding wireless communication network reception inside reactor buildings (RB) and service wings (SW) has always been a technical challenge for operations service team. This is driven by the volume of metal equipment inside the Reactor Buildings (RB) that blocks and somehow shields the signal throughout the link. In this study, to improve wireless reception inside the Reactor Building (RB), an experimental model using indoor localization mesh based on IEEE 802.15 is developed to implement a wireless sensor network. This experimental model estimates the distance between different nodes by measuring the RSSI (Received Signal Strength Indicator). Then by using triangulation and RSSI measurement, the validity of the estimation techniques is verified to simulate the physical environmental obstacles, which block the signal transmission. (author)

  5. Coherently Enhanced Wireless Power Transfer

    Science.gov (United States)

    Krasnok, Alex; Baranov, Denis G.; Generalov, Andrey; Li, Sergey; Alù, Andrea

    2018-04-01

    Extraction of electromagnetic energy by an antenna from impinging external radiation is at the basis of wireless communications and wireless power transfer (WPT). The maximum of transferred energy is ensured when the antenna is conjugately matched, i.e., when it is resonant and it has an equal coupling with free space and its load. This condition, however, can be easily affected by changes in the environment, preventing optimal operation of a WPT system. Here, we introduce the concept of coherently enhanced WPT that allows us to bypass this difficulty and achieve dynamic control of power transfer. The approach relies on coherent excitation of the waveguide connected to the antenna load with a backward propagating signal of specific amplitude and phase. This signal creates a suitable interference pattern at the load resulting in a modification of the local wave impedance, which in turn enables conjugate matching and a largely increased amount of extracted energy. We develop a simple theoretical model describing this concept, demonstrate it with full-wave numerical simulations for the canonical example of a dipole antenna, and verify experimentally in both near-field and far-field regimes.

  6. Wireless distributed functional electrical stimulation system

    Directory of Open Access Journals (Sweden)

    Jovičić Nenad S

    2012-08-01

    Full Text Available Abstract Background The control of movement in humans is hierarchical and distributed and uses feedback. An assistive system could be best integrated into the therapy of a human with a central nervous system lesion if the system is controlled in a similar manner. Here, we present a novel wireless architecture and routing protocol for a distributed functional electrical stimulation system that enables control of movement. Methods The new system comprises a set of miniature battery-powered devices with stimulating and sensing functionality mounted on the body of the subject. The devices communicate wirelessly with one coordinator device, which is connected to a host computer. The control algorithm runs on the computer in open- or closed-loop form. A prototype of the system was designed using commercial, off-the-shelf components. The propagation characteristics of electromagnetic waves and the distributed nature of the system were considered during the development of a two-hop routing protocol, which was implemented in the prototype’s software. Results The outcomes of this research include a novel system architecture and routing protocol and a functional prototype based on commercial, off-the-shelf components. A proof-of-concept study was performed on a hemiplegic subject with paresis of the right arm. The subject was tasked with generating a fully functional palmar grasp (closing of the fingers. One node was used to provide this movement, while a second node controlled the activation of extensor muscles to eliminate undesired wrist flexion. The system was tested with the open- and closed-loop control algorithms. Conclusions The system fulfilled technical and application requirements. The novel communication protocol enabled reliable real-time use of the system in both closed- and open-loop forms. The testing on a patient showed that the multi-node system could operate effectively to generate functional movement.

  7. Wireless distributed functional electrical stimulation system.

    Science.gov (United States)

    Jovičić, Nenad S; Saranovac, Lazar V; Popović, Dejan B

    2012-08-09

    The control of movement in humans is hierarchical and distributed and uses feedback. An assistive system could be best integrated into the therapy of a human with a central nervous system lesion if the system is controlled in a similar manner. Here, we present a novel wireless architecture and routing protocol for a distributed functional electrical stimulation system that enables control of movement. The new system comprises a set of miniature battery-powered devices with stimulating and sensing functionality mounted on the body of the subject. The devices communicate wirelessly with one coordinator device, which is connected to a host computer. The control algorithm runs on the computer in open- or closed-loop form. A prototype of the system was designed using commercial, off-the-shelf components. The propagation characteristics of electromagnetic waves and the distributed nature of the system were considered during the development of a two-hop routing protocol, which was implemented in the prototype's software. The outcomes of this research include a novel system architecture and routing protocol and a functional prototype based on commercial, off-the-shelf components. A proof-of-concept study was performed on a hemiplegic subject with paresis of the right arm. The subject was tasked with generating a fully functional palmar grasp (closing of the fingers). One node was used to provide this movement, while a second node controlled the activation of extensor muscles to eliminate undesired wrist flexion. The system was tested with the open- and closed-loop control algorithms. The system fulfilled technical and application requirements. The novel communication protocol enabled reliable real-time use of the system in both closed- and open-loop forms. The testing on a patient showed that the multi-node system could operate effectively to generate functional movement.

  8. The market for wireless electricity: The case of India

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Ashish, E-mail: ashish.kumar@nsn.co [Nokia Siemens Networks, 438 B Alexandra Road, Alexandra Technopark Block B, Singapore 119968 (Singapore); Shankar, Ravi, E-mail: ravi1@dms.iitd.ac.i [Department of Management Studies, IIT Delhi, New Delhi 110016 (India); Momaya, Kiran, E-mail: momaya@dms.iitd.ac.i [Department of Management Studies, IIT Delhi, New Delhi 110016 (India); Gupte, Sandeep, E-mail: Sandeep.gupte@industowers.co [Indus Towers, Building No. 10, Tower A, 4th floor, DLF Cyber City, Gurgaon 122002 (India)

    2010-03-15

    A wireless revolution has transformed telecoms in India and in other emerging markets. The electricity market, on the other hand, remains underdeveloped. We define Wireless Electricity as renewable energy produced within a few hundred meters of the point of consumption. A wireless revolution in electricity would solve the problem of electricity deficit, empower people at the bottom of the pyramid and mitigate the environmental impact of bringing hundreds of millions out of poverty as the Indian economy grows. Renewables are technically proven and economically viable in certain situations, but their use remains peripheral. The stark difference in the diffusion patterns in telecoms and electricity has been ignored by leaders in government, business and academics. We present common frameworks to explain the different directions of reform in telecoms and electricity. We explain some of the dynamics which prevent the diffusion of Wireless Electricity. We use a causal loop diagram to explain the status quo in the off-grid electricity market and propose changes which will lead to the formation of a market for Wireless Electricity. India has the entrepreneurial talent to develop this market-and the largest number of potential customers. The world will benefit as a result.

  9. The market for wireless electricity. The case of India

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Ashish [Nokia Siemens Networks, 438 B Alexandra Road, Alexandra Technopark Block B, Singapore 119968 (Singapore); Shankar, Ravi; Momaya, Kiran [Department of Management Studies, IIT Delhi, New Delhi 110016 (India); Gupte, Sandeep [Indus Towers, Building No. 10, Tower A, 4th floor, DLF Cyber City, Gurgaon 122002 (India)

    2010-03-15

    A wireless revolution has transformed telecoms in India and in other emerging markets. The electricity market, on the other hand, remains underdeveloped. We define Wireless Electricity as renewable energy produced within a few hundred meters of the point of consumption. A wireless revolution in electricity would solve the problem of electricity deficit, empower people at the bottom of the pyramid and mitigate the environmental impact of bringing hundreds of millions out of poverty as the Indian economy grows. Renewables are technically proven and economically viable in certain situations, but their use remains peripheral. The stark difference in the diffusion patterns in telecoms and electricity has been ignored by leaders in government, business and academics. We present common frameworks to explain the different directions of reform in telecoms and electricity. We explain some of the dynamics which prevent the diffusion of Wireless Electricity. We use a causal loop diagram to explain the status quo in the off-grid electricity market and propose changes which will lead to the formation of a market for Wireless Electricity. India has the entrepreneurial talent to develop this market - and the largest number of potential customers. The world will benefit as a result. (author)

  10. The market for wireless electricity: The case of India

    International Nuclear Information System (INIS)

    Kumar, Ashish; Shankar, Ravi; Momaya, Kiran; Gupte, Sandeep

    2010-01-01

    A wireless revolution has transformed telecoms in India and in other emerging markets. The electricity market, on the other hand, remains underdeveloped. We define Wireless Electricity as renewable energy produced within a few hundred meters of the point of consumption. A wireless revolution in electricity would solve the problem of electricity deficit, empower people at the bottom of the pyramid and mitigate the environmental impact of bringing hundreds of millions out of poverty as the Indian economy grows. Renewables are technically proven and economically viable in certain situations, but their use remains peripheral. The stark difference in the diffusion patterns in telecoms and electricity has been ignored by leaders in government, business and academics. We present common frameworks to explain the different directions of reform in telecoms and electricity. We explain some of the dynamics which prevent the diffusion of Wireless Electricity. We use a causal loop diagram to explain the status quo in the off-grid electricity market and propose changes which will lead to the formation of a market for Wireless Electricity. India has the entrepreneurial talent to develop this market-and the largest number of potential customers. The world will benefit as a result.

  11. Wireless LAN security management with location detection capability in hospitals.

    Science.gov (United States)

    Tanaka, K; Atarashi, H; Yamaguchi, I; Watanabe, H; Yamamoto, R; Ohe, K

    2012-01-01

    In medical institutions, unauthorized access points and terminals obstruct the stable operation of a large-scale wireless local area network (LAN) system. By establishing a real-time monitoring method to detect such unauthorized wireless devices, we can improve the efficiency of security management. We detected unauthorized wireless devices by using a centralized wireless LAN system and a location detection system at 370 access points at the University of Tokyo Hospital. By storing the detected radio signal strength and location information in a database, we evaluated the risk level from the detection history. We also evaluated the location detection performance in our hospital ward using Wi-Fi tags. The presence of electric waves outside the hospital and those emitted from portable game machines with wireless communication capability was confirmed from the detection result. The location detection performance showed an error margin of approximately 4 m in detection accuracy and approximately 5% in false detection. Therefore, it was effective to consider the radio signal strength as both an index of likelihood at the detection location and an index for the level of risk. We determined the location of wireless devices with high accuracy by filtering the detection results on the basis of radio signal strength and detection history. Results of this study showed that it would be effective to use the developed location database containing radio signal strength and detection history for security management of wireless LAN systems and more general-purpose location detection applications.

  12. Wireless networking for the dental office: current wireless standards and security protocols.

    Science.gov (United States)

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  13. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  14. Efficient Closed-Loop Schemes for MIMO-OFDM-Based WLANs

    Directory of Open Access Journals (Sweden)

    Jiang Yi

    2006-01-01

    Full Text Available The single-input single-output (SISO orthogonal frequency-division multiplexing (OFDM systems for wireless local area networks (WLAN defined by the IEEE 802.11a standard can support data rates up to 54 Mbps. In this paper, we consider deploying two transmit and two receive antennas to increase the data rate up to 108 Mbps. Applying our recent multiple-input multiple-output (MIMO transceiver designs, that is, the geometric mean decomposition (GMD and the uniform channel decomposition (UCD schemes, we propose simple and efficient closed-loop MIMO-OFDM designs for much improved performance, compared to the standard singular value decomposition (SVD based schemes as well as the open-loop V-BLAST (vertical Bell Labs layered space-time based counterparts. In the explicit feedback mode, precoder feedback is needed for the proposed schemes. We show that the overhead of feedback can be made very moderate by using a vector quantization method. In the time-division duplex (TDD mode where the channel reciprocity is exploited, our schemes turn out to be robust against the mismatch between the uplink and downlink channels. The advantages of our schemes are demonstrated via extensive numerical examples.

  15. Sensitivity enhancement of remotely coupled NMR detectors using wirelessly powered parametric amplification.

    Science.gov (United States)

    Qian, Chunqi; Murphy-Boesch, Joseph; Dodd, Stephen; Koretsky, Alan

    2012-09-01

    A completely wireless detection coil with an integrated parametric amplifier has been constructed to provide local amplification and transmission of MR signals. The sample coil is one element of a parametric amplifier using a zero-bias diode that mixes the weak MR signal with a strong pump signal that is obtained from an inductively coupled external loop. The NMR sample coil develops current gain via reduction in the effective coil resistance. Higher gain can be obtained by adjusting the level of the pumping power closer to the oscillation threshold, but the gain is ultimately constrained by the bandwidth requirement of MRI experiments. A feasibility study here shows that on a NaCl/D(2) O phantom, (23) Na signals with 20 dB of gain can be readily obtained with a concomitant bandwidth of 144 kHz. This gain is high enough that the integrated coil with parametric amplifier, which is coupled inductively to external loops, can provide sensitivity approaching that of direct wire connection. Copyright © 2012 Wiley Periodicals, Inc.

  16. Water loop for training

    International Nuclear Information System (INIS)

    Moeller, S.V.

    1983-02-01

    The procedures used to operate the water loop of the Institute of Nuclear Enginering (IEN) in Brazil are presented. The aim is to help future operators of the training water loop in the operation technique and in a better comprehension of the phenomena occured during the execution of an experience. (E.G.) [pt

  17. Wireless communications resource management

    CERN Document Server

    Lee, B; Seo, H

    2009-01-01

    Wireless technologies continue to evolve to address the insatiable demand for faster response times, larger bandwidth, and reliable transmission. Yet as the industry moves toward the development of post 3G systems, engineers have consumed all the affordable physical layer technologies discovered to date. This has necessitated more intelligent and optimized utilization of available wireless resources. Wireless Communications Resource Managem ent, Lee, Park, and Seo cover all aspects of this critical topic, from the preliminary concepts and mathematical tools to detailed descriptions of all the resource management techniques. Readers will be able to more effectively leverage limited spectrum and maximize device battery power, as well as address channel loss, shadowing, and multipath fading phenomena.

  18. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  19. Distributed topology control algorithm for multihop wireless netoworks

    Science.gov (United States)

    Borbash, S. A.; Jennings, E. H.

    2002-01-01

    We present a network initialization algorithmfor wireless networks with distributed intelligence. Each node (agent) has only local, incomplete knowledge and it must make local decisions to meet a predefined global objective. Our objective is to use power control to establish a topology based onthe relative neighborhood graph which has good overall performance in terms of power usage, low interference, and reliability.

  20. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  1. Wireless sensor platform

    Science.gov (United States)

    Joshi, Pooran C.; Killough, Stephen M.; Kuruganti, Phani Teja

    2017-08-08

    A wireless sensor platform and methods of manufacture are provided. The platform involves providing a plurality of wireless sensors, where each of the sensors is fabricated on flexible substrates using printing techniques and low temperature curing. Each of the sensors can include planar sensor elements and planar antennas defined using the printing and curing. Further, each of the sensors can include a communications system configured to encode the data from the sensors into a spread spectrum code sequence that is transmitted to a central computer(s) for use in monitoring an area associated with the sensors.

  2. Wireless Testbed Bonsai

    Science.gov (United States)

    2006-02-01

    wireless sensor device network, and a about 200 Stargate nodes higher-tier multi-hop peer- to-peer 802.11b wireless network. Leading up to the full ExScal...deployment, we conducted spatial scaling tests on our higher-tier protocols on a 7 × 7 grid of Stargates nodes 45m and with 90m separations respectively...onW and its scaled version W̃ . III. EXPERIMENTAL SETUP Description of Kansei testbed. A stargate is a single board linux-based computer [7]. It uses a

  3. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  4. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  5. Wireless optical telecommunications

    CERN Document Server

    Bouchet, Olivier

    2013-01-01

    Wireless optical communication refers to communication based on the unguided propagation of optical waves. The past 30 years have seen significant improvements in this technique - a wireless communication solution for the current millennium - that offers an alternative to radio systems; a technique that could gain attractiveness due to recent concerns regarding the potential effects of radiofrequency waves on human health.The aim of this book is to look at the free space optics that are already used for the exchange of current information; its many benefits, such as incorporating chan

  6. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  7. Multichannel wireless ECoG array ASIC devices.

    Science.gov (United States)

    DeMichele, Glenn A; Cogan, Stuart F; Troyk, Philip R; Chen, Hongnan; Hu, Zhe

    2014-01-01

    Surgical resection of epileptogenic foci is often a beneficial treatment for patients suffering debilitating seizures arising from intractable epilepsy [1], [2], [3]. Electrodes placed subdurally on the surface of the brain in the form of an ECoG array is one of the multiple methods for localizing epileptogenic zones for the purpose of defining the region for surgical resection. Currently, transcutaneous wires from ECoG grids limit the duration of time that implanted grids can be used for diagnosis. A wireless ECoG recording and stimulation system may be a solution to extend the diagnostic period. To avoid the transcutaneous connections, a 64-channel wireless silicon recording/stimulating ASIC was developed as the electronic component of a wireless ECoG array that uses SIROF electrodes on a polyimide substrate[4]. Here we describe two new ASIC devices that have been developed and tested as part of the on-going wireless ECoG system design.

  8. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  9. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  10. Wireless powering of e -swimmers

    Science.gov (United States)

    Roche, Jérome; Carrara, Serena; Sanchez, Julien; Lannelongue, Jérémy; Loget, Gabriel; Bouffier, Laurent; Fischer, Peer; Kuhn, Alexander

    2014-10-01

    Miniaturized structures that can move in a controlled way in solution and integrate various functionalities are attracting considerable attention due to the potential applications in fields ranging from autonomous micromotors to roving sensors. Here we introduce a concept which allows, depending on their specific design, the controlled directional motion of objects in water, combined with electronic functionalities such as the emission of light, sensing, signal conversion, treatment and transmission. The approach is based on electric field-induced polarization, which triggers different chemical reactions at the surface of the object and thereby its propulsion. This results in a localized electric current that can power in a wireless way electronic devices in water, leading to a new class of electronic swimmers (e-swimmers).

  11. 78 FR 73144 - Acceleration of Broadband Deployment by Improving Wireless Facilities Siting Policies

    Science.gov (United States)

    2013-12-05

    ... license is required, which in turn extends to any apparatus for the transmission of energy, or... No. 11-59; FCC 13-122] Acceleration of Broadband Deployment by Improving Wireless Facilities Siting... of new wireless facilities and on rules to implement statutory provisions governing State and local...

  12. The Role of Wireless Computing Technology in the Design of Schools.

    Science.gov (United States)

    Nair, Prakash

    2003-01-01

    After briefly describing the educational advantages of wireless networks using mobile computers, discusses the technical, operational, financial aspects of wireless local area networks (WLAN). Provides examples of school facilities designed for the use of WLAN. Includes a glossary of WLAN-related terms. (Contains 12 references.)

  13. 76 FR 11781 - Wireless Telecommunications Bureau Seeks Comment on Petition for Declaratory Ruling Asking To...

    Science.gov (United States)

    2011-03-03

    ...In this document, the Wireless Telecommunications Bureau seeks comment on a December 3, 2010 petition for declaratory ruling (Petition) filed by CTIA-The Wireless Association (Petitioners). The Petitioners ask the Federal Communications Commission (Commission) to clarify ``the scope of Section 332(c)(3)(A)'s ban on state and local entry regulation.''

  14. [Study on a wireless energy transmission system for the noninvasive examination micro system inside alimentary tracts].

    Science.gov (United States)

    He, Xiu; Yan, Guo-Zheng; Wang, Fu-Min

    2008-01-01

    A wireless energy transmission system for the MEMS system inside alimentary tracts is reported here in the paper. It consists of an automatic frequency tracking circuit of phase lock loop and phase shift PWM control circuit. Experimental results show that the energy transmission system is capable of automatic frequency-tracking and transmission power-adjusting and has stable received energy.

  15. Large lithium loop experience

    International Nuclear Information System (INIS)

    Kolowith, R.; Owen, T.J.; Berg, J.D.; Atwood, J.M.

    1981-10-01

    An engineering design and operating experience of a large, isothermal, lithium-coolant test loop are presented. This liquid metal coolant loop is called the Experimental Lithium System (ELS) and has operated safely and reliably for over 6500 hours through September 1981. The loop is used for full-scale testing of components for the Fusion Materials Irradiation Test (FMIT) Facility. Main system parameters include coolant temperatures to 430 0 C and flow to 0.038 m 3 /s (600 gal/min). Performance of the main pump, vacuum system, and control system is discussed. Unique test capabilities of the ELS are also discussed

  16. Miniaturized wireless sensor network

    OpenAIRE

    Lecointre , Aubin; Dragomirescu , Daniela; Dubuc , David; Grenier , Katia; Pons , Patrick; Aubert , Hervé; Müller , A.; Berthou , Pascal; Gayraud , Thierry; Plana , Robert

    2006-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  17. Investigating Wireless Power Transfer

    Science.gov (United States)

    St. John, Stuart A.

    2017-01-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a…

  18. Future of wireless communication

    Energy Technology Data Exchange (ETDEWEB)

    Barker, M

    1996-12-31

    This document reproduces slides from a conference presentation giving an overview of current and upcoming wireless communication methods of interest to Canadian electric utilities. Both voice and data communication methods are considered, including cellular telephone, satellite communications, personal communication services, regulated licensed arrowband data systems, and integrated services.

  19. Wired vs. Wireless.

    Science.gov (United States)

    Fielding, Randall

    2000-01-01

    Presents a debate on which technology will be in tomorrow's classrooms and the pros and cons of wiring classrooms and using a wireless network. Concluding comments address the likelihood, and desirability, of placing computers throughout the entire educational process and what types of computers and capabilities are needed. (GR)

  20. Wireless Remote Control System

    Directory of Open Access Journals (Sweden)

    Adrian Tigauan

    2012-06-01

    Full Text Available This paper presents the design of a wireless remote control system based on the ZigBee communication protocol. Gathering data from sensors or performing control tasks through wireless communication is advantageous in situations in which the use of cables is impractical. An Atmega328 microcontroller (from slave device is used for gathering data from the sensors and transmitting it to a coordinator device with the help of the XBee modules. The ZigBee standard is suitable for low-cost, low-data-rate and low-power wireless networks implementations. The XBee-PRO module, designed to meet ZigBee standards, requires minimal power for reliable data exchange between devices over a distance of up to 1600m outdoors. A key component of the ZigBee protocol is the ability to support networking and this can be used in a wireless remote control system. This system may be employed e.g. to control temperature and humidity (SHT11 sensor and light intensity (TSL230 sensor levels inside a commercial greenhouse.

  1. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  2. Building the Wireless Campus

    Science.gov (United States)

    Gerraughty, James F.; Shanafelt, Michael E.

    2005-01-01

    This prototype is a continuation of a series of wireless prototypes which began in August 2001 and was reported on again in August 2002. This is the final year of this prototype. This continuation allowed Saint Francis University's Center of Excellence for Remote and Medically Under-Served Areas (CERMUSA) to refine the existing WLAN for the Saint…

  3. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  4. Natively unstructured loops differ from other loops.

    Directory of Open Access Journals (Sweden)

    Avner Schlessinger

    2007-07-01

    Full Text Available Natively unstructured or disordered protein regions may increase the functional complexity of an organism; they are particularly abundant in eukaryotes and often evade structure determination. Many computational methods predict unstructured regions by training on outliers in otherwise well-ordered structures. Here, we introduce an approach that uses a neural network in a very different and novel way. We hypothesize that very long contiguous segments with nonregular secondary structure (NORS regions differ significantly from regular, well-structured loops, and that a method detecting such features could predict natively unstructured regions. Training our new method, NORSnet, on predicted information rather than on experimental data yielded three major advantages: it removed the overlap between testing and training, it systematically covered entire proteomes, and it explicitly focused on one particular aspect of unstructured regions with a simple structural interpretation, namely that they are loops. Our hypothesis was correct: well-structured and unstructured loops differ so substantially that NORSnet succeeded in their distinction. Benchmarks on previously used and new experimental data of unstructured regions revealed that NORSnet performed very well. Although it was not the best single prediction method, NORSnet was sufficiently accurate to flag unstructured regions in proteins that were previously not annotated. In one application, NORSnet revealed previously undetected unstructured regions in putative targets for structural genomics and may thereby contribute to increasing structural coverage of large eukaryotic families. NORSnet found unstructured regions more often in domain boundaries than expected at random. In another application, we estimated that 50%-70% of all worm proteins observed to have more than seven protein-protein interaction partners have unstructured regions. The comparative analysis between NORSnet and DISOPRED2 suggested

  5. Introduction to Loop Heat Pipes

    Science.gov (United States)

    Ku, Jentung

    2015-01-01

    This is the presentation file for the short course Introduction to Loop Heat Pipes, to be conducted at the 2015 Thermal Fluids and Analysis Workshop, August 3-7, 2015, Silver Spring, Maryland. This course will discuss operating principles and performance characteristics of a loop heat pipe. Topics include: 1) pressure profiles in the loop; 2) loop operating temperature; 3) operating temperature control; 4) loop startup; 4) loop shutdown; 5) loop transient behaviors; 6) sizing of loop components and determination of fluid inventory; 7) analytical modeling; 8) examples of flight applications; and 9) recent LHP developments.

  6. NASA Bluetooth Wireless Communications

    Science.gov (United States)

    Miller, Robert D.

    2007-01-01

    NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.

  7. Looped energy harvester for human motion

    Science.gov (United States)

    Geisler, M.; Boisseau, S.; Gasnier, P.; Willemin, J.; Gobbo, C.; Despesse, G.; Ait-Ali, I.; Perraud, S.

    2017-10-01

    The development of energy harvesters for smart wearables is a challenging topic, with a difficult combination of ergonomics constraints, lifetime and electrical requirements. In this work, we focus on an inertial inductive structure, composed of a magnetic ball circulating inside a closed-loop guide and converting the kinetic energy of the user’s limbs into electricity during the run. A specific induction issue related to the free self-rotation of the ball is underlined and addressed using a ferromagnetic ‘rail’ component. From a 2 g moving ball, a 5 cm-diameter 21 cm3 prototype generated up to 4.8 mW of average power when worn by someone running at 8 km h-1. This device is demonstrated to charge a 2.4 V NiMH battery and supply an acceleration and temperature Wireless Sensor Node at 20 Hz.

  8. Diffusion of Wilson loops

    International Nuclear Information System (INIS)

    Brzoska, A.M.; Lenz, F.; Thies, M.; Negele, J.W.

    2005-01-01

    A phenomenological analysis of the distribution of Wilson loops in SU(2) Yang-Mills theory is presented in which Wilson loop distributions are described as the result of a diffusion process on the group manifold. It is shown that, in the absence of forces, diffusion implies Casimir scaling and, conversely, exact Casimir scaling implies free diffusion. Screening processes occur if diffusion takes place in a potential. The crucial distinction between screening of fundamental and adjoint loops is formulated as a symmetry property related to the center symmetry of the underlying gauge theory. The results are expressed in terms of an effective Wilson loop action and compared with various limits of SU(2) Yang-Mills theory

  9. Blind loop syndrome

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/001146.htm Blind loop syndrome To use the sharing features on ... Clinical Professor of Medicine, The George Washington University School of Medicine, Washington, DC. Also reviewed by David ...

  10. Mashup the OODA Loop

    National Research Council Canada - National Science Library

    Heier, Jeffrey E

    2008-01-01

    ...) processes via the Observe, Orient, Decide, and Act (OODA) Loop concept. As defined by Wikipedia, a mashup is a Website or application that combines the content from more than one source into an integrated presentation...

  11. Scalable and Hybrid Radio Resource Management for Future Wireless Networks

    DEFF Research Database (Denmark)

    Mino, E.; Luo, Jijun; Tragos, E.

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios, from local area to wide area wireless networks. The integration in a unique radio system of a cellular and local area type networks supposes...... a great advantage for the final user and for the operator, compared with the current situation, with disconnected systems, usually with different subscriptions, radio interfaces and terminals. To be a ubiquitous wireless system, the IST project WINNER II has defined three system modes. This contribution...

  12. Reactor loops at Chalk River

    International Nuclear Information System (INIS)

    Sochaski, R.O.

    1962-07-01

    This report describes broadly the nine in-reactor loops, and their components, located in and around the NRX and NRU reactors at Chalk River. First an introduction and general description is given of the loops and their function, supplemented with a table outlining some loop specifications and nine simplified flow sheets, one for each individual loop. The report then proceeds to classify each loop into two categories, the 'main loop circuit' and the 'auxiliary circuit', and descriptions are given of each circuit's components in turn. These components, in part, are comprised of the main loop pumps, the test section, loop heaters, loop coolers, delayed-neutron monitors, surge tank, Dowtherm coolers, loop piping. Here again photographs, drawings and tables are included to provide a clearer understanding of the descriptive literature and to include, in tables, some specifications of the more important components in each loop. (author)

  13. Dechanneling by dislocation loops

    International Nuclear Information System (INIS)

    Chalant, Gerard.

    1976-09-01

    Ion implantation always induces the creation of dislocation loops. When the damage profile is determined by a backscattering technique, the dechanneling by these loops is implicitely at the origin of these measurements. The dechanneling of alpha particles by dislocation loops produced by the coalescence of quenched-in vacancies in aluminium is studied. The dechanneling and the concentration of loops were determined simultaneously. The dechanneling width around dislocation was found equal to lambda=6A, both for perfect and imperfect loops having a mean diameter d=250A. In the latter case, a dechanneling probability chi=0.34 was determined for the stacking fault, in good agreement with previous determination in gold. A general formula is proposed which takes into account the variation of lambda with the curvature (or the diameter d) of the loops. Finally, by a series of isothermal anneals, the self-diffusion energy ΔH of aluminium was measured. The value obtained ΔH=1.32+-0.10eV is in good agreement with the values obtained by other methods [fr

  14. Wireless interrogation of passive antenna sensors

    International Nuclear Information System (INIS)

    Deshmukh, S; Huang, H

    2010-01-01

    Recently, we discovered that the resonant frequency of a microstrip patch antenna is sensitive to mechanical strains or crack presence in the ground plane. Based on this principle, antenna sensors have been demonstrated to measure strain and detect crack in metallic structures. This paper presents a wireless method to remotely interrogate a dual-frequency antenna sensor. An interrogation horn antenna was used to irradiate the antenna sensor with a linear chirp microwave signal. By implementing a light-activated switch at the sensor node and performing signal processing of the backscattered signals, the resonant frequencies of the antenna sensor along both polarizations can be measured remotely. Since the antenna sensor does not need a local power source and can be interrogated wirelessly, electric wiring can be eliminated. The sensor implementation, the signal processing and the experimental setup that validate the remote interrogation of the antenna sensor are presented. A power budget model has also been established to estimate the maximum interrogation range

  15. Wireless Communications Device Wakeup Method and System

    NARCIS (Netherlands)

    Drago, S.; Sebastiano, F.; Leenaerts, D.M.W.; Breems, L.J.

    2008-01-01

    Abstract of WO 2009044368 Disclosed are wakeable wireless communications devices, and methods for waking wireless communications devices, for use in a wireless network of such devices. The devices communicate during respectively-designated timeslots according to a communications protocol. The

  16. Design of a Closed-Loop, Bidirectional Brain Machine Interface System With Energy Efficient Neural Feature Extraction and PID Control.

    Science.gov (United States)

    Liu, Xilin; Zhang, Milin; Richardson, Andrew G; Lucas, Timothy H; Van der Spiegel, Jan

    2017-08-01

    This paper presents a bidirectional brain machine interface (BMI) microsystem designed for closed-loop neuroscience research, especially experiments in freely behaving animals. The system-on-chip (SoC) consists of 16-channel neural recording front-ends, neural feature extraction units, 16-channel programmable neural stimulator back-ends, in-channel programmable closed-loop controllers, global analog-digital converters (ADC), and peripheral circuits. The proposed neural feature extraction units includes 1) an ultra low-power neural energy extraction unit enabling a 64-step natural logarithmic domain frequency tuning, and 2) a current-mode action potential (AP) detection unit with time-amplitude window discriminator. A programmable proportional-integral-derivative (PID) controller has been integrated in each channel enabling a various of closed-loop operations. The implemented ADCs include a 10-bit voltage-mode successive approximation register (SAR) ADC for the digitization of the neural feature outputs and/or local field potential (LFP) outputs, and an 8-bit current-mode SAR ADC for the digitization of the action potential outputs. The multi-mode stimulator can be programmed to perform monopolar or bipolar, symmetrical or asymmetrical charge balanced stimulation with a maximum current of 4 mA in an arbitrary channel configuration. The chip has been fabricated in 0.18 μ m CMOS technology, occupying a silicon area of 3.7 mm 2 . The chip dissipates 56 μW/ch on average. General purpose low-power microcontroller with Bluetooth module are integrated in the system to provide wireless link and SoC configuration. Methods, circuit techniques and system topology proposed in this work can be used in a wide range of relevant neurophysiology research, especially closed-loop BMI experiments.

  17. Wireless Sensor Network for Indoor Air Quality Monitoring

    Directory of Open Access Journals (Sweden)

    Jun Li

    2014-06-01

    Full Text Available Indoor air quality monitoring system consists of wireless sensor device, nRF24L01 wireless transceiver modules, C8051MCU, STM32103 remote monitoring platform, alarm device and data server. Distributed in the interior space of wireless sensors measure parameters of the local air quality, wireless transceiver module of the MCU to transmit data to the remote monitoring platform for analysis which displayed and stored field environment data or charts. The data collecting from wireless sensors to be send by wireless Access Point to the remote data server based on B/S architecture, intelligent terminals such as mobile phone, laptop, tablet PC on the Internet monitor indoor air quality in real-time. When site environment air quality index data exceeds the threshold in the monitoring device, the remote monitoring platform sends out the alarm SMS signal to inform user by GSM module. Indoor air quality monitoring system uses modular design method, has the portability and scalability has the low manufacture cost, real-time monitoring data and man-machine interaction.

  18. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  19. A Wireless Physiological Signal Monitoring System with Integrated Bluetooth and WiFi Technologies.

    Science.gov (United States)

    Yu, Sung-Nien; Cheng, Jen-Chieh

    2005-01-01

    This paper proposes a wireless patient monitoring system which integrates Bluetooth and WiFi wireless technologies. A wireless portable multi-parameter device was designated to acquire physiological signals and transmit them to a local server via Bluetooth wireless technology. Four kinds of monitor units were designed to communicate via the WiFi wireless technology, including a local monitor unit, a control center, mobile devices (personal digital assistant; PDA), and a web page. The use of various monitor units is intending to meet different medical requirements for different medical personnel. This system was demonstrated to promote the mobility and flexibility for both the patients and the medical personnel, which further improves the quality of health care.

  20. The benefits of soft sensor and multi-rate control for the implementation of Wireless Networked Control Systems.

    Science.gov (United States)

    Mansano, Raul K; Godoy, Eduardo P; Porto, Arthur J V

    2014-12-18

    Recent advances in wireless networking technology and the proliferation of industrial wireless sensors have led to an increasing interest in using wireless networks for closed loop control. The main advantages of Wireless Networked Control Systems (WNCSs) are the reconfigurability, easy commissioning and the possibility of installation in places where cabling is impossible. Despite these advantages, there are two main problems which must be considered for practical implementations of WNCSs. One problem is the sampling period constraint of industrial wireless sensors. This problem is related to the energy cost of the wireless transmission, since the power supply is limited, which precludes the use of these sensors in several closed-loop controls. The other technological concern in WNCS is the energy efficiency of the devices. As the sensors are powered by batteries, the lowest possible consumption is required to extend battery lifetime. As a result, there is a compromise between the sensor sampling period, the sensor battery lifetime and the required control performance for the WNCS. This paper develops a model-based soft sensor to overcome these problems and enable practical implementations of WNCSs. The goal of the soft sensor is generating virtual data allowing an actuation on the process faster than the maximum sampling period available for the wireless sensor. Experimental results have shown the soft sensor is a solution to the sampling period constraint problem of wireless sensors in control applications, enabling the application of industrial wireless sensors in WNCSs. Additionally, our results demonstrated the soft sensor potential for implementing energy efficient WNCS through the battery saving of industrial wireless sensors.

  1. The Benefits of Soft Sensor and Multi-Rate Control for the Implementation of Wireless Networked Control Systems

    Directory of Open Access Journals (Sweden)

    Raul K. Mansano

    2014-12-01

    Full Text Available Recent advances in wireless networking technology and the proliferation of industrial wireless sensors have led to an increasing interest in using wireless networks for closed loop control. The main advantages of Wireless Networked Control Systems (WNCSs are the reconfigurability, easy commissioning and the possibility of installation in places where cabling is impossible. Despite these advantages, there are two main problems which must be considered for practical implementations of WNCSs. One problem is the sampling period constraint of industrial wireless sensors. This problem is related to the energy cost of the wireless transmission, since the power supply is limited, which precludes the use of these sensors in several closed-loop controls. The other technological concern in WNCS is the energy efficiency of the devices. As the sensors are powered by batteries, the lowest possible consumption is required to extend battery lifetime. As a result, there is a compromise between the sensor sampling period, the sensor battery lifetime and the required control performance for the WNCS. This paper develops a model-based soft sensor to overcome these problems and enable practical implementations of WNCSs. The goal of the soft sensor is generating virtual data allowing an actuation on the process faster than the maximum sampling period available for the wireless sensor. Experimental results have shown the soft sensor is a solution to the sampling period constraint problem of wireless sensors in control applications, enabling the application of industrial wireless sensors in WNCSs. Additionally, our results demonstrated the soft sensor potential for implementing energy efficient WNCS through the battery saving of industrial wireless sensors.

  2. Security For Wireless Sensor Network

    OpenAIRE

    Saurabh Singh,; Dr. Harsh Kumar Verma

    2011-01-01

    Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodescommunicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks aredeployed in hostile environments. Environmental conditions along with resource-constraints give...

  3. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  4. Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zahariadis Theodore

    2010-01-01

    Full Text Available Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN, which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks.

  5. An Assessment of Emerging Wireless Broadband Technologies

    National Research Council Canada - National Science Library

    Fountanas, Leonidas

    2001-01-01

    ... technologies in providing broadband services today, emerging wireless broadband technologies are expected to significantly increase their market share over the next years, Deploying a wireless network...

  6. Photonics in wireless transceivers

    International Nuclear Information System (INIS)

    Bogani, A.; Ghelfi, P.

    2013-01-01

    During the last few years, the cross-fertilization between photonics and radio systems has been helping to overcome some major limitations of the classical radio technologies, setting new paradigms, and promising improved performance and new applications with strong benefits for public communications and safety. In particular, photonics-based wireless systems, albeit still at research level, are moving toward a new generation of multifunctional systems able to manage the wireless communication with several different frequencies and protocols, even simultaneously while also realizing surveillance operations. Photonics matches the new requirements of flexibility for software-defined architectures, thanks to its ultra-wide bandwidths and ease of tunability, and guarantees low footprint and weight, thanks to integrated photonic technologies. Moreover, photonics also allows increased resolution and sensitivity by means of the inherent low phase noise of lasers. (author)

  7. Wireless infrared computer control

    Science.gov (United States)

    Chen, George C.; He, Xiaofei

    2004-04-01

    Wireless mouse is not restricted by cable"s length and has advantage over its wired counterpart. However, all the mice available in the market have detection range less than 2 meters and angular coverage less than 180 degrees. Furthermore, commercial infrared mice are based on track ball and rollers to detect movements. This restricts them to be used in those occasions where users want to have dynamic movement, such as presentations and meetings etc. This paper presents our newly developed infrared wireless mouse, which has a detection range of 6 meters and angular coverage of 180 degrees. This new mouse uses buttons instead of traditional track ball and is developed to be a hand-held device like remote controller. It enables users to control cursor with a distance closed to computer and the mouse to be free from computer operation.

  8. Adaptive Wireless Transceiver, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  9. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  10. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  11. Wearable wireless photoplethysmography sensors

    Science.gov (United States)

    Spigulis, Janis; Erts, Renars; Nikiforovs, Vladimirs; Kviesis-Kipge, Edgars

    2008-04-01

    Wearable health monitoring sensors may support early detection of abnormal conditions and prevention of their consequences. Recent designs of three wireless photoplethysmography monitoring devices embedded in hat, glove and sock, and connected to PC or mobile phone by means of the Bluetooth technology, are described. First results of distant monitoring of heart rate and pulse wave transit time using the newly developed devices are presented.

  12. Wireless Cellular Mobile Communications

    OpenAIRE

    Zalud, V.

    2002-01-01

    In this article is briefly reviewed the history of wireless cellular mobile communications, examined the progress in current second generation (2G) cellular standards and discussed their migration to the third generation (3G). The European 2G cellular standard GSM and its evolution phases GPRS and EDGE are described somewhat in detail. The third generation standard UMTS taking up on GSM/GPRS core network and equipped with a new advanced access network on the basis of code division multiple ac...

  13. Electron acceleration and radiation signatures in loop coronal transients

    Science.gov (United States)

    Vlahos, L.; Gergely, T. E.; Papadopoulos, K.

    1982-01-01

    It is proposed that in loop coronal transients an erupting loop moves away from the solar surface, with a velocity exceeding the local Alfven speed, pushing against the overlying magnetic fields and driving a shock in the front of the moving part of the loop. Lower hybrid waves are excited at the shock front and propagate radially toward the center of the loop with phase velocity along the magnetic field that exceeds the thermal velocity. The lower hybrid waves stochastically accelerate the tail of the electron distribution inside the loop. The manner in which the accelerated electrons are trapped in the moving loop are discussed, and their radiation signature is estimated. It is suggested that plasma radiation can explain the power observed in stationary and moving type IV bursts.

  14. Dynamic impedance compensation for wireless power transfer using conjugate power

    Science.gov (United States)

    Liu, Suqi; Tan, Jianping; Wen, Xue

    2018-02-01

    Wireless power transfer (WPT) via coupled magnetic resonances has been in development for over a decade. However, the frequency splitting phenomenon occurs in the over-coupled region. Thus, the output power of the two-coil system achieves the maximum output power at the two splitting angular frequencies, and not at the natural resonant angular frequency. According to the maximum power transfer theorem, the impedance compensation method was adopted in many WPT projects. However, it remains a challenge to achieve the maximum output power and transmission efficiency in a fixed-frequency mode. In this study, dynamic impedance compensation for WPT was presented by utilizing the compensator within a virtual three-coil WPT system. First, the circuit model was established and transfer characteristics of a system were studied by utilizing circuit theories. Second, the power superposition of the WPT system was carefully researched. When a pair of compensating coils was inserted into the transmitter loop, the conjugate power of the compensator loop was created via magnetic coupling of the two compensating coils that insert into the transmitter loop. The mechanism for dynamic impedance compensation for wireless power transfer was then provided by investigating a virtual three-coil WPT system. Finally, the experimental circuit of a virtual three-coil WPT system was designed, and experimental results are consistent with the theoretical analysis, which achieves the maximum output power and transmission efficiency.

  15. Dynamic impedance compensation for wireless power transfer using conjugate power

    Directory of Open Access Journals (Sweden)

    Suqi Liu

    2018-02-01

    Full Text Available Wireless power transfer (WPT via coupled magnetic resonances has been in development for over a decade. However, the frequency splitting phenomenon occurs in the over-coupled region. Thus, the output power of the two-coil system achieves the maximum output power at the two splitting angular frequencies, and not at the natural resonant angular frequency. According to the maximum power transfer theorem, the impedance compensation method was adopted in many WPT projects. However, it remains a challenge to achieve the maximum output power and transmission efficiency in a fixed-frequency mode. In this study, dynamic impedance compensation for WPT was presented by utilizing the compensator within a virtual three-coil WPT system. First, the circuit model was established and transfer characteristics of a system were studied by utilizing circuit theories. Second, the power superposition of the WPT system was carefully researched. When a pair of compensating coils was inserted into the transmitter loop, the conjugate power of the compensator loop was created via magnetic coupling of the two compensating coils that insert into the transmitter loop. The mechanism for dynamic impedance compensation for wireless power transfer was then provided by investigating a virtual three-coil WPT system. Finally, the experimental circuit of a virtual three-coil WPT system was designed, and experimental results are consistent with the theoretical analysis, which achieves the maximum output power and transmission efficiency.

  16. Conformal boundary loop models

    International Nuclear Information System (INIS)

    Jacobsen, Jesper Lykke; Saleur, Hubert

    2008-01-01

    We study a model of densely packed self-avoiding loops on the annulus, related to the Temperley-Lieb algebra with an extra idempotent boundary generator. Four different weights are given to the loops, depending on their homotopy class and whether they touch the outer rim of the annulus. When the weight of a contractible bulk loop x≡q+q -1 element of (-2,2], this model is conformally invariant for any real weight of the remaining three parameters. We classify the conformal boundary conditions and give exact expressions for the corresponding boundary scaling dimensions. The amplitudes with which the sectors with any prescribed number and types of non-contractible loops appear in the full partition function Z are computed rigorously. Based on this, we write a number of identities involving Z which hold true for any finite size. When the weight of a contractible boundary loop y takes certain discrete values, y r ≡([r+1] q )/([r] q ) with r integer, other identities involving the standard characters K r,s of the Virasoro algebra are established. The connection with Dirichlet and Neumann boundary conditions in the O(n) model is discussed in detail, and new scaling dimensions are derived. When q is a root of unity and y=y r , exact connections with the A m type RSOS model are made. These involve precise relations between the spectra of the loop and RSOS model transfer matrices, valid in finite size. Finally, the results where y=y r are related to the theory of Temperley-Lieb cabling

  17. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  18. Microwave emission from flaring magnetic loops

    International Nuclear Information System (INIS)

    Vlahos, L.

    1980-01-01

    The microwave emission from a flaring loop is considered. In particular the author examines the question: What will be the characteristics of the radio emission at centimeter wavelengths from a small compact flaring loop when the mechanism which pumps magnetic energy into the plasma in the form of heating and/or electron acceleration satisfies the conditions: (a) the magnetic energy is released in a small volume compared to the volume of the loop, and the rate at which magnetic energy is transformed into plasma energy is faster than the energy losses from the same volume. This causes a local enhancement of the temperature by as much as one or two orders of magnitude above the coronal temperature; (b) The bulk of the energy released goes into heating the plasma and heats primarily the electrons. (Auth.)

  19. Finding Waves: Techniques for a Successful Wireless Site Survey

    Science.gov (United States)

    Shanafelt, Michael

    2004-01-01

    Wireless Local Area Networks are the most widely adopted networking technology to hit the market in the last three years. They have the potential to make network applications and the Internet available anywhere on a campus so that students and faculty are no longer tethered to their offices or shared computer laboratories in order to connect to a…

  20. Capacity allocation in wireless communication networks - models and analyses

    NARCIS (Netherlands)

    Litjens, Remco

    2003-01-01

    This monograph has concentrated on capacity allocation in cellular and Wireless Local Area Networks, primarily with a network operator’s perspective. In the introduc- tory chapter, a reference model has been proposed for the extensive suite of capacity allocation mechanisms that can be applied at

  1. Wireless Sensor Network Handles Image Data

    Science.gov (United States)

    2008-01-01

    To relay data from remote locations for NASA s Earth sciences research, Goddard Space Flight Center contributed to the development of "microservers" (wireless sensor network nodes), which are now used commercially as a quick and affordable means to capture and distribute geographical information, including rich sets of aerial and street-level imagery. NASA began this work out of a necessity for real-time recovery of remote sensor data. These microservers work much like a wireless office network, relaying information between devices. The key difference, however, is that instead of linking workstations within one office, the interconnected microservers operate miles away from one another. This attribute traces back to the technology s original use: The microservers were originally designed for seismology on remote glaciers and ice streams in Alaska, Greenland, and Antarctica-acquiring, storing, and relaying data wirelessly between ground sensors. The microservers boast three key attributes. First, a researcher in the field can establish a "managed network" of microservers and rapidly see the data streams (recovered wirelessly) on a field computer. This rapid feedback permits the researcher to reconfigure the network for different purposes over the course of a field campaign. Second, through careful power management, the microservers can dwell unsupervised in the field for up to 2 years, collecting tremendous amounts of data at a research location. The third attribute is the exciting potential to deploy a microserver network that works in synchrony with robotic explorers (e.g., providing ground truth validation for satellites, supporting rovers as they traverse the local environment). Managed networks of remote microservers that relay data unsupervised for up to 2 years can drastically reduce the costs of field instrumentation and data rec

  2. Green Wireless Power Transfer Networks

    NARCIS (Netherlands)

    Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.

    2016-01-01

    wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.

  3. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  4. Next Generation Intelligent Wireless Infrastructure

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg

    2010-01-01

    Given the commercial success of wireless technologies that has already taken place over the last couple of decades, with a global mobile communication penetration beyond 3 billion subscribers as well as the enormous success of wireless data communication through IEEE 802.11x and Bluetooth, people...

  5. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  6. Loop quantum gravity

    International Nuclear Information System (INIS)

    Pullin, J.

    2015-01-01

    Loop quantum gravity is one of the approaches that are being studied to apply the rules of quantum mechanics to the gravitational field described by the theory of General Relativity . We present an introductory summary of the main ideas and recent results. (Author)

  7. Blind Loop Syndrome

    Science.gov (United States)

    ... or scleroderma involving the small intestine History of radiation therapy to the abdomen Diabetes Diverticulosis of the small intestine Complications A blind loop can cause escalating problems, including: Poor absorption of fats. Bacteria in your small intestine break down the bile ...

  8. Improving Loop Dependence Analysis

    DEFF Research Database (Denmark)

    Jensen, Nicklas Bo; Karlsson, Sven

    2017-01-01

    Programmers can no longer depend on new processors to have significantly improved single-thread performance. Instead, gains have to come from other sources such as the compiler and its optimization passes. Advanced passes make use of information on the dependencies related to loops. We improve th...

  9. Cytokine loops driving senescence

    Czech Academy of Sciences Publication Activity Database

    Bartek, Jiří; Hodný, Zdeněk; Lukáš, Jan

    2008-01-01

    Roč. 10, č. 8 (2008), s. 887-889 ISSN 1465-7392 Institutional research plan: CEZ:AV0Z50520514 Keywords : cellular senescence * cytokines * autocrine feedback loop Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 17.774, year: 2008

  10. Loop Quantum Gravity

    Directory of Open Access Journals (Sweden)

    Rovelli Carlo

    1998-01-01

    Full Text Available The problem of finding the quantum theory of the gravitational field, and thus understanding what is quantum spacetime, is still open. One of the most active of the current approaches is loop quantum gravity. Loop quantum gravity is a mathematically well-defined, non-perturbative and background independent quantization of general relativity, with its conventional matter couplings. Research in loop quantum gravity today forms a vast area, ranging from mathematical foundations to physical applications. Among the most significant results obtained are: (i The computation of the physical spectra of geometrical quantities such as area and volume, which yields quantitative predictions on Planck-scale physics. (ii A derivation of the Bekenstein-Hawking black hole entropy formula. (iii An intriguing physical picture of the microstructure of quantum physical space, characterized by a polymer-like Planck scale discreteness. This discreteness emerges naturally from the quantum theory and provides a mathematically well-defined realization of Wheeler's intuition of a spacetime ``foam''. Long standing open problems within the approach (lack of a scalar product, over-completeness of the loop basis, implementation of reality conditions have been fully solved. The weak part of the approach is the treatment of the dynamics: at present there exist several proposals, which are intensely debated. Here, I provide a general overview of ideas, techniques, results and open problems of this candidate theory of quantum gravity, and a guide to the relevant literature.

  11. Operation of the hot test loop facilities

    International Nuclear Information System (INIS)

    Cheong, Moon Ki; Park, Choon Kyeong; Won, Soon Yeon; Yang, Sun Kyu; Cheong, Jang Whan; Cheon, Se Young; Song, Chul Hwa; Jeon, Hyeong Kil; Chang, Suk Kyu; Jeong, Heung Jun; Cho, Young Ro; Kim, Bok Duk; Min, Kyeong Ho

    1994-12-01

    The objective of this project is to obtain the available experimental data and to develop the measuring techniques through taking full advantage of the facilities. The facilities operated by the thermal hydraulics department have been maintained and repaired in order to carry out the thermal hydraulics tests necessary for providing the available data. The performance tests for double grid type bottom end piece which was improved on the debris filtering effectivity were performed using the PWR-Hot Test Loop. The CANDU-Hot Test Loop was operated to carry out the pressure drop tests and strength tests of fuel. The Cold Test Loop was used to obtain the local velocity data in subchannel within fuel bundle and to understand the characteristic of pressure drop required for improving the nuclear fuel and to develop the advanced measuring techniques. RCS Loop, which is used to measure the CHF, is presently under design and construction. B and C Loop is designed and constructed to assess the automatic depressurization safety system behavior. 4 tabs., 79 figs., 7 refs. (Author) .new

  12. Wireless Technology in K-12 Education

    Science.gov (United States)

    Walery, Darrell

    2004-01-01

    Many schools begin implementing wireless technology slowly by creating wireless "hotspots" on the fly. This is accomplished by putting a wireless access point on a cart along with a set of wireless laptop computers. A teacher can then wheel the cart anywhere in the school that has a network drop, plug the access point in and have an…

  13. Resource aware sensor nodes in wireless sensor networks

    International Nuclear Information System (INIS)

    Merrett, G V; Al-Hashimi, B M; White, N M; Harris, N R

    2005-01-01

    Wireless sensor networks are continuing to receive considerable research interest due, in part, to the range of possible applications. One of the greatest challenges facing researchers is in overcoming the limited network lifetime inherent in the small locally powered sensor nodes. In this paper, we propose IDEALS, a system to manage a wireless sensor network using a combination of information management, energy harvesting and energy monitoring, which we label resource awareness. Through this, IDEALS is able to extend the network lifetime for important messages, by controlling the degradation of the network to maximise information throughput

  14. Designing reliable wireless sensor network for nuclear power plant

    International Nuclear Information System (INIS)

    Fujiwara, Takeshi; Takahashi, Hiroyuki

    2007-01-01

    This study proposes an innovative method for the monitoring the nuclear power plant. In this field, false detection of the trouble, both 'false negative' and 'false positive' will become a serious problem. In the other hand, since nuclear power plant is such a complicated system, wireless is required for implementing into real field. Considering these backgrounds, we propose a new reliable health monitoring system for nuclear power plant. This is based on an idea, 'a network on a network', such as 'wireless global network' on 'local network with self-maintenance function.' (author)

  15. NASA Fuel Tank Wireless Power and Signal Study

    Science.gov (United States)

    Merrill, Garrick

    2015-01-01

    Hydro Technologies has developed a custom electronics and mechanical framework for interfacing with off-the-shelf sensors to achieve through barrier sensing solutions. The core project technology relies on Hydro Technologies Wireless Power and Signal Interface (Wi psi) System for transmitting data and power wirelessly using magnetic fields. To accomplish this, Wi psi uses a multi-frequency local magnetic field to produce magnetic fields capable of carrying data and power through almost any material such as metals, seawater, concrete, and air. It will also work through layers of multiple materials.

  16. Passive wireless sensing tags NASA inflatable structures.

    Energy Technology Data Exchange (ETDEWEB)

    Brocato, Robert Wesley

    2006-03-01

    This report gives a description of several types of wireless, unpowered remote sensors. Surface acoustic wave (SAW) devices were coupled with conventional sensors to create entirely new types of sensors. These sensors report physically measurable data in the same manner as the conventional sensors, but they do it remotely and without any local power source. The sensors are measured remotely using a radar-like interrogation device, and the sensors and their related communication electronics draw all of the power needed for communicating from the radar pulse. The report covers only a description of prototype sensors and not of the manufacturing requirements of these devices.

  17. Wireless Distributed Antenna MIMO

    DEFF Research Database (Denmark)

    2015-01-01

    The present disclosure relates to system applications of multicore optical fibers. One embodiment relates to a base transceiver station for a wireless telecommunication system comprising a plurality of antenna units arranged in a MIMO configuration and adapted for transmission and/or reception...... of radio-frequency signals, an optical transmitter in the form of an electro-optic conversion unit for each of said plurality of antenna units, each electro-optic conversion unit adapted for converting an RF signal into an optical signal, a plurality of a single core optical fibers for guiding the optical...

  18. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  19. Investigating wireless power transfer

    Science.gov (United States)

    St John, Stuart A.

    2017-09-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.

  20. Deployable wireless Fresnel lens

    Science.gov (United States)

    Kennedy, Timothy F. (Inventor); Fink, Patrick W. (Inventor); Chu, Andrew W. (Inventor); Lin, Gregory Y. (Inventor)

    2013-01-01

    Apparatus and methods for enhancing the gain of a wireless signal are provided. In at least one specific embodiment, the apparatus can include a screen comprised of one or more electrically conductive regions for reflecting electromagnetic radiation and one or more non-conductive regions for permitting electromagnetic radiation therethrough. The one or more electrically conductive regions can be disposed adjacent to at least one of the one or more non-conductive regions. The apparatus can also include a support member disposed about at least a portion of the screen. The screen can be capable of collapsing by twisting the support member in opposite screw senses to form interleaved concentric sections.

  1. Wireless Headset Communication System

    Science.gov (United States)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  2. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  3. Wireless passive radiation sensor

    Science.gov (United States)

    Pfeifer, Kent B; Rumpf, Arthur N; Yelton, William G; Limmer, Steven J

    2013-12-03

    A novel measurement technique is employed using surface acoustic wave (SAW) devices, passive RF, and radiation-sensitive films to provide a wireless passive radiation sensor that requires no batteries, outside wiring, or regular maintenance. The sensor is small (<1 cm.sup.2), physically robust, and will operate unattended for decades. In addition, the sensor can be insensitive to measurement position and read distance due to a novel self-referencing technique eliminating the need to measure absolute responses that are dependent on RF transmitter location and power.

  4. Wireless installation standard

    International Nuclear Information System (INIS)

    Lim, Hwang Bin

    2007-12-01

    This is divided six parts which are radio regulation law on securing of radio resource, use of radio resource, protection of radio resource, radio regulation enforcement ordinance with securing, distribution and assignment of radio regulation, radio regulation enforcement regulation on utility of radio resource and technical qualification examination, a wireless installation regulation of technique standard and safety facility standard, radio regulation such as certification regulation of information communicative machines and regulation of radio station on compliance of signal security, radio equipment in radio station, standard frequency station and emergency communication.

  5. Wireless Cellular Mobile Communications

    Directory of Open Access Journals (Sweden)

    V. Zalud

    2002-12-01

    Full Text Available In this article is briefly reviewed the history of wireless cellularmobile communications, examined the progress in current secondgeneration (2G cellular standards and discussed their migration to thethird generation (3G. The European 2G cellular standard GSM and itsevolution phases GPRS and EDGE are described somewhat in detail. Thethird generation standard UMTS taking up on GSM/GPRS core network andequipped with a new advanced access network on the basis of codedivision multiple access (CDMA is investigated too. A sketch of theperspective of mobile communication beyond 3G concludes this article.

  6. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  7. Random walk loop soups and conformal loop ensembles

    NARCIS (Netherlands)

    van de Brug, T.; Camia, F.; Lis, M.

    2016-01-01

    The random walk loop soup is a Poissonian ensemble of lattice loops; it has been extensively studied because of its connections to the discrete Gaussian free field, but was originally introduced by Lawler and Trujillo Ferreras as a discrete version of the Brownian loop soup of Lawler and Werner, a

  8. Mobile Robot Positioning with 433-MHz Wireless Motes with Varying Transmission Powers and a Particle Filter.

    Science.gov (United States)

    Canedo-Rodriguez, Adrian; Rodriguez, Jose Manuel; Alvarez-Santos, Victor; Iglesias, Roberto; Regueiro, Carlos V

    2015-04-30

    In wireless positioning systems, the transmitter's power is usually fixed. In this paper, we explore the use of varying transmission powers to increase the performance of a wireless localization system. To this extent, we have designed a robot positioning system based on wireless motes. Our motes use an inexpensive, low-power sub-1-GHz system-on-chip (CC1110) working in the 433-MHz ISM band. Our localization algorithm is based on a particle filter and infers the robot position by: (1) comparing the power received with the expected one; and (2) integrating the robot displacement. We demonstrate that the use of transmitters that vary their transmission power over time improves the performance of the wireless positioning system significantly, with respect to a system that uses fixed power transmitters. This opens the door for applications where the robot can localize itself actively by requesting the transmitters to change their power in real time.

  9. Mobile Robot Positioning with 433-MHz Wireless Motes with Varying Transmission Powers and a Particle Filter

    Directory of Open Access Journals (Sweden)

    Adrian Canedo-Rodriguez

    2015-04-01

    Full Text Available In wireless positioning systems, the transmitter’s power is usually fixed. In this paper, we explore the use of varying transmission powers to increase the performance of a wireless localization system. To this extent, we have designed a robot positioning system based on wireless motes. Our motes use an inexpensive, low-power sub-1-GHz system-on-chip (CC1110 working in the 433-MHz ISM band. Our localization algorithm is based on a particle filter and infers the robot position by: (1 comparing the power received with the expected one; and (2 integrating the robot displacement. We demonstrate that the use of transmitters that vary their transmission power over time improves the performance of the wireless positioning system significantly, with respect to a system that uses fixed power transmitters. This opens the door for applications where the robot can localize itself actively by requesting the transmitters to change their power in real time.

  10. Resource management for multimedia services in high data rate wireless networks

    CERN Document Server

    Zhang, Ruonan; Pan, Jianping

    2017-01-01

    This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

  11. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  12. Tracking Mobile Robot in Indoor Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Liping Zhang

    2014-01-01

    Full Text Available This work addresses the problem of tracking mobile robots in indoor wireless sensor networks (WSNs. Our approach is based on a localization scheme with RSSI (received signal strength indication which is used widely in WSN. The developed tracking system is designed for continuous estimation of the robot’s trajectory. A WSN, which is composed of many very simple and cheap wireless sensor nodes, is deployed at a specific region of interest. The wireless sensor nodes collect RSSI information sent by mobile robots. A range-based data fusion scheme is used to estimate the robot’s trajectory. Moreover, a Kalman filter is designed to improve tracking accuracy. Experiments are provided to assess the performance of the proposed scheme.

  13. A Wireless Implantable Switched-Capacitor Based Optogenetic Stimulating System

    Science.gov (United States)

    Lee, Hyung-Min; Kwon, Ki-Yong; Li, Wen

    2015-01-01

    This paper presents a power-efficient implantable optogenetic interface using a wireless switched-capacitor based stimulating (SCS) system. The SCS efficiently charges storage capacitors directly from an inductive link and periodically discharges them into an array of micro-LEDs, providing high instantaneous power without affecting wireless link and system supply voltage. A custom-designed computer interface in LabVIEW environment wirelessly controls stimulation parameters through the inductive link, and an optrode array enables simultaneous neural recording along with optical stimulation. The 4-channel SCS system prototype has been implemented in a 0.35-μm CMOS process and combined with the optrode array. In vivo experiments involving light-induced local field potentials verified the efficacy of the SCS system. An implantable version of the SCS system with flexible hermetic sealing is under development for chronic experiments. PMID:25570099

  14. Route Instruction Mechanism for Mobile Users Leveraging Distributed Wireless Resources

    Science.gov (United States)

    Kakehi, Takeshi; Shinkuma, Ryoichi; Murase, Tutomu; Motoyoshi, Gen; Yamori, Kyoko; Takahashi, Tatsuro

    The market growths of smart-phones and thin clients have been significantly increasing communication traffic in mobile networks. To handle the increased traffic, network operators should consider how to leverage distributed wireless resources such as distributed spots of wireless local access networks. In this paper, we consider the system where multiple moving users share distributed wireless access points on their traveling routes between their start and goal points and formulate as an optimization problem. Then, we come up with three algorithms as a solution for the problem. The key idea here is ‘longcut route instruction’, in which users are instructed to choose a traveling route where less congested access points are available; even if the moving distance increases, the throughput for users in the system would improve. In this paper, we define the gain function. Moreover, we analyze the basic characteristics of the system using as a simple model as possible.

  15. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  16. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  17. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    International Nuclear Information System (INIS)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs

  18. Real-Time and Secure Wireless Health Monitoring

    Science.gov (United States)

    Dağtaş, S.; Pekhteryev, G.; Şahinoğlu, Z.; Çam, H.; Challa, N.

    2008-01-01

    We present a framework for a wireless health monitoring system using wireless networks such as ZigBee. Vital signals are collected and processed using a 3-tiered architecture. The first stage is the mobile device carried on the body that runs a number of wired and wireless probes. This device is also designed to perform some basic processing such as the heart rate and fatal failure detection. At the second stage, further processing is performed by a local server using the raw data transmitted by the mobile device continuously. The raw data is also stored at this server. The processed data as well as the analysis results are then transmitted to the service provider center for diagnostic reviews as well as storage. The main advantages of the proposed framework are (1) the ability to detect signals wirelessly within a body sensor network (BSN), (2) low-power and reliable data transmission through ZigBee network nodes, (3) secure transmission of medical data over BSN, (4) efficient channel allocation for medical data transmission over wireless networks, and (5) optimized analysis of data using an adaptive architecture that maximizes the utility of processing and computational capacity at each platform. PMID:18497866

  19. Estimating Single and Multiple Target Locations Using K-Means Clustering with Radio Tomographic Imaging in Wireless Sensor Networks

    Science.gov (United States)

    2015-03-26

    clustering is an algorithm that has been used in data mining applications such as machine learning applications , pattern recognition, hyper-spectral imagery...42 3.7.2 Application of K-means Clustering . . . . . . . . . . . . . . . . . 42 3.8 Experiment Design...Tomographic Imaging WLAN Wireless Local Area Networks WSN Wireless Sensor Network xx ESTIMATING SINGLE AND MULTIPLE TARGET LOCATIONS USING K-MEANS CLUSTERING

  20. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  1. Household wireless electroencephalogram hat

    Science.gov (United States)

    Szu, Harold; Hsu, Charles; Moon, Gyu; Yamakawa, Takeshi; Tran, Binh

    2012-06-01

    We applied Compressive Sensing to design an affordable, convenient Brain Machine Interface (BMI) measuring the high spatial density, and real-time process of Electroencephalogram (EEG) brainwaves by a Smartphone. It is useful for therapeutic and mental health monitoring, learning disability biofeedback, handicap interfaces, and war gaming. Its spec is adequate for a biomedical laboratory, without the cables hanging over the head and tethered to a fixed computer terminal. Our improved the intrinsic signal to noise ratio (SNR) by using the non-uniform placement of the measuring electrodes to create the proximity of measurement to the source effect. We computing a spatiotemporal average the larger magnitude of EEG data centers in 0.3 second taking on tethered laboratory data, using fuzzy logic, and computing the inside brainwave sources, by Independent Component Analysis (ICA). Consequently, we can overlay them together by non-uniform electrode distribution enhancing the signal noise ratio and therefore the degree of sparseness by threshold. We overcame the conflicting requirements between a high spatial electrode density and precise temporal resolution (beyond Event Related Potential (ERP) P300 brainwave at 0.3 sec), and Smartphone wireless bottleneck of spatiotemporal throughput rate. Our main contribution in this paper is the quality and the speed of iterative compressed image recovery algorithm based on a Block Sparse Code (Baranuick et al, IEEE/IT 2008). As a result, we achieved real-time wireless dynamic measurement of EEG brainwaves, matching well with traditionally tethered high density EEG.

  2. Computational stability appraisal of rectangular natural circulation loop: Effect of loop inclination

    International Nuclear Information System (INIS)

    Krishnani, Mayur; Basu, Dipankar N.

    2017-01-01

    Highlights: • Computational model developed for single-phase rectangular natural circulation loop. • Role of loop inclination to vertical on thermalhydraulic stability is explored. • Inclination has strong stabilizing effect due to lower effective gravitation force. • Increase in tilt angle reduces settling time and highest amplitude of oscillation. • An angle of 15° is suggested for the selected loop geometry. - Abstract: Controlling stability behavior of single-phase natural circulation loops, without significantly affecting its steady-state characteristics, is a topic of wide research interest. Present study explores the role of loop inclination on a particular loop geometry. Accordingly a 3D computational model of a rectangular loop is developed and transient conservation equations are solved to obtain the temporal variation in flow parameters. Starting from the quiescent state, simulations are performed for selected sets of operating conditions and also with a few selected inclination angles. System experiences instability at higher heater powers and also with higher sink temperatures. Inclination is found to have a strong stabilizing influence owing to the reduction in the effective gravitational acceleration and subsequent decline in local buoyancy effects. The settling time and highest amplitude of oscillations substantially reduces for a stable system with a small inclination. Typically-unstable systems can also suppress the oscillations, when subjected to tilting, within a reasonable period of time. It is possible to stabilize the loop within shorter time span by increasing the tilt angle, but at the expense of reduction in steady-state flow rate. Overall a tilt angle of 15° is suggested for the selected geometry. Results from the 3D model is compared with the predictions from an indigenous 1D code. While similar qualitative influence of inclination is observed, the 1D model predicts early appearance of the stability threshold and hence hints

  3. Converged Wireless Networking and Optimization for Next Generation Services

    Directory of Open Access Journals (Sweden)

    J. Rodriguez

    2010-01-01

    Full Text Available The Next Generation Network (NGN vision is tending towards the convergence of internet and mobile services providing the impetus for new market opportunities in combining the appealing services of internet with the roaming capability of mobile networks. However, this convergence does not go far enough, and with the emergence of new coexistence scenarios, there is a clear need to evolve the current architecture to provide cost-effective end-to-end communication. The LOOP project, a EUREKA-CELTIC driven initiative, is one piece in the jigsaw by helping European industry to sustain a leading role in telecommunications and manufacturing of high-value products and machinery by delivering pioneering converged wireless networking solutions that can be successfully demonstrated. This paper provides an overview of the LOOP project and the key achievements that have been tunneled into first prototypes for showcasing next generation services for operators and process manufacturers.

  4. The Radio Frequency Health Node Wireless Sensor System

    Science.gov (United States)

    Valencia, J. Emilio; Stanley, Priscilla C.; Mackey, Paul J.

    2009-01-01

    The Radio Frequency Health Node (RFHN) wireless sensor system differs from other wireless sensor systems in ways originally intended to enhance utility as an instrumentation system for a spacecraft. The RFHN can also be adapted to use in terrestrial applications in which there are requirements for operational flexibility and integrability into higher-level instrumentation and data acquisition systems. As shown in the figure, the heart of the system is the RFHN, which is a unit that passes commands and data between (1) one or more commercially available wireless sensor units (optionally, also including wired sensor units) and (2) command and data interfaces with a local control computer that may be part of the spacecraft or other engineering system in which the wireless sensor system is installed. In turn, the local control computer can be in radio or wire communication with a remote control computer that may be part of a higher-level system. The remote control computer, acting via the local control computer and the RFHN, cannot only monitor readout data from the sensor units but can also remotely configure (program or reprogram) the RFHN and the sensor units during operation. In a spacecraft application, the RFHN and the sensor units can also be configured more nearly directly, prior to launch, via a serial interface that includes an umbilical cable between the spacecraft and ground support equipment. In either case, the RFHN wireless sensor system has the flexibility to be configured, as required, with different numbers and types of sensors for different applications. The RFHN can be used to effect realtime transfer of data from, and commands to, the wireless sensor units. It can also store data for later retrieval by an external computer. The RFHN communicates with the wireless sensor units via a radio transceiver module. The modular design of the RFHN makes it possible to add radio transceiver modules as needed to accommodate additional sets of wireless sensor

  5. A geometrical perspective on localization

    NARCIS (Netherlands)

    Dulman, S.O.; Baggio, A.; Havinga, Paul J.M.; Langendoen, K.G.; Zhang, Ying; Ye, Yinyu

    2008-01-01

    A large number of localization algorithms for wireless sensor networks (WSNs) are evaluated against the Cramer-Rao Bound (CRB) as an indicator of how good the algorithm performs. The CRB defines the lower bound on the precision of an unbiased localization estimator. The CRB concept, borrowed from

  6. Closing the loop.

    Science.gov (United States)

    Dassau, E; Atlas, E; Phillip, M

    2010-02-01

    The dream of closing the loop is actually the dream of creating an artificial pancreas and freeing the patients from being involved with the care of their own diabetes. Insulin-dependent diabetes (type 1) is a chronic incurable disease which requires constant therapy without the possibility of any 'holidays' or insulin-free days. It means that patients have to inject insulin every day of their life, several times per day, and in order to do it safely they also have to measure their blood glucose levels several times per day. Patients need to plan their meals, their physical activities and their insulin regime - there is only very small room for spontaneous activities. This is why the desire for an artificial pancreas is so strong despite the fact that it will not cure the diabetic patients. Attempts to develop a closed-loop system started in the 1960s but never got to a clinical practical stage of development. In recent years the availability of continuous glucose sensors revived those efforts and stimulated the clinician and researchers to believe that closing the loop might be possible nowadays. Many papers have been published over the years describing several different ideas on how to close the loop. Most of the suggested systems have a sensing arm that measures the blood glucose repeatedly or continuously, an insulin delivery arm that injects insulin upon command and a computer that makes the decisions of when and how much insulin to deliver. The differences between the various published systems in the literature are mainly in their control algorithms. However, there are also differences related to the method and site of glucose measurement and insulin delivery. SC glucose measurements and insulin delivery are the most studied option but other combinations of insulin measurements and glucose delivery including intravascular and intraperitoneal (IP) are explored. We tried to select recent publications that we believe had influenced and inspired people interested

  7. Loop Quantum Cosmology.

    Science.gov (United States)

    Bojowald, Martin

    2008-01-01

    Quantum gravity is expected to be necessary in order to understand situations in which classical general relativity breaks down. In particular in cosmology one has to deal with initial singularities, i.e., the fact that the backward evolution of a classical spacetime inevitably comes to an end after a finite amount of proper time. This presents a breakdown of the classical picture and requires an extended theory for a meaningful description. Since small length scales and high curvatures are involved, quantum effects must play a role. Not only the singularity itself but also the surrounding spacetime is then modified. One particular theory is loop quantum cosmology, an application of loop quantum gravity to homogeneous systems, which removes classical singularities. Its implications can be studied at different levels. The main effects are introduced into effective classical equations, which allow one to avoid the interpretational problems of quantum theory. They give rise to new kinds of early-universe phenomenology with applications to inflation and cyclic models. To resolve classical singularities and to understand the structure of geometry around them, the quantum description is necessary. Classical evolution is then replaced by a difference equation for a wave function, which allows an extension of quantum spacetime beyond classical singularities. One main question is how these homogeneous scenarios are related to full loop quantum gravity, which can be dealt with at the level of distributional symmetric states. Finally, the new structure of spacetime arising in loop quantum gravity and its application to cosmology sheds light on more general issues, such as the nature of time. Supplementary material is available for this article at 10.12942/lrr-2008-4.

  8. Loop Quantum Cosmology

    Directory of Open Access Journals (Sweden)

    Bojowald Martin

    2008-07-01

    Full Text Available Quantum gravity is expected to be necessary in order to understand situations in which classical general relativity breaks down. In particular in cosmology one has to deal with initial singularities, i.e., the fact that the backward evolution of a classical spacetime inevitably comes to an end after a finite amount of proper time. This presents a breakdown of the classical picture and requires an extended theory for a meaningful description. Since small length scales and high curvatures are involved, quantum effects must play a role. Not only the singularity itself but also the surrounding spacetime is then modified. One particular theory is loop quantum cosmology, an application of loop quantum gravity to homogeneous systems, which removes classical singularities. Its implications can be studied at different levels. The main effects are introduced into effective classical equations, which allow one to avoid the interpretational problems of quantum theory. They give rise to new kinds of early-universe phenomenology with applications to inflation and cyclic models. To resolve classical singularities and to understand the structure of geometry around them, the quantum description is necessary. Classical evolution is then replaced by a difference equation for a wave function, which allows an extension of quantum spacetime beyond classical singularities. One main question is how these homogeneous scenarios are related to full loop quantum gravity, which can be dealt with at the level of distributional symmetric states. Finally, the new structure of spacetime arising in loop quantum gravity and its application to cosmology sheds light on more general issues, such as the nature of time.

  9. Loop Quantum Cosmology

    Directory of Open Access Journals (Sweden)

    Bojowald Martin

    2005-12-01

    Full Text Available Quantum gravity is expected to be necessary in order to understand situations where classical general relativity breaks down. In particular in cosmology one has to deal with initial singularities, i.e., the fact that the backward evolution of a classical space-time inevitably comes to an end after a finite amount of proper time. This presents a breakdown of the classical picture and requires an extended theory for a meaningful description. Since small length scales and high curvatures are involved, quantum effects must play a role. Not only the singularity itself but also the surrounding space-time is then modified. One particular realization is loop quantum cosmology, an application of loop quantum gravity to homogeneous systems, which removes classical singularities. Its implications can be studied at different levels. Main effects are introduced into effective classical equations which allow to avoid interpretational problems of quantum theory. They give rise to new kinds of early universe phenomenology with applications to inflation and cyclic models. To resolve classical singularities and to understand the structure of geometry around them, the quantum description is necessary. Classical evolution is then replaced by a difference equation for a wave function which allows to extend space-time beyond classical singularities. One main question is how these homogeneous scenarios are related to full loop quantum gravity, which can be dealt with at the level of distributional symmetric states. Finally, the new structure of space-time arising in loop quantum gravity and its application to cosmology sheds new light on more general issues such as time.

  10. Transmit Power Optimisation in Wireless Network

    Directory of Open Access Journals (Sweden)

    Besnik Terziu

    2011-09-01

    Full Text Available Transmit power optimisation in wireless networks based on beamforming have emerged as a promising technique to enhance the spectrum efficiency of present and future wireless communication systems. The aim of this study is to minimise the access point power consumption in cellular networks while maintaining a targeted quality of service (QoS for the mobile terminals. In this study, the targeted quality of service is delivered to a mobile station by providing a desired level of Signal to Interference and Noise Ratio (SINR. Base-stations are coordinated across multiple cells in a multi-antenna beamforming system. This study focuses on a multi-cell multi-antenna downlink scenario where each mobile user is equipped with a single antenna, but where multiple mobile users may be active simultaneously in each cell and are separated via spatial multiplexing using beamforming. The design criteria is to minimize the total weighted transmitted power across the base-stations subject to SINR constraints at the mobile users. The main contribution of this study is to define an iterative algorithm that is capable of finding the joint optimal beamformers for all basestations, based on a correlation-based channel model, the full-correlation model. Among all correlated channel models, the correlated channel model used in this study is the most accurate, giving the best performance in terms of power consumption. The environment here in this study is chosen to be Non-Light of- Sight (NLOS condition, where a signal from a wireless transmitter passes several obstructions before arriving at a wireless receiver. Moreover there are many scatterers local to the mobile, and multiple reflections can occur among them before energy arrives at the mobile. The proposed algorithm is based on uplink-downlink duality using the Lagrangian duality theory. Time-Division Duplex (TDD is chosen as the platform for this study since it has been adopted to the latest technologies in Fourth

  11. Percussion drilling cone penetrometer with wireless operating in-tip gaschromatograph

    Energy Technology Data Exchange (ETDEWEB)

    Bracht, C.; Matz, G. [Technische Univ. Hamburg-Harburg, Hamburg (Germany)

    2003-07-01

    Percussion drilling cone penetrometric analysis is the fast alternative to soil sampling and laboratory analyses. Online detection enables the characterization of a large variety of contaminants in soil. This becomes very important in the reactivation of contaminated sites. Therefore a new system has been constructed, which avoids tedious harness handling through the penetrometer drill rods and minimizes the time for an analysis down to 30 minutes per drill hole. This system enables the in-situ analysis of soil gases up to a depth of 10 to 15 meters. This system consists of a remote controlled in-tip mounted gaschromatograph, a special gas inlet module and a data transfer unit including a rechargeable battery pack. The modules are shock proved to be suitable for percussion drilling techniques and can be removed easily for maintenance. A PDA (Pocket PC) controls the subsoil gaschromatograph unit, calculates and displays the concentration of the detected compounds and stores the acquired data. The gaschromatograph until is optimized to analyze VOCs e.g. BTEX within 10 seconds per analysis. It consists of a loop inlet, a capillary column and a Photo Ionization Detector. It is microcontroller operated and battery powered. The inlet module is optimized soil gases. It includes a sensor and solenoid valve system for water protection and humidity acquisition while drilling. A completely charged battery pack provides up to three hours of analyses. It could be exchanged fast and easy to enable continuous analyses. Digital data transfer between subsoil unit and surface is provided wireless by IR light through the rods. On surface data is transferred wireless by BLUETOOTH radio link to the PDA. The depth of the penetrometer, global position and local time are acquired on-line onto the surface and are transferred on request by BLUETOOTH radio link to the PDA. The wireless data transfer and battery powered modules avoid time consuming cable handling and enable this cone

  12. Microwave materials for wireless applications

    CERN Document Server

    Cruickshank, David B

    2011-01-01

    This practical resource offers you an in-depth, up-to-date understanding of the use of microwave magnetic materials for cutting-edge wireless applications. The book discusses device applications used in wireless infrastructure base stations, point-to-point radio links, and a range of more specialized microwave systems. You find detailed discussions on the attributes of each family of magnetic materials with respect to specific wireless applications. Moreover, the book addresses two of the hottest topics in the field today - insertion loss and intermodulation. This comprehensive reference also

  13. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  14. Structural processing for wireless communications

    CERN Document Server

    Lu, Jianhua; Ge, Ning

    2015-01-01

    This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.

  15. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  16. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  17. Wireless Power Transfer and Data Collection in Wireless Sensor Networks

    OpenAIRE

    Li, Kai; Ni, Wei; Duan, Lingjie; Abolhasan, Mehran; Niu, Jianwei

    2017-01-01

    In a rechargeable wireless sensor network, the data packets are generated by sensor nodes at a specific data rate, and transmitted to a base station. Moreover, the base station transfers power to the nodes by using Wireless Power Transfer (WPT) to extend their battery life. However, inadequately scheduling WPT and data collection causes some of the nodes to drain their battery and have their data buffer overflow, while the other nodes waste their harvested energy, which is more than they need...

  18. LoopIng: a template-based tool for predicting the structure of protein loops.

    KAUST Repository

    Messih, Mario Abdel

    2015-08-06

    Predicting the structure of protein loops is very challenging, mainly because they are not necessarily subject to strong evolutionary pressure. This implies that, unlike the rest of the protein, standard homology modeling techniques are not very effective in modeling their structure. However, loops are often involved in protein function, hence inferring their structure is important for predicting protein structure as well as function.We describe a method, LoopIng, based on the Random Forest automated learning technique, which, given a target loop, selects a structural template for it from a database of loop candidates. Compared to the most recently available methods, LoopIng is able to achieve similar accuracy for short loops (4-10 residues) and significant enhancements for long loops (11-20 residues). The quality of the predictions is robust to errors that unavoidably affect the stem regions when these are modeled. The method returns a confidence score for the predicted template loops and has the advantage of being very fast (on average: 1 min/loop).www.biocomputing.it/loopinganna.tramontano@uniroma1.itSupplementary data are available at Bioinformatics online.

  19. Hardware-in-the-Loop Simulation of Distributed Intelligent Energy Management System for Microgrids

    Directory of Open Access Journals (Sweden)

    Dong-Jun Won

    2013-07-01

    Full Text Available Microgrids are autonomous low-voltage power distribution systems that contain multiple distributed energy resources (DERs and smart loads that can provide power system operation flexibility. To effectively control and coordinate multiple DERs and loads of microgrids, this paper proposes a distributed intelligent management system that employs a multi-agent-based control system so that delicate decision-making functions can be distributed to local intelligent agents. This paper presents the development of a hardware-in-the-loop simulation (HILS system for distributed intelligent management system for microgrids and its promising application to an emergency demand response program. In the developed HILS system, intelligent agents are developed using microcontrollers and ZigBee wireless communication technology. Power system dynamic models are implemented in real-time simulation environments using the Opal-RT system. This paper presents key features of the data communication and management schemes based on multi-agent concepts. The performance of the developed system is tested for emergency demand response program applications.

  20. Three-loop corrections in a covariant effective field theory

    International Nuclear Information System (INIS)

    McIntire, Jeff

    2008-01-01

    Chiral effective field theories have been used with success in the study of nuclear structure. It is of interest to systematically improve these energy functionals (particularly that of quantum hadrodynamics) through the inclusion of many-body correlations. One possible source of improvement is the loop expansion. Using the techniques of Infrared Regularization, the short-range, local dynamics at each order in the loops is absorbed into the parameterization of the underlying effective Lagrangian. The remaining nonlocal, exchange correlations must be calculated explicitly. Given that the interactions of quantum hadrodynamics are relatively soft, the loop expansion may be manageable or even perturbative in nuclear matter. This work investigates the role played by the three-loop contributions to the loop expansion for quantum hadrodynamics

  1. Ultrasonic wireless health monitoring

    Science.gov (United States)

    Petit, Lionel; Lefeuvre, Elie; Guyomar, Daniel; Richard, Claude; Guy, Philippe; Yuse, Kaori; Monnier, Thomas

    2006-03-01

    The integration of autonomous wireless elements in health monitoring network increases the reliability by suppressing power supplies and data transmission wiring. Micro-power piezoelectric generators are an attractive alternative to primary batteries which are limited by a finite amount of energy, a limited capacity retention and a short shelf life (few years). Our goal is to implement such an energy harvesting system for powering a single AWT (Autonomous Wireless Transmitter) using our SSH (Synchronized Switch Harvesting) method. Based on a non linear process of the piezoelement voltage, this SSH method optimizes the energy extraction from the mechanical vibrations. This AWT has two main functions : The generation of an identifier code by RF transmission to the central receiver and the Lamb wave generation for the health monitoring of the host structure. A damage index is derived from the variation between the transmitted wave spectrum and a reference spectrum. The same piezoelements are used for the energy harvesting function and the Lamb wave generation, thus reducing mass and cost. A micro-controller drives the energy balance and synchronizes the functions. Such an autonomous transmitter has been evaluated on a 300x50x2 mm 3 composite cantilever beam. Four 33x11x0.3 mm 3 piezoelements are used for the energy harvesting and for the wave lamb generation. A piezoelectric sensor is placed at the free end of the beam to track the transmitted Lamb wave. In this configuration, the needed energy for the RF emission is 0.1 mJ for a 1 byte-information and the Lamb wave emission requires less than 0.1mJ. The AWT can harvested an energy quantity of approximately 20 mJ (for a 1.5 Mpa lateral stress) with a 470 μF storage capacitor. This corresponds to a power density near to 6mW/cm 3. The experimental AWT energy abilities are presented and the damage detection process is discussed. Finally, some envisaged solutions are introduced for the implementation of the required data

  2. Wilson loops in minimal surfaces

    International Nuclear Information System (INIS)

    Drukker, Nadav; Gross, David J.; Ooguri, Hirosi

    1999-01-01

    The AdS/CFT correspondence suggests that the Wilson loop of the large N gauge theory with N = 4 supersymmetry in 4 dimensions is described by a minimal surface in AdS 5 x S 5 . The authors examine various aspects of this proposal, comparing gauge theory expectations with computations of minimal surfaces. There is a distinguished class of loops, which the authors call BPS loops, whose expectation values are free from ultra-violet divergence. They formulate the loop equation for such loops. To the extent that they have checked, the minimal surface in AdS 5 x S 5 gives a solution of the equation. The authors also discuss the zig-zag symmetry of the loop operator. In the N = 4 gauge theory, they expect the zig-zag symmetry to hold when the loop does not couple the scalar fields in the supermultiplet. They will show how this is realized for the minimal surface

  3. Wilson loops and minimal surfaces

    International Nuclear Information System (INIS)

    Drukker, Nadav; Gross, David J.; Ooguri, Hirosi

    1999-01-01

    The AdS-CFT correspondence suggests that the Wilson loop of the large N gauge theory with N=4 supersymmetry in four dimensions is described by a minimal surface in AdS 5 xS 5 . We examine various aspects of this proposal, comparing gauge theory expectations with computations of minimal surfaces. There is a distinguished class of loops, which we call BPS loops, whose expectation values are free from ultraviolet divergence. We formulate the loop equation for such loops. To the extent that we have checked, the minimal surface in AdS 5 xS 5 gives a solution of the equation. We also discuss the zigzag symmetry of the loop operator. In the N=4 gauge theory, we expect the zigzag symmetry to hold when the loop does not couple the scalar fields in the supermultiplet. We will show how this is realized for the minimal surface. (c) 1999 The American Physical Society

  4. Alternative Path Communication in Wide-Scale Cluster-Tree Wireless Sensor Networks Using Inactive Periods.

    Science.gov (United States)

    Leão, Erico; Montez, Carlos; Moraes, Ricardo; Portugal, Paulo; Vasques, Francisco

    2017-05-06

    The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable technology to deploy wide-scale Wireless Sensor Networks (WSNs). These networks are usually designed to support convergecast traffic, where all communication paths go through the PAN (Personal Area Network) coordinator. Nevertheless, peer-to-peer communication relationships may be also required for different types of WSN applications. That is the typical case of sensor and actuator networks, where local control loops must be closed using a reduced number of communication hops. The use of communication schemes optimised just for the support of convergecast traffic may result in higher network congestion and in a potentially higher number of communication hops. Within this context, this paper proposes an Alternative-Route Definition (ARounD) communication scheme for WSNs. The underlying idea of ARounD is to setup alternative communication paths between specific source and destination nodes, avoiding congested cluster-tree paths. These alternative paths consider shorter inter-cluster paths, using a set of intermediate nodes to relay messages during their inactive periods in the cluster-tree network. Simulation results show that the ARounD communication scheme can significantly decrease the end-to-end communication delay, when compared to the use of standard cluster-tree communication schemes. Moreover, the ARounD communication scheme is able to reduce the network congestion around the PAN coordinator, enabling the reduction of the number of message drops due to queue overflows in the cluster-tree network.

  5. Wireless sensor network topology control

    OpenAIRE

    Zuk, Olexandr; Romanjuk, Valeriy; Sova, Oleg

    2010-01-01

    Topology control process for the wireless sensor network is considered. In this article the use of rule base for making decision on the search of optimum network topology is offered for the realization of different aims of network management.

  6. Wireless Damage Location Sensing System

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant Douglas (Inventor)

    2012-01-01

    A wireless damage location sensing system uses a geometric-patterned wireless sensor that resonates in the presence of a time-varying magnetic field to generate a harmonic response that will experience a change when the sensor experiences a change in its geometric pattern. The sensing system also includes a magnetic field response recorder for wirelessly transmitting the time-varying magnetic field and for wirelessly detecting the harmonic response. The sensing system compares the actual harmonic response to a plurality of predetermined harmonic responses. Each predetermined harmonic response is associated with a severing of the sensor at a corresponding known location thereof so that a match between the actual harmonic response and one of the predetermined harmonic responses defines the known location of the severing that is associated therewith.

  7. Wireless sensor network adaptive cooling

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, T. [SynapSense Corp., Folsom, CA (United States)

    2009-07-01

    Options for reducing data centre cooling energy requirements and their cost savings were discussed with particular reference to a wireless control solution developed by SynapSense Corporation. The wireless sensor network reduces cooling energy use at data centres by providing improved air flow management through the installation of cold aisle containment. The use of this low cost, non-invasive wireless sensor network has reduced the cooling energy use in a data center at BC Hydro by 30 per cent. The system also reduced the server and storage fan energy by 3 per cent by maintaining inlet air temperature below ASHRAE recommended operating range. The distribution of low power, low cost wireless sensors has enabled visualization tools that are changing the way that data centres are managed. The annual savings have been estimated at 4,560,000 kWh and the annual carbon dioxide abatement is approximately 1,400 metric tons. tabs., figs.

  8. Cooperative Diversity in Wireless Networks

    Directory of Open Access Journals (Sweden)

    A. Mahmood

    2010-01-01

    Full Text Available Transmit Diversity is an effective methodology for improving the quality and reliability of a wireless network by reducingthe effects of fading. As majority of the wireless devices (i.e. mobile handsets, etc are limited to only one antenna, especiallydue to hardware constraints, size and cost factors; cooperative communication can be utilized in order to generatetransmit diversity [1]. This enables single antenna wireless devices to share their antennas during transmission in such amanner that creates a virtual MIMO (multiple-input and multiple-output system [2] [3]. In this paper, we will analyze therecent developments and trends in this promising area of wireless Ad hoc networks. The article will also discuss variousmain cooperative signaling methods and will also observe their performance.

  9. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  10. Wireless transmission of power

    International Nuclear Information System (INIS)

    Grotz, T.

    1991-01-01

    This paper reports that it has been proven by researchers that electrical energy can be propagated around the world between the surface of the Earth and the ionosphere at extremely low frequencies in what is known as the Schumann Cavity. Experiments to data have shown that electromagnetic waves with frequencies in the range of 8 Hz, the fundamental Schumann Resonance frequency, propagate with litter attenuation around the planet within the Schumann Cavity. It is the intent of this research to determine if the Schumann Cavity can be resonated, if the power that is delivered to the cavity propagated with very low losses, and if power can be extracted at other locations within the cavity. Experimental data collected and calculations made in recent years support the hypothesis that wireless power transmission is a viable and practical alternative to the present systems of power transmission

  11. Wireless power transfer system

    Science.gov (United States)

    Wu, Hunter; Sealy, Kylee; Gilchrist, Aaron

    2016-02-23

    A system includes a first stage of an inductive power transfer system with an LCL load resonant converter with a switching section, an LCL tuning circuit, and a primary receiver pad. The IPT system includes a second stage with a secondary receiver pad, a secondary resonant circuit, a secondary rectification circuit, and a secondary decoupling converter. The secondary receiver pad connects to the secondary resonant circuit. The secondary resonant circuit connects to the secondary rectification circuit. The secondary rectification circuit connects to the secondary decoupling converter. The second stage connects to a load. The load includes an energy storage element. The second stage and load are located on a vehicle and the first stage is located at a fixed location. The primary receiver pad wirelessly transfers power to the secondary receiver pad across a gap when the vehicle positions the secondary receiver pad with respect to the primary receiver pad.

  12. Large-Scale Wireless Temperature Monitoring System for Liquefied Petroleum Gas Storage Tanks

    Directory of Open Access Journals (Sweden)

    Guangwen Fan

    2015-09-01

    Full Text Available Temperature distribution is a critical indicator of the health condition for Liquefied Petroleum Gas (LPG storage tanks. In this paper, we present a large-scale wireless temperature monitoring system to evaluate the safety of LPG storage tanks. The system includes wireless sensors networks, high temperature fiber-optic sensors, and monitoring software. Finally, a case study on real-world LPG storage tanks proves the feasibility of the system. The unique features of wireless transmission, automatic data acquisition and management, local and remote access make the developed system a good alternative for temperature monitoring of LPG storage tanks in practical applications.

  13. Large-Scale Wireless Temperature Monitoring System for Liquefied Petroleum Gas Storage Tanks.

    Science.gov (United States)

    Fan, Guangwen; Shen, Yu; Hao, Xiaowei; Yuan, Zongming; Zhou, Zhi

    2015-09-18

    Temperature distribution is a critical indicator of the health condition for Liquefied Petroleum Gas (LPG) storage tanks. In this paper, we present a large-scale wireless temperature monitoring system to evaluate the safety of LPG storage tanks. The system includes wireless sensors networks, high temperature fiber-optic sensors, and monitoring software. Finally, a case study on real-world LPG storage tanks proves the feasibility of the system. The unique features of wireless transmission, automatic data acquisition and management, local and remote access make the developed system a good alternative for temperature monitoring of LPG storage tanks in practical applications.

  14. Performance prediction of a synchronization link for distributed aerospace wireless systems.

    Science.gov (United States)

    Wang, Wen-Qin; Shao, Huaizong

    2013-01-01

    For reasons of stealth and other operational advantages, distributed aerospace wireless systems have received much attention in recent years. In a distributed aerospace wireless system, since the transmitter and receiver placed on separated platforms which use independent master oscillators, there is no cancellation of low-frequency phase noise as in the monostatic cases. Thus, high accurate time and frequency synchronization techniques are required for distributed wireless systems. The use of a dedicated synchronization link to quantify and compensate oscillator frequency instability is investigated in this paper. With the mathematical statistical models of phase noise, closed-form analytic expressions for the synchronization link performance are derived. The possible error contributions including oscillator, phase-locked loop, and receiver noise are quantified. The link synchronization performance is predicted by utilizing the knowledge of the statistical models, system error contributions, and sampling considerations. Simulation results show that effective synchronization error compensation can be achieved by using this dedicated synchronization link.

  15. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  16. Wireless data link for FBTR

    International Nuclear Information System (INIS)

    Sundararajan, M.K.; Prabhakara Rao, G.; Ilango Sambasivan, S.; Swaminathan, P.; Ramakrishna, P.V.

    2004-01-01

    This paper deals with the design and development of a wireless data link for transmission of block pile signals at the Fast Breeder Test Reactor (FBTR) of Indira Gandhi Center for Atomic Research (IGCAR). This link is to establish wireless connectivity, typically at RS232C rates, over distances of the order of 50 m, and is expected to operate under electrically hostile conditions. (author)

  17. Wireless Sensor Network Safety Study

    OpenAIRE

    M.Shankar; Dr.M.Sridar; Dr.M.Rajani

    2012-01-01

    Few security mechanisms in wireless sensor networks (WSNs) have been implemented, and even fewer have been applied in real deployments. The limited resources of each sensor node makes security in WSNs hard, as the tradeoff between security and practicality must be carefully considered. These complex systems include in their design different types of information and communication technology systems, such as wireless (mesh) sensor networks, to carry out control processes in real time. This fact...

  18. Wireless data signal transmission system

    DEFF Research Database (Denmark)

    2014-01-01

    The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver.......The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver....

  19. Wireless Smart Systems Beyond RFID

    OpenAIRE

    Vermesan, Ovidiu

    2008-01-01

    It is expected that in the coming 20 years the IoT will be pervasive, and ubiquitous: smart devices, embedded in smart materials, will work in synergy to improve the quality of our lives. In this context wireless smart systems will play an essential role that is far beyond the ID information that is part of RFID devices today. Wireless Smart Systems Beyond RFID

  20. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  1. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  2. Wireless sensor network

    Science.gov (United States)

    Perotti, Jose M.; Lucena, Angel R.; Mullenix, Pamela A.; Mata, Carlos T.

    2006-05-01

    Current and future requirements of aerospace sensors and transducers demand the design and development of a new family of sensing devices, with emphasis on reduced weight, power consumption, and physical size. This new generation of sensors and transducers will possess a certain degree of intelligence in order to provide the end user with critical data in a more efficient manner. Communication between networks of traditional or next-generation sensors can be accomplished by a Wireless Sensor Network (WSN) developed by NASA's Instrumentation Branch and ASRC Aerospace Corporation at Kennedy Space Center (KSC), consisting of at least one central station and several remote stations and their associated software. The central station is application-dependent and can be implemented on different computer hardware, including industrial, handheld, or PC-104 single-board computers, on a variety of operating systems: embedded Windows, Linux, VxWorks, etc. The central stations and remote stations share a similar radio frequency (RF) core module hardware that is modular in design. The main components of the remote stations are an RF core module, a sensor interface module, batteries, and a power management module. These modules are stackable, and a common bus provides the flexibility to stack other modules for additional memory, increased processing, etc. WSN can automatically reconfigure to an alternate frequency if interference is encountered during operation. In addition, the base station will autonomously search for a remote station that was perceived to be lost, using relay stations and alternate frequencies. Several wireless remote-station types were developed and tested in the laboratory to support different sensing technologies, such as resistive temperature devices, silicon diodes, strain gauges, pressure transducers, and hydrogen leak detectors.

  3. On some properties of conjugacy closed loops

    International Nuclear Information System (INIS)

    Adeniran, John Olusola

    2002-07-01

    It is shown that central loops are not conjugacy closed loops but instead are loops of units in their loop algebras that are conjugacy closed. It is also shown that certain inner mappings of a conjugacy closed loop are nuclear. Some invariants of left conjugacy closed loops are obtained. (author)

  4. Magnetic metamaterial superlens for increased range wireless power transfer.

    Science.gov (United States)

    Lipworth, Guy; Ensworth, Joshua; Seetharam, Kushal; Huang, Da; Lee, Jae Seung; Schmalenberg, Paul; Nomura, Tsuyoshi; Reynolds, Matthew S; Smith, David R; Urzhumov, Yaroslav

    2014-01-10

    The ability to wirelessly power electrical devices is becoming of greater urgency as a component of energy conservation and sustainability efforts. Due to health and safety concerns, most wireless power transfer (WPT) schemes utilize very low frequency, quasi-static, magnetic fields; power transfer occurs via magneto-inductive (MI) coupling between conducting loops serving as transmitter and receiver. At the "long range" regime - referring to distances larger than the diameter of the largest loop - WPT efficiency in free space falls off as (1/d)(6); power loss quickly approaches 100% and limits practical implementations of WPT to relatively tight distances between power source and device. A "superlens", however, can concentrate the magnetic near fields of a source. Here, we demonstrate the impact of a magnetic metamaterial (MM) superlens on long-range near-field WPT, quantitatively confirming in simulation and measurement at 13-16 MHz the conditions under which the superlens can enhance power transfer efficiency compared to the lens-less free-space system.

  5. QED representation for the net of causal loops

    Science.gov (United States)

    Ciolli, Fabio; Ruzzi, Giuseppe; Vasselli, Ezio

    2015-06-01

    The present work tackles the existence of local gauge symmetries in the setting of Algebraic Quantum Field Theory (AQFT). The net of causal loops, previously introduced by the authors, is a model independent construction of a covariant net of local C*-algebras on any 4-dimensional globally hyperbolic space-time, aimed to capture structural properties of any reasonable quantum gauge theory. Representations of this net can be described by causal and covariant connection systems, and local gauge transformations arise as maps between equivalent connection systems. The present paper completes these abstract results, realizing QED as a representation of the net of causal loops in Minkowski space-time. More precisely, we map the quantum electromagnetic field Fμν, not free in general, into a representation of the net of causal loops and show that the corresponding connection system and the local gauge transformations find a counterpart in terms of Fμν.

  6. Parallel tiled Nussinov RNA folding loop nest generated using both dependence graph transitive closure and loop skewing.

    Science.gov (United States)

    Palkowski, Marek; Bielecki, Wlodzimierz

    2017-06-02

    RNA secondary structure prediction is a compute intensive task that lies at the core of several search algorithms in bioinformatics. Fortunately, the RNA folding approaches, such as the Nussinov base pair maximization, involve mathematical operations over affine control loops whose iteration space can be represented by the polyhedral model. Polyhedral compilation techniques have proven to be a powerful tool for optimization of dense array codes. However, classical affine loop nest transformations used with these techniques do not optimize effectively codes of dynamic programming of RNA structure predictions. The purpose of this paper is to present a novel approach allowing for generation of a parallel tiled Nussinov RNA loop nest exposing significantly higher performance than that of known related code. This effect is achieved due to improving code locality and calculation parallelization. In order to improve code locality, we apply our previously published technique of automatic loop nest tiling to all the three loops of the Nussinov loop nest. This approach first forms original rectangular 3D tiles and then corrects them to establish their validity by means of applying the transitive closure of a dependence graph. To produce parallel code, we apply the loop skewing technique to a tiled Nussinov loop nest. The technique is implemented as a part of the publicly available polyhedral source-to-source TRACO compiler. Generated code was run on modern Intel multi-core processors and coprocessors. We present the speed-up factor of generated Nussinov RNA parallel code and demonstrate that it is considerably faster than related codes in which only the two outer loops of the Nussinov loop nest are tiled.

  7. One-loop partition functions of 3D gravity

    International Nuclear Information System (INIS)

    Giombi, Simone; Yin Xi; Maloney, Alexander

    2008-01-01

    We consider the one-loop partition function of free quantum field theory in locally Anti-de Sitter space-times. In three dimensions, the one loop determinants for scalar, gauge and graviton excitations are computed explicitly using heat kernel techniques. We obtain precisely the result anticipated by Brown and Henneaux: the partition function includes a sum over 'boundary excitations' of AdS 3 , which are the Virasoro descendants of empty Anti-de Sitter space. This result also allows us to compute the one-loop corrections to the Euclidean action of the BTZ black hole as well its higher genus generalizations.

  8. Wireless and real-time structural damage detection: A novel decentralized method for wireless sensor networks

    Science.gov (United States)

    Avci, Onur; Abdeljaber, Osama; Kiranyaz, Serkan; Hussein, Mohammed; Inman, Daniel J.

    2018-06-01

    Being an alternative to conventional wired sensors, wireless sensor networks (WSNs) are extensively used in Structural Health Monitoring (SHM) applications. Most of the Structural Damage Detection (SDD) approaches available in the SHM literature are centralized as they require transferring data from all sensors within the network to a single processing unit to evaluate the structural condition. These methods are found predominantly feasible for wired SHM systems; however, transmission and synchronization of huge data sets in WSNs has been found to be arduous. As such, the application of centralized methods with WSNs has been a challenge for engineers. In this paper, the authors are presenting a novel application of 1D Convolutional Neural Networks (1D CNNs) on WSNs for SDD purposes. The SDD is successfully performed completely wireless and real-time under ambient conditions. As a result of this, a decentralized damage detection method suitable for wireless SHM systems is proposed. The proposed method is based on 1D CNNs and it involves training an individual 1D CNN for each wireless sensor in the network in a format where each CNN is assigned to process the locally-available data only, eliminating the need for data transmission and synchronization. The proposed damage detection method operates directly on the raw ambient vibration condition signals without any filtering or preprocessing. Moreover, the proposed approach requires minimal computational time and power since 1D CNNs merge both feature extraction and classification tasks into a single learning block. This ability is prevailingly cost-effective and evidently practical in WSNs considering the hardware systems have been occasionally reported to suffer from limited power supply in these networks. To display the capability and verify the success of the proposed method, large-scale experiments conducted on a laboratory structure equipped with a state-of-the-art WSN are reported.

  9. 76 FR 21742 - Wireless Telecommunications Bureau Extends Period for Filing Comments and Reply Comments on...

    Science.gov (United States)

    2011-04-18

    ...In this document, the Wireless Telecommunications Bureau extends the deadline for filing comments and reply comments in response to the Public Notice seeking comment on the December 3, 2010 petition for declaratory ruling (Petition) filed by CTIA--The Wireless Association (Petitioners). The Petitioners asked the Federal Communications Commission (Commission) to clarify ``the scope of Section 332(c)(3)(A)'s ban on state and local entry regulation.''

  10. Two-loop polygon Wilson loops in N = 4 SYM

    International Nuclear Information System (INIS)

    Anastasiou, C.; Brandhuber, A.; Heslop, P.; Spence, B.; Travaglini, G.; Khoze, V.V.

    2009-01-01

    We compute for the first time the two-loop corrections to arbitrary n-gon lightlike Wilson loops in N = 4 supersymmetric Yang-Mills theory, using efficient numerical methods. The calculation is motivated by the remarkable agreement between the finite part of planar six-point MHV amplitudes and hexagon Wilson loops which has been observed at two loops. At n = 6 we confirm that the ABDK/BDS ansatz must be corrected by adding a remainder function, which depends only on conformally invariant ratios of kinematic variables. We numerically compute remainder functions for n = 7,8 and verify dual conformal invariance. Furthermore, we study simple and multiple collinear limits of the Wilson loop remainder functions and demonstrate that they have precisely the form required by the collinear factorisation of the corresponding two-loop n-point amplitudes. The number of distinct diagram topologies contributing to the n-gon Wilson loops does not increase with n, and there is a fixed number of 'master integrals', which we have computed. Thus we have essentially computed general polygon Wilson loops, and if the correspondence with amplitudes continues to hold, all planar n-point two-loop MHV amplitudes in the N = 4 theory.

  11. [An implantable micro-device using wireless power transmission for measuring aortic aneurysm sac pressure].

    Science.gov (United States)

    Guo, Xudong; Ge, Bin; Wang, Wenxing

    2013-08-01

    In order to detect endoleaks after endovascular aneurysm repair (EVAR), we developed an implantable micro-device based on wireless power transmission to measure aortic aneurysm sac pressure. The implantable micro-device is composed of a miniature wireless pressure sensor, an energy transmitting coil, a data recorder and a data processing platform. Power transmission without interconnecting wires is performed by a transmitting coil and a receiving coil. The coupling efficiency of wireless power transmission depends on the coupling coefficient between the transmitting coil and the receiving coil. With theoretical analysis and experimental study, we optimized the geometry of the receiving coil to increase the coupling coefficient. In order to keep efficiency balance and satisfy the maximizing conditions, we designed a closed loop power transmission circuit, including a receiving voltage feedback module based on wireless communication. The closed loop improved the stability and reliability of transmission energy. The prototype of the micro-device has been developed and the experiment has been performed. The experiments showed that the micro-device was feasible and valid. For normal operation, the distance between the transmitting coil and the receiving coil is smaller than 8cm. Besides, the distance between the micro-device and the data recorder is within 50cm.

  12. Distributed control for energy-efficient and fast consensus in wireless sensor networks

    Science.gov (United States)

    Manfredi, Sabato; Tucci, Edmondo Di

    2017-05-01

    The paper proposes a distributed control of nodes transmission radii in energy-harvesting wireless sensor networks for simultaneously coping with energy consumption and consensus responsiveness requirement. The stability of the closed-loop network under the proposed control law is proved. Simulation validations show the effectiveness of the proposed approach in nominal scenario as well as in the presence of uncertain node power requirements and harvesting system supply.

  13. High temperature storage loop :

    Energy Technology Data Exchange (ETDEWEB)

    Gill, David Dennis; Kolb, William J.

    2013-07-01

    A three year plan for thermal energy storage (TES) research was created at Sandia National Laboratories in the spring of 2012. This plan included a strategic goal of providing test capability for Sandia and for the nation in which to evaluate high temperature storage (>650ÀC) technology. The plan was to scope, design, and build a flow loop that would be compatible with a multitude of high temperature heat transfer/storage fluids. The High Temperature Storage Loop (HTSL) would be reconfigurable so that it was useful for not only storage testing, but also for high temperature receiver testing and high efficiency power cycle testing as well. In that way, HTSL was part of a much larger strategy for Sandia to provide a research and testing platform that would be integral for the evaluation of individual technologies funded under the SunShot program. DOEs SunShot program seeks to reduce the price of solar technologies to 6/kWhr to be cost competitive with carbon-based fuels. The HTSL project sought to provide evaluation capability for these SunShot supported technologies. This report includes the scoping, design, and budgetary costing aspects of this effort

  14. Accelerating the loop expansion

    International Nuclear Information System (INIS)

    Ingermanson, R.

    1986-01-01

    This thesis introduces a new non-perturbative technique into quantum field theory. To illustrate the method, I analyze the much-studied phi 4 theory in two dimensions. As a prelude, I first show that the Hartree approximation is easy to obtain from the calculation of the one-loop effective potential by a simple modification of the propagator that does not affect the perturbative renormalization procedure. A further modification then susggests itself, which has the same nice property, and which automatically yields a convex effective potential. I then show that both of these modifications extend naturally to higher orders in the derivative expansion of the effective action and to higher orders in the loop-expansion. The net effect is to re-sum the perturbation series for the effective action as a systematic ''accelerated'' non-perturbative expansion. Each term in the accelerated expansion corresponds to an infinite number of terms in the original series. Each term can be computed explicitly, albeit numerically. Many numerical graphs of the various approximations to the first two terms in the derivative expansion are given. I discuss the reliability of the results and the problem of spontaneous symmetry-breaking, as well as some potential applications to more interesting field theories. 40 refs

  15. Mirror symmetry and loop operators

    Energy Technology Data Exchange (ETDEWEB)

    Assel, Benjamin [Department of Mathematics, King’s College London,The Strand, London WC2R 2LS (United Kingdom); Gomis, Jaume [Perimeter Institute for Theoretical Physics,Waterloo, Ontario, N2L 2Y5 (Canada)

    2015-11-09

    Wilson loops in gauge theories pose a fundamental challenge for dualities. Wilson loops are labeled by a representation of the gauge group and should map under duality to loop operators labeled by the same data, yet generically, dual theories have completely different gauge groups. In this paper we resolve this conundrum for three dimensional mirror symmetry. We show that Wilson loops are exchanged under mirror symmetry with Vortex loop operators, whose microscopic definition in terms of a supersymmetric quantum mechanics coupled to the theory encode in a non-trivial way a representation of the original gauge group, despite that the gauge groups of mirror theories can be radically different. Our predictions for the mirror map, which we derive guided by branes in string theory, are confirmed by the computation of the exact expectation value of Wilson and Vortex loop operators on the three-sphere.

  16. Reactor recirculation pump test loop

    International Nuclear Information System (INIS)

    Taka, Shusei; Kato, Hiroyuki

    1979-01-01

    A test loop for a reactor primary loop recirculation pumps (PLR pumps) has been constructed at Ebara's Haneda Plant in preparation for production of PLR pumps under license from Byron Jackson Pump Division of Borg-Warner Corporation. This loop can simulate operating conditions for test PLR pumps with 130 per cent of the capacity of pumps for a 1100 MWe BWR plant. A main loop, primary cooling system, water demineralizer, secondary cooling system, instrumentation and control equipment and an electric power supply system make up the test loop. This article describes the test loop itself and test results of two PLR pumps for Fukushima No. 2 N.P.S. Unit 1 and one main circulation pump for HAZ Demonstration Test Facility. (author)

  17. Software-Based Wireless Power Transfer Platform for Various Power Control Experiments

    Directory of Open Access Journals (Sweden)

    Sun-Han Hwang

    2015-07-01

    Full Text Available In this paper, we present the design and evaluation of a software-based wireless power transfer platform that enables the development of a prototype involving various open- and closed-loop power control functions. Our platform is based on a loosely coupled planar wireless power transfer circuit that uses a class-E power amplifier. In conjunction with this circuit, we implement flexible control functions using a National Instruments Data Acquisition (NI DAQ board and algorithms in the MATLAB/Simulink. To verify the effectiveness of our platform, we conduct two types of power-control experiments: a no-load or metal detection using open-loop power control, and an output voltage regulation for different receiver positions using closed-loop power control. The use of the MATLAB/Simulink software as a part of the planar wireless power transfer platform for power control experiments is shown to serve as a useful and inexpensive alternative to conventional hardware-based platforms.

  18. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    Science.gov (United States)

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  19. Loop Heat Pipe Startup Behaviors

    Science.gov (United States)

    Ku, Jentung

    2016-01-01

    A loop heat pipe must start successfully before it can commence its service. The startup transient represents one of the most complex phenomena in the loop heat pipe operation. This paper discusses various aspects of loop heat pipe startup behaviors. Topics include the four startup scenarios, the initial fluid distribution between the evaporator and reservoir that determines the startup scenario, factors that affect the fluid distribution between the evaporator and reservoir, difficulties encountered during the low power startup, and methods to enhance the startup success. Also addressed are the pressure spike and pressure surge during the startup transient, and repeated cycles of loop startup and shutdown under certain conditions.

  20. Modeling of compact loop antennas

    International Nuclear Information System (INIS)

    Baity, F.W.

    1987-01-01

    A general compact loop antenna model which treats all elements of the antenna as lossy transmission lines has been developed. In addition to capacitively-tuned resonant double loop (RDL) antennas the model treats stub-tuned resonant double loop antennas. Calculations using the model have been compared with measurements on full-scale mockups of resonant double loop antennas for ATF and TFTR in order to refine the transmission line parameters. Results from the model are presented for RDL antenna designs for ATF, TFTR, Tore Supra, and for the Compact Ignition Tokamak