Wireless power transfer allows a convenient, easy to use battery charging of mobile phones and other mobile devices. No hassle with cables and plugs, just place the device on a pad and thats it. Such asystem even has the potential to become a standard charging solution. Where are the limits for
Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank
Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireles...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....
Challa, Syam Sundar
A high demand for increasing need for bandwidth and data rates has paved way for optical fiber and optical wireless communications into last mile solutions for optical communications. This dissertation focuses on providing a solution to obtain Optical Wireless (OW) for indoor mobile portable devices. A new optical antenna model is proposed for such portable devices. Optical sweeping in 3D using Acousto Optics Cell Arrays (AOCAs) is proposed. This Opto-electronic method provides better coverage area for Line Of Sight optical link establishment and reconnection. The proposed method also has superior and precise beam divergence manipulation capabilities. Its geometry, coverage area and mobility are analyzed. Indoor dimensions of Height (5m), Width (20m), and Length (20m) are considered. The optical antenna can sweep through the hemispherical shape in the direction of optical beam focal plane using AOCAs. The link budget analysis is done using commercially available component ratings and the optical power for the entire coverage area of the optical antenna is found to be higher than the receiver's minimum sensitivity. The limitations on the nodes such as size and power consumption are studied and the model is designed to run efficiently on power ratings of the portable device battery. The proposed optical antenna can be fabricated in the form of a cube of size 2x2x2 mm. The optical power usage at any given time ranges from 50 mW to 0.5W. The bit error rates from SNR calculations are found to be around 10-10 at data rates of up to 4 Gbps. The Line of Sight (LOS) connection time and reestablishment time ranges from 4 to 7 mus depending on the AOCA process time. VCSEL transceiver optical characteristics are simulated to verify the validity of the model.
Rim, Chun T
From mobile, cable-free re-charging of electric vehicles, smart phones and laptops to collecting solar electricity from orbiting solar farms, wireless power transfer (WPT) technologies offer consumers and society enormous benefits. Written by innovators in the field, this comprehensive resource explains the fundamental principles and latest advances in WPT and illustrates key applications of this emergent technology.
... Federal Motor Carrier Safety Administration Use of Wireless Mobile Data Devices as Transponders for the... may now use available CMRS networks to screen trucks equipped with wireless mobile data devices used... transponders use commercially available mobile radio transmission frequencies to access cellular data networks...
Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok
Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).
Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok
Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN). PMID:27907113
Heslop, Liza; Weeding, Stephen; Dawson, Linda; Fisher, Julie; Howard, Andrew
mWard is a project whose purpose is to enhance existing clinical and administrative decision support and to consider mobile computers, connected via wireless network, for bringing clinical information to the point of care. The mWard project allowed a limited number of users to test and evaluate a selected range of mobile-wireless infrastructure and mobile health care computing devices at the neuroscience ward at Southern Health's Monash Medical Centre, Victoria, Australia. Before the project commenced, the ward had two PC's which were used as terminals by all ward-based staff and numerous multi-disciplinary staff who visited the ward each day. The first stage of the research, outlined in this paper, evaluates a selected range of mobile-wireless infrastructure.
Positioning of mobile devices in wireless communication networks is nowadays being intensively investigated due to the combined benefit of location information and communication. Typical solutions for such scenario rely on robust algorithms that estimate position from indirect measurements...... systems. Since the measurement sampling is also important for tracking moving devices, the first analysis concerns the latency time for obtaining location information in short-range ad-hoc networks. Bluetooth is the elected technology since it is an actual example of such kind of networks. Simulations......, tracking wireless devices is a challenging problem. In order to get better results, we propose a solution which restricts the movement models of the mobile devices. This restriction, by relying on the assumption that users typically move in segment-wise linear trajectories, outperforms the standard...
Mehta, Rajvi; Nankivil, Derek; Zielinski, David J; Waterman, Gar; Keller, Brenton; Limkakeng, Alexander T; Kopper, Regis; Izatt, Joseph A; Kuo, Anthony N
Jeong, Chang-Won; Joo, Su-Chong; Ryu, Jong-Hyun; Lee, Jinseok; Kim, Kyong-Woo; Yoon, Kwon-Ha
The current technologies that trend in digital radiology (DR) are toward systems using portable smart mobile as patient-centered care. We aimed to develop a mini-mobile DR system by using smart devices for wireless connection into medical information systems. We developed a mini-mobile DR system consisting of an X-ray source and a Complementary Metal-Oxide Semiconductor (CMOS) sensor based on a flat panel detector for small-field diagnostics in patients. It is used instead of the systems that are difficult to perform with a fixed traditional device. We also designed a method for embedded systems in the development of portable DR systems. The external interface used the fast and stable IEEE 802.11n wireless protocol, and we adapted the device for connections with Picture Archiving and Communication System (PACS) and smart devices. The smart device could display images on an external monitor other than the monitor in the DR system. The communication modules, main control board, and external interface supporting smart devices were implemented. Further, a smart viewer based on the external interface was developed to display image files on various smart devices. In addition, the advantage of operators is to reduce radiation dose when using remote smart devices. It is integrated with smart devices that can provide X-ray imaging services anywhere. With this technology, it can permit image observation on a smart device from a remote location by connecting to the external interface. We evaluated the response time of the mini-mobile DR system to compare to mobile PACS. The experimental results show that our system outperforms conventional mobile PACS in this regard.
Vagstad, Martin Nybø; Haugsdal, Erlend Børslid
This project describes the current state for wireless networks with regard to real-time multiplayer games on mobile devices. It looks at the limitations of these networks and mechanics to reduce the impact of the introduced network latency. The goal is to find an implementation where the user is not able to distinguish between an offline, perfect version and an online version where the user plays against other users in real time. To find this implementations the authors discuss the ch...
Rhee, Man Young
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr
Orlov, Yu.; Fedorov, S.; Samuylov, A.; Gaidamaka, Yu.; Molchanov, D.
The problem of channel quality estimation for devices in a wireless 5G network is formulated. As a performance metrics of interest we choose the signal-to-interference-plus-noise ratio, which depends essentially on the distance between the communicating devices. A model with a plurality of moving devices in a bounded three-dimensional space and a simulation algorithm to determine the distances between the devices for a given motion model are devised.
Full Text Available Nowadays, location-enabled mobile phones are becoming more and more widespread. Various players in the mobile business forecast that, in the future, a significant part of total wireless revenue will come from Location-Based Services (LBS. An LBS system extracts information about the user’s geographical location and provides services based on the positioning information. A successful LBS service should create value for the end-user, by satisfying some of the users’ needs or wants, and at the same time preserving the key factors of the mobile wireless device, such as low costs, low battery consumption, and small size. From many users’ perspectives, location services and mobile location capabilities are still rather poorly known and poorly understood. The aim of this research is to investigate users’ views on the LBS, their requirements in terms of mobile device characteristics, their concerns in terms of privacy and usability, and their opinion on LBS applications that might increase the social wellbeing in the future wireless world. Our research is based on two surveys performed among 105 students (average student age: 24 years from two European technical universities. The survey questions were intended to solicit the youngsters’ views on present and future technological trends and on their perceived needs and wishes regarding Location-Based Services, with the aim of obtaining a better understanding of designer constraints when building a location receiver and generating new ideas related to potential future killer LBS applications.
Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan
Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.
Pohjonen, Hanna; Ross, Peeter; Blickman, Johan G; Kamman, Richard
Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented that provide computing grids and streaming-based access to image and data management functions, and system architectures that enable pervasive computing on a cost-effective basis. Finally, the implications of such technologies are investigated regarding the positive impacts on clinical workflows.
Feliciano-Torres, Hector L.
The purpose of this quantitative, descriptive non experimental study was to investigate the use of wireless mobile network devices at a post-secondary institution using the innovation diffusion theory (IDT) and technology acceptance model (TAM) as background theories. The researcher intended to explore how students and personnel of the institution…
Wireless Emergency Alerts Commercial Mobile Service Provider (CMSP) Cybersecurity Guidelines Christopher Alberts Audrey Dorofee Carol Woody...Technology Direc- torate. The WEA capability provides a valuable service , disseminating emergency alerts to users of capable mobile devices if they are... mobile service providers (CMSPs)—commercial wireless carriers that broadcast WEA messages to a designated geographic area 4. Alert recipients—the
Højgaard-Hansen, Kim; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter
The performance of wireless communication networks has been shown to have a strong location dependence. Measuring the performance while having accurate location information available makes it possible to generate performance maps. In this paper we propose a framework for the generation and use of...
McCown, Steven H; Derr, Kurt W; Rohde, Kenneth W
Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.
Waffenschmidt, E.; Zheglov, V.
Wireless power transfer by magnetic induction offers a simple to use way to recharge mobile devices like e.g. mobile phone, music players or medical sensors. As shown by a previous report and an existing Power Pad demonstrator, wireless inductive power transfer is possible with a good power
McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID
Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.
Saugstrup, Dan; Henten, Anders
The main purpose of this report is to spell out a methodological approach to the analysis of user needs with respect to mobility. Furthermore, this methodological approach is used in an exemplary analysis of the relationship between user needs and technology solutions offered by different wireless...... technologies. The report is based on a research approach, emphasizing important aspects in relation to developing more user oriented mobile services and applications in a heterogeneous network environment. As a staring point, Scandinavian research within the field of social science concerning mobility...... is described and discussed. Furthermore different wireless technologies are briefly described and discussed in relation to possible transmission capacities and coverage areas. In addition to this, a preliminary framework regarding the implications of mobility on the use and development of mobile services...
Do Valle, Bruno G; Cash, Sydney S; Sodini, Charlie G
EEG remains the mainstay test for the diagnosis and treatment of patients with epilepsy. Unfortunately, ambulatory EEG systems are far from ideal for patients that have infrequent seizures. The systems only last up to 3 days and if a seizure is not captured during the recordings, the doctor cannot give a definite diagnosis of the patient's condition. The ambulatory systems also suffers from being too bulky and posing some constraints on the patient, such as not being able to shower during the recordings. This paper presents a novel behind-the-ear EEG recording device that uses an iPhone or iPod Touch to continuously upload the patient's data to a secure server. This device not only gives the doctors access to the EEG data in real time but it can be easily removed and re-applied by the patient at any time, thus reducing the interference with quality of life.
Topic: Using a qualitative methodology, this study attempts to provide a general framework of the functions of mobile communication, and to identify the specific preferences of mobile phone users regarding the commercial messages received on their personal devices. Research objectives: (1) To identify the specific characteristics of mobile communication as perceived by mobile users; (2) to define and analyze the functions of wireless communication as perceived by mobile phone users; and (3) t...
Full Text Available Background: It is necessary to deploy mobile and wireless systems in healthcare, because they have many benefits for healthcare systems. The objectives of this article were introducing various systems, applications, and standards of the wireless and mobile telemedicine. Material and Methods: This review study was conducted in 2010. To conduct the study, published articles in the years 2005 to 2012, in English with an emphasis on wireless and mobile technologies in health were studied. Search was done with key words include telemedicine, wireless health systems, health and telecommunications technology in databases including Pubmed, Science Direct, Google Scholar, Web of Sciences, Proquest. The collected data were analyzed. Results: Telemedicine system in the ambulance, telemedicine systems in space, telecardiology systems, EEG system, ultrasound system are some types of wireless and mobile systems in telemedicine. PDA-based mobile and wireless telemedicine application, based PDA drug application, and patient tracking application are some of wireless and mobile applications of telemedicine. The most important standards of wireless and mobile telemedicine are HL7, DICOM, SNOMed, and ICD-9-CM. Conclusion: There are many challenges in the wireless and mobile systems in telemedicine, despite the many benefits. Slow speed in sending pictures and video, lack of attention to the privacy in the design of these systems, environmental variables and the number of users during the day are some of these challenges. It is recommended to consider these challenges during the planning and designing of wireless and mobile systems in telemedicine.
Wattanapongsakorn, Naruemon; Joukov, Nikolai
This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest developments in mobile software development.
Wireless mobile ad-hoc networks are formed by mobile devices that set up a possibly short-lived network for communication needs of the moment. Ad-hoc networks are decentralized, self-organizing networks capable of forming a communication network without relying on any fixed infrastructure. Each node
In the past several years, personal mobile devices have developed rapidly as versatile computing platforms, capable of installing and running many different applications. Often, these devices are equipped with multiple (wireless) network interfaces supporting internet access through one or more
Yang, Samuel C.
Purpose: The use of mobile wireless data services continues to increase worldwide. New fourth-generation (4G) wireless networks can deliver data rates exceeding 2 Mbps. The purpose of this paper is to develop a framework of 4G mobile applications that utilize such high data rates and run on small form-factor devices. Design/methodology/approach:…
Hyung-Nam Kim; Won-Yong Chae; Dong-Sul Shin; Ho-Sung Kim; Hee-Je Kim
A wireless power transfer system can attribute to the fields in robot, aviation and space in which lightening the weight of device and improving the movement play an important role. A wireless power transfer system was investigated to overcome the inconvenience of using power cable. Especially a wireless power transfer technology is important element for mobile robots. We proposed the wireless power transfer system of the half-bridge resonant converter with the frequency ...
Mobile medical devices, such as infusion pumps, provide an important therapeutic function. They are also valuable sources of information about treatment patterns at the point of care. However, these mobile devices have been independent islands of valuable information, unable to share the data they gather with other hospital information resources on a real time basis. Although data from these devices can provide significant improvements for medical safety and vital information needed for clinical best practice development, gathering that data poses significant challenges when interfacing with hospital information systems. Mobile medical devices move from place to place as independent actors, raising a series of security and identification issues when they need to be disconnected and reconnected using traditional tethered cable connections. The continuing lack of accepted communications protocol standards, in spite of the concentrated efforts of organizations like the IEEE and the Medical Information Bus (IEEE 1073) to establish them, has made integration into the hospital information system a complex and non-standard task. The rapid spread in availability and adoption of high-speed 802.11 wireless systems in hospitals offers a realistic connectivity solution for mobile medical devices. Inspite of this, the 802.11 standard is still evolving, and current security methods designed for user-based products like PDAs and laptop computers are not ideal for unmanned mobile medical devices because they assume the availability of a human operator to authenticate a wireless session. In the absence of accepted standards, manufacturers have created practical and innovative solutions to support the collection of clinical data from mobile medical devices and the integration of that data with hospital information systems. This paper will explore the potential benefits of integrating mobile medical devices into the hospital information system, and describe the challenges in
This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security. The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community. The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software. The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology...
Sun, Yunlong; Li, Ting
Mobile internet is growing rapidly driven by high-tech companies including the popular Apple and Google. The wireless mini-NIRS is believed to deserve a great spread future, while there is sparse report on wireless NIRS device and even for the reported wireless NIRS, its wireless design is scarcely presented. Here we focused on the wireless design of NIRS devices. The widely-used wireless communication standards and wireless communication typical solutions were employed into our NIRS design and then compared on communication efficiency, distance, error rate, low-cost, power consumption, and stabilities, based on the requirements of NIRS applications. The properly-performed wireless communication methods matched with the characteristics of NIRS are picked out. Finally, we realized one recommended wireless communication in our NIRS, developed a test platform on wireless NIRS and tested the full properties on wireless communication. This study elaborated the wireless communication methods specified for NIRS and suggested one implementation with one example fully illustrated, which support the future mobile design on NIRS devices.
Bailey, Timothy S; Wallace, Jane F; Pardo, Scott; Warchal-Windham, Mary Ellen; Harrison, Bern; Morin, Robert; Christiansen, Mark
The new Contour ® Plus ONE blood glucose monitoring system (BGMS) features an easy-to-use, wireless-enabled blood glucose meter that links to a smart mobile device via Bluetooth ® connectivity and can sync with the Contour ™ Diabetes app on a smartphone or tablet. The accuracy of the new BGMS was assessed in 2 studies according to ISO 15197:2013 criteria. In Study 1 (laboratory study), fingertip capillary blood samples from 100 subjects were tested in duplicate using 3 test strip lots. In Study 2 (clinical study), 134 subjects with type 1 or type 2 diabetes enrolled at 2 clinical sites. BGMS results and YSI analyzer (YSI) reference results were compared for fingertip blood obtained by untrained subjects' self-testing and for study staff-obtained fingertip, subject palm, and venous results. In Study 1, 99.0% (594/600) of combined results for all 3 test strip lots fulfilled ISO 15197:2013 Section 6.3 accuracy criteria. In Study 2, 99.2% (133/134) of subject-obtained capillary fingertip results, 99.2% (133/134) of study staff-obtained fingertip results, 99.2% (125/126) of subject-obtained palm results, and 100% (132/132) of study staff-obtained venous results met ISO 15197:2013 Section 8 accuracy criteria. Moreover, 95.5% (128/134) of subject-obtained fingertip self-test results were within ±10 mg/dl (±0.6 mmol/L) or ±10% of the YSI reference result. Questionnaire results showed that most subjects found the BGMS easy to use. The BGMS exceeded ISO 15197:2013 accuracy criteria both in the laboratory and in a clinical setting when used by untrained subjects with diabetes.
Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)
Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.
de Vries, I.O.
While many studies on mobile wireless communication devices predominantly take a micro-scale approach and concentrate their often ethnographically informed focus on use values, social implications, conversation strategies, changing norms and ethics, culture-dependent domestication, and so forth,
Ziaul Haq Abbas
Wireless Internet access is almost pervasive nowadays, and many types of wireless networks can be used to access the Internet. However, along with this growth, there is an even greater concern about the energy consumption and efficiency of mobile devices as well as of the supporting networks, triggering the appearance of the concept of green communication. While some efforts have been made towards this direction, challenges still exist and need to be tackled from diverse perspectives. Cellular networks, WLANs, and ad hoc networks in the form of wireless mesh networks are the most popular technologies for wireless Internet access. The availability of such a variety of access networks has also paved the way to explore synergistic approaches for Internet access, leading to the concept of hybrid networks and relay communications. In addition, many mobile devices are being equipped with multiple interfaces, enabling them to operate in hybrid networks. In contrast, the improvements in the battery technology itself have not matched the pace of the emerging mobile applications. The situation becomes more sophisticated when a mobile device functions also as a relay node to forward other station's data. In the literature, energy efficiency of mobile devices has been addressed from various perspectives such as protocol-level efforts, battery management efforts, etc. However, there is little work on energy efficiency in hybrid mobile and wireless networks and devices with heterogeneous connections. For example, when there are multiple networks available to a mobile device, how to achieve optimum long-term energy consumption of such a device is an open question. Furthermore, in today's cellular networks, micro-, pico-, and femto-cells are the most popular network topologies in order to support high data rate services and high user density. With the growth of such small-cell solutions, the energy consumption of these networks is also becoming an important concern for operators
With today's consumers spending more time on their mobiles than on their PCs, new methods of empirical stochastic modeling have emerged that can provide marketers with detailed information about the products, content, and services their customers desire.Data Mining Mobile Devices defines the collection of machine-sensed environmental data pertaining to human social behavior. It explains how the integration of data mining and machine learning can enable the modeling of conversation context, proximity sensing, and geospatial location throughout large communities of mobile users
Full Text Available is critical. This is partly because timing recovery functions must follow rapid parameter changes inherent in mobile systems and partly because both bandwidth and power must be conserved in low signal to noise ratio communication channels. The ultimate goal... in low signal to noise ratios. In order to develop a bandwidth and power efficient timing recovery method for wireless mobile receivers, a raised cosine filter and a multilevel phase shift keying modulation scheme are implemented and no clock signals...
Dixit, Sudhir; Prasad, Ramjee
..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...
Sarkar, Subir Kumar
The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv
Banitsas, K A; Georgiadis, P; Tachakra, S; Cavouras, D
Recent advances in the hardware of handheld devices, opened up the way for newer applications in the healthcare sector, and more specifically, in the teleconsultation field. Out of these devices, this paper focuses on the services that personal digital assistants and smartphones can provide to improve the speed, quality and ease of delivering a medical opinion from a distance and laying the ground for an all-wireless hospital. In that manner, PDAs were used to wirelessly support the viewing of digital imaging and communication in medicine (DICOM) images and to allow for mobile videoconferencing while within the hospital. Smartphones were also used to carry still images, multiframes and live video outside the hospital. Both of these applications aimed at increasing the mobility of the consultant while improving the healthcare service.
Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.
The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.
Song, Lei; Godskesen, Jens Christian
from a location it will evolve to a network distribution depending on whether nodes at other locations receive the message or not. Mobility of locations is not arbitrary but guarded by a probabilistic mobility function (PMF) and we also define the notion of a weak bisimulation given a PMF......In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message...
..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... importing wireless communication devices, portable music and data processing devices, and tablet computers... filed by Samsung Electronics Co., Ltd. of Korea and Samsung Telecommunications America, LLC of...
..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... Samsung Electronics Co., Ltd. of Seoul, Republic of Korea, and Samsung Telecommunications America, LLC of... certain electronic devices, including wireless communication devices, portable music and data processing...
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof, Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers...
Sarkar, Subir Kumar; Puttamadappa, C
Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies
P. Pappas, George; A. Zohdy, Mohamed
In this paper accurate estimation of parameters, higher order state space prediction methods and Extended Kalman filter (EKF) for modeling shadow power in wireless mobile communications are developed. Path-loss parameter estimation models are compared and evaluated. Shadow power estimation methods in wireless cellular communications are very important for use in power control of mobile device and base station. The methods are validated and compared to existing methods, Kalman Filter (KF) with...
Kaur, Gagandeep; Saini, J. S.
In infrastructure wireless environments, a base station provides communication links between mobile client and remote servers. Placing a proxy cache at the base station is an effective way of managing the wireless Internet bandwidth efficiently. However, in the situation of non-uniform heavy traffic, requests of all the mobile clients in the service area of the base station may cause overload in the cache. If the proxy cache has to release some cache space for the new mobile client in the environment, overload occurs. In this paper, we propose a novel cache management strategy to decrease the penalty of overloaded traffic on the proxy and to reduce the number of remote accesses by increasing the cache hit ratio. We predict the number of overload ahead of time based on its history and adapt the cache for the heavy traffic to be able to provide continuous and fair service to the current mobile clients and incoming ones. We have tested the algorithms over a real implementation of the cache management system in presence of fault tolerance and security. In our cache replacement algorithm, mobility of the clients, predicted overload number, size of the cached packets and their access frequencies are considered altogether. Performance results show that our cache management strategy outperforms the existing policies with less number of overloads and higher cache hit ratio.
The tremendous demand is pushing the development of wireless mobile communications faster than ever before. Handoff management has widely been recognized as one of the most important and challenging problems for a seamless access to wireless network and mobile services. Mobility Models plays an important ...
Milorad S. Markagić
Full Text Available The article gives an overview of possibilities of digitized mobile(portable devices, and methods of research data with them.Emphasis is placed on the forensic investigation of mobilephones, but are covered by other media and research for digitalprocessing, transmission and storage of information.A special emphasis was made on the software tools in carrying out the acquisition of digital data, with the aim of sending the reader on ways and methods to protect data but also knowledgewhich is the same all be found and how they can be misused for criminal purposes
Full Text Available Topic: Using a qualitative methodology, this study attempts to provide a general framework of the functions of mobile communication, and to identify the specific preferences of mobile phone users regarding the commercial messages received on their personal devices. Research objectives: (1 To identify the specific characteristics of mobile communication as perceived by mobile users; (2 to define and analyze the functions of wireless communication as perceived by mobile phone users; and (3 to investigate users preference regarding the content of commercial wireless communication. Previous research: Bauer et al. (2002 identified time, location, information and personalization as relevant acceptance factors for mobile advertising. Barwise and Strong (2002 developed a conceptual model, arguing that social norms, user's motives, mode, time, location and personal characteristics will affect the processing of mobile information by consumers. Tsang et al. (2004 evidenced the influence of entertainment, informativeness and irritation, while Bauer et al. (2005 argued that consumer attitudes are influenced by perceived information, entertainment, and social utility. In a similar study, Xu and Gutierrez (2006 tested the effect of entertainment, irritation, informativeness, credibility and personalization on the attitudes of Chinese consumers. Research methodology: First, a series of academic and practical articles and reports have been accessed in order to assess the existing knowledge on this topic. Second, five focus groups have been organized with six mobile phone users, aged between 20 and 40 years old. Each focus group comprised an equal number of male and female participants. The focus groups lasted between 45 and 60 minutes and addressed three main issues: the specific characteristics of the mobile phones as a commercial communication media, the functions of mobile phone communication, and the specific preferences of mobile phones users regarding the
Song, Ji-Won; Norman, Donald; Nam, Tek-Jin; Qin, Shengfeng
Users, especially the non-expert users, commonly experience problems when connecting multiple devices with interoperability. While studies on multiple device connections are mostly concentrated on spontaneous device association techniques with a focus on security aspects, the research on user interaction for device connection is still limited. More research into understanding people is needed for designers to devise usable techniques. This research applies the Research-through-Design method and studies the non-expert users' interactions in establishing wireless connections between devices. The "Learning from Examples" concept is adopted to develop a study focus line by learning from the expert users' interaction with devices. This focus line is then used for guiding researchers to explore the non-expert users' difficulties at each stage of the focus line. Finally, the Research-through-Design approach is used to understand the users' difficulties, gain insights to design problems and suggest usable solutions. When connecting a device, the user is required to manage not only the device's functionality but also the interaction between devices. Based on learning from failures, an important insight is found that the existing design approach to improve single-device interaction issues, such as improvements to graphical user interfaces or computer guidance, cannot help users to handle problems between multiple devices. This study finally proposes a desirable user-device interaction in which images of two devices function together with a system image to provide the user with feedback on the status of the connection, which allows them to infer any required actions.
Hailan, Jin; Jing, Liu
We proposed and realized a new device that acquires microscopic image wirelessly based on mobile phone and WiFi system. The mobile terminals could record, display and store the image from the far end via the wireless LAN. Using this system, a series of conceptual experiments on monitoring the microscopic images of common objects and liver cancer cells were successfully demonstrated. This system is expected to have important value in the experimental investigations on wirelessly monitoring the cell culture, and small insect etc.
The rapidly growing world population and increasingly dense settlements demand ever-larger and more complex buildings from today's engineers. In comparison to this technological progress, a building's equipment for emergency evacuation has been hardly developed further. This work presents a concept for a building evacuation system based on mobile devices. Furthermore, various algorithms for route planning with mobile devices and for indoor localization of mobile devices are addressed.
Campagna, Rich; Krishnan, Ashwin
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati
Full Text Available The constant evolution of wireless handheld devices together with the apparition of multiple wireless communication systems fosters the antenna community to design new radiating and measurements systems capable of satisfying the market demands. It is an object of the present paper to provide an overview of the evolution that wireless handheld technology has experienced in the last years. In this sense, a description of the evolution of wireless handheld devices, regulations, challenges in today’s smartphones, and handset characterization is reviewed. Finally, recent advances in antenna technology for wireless handheld or portable devices are presented.
Fasseas, Michael K; Fragopoulou, Adamantia F; Manta, Areti K; Skouroliakou, Aikaterini; Vekrellis, Konstantinos; Margaritis, Lukas H; Syntichaki, Popi
To examine the impact of electromagnetic radiation, produced by GSM (Global System for Mobile communications) mobile phones, Wi-Fi (Wireless-Fidelity) routers and wireless DECT (Digital Enhanced Cordless Telecommunications) phones, on the nematode Caenorhabditis elegans. We exposed synchronized populations, of different developmental stages, to these wireless devices at E-field levels below ICNIRP's (International Commission on Non-Ionizing Radiation Protection) guidelines for various lengths of time. WT (wild-type) and aging- or stress-sensitive mutant worms were examined for changes in growth, fertility, lifespan, chemotaxis, short-term memory, increased ROS (Reactive Oxygen Species) production and apoptosis by using fluorescent marker genes or qRT-PCR (quantitative Reverse Transcription-Polymerase Chain Reaction). No statistically significant differences were found between the exposed and the sham/control animals in any of the experiments concerning lifespan, fertility, growth, memory, ROS, apoptosis or gene expression. The worm appears to be robust to this form of (pulsed) radiation, at least under the exposure conditions used.
Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.
Morrison, Carlos R.; Provenza, Andrew J.; Choi, Benjamin B.; Bakhle, Milind A.; Min, James B.; Stefko, George L.; Duffy, Kirsten P.; Fougers, Alan J.
Vibration in turbomachinery can cause blade failures and leads to the use of heavier, thicker blades that result in lower aerodynamic efficiency and increased noise. Metal and/or composite fatigue in the blades of jet engines has resulted in blade destruction and loss of lives. Techniques for suppressing low-frequency blade vibration, such as gtuned circuit resistive dissipation of vibratory energy, h or simply "passive damping," can require electronics incorporating coils of unwieldy dimensions and adding unwanted weight to the rotor. Other approaches, using vibration-dampening devices or damping material, could add undesirable weight to the blades or hub, making them less efficient. A wireless inductive power device (WIPD) was designed, fabricated, and developed for use in the NASA Glenn's "Dynamic Spin Rig" (DSR) facility. The DSR is used to simulate the functionality of turbomachinery. The relatively small and lightweight device [10 lb (approx.=4.5 kg)] replaces the existing venerable and bulky slip-ring. The goal is the eventual integration of this technology into actual turbomachinery such as jet engines or electric power generators, wherein the device will facilitate the suppression of potentially destructive vibrations in fan blades. This technology obviates slip rings, which require cooling and can prove unreliable or be problematic over time. The WIPD consists of two parts: a remote element, which is positioned on the rotor and provides up to 100 W of electrical power to thin, lightweight piezoelectric patches strategically placed on/in fan blades; and a stationary base unit that wirelessly communicates with the remote unit. The base unit supplies inductive power, and also acts as an input and output corridor for wireless measurement, and active control command to the remote unit. Efficient engine operation necessitates minimal disturbance to the gas flow across the turbine blades in any effort to moderate blade vibration. This innovation makes it
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-794] Certain Electronic Devices, Including Wireless Commmunication Devices, Portable Music and Data Processing Devices, and Tablet Computers... communication devices, portable music and data processing devices, and tablet computers, imported by Apple Inc...
Abraham, Jose K.; Whitchurch, Ashwin; Varadan, Vijay K.
The design and development of wireless mocrosensor network systems for the treatment of many degenerative as well as traumatic neurological disorders is presented in this paper. Due to the advances in micro and nano sensors and wireless systems, the biomedical sensors have the potential to revolutionize many areas in healthcare systems. The integration of nanodevices with neurons that are in communication with smart microsensor systems has great potential in the treatment of many neurodegenerative brain disorders. It is well established that patients suffering from either Parkinson"s disease (PD) or Epilepsy have benefited from the advantages of implantable devices in the neural pathways of the brain to alter the undesired signals thus restoring proper function. In addition, implantable devices have successfully blocked pain signals and controlled various pelvic muscles in patients with urinary and fecal incontinence. Even though the existing technology has made a tremendous impact on controlling the deleterious effects of disease, it is still in its infancy. This paper presents solutions of many problems of today's implantable and neural-electronic interface devices by combining nanowires and microelectronics with BioMEMS and applying them at cellular level for the development of a total wireless feedback control system. The only device that will actually be implanted in this research is the electrodes. All necessary controllers will be housed in accessories that are outside the body that communicate with the implanted electrodes through tiny inductively-coupled antennas. A Parkinson disease patient can just wear a hat-system close to the implantable neural probe so that the patient is free to move around, while the sensors continually monitor, record, transmit all vital information to health care specialist. In the event of a problem, the system provides an early warning to the patient while they are still mobile thus providing them the opportunity to react and
Helin, Mikko; Jarvinen, Jari; Kalliokorpi, Janne; Kolehmainen, Jari; Narikka, Jorma
Wireless mobile connections have some well known disadvantages, like slow data rate, high and variable error-rate. In addition to that there are possible (and probable) inefficiencies when connecting different types of protocols stacks, like running TCP over GPRS. On the other hand mobile and portable devices have some limitations, which are based on their size and cannot therefore be removed totally. Potential users are so-called common people and they would like to have very simple-to-use applications solving their daily problems, not causing new ones. One approach to make this situation better is to use agents. They could operate on many different levels, like connecting different physical servers to produce the service needed, connecting different services together, optimizing for different types of user devices, connecting different message types (like audio, animation etc.) to produce the service, making transformations (like reading e-mails as voice mail etc.). This paper will discuss these various aspects of agent technology in the context of mobile services provided to consumers. Discussion and conclusions are partly based on the ZanderMail project. Although it is a mail agent project its results can easily be extended to various message types and various other services, like those based on the location of mobile device. The paper will cover widely these different ideas and ZanderMail is just used as an example and a tool for testing various issues. The idea is to utilize agents many ways to fade away at least partly those known problems mentioned in the beginning. An agent could operate in the network quite near the mobile device to overcome the problem caused by different protocol stacks. It could make logical decisions based on location and other local information, like weather, and it could handle priority issues on various levels of application(s).
Tan, Zheng-Hua; Lindberg, Børge
The enthusiasm of deploying automatic speech recognition (ASR) on mobile devices is driven both by remarkable advances in ASR technology and by the demand for efficient user interfaces on such devices as mobile phones and personal digital assistants (PDAs). This chapter presents an overview of ASR...... in the mobile context covering motivations, challenges, fundamental techniques and applications. Three ASR architectures are introduced: embedded speech recognition, distributed speech recognition and network speech recognition. Their pros and cons and implementation issues are discussed. Applications within...... command and control, text entry and search are presented with an emphasis on mobile text entry....
Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime
We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.
Mobile Devices: Tools and Technologies provides readers with an understanding of the mobile landscape available to app developers, system and network engineers, and the avid techie. As the trend of mobile technology has enabled the continuous development of ubiquitous applications, this book offers insights into tools and technologies critical to evaluating and implementing mobile strategies.The book is organized into four parts of 18 contributed chapters written by engineers in the areas of application and database development, mobile enterprise strategy, and networking and security. Througho
Thotahewa, Kasun M S; Redoute, Jean-Michel; Yuce, Mehmet Rasit
Wireless capsule endoscopy (WCE) presents many advantages over traditional wired endoscopic methods. The performance of WCE devices can be improved using high-frequency communication systems such as Impulse Radio-Ultra-Wideband (IR-UWB) to enable a high data rate transmission with low-power consumption. This paper presents the hardware implementation and experimental evaluation of a WCE device that uses IR-UWB signals in the frequency range of 3.5 GHz to 4.5 GHz to transmit image data from inside the body to a receiver placed outside the body. Key components of the IR-UWB transmitter, such as the narrow pulse generator and up-conversion based RF section are described in detail. This design employs a narrowband receiver in the WCE device to receive a control signal externally in order to control and improve the data transmission from the device in the body. The design and performance of a wideband implantable antenna that operates in the aforementioned frequency range is also described. The operation of the WCE device is demonstrated through a proof-of-concept experiment using meat.
This thesis focuses on mobile devices and it specifically investigates the effect of their physical form on two perceived user experience qualities, usability and coolness. With the term mobile devices, I refer to interactive products that users interact with while being on the move......, and with the term physical form I refer to the physical elements that constitute a mobile device as a whole, such as weight, size and materials. The selected research area was addressed through two research questions, one focusing on effects of physical form on usability and the other on effects on coolness...... that the overall physical form of a mobile device has a significant effect on the perceived usability of an application: the more attractive the physical form, the higher the perceived usability. The other study validated the effect of a particular physical form element on usability and showed that the screen size...
Vasudevan, Amit; Newsome, James
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.
... Music and Data Processing Devices, Computers, and Components Thereof; Notice of Receipt of Complaint... complaint entitled Wireless Communication Devices, Portable Music and Data Processing Devices, Computers..., portable music and data processing devices, computers, and components thereof. The complaint names as...
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of... communication devices, portable music and data processing devices, computers and components thereof by reason of...
Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies
..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... Samsung Electronics Co., Ltd. of Korea and Samsung Telecommunications America, LLC of Richardson, Texas... wireless communication devices, portable music and data processing devices, and tablet computers, by reason...
In this study, a new protective design compatible with existing non-secure systems was proposed, since it is focused on the secure communication of wireless IMD systems in all transmissions. This new protector is an external wearable device and appears to be a belt fitted around for the patients IMD implanted. However, in order to provide effective full duplex transmissions and physical layer security, some sophisticated transceiver antennas have been placed on the belt. In this approach, beam-focused multi-antennas in optimal positions on the belt are randomly switched when transmissions to the IMD are performed and multi-jammer switching with MRC combining or majority-rule based receiving techniques are applied when transmissions from the IMD are carried out. This approach can also reduce the power consumption of the IMDs and contribute to the prolongation of the IMD's battery life.
Kayastha, M.; Chowdhry, B.S.; Memon, A.R.
This paper describes implementation of mobile IP services in two separate wireless LANs based on IEEE 802.11b standards, located in two distant buildings of a university campus. The purpose of the project was to achieve smooth hand-off when a mobile node moves between the two LANs. During our experimentation we have identified some of the limitation of IEEE 802.11b that affects mobile 1P smooth hand off. We have also proposed an algorithm to solve this problem when the mobility is within a limited number of separate wireless LANs. (author)
Waaij, B.D. van der; Siljee, B.I.J.; Broekhuijsen, B.J.; Ponsioen, C.; Maas, A.; Aten, R.M.; Hoepman, J.H.; Loon, J.H. van; Smit, M.
A method of making a payment uses a first mobile communication device (1) and a second mobile communication device (2), each mobile communication device being provided with a respective near field communication unit (11, 21) and at least one of the mobile communication devices being provided with an
Bernhardt, Jay M.; Usdan, Stuart; Mays, Darren; Martin, Ryan; Cremeens, Jennifer; Arriola, Kimberly Jacob
Objective: This study used a two-group randomized design to assess the validity of measuring self-reported alcohol consumption among college students using the Handheld Assisted Network Diary (HAND), a daily diary assessment administered using wireless mobile devices. Method: A convenience sample of college students was recruited at a large, public university in the southeastern United States and randomized into two groups. A randomly assigned group of 86 students completed the daily HAND assessment during the 30-day study and a Timeline Followback (TLFB) at 30-day follow-up. A randomly assigned group of 82 students completed the paper-and-pencil Daily Social Diary (DSD) over the same study period. Data from the daily HAND assessment were compared with the TLFB completed at follow-up by participants who completed the HAND using 95% limits of agreement analysis. Furthermore, individual growth models were used to examine differences between the HAND and DSD by comparing the total drinks, drinking days, and drinks per drinking day captured by the two assessments over the study period. Results: Results suggest that the HAND captured similar levels of alcohol use compared with the TLFB completed at follow-up by the same participants. In addition, comparisons of the two study groups suggest that, controlling for baseline alcohol use and demographics, the HAND assessment captured similar levels of total drinks, drinking days, and drinks per drinking day as the paper-and-pencil DSD. Conclusions: The study findings support the validity of wireless mobile devices as a daily assessment of alcohol use among college students. PMID:19737502
Full Text Available Provision of ubiquitous healthcare solutions which provide healthcare services at anytime anywhere has become more favorable nowadays due to the emphasis on healthcare awareness and also the growth of mobile wireless technologies. Following this approach, an Android™ smart phone device is proposed as a mobile monitoring terminal to observe and analyze ECG (electrocardiography waveforms from wearable ECG devices in real time under the coverage of a wireless sensor network (WSN. The exploitation of WSN in healthcare is able to substitute the complicated wired technology, moving healthcare away from a fixed location setting. As an extension to the monitoring scheme, medicine care is taken into consideration by utilizing the mobile phone as a barcode decoder, to verify and assist out-patients in the medication administration process, providing a better and more comprehensive healthcare service.
Mobile devices have become an ever-present and indispensible part of our lives. Despite this pronounced ubiquity, few studies have addressed the influence of mobile devices on everyday social interaction. The purpose of this article is to examine such social ramifications. Specifically, this study...... at stake in such impaired social interaction include delayed responses, mechanical intonation, a motionless body, and a lack of eye contact. Appropriating developmental psychologist Daniel Stern’s terminology, it is suggested that this mismatch between the vitality of a person and his or her absently...
Shanker Jha, Uma; Prasad, Ramjee
of mobile broadband wireless access and the standards developed by the IEEE 802.16 standards organization. The book gives practitioners a solid understaning of: Basic requirements of fixed and mobile broadband access technologies. Fundamentals of orthogonal frequency division multiplexing (OFDM...
The problem of timing recovery in wireless mobile receiver systems is critical. This is partly because timing recovery functions must follow rapid parameter changes inherent in mobile systems and partly because both bandwidth and power must be conserved in low signal to noise ratio communication channels. The ultimate ...
Sun, Shou-jun; Wu, Kai; Wu, Xiao-Ming
This paper presents a wireless mobile monitoring system based on Bluetooth technology. This system realizes the remote mobile monitoring of multiple physiological parameters, and has the characters of easy use, low cost, good reliability and strong capability of anti-jamming.
Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos
Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets
National Aeronautics and Space Administration — Mobitrum is proposing to develop a broadband wireless device for real-time data acquisition and monitoring applicable to the field instrumentation and control...
Delcker, Jan; Honal, Andrea; Ifenthaler, Dirk
This paper focuses on mobile device usage of students in higher education. While more and more students embrace mobile devices in their daily life, institutions attempt to profit from those devices for educational purposes. It is therefore crucial for institutional development to identify students' needs and how mobile devices may facilitate these…
During the last decade, wireless technologies have revolutionized the industrial automation sector by enabling wireless sensing and actuation for industrial applications. Most of these recently developed industrial standards are built on top of IEEE802.15.4 interface, which uses 2.4GHz frequency
Pervasive Mobile and Ambient Wireless Communications reports the findings of COST 2100, a project of the European intergovernmental COST framework addressing various topics currently emerging in mobile and wireless communications. Drawing on experience developed in this and earlier COST projects, the text represents the final outcome of collaborative work involving more than 500 researchers in 140 institutions and 30 countries (including outside Europe). The book’s subject matter includes: • transmission techniques; • signal processing; • radio channel modelling and measurement; • radio network issues; and • recent paradigms including ultra-wideband, cooperative, vehicle-to-vehicle and body communications. The research reported comes from a variety of backgrounds: academic, equipment-manufacturing and operational. The information contained in this book will bring the study reported to a wider audience from all those spheres of work. Pervasive Mobile and Ambient Wireless Communications will be of i...
Lee, S.; Kim, Y.S.; Ye, S.H.
This paper introduces cyber security evaluation results and a design of the wireless communication technology to apply to safeguard systems in nuclear power plants. While wireless communication technologies can generally make mobility and efficiency on plant operation, those have seldom been installed on the nuclear I&C systems due to the negative concern of unexpected outcomes that stem from electromagnetic interference and cyber attack. New design of advanced digital safeguard and I&C systems uses computer-based systems for the safeguard and safety functions. On the other hand, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. In order to employ the wireless communication technology in safeguard function, licencees assess and manage the potential for adverse effects on safeguard and safety functions so as to provide high assurance that critical functions are properly protected cyber attack. It is expected that the safeguard function, specifically on the area of real-time monitoring, logging, can be enhanced by employing the mobile safeguard devices (: smart phone, laptop, smart pad, etc). In this paper, we deal with the cyber security evaluation, which consists of threat analysis, vulnerability test, establishment of security plan, and design solutions for the wireless communication on the basis of IEEE 802.11(Wi-Fi) protocol. Proposed evaluation and design solution could be a basis for the design of wireless communication and mobile safeguard systems in nuclear power plants. (author)
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of Request for Statements on the Public Interest AGENCY: U.S. International Trade Commission. ACTION: Notice...
A low-cost, inkjet-printed multiband monopole antenna for conformal wireless applications is presented for the first time. The antenna is implemented on a low cost resin coated paper substrate which can be used for conformal devices. The antenna developed here is composed of four branch lines on the radiator and three L-shaped slots on the ground plane that help to generate multiple bands without increasing the size of the antenna. The antenna has a compact size, making it suitable for handheld and wearable wireless devices. Details of the inkjet printing fabrication processes and related issues are presented. The antennas were characterized under flat and bent conditions and the results indicate that the antennas can cover most bands for mobile and wireless applications such as PCS, UMTS, GSM1900 and WLAN
Sahar A. Idwan
Full Text Available This paper presents Mobile application via Bluetooth wireless technology (MAvBT that enhance the student portal in universities by connecting students' mobile phone devices to a server application that benefit from the devices Bluetooth technology and the storage abilities. MAvBT enables students to retrieve their information with minimum time and anywhere ranging from 100m up to 1Km and it facilitate the communication with instructors outside the office hours. This system consists of computer application (Server Application installed on a Bluetooth enabled computer, Mobile application (client application installed on students’ mobile phone devices, and a website that enable the instructors to edit their materials or enable the demonstrator to get some important reports. Experimental results show that the proposed system is faster, effortless, and cheaper.
Full Text Available et.al, 2006) ? An attempt to compromise the security of the mechanism undergoing the test, it can be host or network based (Fiocca, 2009) Difference: pen-testing and hacking is permission Its purpose is to find system vulnerabilities ? CSIR 2012... is not enough, cell-phones can hack too ? Pocket sized device is more convenient, since it is easy to carry around at anytime ? A power plug is not innocent, need to look for activity other than just traditional PCs / devices ? CSIR 2012 Slide 6 Mobile...
Weber, Gisela; Hagedorn, Gregor
The development of increasingly powerful mobile devices like PDAs (Personal Digital Assistants) and Smartphones, with larger displays and greater resolution makes them increasingly suitable for identification tools available directly “in the field”. One of several approaches towards this aim in the KeyToNature project is based on wiki-stored documents. Important features of wiki-based keys, such as hidden text and media information as well as links to glossary entries are su...
Aldridge, Chris D.
Mobile biometric devices (MBDs) capable of both enrolling individuals in databases and performing identification checks of subjects in the field are seen as an important capability for military, law enforcement, and homeland security operations. The technology is advancing rapidly. The Department of Homeland Security Science and Technology Directorate through an Interagency Agreement with Sandia sponsored a series of pilot projects to obtain information for the first responder law enforcement community on further identification of requirements for mobile biometric device technology. Working with 62 different jurisdictions, including components of the Department of Homeland Security, Sandia delivered a series of reports on user operation of state-of-the-art mobile biometric devices. These reports included feedback information on MBD usage in both operational and exercise scenarios. The findings and conclusions of the project address both the limitations and possibilities of MBD technology to improve operations. Evidence of these possibilities can be found in the adoption of this technology by many agencies today and the cooperation of several law enforcement agencies in both participating in the pilot efforts and sharing of information about their own experiences in efforts undertaken separately.
Pu, Haitao; Lin, Jinjiao; Song, Yanwei; Liu, Fasheng
Mobile learning is e-learning delivered through mobile computing devices, which represents the next stage of computer-aided, multi-media based learning. Therefore, mobile learning is transforming the way of traditional education. However, as most current e-learning systems and their contents are not suitable for mobile devices, an approach for…
Brønsted, Jeppe; Hansen, Klaus Marius; Thorup, Rolf
systems and therefore it is important to have communication middleware that hides the complexity of low level network programming and presents a clean and understandable abstraction over communication to the application programmer. It has previously been shown that the publish-subscribe messaging paradigm...... provides a good communication abstraction for wireless networks of mobile nodes. In this paper we present PSI, a uniform publish-subscribe based infrastructure, for communication in wireless mobile environments. In PSI the application is divided into software components that each handles a well defined......In near future the transportation sector will be communication enabled. Devices in vehicles will be able to communicate and thus make a new range of services possible. However, heterogeneous communication capabilities and vehicle mobility complicates the art of designing and implementing these new...
Full Text Available This work addresses the problem of tracking mobile robots in indoor wireless sensor networks (WSNs. Our approach is based on a localization scheme with RSSI (received signal strength indication which is used widely in WSN. The developed tracking system is designed for continuous estimation of the robot’s trajectory. A WSN, which is composed of many very simple and cheap wireless sensor nodes, is deployed at a specific region of interest. The wireless sensor nodes collect RSSI information sent by mobile robots. A range-based data fusion scheme is used to estimate the robot’s trajectory. Moreover, a Kalman filter is designed to improve tracking accuracy. Experiments are provided to assess the performance of the proposed scheme.
PROF. OLIVER OSUAGWA
Dec 1, 2015 ... This work developed and simulated a mathematical model for a mobile wireless computational Grid architecture using networks of queuing ... (response time). Thus the problem is formulated as a non-cooperative game among .... evaluation are analytical modelling, simulation and measurement . In this ...
This work developed and simulated a mathematical model for a mobile wireless computational Grid architecture using networks of queuing theory. This was in order to evaluate the performance of theload-balancing three tier hierarchical configuration. The throughput and resource utilizationmetrics were measured and the ...
range communication devices. The problem is solved in that the portable communications device comprises a wireless communications interface for communicating with another device, a memory and an RFID-recorder for receiving an RFID-signal transmitted from an RFID-interrogator, wherein the device...... is adapted for storing individual received RFID-signals in the memory. An advantage of the invention is that it provides a relatively simple scheme for extracting information from a current environment of a portable communications device. The invention may e.g. be used for adapting listening devices, e...
Ivancic, William D.; Paulsen, Phillip E.
The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and
Full Text Available Wireless Web Kids (WW-kids is an approved project with financial support of the Flemish government, Economics Department. The project started in December 2007 and runs till December 2010. Main purpose is to motivate children for studying sciences and technology. In Belgium there is a lack of students studying engineering, physics, chemistry, biology, technology and informatics. The project aims to enlarge the knowledge of children in primary and secondary education in the field of ICT in general, and new technologies as mobile devices for learning in particular. In the project students will learn and study with WEB 2.0 applications, using mobile devices. After the project children will have a clear inside how mobile devices can contribute to learning and working. The project is supported by companies and research units of the University of Hasselt.
DeMichele, Glenn A; Cogan, Stuart F; Troyk, Philip R; Chen, Hongnan; Hu, Zhe
Surgical resection of epileptogenic foci is often a beneficial treatment for patients suffering debilitating seizures arising from intractable epilepsy , , . Electrodes placed subdurally on the surface of the brain in the form of an ECoG array is one of the multiple methods for localizing epileptogenic zones for the purpose of defining the region for surgical resection. Currently, transcutaneous wires from ECoG grids limit the duration of time that implanted grids can be used for diagnosis. A wireless ECoG recording and stimulation system may be a solution to extend the diagnostic period. To avoid the transcutaneous connections, a 64-channel wireless silicon recording/stimulating ASIC was developed as the electronic component of a wireless ECoG array that uses SIROF electrodes on a polyimide substrate. Here we describe two new ASIC devices that have been developed and tested as part of the on-going wireless ECoG system design.
As more users expect to use their mobile devices, librarians will want and need to develop the necessary skills to reach this growing user base. Mobile Devices: A Practical Guide for Librarians will aid libraries and librarians as they go through the process of planning, developing, implementing, marketing, and evaluating mobile services.
Dickson, Brett W; Pedersen, Peder C
This work evaluates the feasibility of using 802.11 g ad hoc and 3G cellular broadband networks to wirelessly stream ultrasound video in real-time. Telemedicine ultrasound applications in events such as disaster relief and first-response triage can incorporate these technologies, enabling onsite medical personnel to receive assistance with diagnostic decisions by remote medical experts. The H.264 scalable video codec was used to encode echocardiographic video streams at various image resolutions (video graphics array [VGA] and quarter video graphics array [QVGA]) and frame rates (10, 15, 20, and 30 frames/s). The video stream was transmitted using 802.11 g and 3G cellular technologies, and pertinent transmission parameters such as data rate, packet loss, delay jitter, and latency were measured. 802.11 g permits high frame rate and VGA resolution and has low latency and jitter, but it is suitable only for short communication ranges, whereas the 3G cellular network allows medium to low frame rate streaming at QVGA image resolution with medium latency. However, video streaming can take place from any location with 3G service to any other site with Internet connectivity. The transmitted ultrasound video streams were subsequently recorded and evaluated by physicians with expertise in medical ultrasonography who evaluated the diagnostic value of the received video streams relative to the original videos. They expressed the opinion that image quality in the case of both 802.11 g and 3G was fully to adequately preserved, but missed frames could momentarily decrease the diagnostic value. This research demonstrates that 3G and 802.11 g wireless networks combined with efficient video compression make diagnostically valuable wireless streaming of ultrasound video feasible.
Hens, Raf; Goeminne, Nico; Van Hoecke, Sofie; Verdickt, Tom; Bouve, Thomas; Gielen, Frank; Demeester, Piet
Although mobile users are currently offered a lot more capabilities on their mobile devices, they still experience some limitations. They can surf the Internet, read their e-mail and receive MMS messages, but they have limited processing power, storage capacity and bandwidth and are limited in their access to peripherals (e.g. printers). We have designed and implemented a multimedia gateway for mobile devices that reduces these limitations. It gives the mobile devices transparent access to high capacity devices connected to the gateway, which is built around a central, modularly extensible server that can run on any PC or home gateway. It manages two sets of modules: one set offering the actual services and another set handling the IP-based wireless interaction with the client applications on the mobile devices. These modules can be added and removed dynamically, offering new services on the fly. Currently services for storage, printing, domotics and playing music are provided. Others can easily be added later on. This paper discusses the architecture and development, the management of modules, the actual services and their benefits. Besides a proprietary implementation, it also looks into OSGi and how both platforms compare to each other, concerning design, architecture, ease of development, functionality, ...
top-boxes such as NetGear NeoTV, Sony Internet Player, Asus Cube and Vizio Co-Star. Roku is in the market with a Chromecast like streaming HDMI stick...System and which version is installed on the remote device (Android 4.2.2, iOS etc), brand and model of remote device used (brand= Asus ,model=Nexus) etc...version installed on the remote device (Android 4.2.2, iOS etc), brand and model of remote device (brand= Asus ,model=Nexus) etc. • Experiment#2
N. A. Bazhayev
Full Text Available We consider the wireless network under attack, aimed at "broadcast storm" initiation, in order to determine the availability of stand-alone units and the ability to carry out their functional tasks under information exposure. We determine a set of conditions for such type of attacks on the part of potential information interloper. The functional analysis of the systems based on wireless technology is made. We examine the remote device of a self-organizing wireless network as a queuing system M/M/1/n. Model dependencies are shown for normal system performance and at information exposure on the part of potential information interloper. Analytical simulation of wireless network functioning is carried out in the normal mode and under the attack aimed at "broadcast storm" initiation. An experiment is described which provides statistical information on operation of network remote devices. We present experiment results on carrying out attack at typical system transferring data by broabcast net scanning package at different noise intensities on the part of information interloper. The proposed model can be used to determine the technical characteristics of wireless ad-hoc network, develop recommendations for node configuration, aimed at countering "broadcast storm".
Lidong Wang; Cheryl Ann Alexander
Mobile devices such as smartphones and tablets support kinds of mobile computing and services. They can access to the cloud or offload the computation-intensive part to the cloud computing resources. Mobile cloud computing (MCC) integrates the cloud computing into the mobile environment, which extends mobile devices’ battery lifetime, improves their data storage capacity and processing power, and improves their reliability and information security. In this paper, the applications of smartphon...
Today's mobile devices, especially mobile phones, are comparable in computing capability and storage to the desktop computers of a few years ago. The volume and diversity of the information kept on mobile devices has continually increased and users have taken advantage of this. Since information is being stored on multiple devices, searching for and retrieving the desired information has become an important function. This thesis focuses on search with regard to Personal Information Manag...
Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and
This book investigates the functional adequacy as well as the affective impression made by feedback messages on mobile devices. It presents an easily adoptable experimental setup to examine context effects on various feedback messages, and applies it to auditory, tactile and auditory-tactile feedback messages. This approach provides insights into the relationship between the affective impression and functional applicability of these messages as well as an understanding of the influence of unimodal components on the perception of multimodal feedback messages. The developed paradigm can also be extended to investigate other aspects of context and used to investigate feedback messages in modalities other than those presented. The book uses questionnaires implemented on a Smartphone, which can easily be adopted for field studies to broaden the scope even wider. Finally, the book offers guidelines for the design of system feedback.
Nida Sahar Sayeda
Full Text Available The rapid growth in wireless technologies has made wireless communication an important source for transporting data across different domains. In the same way, there are possibilities of many potential applications that can be deployed using WSNs (Wireless Sensor Networks. However, very limited applications are deployed in real life due to the uncertainty and dynamics of the environment and scare resources. This makes data management in WSN a challenging area to find an approach that suits its characteristics. Currently, the trend is to find efficient data management schemes using evolving technologies, i.e. P2P (Peer-to-Peer systems. Many P2P approaches have been applied in WSNs to carry out the data management due to similarities between WSN and P2P. With the similarities, there are differences too that makes P2P protocols inefficient in WSNs. Furthermore, to increase the efficiency and to exploit the delay tolerant nature of WSNs, where ever possible, the mobile WSNs are gaining importance. Thus, creating a three dimensional problem space to consider, i.e. mobility, WSNs and P2P. In this paper, an efficient algorithm is proposed for data management using P2P techniques for mobile WSNs. The real world implementation and deployment of proposed algorithm is also presented
This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.
Leontiev, I. V.
Information technologies become vital due to information processing needs, database access, data analysis and decision support. Currently, a lot of scientific projects are oriented on database integration of heterogeneous systems. The problem of on-line and rapid access to large integrated systems of digital collections is also very important. Usually users move between different locations, either at work or at home. In most cases users need an efficient and remote access to information, stored in integrated data collections. Desktop computers are unable to fulfill the needs, so mobile and wireless devices become helpful. Handhelds and data terminals are nessessary in medical assistance (they store detailed information about each patient, and helpful for nurses), immediate access to data collections is used in a Highway patrol services (databanks of cars, owners, driver licences). Using mobile access, warehouse operations can be validated. Library and museum items cyclecounting will speed up using online barcode-scanning and central database access. That's why mobile devices - cell phones, PDA, handheld computers with wireless access, WindowsCE and PalmOS terminals become popular. Generally, mobile devices have a relatively slow processor, and limited display capabilities, but they are effective for storing and displaying textual data, recognize user hand-writing with stylus, support GUI. Users can perform operations on handheld terminal, and exchange data with the main system (using immediate radio access, or offline access during syncronization process) for update. In our report, we give an approach for mobile access to data collections, which raises an efficiency of data processing in a book library, helps to control available books, books in stock, validate service charges, eliminate staff mistakes, generate requests for book delivery. Our system uses mobile devices Symbol RF (with radio-channel access), and data terminals Symbol Palm Terminal for batch
Igor Bernik; Blaž Markelj
Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc.) all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developi...
Morak, Jürgen; Kumpusch, Hannes; Hayn, Dieter; Modre-Osprian, Robert; Schreier, Günter
Utilization of information and communication technologies such as mobile phones and wireless sensor networks becomes more and more common in the field of telemonitoring for chronic diseases. Providing elderly people with a mobile-phone-based patient terminal requires a barrier-free design of the overall user interface including the setup of wireless communication links to sensor devices. To easily manage the connection between a mobile phone and wireless sensor devices, a concept based on the combination of Bluetooth and near-field communication technology has been developed. It allows us initiating communication between two devices just by bringing them close together for a few seconds without manually configuring the communication link. This concept has been piloted with a sensor device and evaluated in terms of usability and feasibility. Results indicate that this solution has the potential to simplify the handling of wireless sensor networks for people with limited technical skills.
Tso, Kam S.; Tai, Ann T.; Deng, Yong M.; Becks, Paul G.
In this paper we describe a multiuser collaboration infrastructure that enables multiple mission scientists to remotely and collaboratively interact with visualization and planning software, using wireless networked personal digital assistants(PDAs) and other mobile devices. During ground operations of planetary rover and lander missions, scientists need to meet daily to review downlinked data and plan science activities. For example, scientists use the Science Activity Planner (SAP) in the Mars Exploration Rover (MER) mission to visualize downlinked data and plan rover activities during the science meetings . Computer displays are projected onto large screens in the meeting room to enable the scientists to view and discuss downlinked images and data displayed by SAP and other software applications. However, only one person can interact with the software applications because input to the computer is limited to a single mouse and keyboard. As a result, the scientists have to verbally express their intentions, such as selecting a target at a particular location on the Mars terrain image, to that person in order to interact with the applications. This constrains communication and limits the returns of science planning. Furthermore, ground operations for Mars missions are fundamentally constrained by the short turnaround time for science and engineering teams to process and analyze data, plan the next uplink, generate command sequences, and transmit the uplink to the vehicle . Therefore, improving ground operations is crucial to the success of Mars missions. The multiuser collaboration infrastructure enables users to control software applications remotely and collaboratively using mobile devices. The infrastructure includes (1) human-computer interaction techniques to provide natural, fast, and accurate inputs, (2) a communications protocol to ensure reliable and efficient coordination of the input devices and host computers, (3) an application
Khajuria, Samant; Andersen, Birger
this enabling technology, these radios have to propose cryptographic services such as con- ﬁdentiality, integrity and authentication. Therefore, integration of security services to these low-power devices is very challenging and crucial as they have limited resources and computational capabilities......With the rapid growth of new wireless communication standards, a solution that is capable of providing a seamless shift between existing wireless protocols and high ﬂexibility as well as capability is crucial. Technology based on reconﬁgurable devices offers this ﬂexibility. In order to avail....... In this paper, we present a crypto solution for reconﬁgurable devices. The solution is a single pass Authenticated Encryption (AE) scheme that is designed for protecting both message conﬁdentiality and its authenticity. This makes AE very attractive for low-cost low-power hardware implementation. For test...
Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.
Full Text Available Android smart devices have become an integral part of peoples lives, having evolved beyond the capability of just sending a text message or making a call. Currently, smart devices have applications that can restrict access to other applications...
The author, an outspoken advocate for using technology in the classroom, knows how important it is to establish expectations for responsible use of mobile devices. She's found that five strategies help ensure that mobile devices enhance, rather than distract from, learning. Teachers need to establish new norms that clarify responsible use,…
Berg, Christopher; Valdez, David C; Bergeron, Phillip; Mora, Maria F; Garcia, Carlos D; Ayon, Arturo
In this paper, the fabrication of a wireless mobile unit containing an electrochemical detection module and a 3-channel high-voltage power supply (HVPS) designed for microchip CE is described. The presented device consists of wireless global positioning system controlled robotics, an electrochemical detector utilizing signal conditioning analog circuitry and a digital feedback range controller, a HVPS, an air pump, and a CE microchip. A graphical user interface (LabVIEW) was also designed to communicate wirelessly with the device, from a distant personal computer communication port. The entire device is integrated and controlled by digital hardware implemented on a field programmable gate array development board. This lab-on-a-robot is able to navigate to a global position location, acquire an air sample, perform the analysis (injection, separation, and detection), and send the data (electropherogram) to a remote station without exposing the analyst to the testing environment.
Roque, Nelson A; Boot, Walter R
Mobile device proficiency is increasingly required to participate in society. Unfortunately, there still exists a digital divide between younger and older adults, especially with respect to mobile devices (i.e., tablet computers and smartphones). Training is an important goal to ensure that older adults can reap the benefits of these devices. However, efficient/effective training depends on the ability to gauge current proficiency levels. We developed a new scale to accurately assess the mobile device proficiency of older adults: the Mobile Device Proficiency Questionnaire (MDPQ). We present and validate the MDPQ and a short 16-question version of the MDPQ (MDPQ-16). The MDPQ, its subscales, and the MDPQ-16 were found to be highly reliable and valid measures of mobile device proficiency in a large sample. We conclude that the MDPQ and MDPQ-16 may serve as useful tools for facilitating mobile device training of older adults and measuring mobile device proficiency for research purposes.
St. Pierre, Joseph; Michel, Howard E.
Wireless sensor networks have become viable solutions to many commercial and military applications. This research focuses on utilizing the I-TRM to develop an architecture which supports adaptive, self-healing, and self-aware intelligent wireless sensor networks capable of supporting mobile nodes. Sensor subsystems are crucial in the development of projects to test complex systems such as the Future Combat System, a multi-layered system consisting of soldiers and 18 subsystems connected by a network. The proposed architecture utilizes the Sensor Web Enablement (SWE), a standard for sensor networks being developed by the Open Geospatial Consortium (OGC), and the Integrated Technical Reference Model (I-TRM), a multi-layered technical reference model consisting of a behavior-centric technical reference model, information-centric technical reference model, and control technical reference model. The designed architecture has been implemented on MPR2400CA motes using the nesC programming language. Preliminary results show the architecture meets needs of systems such as the Future Combat System. The architecture supports standard and tailored sensors, mobile and immobile sensors nodes, and is scalable. Also, functionality was implemented which produces adaptive, self-healing, and self-aware behavior in the wireless sensor network.
Uppoor , Sandesh
The market penetration of smart devices like smartphones and tablets with embedded communication technologies like WiFi, 3G and LTE has exploded in less than a decade. Complementing this technological trend, social networking applications have virtually connected a large portion of the population generating an ever-growing data traffic demand on the communication infrastructure. Pervasive communications have gained significance in the automobile industry as well, with the emergence of an impr...
Pilachowski, Catherine A.; Morris, Frank
Nattanmai Parasuraman, Ramviyas; Ferre, Manuel
In hostile environments such as in scientific facilities where ionising radiation is a dominant hazard, reducing human interventions by increasing robotic operations are desirable. CERN, the European Organization for Nuclear Research, has around 50 km of underground scientific facilities, where wireless mobile robots could help in the operation of the accelerator complex, e.g. in conducting remote inspections and radiation surveys in different areas. The main challenges to be considered here are not only that the robots should be able to go over long distances and operate for relatively long periods, but also the underground tunnel environment, the possible presence of electromagnetic fields, radiation effects, and the fact that the robots shall in no way interrupt the operation of the accelerators. Having a reliable and robust wireless communication system is essential for successful execution of such robotic missions and to avoid situations of manual recovery of the robots in the event that the robot runs ...
Regis W. Anne
Full Text Available Wireless Sensor Network (WSN is a collection of intelligent sensors that can communicate to form a self-organizing network and can function without human intervention for a long amount of time. Traditionally, WSN was static, but due to the necessity of today’s applications, there has been a paradigm shift from a static WSN to dynamic WSN. This dynamism can be realized by adding mobility to static WSN. Mobility can be added by introducing extra elements called Mobile Entities (MEs like Mobile Sinks (MSs, Mobile Cluster Heads (MCHs, Mobile Relays (MRs and Mobile Sensor Nodes (MSNs. Adding MEs to WSN has attracted much research interests because it can significantly improve the capability and functionality of the WSN by making it flexible to failures, ease data collection, increase energy efficiency, enhance connectivity, improve coverage and prolong network lifetime, so the full potential of MEs can be harnessed to yield maximum benefits in static WSN. The goal of this paper is to present a comparative study and performance analysis of few of the possible MEs in literature and based on the results and analysis the best ME can be chosen for the desired application.
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-667; Investigation No. 337-TA-673] In the Matter of Certain Electronic Devices, Including Handheld Wireless Communications Devices; Notice of... Entirety AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that...
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-856] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers, and Components Thereof AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that the U.S. International...
Amiri, IS; Saberi, Iman
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required securi
Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee
Random mobility of node causes the frequent changes in the network dynamics causing the increased cost in terms of energy and bandwidth. It needs the additional efforts to synchronize the activities of nodes during data collection and transmission in Wireless Sensor Networks (WSNs). A key challenge...... in maintaining the effective data collection and transmission is to schedule and synchronize the activities of the nodes with the global clock. This paper proposes the Mobility-aware Hybrid Synchronization Algorithm (MHS) which works on the formation of cluster based on spanning tree mechanism (SPT). Nodes used...... for formation of the network have random mobility and heterogeneous in terms of energy with static sink. The nodes in the cluster and cluster heads in the network are synchronized with the notion of global time scale. In the initial stage, the algorithm establishes the hierarchical structure of the network...
Mobile Devices (MDs) such as Personal Digital Assistants (PDAs), smart phones, handheld personal computers, and Tablet PCs, are proliferating in the marketplace. Cheap and ubiquitous mobile computing devices represent computing’s fifth wave , bringing about new opportunities in the marketplace. As MDs become more powerful and commonplace with ubiquitous connectivity, the line that currently divides these handheld devices from typical network computers will become very unclear. Mobile devices have become integrated into the business processes of both government and commercial institutions. MDs are small, portable, and able to store large amounts of information. The breadth of communication options (infrared, wireless, docking station) for MDs introduces many security risks. Some of the problems associated with MDs are: easy to loose, misplace, or have stolen, potential loss/comprise of company data (user ids, passwords, contacts, sensitive documentation, credit card numbers), increases the opportunity for a backdoor into an enterprise’s network, lack of authentication and limited logging capability. The use of these devices poses a risk to the security of an organization.
Schou, Saowanee; Olesen, Henning
of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...
Schoeni, Anna; Roser, Katharina; Röösli, Martin
Background: We investigated whether radiofrequency electromagnetic fields (RF-EMF) from mobile phones and other wireless devices or by the wireless device use itself due to non-radiation related factors in that context are associated with an increase in health symptom reports of adolescents in Central Switzerland. Methods: In a prospective cohort study, 439 study participants (participation rate: 36.8%) aged 12–17 years, completed questionnaires about their mobile and cordless phone use, their self-reported symptoms and possible confounding factors at baseline (2012/2013) and one year later (2013/2014). Operator recorded mobile phone data was obtained for a subgroup of 234 adolescents. RF-EMF dose measures considering various factors affecting RF-EMF exposure were computed for the brain and the whole body. Data were analysed using a mixed-logistic cross-sectional model and a cohort approach, where we investigated whether cumulative dose over one year was related to a new onset of a symptom between baseline and follow-up. All analyses were adjusted for relevant confounders. Results: Participation rate in the follow-up was 97% (425 participants). In both analyses, cross-sectional and cohort, various symptoms tended to be mostly associated with usage measures that are only marginally related to RF-EMF exposure such as the number of text messages sent per day (e.g. tiredness: OR:1.81; 95%CI:1.20–2.74 for cross-sectional analyses and OR:1.87; 95%CI:1.04–3.38 for cohort analyses). Outcomes were generally less strongly or not associated with mobile phone call duration and RF-EMF dose measures. Conclusions: Stronger associations between symptoms of ill health and wireless communication device use than for RF-EMF dose measures were observed. Such a result pattern does not support a causal association between RF-EMF exposure and health symptoms of adolescents but rather suggests that other aspects of extensive media use are related to symptoms. - Highlights: • This
The On-Device Dynamic Analysis of Mobile Applications (ODAMA) project was started in an effort to protect mobile devices used in Industrial Control Systems (ICS) from cyber attack. Because mobile devices hide as much of the “computer” as possible, the user’s ability to assess the software running on their system is limited. The research team chose Google’s Android platform for this initial research because it is open source and it would give us freedom in our approach, including the ability to modify the mobile device’s operating system itself. The research team concluded that a Privileged Application was the right approach, and the result was ODAMA. This project is an important piece of the work to secure the expanding use of mobile devices with our nation’s critical infrastructure.
Full Text Available Mobile collaborative learning is considered the next step of on-line collaborative learning by incorporating mobility as a key and breakthrough requirement. Indeed, the current wide spread of mobile devices and wireless technologies brings an enormous potential to e-learning, in terms of ubiquity, pervasiveness, personalization, flexibility, and so on. For this reason, Mobile Computer-Supported Collaborative Learning has recently grown from a minor research field to significant research projects covering a fairly variety of formal and specially informal learning settings, from schools and universities to workplaces, museums, cities and rural areas. Much of this research has shown how mobile technology can offer new opportunities for groups of learners to collaborate inside and beyond the traditional instructor-oriented educational paradigm. However, mobile technologies, when specifically applied to collaborative learning activities, are still in its infancy and many challenges arise. In addition, current research in this domain points to highly specialized study cases, uses, and experiences in specific educational settings and thus the issues addressed in the literature are found dispersed and disconnected from each other. To this end, this paper attempts to bridge relevant aspects of mobile technologies in support for collaborative learning and provides a tighter view by means of a multidimensional approach.
Kumar, Abhinav; Akopian, David; Agaian, Sos; Creutzburg, Reiner
Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends indicate continuous growth in mobile phone applications. Nowadays phones are equipped with cameras that can capture still images and video, they are equipped with software that can read, convert, manipulate, communicate and save multimedia in multiple formats. This tremendous progress increased the volumes of communicated sensitive information which should be protected against unauthorized access. This paper discusses two general approaches for data protection, steganography and cryptography, and demonstrates how to integrate such algorithms with a mobile-toserver link being used by many applications.
El-Moukaddem, Fatme Mohammad
Wireless Sensor Networks (WSNs) have become increasingly available for data-intensive applications such as micro-climate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit the sheer amount of data generated within an application's lifetime to the base station despite the fact that sensor nodes have limited power supplies such as batteries or small solar panels. The availability of numerous low-cost robotic units (e.g. Robomote and Khepera) has made it possible to construct sensor networks consisting of mobile sensor nodes. It has been shown that the controlled mobility offered by mobile sensors can be exploited to improve the energy efficiency of a network. In this thesis, we propose schemes that use mobile sensor nodes to reduce the energy consumption of data-intensive WSNs. Our approaches differ from previous work in two main aspects. First, our approaches do not require complex motion planning of mobile nodes, and hence can be implemented on a number of low-cost mobile sensor platforms. Second, we integrate the energy consumption due to both mobility and wireless communications into a holistic optimization framework. We consider three problems arising from the limited energy in the sensor nodes. In the first problem, the network consists of mostly static nodes and contains only a few mobile nodes. In the second and third problems, we assume essentially that all nodes in the WSN are mobile. We first study a new problem called max-data mobile relay configuration (MMRC ) that finds the positions of a set of mobile sensors, referred to as relays, that maximize the total amount of data gathered by the network during its lifetime. We show that the MMRC problem is surprisingly complex even for a trivial network topology due to the joint consideration of the energy consumption of both wireless communication and mechanical locomotion. We present optimal MMRC algorithms and practical distributed
Kiseleva, Julia; de Rijke, Maarten
The iPhone was introduced only a decade ago in 2007 but has fundamentally changed the way we interact with online information. Mobile devices differ radically from classic command-based and point-and-click user interfaces, now allowing for gesture-based interaction using fine-grained touch and swipe signals. Due to the rapid growth in the use of voice-controlled intelligent personal assistants on mobile devices, such as Microsoft's Cortana, Google Now, and Apple's Siri, mobile devices have be...
Full Text Available In the era of New Generation Networks (NWGN many emerging and future enable technologies accomplish the requirements of ubiquitous communication networks. Wireless Sensor Networks (WSNs is a vital category of these stateof-the-art technologies, the enormous concerns of these networks are energy efficient and well-organized data aggregation. Cluster based routing in WSNs is an immense solution to enhance the energy efficiency of the nodes and resourceful data gathering. Many studies on network lifetime and data aggregation have been proposed by the Low Energy Adaptive Clustering Hierarchy (LEACH scheme that allows the role of the cluster head rotated among the sensor nodes and attempts to distribute the energy usage through all the nodes. The lifetime of WSNs will be affected by the cluster head (CH selection; this is because a CH consumes more power than a regular (non-CH node. In this research study, an energy efficient cluster head selection in Mobile Wireless Sensor Networks is proposed, analysed and validated on the basis of residual energy and randomized selection of the node, who is not assigned as a cluster head in previous round. Moreover, the proposed approach shows the significant improvements when compared with LEACH and A Novel Application Specific Network Protocol for Wireless Sensor Networks (Hybrid Multi-hop LEACH protocols in terms of energy consumption of sensor nodes, enhanced network lifetime and efficient data gathering due to less energy consumption during data transmission.
Aseeri, Sahar A.
In this work we aim to implement and evaluate alternative approaches for interacting with virtual environments on mobile devices for navigation, object selection and manipulation. Interaction with objects in virtual worlds using traditional input such as current state-of-the-art devices is often difficult and could diminish the immersion and sense of presence when it comes to 3D virtual environment tasks. We have developed new methods to perform different kinds of interactions using a mobile device (e.g. a smartphone) both as input device, performing selection and manipulation of objects, and as output device, utilizing the screen as an extra view (virtual camera or information display). Our hypothesis is that interaction via mobile devices facilitates simple tasks like the ones described within immersive virtual reality systems. We present here our initial implementation and result. © 2013 IEEE.
Full Text Available The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL, to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL and Arrival and Departure Overlap (ADO when both of them use only a single mobile beacon for localization in static WSNs.
Teng, Guodong; Zheng, Kougen; Dong, Wei
The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN) applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL) approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL), to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL) and Arrival and Departure Overlap (ADO) when both of them use only a single mobile beacon for localization in static WSNs.
Full Text Available Wireless sensor/actuator networks (WSANs are emerging as a new generationof sensor networks. Serving as the backbone of control applications, WSANs will enablean unprecedented degree of distributed and mobile control. However, the unreliability ofwireless communications and the real-time requirements of control applications raise greatchallenges for WSAN design. With emphasis on the reliability issue, this paper presents anapplication-level design methodology for WSANs in mobile control applications. Thesolution is generic in that it is independent of the underlying platforms, environment,control system models, and controller design. To capture the link quality characteristics interms of packet loss rate, experiments are conducted on a real WSAN system. From theexperimental observations, a simple yet efficient method is proposed to deal withunpredictable packet loss on actuator nodes. Trace-based simulations give promisingresults, which demonstrate the effectiveness of the proposed approach.
Hirschorn, David S; Choudhri, Asim F; Shih, George; Kim, Woojin
Mobile devices have fundamentally changed personal computing, with many people forgoing the desktop and even laptop computer altogether in favor of a smaller, lighter, and cheaper device with a touch screen. Doctors and patients are beginning to expect medical images to be available on these devices for consultative viewing, if not actual diagnosis. However, this raises serious concerns with regard to the ability of existing mobile devices and networks to quickly and securely move these images. Medical images often come in large sets, which can bog down a network if not conveyed in an intelligent manner, and downloaded data on a mobile device are highly vulnerable to a breach of patient confidentiality should that device become lost or stolen. Some degree of regulation is needed to ensure that the software used to view these images allows all relevant medical information to be visible and manipulated in a clinically acceptable manner. There also needs to be a quality control mechanism to ensure that a device's display accurately conveys the image content without loss of contrast detail. Furthermore, not all mobile displays are appropriate for all types of images. The smaller displays of smart phones, for example, are not well suited for viewing entire chest radiographs, no matter how small and numerous the pixels of the display may be. All of these factors should be taken into account when deciding where, when, and how to use mobile devices for the display of medical images. Copyright © 2014 American College of Radiology. Published by Elsevier Inc. All rights reserved.
Sira P. Rao
Full Text Available In real-time remote diagnosis of emergency medical events, mobility can be enabled by wireless video communications. However, clinical use of this potential advance will depend on definitive and compelling demonstrations of the reliability of diagnostic quality video. Because the medical domain has its own fidelity criteria, it is important to incorporate diagnostic video quality criteria into any video compression system design. To this end, we used flexible algorithms for region-of-interest (ROI video compression and obtained feedback from medical experts to develop criteria for diagnostically lossless (DL quality. The design of the system occurred in three steps-measurement of bit rate at which DL quality is achieved through evaluation of videos by medical experts, incorporation of that information into a flexible video encoder through the notion of encoder states, and an encoder state update option based on a built-in quality criterion. Medical experts then evaluated our system for the diagnostic quality of the video, allowing us to verify that it is possible to realize DL quality in the ROI at practical communication data transfer rates, enabling mobile medical assessment over bit-rate limited wireless channels. This work lays the scientific foundation for additional validation through prototyped technology, field testing, and clinical trials.
Jain, Sanjeev; Tripathi, Vijay S.; Tiwari, Sudarshan
There exist two fundamental approaches to multicast routing namely minimum cost trees and shortest path trees. The (MCT's) minimum cost tree is one which connects receiver and sources by providing a minimum number of transmissions (MNTs) the MNTs approach is generally used for energy constraint sensor and mobile ad hoc networks. In this paper we have considered node mobility and try to find out simulation based comparison of the (SPT's) shortest path tree, (MST's) minimum steiner trees and minimum number of transmission trees in wireless mesh networks by using the performance metrics like as an end to end delay, average jitter, throughput and packet delivery ratio, average unicast packet delivery ratio, etc. We have also evaluated multicast performance in the small and large wireless mesh networks. In case of multicast performance in the small networks we have found that when the traffic load is moderate or high the SPTs outperform the MSTs and MNTs in all cases. The SPTs have lowest end to end delay and average jitter in almost all cases. In case of multicast performance in the large network we have seen that the MSTs provide minimum total edge cost and minimum number of transmissions. We have also found that the one drawback of SPTs, when the group size is large and rate of multicast sending is high SPTs causes more packet losses to other flows as MCTs.
Tuttle, Harry Grover
College professors can transform their modern language classes through mobile devices. Their students' learning becomes more active, more personalized, more contextual, and more culturally authentic as illustrated through the author's modern language mobile learning classroom examples. In addition, their students engage in many diverse types of…
Wald, Mike; Li, Yunjia; Draffan, E. A.
This paper describes accessible collaborative learning using mobile devices with mobile enhancements to Synote, the freely available, award winning, open source, web based application that makes web hosted recordings easier to access, search, manage, and exploit for all learners, teachers and other users. Notes taken live during lectures using…
Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.
Gatwood, Justin D; Johnson, Jordan; Jerkins, Brian
To compare use of topical medications between a wireless monitoring device and validated self-reported measures of glaucoma medication adherence. This study involved adults from a group ophthalmology practice diagnosed with and being medicinally treated for glaucoma who were not scheduled for a surgery during the study period. Subjects were required to use a new wireless device to dispense their glaucoma medication for 2 months, and were surveyed at baseline and immediately following the study to assess mobile phone use, glaucoma-related self-efficacy, and medication adherence. Complete data (survey and accurate device recordings) were available for 23 subjects at both baseline and endpoint. Median adherence, as measured by the device, was 82% and dropped slightly between 30-day periods, from 83% to 77%. Similarly, the percent adherent (dosing at least 75% of the time) dropped significantly between months according to both the device (78.3% and 52.2%) and a self-reported measure (63% and 56%). Kappa statistics indicated low agreement between the device and self-report when classifying adherent status. A majority of subjects interviewed found the device easy to use, indicated that it did not interfere with medication-taking or normal activities, and were not bothered by their physician knowing when medication was dispensed. In this pilot, nearly all Kali Drop devices performed as expected, providing real-time data on medication use over a 60-day period. Data suggested that self-reported and electronic estimates of glaucoma medication use differ, but additional testing of this new device is needed to corroborate the data observed.
Full Text Available In the environments where the source nodes are close to one another and generate a lot of sensory data traffic with redundancy, transmitting all sensory data by individual nodes not only wastes the scarce wireless bandwidth, but also consumes a lot of battery energy. Instead of each source node sending sensory data to its sink for aggregation (the so-called client/server computing, Qi et al. in 2003 proposed a mobile agent (MA-based distributed sensor network (MADSN for collaborative signal and information processing, which considerably reduces the sensory data traffic and query latency as well. However, MADSN is based on the assumption that the operation of mobile agent is only carried out within one hop in a clustering-based architecture. This paper considers MA in multihop environments and adopts directed diffusion (DD to dispatch MA. The gradient in DD gives a hint to efficiently forward the MA among target sensors. The mobile agent paradigm in combination with the DD framework is dubbed mobile agent-based directed diffusion (MADD. With appropriate parameters set, extensive simulation shows that MADD exhibits better performance than original DD (in the client/server paradigm in terms of packet delivery ratio, energy consumption, and end-to-end delivery latency.
Full Text Available In this paper, the author investigates the rapid surge in mobile and wireless technologies, and mobile phone in particulars. He also outlines four emerging application areas where mobile technologies hold great potential for mobile government...
Full Text Available This paper presents a task allocation-oriented framework to enable efficient in-network processing and cost-effective multi-hop resource sharing for dynamic multi-hop multimedia wireless sensor networks with low node mobility, e.g., pedestrian speeds. The proposed system incorporates a fast task reallocation algorithm to quickly recover from possible network service disruptions, such as node or link failures. An evolutional self-learning mechanism based on a genetic algorithm continuously adapts the system parameters in order to meet the desired application delay requirements, while also achieving a sufficiently long network lifetime. Since the algorithm runtime incurs considerable time delay while updating task assignments, we introduce an adaptive window size to limit the delay periods and ensure an up-to-date solution based on node mobility patterns and device processing capabilities. To the best of our knowledge, this is the first study that yields multi-objective task allocation in a mobile multi-hop wireless environment under dynamic conditions. Simulations are performed in various settings, and the results show considerable performance improvement in extending network lifetime compared to heuristic mechanisms. Furthermore, the proposed framework provides noticeable reduction in the frequency of missing application deadlines.
Full Text Available Teknologi Wireless Aplication Protocol (WAP merupakan penggabungan atas tiga buah teknologi jaringan yang sedang berkembang pesat, yaitu : wireless data, telepon, dan Internet. Teknologi WAP muncul untuk menjawab ketergantungan akan informasi yang makin tinggi, dengan memberikan layanan internet lewat mobile devices, seperti PDA, telepon selular, dll. Sehingga dengan teknologi ini informasi bisa diakses dimana saja dan kapan saja tanpa memerlukan sambungan kabel.Kemampuan ini membuat kalangan bisnis berlomba-lomba menyajikan layanannya dengan menggunakan teknologi ini. Mobile banking (m-banking merupakan salah satu layanan yang disajikan - selain mcommerce, mportal, dll. – dengan memanfaatkan teknologi ini. M-Banking juga merupakan hasil kondisi makin ketatnya layanan dunia perbankan, yang mana masing-masing bank, untuk memenangkan persaingan, makin memanjakan nasabahnya. Nasabah makin mudah melakukan transaksi tanpa harus pergi ke bank dan terikat oleh jam layanan bank. Dalam Penelitian ini, akan dibuat perangkat lunak yang mampu menjalankan aplikasi m-banking dengan berbagai layanan keuangan yang biasanya diberikan oleh bank. Dengan Penelitian ini nantinya dapat dilihat bagaimana implementasi dari sistem layanan aplikasi m-banking.Kata kunci : WAP, mobile banking
Aseeri, Sahar A.
With the use of an immersive display system such as CAVE system, the user is able to realize a 3D immersive virtual environment realistically. However, interacting with virtual worlds in CAVE systems using traditional input devices to perform easy operations such as manipulation, object selection, and navigation is often difficult. This difficulty could diminish the immersion and sense of presence when it comes to 3D virtual environment tasks. Our research aims to implement and evaluate alternative approaches of interaction with immersive virtual environments on mobile devices for manipulation and object selection tasks. As many researchers have noted, using a mobile device as an interaction device has a number of advantages, including built-in display, built-in control, and touch screen facility. These advantages facilitate simple tasks within immersive virtual environments. This research proposes new methods using mobile devices like Smart-phones to perform di↵erent kinds of interactions both as an input device, (e.g. performing selection and manipulation of objects) and as an output device (e.g. utilizing the screen as an extra view for a virtual camera or information display). Moreover, we developed a prototype system to demonstrate and informally evaluate these methods. The research conclusion suggests using mobile devices as a 3D-controller. This will be a more intuitive approach to interact within the virtual environment.
With the rapid development in wireless devices, applications and networks, radio frequencies have become scarce resources. Therefore, it is critical to make efficient use of the radio frequencies. A promising way to solve this problem is the use of cognitive radio (CR). In CR, radio frequencies are
Solvoll, Terje; Scholl, Jeremiah; Hartvigsen, Gunnar
A common denominator of modern hospitals is a variety of communication problems. In particular, interruptions from mobile communication devices are a cause of great concern for many physicians. To characterize how interruptions from mobile devices disturb physicians in their daily work. The gathered knowledge will be subsequently used as input for the design and development of a context-sensitive communication system for mobile communications suitable for hospitals. This study adheres to an ethnographic and interpretive field research approach. The data gathering consisted of participant observations, non-structured and mostly ad hoc interviews, and open-ended discussions with a selected group of physicians. Eleven physicians were observed for a total of 135 hours during May and June 2009. The study demonstrates to what degree physicians are interrupted by mobile devices in their daily work and in which situations they are interrupted, such as surgery, examinations, and during patients/relatives high-importance level conversations. The participants in the study expected, and also indicated, that wireless phones probably led to more interruptions immediately after their introduction in a clinic, when compared to a pager, but this changed after a short while. The unpleasant feeling experienced by the caller when interrupting someone by calling them differs compared to sending a page message, which leaves it up to the receiver when to return the call. Mobile devices, which frequently interrupt physicians in hospitals, are a problem for both physicians and patients. The results from this study contribute to knowledge being used as input for designing and developing a prototype for a context-sensitive communication system for mobile communication suitable for hospitals. We combined these findings with results from earlier studies and also involved actual users to develop the prototype, CallMeSmart. This system intends to reduce such interruptions and at the same time
Saquib, Syed M Taha; Hameed, Sarmad; Jafri, Raza; Usman Ali, Syed M; Amin, Imran
This work is based upon electronic automation and Smart Control techniques, which constitute the basis of Control Area Network (CAN) and Personal Area Network (PAN). Bluetooth technology has been interfaced with a programmable controller to provide multi-dimensional vehicle control. A network is proposed which contains a remote, mobile host controller and an android operating system based mobile set (Client). The client communicates with a host controller through a Bluetooth device. The system incorporates duplex communication after successful confirmation between the host and the client; the android based mobile unit controls the vehicle through the Bluetooth module
Nielsen, Jimmy Jessen
The availability of location information in mobile devices, e.g., through built-in GPS receivers in smart phones, has motivated the investigation of the usefulness of location based network optimizations. Since the quality of input information is important for network optimizations, a main focus...... the achievable accuracy of future localization system in mobile settings, as well as quantifying the impact of having a realistic model of the required measurement exchanges. Secondly, this work has considered different large scale and small scale location based network optimizations, namely centralized relay...... and highly mobile scenarios....
Derr, Kurt W.; Richardson, John G.
Monitoring devices and systems comprise a plurality of data channel modules coupled to processing circuitry. Each data channel module of the plurality of data channel modules is configured to capture wireless communications for a selected frequency channel. The processing circuitry is configured to receive captured wireless communications from the plurality of data channel modules and to organize received wireless communications according to at least one parameter. Related methods of monitoring wireless communications are also disclosed.
Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin
The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality. However, the healthcare data is very sensitive and has to be protected against unauthorized access. While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentication in remote servers, protection of data on the mobile device itself has gained very little attention. This paper analyses the requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device. The capsule is a downloadable software agent with additional functionalities to enable secure external communication with healthcare service providers, network operators and other relevant communication parties.
Chen, Yiqi; Lin, Zhiyuan; Pienta, Robert; Kahng, Minsuk; Chau, Duen Horng
Mobile devices have become increasingly central to our everyday activities, due to their portability, multi-touch capabilities, and ever-improving computational power. Such attractive features have spurred research interest in leveraging mobile devices for computation. We explore a novel approach that aims to use a single mobile device to perform scalable graph computation on large graphs that do not fit in the device's limited main memory, opening up the possibility of performing on-device analysis of large datasets, without relying on the cloud. Based on the familiar memory mapping capability provided by today's mobile operating systems, our approach to scale up computation is powerful and intentionally kept simple to maximize its applicability across the iOS and Android platforms. Our experiments demonstrate that an iPad mini can perform fast computation on large real graphs with as many as 272 million edges (Google+ social graph), at a speed that is only a few times slower than a 13″ Macbook Pro. Through creating a real world iOS app with this technique, we demonstrate the strong potential application for scalable graph computation on a single mobile device using our approach. PMID:25859564
Chen, Yiqi; Lin, Zhiyuan; Pienta, Robert; Kahng, Minsuk; Chau, Duen Horng
Mobile devices have become increasingly central to our everyday activities, due to their portability, multi-touch capabilities, and ever-improving computational power. Such attractive features have spurred research interest in leveraging mobile devices for computation. We explore a novel approach that aims to use a single mobile device to perform scalable graph computation on large graphs that do not fit in the device's limited main memory, opening up the possibility of performing on-device analysis of large datasets, without relying on the cloud. Based on the familiar memory mapping capability provided by today's mobile operating systems, our approach to scale up computation is powerful and intentionally kept simple to maximize its applicability across the iOS and Android platforms. Our experiments demonstrate that an iPad mini can perform fast computation on large real graphs with as many as 272 million edges (Google+ social graph), at a speed that is only a few times slower than a 13″ Macbook Pro. Through creating a real world iOS app with this technique, we demonstrate the strong potential application for scalable graph computation on a single mobile device using our approach.
Full Text Available Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc. all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.
Morris, Art; Barrio, Samantha Caporal Del; Shin, J
Modern mobile terminal design has been driven by the user interface and broadband connectivity. Real world RF performance has substantially fallen recently which impacts data rates, battery life and often causes lost connections. This has been caused by changing antenna location and reduced antenna...
M. H. Mohd Salleh
Full Text Available This article focuses on the design and investigation of a pair of unequally sized wireless electricity (Witricity devices that are equipped with integrated planar coil strips. The proposed pair of devices consists of two different square-shaped resonator sizes of 120 mm × 120 mm and 80 mm × 80 mm, acting as a transmitter and receiver, respectively. The devices are designed, simulated and optimized using the CST Microwave Studio software prior to being fabricated and verified using a vector network analyzer (VNA. The surface current results of the coupled devices indicate a good current density at 10 mm to 30 mm distance range. This good current density demonstrates that the coupled devices’ surface has more electric current per unit area, which leads to a good performance up to 30 mm range. Hence, the results also reveal good coupling efficiency between the coupled devices, which is approximately 54.5% at up to a 30 mm distance, with both devices axially aligned. In addition, a coupling efficiency of 50% is achieved when a maximum lateral misalignment (LM of 10 mm, and a varied angular misalignment (AM from 0° to 40° are implemented to the proposed device.
Forsell, Marianne; Sjögren, Petteri; Renard, Matthew; Johansson, Olle
In many countries or regions the capacity of health care resources is below the needs of the population and new approaches for health surveillance are needed. Innovative projects, utilizing wireless communication technology, contribute to reliable methods for field-work data collection and reporting to databases. The objective was to describe a new version of a wireless IT-support system for field-work data collection and administration. The system requirements were drawn from the design objective and translated to system functions. The system architecture was based on fieldwork experiences and administrative requirements. The Smartphone devices were HTC Touch Diamond2s, while the system was based on a platform with Microsoft .NET components, and a SQL Server 2005 with Microsoft Windows Server 2003 operating system. The user interfaces were based on .NET programming, and Microsoft Windows Mobile operating system. A synchronization module enabled download of field data to the database, via a General Packet Radio Services (GPRS) to a Local Area Network (LAN) interface. The field-workers considered the here-described applications user-friendly and almost self-instructing. The office administrators considered that the back-office interface facilitated retrieval of health reports and invoice distribution. The current IT-support system facilitates short lead times from fieldwork data registration to analysis, and is suitable for various applications. The advantages of wireless technology, and paper-free data administration need to be increasingly emphasized in development programs, in order to facilitate reliable and transparent use of limited resources.
Full Text Available Wireless Body Area Networks (WBANs have attracted research interests from the community, as more promising healthcare applications have a tendency to employ them as underlying network technology. While taking design issues, such as small size hardware as well as low power computing, into account, a lot of research has been proposed to accomplish the given tasks in WBAN. However, since most of the existing works are basically developed by assuming all nodes in the static state, these schemes therefore cannot be applied in real scenarios where network topology between sensor nodes changes frequently and unexpectedly according to human moving behavior. However, as far as the authors know, there is no survey paper to focus on research challenges for mobility support in WBAN yet. To address this deficiency, in this paper, we present the state-of-the-art approaches and discuss the important features of related to mobility in WBAN. We give an overview of mobility model and categorize the models as individual and group. Furthermore, an overview of networking techniques in the recent literature and summary are compiled for comparison in several aspects. The article also suggests potential directions for future research in the field.
Full Text Available Individuals with tetraplegia lack independent mobility, making them highly dependent on others to move from one place to another. Here, we describe how two macaques were able to use a wireless integrated system to control a robotic platform, over which they were sitting, to achieve independent mobility using the neuronal activity in their motor cortices. The activity of populations of single neurons was recorded using multiple electrode arrays implanted in the arm region of primary motor cortex, and decoded to achieve brain control of the platform. We found that free-running brain control of the platform (which was not equipped with any machine intelligence was fast and accurate, resembling the performance achieved using joystick control. The decoding algorithms can be trained in the absence of joystick movements, as would be required for use by tetraplegic individuals, demonstrating that the non-human primate model is a good pre-clinical model for developing such a cortically-controlled movement prosthetic. Interestingly, we found that the response properties of some neurons differed greatly depending on the mode of control (joystick or brain control, suggesting different roles for these neurons in encoding movement intention and movement execution. These results demonstrate that independent mobility can be achieved without first training on prescribed motor movements, opening the door for the implementation of this technology in persons with tetraplegia.
Libedinsky, Camilo; So, Rosa; Xu, Zhiming; Kyar, Toe K; Ho, Duncun; Lim, Clement; Chan, Louiza; Chua, Yuanwei; Yao, Lei; Cheong, Jia Hao; Lee, Jung Hyup; Vishal, Kulkarni Vinayak; Guo, Yongxin; Chen, Zhi Ning; Lim, Lay K; Li, Peng; Liu, Lei; Zou, Xiaodan; Ang, Kai K; Gao, Yuan; Ng, Wai Hoe; Han, Boon Siew; Chng, Keefe; Guan, Cuntai; Je, Minkyu; Yen, Shih-Cheng
Individuals with tetraplegia lack independent mobility, making them highly dependent on others to move from one place to another. Here, we describe how two macaques were able to use a wireless integrated system to control a robotic platform, over which they were sitting, to achieve independent mobility using the neuronal activity in their motor cortices. The activity of populations of single neurons was recorded using multiple electrode arrays implanted in the arm region of primary motor cortex, and decoded to achieve brain control of the platform. We found that free-running brain control of the platform (which was not equipped with any machine intelligence) was fast and accurate, resembling the performance achieved using joystick control. The decoding algorithms can be trained in the absence of joystick movements, as would be required for use by tetraplegic individuals, demonstrating that the non-human primate model is a good pre-clinical model for developing such a cortically-controlled movement prosthetic. Interestingly, we found that the response properties of some neurons differed greatly depending on the mode of control (joystick or brain control), suggesting different roles for these neurons in encoding movement intention and movement execution. These results demonstrate that independent mobility can be achieved without first training on prescribed motor movements, opening the door for the implementation of this technology in persons with tetraplegia.
Proschowsky, Morten Smidt
The reduced size of many mobile devices makes it difficult to enter text with them. The text entry methods are often slow or complicated to use. This affects the performance and user experience of all applications and services on the device. This work introduces new easy-to-use text entry methods...... for mobile devices and a framework for adaptive context-aware language models. Based on analysis of current text entry methods, the requirements to the new text entry methods are established. Transparent User guided Prediction (TUP) is a text entry method for devices with one dimensional touch input. It can...... be touch sensitive wheels, sliders or similar input devices. The interaction design of TUP is done with a combination of high level task models and low level models of human motor behaviour. Three prototypes of TUP are designed and evaluated by more than 30 users. Observations from the evaluations are used...
Koo, I. S.; Hong, S. B.; Cho, J. W.
1. Purpose · Development of IEC technical report on wireless device using in nuclear power plants 2. Contents · IEC technical reports of draft for circulation and final draft for next planary meeting · Case study on experiment of wireless devices 3. Implementation methods · Preparation of first draft with experts group, its circulation, discussions on the results of the circulation · Organizing three teams such as preparation, reviews and experiment 4. Results · Maintenance cost will be reduced with application of the wireless technologies in nuclear power plants · Commercial wireless devices will be developed before standard is issued
Nanz, Sebastian; Hankin, Chris
We present a framework for specification and security analysis of communication protocols for mobile wireless networks. This setting introduces new challenges which are not being addressed by classical protocol analysis techniques. The main complication stems from the fact that the actions...... processes and the network's connectivity graph, which may change independently from protocol actions. We identify a property characterising an important aspect of security in this setting and express it using behavioural equivalences of the calculus. We complement this approach with a control flow analysis...... of intermediate nodes and their connectivity can no longer be abstracted into a single unstructured adversarial environment as they form an inherent part of the system's security. In order to model this scenario faithfully, we present a broadcast calculus which makes a clear distinction between the protocol...
Full Text Available Mobile and wireless (M&W technologies have great potential to improve process efficiency and effectiveness within retail stores, but their application is still very limited. One of the main reasons explaining this situation is considered to be the lack of confidence in the actual benefits and, therefore, in the return on investment. As a matter of facts, activities in this context are characterised by great variety and non‐standardised execution and as such the assessment of the costs and benefits of M&W solutions is more difficult than for the upstream tiers of the fast moving consumer goods supply chain (e.g., distribution centres. This paper attempts to provide a contribution for researchers and practitioners by presenting an analytical model to assess the profitability related to investments in multiple M&W solutions for retail stores, thus supporting the decision‐ making process.
Dhadwal, Harbans S.; Rastegar, Jahangir; Feng, Dake; Kwok, Philip
Need exists for untethered transmission of electrical power and data to remote devices and sensors. Several wireless solutions, based on radiation and non-radiation are in existence. Here the focus is on the use of photonic power which is an optimized optical to electrical conversion solution, used for both wireless and guided transportation. High photonic conversion efficiencies of 50% and greater have been demonstrated for wavelength matched laser diodes and photovoltaic cells. However, these existing solutions do not meet the needs of rapid energy transfer to remote devices, such as munition shells prior to launch. We report on the design and fabrication of a 16-cell array of densely packed photonic power converters that can power a munition shell immediately prior to launch. A laser beam delivers power and data to the PPC array. Thermal simulation, using FEA shows that the each of the cells can be operated at an equivalent irradiance of 1000x suns, giving an energy transfer rate of 17.5 J.s-1 for the array. Thus, two 10 F super-capacitors, typically used in munitions, can be charged is under 5 seconds. Further, using the measured capacitance of 2.4 nF for the array, data can be transported to the munition on the laser power beam, at a rate exceeding 5 Mbps.
Cihangir, Aykut; Whittow, Will; Panagamuwa, Chinthana; Jacquemod, Gilles; Gianesello, Frédéric; Luxey, Cyril
In this paper, we first present a feasibility study to design 4G antennas (700-960 MHz and 1.7-2.7 GHz) for eyewear devices. Those eyewear devices should be connected to the last generation cellular networks, Wireless Local Area Networks or wireless hotspots. Three coupling element type antennas with their matching networks are evaluated in terms of reflection coefficient and total radiation efficiency when the eyewear is placed on the user's head. We also present Specific Absorption Rate (SAR) simulations when the eyewear is positioned over a homogeneous SAM phantom and over a heterogeneous VH (Visible Human) phantom: the SAR levels are compared to international limit values. In a second step, we present experimental results obtained with 3D printed eyewear and coupling elements etched on a classical PCB substrate where the matching circuits are optimized close to the feeding point of the coupling element. Simulated and measured values are in very good agreement: 7 to 16% and 9 to 35% total efficiency are respectively obtained for the low- and high-frequency bands. However, simulated SAR values are somewhat higher than authorized levels with preoccupant high electromagnetic field distribution close to the eye of the user.
Cook, David J; Thompson, Jeffrey E; Prinsen, Sharon K; Dearani, Joseph A; Deschamps, Claude
Hospitalization and surgery in older patients often leads to a loss of strength, mobility, and functional capacity. We tested the hypothesis that wireless accelerometry could be used to measure mobility during hospital recovery after cardiac surgery. We used an off-the-shelf fitness monitor to measure daily mobility in patients after surgery. Data were transmitted wirelessly, aggregated, and configured onto a provider-viewable dashboard. Wireless monitoring of mobility after major surgery was easy and practical. There was a significant relationship between the number of steps taken in the early recovery period, length of stay, and dismissal disposition. Wireless monitoring of mobility after major surgery creates an opportunity for early identification and intervention in individual patients and could serve as a tool to evaluate and improve the process of care and to affect postdischarge outcomes. Copyright © 2013 The Society of Thoracic Surgeons. Published by Elsevier Inc. All rights reserved.
David W. Greve
Full Text Available Langasite surface acoustic wave devices can be used to implement harsh-environment wireless sensing of gas concentration and temperature. This paper reviews prior work on the development of langasite surface acoustic wave devices, followed by a report of recent progress toward the implementation of oxygen gas sensors. Resistive metal oxide films can be used as the oxygen sensing film, although development of an adherent barrier layer will be necessary with the sensing layers studied here to prevent interaction with the langasite substrate. Experimental results are presented for the performance of a langasite surface acoustic wave oxygen sensor with tin oxide sensing layer, and these experimental results are correlated with direct measurements of the sensing layer resistivity.
Zhong, Ping; Li, Ya-Ting; Liu, Wei-Rong; Duan, Gui-Hua; Chen, Ying-Wen; Xiong, Neal
In wireless rechargeable sensor networks (WRSNs), there is a way to use mobile vehicles to charge node and collect data. It is a rational pattern to use two types of vehicles, one is for energy charging, and the other is for data collecting. These two types of vehicles, data collection vehicles (DCVs) and wireless charging vehicles (WCVs), are employed to achieve high efficiency in both data gathering and energy consumption. To handle the complex scheduling problem of multiple vehicles in large-scale networks, a twice-partition algorithm based on center points is proposed to divide the network into several parts. In addition, an anchor selection algorithm based on the tradeoff between neighbor amount and residual energy, named AS-NAE, is proposed to collect the zonal data. It can reduce the data transmission delay and the energy consumption for DCVs' movement in the zonal. Besides, we design an optimization function to achieve maximum data throughput by adjusting data rate and link rate of each node. Finally, the effectiveness of proposed algorithm is validated by numerical simulation results in WRSNs.
Wireless techniques can play an important role in next-generation, image-guided surgical techniques with integration strategies being the key. We present our investigations on three wireless applications. First, we validate a position and orientation independent method to noninvasively monitor wireless power delivery using current perturbation measurements of switched load modulation of the RF carrier. This is important for safe and efficient powering without using bulky batteries or invasive cables. Use of MRI transmit RF pulses for simultaneous powering is investigated in the second part. We develop system models for the MRI transmit chain, wireless powering circuits and a typical load. Detailed analysis and validation of nonlinear and cascaded modeling strategies are performed, useful for decoupled optimization of the harvester coil and RF-DC converter. MRI pulse sequences are investigated for suitability for simultaneous powering. Simulations indicate that a 1.8V, 2 mA load can be powered with a 100% duty cycle using a 30° fGRE sequence, despite the RF duty cycle being 44 mW for a 30° flip angle, consistent with model predictions. Investigations on imaging artifacts indicates that distortion is mostly restricted to within the physical span of the harvester coil in the imaging volume, with the homogeneous B1+ transmit field providing positioning flexibility to minimize this for simultaneous powering. The models are potentially valuable in designing wireless powering solutions for implantable devices with simultaneous real-time imaging in MRI-guided surgical suites. Finally in the last section, we model endovascular MRI coil coupling during RF transmit. FEM models for a series-resonant multimode coil and quadrature birdcage coil fields are developed and computationally efficient, circuit and full-wave simulations are used to model inductive coupling. The Bloch Siegert B1 mapping sequence is used for validating at 24, 28 and 34 microT background excitation
The areas of the mobile device management is developing very fast. Hence, the thesis “An approach for management of mobile devices in pharmaceutical company” introduces all key directives that should be considered when implementing mobile device management. A survey of standards and recommendations on the mobile device security has been elaborated. Relevant guidelines for security policy definition are presented with the risk analysis for mobile device usage. Furthermore, the model for mana...
Full Text Available This contribution describes mathematical model (kinematics for Mobile Robot carriage. The mathematical model is fully parametric. Model is designed universally for any measures three or four wheeled carriage. The next conditions are: back wheels are driving-wheel, front wheels change angle of Robot turning. Position of the front wheel gives the actual position of the robot. Position of the robot is described by coordinates x, y and by angle of the front wheel α in reference position. Main reason for model implementation is indoor navigation. We need some estimation of robot position especially after turning of the Robot. Next use is for outdoor navigation especially for precising GPS information.
The paper describes the progression of a learning experiment with high school students producing moblogs (mobile weblogs) outside of the school environment and focuses especially on the reflective aspects of the moblogs as an expression of the reflective practicum (Schön 1987, DESECO 2003). Through...... an analysis of my data I will centre my discussion around the value of this informal approach for learning purposes and discuss what kind of reflective competencies come into play here (Nesta Futurelab 2004a, 2004b). The theoretical framework for this article also draws on social learning theory (Lave...
Östmark, Å.; Lindgren, P.; van Halteren, Aart; Meppelink, L.
Emerging wireless communication standards and more capable sensors and actuators have pushed further development of wireless sensor networks. Deploying a large number of sensor nodes requires a high-level framework enabling the devices to present themselves and the resources they hold. The device
... Communications, Inc. of CA; LG Electronics, Inc. of Korea; LG Electronics U.S.A., Inc. of NJ; Nintendo Co., Ltd... INTERNATIONAL TRADE COMMISSION [Docket No. 2904] Certain Wireless Consumer Electronics Devices and.... International Trade Commission has received a complaint entitled Certain Wireless Consumer Electronics Devices...
Huuskonen, Pertti; Mäntyjärvi, Jani; Könönen, Ville
The next wave of mobile applications is at hand. Mobile phones, PDAs, cameras, music players, and gaming gadgets are creating a connected mobile ecosystem where it is possible to implement systems with significant embedded intelligence. Such advances will make it possible to move many functions of the current PC-centric applications to the mobile domain. Since the inherent difficulties that come with mobility—limited UIs, short attention spans, power dependency, intermittent connectivity, to name but a few—are still not going away, new solutions are needed to make mobile computing satisfactory. We are facing the paradox of cramming ever more functions into our ever more portable devices, while seeking to achieve radically better usablility and semi-usable automated intelligence.
Full Text Available With the recent advances in Internet and mobile technologies, there are increasing demands for electronic access to tourist information systems for service coordination and process integration. Mobile computing and mobile devices are used to implement various tourist services (e.g. electronic tourist guides, digital interactive maps, and tourist e-commerce transactions. However, due to disparate tourist information and service resources such as airlines, hotels, tour operators, it is still difficult for tourists to use them effectively during their trips or even in the planning stage. Neither can current tourist portals assist tourists proactively. To overcome this problem, we propose the analysis, design, and implementation of the “Mobile tourist guide" system, that access through wireless devices and use Semantic Web technologies for effective organization of information resources and service processes. The proposed system provides the users with various services such as: 1 displaying the shortest path between the sources and destinations the visitors specify, 2 displaying general information of shops, newest events of the plaza and shops, 3 provides service of hotel, restaurant and cinema-ticket reservations, 4 provides user-friendly administration service. The Admin can manage the position, blocking path details, general information of hotel, restaurant, shops and plaza, and reservation details via web browser without changing the framework of the system. The system prototype has been developed on the top of Java 2 Micro Edition which offers an ideal platform for the development of full-fledged, interactive and portable applications tailored for resource constrained mobile devices. The paper presents our development experiences and highlights its main advantages and limitations in relation to the implementation of such kind of applications.
Full Text Available In order to maximize network lifetime and balance energy consumption when sink nodes can move, maximizing lifetime of wireless sensor networks with mobile sink nodes (MLMS is researched. The movement path selection method of sink nodes is proposed. Modified subtractive clustering method, k-means method, and nearest neighbor interpolation method are used to obtain the movement paths. The lifetime optimization model is established under flow constraint, energy consumption constraint, link transmission constraint, and other constraints. The model is solved from the perspective of static and mobile data gathering of sink nodes. Subgradient method is used to solve the lifetime optimization model when one sink node stays at one anchor location. Geometric method is used to evaluate the amount of gathering data when sink nodes are moving. Finally, all sensor nodes transmit data according to the optimal data transmission scheme. Sink nodes gather the data along the shortest movement paths. Simulation results show that MLMS can prolong network lifetime, balance node energy consumption, and reduce data gathering latency under appropriate parameters. Under certain conditions, it outperforms Ratio_w, TPGF, RCC, and GRND.
Mir, Mariam; Ansari, Umar; Ali, Murtaza Najabat; Iftikhar, Muhammad Hassan Ul; Qayyum, Faisal
The design and fabrication of a wound healing device for chronic wounds, with multiple functions for controlled drug delivery and exudate removal, has been described in this paper. The structural features have been machined and modified through laser cutting in a biocompatible polymer cast. Miniaturized versions of electronically actuated (lead-screw and pulley) mechanisms are used for the specific purpose of controlled drug delivery. These mechanisms have been studied and tested, being controlled through a microcontroller setup. An auxetic polymeric barrier membrane has been used for restricting the drug quantities administered. Drug delivery mechanisms are powered wirelessly, through an external, active RF component; this communicates with a passive component that is buried inside the wound healing device. The exudate removal efficiency of the device has been assessed through several simple tests using simulated wound exudate. It has been found that reasonably precise quantities of drug dosages to be administered to the wound site can be controlled through both drug delivery mechanisms; however, the lead-screw mechanism provides a better control of auxetic barrier membrane actuation and hence controlled drug delivery. We propose that this device can have potential clinical significance in controlled drug delivery and exudate removal in the management of chronic wounds.
Manning, Mary Lou; Davis, James; Sparnon, Erin; Ballard, Raylene M
Health care providers are increasingly using wireless media tablets, such as the Apple iPad, especially in the hospital setting. In the absence of specific tablet disinfection guidelines the authors applied what is known about the contamination of other nonmedical mobile communication devices to create a "common sense" bundle to guide wireless media tablet infection prevention practices. Copyright © 2013 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.
Full Text Available Mobile sensing has become a new style of applications and most of the smart devices are equipped with varieties of sensors or functionalities to enhance sensing capabilities. Current sensing systems concentrate on how to enhance sensing capabilities; however, the sensors or functionalities may lead to the leakage of users’ privacy. In this paper, we present WiPass, a way to leverage the wireless hotspot functionality on the smart devices to snoop the unlock passwords/patterns without the support of additional hardware. The attacker can “see” your unlock passwords/patterns even one meter away. WiPass leverages the impacts of finger motions on the wireless signals during the unlocking period to analyze the passwords/patterns. To practically implement WiPass, we are facing the difficult feature extraction and complex unlock passwords matching, making the analysis of the finger motions challenging. To conquer the challenges, we use DCASW to extract feature and hierarchical DTW to do unlock passwords matching. Besides, the combination of amplitude and phase information is used to accurately recognize the passwords/patterns. We implement a prototype of WiPass and evaluate its performance under various environments. The experimental results show that WiPass achieves the detection accuracy of 85.6% and 74.7% for passwords/patterns detection in LOS and in NLOS scenarios, respectively.
Kotz, David; Cybenko, George; Gray, Robert S; Jiang, Guofei; Peterson, Ronald A; Hofmann, Martin O; Chacon, Daria A; Whitebread, Kenneth R; Hendler, James
.... In this paper we examine the tradeoffs faced when deciding whether to use mobile agents in a data-filtering application where numerous wireless clients filter information from a large data stream...
Full Text Available The proliferation of mobile communication and computing devices, in particular smart mobile phones, is almost paralleled with the increasing number of mobile device forensics tools in the market. Each mobile forensics tool vendor, on one hand claims to have a tool that is best in terms of performance, while on the other hand each tool vendor seems to be using different standards for testing their tools and thereby defining what support means differently. To overcome this problem, a testing framework based on a series of tests ranging from basic forensics tasks such as file system reconstruction up to more complex ones countering antiforensic techniques is proposed. The framework, which is an extension of an existing effort done in 2010, prescribes a method to clearly circumscribe the term support into precise levels. It also gives an idea of the standard to be developed and accepted by the forensic community that will make it easier for forensics investigators to quickly select the most appropriate tool for a particular mobile device.
Debbabi, Mourad; Talhi, Chamseddine
Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.
Tao, Q.; Veldhuis, Raymond N.J.
We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information
Tao, Q.; Veldhuis, Raymond N.J.
Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a
Vácha, Pavel; Haindl, Michal
Roč. 2013, č. 93 (2013), s. 52-52 ISSN 0926-4981 R&D Projects: GA ČR GA102/08/0593 Institutional support: RVO:67985556 Keywords : wood recognition * Markov random fields Subject RIV: BD - Theory of Information http:// library .utia.cas.cz/separaty/2013/RO/vacha-wood variety recognition on mobile devices.pdf
In this thesis, we presented a detailed study of the face verification problem on the mobile device, covering every component of the system. The study includes face detection, registration, normalization, and verification. Furthermore, the information fusion problem is studied to verify face
Full Text Available In the new Digital Economy, mobile devices are increasingly 978-0-620-76756-9being used for tasks that involve sensitive and/or financial data. Hitherto, security on smartphones has not been a priority and furthermore, users tend to ignore...
Full Text Available Actively engaging students in learning processes, especially as class sizes increase, has become a major challenge for many in education. While technological advances have begun to provide viable options, it can be a daunting task to choose among the technology available that will serve one's specific needs. The first part of this paper discusses some of the options that allow for more active learning, discussion of faculty/student factors in adoption considerations, and a focus on wireless polling devices (WPD in particular. The second section discusses data obtained from student opinion surveys on the use of WPDs in undergraduate classrooms and assessment of WPD technology on student learning via course grades.
Alf Inge Wang
Full Text Available This paper describes results and experiences from designing, implementing, and testing a multiplayer real-time game over mobile networks with high latency. The paper reports on network latency and bandwidth measurements from playing the game live over GPRS, EDGE, UMTS, and WLAN using the TCP and the UDP protocols. These measurements describe the practical constraints of various wireless networks and protocols when used for mobile multiplayer game purposes. Further, the paper reports on experiences from implementing various approaches to minimize issues related to high latency. Specifically, the paper focuses on a discussion about how much of the game should run locally on the client versus on the server to minimize the load on the mobile device and obtain sufficient consistency in the game. The game was designed to reveal all kinds of implementation issues of mobile network multiplayer games. The goal of the game is for a player to push other players around and into traps where they loose their lives. The game relies heavily on collision detection between the players and game objects. The paper presents experiences from experimenting with various approaches that can be used to handle such collisions, and highlights the advantages and disadvantages of the various approaches.
Pan, Jeffrey Junfeng; Pan, Sinno Jialin; Yin, Jie; Ni, Lionel M; Yang, Qiang
Recent years have witnessed the growing popularity of sensor and sensor-network technologies, supporting important practical applications. One of the fundamental issues is how to accurately locate a user with few labeled data in a wireless sensor network, where a major difficulty arises from the need to label large quantities of user location data, which in turn requires knowledge about the locations of signal transmitters or access points. To solve this problem, we have developed a novel machine learning-based approach that combines collaborative filtering with graph-based semi-supervised learning to learn both mobile users' locations and the locations of access points. Our framework exploits both labeled and unlabeled data from mobile devices and access points. In our two-phase solution, we first build a manifold-based model from a batch of labeled and unlabeled data in an offline training phase and then use a weighted k-nearest-neighbor method to localize a mobile client in an online localization phase. We extend the two-phase colocalization to an online and incremental model that can deal with labeled and unlabeled data that come sequentially and adapt to environmental changes. Finally, we embed an action model to the framework such that additional kinds of sensor signals can be utilized to further boost the performance of mobile tracking. Compared to other state-of-the-art systems, our framework has been shown to be more accurate while requiring less calibration effort in our experiments performed on three different testbeds.
Zhou, Steven Zhiying; Gilani, Syed Omer; Winkler, Stefan
Mobile phones have evolved from passive one-to-one communication device to powerful handheld computing device. Today most new mobile phones are capable of capturing images, recording video, and browsing internet and do much more. Exciting new social applications are emerging on mobile landscape, like, business card readers, sing detectors and translators. These applications help people quickly gather the information in digital format and interpret them without the need of carrying laptops or tablet PCs. However with all these advancements we find very few open source software available for mobile phones. For instance currently there are many open source OCR engines for desktop platform but, to our knowledge, none are available on mobile platform. Keeping this in perspective we propose a complete text detection and recognition system with speech synthesis ability, using existing desktop technology. In this work we developed a complete OCR framework with subsystems from open source desktop community. This includes a popular open source OCR engine named Tesseract for text detection & recognition and Flite speech synthesis module, for adding text-to-speech ability.
Full Text Available Seamless mobility management of the mesh clients (MCs in wireless mesh network (WMN has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO, mesh mobility management (M3, and wireless mesh mobility management (WMM have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC’s session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO, M3, and WMM with respect to total cost.
Majumder, Abhishek; Roy, Sudipta
Seamless mobility management of the mesh clients (MCs) in wireless mesh network (WMN) has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO), mesh mobility management (M(3)), and wireless mesh mobility management (WMM) have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR) based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC's session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO, M(3), and WMM with respect to total cost.
In this paper, an advanced wireless mobile collaborative sensing network will be developed. Through properly combining wireless sensor network, emerging mobile robots and multi-antenna sensing/communication techniques, we could demonstrate superiority of developed sensing network. To be concrete, heterogeneous mobile robots including unmanned aerial vehicle (UAV) and unmanned ground vehicle (UGV) are equipped with multi-model sensors and wireless transceiver antennas. Through real-time collaborative formation control, multiple mobile robots can team the best formation that can provide most accurate sensing results. Also, formatting multiple mobile robots can also construct a multiple-input multiple-output (MIMO) communication system that can provide a reliable and high performance communication network.
Mobility in WSNs (Wireless Sensor Networks) introduces significant challenges which do not arise in static WSNs. Reliable data transport is an important aspect of attaining consistency and QoS (Quality of Service) in several applications of MWSNs (Mobile Wireless Sensor Networks). It is important to understand how each of the wireless sensor networking characteristics such as duty cycling, collisions, contention and mobility affects the reliability of data transfer. If reliability is not managed well, the MWSN can suffer from overheads which reduce its applicability in the real world. In this paper, reliability assessment is being studied by deploying MWSN in different indoor and outdoor scenarios with various duty cycles of the motes and speeds of the mobile mote. Results show that the reliability is greatly affected by the duty cycled motes and the mobility using inherent broadcast mechanisms. (author)
R&D on new generation mobile network has attracted a growing interest over the world on the background of rapid market growth for 2nd and 3rd - generation cellular networks and wireless LANs/MANs. The National Institute of Information and Communications Technology (NICT) has been carried out the New Generation Mobile Network Project from April 2002 to March 2006, and has developed fundamental technologies to enable seamless and secure integration of various wireless access networks such as existing cellular networks, wireless LANs, home networks, intelligent transport systems (ITS), the Beyond-3G (B3G) cellular and other wireless access systems. From April 2006, Ubiquitous Mobile Network project focused on cognitive radio technology and integrated seamless networking technology was started. This paper overviews the achievement and the future plan of these projects.
Full Text Available Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.
Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.
Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun
With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.
Taylor, Stuart G [Los Alamos National Laboratory; Farinholt, Kevin M [Los Alamos National Laboratory; Figueiredo, Eloi [Los Alamos National Laboratory; Park, Gyuhae [Los Alamos National Laboratory; Farrar, Charles R [Los Alamos National Laboratory; Flynn, Eric B [UCSD; Mascarenas, David L [UCSD; Todd, Michael D [UCSD
A new wireless sensing network paradigm is presented for structural monitoring applications. In this approach, both power and data interrogation commands are conveyed via a mobile agent that is sent to sensor nodes to perform intended interrogations, which can alleviate several limitations of the traditional sensing networks. Furthermore, the mobile agent provides computational power to make near real-time assessments on the structural conditions. This paper will discuss such prototype systems, which are used to interrogate impedance-based sensors for structural health monitoring applications. Our wireless sensor node is specifically designed to accept various energy sources, including wireless energy transmission, and to be wirelessly triggered on an as-needed basis by the mobile agent or other sensor nodes. The capabilities of this proposed sensing network paradigm are demonstrated in the laboratory and the field.
Kjærgaard, Mikkel Baun; Blunck, Henrik
power savings while at the same time maintaining good quality of service. This paper proposes an unsupervised API-level method for power profiling mobile phones based on genetic algorithms. The method enables accurate profiling of the power consumption of devices and thereby provides the information......Today, power consumption is a main limitation for mobile phones. To minimize the power consumption of popular and traditionally power-hungry location-based services requires knowledge of how individual phone features consume power, so that those features can be utilized intelligently for optimal...... needed by methods that aim to minimize the power consumption of location-based and other services....
Kjærgaard, Mikkel Baun; Blunck, Henrik
power savings while at the same time maintaining good quality of service. This paper proposes an unsupervised API-level method for power profiling mobile phones based on genetic algorithms. The method enables accurate profiling of the power consumption of devices and thereby provides the information......Today, power consumption is a main limitation for mobile phones. To minimize the power consumption of popular and traditionally power-hungry location-based services requires knowledge of how individual phone features consume power, so that those features can be utilized intelligently for optimal...... needed by methods that aim to minimize the power consumption of location-based and other services....
Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.
... Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of... within the United States after importation of certain wireless communication devices, portable music and... music and data processing devices, computers and components thereof that infringe one or more of claim...
Pilar Alexandra Moreno
Full Text Available This article broadly describes the analysis, design and development of the system utilitarian, called “Reading and billing calculation site through mobile devices.” The application is oriented Public Services Companies, first water services, to perform part of the billing process “in place” through phones or any mobile devices compatible with Android. Will enable you to take readings of service consumption, recording new gauging, online update and control the information for users and turnover. This technology is considered as such one site billing method as through Internet is connected with the database of the company, sending and receiving date information, which makes the calculation of the billing for the reading period, bringing benefits to the client and the service generating company.
van Halteren, Aart; Pawar, P.
Nowadays mobile devices are characterized by higher processing power, lower costs, multiple network interfaces, ability to support multiple auxiliary devices and connect to the Internet using a wireless network. The applications collecting statistics concerning the mobile user, computational and
Blume, H.; Bischl, B.; Botteck, M.
The availability of huge nonvolatile storage capacities such as flash memory allows large music archives to be maintained even in mobile devices. With the increase in size, manual organization of these archives and manual search for specific music becomes very inconvenient. Automated dynamic...... organization enables an attractive new class of applications for managing ever-increasing music databases. For these types of applications, extraction of music features as well as subsequent feature processing and music classification have to be performed. However, these are computationally intensive tasks...... and difficult to tackle on mobile platforms. Against this background, we provided an overview of algorithms for music classification as well as their computation times and other hardware-related aspects, such as power consumption on various hardware architectures. For mobile platforms such as smartphones...
Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.
Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk; Lyou, Joon
Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs
Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)
Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.
Moorman, Bridget A; Cockle, Richard A
Financial pressures, an aging population, and a rising number of patients with chronic diseases, have encouraged the use of remote monitoring technologies. This usually entails at least one physiological parameter measurement for a clinician. Mobile telecommunication technologies lend themselves to this functionality, and in some cases, avoid some of the issues encountered with device integration. Moreover, the inherent characteristics of the mobile telecommunications infrastructure allow a coupling of business and clinical functions that were not possible before. Table I compares and contrasts some key aspect of device integration in and out of a healthcare facility. An HTM professional may be part of the team that acquires and/or manages a system using a mobile telecommunications technology. It is important for HTM professionals to ensure the data is in a standard format so that the interfaces across this system don't become brittle and break easily if one part changes. Moreover, the security and safety considerations of the system and the data should be a primary consideration in and y purchase, with attention given to the proper environmental and encryption mechanisms. Clinical engineers and other HTM professionals are unique in that they understand the patient/clinician/device interface and the need to ensure its safety and effectiveness regardless of geographical environment.
Full Text Available In many countries or regions the capacity of health care resources is below the needs of the population and new approaches for health surveillance are needed. Innovative projects, utilizing wireless communication technology, contribute to reliable methods for field-work data collection and reporting to databases. The objective was to describe a new version of a wireless IT-support system for field-work data collection and administration. The system requirements were drawn from the design objective and translated to system functions. The system architecture was based on field-work experiences and administrative requirements. The Smartphone devices were HTC Touch Diamond2s, while the system was based on a platform with Microsoft .NET components, and a SQL Server 2005 with Microsoft Windows Server 2003 operating system. The user interfaces were based on .NET programming, and Microsoft Windows Mobile operating system. A synchronization module enabled download of field data to the database, via a General Packet Radio Services (GPRS to a Local Area Network (LAN interface. The field-workers considered the here-described applications user-friendly and almost self-instructing. The office administrators considered that the back-office interface facilitated retrieval of health reports and invoice distribution. The current IT-support system facilitates short lead times from field-work data registration to analysis, and is suitable for various applications. The advantages of wireless technology, and paper-free data administration need to be increasingly emphasized in development programs, in order to facilitate reliable and transparent use of limited resources.
Roberts, Neil; Rees, Michael
Mobile devices are increasingly used by students in university lectures. This has resulted in controversy and the banning of mobile devices in some lectures. Although there has been some research into how students use laptop computers in lectures, there has been little investigation into the wider use of mobile devices. This study was designed to…
Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.
Full Text Available Mobile app-based device utilization, including smartphones and handheld tablets, suggests a need to evaluate evidence to guide selection and implementation of these devices in the occupational therapy process. The purpose of the research was to explore the current body of evidence in relation to mobile app-based devices and to identify factors in the use of these devices throughout the occupational therapy process. Following review of available occupational therapy profession guidelines, assistive technology literature, and available mobile device research, practitioners using mobile app-based devices in occupational therapy should consider three areas: client needs, practitioner competence, and device factors. The purpose of this guideline is to identify factors in the selection and use of mobile app-based devices throughout the occupational therapy process based on available evidence. Considerations for mobile device implementation during the occupational therapy process is addressed, including evaluating outcomes needs, matching device with the client, and identifying support needs of the client.
Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.
Coverage of wireless sensor networks (WSNs) is an important quality of service (QoS) metric and often the desired coverage is not attainable at the initial deployment, but node mobility can be used to improve the coverage by relocating sensor nodes. Unconstrained node mobility is considered infea...
Heijenk, Geert; Bargh, Mortaza S.; Laganier, Julien; Prasad, Anand R.
Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the
Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo
This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...... some statistics of the size of the mesh network and type of constituent nodes. This information is essential for analyzing and devising cooperative strategies among the terminals of mesh networks in different scenarios....... networks. The results represent typically worst-case situations, as more and more people tend to switch off their short-range technology due to the battery consumption and the possible attacks. We explore typical public places like airports, convention centers, shopping malls and bars and extract from them...
Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo
This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...... networks. The results represent typically worst-case situations, as more and more people tend to switch off their short-range technology due to the battery consumption and the possible attacks. We explore typical public places like airports, convention centers, shopping malls and bars and extract from them...... some statistics of the size of the mesh network and type of constituent nodes. This information is essential for analyzing and devising cooperative strategies among the terminals of mesh networks in different scenarios....
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-853] Certain Wireless Consumer Electronics Devices and Components Thereof; Commission Determination Concerning an Initial Determination Granting a Motion To Amend Complaint and Notice of Investigation AGENCY: U.S. International Trade...
Full Text Available The availability of multiple collocated wireless networks using heterogeneous technologies and the multiaccess support of contemporary mobile devices have allowed wireless connectivity optimization, enabled through vertical handover (VHO operations. However, this comes at high energy consumption on the mobile device due to the inherently expensive nature of some of the involved operations. This work proposes exploiting short-range cooperation among collocated mobile devices to improve the energy efficiency of vertical handover operations. The proactive exchange of handover-related information through low-energy short-range communication technologies, like Bluetooth, can help in eliminating expensive signaling steps when the need for a VHO arises. A model is developed for capturing the mean energy expenditure of such an optimized VHO scheme in terms of relevant factors by means of closed-form expressions. The descriptive power of the model is demonstrated by investigating various typical usage scenarios and is validated through simulations. It is shown that the proposed scheme has superior performance in several realistic usage scenarios considering important relevant factors, including network availability, the local density of mobile devices, and the range of the cooperation technology. Finally, the paper explores cost/benefit trade-offs associated with the short-range cooperation protocol. It is demonstrated that the protocol may be parametrized so that the trade-off becomes nearly optimized and the cost is maintained affordable for a wide range of operational scenarios.
Chandrasekhar, Arunkumar; Alluri, Nagamalleswara Rao; Sudhakaran, M S P; Mok, Young Sun; Kim, Sang-Jae
A Smart Mobile Pouch Triboelectric Nanogenerator (SMP-TENG) is introduced as a promising eco-friendly approach for scavenging biomechanical energy for powering next generation intelligent devices and smart phones. This is a cost-effective and robust method for harvesting energy from human motion, by utilizing worn fabrics as a contact material. The SMP-TENG is capable of harvesting energy in two operational modes: lateral sliding and vertical contact and separation. Moreover, the SMP-TENG can also act as a self-powered emergency flashlight and self-powered pedometer during normal human motion. A wireless power transmission setup integrated with SMP-TENG is demonstrated. This upgrades the traditional energy harvesting device into a self-powered wireless power transfer SMP-TENG. The wirelessly transferred power can be used to charge a Li-ion battery and light LEDs. The SMP-TENG opens a wide range of opportunities in the field of self-powered devices and low maintenance energy harvesting systems for portable and wearable electronic gadgets.
National Aeronautics and Space Administration — This proposal describes the preliminary development of surface acoustic wave (SAW) based hypergolic fuel sensors for NASA application to distributed wireless leak...
Miyamoto, Kenji; Kuwano, Shigeru; Terada, Jun; Otaka, Akihiro
We analyze the mobile fronthaul (MFH) bandwidth and the wireless transmission performance in the split-PHY processing (SPP) architecture, which redefines the functional split of centralized/cloud RAN (C-RAN) while preserving high wireless coordinated multi-point (CoMP) transmission/reception performance. The SPP architecture splits the base stations (BS) functions between wireless channel coding/decoding and wireless modulation/demodulation, and employs its own CoMP joint transmission and reception schemes. Simulation results show that the SPP architecture reduces the MFH bandwidth by up to 97% from conventional C-RAN while matching the wireless bit error rate (BER) performance of conventional C-RAN in uplink joint reception with only 2-dB signal to noise ratio (SNR) penalty.
Özdağ, Recep; Karcı, Ali
The dynamic deployment of sensors in wireless networks significantly affects the performance of the network. However, the efficient application of dynamic deployments which determines the positions of the sensors within the network increases the coverage area of the network. As a result of this, dynamic deployment increases the efficiency of the wireless sensor networks (WSNs). In this paper, dynamic deployment was applied to WSNs which consist of mobile sensors by aiming at increasing the co...
categorized into two types: fixed and mobile wireless. The broadband fixed wireless network technologies .... 3.0 WIRELESS FIDELITYF (Wi-Fi). NETWORK IMPLEMENTATION. A Wi-Fi enabled device such as a PC, game .... Amateur radio, video senders, and cordless phones, can cause significant additional interference.
Natalia Quintas-Froufe; Ana González-Neira
Mobile device advertising is a rapidly growing market due to the penetration of mobile devices in Spanish society. Advertising communication in this digital ecosystem continually poses new challenges. One of these - the subject of this proposal - is the link-up between mobile advertising with social TV. It opens up new possibilities for the development of advertising strategies on mobile devices.The aim of this paper is to describe the challenges faced by the Spanish advertising industry with...
Vincze, Zoltan; Vidacs, Attila; Vida, Rolland
...; therefore, relaying information between sensors and a sink node, possibly over multiple wireless hops, in an energy-efficient manner is a challenging task that preoccupies the research community for some time now...
Fareq, M; Fitra, M; Irwanto, M; Hasan, Syafruddin; Arinal, M
A wireless power transfer (WPT) using inductive coupling for mobile phone charger is studied. The project is offer to study and fabricate WPT using inductive coupling for mobile phone charger that will give more information about distance is effect for WPT performance and WPT is not much influenced by the presence of hands, books and types of plastics. The components used to build wireless power transfer can be divided into 3 parts components, the transceiver for power transmission, the inductive coils in this case as the antenna, receiver and the rectifier which act convert AC to DC. Experiments have been conducted and the wireless power transfer using inductive coupling is suitable to be implemented for mobile phone charger.
Yu, Weider D; Ray, Pradeep; Motoc, Tiberiu
It is important to improve the efficiency of healthcare-related operations and the associated costs. Healthcare organizations are constantly under increased pressure to streamline operations and provide enhanced services to their patients. Wireless mobile computing technology has the potential to provide the desired benefits and would be a critical part of today's healthcare information system. In this paper, a system is presented to better facilitate the functions of physicians and medical staff in healthcare by using modern wireless mobile technology, Radio Frequency Identification (RFID) tools, and multimedia streaming. The paper includes a case study of the development of such a system in the context of healthcare in the United States. The results of the study show how wireless mobile multimedia systems can be developed for the improvement of the quality and efficiency in healthcare for other nations as well. Our testing data show a time reduction of more than 50% in the daily activities of hospital staff.
Tabuenca, Bernardo; Drachsler, Hendrik; Ternier, Stefaan; Specht, Marcus
Tabuenca, B., Drachsler, H., Ternier, S., & Specht, M. (2012, December). OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and Future Trends. Europe eleaning papers, [Special issue] Mobile learning 2012.
Full Text Available Node localization is the core in wireless sensor network. It can be solved by powerful beacons, which are equipped with global positioning system devices to know their location information. In this article, we present a novel sparse localization approach with a mobile beacon based on LU decomposition. Our scheme firstly translates node localization problem into a 1-sparse vector recovery problem by establishing sparse localization model. Then, LU decomposition pre-processing is adopted to solve the problem that measurement matrix does not meet the re¬stricted isometry property. Later, the 1-sparse vector can be exactly recovered by compressive sensing. Finally, as the 1-sparse vector is approximate sparse, weighted Cen¬troid scheme is introduced to accurately locate the node. Simulation and analysis show that our scheme has better localization performance and lower requirement for the mobile beacon than MAP+GC, MAP-M, and MAP-MN schemes. In addition, the obstacles and DOI have little effect on the novel scheme, and it has great localization performance under low SNR, thus, the scheme proposed is robust.
Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.
... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Mobile equipment; automatic warning devices. 77... UNDERGROUND COAL MINES Safeguards for Mechanical Equipment § 77.410 Mobile equipment; automatic warning devices. (a) Mobile equipment such as front-end loaders, forklifts, tractors, graders, and trucks, except...
Maria Cristina Enache
Full Text Available Mobile commerce, or m-commerce, refers to the use of wireless digital devices to enable transactions on the Web. Described more fully in Chapter 3, m-commerce involves the use of wireless networks to connect cell phones, handheld devices such Blackberries, and personal computers to the Web. Once connected, mobile consumers can conduct transactions, including stock trades, in-store price comparisons, banking, travel reservations, and more.
of interest, getting weather information, and tracking the whereabouts of a child. Mobile location services gained a great deal of interest in 2000, and they were envisioned by the business players in the mobile service market as one of the few service categories where the mobile users would be willing to pay...... usage of the mobile location services is still not very high compared to other entertainment and messaging services. The mobile location services are currently not the important part of the mobile data services, and the services have obviously not yet met the hyped expectation of the mass-market......Mobile location services exploit mobile location technologies for determining where a mobile user is geographically located. This information can then be used for providing location-specific content to the mobile user. The mobile location services can be used, for example, for finding points...
Grubert, Jens; Ofek, Eyal; Pahud, Michel; Kranz, Matthias; Schmalstieg, Dieter
Around-device interaction promises to extend the input space of mobile and wearable devices beyond the common but restricted touchscreen. So far, most around-device interaction approaches rely on instrumenting the device or the environment with additional sensors. We believe, that the full potential of ordinary cameras, specifically user-facing cameras, which are integrated in most mobile devices today, are not used to their full potential, yet. We To this end, we present a novel approach for...
Marshall, Kristin A.; Liedtke, Aleesha M.; Todt, Anika H.; Walker, Travis W.
The on-site characterization of complex fluids is important for a number of academic and industrial applications. Consequently, a need exists to develop portable rheometers that can provide in the field diagnostics and serve as tools for rapid quality assurance. With the advancement of smartphone technology and the widespread global ownership of smart devices, mobile applications are attractive as platforms for rheological characterization. The present work investigates the use of a smartphone device for the extensional characterization of a series of Boger fluids composed of glycerol/water and poly(ethylene oxide), taking advantage of the increasing high-speed video capabilities (currently up to 240 Hz capture rate at 720p) of smartphone cameras. We report a noticeable difference in the characterization of samples with slight variations in polymer concentration and discuss current device limitations. Potential benefits of a handheld extensional rheometer include its use as a point-of-care diagnostic tool, especially in developing communities, as well as a simple and inexpensive tool for assessing product quality in industry.
Mailhot, Tanya; Lavoie, Patrick; Maheu-Cadotte, Marc-André; Fontaine, Guillaume; Cournoyer, Alexis; Côté, José; Dupuis, France; Karsenti, Thierry; Cossette, Sylvie
Measuring engagement and other reactions of patients and health professionals to e-health and e-learning interventions remains a challenge for researchers. The aim of this pilot study was to assess the feasibility and acceptability of using a wireless electroencephalography (EEG) device to measure affective (anxiety, enjoyment, relaxation) and cognitive (attention, engagement, interest) reactions of patients and healthcare professionals during e-health or e-learning interventions. Using a wireless EEG device, we measured patient (n = 6) and health professional (n = 7) reactions during a 10-minute session of an e-health or e-learning intervention. The following feasibility and acceptability indicators were assessed and compared for patients and healthcare professionals: number of eligible participants who consented to participate, reasons for refusal, time to install and calibrate the wireless EEG device, number of participants who completed the full 10-minute sessions, participant comfort when wearing the device, signal quality, and number of observations obtained for each reaction. The wireless EEG readings were compared to participant self-rating of their reactions. We obtained at least 75% of possible observations for attention, engagement, enjoyment, and interest. EEG scores were similar to self-reported scores, but they varied throughout the sessions, which gave information on participants' real-time reactions to the e-health/e-learning interventions. Results on the other indicators support the feasibility and acceptability of the wireless EEG device for both patients and professionals. Using the wireless EEG device was feasible and acceptable. Future studies must examine its use in other contexts of care and explore which components of the interventions affected participant reactions by combining wireless EEG and eye tracking.
... Communications, Inc. of San Diego, California; LG Electronics, Inc. of Seoul, Korea; LG Electronics U.S.A., Inc... Electronics Devices and Components Thereof; Notice of Request for Statements on the Public Interest AGENCY: U... wireless consumer electronics devices and components thereof imported by respondents Acer, Inc. of Taipei...
Hopf, Jens Michael
Currently, companies have covered their business processes with stationary workstations while mobile business applications have limited relevance. Companies can cover their overall business processes more time-efficiently and cost-effectively when they integrate mobile users in workflows using mobile device features. The objective is a framework that can be used to model and control business applications for PLM processes using mobile device features to allow a totally new user experience.
Alvarez, Rosio; Rodriguez, Juana Maria
This paper examines Municipal Wireless (MW) deployments in the United States. In particular, the interest is in understanding how discourse has worked to mobilize widespread support for MW networks. We explore how local governments discursively deploy the language of social movements to create a shared understanding of the networking needs of communities. Through the process of"framing" local governments assign meaning to the MW networks in ways intended to mobilize support anddemobilize opposition. The mobilizing potential of a frame varies and is dependent on its centrality and cultural resonance. We examine the framing efforts of MW networks by using a sample of Request for Proposals for community wireless networks, semi-structured interviews and local media sources. Prominent values that are central to a majority of the projects and others that are culturally specific are identified and analyzed for their mobilizing potency.
Kim, Young-Duk; Yang, Yeon-Mo; Kang, Won-Seok; Kim, Jin-Wook; An, Jinung
Recently, WSNs (Wireless Sensor Networks) with mobile robot is a growing technology that offer efficient communication services for anytime and anywhere applications. However, the tiny sensor node has very limited network resources due to its low battery power, low data rate, node mobility, and channel interference constraint between neighbors. Thus, in this paper, we proposed a tree based self-routing protocol for autonomous mobile robots based on beacon mode and implemented in real test-bed environments. The proposed scheme offers beacon based real-time scheduling for reliable association process between parent and child nodes. In addition, it supports smooth handover procedure by reducing flooding overhead of control packets. Throughout the performance evaluation by using a real test-bed system and simulation, we illustrate that our proposed scheme demonstrates promising performance for wireless sensor networks with mobile robots.
Full Text Available This paper presents the Wi-Fi phone with RFID (Radio frequency identification of student entered the school, via Wireless Access Points (APs of school will transmit MAC address with RFID of Wi-Fi phone to Internet Data Center (IDC for server and then the message exchanged by using GSM (or 3G has been transmitted message (or mail to the mobile user of parents (or client user. The wireless access points support broadcasting multiple SSIDs, each of which can have a different set of security and network setting. The RADIUS server is used to authenticate the Wireless Access Point (AP and mobile nodes. In safety case system, we used the several authentication and encryption options for the WLAN. We will discuss the use of Wi-Fi protected Access (WPA, RFID, IP Security (IPSec, and Secure Socket Layer (SSL, and there are high Quality of service (QoS and performance.
This is where automatic triaging and categorization comes into play . Work on datamining andmachine learning has helped advance the ability to...triage mobile devices and more efficiently find the content that would be of value on mobile devices . Machine learning and data mining algorithms...mobile device images. Conversion was performed using an existing Python script that was written by Riqui Schwamm and Dr. Neil C. Rowe from NPS. "DFXML
Wiedermann, Jiří; Pardubská, D.
Roč. 19, č. 4 (2008), s. 887-913 ISSN 0129-0541 R&D Projects: GA AV ČR 1ET100300517 Institutional research plan: CEZ:AV0Z10300504 Keywords : alternating Turing machine * simulation * simultaneous time-space complexity * wireless parallel Turing machine Subject RIV: IN - Informatics, Computer Science Impact factor: 0.554, year: 2008
We present a novel framework for visualizing routes on mobile devices. Our framework is suitable for helping users explore their environment. First, given a starting point and a maximum route length, the system retrieves nearby points of interest (POIs). Second, we automatically compute an attractive walking path through the environment trying to pass by as many highly ranked POIs as possible. Third, we automatically compute a route visualization that shows the current user position, POI locations via pins, and detail lenses for more information about the POIs. The visualization is an animation of an orthographic map view that follows the current user position. We propose an optimization based on a binary integer program (BIP) that models multiple requirements for an effective placement of detail lenses. We show that our path computation method outperforms recently proposed methods and we evaluate the overall impact of our framework in two user studies.
... service providers to apprise the Commission of network outages that exceed certain quantitative thresholds... facilities-based mobile wireless service provider uses roaming on a routine basis to expand its coverage... think that the percentage of inoperable sites within a county equals the percentage of lost coverage...
Monteiro, E.; Curado, M.; Heijenk, Geert; Braun, T.; Granjal, J.
Message from the chairs We had the great pleasure to welcome all participants to the 7th IFIP Wireless and Mobile Networking Conference. (WMNC 2014), organized by the University of Coimbra, and held in Vilamoura, Portugal, May 20 – 22, 2014. WMNC 2014 was sponsored by IFIP TC6, and technically
Wang, Le; Ukhanova, Ann; Belyaev, Evgeny
This paper presents the analysis of the power consumption of data transmission with constant bit rate over 3G mobile wireless networks. Our work includes the description of the transition state machine in 3G networks, followed by the detailed energy consumption analysis and measurement results...
In this paper, we derive an asymptotic closed--form expression for the error bound on extrapolation of doubly selective mobile MIMO wireless channels. The bound shows the relationship between the prediction error and system design parameters such as bandwidth, number of antenna elements, and number...
Full Text Available This paper presents a low-cost and energy-saving urban mobility monitoring system based on wireless sensor networks (WSNs. The primary components of the proposed sensor unit are a Bluetooth sensor and a Zigbee transceiver. Within the WSN, the Bluetooth sensor captures the MAC addresses of Bluetooth units equipped in mobile devices and car navigation systems. The Zigbee transceiver transmits the collected MAC addresses to a data center without any major communications infrastructures (e.g., fiber optics and 3G/4G network. A total of seven prototype sensor units have been deployed on roadway segments in Newark, New Jersey, for a proof of concept (POC test. The results of the POC test show that the performance of the proposed sensor unit appears promising, resulting in 2% of data drop rates and an improved Bluetooth capturing rate.
Brian Blake, M.; Das, Kallol; Zand, P.; Havinga, Paul J.M.
Vibration monitoring and analysis techniques are used increasingly for predictive maintenance. While traditional vibration monitoring relies on wired sensor networks, recent industrial technologies such as WirelessHART, ISA100.11a, and IEEE802.15.4e have brought a paradigm shift in the automation
Full Text Available In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating “bottleneck” sensor nodes is also developed in this paper.
Ding, Xu; Han, Jianghong; Shi, Lei
In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating "bottleneck" sensor nodes is also developed in this paper.
Ding, Xu; Han, Jianghong; Shi, Lei
In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating “bottleneck” sensor nodes is also developed in this paper. PMID:25785305
Full Text Available Target detection is a widely used application for area surveillance, elder care, and fire alarms; its purpose is to find a particular object or event in a region of interest. Usually, fixed observing stations or static sensor nodes are arranged uniformly in the field. However, each part of the field has a different probability of being intruded upon; if an object suddenly enters an area with few guardian devices, a loss of detection will occur, and the stations in the safe areas will waste their energy for a long time without any discovery. Thus, mobile wireless sensor networks may benefit from adaptation and pertinence in detection. Sensor nodes equipped with wheels are able to move towards the risk area via an adaptive learning procedure based on Bayesian networks. Furthermore, a clustering algorithm based on k-means++ and an energy control mechanism is used to reduce the energy consumption of nodes. The extended Kalman filter and a voting data fusion method are employed to raise the localization accuracy of the target. The simulation and experimental results indicate that this new system with adaptive energy-efficient methods is able to achieve better performance than the traditional ones.
Zou, Tengyue; Li, Zhenjia; Li, Shuyuan; Lin, Shouying
Target detection is a widely used application for area surveillance, elder care, and fire alarms; its purpose is to find a particular object or event in a region of interest. Usually, fixed observing stations or static sensor nodes are arranged uniformly in the field. However, each part of the field has a different probability of being intruded upon; if an object suddenly enters an area with few guardian devices, a loss of detection will occur, and the stations in the safe areas will waste their energy for a long time without any discovery. Thus, mobile wireless sensor networks may benefit from adaptation and pertinence in detection. Sensor nodes equipped with wheels are able to move towards the risk area via an adaptive learning procedure based on Bayesian networks. Furthermore, a clustering algorithm based on k -means++ and an energy control mechanism is used to reduce the energy consumption of nodes. The extended Kalman filter and a voting data fusion method are employed to raise the localization accuracy of the target. The simulation and experimental results indicate that this new system with adaptive energy-efficient methods is able to achieve better performance than the traditional ones.
Full Text Available , MOBILedit! Forensic and Cell Seizure. These tools were designed for different purposes, but their main objective was to minimize wireless crime, however these tools have their own challenges. The main challenge about these tools is that they were...
Gonçalves, L. B. L.; Costa, F. G.; Neves, L. A.; Ueyama, J.; Zafalon, G. F. D.; Montez, C.; Pinto, A. S. R.
Precision Spray is a technique to increase performance of Precision Agriculture. This spray technique may be aided by a Wireless Sensor Network, however, for such approach, the communication between the agricultural input applicator vehicle and network is critical due to its proper functioning. Thus, this work analyzes how the number of nodes in a wireless sensor network, its type of distribution and different areas of scenario affects the performance of communication. We performed simulations to observe system's behavior changing to find the most fitted non-controlled mobility model to the system.
Gonçalves, L B L; Neves, L A; Zafalon, G F D; Costa, F G; Ueyama, J; Montez, C; Pinto, A S R
Precision Spray is a technique to increase performance of Precision Agriculture. This spray technique may be aided by a Wireless Sensor Network, however, for such approach, the communication between the agricultural input applicator vehicle and network is critical due to its proper functioning. Thus, this work analyzes how the number of nodes in a wireless sensor network, its type of distribution and different areas of scenario affects the performance of communication. We performed simulations to observe system's behavior changing to find the most fitted non-controlled mobility model to the system
Full Text Available -HSPA technologies, are the most common wireless broadband technology and facilitates a standards-based migration which allows the utilization of legacy infrastructure. 3G-HSPA systems can interoperate and share the core network with the legacy GSM 2G and 2.5G... networks. Also a packet switching core-network can be designed to share and interoperate with WiFi and WiMAX broadband wireless technologies. It is clear that standards-based migration lowers the cost of mobile broadband services. By utilizing...
... guidance entitled ``Radio Frequency Wireless Technology in Medical Devices; Guidance for Industry and Food... Wireless Technology in Medical Devices; Guidance for Industry and Food and Drug Administration Staff,'' you... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration [Docket No. FDA-2006-D-0300...
doing well with regard to connectivity of broadband and Internet access, and Denmark has also developed an advanced market for mobile services. The major share of the Danish mobile sector is concentrated in the capital region. In relative terms the mobile sector is largest in Northern Jutland......The aim of this paper is to analyze the potential of the Copenhagen capital region to maintain a leading position in development and provision of mobile technologies. The paper presents empirical data on the mobile sector in the capital region in order to identify strengths and weaknesses...... of the Capital Region of Copenhagen. Denmark is as the rest of Scandinavia considered to be among the leading countries with regard to mobile and wireless communication. This position has been confirmed in a long series of benchmarking analyses comparing e-readiness in countries and regions. Denmark is also...
Huang, Shuo; Liu, Jing
Application of clinical digital medical imaging has raised many tough issues to tackle, such as data storage, management, and information sharing. Here we investigated a mobile phone based medical image management system which is capable of achieving personal medical imaging information storage, management and comprehensive health information analysis. The technologies related to the management system spanning the wireless transmission technology, the technical capabilities of phone in mobile health care and management of mobile medical database were discussed. Taking medical infrared images transmission between phone and computer as an example, the working principle of the present system was demonstrated.
Unal, Zafer; Unal, Aslihan
This study investigates and reports the first time experiences of mobile device users accessing the course materials on both the web and mobile version of course management system (Web Moodle & Mobile Moodle) during an online course offered at the University of South Florida, St. Petersburg College of Education.
Boissy, Patrice; Hester, Todd; Sherrill, Delsey
Mobility assistive devices (MAD) such as canes can improve mobility and allow independence in the performance of mobility-related tasks. The use of MAD is often prescribed for stroke survivors. Despite their acknowledged qualities, MAD in real life conditions are typically underutilized, misused ...
Issues users have with use of the web on a mobile device can be attributed to difficulties with the mobile interface. A major challenge that we address is improving the user experience for handling of interruptions and multitasking when using the web in a mobile context. The usability issues with a
Issues users have with use of the web on a mobile device can be attributed to difficulties with the mobile interface. A major challenge that we address is improving the user experience for handling of interruptions and multitasking when using the web in a mobile context. The usability issues with a
Pratama, Ahmad R.
This study investigates daily mobile device use among Indonesian university students by using survey data collected in the first quarter of 2016. The data show that 55.49% of the students spend more than five hours a day on their mobile devices. OLS regression analysis shows that female students, owners of the most expensive smartphone or tablet, and those who access social media apps and play mobile games frequently are more likely to spend more time on their mobile devices each day. Contrary to that, those who consider themselves as laggards are less likely to do so. The findings in this study help better understand how university students in Indonesia use their mobile device and lay a foundation as part of a larger research agenda about the relationship between mobile technology and education in Indonesia.
Karmarkar, Amol M; Dicianno, Brad E; Cooper, Rosemarie; Collins, Diane M; Matthews, Judith T; Koontz, Alicia; Teodorski, Emily E; Cooper, Rory A
The purpose of this study was to determine whether the use of wheeled mobility devices differed with respect to age, gender, residential setting, and health-related factors among older adults. A total of 723 adults ageing 60 and older are representing three cohorts, from nursing homes, the Center for Assistive Technology, and the wheelchair registry from the Human Engineering Research Laboratories. Wheeled mobility devices were classified into three main groups: manual wheelchairs, power wheelchairs, and scooters. Our results found factors including age, gender, diagnosis, and living settings to be associated with differences in use of manual versus powered mobility devices. Differences in use were also noted for subtypes of manual (depot, standard, and customized) and powered (scooter, standard, and customized) mobility devices, on demographic, living arrangements, and health-related factors. Consideration of demographic, health-related, and environmental factors during the prescription process may help clinicians identify the most appropriate mobility device for the user.
Amol M. Karmarkar
Full Text Available The purpose of this study was to determine whether the use of wheeled mobility devices differed with respect to age, gender, residential setting, and health-related factors among older adults. A total of 723 adults ageing 60 and older are representing three cohorts, from nursing homes, the Center for Assistive Technology, and the wheelchair registry from the Human Engineering Research Laboratories. Wheeled mobility devices were classified into three main groups: manual wheelchairs, power wheelchairs, and scooters. Our results found factors including age, gender, diagnosis, and living settings to be associated with differences in use of manual versus powered mobility devices. Differences in use were also noted for subtypes of manual (depot, standard, and customized and powered (scooter, standard, and customized mobility devices, on demographic, living arrangements, and health-related factors. Consideration of demographic, health-related, and environmental factors during the prescription process may help clinicians identify the most appropriate mobility device for the user.
Sloane, Elliot; Gehlot, Vijay
Hospitals and manufacturers are designing and deploying the IEEE 802.x wireless technologies in medical devices to promote patient mobility and flexible facility use. There is little information, however, on the reliability or ultimate safety of connecting multiple wireless life-critical medical devices from multiple vendors using commercial 802.11a, 802.11b, 802.11g or pre-802.11n devices. It is believed that 802.11-type devices can introduce unintended life-threatening risks unless delivery of critical patient alarms to central monitoring systems and/or clinical personnel is assured by proper use of 802.11e Quality of Service (QoS) methods. Petri net tools can be used to simulate all possible states and transitions between devices and/or systems in a wireless device network, and can identify failure modes in advance. Colored Petri Net (CPN) tools are ideal, in fact, as they allow tracking and controlling each message in a network based on pre-selected criteria. This paper describes a research project using CPN to simulate and validate alarm integrity in a small multi-modality wireless patient monitoring system. A 20-monitor wireless patient monitoring network is created in two versions: one with non-prioritized 802.x CSM protocols and the second with simulated Quality of Service (QoS) capabilities similar to 802.11e (i.e., the second network allows message priority management.) In the standard 802.x network, dangerous heart arrhythmia and pulse oximetry alarms could not be reliably and rapidly communicated, but the second network's QoS priority management reduced that risk significantly.
Wang, Tian; Wu, Qun; Wen, Sheng; Cai, Yiqiao; Tian, Hui; Chen, Yonghong; Wang, Baowei
WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks by introducing mobile actuator elements. Previous studies indicated that mobile actuators can improve network performance in terms of data collection, energy supplementation, etc. However, according to our experimental simulations, the actuator's mobility also causes the sensor worm to spread faster if an attacker launches worm attacks on an actuator and compromises it successfully. Traditional worm propagation models and defense strategies did not consider the diffusion with a mobile worm carrier. To address this new problem, we first propose a microscopic mathematical model to describe the propagation dynamics of the sensor worm. Then, a two-step local defending strategy (LDS) with a mobile patcher (a mobile element which can distribute patches) is designed to recover the network. In LDS, all recovering operations are only taken in a restricted region to minimize the cost. Extensive experimental results demonstrate that our model estimations are rather accurate and consistent with the actual spreading scenario of the mobile sensor worm. Moreover, on average, the LDS outperforms other algorithms by approximately 50% in terms of the cost.
Aziz, Hussein Muzahim; Grahn, Håkan; Lundberg, Lars
Transmitting a real time video streaming over a wireless network cannot guarantee that all the frames could be received by the mobile devices. The characteristics of a wireless network in terms of the available bandwidth, frame delay, and frame losses cannot be known in advanced. In this work, we propose a new mechanism for streaming video over a wireless channel. The proposed mechanism prevents freezing frames in the mobile devices. This is done by splitting the video frame in two sub-frames...
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.
Eom, Kyungsik; Jeong, Joonsoo; Lee, Tae Hyung; Lee, Sung Eun; Jun, Sang Bum; Kim, Sung June
A wireless power delivery system is developed to deliver electrical power to the neuroprosthetic devices that are implanted into animals freely moving inside the cage. The wireless powering cage is designed for long-term animal experiments without cumbersome wires for power supply or the replacement of batteries. In the present study, we propose a novel wireless power transmission system using resonator-based inductive links to increase power efficiency and to minimize the efficiency variations. A columnar transmitter coil is proposed to provide lateral uniformity of power efficiency. Using this columnar transmitter coil, only 7.2% efficiency fluctuation occurs from the maximum transmission efficiency of 25.9%. A flexible polymer-based planar type receiver coil is fabricated and assembled with a neural stimulator and an electrode. Using the designed columnar transmitter coil, the implantable device successfully operates while it moves freely inside the cage.
Ma, Junjie; Meng, Fansheng; Zhou, Yuexi; Wang, Yeyao; Shi, Ping
Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible) spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO) procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.
Full Text Available Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.
Zhou, Yuexi; Wang, Yeyao; Shi, Ping
Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible) spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO) procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths. PMID:29462929
Abstract Wireless communication is an integral part of our daily life, the mobile phone is an example of a very popular wireless communication device. A communication link consists of a transmitter, a receiver and the transmission medium, which air or vacuum for a wireless link. Part of the receiver
Seidman, Seth; Kainz, Wolfgang; Ruggera, Paul; Mendoza, Gonzalo
This paper presents experimental testing that has been performed on wireless communication devices as victims of electromagnetic interference (EMI). Wireless victims included universal serial bus (USB) network adapters and personal digital assistants (PDAs) equipped with IEEE 802.11b and Bluetooth technologies. The experimental data in this paper was gathered in an anechoic chamber and a gigahertz transverse electromagnetic (GTEM) cell to ensure reliable and repeatable results. This testing includes: Electromagnetic compatibility (EMC) testing performed in accordance with IEC 60601-1-2, an in-band sweep of EMC testing, and coexistence testing. The tests in this study show that a Bluetooth communication was able to coexist with other Bluetooth devices with no decrease in throughput and no communication breakdowns. However, testing revealed a significant decrease in throughput and increase in communication breakdowns when an 802.11b source is near an 802.11b victim. In a hospital setting decreased throughput and communication breakdowns can cause wireless medical devices to fail. It is therefore vital to have an understanding of the effect EMI can have on wireless communication devices.
Full Text Available Due to the rapid development of wireless charging technology, the recharging issue in wireless rechargeable sensor network (WRSN has been a popular research problem in the past few years. The weakness of previous work is that charging route planning is not reasonable. In this work, a dynamic optimal scheduling scheme aiming to maximize the vacation time ratio of a single mobile changer for WRSN is proposed. In the proposed scheme, the wireless sensor network is divided into several sub-networks according to the initial topology of deployed sensor networks. After comprehensive analysis of energy states, working state and constraints for different sensor nodes in WRSN, we transform the optimized charging path problem of the whole network into the local optimization problem of the sub networks. The optimized charging path with respect to dynamic network topology in each sub-network is obtained by solving an optimization problem, and the lifetime of the deployed wireless sensor network can be prolonged. Simulation results show that the proposed scheme has good and reliable performance for a small wireless rechargeable sensor network.
Fan, Wei; Kyösti, Pekka; Hentilä, Lassi
Conducted cable testing has been dominantly utilized in the industry to evaluate multiple-input multiple-output (MIMO) capable mobile terminals. Desired testing signals can be guided directly to the antenna ports on the mobile terminal by radio frequency (RF) coaxial cables in the conducted cable...
Full Text Available Mobile device advertising is a rapidly growing market due to the penetration of mobile devices in Spanish society. Advertising communication in this digital ecosystem continually poses new challenges. One of these - the subject of this proposal - is the link-up between mobile advertising with social TV. It opens up new possibilities for the development of advertising strategies on mobile devices.The aim of this paper is to describe the challenges faced by the Spanish advertising industry with the recent introduction of Social TV. Spain has one of the most developed Social TV sectors in Europe. It will provide a global overview of this new reality and uncover the new possibilities and main challenges for the development of advertising strategies for mobile devices. To this end we propose an examination of the perception of two of Spain’s major broadcasting empires, Atresmedia and Mediaset España, of this phenomenon.
Hortos, William S.
The ecosystem is used as an evolutionary paradigm of natural laws for the distributed information retrieval via mobile agents to allow the computational load to be added to server nodes of wireless networks, while reducing the traffic on communication links. Based on the Food Web model, a set of computational rules of natural balance form the outer stage to control the evolution of mobile agents providing multimedia services with a wireless Internet protocol WIP. The evolutionary model shows how mobile agents should behave with the WIP, in particular, how mobile agents can cooperate, compete and learn from each other, based on an underlying competition for radio network resources to establish the wireless connections to support the quality of service QoS of user requests. Mobile agents are also allowed to clone themselves, propagate and communicate with other agents. A two-layer model is proposed for agent evolution: the outer layer is based on the law of natural balancing, the inner layer is based on a discrete version of a Kohonen self-organizing feature map SOFM to distribute network resources to meet QoS requirements. The former is embedded in the higher OSI layers of the WIP, while the latter is used in the resource management procedures of Layer 2 and 3 of the protocol. Algorithms for the distributed computation of mobile agent evolutionary behavior are developed by adding a learning state to the agent evolution state diagram. When an agent is in an indeterminate state, it can communicate to other agents. Computing models can be replicated from other agents. Then the agents transitions to the mutating state to wait for a new information-retrieval goal. When a wireless terminal or station lacks a network resource, an agent in the suspending state can change its policy to submit to the environment before it transitions to the searching state. The agents learn the facts of agent state information entered into an external database. In the cloning process, two
Kim, Daeil; Kim, Doyeon; Lee, Hyunkyu; Jeong, Yu Ra; Lee, Seung-Jung; Yang, Gwangseok; Kim, Hyoungjun; Lee, Geumbee; Jeon, Sanggeun; Zi, Goangseup; Kim, Jihyun; Ha, Jeong Sook
A stretchable multisensor system is successfully demonstrated with an integrated energy-storage device, an array of microsupercapacitors that can be repeatedly charged via a wireless radio-frequency power receiver on the same stretchable polymer substrate. The integrated devices are interconnected by a liquid-metal interconnection and operate stably without noticeable performance degradation under strain due to the skin attachment, and a uniaxial strain up to 50%. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Mahmoud Pashazadeh, Ali; Aghajani, Mahdi; Nabipour, Iraj; Assadi, Majid
Mobile phones' electromagnetic interference with medical devices is an important issue for the medical safety of patients who are using life-supporting medical devices. This review mainly focuses on mobile phones' interference with implanted medical devices and with medical equipment located in critical areas of hospitals. A close look at the findings reveals that mobile phones may adversely affect the functioning of medical devices, and the specific effect and the degree of interference depend on the applied technology and the separation distance. According to the studies' findings and the authors' recommendations, besides mitigating interference, using mobile phones at a reasonable distance from medical devices and developing technology standards can lead to their effective use in hospital communication systems.
Pashazadeh, A. M.; Aghajani, M.; Nabipour, I.; Assadi, M.
Mobile phones' electromagnetic interference with medical devices is an important issue for the medical safety of patients who are using life-supporting medical devices. This review mainly focuses on mobile phones' interference with implanted medical devices and with medical equipment located in critical areas of hospitals. A close look at the findings reveals that mobile phones may adversely affect the functioning of medical devices, and the specific effect and the degree of interference depend on the applied technology and the separation distance. According to the studies' findings and the authors' recommendations, besides mitigating interference, using mobile phones at a reasonable distance from medical devices and developing technology standards can lead to their effective use in hospital communication systems. (authors)
Full Text Available The move from IP-based authentication to that of federated access has seen the sector support single sign-on to web-based resources, but the simplified user experience is at risk due to the rapid growth of mobile platforms and increasing variety of accompanying access methods for such devices. The user authentication experience on mobile devices is often further complicated by the poor discovery and delivery design of websites. While the introduction of tools such as Raptor permit accurate tracking of usage statistics via the UK Access Management Federation, the variety of mobile authentication methods such as native apps on devices and device paring pose additional challenges to librarians trying to gather a complete picture of resource use within their institution. In this article we examine the access challenges posed by the explosion of mobile device use.
One of the human inventions created in order to facilitate life but it became scourge for him is mobile phone. Ignorance on quality of using mobile phone and conscious use of it in inappropriate way will have consequences that it seems that it gradually becomes as social problem and harm. Author of this paper aims to warns ...
Armstrong, David G; Kleidermacher, David N; Klonoff, David C; Slepian, Marvin J
We are rapidly reaching a point where, as connected devices for monitoring and treating diabetes and other diseases become more pervasive and powerful, the likelihood of malicious medical device hacking (known as "medjacking") is growing. While government could increase regulation, we have all been witness in recent times to the limitations and issues surrounding exclusive reliance on government. Herein we outline a preliminary framework for establishing security for wireless health devices based on international common criteria. Creation of an independent medical device cybersecurity body is suggested. The goal is to allow for continued growth and innovation while simultaneously fostering security, public trust, and confidence. © 2015 Diabetes Technology Society.
Armstrong, David G.; Kleidermacher, David N.; Klonoff, David C.; Slepian, Marvin J.
We are rapidly reaching a point where, as connected devices for monitoring and treating diabetes and other diseases become more pervasive and powerful, the likelihood of malicious medical device hacking (known as “medjacking”) is growing. While government could increase regulation, we have all been witness in recent times to the limitations and issues surrounding exclusive reliance on government. Herein we outline a preliminary framework for establishing security for wireless health devices based on international common criteria. Creation of an independent medical device cybersecurity body is suggested. The goal is to allow for continued growth and innovation while simultaneously fostering security, public trust, and confidence. PMID:26319227
Full Text Available In a sensor network, sensor data messages reach the nearest stationary sink node connected to the Internet by wireless multihop transmissions. Recently, various mobile sensors are available due to advances of robotics technologies and communication technologies. A location based message-by-message routing protocol, such as Geographic Distance Routing (GEDIR is suitable for such mobile wireless networks; however, it is required for each mobile wireless sensor node to know the current locations of all its neighbor nodes. On the other hand, various intermittent communication methods for a low power consumption requirement have been proposed for wireless sensor networks. Intermittent Receiver-driven Data Transmission (IRDT is one of the most efficient methods; however, it is difficult to combine the location based routing and the intermittent communication. In order to solve this problem, this paper proposes a probabilistic approach IRDT-GEDIR with the help of one of the solutions of the secretaries problem. Here, each time a neighbor sensor node wakes up from its sleep mode, an intermediate sensor node determines whether it forwards its buffered sensor data messages to it or not based on an estimation of achieved pseudo speed of the messages. Simulation experiments show that IRDT-GEDIR achieves higher pseudo speed of sensor data message transmissions and shorter transmission delay than achieves shorter transmission delay than the two naive combinations of IRDT and GEDIR in sensor networks with mobile sensor nodes and a stationary sink node. In addition, the guideline of the estimated numbers of the neighbor nodes of each intermediate sensor node is provided based on the results of the simulation experiments to apply the probabilistic approach IRDT-GEDIR.
Full Text Available Implantable neuronal interfaces to the brain are an important keystone for future medical applications. However, entering this field of research is difficult since such an implant requires components from many different areas of technology. Since the complete avoidance of wires is important due to the risk of infections and other long-term problems, means for wirelessly transmitting data and energy are a necessity which adds to the requirements. In recent literature, many high-tech components for such implants are presented with remarkable properties. However, these components are typically not freely available for such a system. Every group needs to re-develop their own solution. This raises the question if it is possible to create a reusable design for an implant and its external base-station, such that it allows other groups to use it as a starting point. In this article, we try to answer this question by presenting a design based exclusively on commercial off-the-shelf components and studying the properties of the resulting system. Following this idea, we present a fully wireless neuronal implant for simultaneously measuring electrocorticography signals at 128 locations from the surface of the brain. All design files are available as open source.
Panughpath, Sridhar G; Kalyanpur, Arjun
The use of mobile devices is revolutionizing the way we communicate, interact, are entertained, and organize our lives. With healthcare in general and radiology in particular becoming increasingly digital, the use of such devices in radiologic practice is inevitable. This article reviews the current status of the use of mobile devices in the clinical practice of radiology, namely in emergency teleradiology. Technical parameters such as luminance and resolution are discussed. The article also discusses the benefits of such mobility vis-à-vis the current limitations of the technologies available
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-744] Certain Mobile Devices, Associated... importation of certain mobile devices, associated software, and components thereof by reason of infringement... importation of certain mobile devices, associated software, and components thereof containing same by reason...
Kabali, Hilda K; Irigoyen, Matilde M; Nunez-Davis, Rosemary; Budacki, Jennifer G; Mohanty, Sweta H; Leister, Kristin P; Bonner, Robert L
Research on children's use of mobile media devices lags behind its adoption. The objective of this study was to examine young children's exposure to and use of mobile media devices. Cross-sectional study of 350 children aged 6 months to 4 years seen October to November 2014 at a pediatric clinic in an urban, low-income, minority community. The survey was adapted from Common Sense Media's 2013 nationwide survey. Most households had television (97%), tablets (83%), and smartphones (77%). At age 4, half the children had their own television and three-fourths their own mobile device. Almost all children (96.6%) used mobile devices, and most started using before age 1. Parents gave children devices when doing house chores (70%), to keep them calm (65%), and at bedtime (29%). At age 2, most children used a device daily and spent comparable screen time on television and mobile devices. Most 3- and 4-year-olds used devices without help, and one-third engaged in media multitasking. Content delivery applications such as YouTube and Netflix were popular. Child ownership of device, age at first use, and daily use were not associated with ethnicity or parent education. Young children in an urban, low-income, minority community had almost universal exposure to mobile devices, and most had their own device by age 4. The patterns of use suggest early adoption, frequent and independent use, and media multitasking. Studies are urgently needed to update recommendations for families and providers on the use of mobile media by young children. Copyright © 2015 by the American Academy of Pediatrics.
Sahar, S.; Shaikh, F.K.
The rapid growth in wireless technologies has made wireless communication an important source for transporting data across different domains. In the same way, there are possibilities of many potential applications that can be deployed using WSNs (Wireless Sensor Networks). However, very limited applications are deployed in real life due to the uncertainty and dynamics of the environment and scare resources. This makes data management in WSN a challenging area to find an approach that suits its characteristics. Currently, the trend is to find efficient data management schemes using evolving technologies, i.e. P2P (Peer-to-Peer) systems. Many P2P approaches have been applied in WSNs to carry out the data management due to similarities between WSN and P2P. With the similarities, there are differences too that makes P2P protocols inefficient in WSNs. Furthermore, to increase the efficiency and to exploit the delay tolerant nature of WSNs, where ever possible, the mobile WSNs are gaining importance. Thus, creating a three dimensional problem space to consider, i.e. mobility, WSNs and P2P. In this paper, an efficient algorithm is proposed for data management using P2P techniques for mobile WSNs. The real world implementation and deployment of proposed algorithm is also presented. (author)
Full Text Available Medical image processing helps health professionals make decisions for the diagnosis and treatment of patients. Since some algorithms for processing images require substantial amounts of resources, one could take advantage of distributed or parallel computing. A mobile grid can be an adequate computing infrastructure for this problem. A mobile grid is a grid that includes mobile devices as resource providers. In a previous step of this research, we selected BOINC as the infrastructure to build our mobile grid. However, parallel processing of images in mobile devices poses at least two important challenges: the execution of standard libraries for processing images and obtaining adequate performance when compared to desktop computers grids. By the time we started our research, the use of BOINC in mobile devices also involved two issues: a the execution of programs in mobile devices required to modify the code to insert calls to the BOINC API, and b the division of the image among the mobile devices as well as its merging required additional code in some BOINC components. This article presents answers to these four challenges.
Curiel, Mariela; Calle, David F.; Santamaría, Alfredo S.; Suarez, David F.; Flórez, Leonardo
Medical image processing helps health professionals make decisions for the diagnosis and treatment of patients. Since some algorithms for processing images require substantial amounts of resources, one could take advantage of distributed or parallel computing. A mobile grid can be an adequate computing infrastructure for this problem. A mobile grid is a grid that includes mobile devices as resource providers. In a previous step of this research, we selected BOINC as the infrastructure to build our mobile grid. However, parallel processing of images in mobile devices poses at least two important challenges: the execution of standard libraries for processing images and obtaining adequate performance when compared to desktop computers grids. By the time we started our research, the use of BOINC in mobile devices also involved two issues: a) the execution of programs in mobile devices required to modify the code to insert calls to the BOINC API, and b) the division of the image among the mobile devices as well as its merging required additional code in some BOINC components. This article presents answers to these four challenges.
Kant Hiran, Kamal; Doshi, Ruchi
Mobile Cloud Computing (MCC) is an emerging research topic in the world of Information Technology, this trend promises to deliver and promote a wide range of advantage to it anxious markets or clients. With MCC, all the applications that exist are on a remote server enable the individual client...... machines or devices to access them. Mobile Cloud Computing in smartphone and tablets allows devices to offload functions and data resources to a cloud environment. This happening conserve the power of the smart devices or the tablets to prolong it battery longevity. This book sought to analyses how MCC...... affect individuals on smart devices as well as their views on network data. The growing demand for mobile devices and its applications are evident that MCC is the next IT trend. The book will also seek the views of people on the cost of applications and battery life of the smart devices as this directly...
Full Text Available This paper presents a leader-based approach to routing in Mobile Wireless Sensor Networks (MWSN. Using local information from neighbour nodes, a leader election mechanism maintains a spanning tree in order to provide the necessary adaptations for efficient routing upon the connectivity changes resulting from the mobility of sensors or sink nodes. We present two protocols following the leader election approach, which have been implemented using Castalia and OMNeT++. The protocols have been evaluated, besides other reference MWSN routing protocols, to analyse the impact of network size and node velocity on performance, which has demonstrated the validity of our approach.
Herrero, David; Martínez, Humberto
This work presents the development and experimental evaluation of a method based on fuzzy logic to locate mobile robots in an Intelligent Space using wireless sensor networks (WSNs). The problem consists of locating a mobile node using only inter-node range measurements, which are estimated by radio frequency signal strength attenuation. The sensor model of these measurements is very noisy and unreliable. The proposed method makes use of fuzzy logic for modeling and dealing with such uncertain information. Besides, the proposed approach is compared with a probabilistic technique showing that the fuzzy approach is able to handle highly uncertain situations that are difficult to manage by well-known localization methods.
Burgos, Unai; Amozarrain, Ugaitz; Gómez-Calzado, Carlos; Lafuente, Alberto
This paper presents a leader-based approach to routing in Mobile Wireless Sensor Networks (MWSN). Using local information from neighbour nodes, a leader election mechanism maintains a spanning tree in order to provide the necessary adaptations for efficient routing upon the connectivity changes resulting from the mobility of sensors or sink nodes. We present two protocols following the leader election approach, which have been implemented using Castalia and OMNeT++. The protocols have been evaluated, besides other reference MWSN routing protocols, to analyse the impact of network size and node velocity on performance, which has demonstrated the validity of our approach.
Dnyaneshwar, Mantri; Pawar, Pranav M.; Prasad, Neeli R.
In the Wireless Sensor Networks, (WSNs) a key challenge is to schedule the activities of the mobile node for improvement in throughput, energy consumption and delay. This paper proposes efficient schedule based data aggregation algorithm using node mobility (SDNM). It considers the cluster-based...... myopic and non-myopic scheduling scheme for conflict free schedule based on the current and next state. It uses TDMA as the MAC layer protocol and schedules the aggregated packets with consecutive slots. Simulation results show that, SDNM is energy efficient, has less delay as compared with state...
Rashid, Haroon; Turuk, Ashok Kumar
Full paper at: http://arxiv.org/pdf/1504.06797.pdfThis paper shows how a mobile node can be localized with less than three beacon nodes. It uses a technique known as dead-reckoning for localization of nodes at specific intervals
Full Text Available Video streaming service is one of the most popular applications for mobile users. However, mobile video streaming services consume a lot of energy, resulting in a reduced battery life. This is a critical problem that results in a degraded user’s quality of experience (QoE. Therefore, in this paper, a joint optimization scheme that controls both the central processing unit (CPU and wireless networking of the video streaming process for improved energy efficiency on mobile devices is proposed. For this purpose, the energy consumption of the network interface and CPU is analyzed, and based on the energy consumption profile a joint optimization problem is formulated to maximize the energy efficiency of the mobile device. The proposed algorithm adaptively adjusts the number of chunks to be downloaded and decoded in each packet. Simulation results show that the proposed algorithm can effectively improve the energy efficiency when compared with the existing algorithms.
He, Longjun; Ming, Xing; Xu, Lang; Liu, Qian
With computing capability and display size growing, the mobile device has been used as a tool to help clinicians view patient information and medical images anywhere and anytime. It is uneasy and time-consuming for transferring medical images with large data size from picture archiving and communication system to mobile client, since the wireless network is unstable and limited by bandwidth. Besides, limited by computing capability, memory and power endurance, it is hard to provide a satisfactory quality of experience for radiologists to handle some complex post-processing of medical images on the mobile device, such as real-time direct interactive three-dimensional visualization. In this work, remote rendering technology is employed to implement the post-processing of medical images instead of local rendering, and a service protocol is developed to standardize the communication between the render server and mobile client. In order to make mobile devices with different platforms be able to access post-processing of medical images, the Extensible Markup Language is taken to describe this protocol, which contains four main parts: user authentication, medical image query/ retrieval, 2D post-processing (e.g. window leveling, pixel values obtained) and 3D post-processing (e.g. maximum intensity projection, multi-planar reconstruction, curved planar reformation and direct volume rendering). And then an instance is implemented to verify the protocol. This instance can support the mobile device access post-processing of medical image services on the render server via a client application or on the web page.
Kendell, Cynthia; Lemaire, Edward D
Orientation sensors containing magnetometers use the earth's magnetic field as a reference. Ferromagnetic objects may distort this magnetic field, leading to inaccurate orientation output. We explored the viability of these orientation sensors for motion analysis in an assistive mobility device rehabilitative setting. We attached two MTx orientation sensors (XSens; Enschade, the Netherlands), connected to the XBus Master data collection unit (XSens), to a plastic frame such that the relative angle between sensors was constant. We then moved a series of mobility devices in proximity to the plastic frame: two knee-ankle-foot orthoses (aluminum, stainless steel), one ankle-foot orthosis, two transtibial prostheses (exoskeletal, endoskeletal), two walkers (standard, Challenger Low Wide [Evolution Technologies; Port Coquitlam, Canada]), and two wheelchairs (Tango [OrthoFab; Quebec City, Canada], GTi [Quickie; Phoenix, Arizona]). For each mobility device, we calculated the average difference in relative angle between the baseline and peak angles for each of five trials. Errors ranged from less than 0.10 to 35.29 degrees, depending on the mobility device and frame positioning near the device. This demonstrated the large errors that can occur when magnetometer-based orientation sensors with mobility devices are used. While strategic orientation sensor placement on some mobility devices can minimize these errors to an acceptable level, testing protocols should be implemented to verify orientation sensor accuracy for these applications.
This article is an investigation of composing practices through which people create networks with mobile phones. By looking through the lens of actor-network theory, the author portrays the networking activity of mobile phone users as translation, what Latour describes as an infralanguage to which different disciplinary perspectives can be…
Reyes, Ivan; Nazeran, Homer; Franco, Mario; Haltiwanger, Emily
The photoplethysmographic (PPG) signal has the potential to aid in the acquisition and analysis of heart rate variability (HRV) signal: a non-invasive quantitative marker of the autonomic nervous system that could be used to assess cardiac health and other physiologic conditions. A low-power wireless PPG device was custom-developed to monitor, acquire and analyze the arterial pulse in the finger. The system consisted of an optical sensor to detect arterial pulse as variations in reflected light intensity, signal conditioning circuitry to process the reflected light signal, a microcontroller to control PPG signal acquisition, digitization and wireless transmission, a receiver to collect the transmitted digital data and convert them back to their analog representations. A personal computer was used to further process the captured PPG signals and display them. A MATLAB program was then developed to capture the PPG data, detect the RR peaks, perform spectral analysis of the PPG data, and extract the HRV signal. A user-friendly graphical user interface (GUI) was developed in LabView to display the PPG data and their spectra. The performance of each module (sensing unit, signal conditioning, wireless transmission/reception units, and graphical user interface) was assessed individually and the device was then tested as a whole. Consequently, PPG data were obtained from five healthy individuals to test the utility of the wireless system. The device was able to reliably acquire the PPG signals from the volunteers. To validate the accuracy of the MATLAB codes, RR peak information from each subject was fed into Kubios software as a text file. Kubios was able to generate a report sheet with the time domain and frequency domain parameters of the acquired data. These features were then compared against those calculated by MATLAB. The preliminary results demonstrate that the prototype wireless device could be used to perform HRV signal acquisition and analysis.
Granlund, Daniel; Holmlund, Patrik; Åhlund, Christer
A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP)-based sensor authentication protocol is proposed that enables light-weight sensor authentication and key generation. Secondly, a mechanism for handoffs between wireless sensor gateways is proposed. We validate both mechanisms in a real-life study that was conducted in a smart city environment with several fixed sensors and moving gateways. We conduct similar experiments in an industry-based anechoic Long Term Evolution (LTE) chamber with an ideal radio environment. Further, we validate our results collected from the smart city environment against the results produced under ideal conditions to establish best and real-life case scenarios. Our results clearly validate that our proposed mechanisms can facilitate efficient sensor authentication and handoffs while sensors are roaming in a smart city environment.
Full Text Available A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP-based sensor authentication protocol is proposed that enables light-weight sensor authentication and key generation. Secondly, a mechanism for handoffs between wireless sensor gateways is proposed. We validate both mechanisms in a real-life study that was conducted in a smart city environment with several fixed sensors and moving gateways. We conduct similar experiments in an industry-based anechoic Long Term Evolution (LTE chamber with an ideal radio environment. Further, we validate our results collected from the smart city environment against the results produced under ideal conditions to establish best and real-life case scenarios. Our results clearly validate that our proposed mechanisms can facilitate efficient sensor authentication and handoffs while sensors are roaming in a smart city environment.
Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee
Data Aggregation (MHBCDA) algorithm for the randomly distributed nodes. It considers the mobile sink based packet aggregation for the heterogeneous WSN. It uses predefined region for the aggregation at cluster head to minimize computation and communication cost. The MHBCDA is energy and bandwidth......Wireless Sensor Network (WSN) offers a variety of novel applications for mobile targets. It generates the large amount of redundant sensing data. The data aggregation techniques are extensively used to reduce the energy consumption and increase the network lifetime, although it has the side effect...... of reduced reliability. In the mobile environment, it is necessary to consider the techniques which minimize the communication cost with efficient bandwidth utilization by decreasing the packet count reached at the sink. This paper proposes the mobility and heterogeneity aware bandwidth efficient Cluster-based...
Zhong, Peijun; Ruan, Feng
With the fast development of wireless sensor networks (WSNs), more and more energy efficient routing algorithms have been proposed. However, one of the research challenges is how to alleviate the hot spot problem since nodes close to static sink (or base station) tend to die earlier than other sensors. The introduction of mobile sink node can effectively alleviate this problem since sink node can move along certain trajectories, causing hot spot nodes more evenly distributed. In this paper, we mainly study the energy efficient routing method with multiple mobile sinks support. We divide the whole network into several clusters and study the influence of mobile sink number on network lifetime. Simulation results show that the best network performance appears when mobile sink number is about 3 under our simulation environment.
Full Text Available Nowadays, mobile service requests in wireless networking are aimed to the benefit of a good level of satisfaction for the received Quality of Service (QoS guarantees. In this paper, a new prediction algorithm is proposed, for the pre-reservation of passive bandwidth, when mobile users moves under radio coverage that can be considered as a cellular one (GSM, UMTS, WLAN clusters, etc.. The Hidden Markov Chains (HMC theory is used to design the predictor, as the main component of the proposed idea, that does not depend on the considered transmission technology, mobility model or vehicular scenario. Mobile ReSerVation Protocol (MRSVP has been used in order to realize the active/passive bandwidth reservation in the considered network topology. Different simulation campaigns have been carried out in order to appreciate the benefits of the proposed idea.
Yin, Ming; Li, Hao; Bull, Christopher; Borton, David A; Aceros, Juan; Larson, Lawrence; Nurmikko, Arto V
In this paper we present a new type of head-mounted wireless neural recording device in a highly compact package, dedicated for untethered laboratory animal research and designed for future mobile human clinical use. The device, which takes its input from an array of intracortical microelectrode arrays (MEA) has ninety-seven broadband parallel neural recording channels and was integrated on to two custom designed printed circuit boards. These house several low power, custom integrated circuits, including a preamplifier ASIC, a controller ASIC, plus two SAR ADCs, a 3-axis accelerometer, a 48MHz clock source, and a Manchester encoder. Another ultralow power RF chip supports an OOK transmitter with the center frequency tunable from 3GHz to 4GHz, mounted on a separate low loss dielectric board together with a 3V LDO, with output fed to a UWB chip antenna. The IC boards were interconnected and packaged in a polyether ether ketone (PEEK) enclosure which is compatible with both animal and human use (e.g. sterilizable). The entire system consumes 17mA from a 1.2Ahr 3.6V Li-SOCl2 1/2AA battery, which operates the device for more than 2 days. The overall system includes a custom RF receiver electronics which are designed to directly interface with any number of commercial (or custom) neural signal processors for multi-channel broadband neural recording. Bench-top measurements and in vivo testing of the device in rhesus macaques are presented to demonstrate the performance of the wireless neural interface.
Tang, Jiqiang; Yang, Wu; Zhu, Lingyun; Wang, Dong; Feng, Xin
In recent years, Wireless Sensor Networks with a Mobile Sink (WSN-MS) have been an active research topic due to the widespread use of mobile devices. However, how to get the balance between data delivery latency and energy consumption becomes a key issue of WSN-MS. In this paper, we study the clustering approach by jointly considering the Route planning for mobile sink and Clustering Problem (RCP) for static sensor nodes. We solve the RCP problem by using the minimum travel route clustering approach, which applies the minimum travel route of the mobile sink to guide the clustering process. We formulate the RCP problem as an Integer Non-Linear Programming (INLP) problem to shorten the travel route of the mobile sink under three constraints: the communication hops constraint, the travel route constraint and the loop avoidance constraint. We then propose an Imprecise Induction Algorithm (IIA) based on the property that the solution with a small hop count is more feasible than that with a large hop count. The IIA algorithm includes three processes: initializing travel route planning with a Traveling Salesman Problem (TSP) algorithm, transforming the cluster head to a cluster member and transforming the cluster member to a cluster head. Extensive experimental results show that the IIA algorithm could automatically adjust cluster heads according to the maximum hops parameter and plan a shorter travel route for the mobile sink. Compared with the Shortest Path Tree-based Data-Gathering Algorithm (SPT-DGA), the IIA algorithm has the characteristics of shorter route length, smaller cluster head count and faster convergence rate. PMID:28445434
Zhang, Meng; Raghunathan, Anand; Jha, Niraj K
Rapid advances in personal healthcare systems based on implantable and wearable medical devices promise to greatly improve the quality of diagnosis and treatment for a range of medical conditions. However, the increasing programmability and wireless connectivity of medical devices also open up opportunities for malicious attackers. Unfortunately, implantable/wearable medical devices come with extreme size and power constraints, and unique usage models, making it infeasible to simply borrow conventional security solutions such as cryptography. We propose a general framework for securing medical devices based on wireless channel monitoring and anomaly detection. Our proposal is based on a medical security monitor (MedMon) that snoops on all the radio-frequency wireless communications to/from medical devices and uses multi-layered anomaly detection to identify potentially malicious transactions. Upon detection of a malicious transaction, MedMon takes appropriate response actions, which could range from passive (notifying the user) to active (jamming the packets so that they do not reach the medical device). A key benefit of MedMon is that it is applicable to existing medical devices that are in use by patients, with no hardware or software modifications to them. Consequently, it also leads to zero power overheads on these devices. We demonstrate the feasibility of our proposal by developing a prototype implementation for an insulin delivery system using off-the-shelf components (USRP software-defined radio). We evaluate its effectiveness under several attack scenarios. Our results show that MedMon can detect virtually all naive attacks and a large fraction of more sophisticated attacks, suggesting that it is an effective approach to enhancing the security of medical devices.
A method of operating an electronic device includes providing a plurality of antenna elements, evaluating a wireless communication performance criterion to obtain a performance evaluation, and assigning a first one of the plurality of antenna elements to a main wireless signal reception and trans...
This paper is concerned with the development of accessible mobile content and the complexities that arise during this process. The paper gives an overview of the popularity and advantages of mobile devices before tackling the issues surrounding content development, particularly within an educational context. The paper concludes with an overview of an application that was developed for higher education students within a UK college that had a mobile counterpart, allowing the artefact to transcend the typical desktop environment.
Bahri, Hossein; Mahadi, Tengku Sepora Tengku
While the presence of mobile electronic devices in the classroom has posed real challenges to instructors, a growing number of teachers believe they should seize the chance to improve the quality of instruction. The advent of new mobile technologies (laptops, smartphones, tablets, etc.) in the translation classroom has opened up new opportunities…
Delen, Ibrahim; Krajcik, Joseph
The use of mobile devices is increasing rapidly as a potential tool for science teaching. In this study, five educators (three middle school teachers and two museum educators) used a mobile application that supported the development of a driving question. Previous studies have noted that teachers make little effort to connect learning experiences…
Cavus, Nadire; Ibrahim, Dogan
The topic of this paper is to describe the development of an interactive application that can be used in teaching English as a second language using children's stories in mobile devices. The aim of this experimental study has been to find out the potential of using the developed interactive mobile application in improving the learning skills such…
Wu, Chunxue; Wu, Wenliang; Wan, Caihua; Bekkering, Ernst; Xiong, Naixue
Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.
Full Text Available Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.
Bartholomew, Scott R.; Reeve, Edward
Discussion surrounding the inclusion of mobile devices in K-12 classrooms has escalated since the early 2000s, and the literature base dedicated to mobile devices, mobile-learning, and e-learning has likewise grown. The majority of the research related to mobile devices and their inclusion in educational settings has largely revolved around…
Sadhukhan, Pampa; Sen, Rijurekha; Das, Pradip K.
Several methods for providing location based service (LBS) to mobile devices in indoor environment using wireless technologies like WLAN, RFID and Bluetooth have been proposed, implemented and evaluated. However, most of them do not focus on heterogeneity of mobile platforms, memory constraint of mobile devices, the adaptability of client or device to the new services it discovers whenever it reaches a new location. In this paper, we have proposed a Middleware based approach of LBS provision in the indoor environment, where a Bluetooth enabled Base Station (BS) detects Bluetooth enabled mobile devices and pushes a proper client application only to those devices that belong to some registered subscriber of LBS. This dynamic deployment enables the mobile clients to access any new service without having preinstalled interface to that service beforehand and thus the client's memory consumption is reduced. Our proposed work also addresses the other issues like authenticating the clients before providing them LBSs and introducing paid services. We have evaluated its performance in term of file transfer time with respect to file size and throughput with respect to distance. Experimental results on service consumption time by the mobile client for different services are also presented.
Alomari, Abdullah; Phillips, William; Aslam, Nauman; Comeau, Frank
Mobile anchor path planning techniques have provided as an alternative option for node localization in wireless sensor networks (WSNs). In such context, path planning is a movement pattern where a mobile anchor node's movement is designed in order to achieve a maximum localization ratio possible with a minimum error rate. Typically, the mobility path planning is designed in advance, which is applicable when the mobile anchor has sufficient sources of energy and time. However, when the mobility movement is restricted or limited, a dynamic path planning design is needed. This paper proposes a novel distributed range-free movement mechanism for mobility-assisted localization in WSNs when the mobile anchor's movement is limited. The designed movement is formed in real-time pattern using a fuzzy-logic approach based on the information received from the network and the nodes' deployment. Our proposed model, Fuzzy-Logic based Path Planning for mobile anchor-assisted Localization in WSNs (FLPPL), offers superior results in several metrics including both localization accuracy and localization ratio in comparison to other similar works.
... Chief Counsel for Advocacy of the U.S. Small Business Administration. In addition, a copy of the Second... mobiles per channel within a five year period commencing with the grant of the application. (g) If a... and copying during normal business hours in the FCC Reference Center, 445 12th Street, SW., Washington...
Ibrahim, Yehia M.; Garimella, Sandilya V. B.; Smith, Richard D.
Methods and devices for ion separations or manipulations in gas phase are disclosed. The device includes a single non-planar surface. Arrays of electrodes are coupled to the surface. A combination of RF and DC voltages are applied to the arrays of electrodes to create confining and driving fields that move ions through the device. The DC voltages are static DC voltages or time-dependent DC potentials or waveforms.
Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen
In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.
Han, Changcai; Yang, Jinsheng
The multi-source cooperation integrating distributed low-density parity-check codes is investigated to jointly collect data from multiple sensor nodes to the mobile sink in the wireless sensor network. The one-round and two-round cooperative data collection schemes are proposed according to the moving trajectories of the sink node. Specifically, two sparse cooperation models are firstly formed based on geographical locations of sensor source nodes, the impairment of inter-node wireless channels and moving trajectories of the mobile sink. Then, distributed low-density parity-check codes are devised to match the directed graphs and cooperation matrices related with the cooperation models. In the proposed schemes, each source node has quite low complexity attributed to the sparse cooperation and the distributed processing. Simulation results reveal that the proposed cooperative data collection schemes obtain significant bit error rate performance and the two-round cooperation exhibits better performance compared with the one-round scheme. The performance can be further improved when more source nodes participate in the sparse cooperation. For the two-round data collection schemes, the performance is evaluated for the wireless sensor networks with different moving trajectories and the variant data sizes.
Khan, Mohammed N.; Nock, Rebecca; Gooneratne, Nalaka S.
Mobile devices (smartphones and tablet computers) have become widely prevalent due to rapid improvements in function and decreasing costs. As of 2014, 90 % of US adults have a mobile phone, with 58 % having a smartphone, 32 % owning some type of e-reader, and 42 % of US adults owning a tablet computer. Mobile devices are particularly well-suited for the study of common conditions such as sleep difficulties because of their ubiquity. Around 35 to 49 % of the US adult population have problems f...
Yang, Ke; Peretz-Soroka, Hagit; Liu, Yong; Lin, Francis
Portable electronic devices and wireless communication systems enable a broad range of applications such as environmental and food safety monitoring, personalized medicine and healthcare management. Particularly, hybrid smartphone and microfluidic devices provide an integrated solution for the new generation of mobile sensing applications. Such mobile sensing based on microfluidic devices (broadly defined) and smartphones (MS(2)) offers a mobile laboratory for performing a wide range of bio-chemical detection and analysis functions such as water and food quality analysis, routine health tests and disease diagnosis. MS(2) offers significant advantages over traditional platforms in terms of test speed and control, low cost, mobility, ease-of-operation and data management. These improvements put MS(2) in a promising position in the fields of interdisciplinary basic and applied research. In particular, MS(2) enables applications to remote in-field testing, homecare, and healthcare in low-resource areas. The marriage of smartphones and microfluidic devices offers a powerful on-chip operating platform to enable various bio-chemical tests, remote sensing, data analysis and management in a mobile fashion. The implications of such integration are beyond telecommunication and microfluidic-related research and technology development. In this review, we will first provide the general background of microfluidic-based sensing, smartphone-based sensing, and their integration. Then, we will focus on several key application areas of MS(2) by systematically reviewing the important literature in each area. We will conclude by discussing our perspectives on the opportunities, issues and future directions of this emerging novel field.
Yang, Ke; Peretz-Soroka, Hagit; Liu, Yong; Lin, Francis
Portable electronic devices and wireless communication systems enable a broad range of applications such as environmental and food safety monitoring, personalized medicine and healthcare management. Particularly, hybrid smartphone and microfluidic devices provide an integrated solution for the new generation of mobile sensing applications. Such mobile sensing based on microfluidic devices (broadly defined) and smartphones (MS2) offers a mobile laboratory for performing a wide range of bio-chemical detection and analysis functions such as water and food quality analysis, routine health tests and disease diagnosis. MS2 offers significant advantages over traditional platforms in terms of test speed and control, low cost, mobility, ease-of-operation and data management. These improvements put MS2 in a promising position in the fields of interdisciplinary basic and applied research. In particular, MS2 enables applications to remote infield testing, homecare, and healthcare in low-resource areas. The marriage of smartphones and microfluidic devices offers a powerful on-chip operating platform to enable various bio-chemical tests, remote sensing, data analysis and management in a mobile fashion. The implications of such integration are beyond telecommunication and microfluidic-related research and technology development. In this review, we will first provide the general background of microfluidic-based sensing, smartphone-based sensing, and their integration. Then, we will focus on several key application areas of MS2 by systematically reviewing the important literature in each area. We will conclude by discussing our perspectives on the opportunities, issues and future directions of this emerging novel field. PMID:26899264
Full Text Available The superior reconfigurability of software defined radio mobile devices has made it the most promising technology on the wireless network and in the communication industry. Despite several advantages, there are still a lot to discuss regarding security, for instance, the radio configuration data download, storage and installation, user's privacy, and cloning. The objective of this paper is to present a fraud-prevention framework for software defined radio mobile devices that enhances overall security through the use of new pieces of hardware, modules, and protocols. The framework offers security monitoring against malicious attacks and viruses, protects sensitive information, creates and protects an identity for the system, employs a secure protocol for radio configuration download, and finally, establishes an anticloning scheme, which besides guaranteeing that no units can be cloned over the air, also elevates the level of difficulty to clone units if the attacker has physical access to the mobile device. Even if cloned units exist, the anticloning scheme is able to identify and deny services to those units. Preliminary experiments and proofs that analyze the correctness of the fraud-prevention framework are also presented.
Angélica María Babativa Goyeneche
Full Text Available Context: Globalization has affected all productive sectors and in particular the software industry, which has required the development of new methodologies to suit the speed of the changes and allow quickly build products that meet the requirements of the customers. On the other hand, the GPS technology, 4G connectivity and integration of social networks that have the most current mobile phones have opened a large field of application, particularly in the area of the transport, mobility and citizen complaint, whose development can be successfully addressed through an agile methodology. Method: Agile methodology Scrum was used for the development of a mobile application on the Android operating system and GPS technology, which allows a Bogota taxi user to monitor the route and send a complaint to the social network Twitter in case of nonconformity. Some UML models were used for analysis and design of the application, and a confidence interval was used to validate the results. Results: Prototype of a mobile taximeter developed with an agile methodology that meets quality characteristics, extensibility and maintainability. T-student distribution was used to validate the measurement of the prototype on 50 samples, concluding that the difference between the measurement of a real taximeter and our mobile taximeter is on average 2 units with a standard deviation of 1,39 units. Conclusions: It is shown that with the agile development can be combined with UML modeling tools and statistical validation techniques for quality products that do not violate, but on the contrary, that reaffirm the agile development principles.
Full Text Available Recently, Apple removed access to various device hardware identifiers that were frequently misused by iOS third-party apps to track users. We are, therefore, now studying the extent to which users of smartphones can still be uniquely identified simply through their personalized device configurations. Using Apple’s iOS as an example, we show how a device fingerprint can be computed using 29 different configuration features. These features can be queried from arbitrary thirdparty apps via the official SDK. Experimental evaluations based on almost 13,000 fingerprints from approximately 8,000 different real-world devices show that (1 all fingerprints are unique and distinguishable; and (2 utilizing a supervised learning approach allows returning users or their devices to be recognized with a total accuracy of 97% over time
McGovern, Enda F.; Luna-Nevarez, Cuauhtemoc; Baruca, Arne
As digital technologies evolve in education, business faculty have increased access to an extensive range of mobile devices and online applications to help them inspire students' passion for learning. Adopting new digital approaches to teaching can also enhance the learning style of students who are immersed in the use of digital devices. How can…
Students' access to smartphones continues to grow. Use of tablets and e-readers continues to grow in the classroom. Whenever a large purchase of mobile devices is made for education, the very next question asked is, "Now what?" It is the planning for and using of the devices as part of an overall approach to the curriculum, locally, that…
Khan, Mohammed N; Nock, Rebecca; Gooneratne, Nalaka S
Mobile devices (smartphones and tablet computers) have become widely prevalent due to rapid improvements in function and decreasing costs. As of 2014, 90 % of US adults have a mobile phone, with 58 % having a smartphone, 32 % owning some type of e-reader, and 42 % of US adults owning a tablet computer. Mobile devices are particularly well-suited for the study of common conditions such as sleep difficulties because of their ubiquity. Around 35 to 49 % of the US adult population have problems falling asleep or have daytime sleepiness. These sleep disorders are often under-recognized because of patient-physician communication difficulties, low rates of medical awareness resulting in underreporting of insomnia symptoms, and limited primary care physician (PCP) training in insomnia recognition. Mobile devices have the potential to bridge some of these gaps, but they can also lead to sleep difficulties when used inappropriately.
Jenness, Jane E.; Ober, Joyce A.; Wilkins, Aleeza M.; Gambogi, Joseph
Mobile phones and other high-technology communications devices could not exist without mineral commodities. More than one-half of all components in a mobile device—including its electronics, display, battery, speakers, and more—are made from mined and semiprocessed materials (mineral commodities). Some mineral commodities can be recovered as byproducts during the production and processing of other commodities. As an example, bauxite is mined for its aluminum content, but gallium is recovered during the aluminum production process. The images show the ore minerals (sources) of some mineral commodities that are used to make components of a mobile device. On the reverse side, the map and table depict the major source countries producing these mineral commodities along with how these commodities are used in mobile devices. For more information on minerals, visit http://minerals.usgs.gov.
Full Text Available This presentation by Sarah Forbes and Dan D'Agostino was given at the Ontario Library Association's Super Conference in Toronto, Ontario, on February 3, 2012. Session Abstract from the Super Conference Program: As ownership of mobile devices continues to proliferate, libraries are finding it difficult to provide academic content that works well in the mobile world. Discover how various e-book and e-journal formats can be made to work with mobile devices of all kinds, and will explore the next generation of digital content designed for mobile devices – new formats that may re-invent how information is used by readers. Partnership would like to thank the authors and the Ontario Library Association for their generous permission to publish an Open Access version of this conference session. This is one of several Super Conference 2012 video presentations available for purchase from Super Conference: the Virtual Experience - http://ola.scholarlab.ca/.
Dana Ramona ANDRISESCU
Full Text Available Mobile devices are used everywhere, from making acall to store huge volume of information. But together withdevices shrinking and rise of storage space on a single device webring to mind the problem of trusting the stored information.Trusting the information and assuring its quality meansknowing the security threats these devices face and measuresthat should be taken. Many questions rise from here like “Whathappens when a mobile device is used by several persons andespecially employees?”, “Is that information reliable andoriginal?”, “Who is responsible for a device and its security?”.We are going to see in this paper that information quality can beassured even on portable devices by using the adequate securitymeasures.
Kiruthiga, G; Sharmila, A; Mahalakshmi, P; Muruganandam, M
Continuous measurement of heart rate is necessary for monitoring the patients with heart ailments. A wearable which continuously measures heart rate of an individual by a method called reflectance-based photoplethysmography (PPG) computes the heart rate of an individual according to the volumetric changes in blood flowing through the body is developed. In order to make the device more compact as well as with IP67 and IP68 standard, wireless charging technique is employed because it helps to get rid of wires while charging. Following the Qi standard for designing wireless power receiver circuits makes the device interoperable and work with greater efficiency with reduced losses. Impedance matching and designing the circuit to operate under resonance condition increases coupling efficiency in case of inductive coupling.
Full Text Available Using mobile devices such as smartphones or iPads for various interactive applications is currently very common. In the case of complex applications, e.g. chess games, the capabilities of these devices are insufficient to run the application in real time. One of the solutions is to use cloud computing. However, there is an optimization problem of mobile device and cloud resources allocation. An iterative heuristic algorithm for application distribution is proposed. The algorithm minimizes the energy cost of application execution with constrained execution time.
Veera V. S. M. Chintapalli
Full Text Available Advances in mobile screen sizes and feature enhancement for mobile applications have increased the number of users accessing spreadsheets on mobile devices. This paper reports a comparative usability study on four popular mobile spreadsheet applications: OfficeSuite Viewer 6, Documents To Go, ThinkFree Online, and Google Drive. We compare them against three categories of usability criteria: visibility; navigation, scrolling, and feedback; and interaction, satisfaction, simplicity, and convenience. Measures for each criterion were derived in a survey. Questionnaires were designed to address the measures based on the comparative criteria provided in the analysis.
LaSorte, Nickolas J; Rajab, Samer A; Refai, Hazem H
The integration of heterogeneous wireless technologies is believed to aid revolutionary healthcare delivery in hospitals and residential care. Wireless medical device coexistence is a growing concern given the ubiquity of wireless technology. In spite of this, a consensus standard that addresses risks associated with wireless heterogeneous networks has not been adopted. This paper serves as a starting point by recommending a practice for assessing the coexistence of a wireless medical device in a non-line-of-sight environment utilizing 802.15.4 in a practical, versatile, and reproducible test setup. This paper provides an extensive survey of other coexistence studies concerning 802.15.4 and 802.11 and reports on the authors' coexistence testing inside and outside an anechoic chamber. Results are compared against a non-line-of-sight test setup. Findings relative to co-channel and adjacent channel interference were consistent with results reported in the literature.
Hansen, Thomas Riisgaard
. The architecture is developed to support desktop applications, but in this paper we describe how the architecture can be extended to mobile devices by using AJAX technology. The paper also presents an implementation and presents a number of applications for mobile devices developed with this framework.......In this paper we present an architecture for designing web pages that uses multiple mobile and stationary devices to present web content. The architecture extends standard web technology with a number of functions for expressing how web content might migrate and use multiple displays...
Samineni, Vijay K; Yoon, Jangyeol; Crawford, Kaitlyn E; Jeong, Yu Ra; McKenzie, Kajanna C; Shin, Gunchul; Xie, Zhaoqian; Sundaram, Saranya S; Li, Yuhang; Yang, Min Young; Kim, Jeonghyun; Wu, Di; Xue, Yeguang; Feng, Xue; Huang, Yonggang; Mickle, Aaron D; Banks, Anthony; Ha, Jeong Sook; Golden, Judith P; Rogers, John A; Gereau, Robert W
The advent of optogenetic tools has allowed unprecedented insights into the organization of neuronal networks. Although recently developed technologies have enabled implementation of optogenetics for studies of brain function in freely moving, untethered animals, wireless powering and device durability pose challenges in studies of spinal cord circuits where dynamic, multidimensional motions against hard and soft surrounding tissues can lead to device degradation. We demonstrate here a fully implantable optoelectronic device powered by near-field wireless communication technology, with a thin and flexible open architecture that provides excellent mechanical durability, robust sealing against biofluid penetration and fidelity in wireless activation, thereby allowing for long-term optical stimulation of the spinal cord without constraint on the natural behaviors of the animals. The system consists of a double-layer, rectangular-shaped magnetic coil antenna connected to a microscale inorganic light-emitting diode (μ-ILED) on a thin, flexible probe that can be implanted just above the dura of the mouse spinal cord for effective stimulation of light-sensitive proteins expressed in neurons in the dorsal horn. Wireless optogenetic activation of TRPV1-ChR2 afferents with spinal μ-ILEDs causes nocifensive behaviors and robust real-time place aversion with sustained operation in animals over periods of several weeks to months. The relatively low-cost electronics required for control of the systems, together with the biocompatibility and robust operation of these devices will allow broad application of optogenetics in future studies of spinal circuits, as well as various peripheral targets, in awake, freely moving and untethered animals, where existing approaches have limited utility.
Dang, Bao P; Nel, Pierre R; Gjevre, John A
The aim of this study was to assess if common mobile communication systems would cause significant interference on mechanical ventilation devices and at what distances would such interference occur. We tested all the invasive and noninvasive ventilatory devices used within our region. This consisted of 2 adult mechanical ventilators, 1 portable ventilator, 2 pediatric ventilators, and 2 noninvasive positive pressure ventilatory devices. We operated the mobile devices from the 2 cellular communication systems (digital) and 1 2-way radio system used in our province at varying distances from the ventilators and looked at any interference they created. We tested the 2-way radio system, which had a fixed operation power output of 3.0 watts, the Global Systems for Mobile Communication cellular system, which had a maximum power output of 2.0 watts and the Time Division Multiple Access cellular system, which had a maximum power output of 0.2 watts on our ventilators. The ventilators were ventilating a plastic lung at fixed settings. The mobile communication devices were tested at varying distances starting at zero meter from the ventilator and in all operation modes. The 2-way radio caused the most interference on some of the ventilators, but the maximum distance of interference was 1.0 m. The Global Systems for Mobile Communication system caused significant interference only at 0 m and minor interference at 0.5 m on only 1 ventilator. The Time Division Multiple Access system caused no interference at all. Significant interference consisted of a dramatic rise and fluctuation of the respiratory rate, pressure, and positive end-expiratory pressure of the ventilators with no normalization when the mobile device was removed. From our experiment on our ventilators with the communication systems used in our province, we conclude that mobile communication devices such as cellular phones and 2-way radios are safe and cause no interference unless operated at very close distances of
Hosam El-Sofany; Samir Abou El-Seoud
With the recent advances in Internet and mobile technologies, there are increasing demands for electronic access to tourist information systems for service coordination and process integration. Mobile computing and mobile devices are used to implement various tourist services (e.g. electronic tourist guides, digital interactive maps, and tourist e-commerce transactions). However, due to disparate tourist information and service resources such as airlines, hotels, tour operators, it is still d...
1). NFC allows a device to read radio-frequency identification ( RFID ) tags or communicate with another NFC-enabled device using a set of standards...networking technology should be used rather than an alternative method. METHOD For the first object, an Android library was written and integrated...AND SUMMARY The PAN library was designed to reduce the impact on implementing apps. Therefore, the impact on time and effort is minimal. The app only
Cai, Jinguang; Lv, Chao; Watanabe, Akira
Portable and wearable devices have attracted wide research attention due to their intimate relations with human daily life. As basic structures in the devices, the preparation of high-conductive metallic circuits or micro-circuits on flexible substrates should be facile, cost-effective, and easily integrated with other electronic units. In this work, high-conductive carbon/Ni composite structures were prepared by using a facile laser direct writing method, followed by an electroless Ni plating process, which exhibit a 3-order lower sheet resistance of less than 0.1 ohm/sq compared to original structures before plating, showing the potential for practical use. The carbon/Ni composite structures exhibited a certain flexibility and excellent anti-scratch property due to the tight deposition of Ni layers on carbon surfaces. On the basis of this approach, a wireless charging and storage device on a polyimide film was demonstrated by integrating an outer rectangle carbon/Ni composite coil for harvesting electromagnetic waves and an inner carbon micro-supercapacitor for energy storage, which can be fast charged wirelessly by a commercial wireless charger. Furthermore, a near-field communication (NFC) tag was prepared by combining a carbon/Ni composite coil for harvesting signals and a commercial IC chip for data storage, which can be used as an NFC tag for practical application.
Latib, Z. A.; Jamil, A.; Alduais, N. A. M.; Abdullah, J.; Audah, L. H. M.; Alias, R.
A Wireless Sensor Network (WSN) is usually stationary, which the network comprises of static nodes. The increase demand for mobility in various applications such as environmental monitoring, medical, home automation, and military, raises the question how IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) would perform under these mobility applications. This paper aims to understand performance of RPL and come out with strategies for a better performance of RPL in mobility scenarios. Because of this, this paper evaluates the performance of the RPL protocol under three different scenarios: sink and sensor nodes are static, static sink and mobile sensor nodes, and sink and sensor nodes are mobile. The network scenarios are implemented in Cooja simulator. A WSN consists of 25 sensor nodes and one sink node is configured in the simulation environment. The simulation is varied over different packet rates and ContikiMAC's Clear Channel Assessment (CCA) rate. As the performance metric, RPL is evaluated in term of packet delivery ratio (PDR), power consumption and packet rates. The simulation results show RPL provides a poor PDR in the mobility scenarios when compared to the static scenario. In addition, RPL consumes more power and increases duty-cycle rate to support mobility when compared to the static scenario. Based on the findings, we suggest three strategies for a better performance of RPL in mobility scenarios. First, RPL should operates at a lower packet rates when implemented in the mobility scenarios. Second, RPL should be implemented with a higher duty-cycle rate. Lastly, the sink node should be positioned as much as possible in the center of the mobile network.
Full Text Available This paper will discuss a SAW passive, wireless multi-sensor system under development by our group for the past several years. The device focus is on orthogonal frequency coded (OFC SAW sensors, which use both frequency diversity and pulse position reflectors to encode the device ID and will be briefly contrasted to other embodiments. A synchronous correlator transceiver is used for the hardware and post processing and correlation techniques of the received signal to extract the sensor information will be presented. Critical device and system parameters addressed include encoding, operational range, SAW device parameters, post-processing, and antenna-SAW device integration. A fully developed 915 MHz OFC SAW multi-sensor system is used to show experimental results. The system is based on a software radio approach that provides great flexibility for future enhancements and diverse sensor applications. Several different sensor types using the OFC SAW platform are shown.
Santosh Kumar S C Sharma Bhupendra Suman
A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...
Ragone, Azzurra; Ruta, Michele; di Sciascio, Eugenio; Donini, Francesco M.
We present an approach to multi-issue bilateral negotiation for mobile commerce scenarios. The negotiation mechanism has been integrated in a semantic-based application layer enhancing both RFID and Bluetooth wireless standards. OWL DL has been used to model advertisements and relationships among issues within a shared common ontology. Finally, non standard inference services integrated with utility theory help in finding suitable agreements. We illustrate and motivate the provided theoretical framework in a wireless commerce case study.
Mather, Carey; Cummings, Elizabeth; Allen, Penny
The growth of digital technology has created challenges for appropriate and safe use of mobile or portable devices in healthcare environments. There is perceived risk that the use of mobile technology for learning may distract from provision of patient care if used by undergraduate students during work-integrated learning. This paper reports on a study that aimed to identify differences in preferred behavior of student nurses in their use of mobile technology during and away from the clinical practice environment. A previously validated online survey was administered to students during a period of work integrated learning in a range of healthcare settings in two Australian states. Respondents agreed that mobile devices could be beneficial to patient care. Overall, students proposed they would use mobile devices for accessing information, during work integrated learning, less than when away from the workplace. The development of policy to guide the use of mobile devices, in situ, is important to the provision of safe and competent care and improved health outcomes for patients.
Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María
Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358
Full Text Available In the 5G era, the operational cost of mobile wireless networks will significantly increase. Further, massive network capacity and zero latency will be needed because everything will be connected to mobile networks. Thus, self-organizing networks (SON are needed, which expedite automatic operation of mobile wireless networks, but have challenges to satisfy the 5G requirements. Therefore, researchers have proposed a framework to empower SON using big data. The recent framework of a big data-empowered SON analyzes the relationship between key performance indicators (KPIs and related network parameters (NPs using machine-learning tools, and it develops regression models using a Gaussian process with those parameters. The problem, however, is that the methods of finding the NPs related to the KPIs differ individually. Moreover, the Gaussian process regression model cannot determine the relationship between a KPI and its various related NPs. In this paper, to solve these problems, we proposed multivariate multiple regression models to determine the relationship between various KPIs and NPs. If we assume one KPI and multiple NPs as one set, the proposed models help us process multiple sets at one time. Also, we can find out whether some KPIs are conflicting or not. We implement the proposed models using MapReduce.
For the last 4 years, the School of Civil Engineering & Geosciences at Newcastle University, UK adapted mobile devices as learning approach only for undergraduate within Geomatics. All incoming students were given a mobile device as learning tool, which was supposed to be there main way to accessing teaching material. This paper will present how students adopted the mobile devices and how their learning has changed using mobile devices. It will highlight which apps can be used in a Geomatics teaching environment to engage students in their learning and teaching environment. The paper will furthermore look into apps which help students within the area of Photogrammetry and Remote Sensing, such as the Autodesk 123D catch up or the Remote RDP app to remotely control surveying instrumentations, such as laser scanners. Those apps are easy tools to engage students within digital learning environment which the students are familiar with. The paper will show how students embrace the technology but also current limitation of using those within Higher education establishments, such as sufficient Wifi and student support for using mobile devices.
... mobile.html Question: Will MedlinePlus work on my mobile device? To use the sharing features on this page, ... Some video content might not play on your mobile device. See our FAQ on playing videos on phones ...
Regis W. Anne
Full Text Available Wireless Sensor Network (WSN is a collection of intelligent sensors that communicate and coordinate in an energy constrained environment. Due to the limited energy supply of the sensors, lifetime problems arise in static WSN. One of the potential solutions to this problem is a mobility-assisted WSN. Mobility can be introduced by adding extra entities like mobile sinks, mobile cluster-head or mobile relays (MRs to the existing static WSN. The entities can significantly improve the functionality and performance of the WSN by making it flexible to failures, ease data collection, increase energy efficiency, enhance connectivity, improve coverage and prolong network lifetime. The need of today’s applications demands mobility-assisted WSN instead of the traditional static WSN. In this paper, we control the movement of MRs to maximize network lifetime. A distributed algorithm for controlling the movement of MRs is given and its performance is validated for the network parameters such as network lifetime and average residual energy. The proposed method shows that lifetime can be improved compared to that of a static network.
Feng, Yong; Liu, Jian; Xu, Hongyan; Yuan, Ye
Wireless Sensor Network (WSN) can be used in agriculture management. But hole can be produced in WSN due to the factors such as fault, energy depletion and so on, which can cause agricultural data incomplete. This fault can be repaired by deploying the mobile sensor nodes to patch the hole. The main optimization goal of this paper is to deploy the least mobile sensor nodes to make the cost of hole patching minimization. A hole patching strategy with the least mobile sensor nodes in WSN is proposed in this paper. Firstly, analyze geometric characteristics of the hole through detecting the hole. Next, deploy the mobile sensor nodes on the appropriate location to patch the hole according to the geometric characteristics. The strategy given in this paper includes two steps: (1) Choose the key intersection points from the set of intersection points of arc. (2) Determine the patching position of the mobile nodes to patch the hole. Finally, verify the effective of the strategy using a simulation experiment and analyze the performance based on the comparison of the experimental results. Using the hole patching strategy with the least mobile nodes in WSN can patch the hole completely and make the reparation cost minimization.
Rashed, Sarmad; Soyturk, Mujdat
Sensor nodes in a Wireless Sensor Network (WSN) can be dispersed over a remote sensing area (e.g., the regions that are hardly accessed by human beings). In such kinds of networks, datacollectionbecomesoneofthemajorissues. Getting connected to each sensor node and retrieving the information in time introduces new challenges. Mobile sink usage-especially Unmanned Aerial Vehicles (UAVs)-is the most convenient approach to covering the area and accessing each sensor node in such a large-scale WSN. However, the operation of the UAV depends on some parameters, such as endurance time, altitude, speed, radio type in use, and the path. In this paper, we explore various UAV mobility patterns that follow different paths to sweep the operation area in order to seek the best area coverage with the maximum number of covered nodes in the least amount of time needed by the mobile sink. We also introduce a new metric to formulate the tradeoff between maximizing the covered nodes and minimizing the operation time when choosing the appropriate mobility pattern. A realistic simulation environment is used in order to compare and evaluate the performance of the system. We present the performance results for the explored UAV mobility patterns. The results are very useful to present the tradeoff between maximizing the covered nodes and minimizing the operation time to choose the appropriate mobility pattern.
Kim, Jin Sook; Kim, Chun Hyeok
Assistive listening devices (ALDs) refer to various types of amplification equipment designed to improve the communication of individuals with hard of hearing to enhance the accessibility to speech signal when individual hearing instruments are not sufficient. There are many types of ALDs to overcome a triangle of speech to noise ratio (SNR) problems, noise, distance, and reverberation. ALDs vary in their internal electronic mechanisms ranging from simple hard-wire microphone-amplifier units to more sophisticated broadcasting systems. They usually use microphones to capture an audio source and broadcast it wirelessly over a frequency modulation (FM), infra-red, induction loop, or other transmission techniques. The seven types of ALDs are introduced including hardwire devices, FM sound system, infra-red sound system, induction loop system, telephone listening devices, television, and alert/alarm system. Further development of digital wireless technology in hearing instruments will make possible direct communication with ALDs without any accessories in the near future. There are two technology solutions for digital wireless hearing instruments improving SNR and convenience. One is near-field magnetic induction combined with Bluetooth radio frequency (RF) transmission or proprietary RF transmission and the other is proprietary RF transmission alone. Recently launched digital wireless hearing aid applying this new technology can communicate from the hearing instrument to personal computer, phones, Wi-Fi, alert systems, and ALDs via iPhone, iPad, and iPod. However, it comes with its own iOS application offering a range of features but there is no option for Android users as of this moment.
Kim, Chun Hyeok
Assistive listening devices (ALDs) refer to various types of amplification equipment designed to improve the communication of individuals with hard of hearing to enhance the accessibility to speech signal when individual hearing instruments are not sufficient. There are many types of ALDs to overcome a triangle of speech to noise ratio (SNR) problems, noise, distance, and reverberation. ALDs vary in their internal electronic mechanisms ranging from simple hard-wire microphone-amplifier units to more sophisticated broadcasting systems. They usually use microphones to capture an audio source and broadcast it wirelessly over a frequency modulation (FM), infra-red, induction loop, or other transmission techniques. The seven types of ALDs are introduced including hardwire devices, FM sound system, infra-red sound system, induction loop system, telephone listening devices, television, and alert/alarm system. Further development of digital wireless technology in hearing instruments will make possible direct communication with ALDs without any accessories in the near future. There are two technology solutions for digital wireless hearing instruments improving SNR and convenience. One is near-field magnetic induction combined with Bluetooth radio frequency (RF) transmission or proprietary RF transmission and the other is proprietary RF transmission alone. Recently launched digital wireless hearing aid applying this new technology can communicate from the hearing instrument to personal computer, phones, Wi-Fi, alert systems, and ALDs via iPhone, iPad, and iPod. However, it comes with its own iOS application offering a range of features but there is no option for Android users as of this moment. PMID:25566400
Full Text Available Precise localization of mobile robots in uncertain environments is a fundamental and crucial issue in robotics. In this paper, to deal with the unbounded accumulated errors of dead reckoning (DR-based localization, wireless sensor network (WSN-based localization is applied to calibrate the uncertainty of odometry using a Kalman filter (KF. In addition, to further aid in obtaining precise positions and reduce uncertainty, a novel backward dead reckoning (BDR localization approach is proposed. The experimental results demonstrate the success and reliability of the proposed method.
Full Text Available The paper proposes a mobile control sink node data collection method in the wireless sensor network based on compressive sensing. This method, with regular track, selects the optimal data collection points in the monitoring area via the disc method, calcu-lates the shortest path by using the quantum genetic algorithm, and hence determines the data collection route. Simulation results show that this method has higher network throughput and better energy efficiency, capable of collecting a huge amount of data with balanced energy consumption in the network.
Full Text Available The general problem of wireless sensor network nodes is the low-power batteries that significantly limit the life expectancy of a network. Nowadays the technical solutions related to energy resource management are being rapidly developed and integrated into the daily lives of people. The energy resource management systems use sensor networks for receiving and processing information during the realia time. The present paper proposes using a coordinator role mobility method for controlling the routing processes for energy balancing in nodes, which provides dynamic network reconfiguration possibilities. The method is designed to operate fully in the background and can be integrated into any exiting working system.
Leom, Ming Di; Choo, Kim-Kwang Raymond; Hunt, Ray
Mobile devices have become ubiquitous in almost every sector of both private and commercial endeavors. As a result of such widespread use in everyday life, many users knowingly and unknowingly save significant amounts of personal and/or commercial data on these mobile devices. Thus, loss of mobile devices through accident or theft can expose users-and their businesses-to significant personal and corporate cost. To mitigate this data leakage issue, remote wiping features have been introduced to modern mobile devices. Given the destructive nature of such a feature, however, it may be subject to criminal exploitation (e.g., a criminal exploiting one or more vulnerabilities to issue a remote wiping command to the victim's device). To obtain a better understanding of remote wiping, we survey the literature, focusing on existing approaches to secure flash storage deletion and provide a critical analysis and comparison of a variety of published research in this area. In support of our analysis, we further provide prototype experimental results for three Android devices, thus providing both a theoretical and applied focus to this article as well as providing directions for further research. © 2016 American Academy of Forensic Sciences.
Elif Ç. Seymour
Full Text Available Electrical neural stimulation with micro electrodes is a promising technique for restoring lost functions in the central nervous system as a result of injury or disease. One of the problems related to current neural stimulators is the tissue response due to the connecting wires and the presence of a rigid electrode inside soft neural tissue. We have developed a novel, optically activated, microscale photovoltaic neurostimulator based on a custom layered compound semiconductor heterostructure that is both wireless and has a comparatively small volume. Optical activation provides a wireless means of energy transfer to the neurostimulator, eliminating wires and the associated complications. This neurostimulator was shown to evoke action potentials and a functional motor response in the rat spinal cord. In this work, we extend our design to include wavelength selectivity and thus allowing independent activation of devices. As a proof of concept, we fabricated two different microscale devices with different spectral responsivities in the near-infrared region. We assessed the improved addressability of individual devices via wavelength selectivity as compared to spatial selectivity alone through on-bench optical measurements of the devices in combination with an in vivo light intensity profile in the rat cortex obtained in a previous study. We show that wavelength selectivity improves the individual addressability of the floating stimulators, thus increasing the number of devices that can be implanted in close proximity to each other.
Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.
The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.
Kim, Dong-Joong; Kim, Daesang; Choi, Sang-Ho
The purpose of this study is to investigate the potential impact and effectiveness of mobile learning in the context of a flipped classroom and also address implications for future curriculum design. The researchers developed a mathematics curriculum featuring the use of mobile devices in the context of a flipped classroom. Thirty pre-service…
Kim, Jung Taek; Park, Won Man; Lee, Bong Jae; Lim, Yoo Chung
The improvement in the nuclear industry makes that it is important to protect personnel and equipment form radiation, because they have many chance to treat radioactive material. The head office on a prevention and an emergency measure for a radioactive release is necessary. In this study, display device for radioactive information using wireless communication has been developed to display a radioactivity using radio frequency modem. Therefore, the unlocated head office can be operated in a portable environment using a notebook PC or a compact display device. Korea Atomic Energy Research Institute, which runs a research reactor, HANARO, needs the head office on a prevention and an emergency measure for a radioactive release. The display device for radioactive information using wireless communication to be developed in this study, can be used to the head office as a display device not to pay additional cost. This study has developed the display device for radioactive information using wireless communication, Remote Radiation Display System(RRDS), which transmits every 10 second a radioactive information to be displayed to RMT(Radiation Monitoring Terminal) of Radiation Monitoring System in HANARO. In this study, first, a configuration of hardware and software in HANARO RMS has been reviewed. Second, a RS-2322C serial communication program to transmit a radioactive information in HARARO RMS to RRDS using radio frequency modem has been developed. Finally, a RS-2322C serial communication program to receive a radioactive information in HANARO RMS from RRDS using radio frequency modem and GUI program to display the received information to RRDS has been developed. (author). 19 refs., 3 tabs., 25 figs
Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.
Full Text Available Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.
Elsawy, Amr S; Eldawlatly, Seif; Taher, Mohamed; Aly, Gamal M
Practical application of Brain-Computer Interfaces (BCIs) requires that the whole BCI system be portable. The mobility of BCI systems involves two aspects: making the electroencephalography (EEG) recording devices portable, and developing software applications with low computational complexity to be able to run on low computational-power devices such as tablets and smartphones. This paper addresses the development of MindEdit; a P300-based text editor for Android-based devices. Given the limited resources of mobile devices and their limited computational power, a novel ensemble classifier is utilized that uses Principal Component Analysis (PCA) features to identify P300 evoked potentials from EEG recordings. PCA computations in the proposed method are channel-based as opposed to concatenating all channels as in traditional feature extraction methods; thus, this method has less computational complexity compared to traditional P300 detection methods. The performance of the method is demonstrated on data recorded from MindEdit on an Android tablet using the Emotiv wireless neuroheadset. Results demonstrate the capability of the introduced PCA ensemble classifier to classify P300 data with maximum average accuracy of 78.37±16.09% for cross-validation data and 77.5±19.69% for online test data using only 10 trials per symbol and a 33-character training dataset. Our analysis indicates that the introduced method outperforms traditional feature extraction methods. For a faster operation of MindEdit, a variable number of trials scheme is introduced that resulted in an online average accuracy of 64.17±19.6% and a maximum bitrate of 6.25bit/min. These results demonstrate the efficacy of using the developed BCI application with mobile devices. Copyright © 2016 Elsevier Ltd. All rights reserved.
Evensen, Kristian; Kupka, Tomas; Riiser, Haakon; Ni, Pengpeng; Eg, Ragnhild; Griwodz, Carsten; Halvorsen, Pål
Video streaming is predicted to become the dominating traffic in mobile broadband networks. At the same time, adaptive HTTP streaming is developing into the preferred way of streaming media over the Internet. In this paper, we evaluate how different components of a streaming system can be optimized when serving content to mobile devices in particular. We first analyze the media traffic from a Norwegian network and media provider. Based on our findings, we outline benefits and chal...
... devices using ``touch sensitive input devices,'' including touch screens, were known in the art prior to... determined to review the Remand ID's construction of the claim limitation ``touch sensitive input device'' in...
... Motorola Mobility LLC of Libertyville, Illinois; Motorola Mobility Ireland of Bermuda; and Motorola..., IL 60048; Motorola Mobility Ireland, Clarendon House, 2 Church Street, Hamilton HMCX, Bermuda...) For the investigation so instituted, the Chief Administrative Law Judge, U.S. International Trade...
Hilley, G. E.
Technologies such as GPS and cellular triangulation allow location-specific content to be delivered by mobile devices, but no mechanism currently exists to associate content shared between locations in a way that guarantees the delivery of coherent and non-redundant information at every location. Thus, experiential learning via mobile devices must currently take place along a predefined path, as in the case of a self-guided tour. I developed a mobile-device-based system that allows a person to move through a space along a path of their choosing, while receiving information in a way that guarantees delivery of appropriate background and location-specific information without producing redundancy of content between locations. This is accomplished by coupling content to knowledge-concept tags that are noted as fulfilled when users take prescribed actions. Similarly, the presentation of the content is related to the fulfillment of these knowledge-concept tags through logic statements that control the presentation. Content delivery is triggered by mobile-device geolocation including GPS/cellular navigation, and sensing of low-power Bluetooth proximity beacons. Together, these features implement a process that guarantees a coherent, non-redundant educational experience throughout a space, regardless of a learner's chosen path. The app that runs on the mobile device works in tandem with a server-side database and file-serving system that can be configured through a web-based GUI, and so content creators can easily populate and configure content with the system. Once the database has been updated, the new content is immediately available to the mobile devices when they arrive at the location at which content is required. Such a system serves as a platform for the development of field-based geoscience educational experiences, in which students can organically learn about core concepts at particular locations while individually exploring a space.
... Security of Information Stored on Mobile Communications Devices AGENCY: Federal Communications Commission...' mobile communications devices and the application of existing privacy and security requirements to that..., integrating, and updating the device's operating system, preinstalled software, and security capabilities; the...
Full Text Available The most typical characteristic of 21. century is the light velocity changing of technology. Dizzily developments in the field of human-robot interaction, mobile communication and education as affect all the fields of life also have an impact on art and design area. Striking increase of interest had been seen for mobile devices which are product of developing technology as tablet and mobile phone. While this increase happening at the present time user interfaces at mobile world and user practices developed as much as dominating design tendency. And became primary impotance for visual designers. This study aims utulizing future options for designers and the oppurtunities and reach a conclusions with examining evolution field of interface design spesific to mobile devices. From Skemorfizm to ordinary design and Google’s recent transition of material design principles were discussed together in this study. And this workout deal with interface design logic of users for working with new computational arificial facts devices as wearable smart objects and devices which able to connect to internet.
Krishna Prakash; Balachandra
The radical evolution of computers and advancement of technology in the area of hardware (smaller size, weight, low power consumption and cost, high performance) and communications has introduced the notion of mobile computing. Mobile Commerce is an evolving area of e-commerce, where users can interact with service providers through a mobile and wireless network using mobile device for information retrieval and transaction processing. Mobile wireless market is increasing by lea...
Durmaz, A. İ.
DEM (Digital Elevation Models) is the best way to interpret topography on the ground. In recent years, lidar technology allows to create more accurate elevation models. However, the problem is this technology is not common all over the world. Also if Lidar data are not provided by government agencies freely, people have to pay lots of money to reach these point clouds. In this article, we will discuss how we can create digital elevation model from less accurate mobile devices' GPS data. Moreover, we will evaluate these data on the same mobile device which we collected data to reduce cost of this modeling.
Hagar, Jon Duncan
Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It
Full Text Available Today’s handheld devices are becoming increasingly multifunctional, portable and interactive technospaces which enfold (and unfold an assortment of media forms. This transformation requires a critical approach that considers mobile media as more than telecommunications tools, but also as hybrid new media interfaces. This article presents some initial thoughts pre-empting a larger research project on the phenomenology of mobile media. From a phenomenological perspective, each body-tool relation induces its own technosoma, or specific ways of ‘being-with-equipment’ in a Heideggerian sense; in this conceptual framework, I explore some of the medium specific and intercorporeal effects of the mobile phone.
Hairpetian, A.; Gitlin, D.; Viswanathan, C.R.
The surface channel mobility of carriers in eta- and rho-MOS transistors fabricated in a CMOS process was accurately determined at low temperatures down to 5 Κ. The mobility was obtained by an accurate measurement of the inversion charge density using a split C-V technique and the conductance at low drain voltages. The split C-V technique was validated at all temperatures using a one-dimensional Poisson solver (MOSCAP), which was modified for low-temperature application. The mobility dependence on the perpendicular electric field for different substrate bias values appears to have different temperature dependence for eta- and rho-channel devices. The electron mobility increases with a decrease in temperature at all gate voltages. On the other hand, the hole mobility exhibits a different temperature behavior depending upon whether the gate voltage corresponds to strong inversion or is near threshold
Full Text Available Traffic patterns in wireless sensor networks (WSNs usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.
Full Text Available This work presents the development and experimental evaluation of a method based on fuzzy logic to locate mobile robots in an Intelligent Space using Wireless Sensor Networks (WSNs. The problem consists of locating a mobile node using only inter-node range measurements, which are estimated by radio frequency signal strength attenuation. The sensor model of these measurements is very noisy and unreliable. The proposed method makes use of fuzzy logic for modeling and dealing with such uncertain information. Besides, the proposed approach is compared with a probabilistic technique showing that the fuzzy approach is able to handle highly uncertain situations that are difficult to manage by well-known localization methods.
Kulkarni, Nandkumar P.; Prasad, Neeli R.; Prasad, Ramjee
change dynamically. In this paper, the authors put forward an Evolutionary Mobility aware multi-objective hybrid Routing Protocol for heterogeneous wireless sensor networks (EMRP). EMRP uses two-level hierarchical clustering. EMRP selects the optimal path from source to sink using multiple metrics...... such as Average Energy consumption, Control Overhead, Reaction Time, LQI, and HOP Count. The authors study the influence of energy heterogeneity and mobility of sensor nodes on the performance of EMRP. The Performance of EMRP compared with Simple Hybrid Routing Protocol (SHRP) and Dynamic Multi-Objective Routing......Researchers have faced numerous challenges while designing WSNs and protocols in many applications such as object tracking in military, detection of disastrous events, environment and health monitoring etc. Amongst all sustaining connectivity and capitalizing on the network lifetime is a serious...
Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee
of redundant sensing data and hence, results in energy and bandwidth constraints. In this context, the paper proposes the sink mobility and nodes heterogeneity aware cluster-based data aggregation algorithm (MHCDA) for efficient bandwidth utilization and an increase in network lifetime. The proposed algorithm......Internet of things (IoT) is the modern era, which offers a variety of novel applications for mobile targets and opens the new domains for the distributed data aggregations using Wireless Sensor Networks (WSNs). However, low cost tiny sensors used for network formation generate the large amount...... uses a predefined region for the aggregation of packets at the cluster head for minimizing computation and communication cost. MHCDA exploits correlation of data packets generated by nodes with a variable packet generation rate to reduce energy consumption by 8.66%. Also, it prolongs the network life...
Full Text Available A UWB antenna loaded by parasitic elements for wireless USB of mobile handsets is proposed for UWB service in which a band-stop function of 5.725–5.825 GHz WLAN band is required. Two kinds of parasitic elements are incorporated into a rectangular radiator to obtain enhanced impedance bandwidth and band-stop function. The proposed antenna is very compact in size. Wide bandwidths of 3.15–4.75 GHz and 7.2–10.2 GHz are achieved while 5.725–5.825 GHz is notched. Three different shapes of conventional mobile terminals are also considered for measurement.
R. Beulah Jayakumari
Full Text Available Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol.
Yee Shin Chia
Full Text Available The channel assignment problem in wireless mobile network is the assignment of appropriate frequency spectrum to incoming calls while maintaining a satisfactory level of electromagnetic compatibility (EMC constraints. An effective channel assignment strategy is important due to the limited capacity of frequency spectrum in wireless mobile network. Most of the existing channel assignment strategies are based on deterministic methods. In this paper, an adaptive genetic algorithm (GA based channel assignment strategy is introduced for resource management and to reduce the effect of EMC interferences. The most significant advantage of the proposed optimization method is its capability to handle both the reassignment of channels for existing calls as well as the allocation of channel to a new incoming call in an adaptive process to maximize the utility of the limited resources. It is capable to adapt the population size to the number of eligible channels for a particular cell upon new call arrivals to achieve reasonable convergence speed. The MATLAB simulation on a 49-cells network model for both uniform and nonuniform call traffic distributions showed that the proposed channel optimization method can always achieve a lower average new incoming call blocking probability compared to the deterministic based channel assignment strategy.
Rina Pudji Astuti
Full Text Available In the future, wireless access system will operate in high data rate transmission and high mobility environment, to support private and public access. For such environment, it is necessary to develop a system that has a higher spectrum efficiency and able to mitigate selective fading problems. A novel multiple output differential unitary space time frequency (DUSTF encoding scheme is proposed to overcome those problems. The implementation of this inner coding scheme is unified with MIMO system, so that the scheme has a good spectrum efficiency. The differential space-time modulation in this proposed scheme is intended to operate in a non coherent channel transmission scheme and to guarantee the system performance. In order to combat the selective fading problems, the multicarrier space frequency scheme is utilized in the proposed scheme. In general, simulation result shows that the MIMO wireless system with the multiple output DUSTF coding scheme in a non coherent channel transmission scheme provides a good system performance. The proposed scheme can outperforms other previously published inner coding scheme for high mobility and high SNR. The system also achieves a good channel capacity.
Rina Pudji Astuti
Full Text Available In the future, wireless access system will operate in high data rate transmission and high mobility environment, to support private and public access. For such an environment, it is necessary to develop a system that has a higher spectrum efficiency and is able to mitigate selective fading problems. A novel multiple-output differential unitary space-time frequency (DUSTF coding scheme is proposed to overcome those problems. The implementation of this inner coding scheme is unified with MIMO system, so that the scheme has a good spectrum efficiency. The differential space-time modulation in this proposed scheme is intended to operate in a non-coherent channel transmission scheme and to guarantee the system performance. In order to combat the selective fading problems, the multi-carrier space frequency scheme is utilized in the proposed scheme. In general, simulation result shows that the MIMO wireless system with the multiple-output DUSTF coding scheme in a non-coherent channel transmission scheme provides a good system performance. The proposed scheme can outperforms other previously published inner coding scheme for high mobility and high SNR. The system also achieves a good channel capacity.
Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.
Full Text Available A double-negative metamaterial-inspired antenna is presented for mobile wireless applications. The antenna consists of a semi-circular radiating patch and a 3 × 4 hexagonal shaped metamaterial unit cell array in the ground plane. The antenna is fed with a 50 Ω microstrip feed line. The electric dimensions of the proposed antenna are 0.20λ × 0.26λ × 0.004λ, at the low-end frequency. The proposed antenna achieves a −10 dB impedance with a bandwidth of 2.29 GHz at the lower band and 1.28 GHz at the upper band and can operate for most of the mobile applications such as upper GSM bands, WiMAX, Bluetooth, and wireless local area network (WLAN frequency bands. The focused novelties of the proposed antenna are its small size, multi-standard operating bands, and electromagnetic absorption reduction at all the operating frequencies using the double-negative metamaterial ground plane.
Rohmer, Kai; Jendersie, Johannes; Grosch, Thorsten
Augmented Reality offers many applications today, especially on mobile devices. Due to the lack of mobile hardware for illumination measurements, photorealistic rendering with consistent appearance of virtual objects is still an area of active research. In this paper, we present a full two-stage pipeline for environment acquisition and augmentation of live camera images using a mobile device with a depth sensor. We show how to directly work on a recorded 3D point cloud of the real environment containing high dynamic range color values. For unknown and automatically changing camera settings, a color compensation method is introduced. Based on this, we show photorealistic augmentations using variants of differential light simulation techniques. The presented methods are tailored for mobile devices and run at interactive frame rates. However, our methods are scalable to trade performance for quality and can produce quality renderings on desktop hardware.
Fanning, Jason; Mullen, Sean P; McAuley, Edward
Regular physical activity has established physical and mental health benefits; however, merely one quarter of the U.S. adult population meets national physical activity recommendations. In an effort to engage individuals who do not meet these guidelines, researchers have utilized popular emerging technologies, including mobile devices (ie, personal digital assistants [PDAs], mobile phones). This study is the first to synthesize current research focused on the use of mobile devices for increasing physical activity. To conduct a meta-analysis of research utilizing mobile devices to influence physical activity behavior. The aims of this review were to: (1) examine the efficacy of mobile devices in the physical activity setting, (2) explore and discuss implementation of device features across studies, and (3) make recommendations for future intervention development. We searched electronic databases (PubMed, PsychINFO, SCOPUS) and identified publications through reference lists and requests to experts in the field of mobile health. Studies were included that provided original data and aimed to influence physical activity through dissemination or collection of intervention materials with a mobile device. Data were extracted to calculate effect sizes for individual studies, as were study descriptives. A random effects meta-analysis was conducted using the Comprehensive Meta-Analysis software suite. Study quality was assessed using the quality of execution portion of the Guide to Community Preventative Services data extraction form. Four studies were of "good" quality and seven of "fair" quality. In total, 1351 individuals participated in 11 unique studies from which 18 effects were extracted and synthesized, yielding an overall weight mean effect size of g = 0.54 (95% CI = 0.17 to 0.91, P = .01). Research utilizing mobile devices is gaining in popularity, and this study suggests that this platform is an effective means for influencing physical activity behavior. Our focus
Hsu, Wei-jen; Dutta, Debojyoti; Helmy, Ahmed
One vision of future wireless networks is that they will be deeply integrated and embedded in our lives and will involve the use of personalized mobile devices. User behavior in such networks is bound to affect the network performance. It is imperative to study and characterize the fundamental structure of wireless user behavior in order to model, manage, leverage and design efficient mobile networks. It is also important to make such study as realistic as possible, based on extensive measure...
Kocevski, Dale; McGrath, E. J.; CANDELS Collaboration
The widespread adoption of smart phones and tablet computers has the potential to revolutionize the way in which educational material is shared with the general public. As part of the outreach effort for the CANDELS survey, we have developed a free interactive astronomy education application named Hubble Universe for iPad and iPhone devices. The application focuses on extragalactic science topics related to the CANDELS legacy survey, which is documenting galaxy evolution in the early universe. I will provide an overview of the application, which contains a wide range of interactive content, including 3D models of astrophysical phenomenon, informative diagrams and computer simulations. I will discuss how the application can be used to enhance classroom learning both by providing a database of interactive media and by encouraging students to explore astronomical topics away from traditional settings like the classroom or the desktop computer.
Harkins, Judith; Tucker, Paula E.; Williams, Norman; Sauro, Jeff
In the United States, a nationwide Commercial Mobile Alert Service (CMAS) is being planned to alert cellular mobile device subscribers to emergencies occurring near the location of the mobile device. The plan specifies a unique audio attention signal as well as a unique vibration attention signal (for mobile devices set to vibrate) to identify…
Garcia-Lopez, Eva; Garcia-Cabot, Antonio; de-Marcos, Luis
This paper compares the usability of three different content distribution methods (scrolling, paging and internal links) in touchscreen mobile devices as means to display web documents. Usability is operationalized in terms of effectiveness, efficiency and user satisfaction. These dimensions are then measured in an experiment (N = 23) in which users are required to find words in regular-length web documents. Results suggest that scrolling is statistically better in terms of efficiency and user satisfaction. It is also found to be more effective but results were not significant. Our findings are also compared with existing literature to propose the following guideline: "try to use vertical scrolling in web pages for mobile devices instead of paging or internal links, except when the content is too large, then paging is recommended". With an ever increasing number of touchscreen web-enabled mobile devices, this new guideline can be relevant for content developers targeting the mobile web as well as institutions trying to improve the usability of their content for mobile platforms. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Crompton, H.; De Paor, D. G.; Whitmeyer, S. J.; Bentley, C.
Mobile devices are playing an increasing role in geoscience education. Affordances include instructor-student communication and class management in large classrooms, virtual and augmented reality applications, digital mapping, and crowd-sourcing. Mobile technologies have spawned the sub field of mobile learning or m-learning, which is defined as learning across multiple contexts, through social and content interactions. Geoscientists have traditionally engaged in non-digital mobile learning via fieldwork, but digital devices are greatly extending the possibilities, especially for non-traditional students. Smartphones and tablets are the most common devices but smart glasses such as Pivothead enable live streaming of a first-person view (see for example, https://youtu.be/gWrDaYP5w58). Virtual reality headsets such as Google Cardboard create an immersive virtual field experience and digital imagery such as GigaPan and Structure from Motion enables instructors and/or students to create virtual specimens and outcrops that are sharable across the globe. Whereas virtual reality (VR) replaces the real world with a virtual representation, augmented reality (AR) overlays digital data on the live scene visible to the user in real time. We have previously reported on our use of the AR application called FreshAiR for geoscientific "egg hunts." The popularity of Pokémon Go demonstrates the potential of AR for mobile learning in the geosciences.
Pratas, Nuno; Popovski, Petar
Device-to-Device (D2D) communications will play an important role in the fifth generation (5G) cellular networks, by increasing the spatial reuse of spectrum resources and enabling communication links with low latency. D2D is composed of two fundamental building blocks: proximity discovery...... and direct communication between nearby users. Another emerging trend in wireless cellular systems is Machine-to-Machine (M2M) communications, often characterized by fixed, low transmission rates. In this chapter we motivate the synergy between D2D and M2M, and present technologies that enable M2M-via-D2D...... communication to operate as an underlay to the ordinary cellular transmissions....
Fitzek, Frank H P
Includes a preface written by Professor Leonard Kleinrock, Distinguished Professor of Computer Science, UCLA, USA This book discusses and explores the concept of mobile cloud, creating an inspiring research space for exploiting opportunistic resource sharing, and covering from theoretical research approaches to the development of commercially profitable ideas. A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The b
Niamut, O.A.; Thomas, G.A.; Thomas, E.D.R.; Brandenburg, R. van; D’Acunto, L.; Gregory-Clarke, R.
This paper reports on the latest developments around tiled streaming. As an extension of HTTP adaptive streaming, it retains all the benefits of this streaming technology, while adding the possibility of interaction when consuming UHDTV on mobile devices. In particular, we discuss the underlying
The study of workplace learning and informal learning are not new to adult education and pedagogy. However, the use of mobile devices as learning tools for informal learning in the workplace is an understudied area. Using theories on informal learning and constructivism as a framework, this paper explores informal learning of registered nurses…
Cumaoglu, Gonca Kizilkaya
The purpose of this study is to examine teachers' beliefs concerning the effects on students using mobile devices, and to determine whether these beliefs vary according to the demographic characteristics and Internet usage purposes. For this purpose, a demographic information questionnaire and the scale developed by Diker Coskun & Kizilkaya…
When teaching motor-learning concepts, laboratory experiments can be valuable tools for promoting learning. In certain circumstances, traditional laboratory exercises are often impractical due to facilities, time, or cost. Inexpensive or free applications (apps) that run on mobile devices can serve as useful alternatives. This article details…
Sevillano-García, M.ª Luisa; Vázquez-Cano, Esteban
This research examined the acceptance, incidence, and use of digital mobile devices (tablets and smartphones) among university students in the European Higher Education Area (EHEA). The research was contextualized in a sample of 419 students from three Spanish public universities. Through a quantitative methodology, we identified the factors and…
Smart mobile devices gain increasing importance at work. Integrating these smart mobile devices into the workplace creates new opportunities and challenges for occupational health and safety. Therefore the aim of the following scoping review was to identify ergonomic challenges with the use of smart mobile devices at work with respect to physical problems. A review of 36 papers based on literature including January 2016 was conducted. Biomechanical measures in the reviewed studies demonstrated i.e., head flexion angles exceeding 20° in 20 out of 26 different conditions described. Furthermore, laterally deviated wrists were frequently noted and thumb and finger flexor muscle activities generally greater than 5% MVC were reported. The reviewed literature indicated an elevated biomechanical risk, especially for the neck, the wrists and thumb. This was due to poor posture, ongoing and intermitted muscle tension, and/or repetitive movements. Papers addressing specific risks for smartphone and tablet use in different work environments are scarce. As the technology, as well as the use of smart mobile devices is rapidly changing, further research, especially for prolonged periods in the workplace is needed.
Danescu, Radu; Itu, Razvan; Petrovai, Andra
The driving environment is complex and dynamic, and the attention of the driver is continuously challenged, therefore computer based assistance achieved by processing image and sensor data may increase traffic safety. While active sensors and stereovision have the advantage of obtaining 3D data directly, monocular vision is easy to set up, and can benefit from the increasing computational power of smart mobile devices, and from the fact that almost all of them come with an embedded camera. Several driving assistance application are available for mobile devices, but they are mostly targeted for simple scenarios and a limited range of obstacle shapes and poses. This paper presents a technique for generic, shape independent real-time obstacle detection for mobile devices, based on a dynamic, free form 3D representation of the environment: the particle based occupancy grid. Images acquired in real time from the smart mobile device's camera are processed by removing the perspective effect and segmenting the resulted bird-eye view image to identify candidate obstacle areas, which are then used to update the occupancy grid. The occupancy grid tracked cells are grouped into obstacles depicted as cuboids having position, size, orientation and speed. The easy to set up system is able to reliably detect most obstacles in urban traffic, and its measurement accuracy is comparable to a stereovision system.
Klok, E.J.; Mark, P.J. van der; Nieuwkoop, E.
Within the Urbmobi research project, a novel mobile measurement device is developed for urban areas. It provides temporally and spatially distributed environmental data and fulfills the need for monitoring at various places without the costs for a large number of fixed measurement stations. Urbmobi
De Vries, Fred; Thuss, Frank
De Vries, F., & Thuss, F. (2013). Mobile Devices and Apps as accelerators for OER. In R. Jacobi, H. Jelgerhuis, & N. Van der Woert (Eds.), Trendreport Open Educational Resources 2013 (pp. 49-52). Utrecht: SURF Foundation - Special Interest Group Open Educational Resources SURF.
In this project, TTI worked with StreetLight Data to evaluate a beta version of its traffic volume estimates derived from global positioning system (GPS)-based mobile devices. TTI evaluated the accuracy of average annual daily traffic (AADT) volume :...
Niamut, O.A.; Thomas, G.A.; Thomas, E.D.R.; Brandenburg, R. van; D'Acunto, L.; Gregory-Clarke, R.
This paper reports on the latest developments in tiled streaming. As an extension of HTTP adaptive streaming, it retains all the benefits of this streaming technology, while adding the potential of interaction when UHDTV is consumed on mobile devices. In particular, we discuss the underlying
Alumni magazines have their designs on mobile devices. The efforts are tied together, no matter the platform, by a desire for the magazine to be where its readers are and a spirit of experimentation that is akin to what is happening with social media. None of the magazine editors went into this process with any numerical expectations for…
Savakis, Andreas; Quraishi, Mohammad Faiz; Minnehan, Breton
With the growing ubiquity of mobile devices, advanced applications are relying on computer vision techniques to provide novel experiences for users. Currently, few tracking approaches take into consideration the resource constraints on mobile devices. Designing efficient tracking algorithms and optimizing performance for mobile devices can result in better and more efficient tracking for applications, such as augmented reality. In this paper, we use binary descriptors, including Fast Retina Keypoint (FREAK), Oriented FAST and Rotated BRIEF (ORB), Binary Robust Independent Features (BRIEF), and Binary Robust Invariant Scalable Keypoints (BRISK) to obtain real time tracking performance on mobile devices. We consider both Google's Android and Apple's iOS operating systems to implement our tracking approach. The Android implementation is done using Android's Native Development Kit (NDK), which gives the performance benefits of using native code as well as access to legacy libraries. The iOS implementation was created using both the native Objective-C and the C++ programing languages. We also introduce simplified versions of the BRIEF and BRISK descriptors that improve processing speed without compromising tracking accuracy.
Koskela, Timo; Vatjus-Anttila, Jarkko
3D Internet technologies are becoming essential enablers in many application areas including games, education, collaboration, navigation and social networking. The use of 3D Internet applications with mobile devices provides location-independent access and richer use context, but also performance issues. Therefore, one of the important challenges facing 3D Internet applications is the deployment of 3D graphics on mobile devices. In this article, we present an extensive survey on optimization techniques for 3D graphics deployment on mobile devices and qualitatively analyze the applicability of each technique from the standpoints of visual quality, performance and energy consumption. The analysis focuses on optimization techniques related to data-driven 3D graphics deployment, because it supports off-line use, multi-user interaction, user-created 3D graphics and creation of arbitrary 3D graphics. The outcome of the analysis facilitates the development and deployment of 3D Internet applications on mobile devices and provides guidelines for future research.
that support and facilitate the processes of transforming experiences into theoretical knowledge. I argue that this didactic concept enhances a sensitive cognition based on rationality as described by the philosopher Baumgarten (1750). Furthermore, I argue that the emergence of mobile digital devices...
Khan, Majid I.; Gansterer, Wilfried N.; Haring, Guenter
Over the last decade a large number of routing protocols has been designed for achieving energy efficiency in data collecting wireless sensor networks. The drawbacks of using a static sink are well known. It has been argued in the literature that a mobile sink may improve the energy dissipation compared to a static one. Some authors focus on minimizing Emax, the maximum energy dissipation of any single node in the network, while others aim at minimizing Ebar, the average energy dissipation over all nodes. In our paper we take a more holistic view, considering both Emax and Ebar. The main contribution of this paper is to provide a simulation-based analysis of the energy efficiency of WSNs with static and mobile sinks. The focus is on two important configuration parameters: mobility path of the sink and duty cycling value of the nodes. On the one hand, it is well known that in the case of a mobile sink with fixed trajectory the choice of the mobility path influences energy efficiency. On the other hand, in some types of applications sensor nodes spend a rather large fraction of their total lifetime in idle mode, and therefore higher energy efficiency can be achieved by using the concept of reduced duty cycles. In particular, we quantitatively analyze the influence of duty cycling and the mobility radius of the sink as well as their interrelationship in terms of energy consumption for a well-defined model scenario. The analysis starts from general load considerations and is refined into a geometrical model. This model is validated by simulations which are more realistic in terms of duty cycling than previous work. It is illustrated that over all possible configuration scenarios in terms of duty cycle and mobility radius of the sink the energy dissipation in the WSN can vary up to a factor of nine in terms of Emax and up to a factor of 17 in terms of Ebar. It turns out that in general the choice of the duty cycle value is more important for achieving energy efficiency
Khan, Majid I; Gansterer, Wilfried N; Haring, Guenter
Over the last decade a large number of routing protocols has been designed for achieving energy efficiency in data collecting wireless sensor networks. The drawbacks of using a static sink are well known. It has been argued in the literature that a mobile sink may improve the energy dissipation compared to a static one. Some authors focus on minimizing Emax , the maximum energy dissipation of any single node in the network, while others aim at minimizing Ebar , the average energy dissipation over all nodes. In our paper we take a more holistic view, considering both Emax and Ebar . The main contribution of this paper is to provide a simulation-based analysis of the energy efficiency of WSNs with static and mobile sinks. The focus is on two important configuration parameters: mobility path of the sink and duty cycling value of the nodes. On the one hand, it is well known that in the case of a mobile sink with fixed trajectory the choice of the mobility path influences energy efficiency. On the other hand, in some types of applications sensor nodes spend a rather large fraction of their total lifetime in idle mode, and therefore higher energy efficiency can be achieved by using the concept of reduced duty cycles. In particular, we quantitatively analyze the influence of duty cycling and the mobility radius of the sink as well as their interrelationship in terms of energy consumption for a well-defined model scenario. The analysis starts from general load considerations and is refined into a geometrical model. This model is validated by simulations which are more realistic in terms of duty cycling than previous work. It is illustrated that over all possible configuration scenarios in terms of duty cycle and mobility radius of the sink the energy dissipation in the WSN can vary up to a factor of nine in terms of Emax and up to a factor of 17 in terms of Ebar. It turns out that in general the choice of the duty cycle value is more important for achieving energy
Hussain, Azham; Mkpojiogu, Emmanuel O. C.; Fadzil, Najdawati Mohd; Hassan, Norhasizasuriati Mohd
The increased use of mobile devices has led to an upsurge in the number of mobile applications. This makes the usability of these applications a very crucial and critical issue. The Amila Pregnancy mobile app is revolutionizing the delivery of healthcare services to pregnancy woman across the globe and is increasingly becoming beneficial in their daily life. Only a few digital interventions have been developed for pregnant woman, and little is known about the acceptability and usability of such mobile apps that provide assistance to pregnant women. Usability comprises everything that is connected with the intuitive and efficient handling of user interaction with human-made devices. This paper reports the result of a usability evaluation for Amila Pregnancy mobile application. In the study five attributes of perceived usability was measured following Jakob Nielsen principles, namely: effectiveness, efficiency, learnability, memorability and satisfaction. In addition, performance metrics were also captured. The results reveal the difficulty users had in interpreting displayed icon, locating the information provided, re-finding it and in navigating through the mobile app. The study suggests that the main menu of the app need to be further improved upon to enhance its usability.
Loeffler, S.; Thorn, R.; Myrbo, A.; Roth, R.; Goring, S. J.; Williams, J.
Visualizing and interacting with complex multivariate and spatiotemporal datasets on mobile devices is challenging due to their smaller screens, reduced processing power, and limited data connectivity. Pollen data require visualizing pollen assemblages spatially, temporally, and across multiple taxa to understand plant community dynamics through time. Drawing from cartography, information visualization, and paleoecology, we have created new mobile-first visualization techniques that represent multiple taxa across many sites and enable user interaction. Using pollen datasets from the Neotoma Paleoecology Database as a case study, the visualization techniques allow ecological patterns and trends to be quickly understood on a mobile device compared to traditional pollen diagrams and maps. This flexible visualization system can be used for datasets beyond pollen, with the only requirements being point-based localities and multiple variables changing through time or depth.
Full Text Available The recent and rapid development of mobile devices and the increasing popularity of e learning have created a demand for mobile learning packages and environments. We have analyzed the possibilities of adapting the existing content for mobile devices, and have implemented two fundamentally different systems to satisfy the demand that has arisen. One of the systems creates e learning courses from existing materials and adapts them to the specified platform (this system realizes the functionalities of the Content Management System. The other system is a modified version of the Moodle Learning Management System, which can adapt existing courses right before displaying them. This paper discuses the fundamentals of e learning, the design considerations and investigates various methods of scalable video coding. Finally the realization details of the two systems are presented.
Theofanis P. Lambrou
Full Text Available Monitoring a large area with stationary sensor networks requires a very large number of nodes which with current technology implies a prohibitive cost. The motivation of this work is to develop an architecture where a set of mobile sensors will collaborate with the stationary sensors in order to reliably detect and locate an event. The main idea of this collaborative architecture is that the mobile sensors should sample the areas that are least covered (monitored by the stationary sensors. Furthermore, when stationary sensors have a “suspicion” that an event may have occurred, they report it to a mobile sensor that can move closer to the suspected area and can confirm whether the event has occurred or not. An important component of the proposed architecture is that the mobile nodes autonomously decide their path based on local information (their own beliefs and measurements as well as information collected from the stationary sensors in a neighborhood around them. We believe that this approach is appropriate in the context of wireless sensor networks since it is not feasible to have an accurate global view of the state of the environment.
Yang, Jin; Liu, Fagui; Cao, Jianneng; Wang, Liangming
Mobile sinks can achieve load-balancing and energy-consumption balancing across the wireless sensor networks (WSNs). However, the frequent change of the paths between source nodes and the sinks caused by sink mobility introduces significant overhead in terms of energy and packet delays. To enhance network performance of WSNs with mobile sinks (MWSNs), we present an efficient routing strategy, which is formulated as an optimization problem and employs the particle swarm optimization algorithm (PSO) to build the optimal routing paths. However, the conventional PSO is insufficient to solve discrete routing optimization problems. Therefore, a novel greedy discrete particle swarm optimization with memory (GMDPSO) is put forward to address this problem. In the GMDPSO, particle’s position and velocity of traditional PSO are redefined under discrete MWSNs scenario. Particle updating rule is also reconsidered based on the subnetwork topology of MWSNs. Besides, by improving the greedy forwarding routing, a greedy search strategy is designed to drive particles to find a better position quickly. Furthermore, searching history is memorized to accelerate convergence. Simulation results demonstrate that our new protocol significantly improves the robustness and adapts to rapid topological changes with multiple mobile sinks, while efficiently reducing the communication overhead and the energy consumption. PMID:27428971
Yang, Jin; Liu, Fagui; Cao, Jianneng; Wang, Liangming
Mobile sinks can achieve load-balancing and energy-consumption balancing across the wireless sensor networks (WSNs). However, the frequent change of the paths between source nodes and the sinks caused by sink mobility introduces significant overhead in terms of energy and packet delays. To enhance network performance of WSNs with mobile sinks (MWSNs), we present an efficient routing strategy, which is formulated as an optimization problem and employs the particle swarm optimization algorithm (PSO) to build the optimal routing paths. However, the conventional PSO is insufficient to solve discrete routing optimization problems. Therefore, a novel greedy discrete particle swarm optimization with memory (GMDPSO) is put forward to address this problem. In the GMDPSO, particle's position and velocity of traditional PSO are redefined under discrete MWSNs scenario. Particle updating rule is also reconsidered based on the subnetwork topology of MWSNs. Besides, by improving the greedy forwarding routing, a greedy search strategy is designed to drive particles to find a better position quickly. Furthermore, searching history is memorized to accelerate convergence. Simulation results demonstrate that our new protocol significantly improves the robustness and adapts to rapid topological changes with multiple mobile sinks, while efficiently reducing the communication overhead and the energy consumption.
Full Text Available Multihop communication in wireless sensor network (WSN brings new challenges in reliable data transmission. Recent work shows that data collection from sensor nodes using mobile sink minimizes multihop data transmission and improves energy efficiency. However, due to continuous movements, mobile sink has limited communication time to collect data from sensor nodes, which results in rapid depletion of node’s energy. Therefore, we propose a data transmission scheme that addresses the aforementioned constraints. The proposed scheme first finds out the group based region on the basis of localization information of the sensor nodes and predefined trajectory information of a mobile sink. After determining the group region in the network, selection of master nodes is made. The master nodes directly transmit their data to the mobile sink upon its arrival at their group region through restricted flooding scheme. In addition, the agent node concept is introduced for swapping of the role of the master nodes in each group region. The master node when consuming energy up to a certain threshold, neighboring node with second highest residual energy is selected as an agent node. The mathematical analysis shows that the selection of agent node maximizes the throughput while minimizing transmission delay in the network.
Full Text Available As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.
Yin, Ming; Borton, David A.; Aceros, Juan; Patterson, William R.; Nurmikko, Arto V.
A 100-channel fully implantable wireless broadband neural recording system was developed. It features 100 parallel broadband (0.1 Hz–7.8 kHz) neural recording channels, a medical grade 200 mAh Li-ion battery recharged inductively at 150 kHz, and data telemetry using 3.2 GHz to 3.8 GHz FSK modulated wireless link for 48 Mbps Manchester encoded data. All active electronics are hermetically sealed in a titanium enclosure with a sapphire window for electromagnetic transparency. A custom, high-density configuration of 100 individual hermetic feedthrough pins enable connection to an intracortical neural recording microelectrode array. A 100 MHz bandwidth custom receiver was built to remotely receive the FSK signal and achieved −77.7 dBm sensitivity with 10−8 BER at 48 Mbps data rate. ESD testing on all the electronic inputs and outputs has proven that the implantable device satisfies the HBM Class-1B ESD Standard. In addition, the evaluation of the worst-case charge density delivered to the tissue from each I/O pin verifies the patient safety of the device in the event of failure. Finally, the functionality and reliability of the complete device has been tested on-bench and further validated chronically in ongoing freely moving swine and monkey animal trials for more than one year to date. PMID:23853294
Eduardo M. G. Rodrigues
Full Text Available This paper presents a home area network (HAN-based domestic load energy consumption monitoring prototype device as part of an advanced metering system (AMS. This device can be placed on individual loads or configured to measure several loads as a whole. The wireless communication infrastructure is supported on IEEE 805.12.04 radios that run a ZigBee stack. Data acquisition concerning load energy transit is processed in real time and the main electrical parameters are then transmitted through a RF link to a wireless terminal unit, which works as a data logger and as a human-machine interface. Voltage and current sensing are implemented using Hall effect principle-based transducers, while C code is developed on two 16/32-bit microcontroller units (MCUs. The main features and design options are then thoroughly discussed. The main contribution of this paper is that the proposed metering system measures the reactive energy component through the Hilbert transform for low cost measuring device systems.
Eom, Kyungsik; Jeong, Joonsoo; Lee, Tae Hyung; Kim, Jinhyung; Kim, Junghoon; Lee, Sung Eun; Kim, Sung June
Reliable wireless power delivery for implantable devices in animals is highly desired for safe and effective experimental use. Batteries require frequent replacement; wired connections are inconvenient and unsafe, and short-distance inductive coupling requires the attachment of an exterior transmitter to the animal's body. In this article, we propose a solution by which animals with implantable devices can move freely without attachments. Power is transmitted using coils attached to the animal's cage and is received by a receiver coil implanted in the animal. For a three-dimensionally uniform delivery of power, we designed a columnar dual-transmitter coil configuration. A resonator-based inductive link was adopted for efficient long-range power delivery, and we used a novel biocompatible liquid crystal polymer substrate as the implantable receiver device. Using this wireless power delivery system, we obtain an average power transfer efficiency of 15.2% (minimum efficiency of 10% and a standard deviation of 2.6) within a cage of 15×20×15 cm3.
Full Text Available The primary challenge in wireless communication with energy harvesting devices is to efficiently utilize the harvesting energy such that the data packet transmission could be supported. This challenge stems from not only QoS requirement imposed by the wireless communication application, but also the energy harvesting dynamics and the limited battery capacity. Traditional solar predictable energy harvesting models are perturbed by prediction errors, which could deteriorate the energy management algorithms based on this models. To cope with these issues, we first propose in this paper a non-homogenous Markov chain model based on experimental data, which can accurately describe the solar energy harvesting process in contrast to traditional predictable energy models. Due to different timescale between the energy harvesting process and the wireless data transmission process, we propose a general framework of multiple timescale Markov decision process (MMDP model to formulate the joint energy scheduling and transmission control problem under different timescales. We then derive the optimal control policies via a joint dynamic programming and value iteration approach. Extensive simulations are carried out to study the performances of the proposed schemes.
Shaw, Ryan J; Steinberg, Dori M; Bonnet, Jonathan; Modarai, Farhad; George, Aaron; Cunningham, Traven; Mason, Markedia; Shahsahebi, Mohammad; Grambow, Steven C; Bennett, Gary G; Bosworth, Hayden B
Although mobile health (mHealth) devices offer a unique opportunity to capture patient health data remotely, it is unclear whether patients will consistently use multiple devices simultaneously and/or if chronic disease affects adherence. Three healthy and three chronically ill participants were recruited to provide data on 11 health indicators via four devices and a diet app. The healthy participants averaged overall weekly use of 76%, compared to 16% for those with chronic illnesses. Device adherence declined across all participants during the study. Patients with chronic illnesses, with arguably the most to benefit from advanced (or increased) monitoring, may be less likely to adopt and use these devices compared to healthy individuals. Results suggest device fatigue may be a significant problem. Use of mobile technologies may have the potential to transform care delivery across populations and within individuals over time. However, devices may need to be tailored to meet the specific patient needs. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: email@example.com.
Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee
The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers. The durat......The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers...... at layer 3. Using analytical models, the authors evaluate MIPv4, MIPv6, fast MIPv6 (FMIPv6), and hierarchical MIPv6 (HMIPv6) and compare their performances in terms of handover delay for VoIP services. To optimize the handover delay, the authors propose to use the adaptive retransmission timer described...
Full Text Available stream_source_info Smith_19467_2017.pdf.txt stream_content_type text/plain stream_size 25760 Content-Encoding UTF-8 stream_name Smith_19467_2017.pdf.txt Content-Type text/plain; charset=UTF-8 PRINTED WIRELESS DEVICES... FOR LOW-COST, CONNECTED SENSORS FOR POINT-OF-CARE APPLICATIONS S. Smith1,2*, P. Bezuidenhout1, K. Land1, J.G. Korvink2 & D. Mager2 1Department of Materials Science and Manufacturing Council for Scientific and Industrial Research (CSIR), South Africa...
Full Text Available This paper presents an idea on how to utilize mobile phones to support learning in the classroom. The paper also tries to initiate discussion on whether we can create new kinds of learning applications using mobile devices and whether this could be the way we should proceed in developing 21st century learning applications. In this study, a mobile phone is programmed to function as a collective sound sensor. To achieve an appropriate learning atmosphere, the designed system attempts to maintain the noise level at a comfortable tolerance level in the classroom. The main aim of the mobile application is to change student behaviour through persuasive visualizations. The prototype application was piloted during spring 2012 with a total of 72 students and two teachers. The results, based on observations and interviews, are promising and several subjects for future work arose during the pilot study.
Takahashi, Makoto; Ito, Yo; Sato, Hisashi; Kitamura, Masaharu
A support system for trouble shooting activities has been developed based on the distributed DB and mobile agent technology. The main purpose of the proposed system is to provide field workers with effective functions for realizing trouble-shooting with the aid of the mobile agents, which performs data retrieval from DB and fault diagnosis. In the proposed scheme of trouble shooting support, a portable information device is utilized by the maintenance personnel, which is connected to the local data base (LDB) via wireless network. The important point is that these functions can be accessed by the field workers through wearable information device with the lower cognitive burden. The prototype system has been developed using the JAVA-based Aglets Framework SDK and applied to the actual objective system. It has been confirmed through the experiments that the developed prototype system is capable of performing the tasks to support diagnostic activities. (author)
Bargh, Mortaza S.; Hulsebosch, Bob; Eertink, Henk; Eertink, E.H.; Heijenk, Geert; Idserda, Jeroen; Laganier, Julien; Prasad, Anand R.; Zugenmaier, Alf
Handover in future wireless communication systems must be seamless. Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements. At the same time they do not give sufficient control to the network to optimize the handover process and they do not deal well
Wireless networks have provided us a variety of services which facilitate communication between people beyond the physical boundaries. Mobile telephony, mobile Internet and high-deffnition video calls are examples of services supported by modern networks nowadays. Beyond this, enhancements in processing capabilities of electronic devices coupled with advances in wireless communication have resulted in the emergence of devices which have high processing and communication capabilities. Small de...
Delen, Ibrahim; Krajcik, Joseph
The use of mobile devices is increasing rapidly as a potential tool for science teaching. In this study, five educators (three middle school teachers and two museum educators) used a mobile application that supported the development of a driving question. Previous studies have noted that teachers make little effort to connect learning experiences between classrooms and museums, and few studies have focused on creating connections between teachers and museum educators. In this study, teachers and museum educators created an investigation together by designing a driving question in conjunction with the research group before field trips. During field trips, students collected their own data using iPods or iPads to take pictures or record videos of the exhibits. When students returned to the school, they used the museum data with their peers as they tried to answer the driving question. After completing the field trips, five educators were interviewed to investigate their experiences with designing driving questions and using mobile devices. Besides supporting students in data collection during the field trip, using mobile devices helped teachers to get the museum back to the classroom. Designing the driving question supported museum educators and teachers to plan the field trip collaboratively.
de Fez, Dolores; Luque, Maria José; García-Domene, Maria Carmen; Camps, Vicente; Piñero, David
Available applications for vision testing in mobile devices usually do not include detailed setup instructions, sacrificing rigor to obtain portability and ease of use. In particular, colorimetric characterization processes are generally obviated. We show that different mobile devices differ also in colorimetric profile and that those differences limit the range of applications for which they are most adequate. The color reproduction characteristics of four mobile devices, two smartphones (Samsung Galaxy S4, iPhone 4s) and two tablets (Samsung Galaxy Tab 3, iPad 4), have been evaluated using two procedures: 3D LUT (Look Up Table) and a linear model assuming primary constancy and independence of the channels. The color reproduction errors have been computed with the CIEDE2000 color difference formula. There is good constancy of primaries but large deviations of additivity. The 3D LUT characterization yields smaller reproduction errors and dispersions for the Tab 3 and iPhone 4 devices, but for the iPad 4 and S4, both models are equally good. The smallest reproduction errors occur with both Apple devices, although the iPad 4 has the highest number of outliers of all devices with both colorimetric characterizations. Even though there is good constancy of primaries, the large deviations of additivity exhibited by the devices and the larger reproduction errors make any characterization based on channel independence not recommendable. The smartphone screens show, in average, the best color reproduction performance, particularly the iPhone 4, and therefore, they are more adequate for applications requiring precise color reproduction.
Full Text Available Computing solutions used in mobile communications equipment are similar to those in personal and mainframe computers. The key differences between the implementations at chip level are the low leakage silicon technology and lower clock frequency used in mobile devices. The hardware and software architectures, including the operating system principles, are strikingly similar, although the mobile computing systems tend to rely more on hardware accelerators. As the performance expectations of mobile devices are increasing towards the personal computer level and beyond, power efficiency is becoming a major bottleneck. So far, the improvements of the silicon processes in mobile phones have been exploited by software designers to increase functionality and to cut development time, while usage times, and energy efficiency, have been kept at levels that satisfy the customers. Here we explain some of the observed developments and consider means of improving energy efficiency. We show that both processor and software architectures have a big impact on power consumption. Properly targeted research is needed to find the means to explicitly optimize system designs for energy efficiency, rather than maximize the nominal throughputs of the processor cores used.
Full Text Available Computing solutions used in mobile communications equipment are similar to those in personal and mainframe computers. The key differences between the implementations at chip level are the low leakage silicon technology and lower clock frequency used in mobile devices. The hardware and software architectures, including the operating system principles, are strikingly similar, although the mobile computing systems tend to rely more on hardware accelerators. As the performance expectations of mobile devices are increasing towards the personal computer level and beyond, power efficiency is becoming a major bottleneck. So far, the improvements of the silicon processes in mobile phones have been exploited by software designers to increase functionality and to cut development time, while usage times, and energy efficiency, have been kept at levels that satisfy the customers. Here we explain some of the observed developments and consider means of improving energy efficiency. We show that both processor and software architectures have a big impact on power consumption. Properly targeted research is needed to find the means to explicitly optimize system designs for energy efficiency, rather than maximize the nominal throughputs of the processor cores used.
Olajubu, Emmanuel Ajayi; Odukoya, Oluwatoyin Helen; Akinboro, Solomon Adegbenro
Mobile devices have been impacting on human standard of living by providing timely and accurate information anywhere and anytime through wireless media in developing nations. Shortage of experts in medical fields is very obvious throughout the whole world but more pronounced in developing nations. Thus, this study proposes a telemedicine platform for the vulnerable areas of developing nations. The vulnerable area are the interior with little or no medical facilities, hence the dwellers are very susceptible to sicknesses and diseases. The framework uses mobile devices that can run LightWeight Agents (LWAs) to send consultation requests to a remote medical expert in urban city from the vulnerable interiors. The feedback is conveyed to the requester through the same medium. The system architecture which contained AgenRoller, LWAs, The front-end (mobile devices) and back-end (the medical server) is presented. The algorithm for the software component of the architecture (AgenRoller) is also presented. The system is modeled as M/M/1/c queuing system, and simulated using Simevents from MATLAB Simulink environment. The simulation result presented show the average queue length, the number of entities in the queue and the number of entities departure from the system. These together present the rate of information processing in the system. A full scale development of this system with proper implementation will help extend the few medical facilities available in the urban cities in developing nations to the interiors thereby reducing the number of casualties in the vulnerable areas of the developing world especially in Sub Saharan Africa.
Farias, Marcos Santana; Santos, Isaac Jose A. Luquetti dos; Jesus, Miller F. de; Sant'Anna, Claudio Reis de; Szabo, Andre Pedro; Carvalho, Paulo Victor R. de
The virtual instrumentation can be defined as a layer of software and hardware, added to a general purpose computer, so that users can interact with the computer in the same way that they interacted with traditional electronic instruments such as oscilloscopes, multi-meters and signal generators, and may add other functions defined by software. The virtual instrumentation gets a new integration environment, little explored yet, with the great growth that occurred in the mobile devices area. Nowadays it is possible to take measurements in more places by combining mobile devices with data acquisition hardware to create extremely portable and interconnected measurement systems. This paper shows the development of software and hardware that make possible the use of instrumentation on mobile devices for monitoring nuclear installations. It's presented the hardware and the application software for data acquisition of radiation monitors, developed to iOS devices. It's also shown the possibilities of hardware and software to develop near real-time data transfer to and from the field in nuclear installations, with benefits in efficiency, safety and productivity. (author)
The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...
In recent years, students have shown growing interest in mobile learning and the use of mobile devices for learning English as a foreign language (EFL). However, it appears that further research needs to be undertaken to identify students' use of mobile devices and their attitudes towards them, especially in developing countries. To achieve this…
Franzese, Oscar [ORNL; Lascurain, Mary Beth [ORNL; Capps, Gary J [ORNL; Siekmann, Adam [ORNL
The Federal Motor Carrier Safety Administration (FMCSA) Wireless Roadside Inspection (WRI) Program is researching the feasibility and value of electronically assessing truck and bus driver and vehicle safety at least 25 times more often than is possible using only roadside physical inspections. The WRI program is evaluating the potential benefits to both the motor carrier industry and to government. These potential benefits include reduction in accidents, fatalities and injuries on our highways and keeping safe and legal drivers and vehicles moving on the highways. WRI Pilot tests were conducted to prototype, test and demonstrate the feasibility and benefits of electronically collecting safety data message sets from in-service commercial vehicles and performing wireless roadside inspections using three different communication methods. This report summarizes the design, conduct and results of the Tennessee CMRS WRI Pilot Test. The purpose of this Pilot test was to demonstrate the implementation of commercial mobile radio services to electronically request and collect safety data message sets from a limited number of commercial vehicles operating in Tennessee. The results of this test have been used in conjunction with the results of the complimentary pilot tests to support an overall assessment of the feasibility and benefits of WRI in enhancing motor carrier safety (reduction in accidents) due to increased compliance (change in motor carrier and driver behavior) caused by conducting frequent safety inspections electronically, at highway speeds, without delay or need to divert into a weigh station
El-Sayed M. El-Alfy
Full Text Available With the proliferation of wireless and mobile network infrastructures and capabilities, a wide range of exploitable vulnerabilities emerges due to the use of multivendor and multidomain cross-network services for signaling and transport of Internet- and wireless-based data. Consequently, the rates and types of cyber-attacks have grown considerably and current security countermeasures for protecting information and communication may be no longer sufficient. In this paper, we investigate a novel methodology based on multicriterion decision making and fuzzy classification that can provide a viable second-line of defense for mitigating cyber-attacks. The proposed approach has the advantage of dealing with various types and sizes of attributes related to network traffic such as basic packet headers, content, and time. To increase the effectiveness and construct optimal models, we augmented the proposed approach with a genetic attribute selection strategy. This allows efficient and simpler models which can be replicated at various network components to cooperatively detect and report malicious behaviors. Using three datasets covering a variety of network attacks, the performance enhancements due to the proposed approach are manifested in terms of detection errors and model construction times.
Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao
Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients' health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit numerous health items to medical clouds via wireless and public communication channels. Therefore, a cloud-assisted WBAN facilitates response in case of emergency which can save patients' lives. Since the patient's data is sensitive and private, it is important to provide strong security and protection on the patient's medical data over public and insecure communication channels. In this paper, we address the challenge of participant authentication in mobile emergency medical care systems for patients supervision and propose a secure cloud-assisted architecture for accessing and monitoring health items collected by WBAN. For ensuring a high level of security and providing a mutual authentication property, chaotic maps based authentication and key agreement mechanisms are designed according to the concept of Diffie-Hellman key exchange, which depends on the CMBDLP and CMBDHP problems. Security and performance analyses show how the proposed system guaranteed the patient privacy and the system confidentiality of sensitive medical data while preserving the low computation property in medical treatment and remote medical monitoring.
Sanayei, Ali; Mirzaei, Abas
The purpose of this study is twofold. First, in order to guarantee a coherent discussion about mobile customer relationship management (mCRM), this paper presents a conceptualization of mCRM delineating its unique characteristics because of Among the variety of mobile services, considerable attention has been devoted to mobile marketing and in particular to mobile customer relationship management services. Second, the authors discusses the security risks in mobile computing in different level(user, mobile device, wireless network,...) and finally we focus on enterprise mobile security and it's subgroups with a series of suggestion and solution for improve mobile computing security.
Full Text Available With the rapid development of wireless networks and image acquisition technology, wireless video transmission technology has been widely applied in various communication systems. The traditional video monitoring technology is restricted by some conditions such as layout, environmental, the relatively large volume, cost, and so on. In view of this problem, this paper proposes a method that the mobile car can be equipped with wireless video monitoring system. The mobile car which has some functions such as detection, video acquisition and wireless data transmission is developed based on STC89C52 Micro Control Unit (MCU and WiFi router. Firstly, information such as image, temperature and humidity is processed by the MCU and communicated with the router, and then returned by the WiFi router to the host computer phone. Secondly, control information issued by the host computer phone is received by WiFi router and sent to the MCU, and then the MCU sends relevant instructions. Lastly, the wireless transmission of video images and the remote control of the car are realized. The results prove that the system has some features such as simple operation, high stability, fast response, low cost, strong flexibility, widely application, and so on. The system has certain practical value and popularization value.
Full Text Available Mobile and wireless networks are the integrant infrastructure of mobile and pervasive computing that aims at providing transparent and preferred information and services for people anytime anywhere. In such environments, end-to-end network bandwidth is crucial to improve user's transparent experience when providing on-demand services such as mobile video playing. As a result, powerful computing power is required for networked nodes, especially for routers. General-purpose processors cannot meet such requirements due to their limited processing ability, and poor programmability and scalability. Intel's network processor IXP is specially designed for fast packet processing to achieve a broad bandwidth. IXP provides a large number of registers to reduce the number of memory accesses. Registers in an IXP are physically partitioned as two banks so that two source operands in an instruction have to come from the two banks respectively, which makes the IXP register allocation tricky and different from conventional ones. In this paper, we investigate an approach for efficiently generating balanced bipartite graph and register allocation algorithms for the dual-bank register allocation in IXPs. The paper presents a graph uniform 2-way partition algorithm (FPT, which provides an optimal solution to the graph partition, and a heuristic algorithm for generating balanced bipartite graph. Finally, we design a framework for IXP register allocation. Experimental results demonstrate the framework and the algorithms are efficient in register allocation for IXP network processors.
Full Text Available Privacy-preserving data aggregation in wireless sensor networks (WSNs with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In this paper, we focus on the SUM aggregation function and propose two privacy-preserving data aggregation protocols for two-tiered sensor networks with mobile nodes: Privacy-preserving Data Aggregation against non-colluded Aggregator and Sink (PDAAS and Privacy-preserving Data Aggregation against Colluded Aggregator and Sink (PDACAS. Both protocols guarantee that the sink can derive the SUM of all raw sensor data but each sensor’s raw data is kept confidential. In PDAAS, two keyed values are used, one shared with the sink and the other shared with the aggregator. PDAAS can protect the privacy of sensed data against external eavesdroppers, compromised sensor nodes, the aggregator or the sink, but fails if the aggregator and the sink collude. In PDACAS, multiple keyed values are used in data perturbation, which are not shared with the aggregator or the sink. PDACAS can protect the privacy of sensor nodes even the aggregator and the sink collude, at the cost of a little more overhead than PDAAS. Thorough analysis and experiments are conducted, which confirm the efficacy and efficiency of both schemes.
Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel
Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity
Full Text Available Currently, a number of crowdsourcing-based mobile applications have been implemented in mobile networks and Internet of Things (IoT, targeted at real-time services and recommendation. The frequent information exchanges and data transmissions in collaborative crowdsourcing are heavily injected into the current communication networks, which poses great challenges for Mobile Wireless Networks (MWN. This paper focuses on the traffic scheduling and load balancing problem in software-defined MWN and designs a hybrid routing forwarding scheme as well as a congestion control algorithm to achieve the feasible solution. The traffic scheduling algorithm first sorts the tasks in an ascending order depending on the amount of tasks and then solves it using a greedy scheme. In the proposed congestion control scheme, the traffic assignment is first transformed into a multiknapsack problem, and then the Artificial Fish Swarm Algorithm (AFSA is utilized to solve this problem. Numerical results on practical network topology reveal that, compared with the traditional schemes, the proposed congestion control and traffic scheduling schemes can achieve load balancing, reduce the probability of network congestion, and improve the network throughput.
Yu, Yue; Hao, Hongwei; Wang, Weiming; Li, Luming
As the development of implantable biomedical devices, the rechargeable battery is applied to improve the life of implantable devices. Inductive transcutaneous power transfer, as a suitable way of charging the implantable rechargeable batteries, is widely used. During charging period, there are several stages based on the charging rule and the load resistance is varying simultaneously. In this paper, a model of inductive transcutaneous power transfer is set up with a compensative capacitor for primary coil in series and another compensative capacitor for secondary coil in parallel to descript the relationship in coupling coefficient, load resistance and conversion efficiency. Simulations were done and experiments were carried out to verify the model, and some suggestions on wireless power transfer design are given.
Khelifa, F.; Samet, A.; Ben Hassen, W.; Afif, M.
Multiuser diversity combined with Orthogonal Frequency Division Multiple Access (OFDMA) are a promising technique for achieving high downlink capacities in new generation of cellular and wireless network systems. The total capacity of OFDMA based-system is maximized when each subchannel is assigned to the mobile station with the best channel to noise ratio for that subchannel with power is uniformly distributed between all subchannels. A contiguous method for subchannel construction is adopted in IEEE 802.16 m standard in order to reduce OFDMA system complexity. In this context, new subchannel gain computation method, can contribute, jointly with optimal assignment subchannel to maximize total system capacity. In this paper, two new methods have been proposed in order to achieve a better trade-off between fairness and efficiency use of resources. Numerical results show that proposed algorithms provide low complexity, higher total system capacity and fairness among users compared to others recent methods.
Full Text Available In mobile wireless sensor networks (MWSN, nodes are allowed to move autonomously for deployment. This process is meant: (i to achieve good coverage; and (ii to distribute the communication load as homogeneously as possible. Rather than optimizing deployment, reactive algorithms are based on a set of rules or behaviors, so nodes can determine when to move. This paper presents an experimental evaluation of both reactive deployment approaches: rule-based and behavior-based ones. Specifically, we compare a backbone dispersion algorithm with a social potential fields algorithm. Most tests are done under simulation for a large number of nodes in environments with and without obstacles. Results are validated using a small robot network in the real world. Our results show that behavior-based deployment tends to provide better coverage and communication balance, especially for a large number of nodes in areas with obstacles.
Urdiales, Cristina; Aguilera, Francisco; González-Parada, Eva; Cano-García, Jose; Sandoval, Francisco
In mobile wireless sensor networks (MWSN), nodes are allowed to move autonomously for deployment. This process is meant: (i) to achieve good coverage; and (ii) to distribute the communication load as homogeneously as possible. Rather than optimizing deployment, reactive algorithms are based on a set of rules or behaviors, so nodes can determine when to move. This paper presents an experimental evaluation of both reactive deployment approaches: rule-based and behavior-based ones. Specifically, we compare a backbone dispersion algorithm with a social potential fields algorithm. Most tests are done under simulation for a large number of nodes in environments with and without obstacles. Results are validated using a small robot network in the real world. Our results show that behavior-based deployment tends to provide better coverage and communication balance, especially for a large number of nodes in areas with obstacles.
Socas, Rafael; Dormido, Sebastián; Dormido, Raquel; Fabregas, Ernesto
In this paper, a new event-based control strategy for mobile robots is presented. It has been designed to work in wireless environments where a centralized controller has to interchange information with the robots over an RF (radio frequency) interface. The event-based architectures have been developed for differential wheeled robots, although they can be applied to other kinds of robots in a simple way. The solution has been checked over classical navigation algorithms, like wall following and obstacle avoidance, using scenarios with a unique or multiple robots. A comparison between the proposed architectures and the classical discrete-time strategy is also carried out. The experimental results shows that the proposed solution has a higher efficiency in communication resource usage than the classical discrete-time strategy with the same accuracy.
Full Text Available Mobile Sink (MS based routing strategies have been widely investigated to prolong the lifetime of Wireless Sensor Networks (WSNs. In this paper, we propose two schemes for data gathering in WSNs: (i MS moves on random paths in the network (RMS and (ii the trajectory of MS is defined (DMS. In both the schemes, the network field is logically divided into small squares. The center point of each partitioned area is the sojourn location of the MS. We present three linear programming based models: (i to maximize network lifetime, (ii to minimize path loss, and (iii to minimize end to end delay. Moreover, a geometric model is proposed to avoid redundancy while collecting information from the network nodes. Simulation results show that our proposed schemes perform better than the selected existing schemes in terms of the selected performance metrics.
...,'' including touch screens, were known in the art prior to the filing of the application leading to the '862... touch sensitive input device'' of claim 1 of the '862 patent and the Remand ID's finding that claim 1 of... Commission determined to review the Remand ID's construction of the limitation ``touch sensitive input device...
Full Text Available Background: Mobile device adoption is on the rise and people are increasingly using mobile devices as a part of their lives. Studies have shown that people can use mobile devices to perform their work duties from anywhere. Organisations are now exploring ways of enabling and supporting mobility for employees’ mobile devices, including BYOD (Bring-Your-Own-Device policies. Objective: The objective of this study is to identify the main capabilities required for enterprise mobility. Methods/Approach: This qualitative research study presents empirical results based on interviews with selected senior IS managers of large organizations. Results: The main findings of this study suggest that information security and mobile device management are among the main capabilities required for enterprise mobility. Conclusions: Enterprise mobility is an emerging field which has received very little research attention. More research in the field will help organisations make informed decisions on how to increase productivity, sales and efficiency while achieving employee satisfaction through enterprise mobility.
Full Text Available Analysis and design of multielement antenna systems in mobile fading channels require a model for the space-time cross-correlation among the links of the underlying multipleinput multiple-output (MIMO Mobile-to-Mobile (M-to-M communication channels. In this paper, we propose the modified geometrical two-ring model, a MIMO channel reference model for M-to-M communication systems. This model is based on the extension of single-bounce two-ring scattering model for flat fading channel under the assumption that the transmitter and the receiver are moving. Assuming single-bounce scattering model in both isotropic and nonisotropic environment, a closed-form expression for the space-time cross-correlation function (CCF between any two subchannels is derived. The proposed model provides an important framework in M-to-M system design, where includes many existing correlation models as special cases. Also, two realizable statistical simulation models are proposed for simulating both isotropic and nonisotropic reference model. The realizable simulation models are based on Sum-of-Sinusoids (SoS simulation model. Finally, the correctness of the proposed simulation models is shown via different simulation scenarios.
Mollenhauer, Hannes; Schima, Robert; Remmler, Paul; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter; Bumberger, Jan
For an adequate characterization of ecosystems it is necessary to detect individual processes with suitable monitoring strategies and methods. Due to the natural complexity of all environmental compartments, single point or temporally and spatially fixed measurements are mostly insufficient for an adequate representation. The application of mobile wireless sensor networks for soil and atmosphere sensing offers significant benefits, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate (e.g. by using optimization approaches or event triggering modes) to the local test conditions. This can be essential for the monitoring of heterogeneous and dynamic environmental systems and processes. One significant advantage in the application of mobile ad-hoc wireless sensor networks is their self-organizing behavior. Thus, the network autonomously initializes and optimizes itself. Due to the localization via satellite a major reduction in installation and operation costs and time is generated. In addition, single point measurements with a sensor are significantly improved by measuring at several optimized points continuously. Since performing analog and digital signal processing and computation in the sensor nodes close to the sensors a significant reduction of the data to be transmitted can be achieved which leads to a better energy management of nodes. Furthermore, the miniaturization of the nodes and energy harvesting are current topics under investigation. First results of field measurements are given to present the potentials and limitations of this application in environmental science. In particular, collected in-situ data with numerous specific soil and atmosphere parameters per sensor node (more than 25) recorded over several days illustrates the high performance of this system for advanced soil sensing and soil-atmosphere interaction monitoring. Moreover, investigations of biotic and abiotic process interactions and optimization
... INTERNATIONAL TRADE COMMISSION [Docket No 2958] Certain Portable Electronic Communications Devices, Including Mobile Phones and Components Thereof; Correction to Notice of Receipt of Complaint; Solicitation... of complaint entitled Certain Portable Electronic Communications Devices, Including Mobile Phones and...
... INTERNATIONAL TRADE COMMISSION [DN 2875] Certain Mobile Electronic Devices Incorporating Haptics.... International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that the U.S. International Trade Commission has received an amended complaint entitled Certain Mobile Electronic Devices...
Pamboris, A; Pietzuch, P
?Mobile applications are constrained by the available memory of mobile devices. We present C-RAM, a system that uses cloud-based memory to extend the memory of mobile devices. It splits application state and its associated computation between a mobile device and a cloud node to allow applications to consume more memory, while minimising the performance impact. C-RAM thus enables developers to realise new applications or port legacy desktop applications with a large memory footprint to mobile ...
Full Text Available This work describes the usability studies conducted in the development of an experience-sampling methodology (ESM system running in a mobile device. The goal of the system is to improve the accuracy and ecology in gathering daily self-report data in individuals suffering a chronic pain condition, fibromyalgia. The usability studies showed that the developed software to conduct ESM with mobile devices (smartphones, cell phones can be successfully used by individuals with fibromyalgia of different ages and with low level of expertise in the use of information and communication technologies. 100% of users completed the tasks successfully, although some have completely illiterate. Also there seems to be a clear difference in the way of interaction obtained in the two studies carried out.
Gelman, Susan A; Martinez, Megan; Davidson, Natalie S; Noles, Nicholaus S
New technology poses new moral problems for children to consider. We examined whether children deem object tracking with a mobile GPS device to be a property right. In three experiments, 329 children (4-10 years) and adults were asked whether it is acceptable to track the location of either one's own or another person's possessions using a mobile GPS device. Young children, like adults, viewed object tracking as relatively more acceptable for owners than nonowners. However, whereas adults expressed negative evaluations of someone tracking another person's possessions, young children expressed positive evaluations of this behavior. These divergent moral judgments of digital tracking at different ages have profound implications for how concepts of digital privacy develop and for the digital security of children. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.
You are probably already using PressDisplay to read newspapers online, but for those of you who are not yet aware of this service, PressDisplay is an online portal where you can browse and read online articles from more than 1,900 newspapers from 95 countries, as soon as they are published. Whether you are an experienced user or a beginner, we have good news concerning PressDisplay: our license now permits you to download complete newspaper issues to your mobile devices and read them offline wherever you like. To do that, you have to use the mobile app PressReader. Instructions on how to install the PressReader app are available here: For Ipad For Android smartphone For Android tablet For Windows 8 devices For BlackBerry Playbook For Android eReader Your feedback is welcome! Please contact us by e-mail.
Mascharka, D.; Pankratius, V.
Scientific data acquisition in the field is often constrained by data transfer backchannels to analysis environments. Geoscientists are therefore facing practical bottlenecks with increasing sensor density and variety. Mobile devices, such as smartphones and tablets, offer promising solutions to key problems in scientific data acquisition, pre-processing, and validation by providing advanced capabilities in the field. This is due to affordable network connectivity options and the increasing mobile computational power. This contribution exemplifies a scenario faced by scientists in the field and presents the "Mahali TEC Processing App" developed in the context of the NSF-funded Mahali project. Aimed at atmospheric science and the study of ionospheric Total Electron Content (TEC), this app is able to gather data from various dual-frequency GPS receivers. It demonstrates parsing of full-day RINEX files on mobile devices and on-the-fly computation of vertical TEC values based on satellite ephemeris models that are obtained from NASA. Our experiments show how parallel computing on the mobile device GPU enables fast processing and visualization of up to 2 million datapoints in real-time using OpenGL. GPS receiver bias is estimated through minimum TEC approximations that can be interactively adjusted by scientists in the graphical user interface. Scientists can also perform approximate computations for "quickviews" to reduce CPU processing time and memory consumption. In the final stage of our mobile processing pipeline, scientists can upload data to the cloud for further processing. Acknowledgements: The Mahali project (http://mahali.mit.edu) is funded by the NSF INSPIRE grant no. AGS-1343967 (PI: V. Pankratius). We would like to acknowledge our collaborators at Boston College, Virginia Tech, Johns Hopkins University, Colorado State University, as well as the support of UNAVCO for loans of dual-frequency GPS receivers for use in this project, and Intel for loans of