WorldWideScience

Sample records for wireless mobile devices

  1. Wireless Power for Mobile Devices

    NARCIS (Netherlands)

    Waffenschmidt, E.

    2011-01-01

    Wireless power transfer allows a convenient, easy to use battery charging of mobile phones and other mobile devices. No hassle with cables and plugs, just place the device on a pad and that’s it. Such asystem even has the potential to become a standard charging solution. Where are the limits for

  2. The opportunistic transmission of wireless worms between mobile devices

    Science.gov (United States)

    Rhodes, C. J.; Nekovee, M.

    2008-12-01

    The ubiquity of portable wireless-enabled computing and communications devices has stimulated the emergence of malicious codes (wireless worms) that are capable of spreading between spatially proximal devices. The potential exists for worms to be opportunistically transmitted between devices as they move around, so human mobility patterns will have an impact on epidemic spread. The scenario we address in this paper is proximity attacks from fleetingly in-contact wireless devices with short-range communication range, such as Bluetooth-enabled smart phones. An individual-based model of mobile devices is introduced and the effect of population characteristics and device behaviour on the outbreak dynamics is investigated. The model uses straight-line motion to achieve population, though it is recognised that this is a highly simplified representation of human mobility patterns. We show that the contact rate can be derived from the underlying mobility model and, through extensive simulation, that mass-action epidemic models remain applicable to worm spreading in the low density regime studied here. The model gives useful analytical expressions against which more refined simulations of worm spread can be developed and tested.

  3. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  4. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN). PMID:27907113

  5. 78 FR 47410 - Certain Wireless Devices, Including Mobile Phones and Tablets Institution of Investigation

    Science.gov (United States)

    2013-08-05

    ... sale within the United States after importation of certain wireless devices, including mobile phones... importation of certain wireless devices, including mobile phones and tablets by reason of infringement of... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-889] Certain Wireless Devices, Including...

  6. 78 FR 40171 - Certain Wireless Devices, Including Mobile Phones and Tablets; Notice Of Receipt of Complaint...

    Science.gov (United States)

    2013-07-03

    ... INTERNATIONAL TRADE COMMISSION [Docket No. 2964] Certain Wireless Devices, Including Mobile Phones.... International Trade Commission has received a complaint entitled Certain Wireless Devices, Including Mobile... importation, and the sale within the United States after importation of certain wireless devices, including...

  7. 75 FR 8112 - In the Matter of Certain Mobile Telephones and Wireless Communication Devices Featuring Digital...

    Science.gov (United States)

    2010-02-23

    ... importation of certain mobile telephones and wireless communication devices featuring digital cameras, and... importation of certain mobile telephones or wireless communication devices featuring digital cameras, or... INTERNATIONAL TRADE COMMISSION [Inv. No. 337-TA-703] In the Matter of Certain Mobile Telephones...

  8. 75 FR 6704 - In the Matter of Certain Mobile Telephones and Wireless Communication Devices Featuring Digital...

    Science.gov (United States)

    2010-02-10

    ... States after importation of certain mobile telephones and wireless communication devices featuring... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-663] In the Matter of Certain Mobile Telephones and Wireless Communication Devices Featuring Digital Cameras, and Components Thereof; Notice of...

  9. 75 FR 65654 - In the Matter of: Certain Mobile Telephones and Wireless Communication Devices Featuring Digital...

    Science.gov (United States)

    2010-10-26

    ... States after importation of certain mobile telephones and wireless communication devices featuring... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-703] In the Matter of: Certain Mobile Telephones and Wireless Communication Devices Featuring Digital Cameras, and Components Thereof;Notice of...

  10. 77 FR 43858 - Certain Mobile Telephones and Wireless Communication Devices Featuring Digital Cameras, and...

    Science.gov (United States)

    2012-07-26

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-703] Certain Mobile Telephones and Wireless Communication Devices Featuring Digital Cameras, and Components Thereof; Determination To Review... importation, and the sale within the United States after importation of certain mobile telephones and wireless...

  11. 78 FR 43262 - Use of Wireless Mobile Data Devices as Transponders for the Commercial Motor Vehicle Information...

    Science.gov (United States)

    2013-07-19

    ... FMCSA's regulations prohibiting texting and the use of hand-held wireless mobile phones by commercial... part 392 prohibiting texting and the use of hand-held wireless mobile phones by commercial motor vehicle (CMV) drivers. Benefits Use of wireless mobile data devices as transponders with CMRS provides...

  12. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...... link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  13. Development of a wireless blood pressure measuring device with smart mobile device.

    Science.gov (United States)

    İlhan, İlhan; Yıldız, İbrahim; Kayrak, Mehmet

    2016-03-01

    Today, smart mobile devices (telephones and tablets) are very commonly used due to their powerful hardware and useful features. According to an eMarketer report, in 2014 there were 1.76 billion smartphone users (excluding users of tablets) in the world; it is predicted that this number will rise by 15.9% to 2.04 billion in 2015. It is thought that these devices can be used successfully in biomedical applications. A wireless blood pressure measuring device used together with a smart mobile device was developed in this study. By means of an interface developed for smart mobile devices with Android and iOS operating systems, a smart mobile device was used both as an indicator and as a control device. The cuff communicating with this device through Bluetooth was designed to measure blood pressure via the arm. A digital filter was used on the cuff instead of the traditional analog signal processing and filtering circuit. The newly developed blood pressure measuring device was tested on 18 patients and 20 healthy individuals of different ages under a physician's supervision. When the test results were compared with the measurements made using a sphygmomanometer, it was shown that an average 93.52% accuracy in sick individuals and 94.53% accuracy in healthy individuals could be achieved with the new device. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  14. Development of a mini-mobile digital radiography system by using wireless smart devices.

    Science.gov (United States)

    Jeong, Chang-Won; Joo, Su-Chong; Ryu, Jong-Hyun; Lee, Jinseok; Kim, Kyong-Woo; Yoon, Kwon-Ha

    2014-08-01

    The current technologies that trend in digital radiology (DR) are toward systems using portable smart mobile as patient-centered care. We aimed to develop a mini-mobile DR system by using smart devices for wireless connection into medical information systems. We developed a mini-mobile DR system consisting of an X-ray source and a Complementary Metal-Oxide Semiconductor (CMOS) sensor based on a flat panel detector for small-field diagnostics in patients. It is used instead of the systems that are difficult to perform with a fixed traditional device. We also designed a method for embedded systems in the development of portable DR systems. The external interface used the fast and stable IEEE 802.11n wireless protocol, and we adapted the device for connections with Picture Archiving and Communication System (PACS) and smart devices. The smart device could display images on an external monitor other than the monitor in the DR system. The communication modules, main control board, and external interface supporting smart devices were implemented. Further, a smart viewer based on the external interface was developed to display image files on various smart devices. In addition, the advantage of operators is to reduce radiation dose when using remote smart devices. It is integrated with smart devices that can provide X-ray imaging services anywhere. With this technology, it can permit image observation on a smart device from a remote location by connecting to the external interface. We evaluated the response time of the mini-mobile DR system to compare to mobile PACS. The experimental results show that our system outperforms conventional mobile PACS in this regard.

  15. Minimizing the negative effects of device mobility in cell-based ad-hoc wireless computational grids

    CSIR Research Space (South Africa)

    Mudali, P

    2006-09-01

    Full Text Available This paper provides an outline of research being conducted to minimize the disruptive effects of device mobility in wireless computational grid networks. The proposed wireless grid framework uses the existing GSM cellular architecture, with emphasis...

  16. Accuracy Enhancements for Positioning of Mobile Devices in Wireless Communication Networks

    DEFF Research Database (Denmark)

    Figueiras, Joao

    of the physical length of the communication links. Since these solutions do not require integration of additional hardware into the mobile nodes, they are cheap and simple to implement. As a price to pay, accuracy is typically lower in comparison to dedicated positioning systems. Thus, an important challenge...... communication among users, cooperative positioning strategies aim at localizing devices as a group and not as individuals. In order to reach this goal it is necessary to combine measurements from two domains: device-to-device links and cellular links. Since this combination of information......Positioning of mobile devices in wireless communication networks is nowadays being intensively investigated due to the combined benefit of location information and communication. Typical solutions for such scenario rely on robust algorithms that estimate position from indirect measurements...

  17. 76 FR 17965 - In the Matter of Certain Mobile Telephones and Wireless Communication Devices Featuring Digital...

    Science.gov (United States)

    2011-03-31

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-703] In the Matter of Certain Mobile Telephones and Wireless Communication Devices Featuring Digital Cameras, and Components Thereof Notice of... for importation, and the sale within the United States after importation of certain mobile telephones...

  18. 75 FR 44282 - In the Matter of Certain Mobile Telephones and Wireless Communication Devices Featuring Digital...

    Science.gov (United States)

    2010-07-28

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-703] In the Matter of Certain Mobile Telephones and Wireless Communication Devices Featuring Digital Cameras, and Components Thereof; Notice of... for importation, and the sale within the United States after importation of certain mobile telephones...

  19. Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor network (WSN applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.

  20. End-User Attitudes towards Location-Based Services and Future Mobile Wireless Devices: The Students’ Perspective

    Directory of Open Access Journals (Sweden)

    Bogdan Cramariuc

    2011-07-01

    Full Text Available Nowadays, location-enabled mobile phones are becoming more and more widespread. Various players in the mobile business forecast that, in the future, a significant part of total wireless revenue will come from Location-Based Services (LBS. An LBS system extracts information about the user’s geographical location and provides services based on the positioning information. A successful LBS service should create value for the end-user, by satisfying some of the users’ needs or wants, and at the same time preserving the key factors of the mobile wireless device, such as low costs, low battery consumption, and small size. From many users’ perspectives, location services and mobile location capabilities are still rather poorly known and poorly understood. The aim of this research is to investigate users’ views on the LBS, their requirements in terms of mobile device characteristics, their concerns in terms of privacy and usability, and their opinion on LBS applications that might increase the social wellbeing in the future wireless world. Our research is based on two surveys performed among 105 students (average student age: 24 years from two European technical universities. The survey questions were intended to solicit the youngsters’ views on present and future technological trends and on their perceived needs and wishes regarding Location-Based Services, with the aim of obtaining a better understanding of designer constraints when building a location receiver and generating new ideas related to potential future killer LBS applications.

  1. A wireless potentiostat for mobile chemical sensing and biosensing.

    Science.gov (United States)

    Steinberg, Matthew D; Kassal, Petar; Kereković, Irena; Steinberg, Ivana Murković

    2015-10-01

    Wireless chemical sensors are used as analytical devices in homeland defence, home-based healthcare, food logistics and more generally for the Sensor Internet of Things (SIoT). Presented here is a battery-powered and highly portable credit-card size potentiostat that is suitable for performing mobile and wearable amperometric electrochemical measurements with seamless wireless data transfer to mobile computing devices. The mobile electrochemical analytical system has been evaluated in the laboratory with a model redox system - the reduction of hexacyanoferrate(III) - and also with commercially available enzymatic blood-glucose test-strips. The potentiostat communicates wirelessly with mobile devices such as tablets or Smartphones by near-field communication (NFC) or with personal computers by radio-frequency identification (RFID), and thus provides a solution to the 'missing link' in connectivity that often exists between low-cost mobile and wearable chemical sensors and ubiquitous mobile computing products. The mobile potentiostat has been evaluated in the laboratory with a set of proof-of-concept experiments, and its analytical performance compared with a commercial laboratory potentiostat (R(2)=0.9999). These first experimental results demonstrate the functionality of the wireless potentiostat and suggest that the device could be suitable for wearable and point-of-sample analytical measurements. We conclude that the wireless potentiostat could contribute significantly to the advancement of mobile chemical sensor research and adoption, in particular for wearable sensors in healthcare and sport physiology, for wound monitoring and in mobile point-of-sample diagnostics as well as more generally as a part of the Sensor Internet of Things. Copyright © 2015 Elsevier B.V. All rights reserved.

  2. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  3. Shed a light of wireless technology on portable mobile design of NIRS

    Science.gov (United States)

    Sun, Yunlong; Li, Ting

    2016-03-01

    Mobile internet is growing rapidly driven by high-tech companies including the popular Apple and Google. The wireless mini-NIRS is believed to deserve a great spread future, while there is sparse report on wireless NIRS device and even for the reported wireless NIRS, its wireless design is scarcely presented. Here we focused on the wireless design of NIRS devices. The widely-used wireless communication standards and wireless communication typical solutions were employed into our NIRS design and then compared on communication efficiency, distance, error rate, low-cost, power consumption, and stabilities, based on the requirements of NIRS applications. The properly-performed wireless communication methods matched with the characteristics of NIRS are picked out. Finally, we realized one recommended wireless communication in our NIRS, developed a test platform on wireless NIRS and tested the full properties on wireless communication. This study elaborated the wireless communication methods specified for NIRS and suggested one implementation with one example fully illustrated, which support the future mobile design on NIRS devices.

  4. Energy efficiency in hybrid mobile and wireless networks

    Energy Technology Data Exchange (ETDEWEB)

    Abbas, Ziaul Haq

    2012-07-01

    Wireless Internet access is almost pervasive nowadays, and many types of wireless networks can be used to access the Internet. However, along with this growth, there is an even greater concern about the energy consumption and efficiency of mobile devices as well as of the supporting networks, triggering the appearance of the concept of green communication. While some efforts have been made towards this direction, challenges still exist and need to be tackled from diverse perspectives. Cellular networks, WLANs, and ad hoc networks in the form of wireless mesh networks are the most popular technologies for wireless Internet access. The availability of such a variety of access networks has also paved the way to explore synergistic approaches for Internet access, leading to the concept of hybrid networks and relay communications. In addition, many mobile devices are being equipped with multiple interfaces, enabling them to operate in hybrid networks. In contrast, the improvements in the battery technology itself have not matched the pace of the emerging mobile applications. The situation becomes more sophisticated when a mobile device functions also as a relay node to forward other station's data. In the literature, energy efficiency of mobile devices has been addressed from various perspectives such as protocol-level efforts, battery management efforts, etc. However, there is little work on energy efficiency in hybrid mobile and wireless networks and devices with heterogeneous connections. For example, when there are multiple networks available to a mobile device, how to achieve optimum long-term energy consumption of such a device is an open question. Furthermore, in today's cellular networks, micro-, pico-, and femto-cells are the most popular network topologies in order to support high data rate services and high user density. With the growth of such small-cell solutions, the energy consumption of these networks is also becoming an important concern for operators

  5. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  6. Wireless power pad with local power activation for portable devices

    NARCIS (Netherlands)

    Waffenschmidt, E.; Zheglov, V.

    2007-01-01

    Wireless power transfer by magnetic induction offers a simple to use way to recharge mobile devices like e.g. mobile phone, music players or medical sensors. As shown by a previous report and an existing Power Pad demonstrator, wireless inductive power transfer is possible with a good power

  7. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  8. A Reliable Handoff Mechanism for Mobile Industrial Wireless Sensor Networks.

    Science.gov (United States)

    Ma, Jian; Yang, Dong; Zhang, Hongke; Gidlund, Mikael

    2017-08-04

    With the prevalence of low-power wireless devices in industrial applications, concerns about timeliness and reliability are bound to continue despite the best efforts of researchers to design Industrial Wireless Sensor Networks (IWSNs) to improve the performance of monitoring and control systems. As mobile devices have a major role to play in industrial production, IWSNs should support mobility. However, research on mobile IWSNs and practical tests have been limited due to the complicated resource scheduling and rescheduling compared with traditional wireless sensor networks. This paper proposes an effective mechanism to guarantee the performance of handoff, including a mobility-aware scheme, temporary connection and quick registration. The main contribution of this paper is that the proposed mechanism is implemented not only in our testbed but in a real industrial environment. The results indicate that our mechanism not only improves the accuracy of handoff triggering, but also solves the problem of ping-pong effect during handoff. Compared with the WirelessHART standard and the RSSI-based approach, our mechanism facilitates real-time communication while being more reliable, which can help end-to-end packet delivery remain an average of 98.5% in the scenario of mobile IWSNs.

  9. SECURITY IN THE ERA OF MOBILE WIRELESS ENTERPRISES

    Directory of Open Access Journals (Sweden)

    STEGĂROIU CARINA-ELENA

    2014-02-01

    Full Text Available In modern times, the mobility of people and data are becoming essential to business. An important role in this development is played by wireless technology, but the risks to users of wireless technology have increased as the service has become more popular. As mobility and the use of smaller, personal devices increases, it is obvious that the security must be implemented as close to the source as possible, meaning in all end devices, but such solutions are difficult to deploy and very hard to manage. Wireless security is just an aspect of computer security, however organizations may be particularly vulnerable to security breaches. There are effective countermeasures (like disabling open switchports during switch configuration and VLAN configuration to limit network access that are available to protect both the network and the information it contains, but such countermeasures must be applied uniformly to all network devices. Consequently, a security policy must be described and written down to allow managers as well as technicians to react correctly to undesired circumstances

  10. Mobile Applications and 4G Wireless Networks: A Framework for Analysis

    Science.gov (United States)

    Yang, Samuel C.

    2012-01-01

    Purpose: The use of mobile wireless data services continues to increase worldwide. New fourth-generation (4G) wireless networks can deliver data rates exceeding 2 Mbps. The purpose of this paper is to develop a framework of 4G mobile applications that utilize such high data rates and run on small form-factor devices. Design/methodology/approach:…

  11. WIRELESS ADVERTISING: A STUDY OF MOBILE PHONE USERS

    OpenAIRE

    Gurau Cãlin

    2011-01-01

    Topic: Using a qualitative methodology, this study attempts to provide a general framework of the functions of mobile communication, and to identify the specific preferences of mobile phone users regarding the commercial messages received on their personal devices. Research objectives: (1) To identify the specific characteristics of mobile communication as perceived by mobile users; (2) to define and analyze the functions of wireless communication as perceived by mobile phone users; and (3) t...

  12. Mobile medical device connectivity: real world solutions.

    Science.gov (United States)

    Pettus, Dan

    2004-01-01

    Mobile medical devices, such as infusion pumps, provide an important therapeutic function. They are also valuable sources of information about treatment patterns at the point of care. However, these mobile devices have been independent islands of valuable information, unable to share the data they gather with other hospital information resources on a real time basis. Although data from these devices can provide significant improvements for medical safety and vital information needed for clinical best practice development, gathering that data poses significant challenges when interfacing with hospital information systems. Mobile medical devices move from place to place as independent actors, raising a series of security and identification issues when they need to be disconnected and reconnected using traditional tethered cable connections. The continuing lack of accepted communications protocol standards, in spite of the concentrated efforts of organizations like the IEEE and the Medical Information Bus (IEEE 1073) to establish them, has made integration into the hospital information system a complex and non-standard task. The rapid spread in availability and adoption of high-speed 802.11 wireless systems in hospitals offers a realistic connectivity solution for mobile medical devices. Inspite of this, the 802.11 standard is still evolving, and current security methods designed for user-based products like PDAs and laptop computers are not ideal for unmanned mobile medical devices because they assume the availability of a human operator to authenticate a wireless session. In the absence of accepted standards, manufacturers have created practical and innovative solutions to support the collection of clinical data from mobile medical devices and the integration of that data with hospital information systems. This paper will explore the potential benefits of integrating mobile medical devices into the hospital information system, and describe the challenges in

  13. The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices

    OpenAIRE

    Zawoad, Shams; Hasan, Ragib

    2012-01-01

    With the proliferation of wireless networks, mobile devices and medical devices are increasingly being equipped with wireless interfaces, such as Bluetooth and WiFi to allow easy access to and control of the medical devices. Unfortunately, the very presence and usage of such interfaces also expose the medical devices to novel attacks from malicious parties. The emerging threat from malicious mobile devices is significant and severe, since attackers can steal confidential data from a patient's...

  14. Wireless and mobile systems in telemedicine

    Directory of Open Access Journals (Sweden)

    Reza Safdari

    2012-12-01

    Full Text Available Background: It is necessary to deploy mobile and wireless systems in healthcare, because they have many benefits for healthcare systems. The objectives of this article were introducing various systems, applications, and standards of the wireless and mobile telemedicine. Material and Methods: This review study was conducted in 2010. To conduct the study, published articles in the years 2005 to 2012, in English with an emphasis on wireless and mobile technologies in health were studied. Search was done with key words include telemedicine, wireless health systems, health and telecommunications technology in databases including Pubmed, Science Direct, Google Scholar, Web of Sciences, Proquest. The collected data were analyzed. Results: Telemedicine system in the ambulance, telemedicine systems in space, telecardiology systems, EEG system, ultrasound system are some types of wireless and mobile systems in telemedicine. PDA-based mobile and wireless telemedicine application, based PDA drug application, and patient tracking application are some of wireless and mobile applications of telemedicine. The most important standards of wireless and mobile telemedicine are HL7, DICOM, SNOMed, and ICD-9-CM. Conclusion: There are many challenges in the wireless and mobile systems in telemedicine, despite the many benefits. Slow speed in sending pictures and video, lack of attention to the privacy in the design of these systems, environmental variables and the number of users during the day are some of these challenges. It is recommended to consider these challenges during the planning and designing of wireless and mobile systems in telemedicine.

  15. Using handheld devices for real-time wireless teleconsultation.

    Science.gov (United States)

    Banitsas, K A; Georgiadis, P; Tachakra, S; Cavouras, D

    2004-01-01

    Recent advances in the hardware of handheld devices, opened up the way for newer applications in the healthcare sector, and more specifically, in the teleconsultation field. Out of these devices, this paper focuses on the services that personal digital assistants and smartphones can provide to improve the speed, quality and ease of delivering a medical opinion from a distance and laying the ground for an all-wireless hospital. In that manner, PDAs were used to wirelessly support the viewing of digital imaging and communication in medicine (DICOM) images and to allow for mobile videoconferencing while within the hospital. Smartphones were also used to carry still images, multiframes and live video outside the hospital. Both of these applications aimed at increasing the mobility of the consultant while improving the healthcare service.

  16. Millimeter Wave Hybrid Photonic Wireless Links for High-Speed Wireless Access and Mobile Fronthaul

    DEFF Research Database (Denmark)

    Rommel, Simon

    As the introduction of the fifth generation of mobile services (5G) is set to revolutionize the way people, devices and machines connect, the changes to the underlying networks and technologies are no less drastic. The massive increase in user and data capacity, as well as the decrease in latency...... networks. In summary, the work presented in this thesis has regarded a multitude of aspects of millimeter wave hybrid photonic wireless links, expanding upon the state of the art and showing their feasibility for use in fifth generation mobile and high speed wireless access networks – hopefully bringing...

  17. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  18. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    OpenAIRE

    Jeong, Young-Sik; Lee, Jae Dong; Lee, Jeong-Bae; Jung, Jai-Jin; Park, Jong Hyuk

    2014-01-01

    Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks repre...

  19. Measurement campaign on connectivity of mesh networks formed by mobile devices

    DEFF Research Database (Denmark)

    Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo

    2007-01-01

    This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...

  20. Wireless power transfer for electric vehicles and mobile devices

    CERN Document Server

    Rim, Chun T

    2017-01-01

    From mobile, cable-free re-charging of electric vehicles, smart phones and laptops to collecting solar electricity from orbiting solar farms, wireless power transfer (WPT) technologies offer consumers and society enormous benefits. Written by innovators in the field, this comprehensive resource explains the fundamental principles and latest advances in WPT and illustrates key applications of this emergent technology.

  1. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  2. Network Resource Awareness and Prediction on Mobile Devices

    NARCIS (Netherlands)

    Peddemors, A.J.H.

    2009-01-01

    In the past several years, personal mobile devices have developed rapidly as versatile computing platforms, capable of installing and running many different applications. Often, these devices are equipped with multiple (wireless) network interfaces supporting internet access through one or more

  3. On-device mobile speech recognition

    OpenAIRE

    Mustafa, MK

    2016-01-01

    Despite many years of research, Speech Recognition remains an active area of research in Artificial Intelligence. Currently, the most common commercial application of this technology on mobile devices uses a wireless client – server approach to meet the computational and memory demands of the speech recognition process. Unfortunately, such an approach is unlikely to remain viable when fully applied over the approximately 7.22 Billion mobile phones currently in circulation. In this thesis we p...

  4. [Research on WiFi-based wireless microscopy on a mobile phone and its application].

    Science.gov (United States)

    Hailan, Jin; Jing, Liu

    2012-11-01

    We proposed and realized a new device that acquires microscopic image wirelessly based on mobile phone and WiFi system. The mobile terminals could record, display and store the image from the far end via the wireless LAN. Using this system, a series of conceptual experiments on monitoring the microscopic images of common objects and liver cancer cells were successfully demonstrated. This system is expected to have important value in the experimental investigations on wirelessly monitoring the cell culture, and small insect etc.

  5. 2nd International Conference on Mobile and Wireless Technology

    CERN Document Server

    Wattanapongsakorn, Naruemon

    2015-01-01

    This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications.  The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security.   The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community.  The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software.  The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology...

  6. Design and evaluation of a telemonitoring concept based on NFC-enabled mobile phones and sensor devices.

    Science.gov (United States)

    Morak, Jürgen; Kumpusch, Hannes; Hayn, Dieter; Modre-Osprian, Robert; Schreier, Günter

    2012-01-01

    Utilization of information and communication technologies such as mobile phones and wireless sensor networks becomes more and more common in the field of telemonitoring for chronic diseases. Providing elderly people with a mobile-phone-based patient terminal requires a barrier-free design of the overall user interface including the setup of wireless communication links to sensor devices. To easily manage the connection between a mobile phone and wireless sensor devices, a concept based on the combination of Bluetooth and near-field communication technology has been developed. It allows us initiating communication between two devices just by bringing them close together for a few seconds without manually configuring the communication link. This concept has been piloted with a sensor device and evaluated in terms of usability and feasibility. Results indicate that this solution has the potential to simplify the handling of wireless sensor networks for people with limited technical skills.

  7. Using Innovation Diffusion Theory and the Technolgy Acceptance Model to Evaluate the Security of Wireless Mobile Devices at a Post Secondary Institution

    Science.gov (United States)

    Feliciano-Torres, Hector L.

    2017-01-01

    The purpose of this quantitative, descriptive non experimental study was to investigate the use of wireless mobile network devices at a post-secondary institution using the innovation diffusion theory (IDT) and technology acceptance model (TAM) as background theories. The researcher intended to explore how students and personnel of the institution…

  8. Response of Caenorhabditis elegans to wireless devices radiation exposure.

    Science.gov (United States)

    Fasseas, Michael K; Fragopoulou, Adamantia F; Manta, Areti K; Skouroliakou, Aikaterini; Vekrellis, Konstantinos; Margaritis, Lukas H; Syntichaki, Popi

    2015-03-01

    To examine the impact of electromagnetic radiation, produced by GSM (Global System for Mobile communications) mobile phones, Wi-Fi (Wireless-Fidelity) routers and wireless DECT (Digital Enhanced Cordless Telecommunications) phones, on the nematode Caenorhabditis elegans. We exposed synchronized populations, of different developmental stages, to these wireless devices at E-field levels below ICNIRP's (International Commission on Non-Ionizing Radiation Protection) guidelines for various lengths of time. WT (wild-type) and aging- or stress-sensitive mutant worms were examined for changes in growth, fertility, lifespan, chemotaxis, short-term memory, increased ROS (Reactive Oxygen Species) production and apoptosis by using fluorescent marker genes or qRT-PCR (quantitative Reverse Transcription-Polymerase Chain Reaction). No statistically significant differences were found between the exposed and the sham/control animals in any of the experiments concerning lifespan, fertility, growth, memory, ROS, apoptosis or gene expression. The worm appears to be robust to this form of (pulsed) radiation, at least under the exposure conditions used.

  9. Developing a Mobile Application via Bluetooth Wireless Technology for Enhancing Communication

    Directory of Open Access Journals (Sweden)

    Sahar A. Idwan

    2009-07-01

    Full Text Available This paper presents Mobile application via Bluetooth wireless technology (MAvBT that enhance the student portal in universities by connecting students' mobile phone devices to a server application that benefit from the devices Bluetooth technology and the storage abilities. MAvBT enables students to retrieve their information with minimum time and anywhere ranging from 100m up to 1Km and it facilitate the communication with instructors outside the office hours. This system consists of computer application (Server Application installed on a Bluetooth enabled computer, Mobile application (client application installed on students’ mobile phone devices, and a website that enable the instructors to edit their materials or enable the demonstrator to get some important reports. Experimental results show that the proposed system is faster, effortless, and cheaper.

  10. Wireless Communications Device Wakeup Method and System

    NARCIS (Netherlands)

    Drago, S.; Sebastiano, F.; Leenaerts, D.M.W.; Breems, L.J.

    2008-01-01

    Abstract of WO 2009044368 Disclosed are wakeable wireless communications devices, and methods for waking wireless communications devices, for use in a wireless network of such devices. The devices communicate during respectively-designated timeslots according to a communications protocol. The

  11. Real-time video streaming in mobile cloud over heterogeneous wireless networks

    Science.gov (United States)

    Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos

    2012-06-01

    Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets

  12. ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

  13. Real-time Identification System using Mobile Hand-held Devices: Mobile Biometrics Evaluation Framework

    Science.gov (United States)

    2014-04-01

    test server, transmit five test cases over both WIFI and 3G , and receive accurate results. The second Study output, the Mobile Biometrics Evaluation...wired (USB), near field (Bluetooth), wireless (802.11) and cellular ( 2G / 3G ) connectivity. Satellite (BGAN) devices have been deployed, in conjunction...Wireless Connectivity: 802.11b, 802.11g, Bluetooth Cellular Connectivity: GSM [ 2G ], UMTS [ 3G ] Internal RAM (GB): 128 Internal Storage (GB): 128

  14. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  15. A Comprehensive Ubiquitous Healthcare Solution on an Android™ Mobile Device

    Directory of Open Access Journals (Sweden)

    Pei-Cheng Hii

    2011-06-01

    Full Text Available Provision of ubiquitous healthcare solutions which provide healthcare services at anytime anywhere has become more favorable nowadays due to the emphasis on healthcare awareness and also the growth of mobile wireless technologies. Following this approach, an Android™ smart phone device is proposed as a mobile monitoring terminal to observe and analyze ECG (electrocardiography waveforms from wearable ECG devices in real time under the coverage of a wireless sensor network (WSN. The exploitation of WSN in healthcare is able to substitute the complicated wired technology, moving healthcare away from a fixed location setting. As an extension to the monitoring scheme, medicine care is taken into consideration by utilizing the mobile phone as a barcode decoder, to verify and assist out-patients in the medication administration process, providing a better and more comprehensive healthcare service.

  16. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  17. Mobility needs and wireless solutions

    DEFF Research Database (Denmark)

    Saugstrup, Dan; Henten, Anders

    The main purpose of this report is to spell out a methodological approach to the analysis of user needs with respect to mobility. Furthermore, this methodological approach is used in an exemplary analysis of the relationship between user needs and technology solutions offered by different wireless...... technologies. The report is based on a research approach, emphasizing important aspects in relation to developing more user oriented mobile services and applications in a heterogeneous network environment. As a staring point, Scandinavian research within the field of social science concerning mobility...... is described and discussed. Furthermore different wireless technologies are briefly described and discussed in relation to possible transmission capacities and coverage areas. In addition to this, a preliminary framework regarding the implications of mobility on the use and development of mobile services...

  18. Using Mobile Devices in Nursing Education.

    Science.gov (United States)

    Day-Black, Crystal; Merrill, Earlene B

    2015-01-01

    The use of mobile device technology in nursing education is growing. These devices are becoming more important in the health care environment with an advantage of providing a compendium of drug, nursing procedures and treatments, and disease information to nursing students. Senior baccalaureate nursing students traditionally are prohibited from medication administration during psychiatric-mental health clinical rotations, but they are required to participate in simulated medication discussions and administration experiences. The incorporation of this mobile device technology to augment clinical learning experiences has advantages including potential reduction of medication errors, and improved patient safety during students' clinical rotation. The purpose of this project is to explain how the mobile device (iPod Touch, 4th generation wireless media player) may be used to enhance and augment comprehensive nursing care in a psychiatric-mental health clinical setting. Thirty-four (34) baccalaureate senior nursing students enrolled in a clinical psychiatric-mental nursing course at a mid-Atlantic public university school of nursing were used. Each student was provided a loaner mobile device with appropriate software and the necessary training. Data were collected on the student's ability to simulate medication administration to a psychiatric-mental health client. Surveys were administered before distribution, at mid-point and at the end of two (2) seven week semesters.

  19. International Conference on Mobile and Wireless Technology

    CERN Document Server

    Wattanapongsakorn, Naruemon; Joukov, Nikolai

    2016-01-01

    This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest developments in mobile software development.

  20. Wireless microsensor network solutions for neurological implantable devices

    Science.gov (United States)

    Abraham, Jose K.; Whitchurch, Ashwin; Varadan, Vijay K.

    2005-05-01

    The design and development of wireless mocrosensor network systems for the treatment of many degenerative as well as traumatic neurological disorders is presented in this paper. Due to the advances in micro and nano sensors and wireless systems, the biomedical sensors have the potential to revolutionize many areas in healthcare systems. The integration of nanodevices with neurons that are in communication with smart microsensor systems has great potential in the treatment of many neurodegenerative brain disorders. It is well established that patients suffering from either Parkinson"s disease (PD) or Epilepsy have benefited from the advantages of implantable devices in the neural pathways of the brain to alter the undesired signals thus restoring proper function. In addition, implantable devices have successfully blocked pain signals and controlled various pelvic muscles in patients with urinary and fecal incontinence. Even though the existing technology has made a tremendous impact on controlling the deleterious effects of disease, it is still in its infancy. This paper presents solutions of many problems of today's implantable and neural-electronic interface devices by combining nanowires and microelectronics with BioMEMS and applying them at cellular level for the development of a total wireless feedback control system. The only device that will actually be implanted in this research is the electrodes. All necessary controllers will be housed in accessories that are outside the body that communicate with the implanted electrodes through tiny inductively-coupled antennas. A Parkinson disease patient can just wear a hat-system close to the implantable neural probe so that the patient is free to move around, while the sensors continually monitor, record, transmit all vital information to health care specialist. In the event of a problem, the system provides an early warning to the patient while they are still mobile thus providing them the opportunity to react and

  1. [Wireless device for monitoring the patients with chronic disease].

    Science.gov (United States)

    Ciorap, R; Zaharia, D; Corciovă, C; Ungureanu, Monica; Lupu, R; Stan, A

    2008-01-01

    Remote monitoring of chronic diseases can improve health outcomes and potentially lower health care costs. The high number of the patients, suffering of chronically diseases, who wish to stay at home rather then in a hospital increasing the need of homecare monitoring and have lead to a high demand of wearable medical devices. Also, extended patient monitoring during normal activity has become a very important target. In this paper are presented the design of the wireless monitoring devices based on ultra low power circuits, high storage memory flash, bluetooth communication and the firmware for the management of the monitoring device. The monitoring device is built using an ultra low power microcontroller (MSP430 from Texas Instruments) that offers the advantage of high integration of some circuits. The custom made electronic boards used for biosignal acquisition are also included modules for storage device (SD/MMC card) with FAT32 file system and Bluetooth device for short-range communication used for data transmission between monitoring device and PC or PDA. The work was focused on design and implementation of an ultra low power wearable device able to acquire patient vital parameters, causing minimal discomfort and allowing high mobility. The proposed wireless device could be used as a warning system for monitoring during normal activity.

  2. Wireless Data Acquisition of Transient Signals for Mobile Spectrometry Applications.

    Science.gov (United States)

    Trzcinski, Peter; Weagant, Scott; Karanassios, Vassili

    2016-05-01

    Wireless data acquisition using smartphones or handhelds offers increased mobility, it provides reduced size and weight, it has low electrical power requirements, and (in some cases) it has an ability to access the internet. Thus, it is well suited for mobile spectrometry applications using miniaturized, field-portable spectrometers, or detectors for chemical analysis in the field (i.e., on-site). There are four main wireless communications standards that can be used for wireless data acquisition, namely ZigBee, Bluetooth, Wi-Fi, and UWB (ultra-wide band). These are briefly reviewed and are evaluated for applicability to data acquisition of transient signals (i.e., time-domain) in the field (i.e., on-site) from a miniaturized, field-portable photomultiplier tube detector and from a photodiode array detector installed in a miniaturized, field-portable fiber optic spectrometer. These are two of the most widely used detectors for optical measurements in the ultraviolet-visible range of the spectrum. A miniaturized, 3D-printed, battery-operated microplasma-on-a-chip was used for generation of transient optical emission signals. Elemental analysis from liquid microsamples, a microplasma, and a handheld or a smartphone will be used as examples. Development and potential applicability of wireless data acquisition of transient optical emission signals for taking part of the lab to the sample types of mobile, field-portable spectrometry applications will be discussed. The examples presented are drawn from past and ongoing work in the authors' laboratory. A handheld or a smartphone were used as the mobile computing devices of choice. © The Author(s) 2016.

  3. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  4. 78 FR 1247 - Certain Electronic Devices, Including Wireless Communication Devices, Tablet Computers, Media...

    Science.gov (United States)

    2013-01-08

    ... Wireless Communication Devices, Tablet Computers, Media Players, and Televisions, and Components Thereof... devices, including wireless communication devices, tablet computers, media players, and televisions, and... wireless communication devices, tablet computers, media players, and televisions, and components thereof...

  5. Tantalisingly Close: An Archaeology of Communication Desires in Discourses of Mobile Wireless Media

    NARCIS (Netherlands)

    de Vries, I.O.

    2008-01-01

    While many studies on mobile wireless communication devices predominantly take a micro-scale approach and concentrate their often ethnographically informed focus on use values, social implications, conversation strategies, changing norms and ethics, culture-dependent domestication, and so forth,

  6. 78 FR 34669 - Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data...

    Science.gov (United States)

    2013-06-10

    ..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... importing wireless communication devices, portable music and data processing devices, and tablet computers... certain electronic devices, including wireless communication devices, portable music and data processing...

  7. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    Science.gov (United States)

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  8. Inkjet-Printed Wideband Antenna on Resin-Coated Paper Substrate for Curved Wireless Devices

    KAUST Repository

    Abutarboush, Hattan; Farooqui, Muhammad Fahad; Shamim, Atif

    2015-01-01

    A low-cost, inkjet-printed multiband monopole antenna for conformal wireless applications is presented for the first time. The antenna is implemented on a low cost resin coated paper substrate which can be used for conformal devices. The antenna developed here is composed of four branch lines on the radiator and three L-shaped slots on the ground plane that help to generate multiple bands without increasing the size of the antenna. The antenna has a compact size, making it suitable for handheld and wearable wireless devices. Details of the inkjet printing fabrication processes and related issues are presented. The antennas were characterized under flat and bent conditions and the results indicate that the antennas can cover most bands for mobile and wireless applications such as PCS, UMTS, GSM1900 and WLAN

  9. Inkjet-Printed Wideband Antenna on Resin-Coated Paper Substrate for Curved Wireless Devices

    KAUST Repository

    Abutarboush, Hattan

    2015-04-28

    A low-cost, inkjet-printed multiband monopole antenna for conformal wireless applications is presented for the first time. The antenna is implemented on a low cost resin coated paper substrate which can be used for conformal devices. The antenna developed here is composed of four branch lines on the radiator and three L-shaped slots on the ground plane that help to generate multiple bands without increasing the size of the antenna. The antenna has a compact size, making it suitable for handheld and wearable wireless devices. Details of the inkjet printing fabrication processes and related issues are presented. The antennas were characterized under flat and bent conditions and the results indicate that the antennas can cover most bands for mobile and wireless applications such as PCS, UMTS, GSM1900 and WLAN

  10. Toward a Nationwide Mobile-Based Public Healthcare Service System with Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chien-wen Shen

    2016-01-01

    Full Text Available This paper describes the development of a nationwide public healthcare service system with the integration of cloud technology, wireless sensor networks, and mobile technology to provide citizens with convenient and professional healthcare services. The basic framework of the system includes the architectures for the user end of wireless physiological examinations, for the regional healthcare cloud, and for national public healthcare service system. Citizens with chronic conditions or elderly people who are living alone can use the wireless physiological sensing devices to keep track of their health conditions and get warning if the system detects abnormal signals. Through mobile devices, citizens are able to get real-time health advice, prompt warning, health information, feedback, personalized support, and intervention ubiquitously. With the long-term tracking data for physiological sensing, reliable prediction models for epidemic diseases and chronic diseases can be developed for the government to respond to and control diseases immediately. Besides, such a nationwide approach enables government to have a holistic understanding of the public health information in real time, which is helpful to establish effective policies or strategies to prevent epidemic diseases or chronic diseases.

  11. Design of a multimedia gateway for mobile devices

    Science.gov (United States)

    Hens, Raf; Goeminne, Nico; Van Hoecke, Sofie; Verdickt, Tom; Bouve, Thomas; Gielen, Frank; Demeester, Piet

    2005-03-01

    Although mobile users are currently offered a lot more capabilities on their mobile devices, they still experience some limitations. They can surf the Internet, read their e-mail and receive MMS messages, but they have limited processing power, storage capacity and bandwidth and are limited in their access to peripherals (e.g. printers). We have designed and implemented a multimedia gateway for mobile devices that reduces these limitations. It gives the mobile devices transparent access to high capacity devices connected to the gateway, which is built around a central, modularly extensible server that can run on any PC or home gateway. It manages two sets of modules: one set offering the actual services and another set handling the IP-based wireless interaction with the client applications on the mobile devices. These modules can be added and removed dynamically, offering new services on the fly. Currently services for storage, printing, domotics and playing music are provided. Others can easily be added later on. This paper discusses the architecture and development, the management of modules, the actual services and their benefits. Besides a proprietary implementation, it also looks into OSGi and how both platforms compare to each other, concerning design, architecture, ease of development, functionality, ...

  12. Telematic Requirements for a Mobile and Wireless Healthcare System derived from Enterprise Models

    NARCIS (Netherlands)

    Widya, I.A.; van Halteren, Aart; Jones, Valerie M.; Bults, Richard G.A.; Konstantas, D.; Vierhout, P.A.M.; Peuscher, J.; Jevtic, D.; Mikuc, M.

    A challenge of current innovation in healthcare processes is to improve the time to treatment. This paper addresses the benefits of telematic services and mobile & wireless devices such as vital sign sensors and head mounted cameras for healthcare processes. It explores the telematic requirements

  13. WIRELESS ADVERTISING: A STUDY OF MOBILE PHONE USERS

    Directory of Open Access Journals (Sweden)

    Gurau Calin

    2011-07-01

    Full Text Available Topic: Using a qualitative methodology, this study attempts to provide a general framework of the functions of mobile communication, and to identify the specific preferences of mobile phone users regarding the commercial messages received on their personal devices. Research objectives: (1 To identify the specific characteristics of mobile communication as perceived by mobile users; (2 to define and analyze the functions of wireless communication as perceived by mobile phone users; and (3 to investigate users preference regarding the content of commercial wireless communication. Previous research: Bauer et al. (2002 identified time, location, information and personalization as relevant acceptance factors for mobile advertising. Barwise and Strong (2002 developed a conceptual model, arguing that social norms, user's motives, mode, time, location and personal characteristics will affect the processing of mobile information by consumers. Tsang et al. (2004 evidenced the influence of entertainment, informativeness and irritation, while Bauer et al. (2005 argued that consumer attitudes are influenced by perceived information, entertainment, and social utility. In a similar study, Xu and Gutierrez (2006 tested the effect of entertainment, irritation, informativeness, credibility and personalization on the attitudes of Chinese consumers. Research methodology: First, a series of academic and practical articles and reports have been accessed in order to assess the existing knowledge on this topic. Second, five focus groups have been organized with six mobile phone users, aged between 20 and 40 years old. Each focus group comprised an equal number of male and female participants. The focus groups lasted between 45 and 60 minutes and addressed three main issues: the specific characteristics of the mobile phones as a commercial communication media, the functions of mobile phone communication, and the specific preferences of mobile phones users regarding the

  14. Simulation of devices mobility to estimate wireless channel quality metrics in 5G networks

    Science.gov (United States)

    Orlov, Yu.; Fedorov, S.; Samuylov, A.; Gaidamaka, Yu.; Molchanov, D.

    2017-07-01

    The problem of channel quality estimation for devices in a wireless 5G network is formulated. As a performance metrics of interest we choose the signal-to-interference-plus-noise ratio, which depends essentially on the distance between the communicating devices. A model with a plurality of moving devices in a bounded three-dimensional space and a simulation algorithm to determine the distances between the devices for a given motion model are devised.

  15. Detection of mobile user location on next generation wireless networks

    DEFF Research Database (Denmark)

    Schou, Saowanee; Olesen, Henning

    2005-01-01

    This paper proposes a novel conceptual mechanism for detecting the location of a mobile user on next generation wireless networks. This mechanism can provide location information of a mobile user at different levels of accuracy, by applying the movement detection mechanism of Mobile IPv6 at both...... macro- and micromobility level. In this scheme, an intradomain mobility management protocol (IDMP) is applied to manage the location of the mobile terminal. The mobile terminal needs two care-of addresses, a global care-of address (GCoA) and a local care-of address (LCoA). The current location...... of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...

  16. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  17. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  18. Wireless communication technology NFC

    OpenAIRE

    MÁROVÁ, Kateřina

    2014-01-01

    Aim of this bachelor thesis is to handle the issue of new wireless communication technology NFC (Near Field Communication) including a comparison of advantages and disadvantages of NFC with other wireless technologies (Bluetooth, Wi-Fi, etc.). NFC is a technology for wireless communications between different electronic devices, one of which is typically a mobile phone. Near Field Communication allows wireless communication at very short distance by approaching or enclosing two devices and can...

  19. Electrocardiographic Patch Devices and Contemporary Wireless Cardiac Monitoring

    Directory of Open Access Journals (Sweden)

    Erik eFung

    2015-05-01

    Full Text Available Cardiac electrophysiologic derangements often coexist with disorders of the circulatory system. Capturing and diagnosing arrhythmias and conduction system disease may lead to a change in diagnosis, clinical management and patient outcomes. Standard 12-lead electrocardiogram (ECG, Holter monitors and event recorders have served as useful diagnostic tools over the last few decades. However, their shortcomings are only recently being addressed by emerging technologies. With advances in device miniaturization and wireless technologies, and changing consumer expectations, wearable ‘on-body’ ECG patch devices have evolved to meet contemporary needs. These devices are unobtrusive and easy to use, leading to increased device wear time and diagnostic yield. While becoming the standard for detecting arrhythmias and conduction system disorders in the outpatient setting where continuous ECG monitoring in the short to medium term (days to weeks is indicated, these cardiac devices and related digital mobile health technologies are reshaping the clinician-patient interface with important implications for future healthcare delivery.

  20. Security for 5G Mobile Wireless Networks

    OpenAIRE

    Fang, Dongfeng; Qian, Yi; Qingyang Hu, Rose

    2017-01-01

    The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use ca...

  1. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message...... from a location it will evolve to a network distribution depending on whether nodes at other locations receive the message or not. Mobility of locations is not arbitrary but guarded by a probabilistic mobility function (PMF) and we also define the notion of a weak bisimulation given a PMF...

  2. 78 FR 16865 - Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data...

    Science.gov (United States)

    2013-03-19

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-794] Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... certain electronic devices, including wireless communication devices, portable music and data processing...

  3. 77 FR 70464 - Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data...

    Science.gov (United States)

    2012-11-26

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-794] Certain Electronic Devices, Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... wireless communication devices, portable music and data processing devices, and tablet computers, by reason...

  4. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  5. Optimizing IEEE 802.11i resource and security essentials for mobile and stationary devices

    CERN Document Server

    Amiri, IS; Saberi, Iman

    2014-01-01

    In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required securi

  6. Symptoms and the use of wireless communication devices: A prospective cohort study in Swiss adolescents

    Energy Technology Data Exchange (ETDEWEB)

    Schoeni, Anna, E-mail: anna.schoeni@unibas.ch [Swiss Tropical and Public Health Institute, Socinstrasse 57, P.O. Box, CH-4002 Basel (Switzerland); University of Basel, Petersplatz 1, CH-4003 Basel (Switzerland); Roser, Katharina, E-mail: katharina.roser@unibas.ch [Swiss Tropical and Public Health Institute, Socinstrasse 57, P.O. Box, CH-4002 Basel (Switzerland); University of Basel, Petersplatz 1, CH-4003 Basel (Switzerland); Röösli, Martin, E-mail: martin.roosli@unibas.ch [Swiss Tropical and Public Health Institute, Socinstrasse 57, P.O. Box, CH-4002 Basel (Switzerland); University of Basel, Petersplatz 1, CH-4003 Basel (Switzerland)

    2017-04-15

    Background: We investigated whether radiofrequency electromagnetic fields (RF-EMF) from mobile phones and other wireless devices or by the wireless device use itself due to non-radiation related factors in that context are associated with an increase in health symptom reports of adolescents in Central Switzerland. Methods: In a prospective cohort study, 439 study participants (participation rate: 36.8%) aged 12–17 years, completed questionnaires about their mobile and cordless phone use, their self-reported symptoms and possible confounding factors at baseline (2012/2013) and one year later (2013/2014). Operator recorded mobile phone data was obtained for a subgroup of 234 adolescents. RF-EMF dose measures considering various factors affecting RF-EMF exposure were computed for the brain and the whole body. Data were analysed using a mixed-logistic cross-sectional model and a cohort approach, where we investigated whether cumulative dose over one year was related to a new onset of a symptom between baseline and follow-up. All analyses were adjusted for relevant confounders. Results: Participation rate in the follow-up was 97% (425 participants). In both analyses, cross-sectional and cohort, various symptoms tended to be mostly associated with usage measures that are only marginally related to RF-EMF exposure such as the number of text messages sent per day (e.g. tiredness: OR:1.81; 95%CI:1.20–2.74 for cross-sectional analyses and OR:1.87; 95%CI:1.04–3.38 for cohort analyses). Outcomes were generally less strongly or not associated with mobile phone call duration and RF-EMF dose measures. Conclusions: Stronger associations between symptoms of ill health and wireless communication device use than for RF-EMF dose measures were observed. Such a result pattern does not support a causal association between RF-EMF exposure and health symptoms of adolescents but rather suggests that other aspects of extensive media use are related to symptoms. - Highlights: • This

  7. Symptoms and the use of wireless communication devices: A prospective cohort study in Swiss adolescents

    International Nuclear Information System (INIS)

    Schoeni, Anna; Roser, Katharina; Röösli, Martin

    2017-01-01

    Background: We investigated whether radiofrequency electromagnetic fields (RF-EMF) from mobile phones and other wireless devices or by the wireless device use itself due to non-radiation related factors in that context are associated with an increase in health symptom reports of adolescents in Central Switzerland. Methods: In a prospective cohort study, 439 study participants (participation rate: 36.8%) aged 12–17 years, completed questionnaires about their mobile and cordless phone use, their self-reported symptoms and possible confounding factors at baseline (2012/2013) and one year later (2013/2014). Operator recorded mobile phone data was obtained for a subgroup of 234 adolescents. RF-EMF dose measures considering various factors affecting RF-EMF exposure were computed for the brain and the whole body. Data were analysed using a mixed-logistic cross-sectional model and a cohort approach, where we investigated whether cumulative dose over one year was related to a new onset of a symptom between baseline and follow-up. All analyses were adjusted for relevant confounders. Results: Participation rate in the follow-up was 97% (425 participants). In both analyses, cross-sectional and cohort, various symptoms tended to be mostly associated with usage measures that are only marginally related to RF-EMF exposure such as the number of text messages sent per day (e.g. tiredness: OR:1.81; 95%CI:1.20–2.74 for cross-sectional analyses and OR:1.87; 95%CI:1.04–3.38 for cohort analyses). Outcomes were generally less strongly or not associated with mobile phone call duration and RF-EMF dose measures. Conclusions: Stronger associations between symptoms of ill health and wireless communication device use than for RF-EMF dose measures were observed. Such a result pattern does not support a causal association between RF-EMF exposure and health symptoms of adolescents but rather suggests that other aspects of extensive media use are related to symptoms. - Highlights: • This

  8. Problem Solving of Low Data Throughput on Mobile Devices by Artefacts Prebuffering

    Directory of Open Access Journals (Sweden)

    Krejcar Ondrej

    2009-01-01

    Full Text Available The paper deals with a problem of low data throughput on wirelessly connected mobile devices and a possibility to solve this problem by prebuffering of selected artefacts. The basics are in determining the problem parts of a mobile device and solve the problem by a model of data prebuffering-based system enhancement for locating and tracking users inside the buildings. The framework uses a WiFi network infrastructure to allow the mobile device determine its indoor position. User location is used for data prebuffering and for pushing information from a server to PDAs. All server data are saved as artefacts with its indoor position information. Accessing prebuffered data on a mobile device can significantly improve a response time needed to view large multimedia data. The solution was tested on a facility management information system built on purpose with a testing collection of about hundred large size artefacts.

  9. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  10. Implementation of mobile ip smooth handoff in wireless networks

    International Nuclear Information System (INIS)

    Kayastha, M.; Chowdhry, B.S.; Memon, A.R.

    2002-01-01

    This paper describes implementation of mobile IP services in two separate wireless LANs based on IEEE 802.11b standards, located in two distant buildings of a university campus. The purpose of the project was to achieve smooth hand-off when a mobile node moves between the two LANs. During our experimentation we have identified some of the limitation of IEEE 802.11b that affects mobile 1P smooth hand off. We have also proposed an algorithm to solve this problem when the mobility is within a limited number of separate wireless LANs. (author)

  11. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  12. Wireless-Uplinks-Based Energy-Efficient Scheduling in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Xing Liu

    2015-01-01

    Full Text Available Mobile cloud computing (MCC combines cloud computing and mobile internet to improve the computational capabilities of resource-constrained mobile devices (MDs. In MCC, mobile users could not only improve the computational capability of MDs but also save operation consumption by offloading the mobile applications to the cloud. However, MCC faces the problem of energy efficiency because of time-varying channels when the offloading is being executed. In this paper, we address the issue of energy-efficient scheduling for wireless uplink in MCC. By introducing Lyapunov optimization, we first propose a scheduling algorithm that can dynamically choose channel to transmit data based on queue backlog and channel statistics. Then, we show that the proposed scheduling algorithm can make a tradeoff between queue backlog and energy consumption in a channel-aware MCC system. Simulation results show that the proposed scheduling algorithm can reduce the time average energy consumption for offloading compared to the existing algorithm.

  13. Advanced wireless mobile collaborative sensing network for tactical and strategic missions

    Science.gov (United States)

    Xu, Hao

    2017-05-01

    In this paper, an advanced wireless mobile collaborative sensing network will be developed. Through properly combining wireless sensor network, emerging mobile robots and multi-antenna sensing/communication techniques, we could demonstrate superiority of developed sensing network. To be concrete, heterogeneous mobile robots including unmanned aerial vehicle (UAV) and unmanned ground vehicle (UGV) are equipped with multi-model sensors and wireless transceiver antennas. Through real-time collaborative formation control, multiple mobile robots can team the best formation that can provide most accurate sensing results. Also, formatting multiple mobile robots can also construct a multiple-input multiple-output (MIMO) communication system that can provide a reliable and high performance communication network.

  14. EMI Evaluation on Wireless Computer Devices in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jae Ki; JI Yeong Hwa; Sung, Chan Ho

    2011-01-01

    Wireless computer devices, for example, mice and keyboards are widely used in various industries. However, I and C (instrumentation and control) equipment in nuclear power plants are very susceptible to the EMI (Electro-magnetic interference) and there are concerns regarding EMI induced transient caused by wireless computer devices which emit electromagnetic waves for communication. In this paper, industrial practices and nuclear related international standards are investigated to verify requirements of wireless devices. In addition, actual measurement and evaluation for the intensity of EMI of some commercially available wireless devices is performed to verify their compatibility in terms of EMI. Finally we suggest an appropriate method of using wireless computer devices in nuclear power plant control rooms for better office circumstances of operators

  15. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    Results are reported for basic research in mobile wireless communication networks for tactical applications including investigations of new methods for error-control coding and decoding, modulation...

  16. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  17. 76 FR 45860 - In the Matter of Certain Electronic Devices, Including Wireless Communication Devices, Portable...

    Science.gov (United States)

    2011-08-01

    ..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... electronic devices, including wireless communication devices, portable music and data processing devices, and...''). The complaint further alleges that an industry in the United States exists or is in the process of...

  18. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  19. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    Science.gov (United States)

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  20. Tracking Mobile Robot in Indoor Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Liping Zhang

    2014-01-01

    Full Text Available This work addresses the problem of tracking mobile robots in indoor wireless sensor networks (WSNs. Our approach is based on a localization scheme with RSSI (received signal strength indication which is used widely in WSN. The developed tracking system is designed for continuous estimation of the robot’s trajectory. A WSN, which is composed of many very simple and cheap wireless sensor nodes, is deployed at a specific region of interest. The wireless sensor nodes collect RSSI information sent by mobile robots. A range-based data fusion scheme is used to estimate the robot’s trajectory. Moreover, a Kalman filter is designed to improve tracking accuracy. Experiments are provided to assess the performance of the proposed scheme.

  1. A smart mobile pouch as a biomechanical energy harvester towards self-powered smart wireless power transfer applications.

    Science.gov (United States)

    Chandrasekhar, Arunkumar; Alluri, Nagamalleswara Rao; Sudhakaran, M S P; Mok, Young Sun; Kim, Sang-Jae

    2017-07-20

    A Smart Mobile Pouch Triboelectric Nanogenerator (SMP-TENG) is introduced as a promising eco-friendly approach for scavenging biomechanical energy for powering next generation intelligent devices and smart phones. This is a cost-effective and robust method for harvesting energy from human motion, by utilizing worn fabrics as a contact material. The SMP-TENG is capable of harvesting energy in two operational modes: lateral sliding and vertical contact and separation. Moreover, the SMP-TENG can also act as a self-powered emergency flashlight and self-powered pedometer during normal human motion. A wireless power transmission setup integrated with SMP-TENG is demonstrated. This upgrades the traditional energy harvesting device into a self-powered wireless power transfer SMP-TENG. The wirelessly transferred power can be used to charge a Li-ion battery and light LEDs. The SMP-TENG opens a wide range of opportunities in the field of self-powered devices and low maintenance energy harvesting systems for portable and wearable electronic gadgets.

  2. Information security in data exchange between mobile devices with Android system using RSA encryption

    Directory of Open Access Journals (Sweden)

    Fernando Solís

    2017-02-01

    Full Text Available The new styles and ways of life lead to greater use of wireless networks, the mobile device being a tool for data transmission, which are susceptible to threats in the transmission channels in the network. IT security plays a very important role in guaranteeing the availability, privacy and integrity of information, one of the techniques that helps in this task is cryptography, whose foundation is to transform a message so that it is unintelligible except for those who have the Key to decipher it. The research focuses on the use of the RSA algorithm between mobile devices, the encrypted data is sent through communication channels called threads that through formulas and processes executed on the server, will help to execute the encryption and decryption of the data. To carry it out, a prototype for the exchange of data between mobile devices wirelessly was designed and implemented, conducting performance tests with three nodes to improve the security. The results show the efficiency of the algorithm and additionally its functionality, the times of encryption and decryption are fast against the sending of information without any method or algorithm used.

  3. Performance Evaluation of a Mobile Wireless Computational Grid ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2015-12-01

    Dec 1, 2015 ... Abstract. This work developed and simulated a mathematical model for a mobile wireless computational Grid ... which mobile modes will process the tasks .... evaluation are analytical modelling, simulation ... MATLAB 7.10.0.

  4. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  5. Use of agents to optimize traffic over wireless mobile connections

    Science.gov (United States)

    Helin, Mikko; Jarvinen, Jari; Kalliokorpi, Janne; Kolehmainen, Jari; Narikka, Jorma

    2002-08-01

    Wireless mobile connections have some well known disadvantages, like slow data rate, high and variable error-rate. In addition to that there are possible (and probable) inefficiencies when connecting different types of protocols stacks, like running TCP over GPRS. On the other hand mobile and portable devices have some limitations, which are based on their size and cannot therefore be removed totally. Potential users are so-called common people and they would like to have very simple-to-use applications solving their daily problems, not causing new ones. One approach to make this situation better is to use agents. They could operate on many different levels, like connecting different physical servers to produce the service needed, connecting different services together, optimizing for different types of user devices, connecting different message types (like audio, animation etc.) to produce the service, making transformations (like reading e-mails as voice mail etc.). This paper will discuss these various aspects of agent technology in the context of mobile services provided to consumers. Discussion and conclusions are partly based on the ZanderMail project. Although it is a mail agent project its results can easily be extended to various message types and various other services, like those based on the location of mobile device. The paper will cover widely these different ideas and ZanderMail is just used as an example and a tool for testing various issues. The idea is to utilize agents many ways to fade away at least partly those known problems mentioned in the beginning. An agent could operate in the network quite near the mobile device to overcome the problem caused by different protocol stacks. It could make logical decisions based on location and other local information, like weather, and it could handle priority issues on various levels of application(s).

  6. Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, S.; Kim, Y.S.; Ye, S.H.

    2015-01-01

    This paper introduces cyber security evaluation results and a design of the wireless communication technology to apply to safeguard systems in nuclear power plants. While wireless communication technologies can generally make mobility and efficiency on plant operation, those have seldom been installed on the nuclear I&C systems due to the negative concern of unexpected outcomes that stem from electromagnetic interference and cyber attack. New design of advanced digital safeguard and I&C systems uses computer-based systems for the safeguard and safety functions. On the other hand, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. In order to employ the wireless communication technology in safeguard function, licencees assess and manage the potential for adverse effects on safeguard and safety functions so as to provide high assurance that critical functions are properly protected cyber attack. It is expected that the safeguard function, specifically on the area of real-time monitoring, logging, can be enhanced by employing the mobile safeguard devices (: smart phone, laptop, smart pad, etc). In this paper, we deal with the cyber security evaluation, which consists of threat analysis, vulnerability test, establishment of security plan, and design solutions for the wireless communication on the basis of IEEE 802.11(Wi-Fi) protocol. Proposed evaluation and design solution could be a basis for the design of wireless communication and mobile safeguard systems in nuclear power plants. (author)

  7. A mobile-agent-based wireless sensing network for structural monitoring applications

    International Nuclear Information System (INIS)

    Taylor, Stuart G; Farinholt, Kevin M; Figueiredo, Eloi; Moro, Erik A; Park, Gyuhae; Farrar, Charles R; Flynn, Eric B; Mascarenas, David L; Todd, Michael D

    2009-01-01

    A new wireless sensing network paradigm is presented for structural monitoring applications. In this approach, both power and data interrogation commands are conveyed via a mobile agent that is sent to sensor nodes to perform intended interrogations, which can alleviate several limitations of the traditional sensing networks. Furthermore, the mobile agent provides computational power to make near real-time assessments on the structural conditions. This paper will discuss such prototype systems, which are used to interrogate impedance-based sensors for structural health monitoring applications. Our wireless sensor node is specifically designed to accept various energy sources, including wireless energy transmission, and to be wirelessly triggered on an as-needed basis by the mobile agent or other sensor nodes. The capabilities of this proposed sensing network paradigm are demonstrated in the laboratory and the field

  8. Accessing data transfer reliability for duty cycled mobile wireless sensor network

    International Nuclear Information System (INIS)

    Shaikh, F.K.

    2014-01-01

    Mobility in WSNs (Wireless Sensor Networks) introduces significant challenges which do not arise in static WSNs. Reliable data transport is an important aspect of attaining consistency and QoS (Quality of Service) in several applications of MWSNs (Mobile Wireless Sensor Networks). It is important to understand how each of the wireless sensor networking characteristics such as duty cycling, collisions, contention and mobility affects the reliability of data transfer. If reliability is not managed well, the MWSN can suffer from overheads which reduce its applicability in the real world. In this paper, reliability assessment is being studied by deploying MWSN in different indoor and outdoor scenarios with various duty cycles of the motes and speeds of the mobile mote. Results show that the reliability is greatly affected by the duty cycled motes and the mobility using inherent broadcast mechanisms. (author)

  9. Pervasive Mobile and Ambient Wireless Communications COST Action 2100

    CERN Document Server

    Zanella, Alberto

    2012-01-01

    Pervasive Mobile and Ambient Wireless Communications reports the findings of COST 2100, a project of the European intergovernmental COST framework addressing various topics currently emerging in mobile and wireless communications. Drawing on experience developed in this and earlier COST projects, the text represents the final outcome of collaborative work involving more than 500 researchers in 140 institutions and 30 countries (including outside Europe). The book’s subject matter includes: • transmission techniques; • signal processing; • radio channel modelling and measurement; • radio network issues; and • recent paradigms including ultra-wideband, cooperative, vehicle-to-vehicle and body communications. The research reported comes from a variety of backgrounds: academic, equipment-manufacturing and operational. The information contained in this book will bring the study reported to a wider audience from all those spheres of work. Pervasive Mobile and Ambient Wireless Communications will be of i...

  10. The wireless networking system of Earthquake precursor mobile field observation

    Science.gov (United States)

    Wang, C.; Teng, Y.; Wang, X.; Fan, X.; Wang, X.

    2012-12-01

    The mobile field observation network could be real-time, reliably record and transmit large amounts of data, strengthen the physical signal observations in specific regions and specific period, it can improve the monitoring capacity and abnormal tracking capability. According to the features of scatter everywhere, a large number of current earthquake precursor observation measuring points, networking technology is based on wireless broadband accessing McWILL system, the communication system of earthquake precursor mobile field observation would real-time, reliably transmit large amounts of data to the monitoring center from measuring points through the connection about equipment and wireless accessing system, broadband wireless access system and precursor mobile observation management center system, thereby implementing remote instrument monitoring and data transmition. At present, the earthquake precursor field mobile observation network technology has been applied to fluxgate magnetometer array geomagnetic observations of Tianzhu, Xichang,and Xinjiang, it can be real-time monitoring the working status of the observational instruments of large area laid after the last two or three years, large scale field operation. Therefore, it can get geomagnetic field data of the local refinement regions and provide high-quality observational data for impending earthquake tracking forecast. Although, wireless networking technology is very suitable for mobile field observation with the features of simple, flexible networking etc, it also has the phenomenon of packet loss etc when transmitting a large number of observational data due to the wireless relatively weak signal and narrow bandwidth. In view of high sampling rate instruments, this project uses data compression and effectively solves the problem of data transmission packet loss; Control commands, status data and observational data transmission use different priorities and means, which control the packet loss rate within

  11. Dynamic Task Allocation in Multi-Hop Multimedia Wireless Sensor Networks with Low Mobility

    Directory of Open Access Journals (Sweden)

    Klaus Moessner

    2013-10-01

    Full Text Available This paper presents a task allocation-oriented framework to enable efficient in-network processing and cost-effective multi-hop resource sharing for dynamic multi-hop multimedia wireless sensor networks with low node mobility, e.g., pedestrian speeds. The proposed system incorporates a fast task reallocation algorithm to quickly recover from possible network service disruptions, such as node or link failures. An evolutional self-learning mechanism based on a genetic algorithm continuously adapts the system parameters in order to meet the desired application delay requirements, while also achieving a sufficiently long network lifetime. Since the algorithm runtime incurs considerable time delay while updating task assignments, we introduce an adaptive window size to limit the delay periods and ensure an up-to-date solution based on node mobility patterns and device processing capabilities. To the best of our knowledge, this is the first study that yields multi-objective task allocation in a mobile multi-hop wireless environment under dynamic conditions. Simulations are performed in various settings, and the results show considerable performance improvement in extending network lifetime compared to heuristic mechanisms. Furthermore, the proposed framework provides noticeable reduction in the frequency of missing application deadlines.

  12. Low wireless power transfer using inductive coupling for mobile phone charger

    International Nuclear Information System (INIS)

    Fareq, M; Fitra, M; Irwanto, M; Hasan, Syafruddin; Arinal, M

    2014-01-01

    A wireless power transfer (WPT) using inductive coupling for mobile phone charger is studied. The project is offer to study and fabricate WPT using inductive coupling for mobile phone charger that will give more information about distance is effect for WPT performance and WPT is not much influenced by the presence of hands, books and types of plastics. The components used to build wireless power transfer can be divided into 3 parts components, the transceiver for power transmission, the inductive coils in this case as the antenna, receiver and the rectifier which act convert AC to DC. Experiments have been conducted and the wireless power transfer using inductive coupling is suitable to be implemented for mobile phone charger.

  13. Mobile Service Platform: A Middleware for Nomadic Mobile Service Provisioning

    NARCIS (Netherlands)

    van Halteren, Aart; Pawar, P.

    Nowadays mobile devices are characterized by higher processing power, lower costs, multiple network interfaces, ability to support multiple auxiliary devices and connect to the Internet using a wireless network. The applications collecting statistics concerning the mobile user, computational and

  14. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  15. Opportunistic mobility support for resource constrained sensor devices in smart cities.

    Science.gov (United States)

    Granlund, Daniel; Holmlund, Patrik; Åhlund, Christer

    2015-03-02

    A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP)-based sensor authentication protocol is proposed that enables light-weight sensor authentication and key generation. Secondly, a mechanism for handoffs between wireless sensor gateways is proposed. We validate both mechanisms in a real-life study that was conducted in a smart city environment with several fixed sensors and moving gateways. We conduct similar experiments in an industry-based anechoic Long Term Evolution (LTE) chamber with an ideal radio environment. Further, we validate our results collected from the smart city environment against the results produced under ideal conditions to establish best and real-life case scenarios. Our results clearly validate that our proposed mechanisms can facilitate efficient sensor authentication and handoffs while sensors are roaming in a smart city environment.

  16. Opportunistic Mobility Support for Resource Constrained Sensor Devices in Smart Cities

    Directory of Open Access Journals (Sweden)

    Daniel Granlund

    2015-03-01

    Full Text Available A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP-based sensor authentication protocol is proposed that enables light-weight sensor authentication and key generation. Secondly, a mechanism for handoffs between wireless sensor gateways is proposed. We validate both mechanisms in a real-life study that was conducted in a smart city environment with several fixed sensors and moving gateways. We conduct similar experiments in an industry-based anechoic Long Term Evolution (LTE chamber with an ideal radio environment. Further, we validate our results collected from the smart city environment against the results produced under ideal conditions to establish best and real-life case scenarios. Our results clearly validate that our proposed mechanisms can facilitate efficient sensor authentication and handoffs while sensors are roaming in a smart city environment.

  17. Wireless steganography

    Science.gov (United States)

    Agaian, Sos S.; Akopian, David; D'Souza, Sunil

    2006-02-01

    Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on Symbian TM/Series60 TM architecture. Finally, two data hiding applications developed for Symbian TM/Series60 TM mobile phones are presented.

  18. Improved timing recovery in wireless mobile receivers | Olwal ...

    African Journals Online (AJOL)

    The problem of timing recovery in wireless mobile receiver systems is critical. This is partly because timing recovery functions must follow rapid parameter changes inherent in mobile systems and partly because both bandwidth and power must be conserved in low signal to noise ratio communication channels. The ultimate ...

  19. Physicians interrupted by mobile devices in hospitals: understanding the interaction between devices, roles, and duties.

    Science.gov (United States)

    Solvoll, Terje; Scholl, Jeremiah; Hartvigsen, Gunnar

    2013-03-07

    A common denominator of modern hospitals is a variety of communication problems. In particular, interruptions from mobile communication devices are a cause of great concern for many physicians. To characterize how interruptions from mobile devices disturb physicians in their daily work. The gathered knowledge will be subsequently used as input for the design and development of a context-sensitive communication system for mobile communications suitable for hospitals. This study adheres to an ethnographic and interpretive field research approach. The data gathering consisted of participant observations, non-structured and mostly ad hoc interviews, and open-ended discussions with a selected group of physicians. Eleven physicians were observed for a total of 135 hours during May and June 2009. The study demonstrates to what degree physicians are interrupted by mobile devices in their daily work and in which situations they are interrupted, such as surgery, examinations, and during patients/relatives high-importance level conversations. The participants in the study expected, and also indicated, that wireless phones probably led to more interruptions immediately after their introduction in a clinic, when compared to a pager, but this changed after a short while. The unpleasant feeling experienced by the caller when interrupting someone by calling them differs compared to sending a page message, which leaves it up to the receiver when to return the call. Mobile devices, which frequently interrupt physicians in hospitals, are a problem for both physicians and patients. The results from this study contribute to knowledge being used as input for designing and developing a prototype for a context-sensitive communication system for mobile communication suitable for hospitals. We combined these findings with results from earlier studies and also involved actual users to develop the prototype, CallMeSmart. This system intends to reduce such interruptions and at the same time

  20. Use of consumer wireless devices by South Africans with severe communication disability.

    Science.gov (United States)

    Bornman, Juan; Bryen, Diane Nelson; Moolman, Enid; Morris, John

    2016-01-01

    Advancements in wireless technology (e.g. cell phones and tablets) have opened new communication opportunities and environments for individuals with severe communication disabilities. The advancement of these technologies poses challenges to ensuring that these individuals enjoy equal access to this increasingly essential technology. However, a paucity of research exists. To describe the nature and frequency with which South African adults with severe communication disabilities have access to and use wireless devices, as well as the types of activities for which wireless devices are used. Survey research was conducted with 30 individuals who use augmentative and alternative communication (AAC) technology using the Survey of User Needs Questionnaire developed in the United States, and localized to the South African context. All participants, despite their limited education, unemployment and low economic status, owned and/or used mainstream wireless devices. Slightly more than half of the participants (53.3%) needed adaptations to their wireless devices. Advantages of using wireless devices were highlighted, including connecting with others (through using text messaging, social networking, making plans with others, sharing photos and videos with friends), for leisure activities (e.g. listening to music, watching videos, playing games), and for safety purposes (e.g. to navigate when lost, using the device when in trouble and needing immediate assistance). These wireless devices offer substantial benefits and opportunities to individuals with disabilities who rely on AAC in terms of independence, social participation, education and safety/security. However, they still do not enjoy equal opportunity to access and use wireless devices relative to the non-disabled population.

  1. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks.

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-02-10

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches.

  2. IF-MANET: Interoperable framework for heterogeneous mobile ad hoc networks

    OpenAIRE

    Hassan, H.

    2015-01-01

    The advances in low power micro-processors, wireless networks and embedded systems have raised the need to utilize the significant resources of mobile devices. These devices for example, smart phones, tablets, laptops, wearables, and sensors are gaining enormous processing power, storage capacity and wireless bandwidth. In addition, the advancement in wireless mobile technology has created a new communication paradigm via which a wireless network can be created without any priori infrastructu...

  3. [A wireless mobile monitoring system based on bluetooth technology].

    Science.gov (United States)

    Sun, Shou-jun; Wu, Kai; Wu, Xiao-Ming

    2006-09-01

    This paper presents a wireless mobile monitoring system based on Bluetooth technology. This system realizes the remote mobile monitoring of multiple physiological parameters, and has the characters of easy use, low cost, good reliability and strong capability of anti-jamming.

  4. Use of consumer wireless devices by South Africans with severe communication disability

    Directory of Open Access Journals (Sweden)

    Juan Bornman

    2016-02-01

    Full Text Available Background: Advancements in wireless technology (e.g. cell phones and tablets have opened new communication opportunities and environments for individuals with severe communication disabilities. The advancement of these technologies poses challenges to ensuring that these individuals enjoy equal access to this increasingly essential technology. However, a paucity of research exists. Objectives: To describe the nature and frequency with which South African adults with severe communication disabilities have access to and use wireless devices, as well as the types of activities for which wireless devices are used. Method: Survey research was conducted with 30 individuals who use augmentative and alternative communication (AAC technology using the Survey of User Needs Questionnaire developed in the United States, and localized to the South African context. Results: All participants, despite their limited education, unemployment and low economic status, owned and/or used mainstream wireless devices. Slightly more than half of the participants (53.3% needed adaptations to their wireless devices. Advantages of using wireless devices were highlighted, including connecting with others (through using text messaging, social networking, making plans with others, sharing photos and videos with friends, for leisure activities (e.g. listening to music, watching videos, playing games, and for safety purposes (e.g. to navigate when lost, using the device when in trouble and needing immediate assistance. Conclusion: These wireless devices offer substantial benefits and opportunities to individuals with disabilities who rely on AAC in terms of independence, social participation, education and safety/security. However, they still do not enjoy equal opportunity to access and use wireless devices relative to the non-disabled population.

  5. Wireless Cellular Mobile Communications

    OpenAIRE

    Zalud, V.

    2002-01-01

    In this article is briefly reviewed the history of wireless cellular mobile communications, examined the progress in current second generation (2G) cellular standards and discussed their migration to the third generation (3G). The European 2G cellular standard GSM and its evolution phases GPRS and EDGE are described somewhat in detail. The third generation standard UMTS taking up on GSM/GPRS core network and equipped with a new advanced access network on the basis of code division multiple ac...

  6. A medical application integrating remote 3D visualization tools to access picture archiving and communication system on mobile devices.

    Science.gov (United States)

    He, Longjun; Ming, Xing; Liu, Qian

    2014-04-01

    With computing capability and display size growing, the mobile device has been used as a tool to help clinicians view patient information and medical images anywhere and anytime. However, for direct interactive 3D visualization, which plays an important role in radiological diagnosis, the mobile device cannot provide a satisfactory quality of experience for radiologists. This paper developed a medical system that can get medical images from the picture archiving and communication system on the mobile device over the wireless network. In the proposed application, the mobile device got patient information and medical images through a proxy server connecting to the PACS server. Meanwhile, the proxy server integrated a range of 3D visualization techniques, including maximum intensity projection, multi-planar reconstruction and direct volume rendering, to providing shape, brightness, depth and location information generated from the original sectional images for radiologists. Furthermore, an algorithm that changes remote render parameters automatically to adapt to the network status was employed to improve the quality of experience. Finally, performance issues regarding the remote 3D visualization of the medical images over the wireless network of the proposed application were also discussed. The results demonstrated that this proposed medical application could provide a smooth interactive experience in the WLAN and 3G networks.

  7. Java-based mobile agent platforms for wireless sensor networks

    NARCIS (Netherlands)

    Aiello, F.; Carbone, A.; Fortino, G.; Galzarano, S.; Ganzha, M.; Paprzycki, M.

    2010-01-01

    This paper proposes an overview and comparison of mobile agent platforms for the development of wireless sensor network applications. In particular, the architecture, programming model and basic performance of two Java-based agent platforms, Mobile Agent Platform for Sun SPOT (MAPS) and Agent

  8. Compact wideband CMOS receiver frontends for wireless communication

    NARCIS (Netherlands)

    Blaakmeer, S.C.

    2010-01-01

    Abstract Wireless communication is an integral part of our daily life, the mobile phone is an example of a very popular wireless communication device. A communication link consists of a transmitter, a receiver and the transmission medium, which air or vacuum for a wireless link. Part of the receiver

  9. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-01-01

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches. PMID:29439439

  10. iPads, droids, and bugs: Infection prevention for mobile handheld devices at the point of care.

    Science.gov (United States)

    Manning, Mary Lou; Davis, James; Sparnon, Erin; Ballard, Raylene M

    2013-11-01

    Health care providers are increasingly using wireless media tablets, such as the Apple iPad, especially in the hospital setting. In the absence of specific tablet disinfection guidelines the authors applied what is known about the contamination of other nonmedical mobile communication devices to create a "common sense" bundle to guide wireless media tablet infection prevention practices. Copyright © 2013 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.

  11. Real-Time and Secure Wireless Health Monitoring

    Science.gov (United States)

    Dağtaş, S.; Pekhteryev, G.; Şahinoğlu, Z.; Çam, H.; Challa, N.

    2008-01-01

    We present a framework for a wireless health monitoring system using wireless networks such as ZigBee. Vital signals are collected and processed using a 3-tiered architecture. The first stage is the mobile device carried on the body that runs a number of wired and wireless probes. This device is also designed to perform some basic processing such as the heart rate and fatal failure detection. At the second stage, further processing is performed by a local server using the raw data transmitted by the mobile device continuously. The raw data is also stored at this server. The processed data as well as the analysis results are then transmitted to the service provider center for diagnostic reviews as well as storage. The main advantages of the proposed framework are (1) the ability to detect signals wirelessly within a body sensor network (BSN), (2) low-power and reliable data transmission through ZigBee network nodes, (3) secure transmission of medical data over BSN, (4) efficient channel allocation for medical data transmission over wireless networks, and (5) optimized analysis of data using an adaptive architecture that maximizes the utility of processing and computational capacity at each platform. PMID:18497866

  12. SHER: A Colored Petri Net Based Random Mobility Model for Wireless Communications

    Science.gov (United States)

    Khan, Naeem Akhtar; Ahmad, Farooq; Khan, Sher Afzal

    2015-01-01

    In wireless network research, simulation is the most imperative technique to investigate the network’s behavior and validation. Wireless networks typically consist of mobile hosts; therefore, the degree of validation is influenced by the underlying mobility model, and synthetic models are implemented in simulators because real life traces are not widely available. In wireless communications, mobility is an integral part while the key role of a mobility model is to mimic the real life traveling patterns to study. The performance of routing protocols and mobility management strategies e.g. paging, registration and handoff is highly dependent to the selected mobility model. In this paper, we devise and evaluate the Show Home and Exclusive Regions (SHER), a novel two-dimensional (2-D) Colored Petri net (CPN) based formal random mobility model, which exhibits sociological behavior of a user. The model captures hotspots where a user frequently visits and spends time. Our solution eliminates six key issues of the random mobility models, i.e., sudden stops, memoryless movements, border effect, temporal dependency of velocity, pause time dependency, and speed decay in a single model. The proposed model is able to predict the future location of a mobile user and ultimately improves the performance of wireless communication networks. The model follows a uniform nodal distribution and is a mini simulator, which exhibits interesting mobility patterns. The model is also helpful to those who are not familiar with the formal modeling, and users can extract meaningful information with a single mouse-click. It is noteworthy that capturing dynamic mobility patterns through CPN is the most challenging and virulent activity of the presented research. Statistical and reachability analysis techniques are presented to elucidate and validate the performance of our proposed mobility model. The state space methods allow us to algorithmically derive the system behavior and rectify the

  13. Toward Mobile Web 2.0-based business methods: Collaborative QoS-information sharing for mobile service users

    NARCIS (Netherlands)

    Wac, K.E.; Bults, Richard G.A.; van Beijnum, Bernhard J.F.; Chen, Hong; Konstantas, D.; Head, M.; Li, Eldon

    2009-01-01

    Mobile service providers (MoSPs) emerge, driven by the ubiquitous availability of mobile devices and wireless communication infrastructures. MoSPs’ customers satisfaction and consequently their revenues, largely depend on the quality of service (QoS) provided by wireless network providers (WNPs)

  14. 77 FR 60720 - Certain Electronic Devices, Including Wireless Commmunication Devices, Portable Music and Data...

    Science.gov (United States)

    2012-10-04

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-794] Certain Electronic Devices, Including Wireless Commmunication Devices, Portable Music and Data Processing Devices, and Tablet Computers... communication devices, portable music and data processing devices, and tablet computers, imported by Apple Inc...

  15. AVAILABILITY RESEARCH OF REMOTE DEVICES FOR WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    N. A. Bazhayev

    2016-05-01

    Full Text Available We consider the wireless network under attack, aimed at "broadcast storm" initiation, in order to determine the availability of stand-alone units and the ability to carry out their functional tasks under information exposure. We determine a set of conditions for such type of attacks on the part of potential information interloper. The functional analysis of the systems based on wireless technology is made. We examine the remote device of a self-organizing wireless network as a queuing system M/M/1/n. Model dependencies are shown for normal system performance and at information exposure on the part of potential information interloper. Analytical simulation of wireless network functioning is carried out in the normal mode and under the attack aimed at "broadcast storm" initiation. An experiment is described which provides statistical information on operation of network remote devices. We present experiment results on carrying out attack at typical system transferring data by broabcast net scanning package at different noise intensities on the part of information interloper. The proposed model can be used to determine the technical characteristics of wireless ad-hoc network, develop recommendations for node configuration, aimed at countering "broadcast storm".

  16. Wireless ATM: A Technologi cal Framework to m-banking

    OpenAIRE

    Susmi Routray; A. M. Sherry; B. V. R. Reddy

    2008-01-01

    Mobile and Wireless communication devices are becoming enablers for organizations to conduct business more effectively and efficiently. One of the most effective applications is mobile banking (m-banking). For any application to gain recognition technological advancements play a vital role. To make m-banking application a success bandwidth management is an important issue. The incr eased flexibility and mobility feature of wireless ATM and its bandwidth on demand fu...

  17. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  18. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  19. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  20. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    International Nuclear Information System (INIS)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs

  1. Revisiting of Channel Access Mechanisms in Mobile Wireless Networks through Exploiting Physical Layer Technologies

    Directory of Open Access Journals (Sweden)

    Junmei Yao

    2018-01-01

    Full Text Available The wireless local area networks (WLANs have been widely deployed with the rapid development of mobile devices and have further been brought into new applications with infrastructure mobility due to the growth of unmanned aerial vehicles (UAVs. However, the WLANs still face persistent challenge on increasing the network throughput to meet the customer’s requirement and fight against the node mobility. Interference is a well-known issue that would degrade the network performance due to the broadcast characteristics of the wireless signals. Moreover, with infrastructure mobility, the interference becomes the key obstacle in pursuing the channel capacity. Legacy interference management mechanism through the channel access control in the MAC layer design of the 802.11 standard has some well-known drawbacks, such as exposed and hidden terminal problems, inefficient rate adaptation, and retransmission schemes, making the efficient interference management an everlasting research topic over the years. Recently, interference management through exploiting physical layer mechanisms has attracted much research interest and has been proven to be a promising way to improve the network throughput, especially under the infrastructure mobility scenarios which provides more indicators for node dynamics. In this paper, we introduce a series of representative physical layer techniques and analyze how they are exploited for interference management to improve the network performance. We also provide some discussions about the research challenges and give potential future research topics in this area.

  2. 78 FR 69018 - Improving the Resiliency of Mobile Wireless Communications Networks; Reliability and Continuity...

    Science.gov (United States)

    2013-11-18

    ... consumers value overall network reliability and quality in selecting mobile wireless service providers, they...-125] Improving the Resiliency of Mobile Wireless Communications Networks; Reliability and Continuity... (Reliability NOI) in 2011 to ``initiate a comprehensive examination of issues regarding the reliability...

  3. Wireless Inductive Power Device Suppresses Blade Vibrations

    Science.gov (United States)

    Morrison, Carlos R.; Provenza, Andrew J.; Choi, Benjamin B.; Bakhle, Milind A.; Min, James B.; Stefko, George L.; Duffy, Kirsten P.; Fougers, Alan J.

    2011-01-01

    Vibration in turbomachinery can cause blade failures and leads to the use of heavier, thicker blades that result in lower aerodynamic efficiency and increased noise. Metal and/or composite fatigue in the blades of jet engines has resulted in blade destruction and loss of lives. Techniques for suppressing low-frequency blade vibration, such as gtuned circuit resistive dissipation of vibratory energy, h or simply "passive damping," can require electronics incorporating coils of unwieldy dimensions and adding unwanted weight to the rotor. Other approaches, using vibration-dampening devices or damping material, could add undesirable weight to the blades or hub, making them less efficient. A wireless inductive power device (WIPD) was designed, fabricated, and developed for use in the NASA Glenn's "Dynamic Spin Rig" (DSR) facility. The DSR is used to simulate the functionality of turbomachinery. The relatively small and lightweight device [10 lb (approx.=4.5 kg)] replaces the existing venerable and bulky slip-ring. The goal is the eventual integration of this technology into actual turbomachinery such as jet engines or electric power generators, wherein the device will facilitate the suppression of potentially destructive vibrations in fan blades. This technology obviates slip rings, which require cooling and can prove unreliable or be problematic over time. The WIPD consists of two parts: a remote element, which is positioned on the rotor and provides up to 100 W of electrical power to thin, lightweight piezoelectric patches strategically placed on/in fan blades; and a stationary base unit that wirelessly communicates with the remote unit. The base unit supplies inductive power, and also acts as an input and output corridor for wireless measurement, and active control command to the remote unit. Efficient engine operation necessitates minimal disturbance to the gas flow across the turbine blades in any effort to moderate blade vibration. This innovation makes it

  4. Service and device discovery of nodes in a wireless sensor network

    NARCIS (Netherlands)

    Östmark, Å.; Lindgren, P.; van Halteren, Aart; Meppelink, L.

    2006-01-01

    Emerging wireless communication standards and more capable sensors and actuators have pushed further development of wireless sensor networks. Deploying a large number of sensor nodes requires a high-level framework enabling the devices to present themselves and the resources they hold. The device

  5. Wireless Cellular Mobile Communications

    Directory of Open Access Journals (Sweden)

    V. Zalud

    2002-12-01

    Full Text Available In this article is briefly reviewed the history of wireless cellularmobile communications, examined the progress in current secondgeneration (2G cellular standards and discussed their migration to thethird generation (3G. The European 2G cellular standard GSM and itsevolution phases GPRS and EDGE are described somewhat in detail. Thethird generation standard UMTS taking up on GSM/GPRS core network andequipped with a new advanced access network on the basis of codedivision multiple access (CDMA is investigated too. A sketch of theperspective of mobile communication beyond 3G concludes this article.

  6. Cooperative Diversity in Wireless Networks

    Directory of Open Access Journals (Sweden)

    A. Mahmood

    2010-01-01

    Full Text Available Transmit Diversity is an effective methodology for improving the quality and reliability of a wireless network by reducingthe effects of fading. As majority of the wireless devices (i.e. mobile handsets, etc are limited to only one antenna, especiallydue to hardware constraints, size and cost factors; cooperative communication can be utilized in order to generatetransmit diversity [1]. This enables single antenna wireless devices to share their antennas during transmission in such amanner that creates a virtual MIMO (multiple-input and multiple-output system [2] [3]. In this paper, we will analyze therecent developments and trends in this promising area of wireless Ad hoc networks. The article will also discuss variousmain cooperative signaling methods and will also observe their performance.

  7. Towards a Fraud-Prevention Framework for Software Defined Radio Mobile Devices

    Directory of Open Access Journals (Sweden)

    Brawerman Alessandro

    2005-01-01

    Full Text Available The superior reconfigurability of software defined radio mobile devices has made it the most promising technology on the wireless network and in the communication industry. Despite several advantages, there are still a lot to discuss regarding security, for instance, the radio configuration data download, storage and installation, user's privacy, and cloning. The objective of this paper is to present a fraud-prevention framework for software defined radio mobile devices that enhances overall security through the use of new pieces of hardware, modules, and protocols. The framework offers security monitoring against malicious attacks and viruses, protects sensitive information, creates and protects an identity for the system, employs a secure protocol for radio configuration download, and finally, establishes an anticloning scheme, which besides guaranteeing that no units can be cloned over the air, also elevates the level of difficulty to clone units if the attacker has physical access to the mobile device. Even if cloned units exist, the anticloning scheme is able to identify and deny services to those units. Preliminary experiments and proofs that analyze the correctness of the fraud-prevention framework are also presented.

  8. A Wireless Physiological Signal Monitoring System with Integrated Bluetooth and WiFi Technologies.

    Science.gov (United States)

    Yu, Sung-Nien; Cheng, Jen-Chieh

    2005-01-01

    This paper proposes a wireless patient monitoring system which integrates Bluetooth and WiFi wireless technologies. A wireless portable multi-parameter device was designated to acquire physiological signals and transmit them to a local server via Bluetooth wireless technology. Four kinds of monitor units were designed to communicate via the WiFi wireless technology, including a local monitor unit, a control center, mobile devices (personal digital assistant; PDA), and a web page. The use of various monitor units is intending to meet different medical requirements for different medical personnel. This system was demonstrated to promote the mobility and flexibility for both the patients and the medical personnel, which further improves the quality of health care.

  9. 77 FR 51571 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers...

    Science.gov (United States)

    2012-08-24

    ... Music and Data Processing Devices, Computers, and Components Thereof; Notice of Receipt of Complaint... complaint entitled Wireless Communication Devices, Portable Music and Data Processing Devices, Computers..., portable music and data processing devices, computers, and components thereof. The complaint names as...

  10. Power consumption analysis of constant bit rate data transmission over 3G mobile wireless networks

    DEFF Research Database (Denmark)

    Wang, Le; Ukhanova, Ann; Belyaev, Evgeny

    2011-01-01

    This paper presents the analysis of the power consumption of data transmission with constant bit rate over 3G mobile wireless networks. Our work includes the description of the transition state machine in 3G networks, followed by the detailed energy consumption analysis and measurement results...... of the radio link power consumption. Based on these description and analysis, we propose power consumption model. The power model was evaluated on the smartphone Nokia N900, which follows a 3GPP Release 5 and 6 supporting HSDPA/HSPA data bearers. Further we propose method of parameters selection for 3GPP...... transition state machine that allows to decrease power consumption on the mobile device....

  11. WISH: a Wireless Mobile Multimedia Information System in Healthcare using RFID.

    Science.gov (United States)

    Yu, Weider D; Ray, Pradeep; Motoc, Tiberiu

    2008-05-01

    It is important to improve the efficiency of healthcare-related operations and the associated costs. Healthcare organizations are constantly under increased pressure to streamline operations and provide enhanced services to their patients. Wireless mobile computing technology has the potential to provide the desired benefits and would be a critical part of today's healthcare information system. In this paper, a system is presented to better facilitate the functions of physicians and medical staff in healthcare by using modern wireless mobile technology, Radio Frequency Identification (RFID) tools, and multimedia streaming. The paper includes a case study of the development of such a system in the context of healthcare in the United States. The results of the study show how wireless mobile multimedia systems can be developed for the improvement of the quality and efficiency in healthcare for other nations as well. Our testing data show a time reduction of more than 50% in the daily activities of hospital staff.

  12. Determinants of Mobile Wireless Technology for Promoting Interactivity in Lecture Sessions: An Empirical Analysis

    Science.gov (United States)

    Gan, Chin Lay; Balakrishnan, Vimala

    2014-01-01

    The aim of this paper is to identify adoption factors of mobile wireless technology to increase interactivity between lecturers and students during lectures. A theoretical framework to ascertain lecturers' intentions to use mobile wireless technology during lectures (dependent variable) is proposed with seven independent variables. The…

  13. Radiation-Tolerance Assessment of a Redundant Wireless Device

    Science.gov (United States)

    Huang, Q.; Jiang, J.

    2018-01-01

    This paper presents a method to evaluate radiation-tolerance without physical tests for a commercial off-the-shelf (COTS)-based monitoring device for high level radiation fields, such as those found in post-accident conditions in a nuclear power plant (NPP). This paper specifically describes the analysis of radiation environment in a severe accident, radiation damages in electronics, and the redundant solution used to prolong the life of the system, as well as the evaluation method for radiation protection and the analysis method of system reliability. As a case study, a wireless monitoring device with redundant and diversified channels is evaluated by using the developed method. The study results and system assessment data show that, under the given radiation condition, performance of the redundant device is more reliable and more robust than those non-redundant devices. The developed redundant wireless monitoring device is therefore able to apply in those conditions (up to 10 M Rad (Si)) during a severe accident in a NPP.

  14. Device localization and dynamic scan plane selection using a wireless MRI detector array

    Science.gov (United States)

    Riffe, Matthew J.; Yutzy, Stephen R.; Jiang, Yun; Twieg, Michael D.; Blumenthal, Colin J.; Hsu, Daniel P.; Pan, Li; Gilson, Wesley D.; Sunshine, Jeffrey L.; Flask, Christopher A.; Duerk, Jeffrey L.; Nakamoto, Dean; Gulani, Vikas; Griswold, Mark A.

    2013-01-01

    Purpose A prototype wireless guidance device using single sideband amplitude modulation (SSB) is presented for a 1.5T MRI system. Methods The device contained three fiducial markers each mounted to an independent receiver coil equipped with wireless SSB technology. Acquiring orthogonal projections of these markers determined the position and orientation of the device, which was used to define the scan plane for a subsequent image acquisition. Device localization and scan plane update required approximately 30 ms, so it could be interleaved with high temporal resolution imaging. Since the wireless device is used for localization and doesn’t require full imaging capability, the design of the SSB wireless system was simplified by allowing an asynchronous clock between the transmitter and receiver. Results When coupled to a high readout bandwidth, the error caused by the lack of a shared frequency reference was quantified to be less than one pixel (0.78 mm) in the projection acquisitions. Image-guidance with the prototype was demonstrated with a phantom where a needle was successfully guided to a target and contrast was delivered. Conclusion The feasibility of active tracking with a wireless detector array is demonstrated. Wireless arrays could be incorporated into devices to assist in image-guided procedures. PMID:23900921

  15. Optical wireless connected objects for healthcare.

    Science.gov (United States)

    Toumieux, Pascal; Chevalier, Ludovic; Sahuguède, Stéphanie; Julien-Vergonjanne, Anne

    2015-10-01

    In this Letter the authors explore the communication capabilities of optical wireless technology for a wearable device dedicated to healthcare application. In an indoor environment sensible to electromagnetic perturbations such as a hospital, the use of optical wireless links can permit reducing the amount of radio frequencies in the patient environment. Moreover, this technology presents the advantage to be secure, low-cost and easy to deploy. On the basis of commercially available components, a custom-made wearable device is presented, which allows optical wireless transmission of accelerometer data in the context of physical activity supervision of post-stroke patients in hospital. Considering patient mobility, the experimental performance is established in terms of packet loss as a function of the number of receivers fixed to the ceiling. The results permit to conclude that optical wireless links can be used to perform such mobile remote monitoring applications. Moreover, based on the measurements obtained with one receiver, it is possible to theoretically determine the performance according to the number of receivers to be deployed.

  16. PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R.Gunasundari

    2010-03-01

    Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.

  17. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  18. The Optimization Based Dynamic and Cyclic Working Strategies for Rechargeable Wireless Sensor Networks with Multiple Base Stations and Wireless Energy Transfer Devices

    Science.gov (United States)

    Ding, Xu; Han, Jianghong; Shi, Lei

    2015-01-01

    In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating “bottleneck” sensor nodes is also developed in this paper. PMID:25785305

  19. The optimization based dynamic and cyclic working strategies for rechargeable wireless sensor networks with multiple base stations and wireless energy transfer devices.

    Science.gov (United States)

    Ding, Xu; Han, Jianghong; Shi, Lei

    2015-03-16

    In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating "bottleneck" sensor nodes is also developed in this paper.

  20. Competition in the domain of wireless networks security

    Science.gov (United States)

    Bednarczyk, Mariusz

    2017-04-01

    Wireless networks are very popular and have found wide spread usage amongst various segments, also in military environment. The deployment of wireless infrastructures allow to reduce the time it takes to install and dismantle communications networks. With wireless, users are more mobile and can easily get access to the network resources all the time. However, wireless technologies like WiFi or Bluetooth have security issues that hackers have extensively exploited over the years. In the paper several serious security flaws in wireless technologies are presented. Most of them enable to get access to the internal networks and easily carry out man-in-the-middle attacks. Very often, they are used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum. For instance, there are well known instances of Bluetooth connection spoofing in order to steal WiFi password stored in the mobile device. To raise the security awareness and protect wireless networks against an adversary attack, an analysis of attack methods and tools over time is presented in the article. The particular attention is paid to the severity, possible targets as well as the ability to persist in the context of protective measures. Results show that an adversary can take complete control of the victims' mobile device features if the users forget to use simple safety principles.

  1. Portable Integrated Wireless Device Threat Assessment to Aircraft Radio Systems

    Science.gov (United States)

    Salud, Maria Theresa P.; Williams, Reuben A. (Technical Monitor)

    2004-01-01

    An assessment was conducted on multiple wireless local area network (WLAN) devices using the three wireless standards for spurious radiated emissions to determine their threat to aircraft radio navigation systems. The measurement process, data and analysis are provided for devices tested using IEEE 802.11a, IEEE 802.11b, and Bluetooth as well as data from portable laptops/tablet PCs and PDAs (grouping known as PEDs). A comparison was made between wireless LAN devices and portable electronic devices. Spurious radiated emissions were investigated in the radio frequency bands for the following aircraft systems: Instrument Landing System Localizer and Glideslope, Very High Frequency (VHF) Communication, VHF Omnidirectional Range, Traffic Collision Avoidance System, Air Traffic Control Radar Beacon System, Microwave Landing System and Global Positioning System. Since several of the contiguous navigation systems were grouped under one encompassing measurement frequency band, there were five measurement frequency bands where spurious radiated emissions data were collected for the PEDs and WLAN devices. The report also provides a comparison between emissions data and regulatory emission limit.

  2. The research of nuclear experiment radiation environment wireless alarm device

    International Nuclear Information System (INIS)

    Wang Xiaoqiong; Wang Pan; Fang Fang

    2009-01-01

    This article introduces based on monolithic integrated circuit's nuclear experiment radiation environment wireless alarm device's software and hardware design. The system by G-M tube, high-pressured module, signal conditioning circuit, power source module, monolithic integrated circuit and wireless transmission module is composed. The device has low power consumption, high performance, high accuracy detection, easy maintenance, small size, simple operation, and other features, and has a broad application prospects. (authors)

  3. Probabilistic Multi-Sensor Fusion Based Indoor Positioning System on a Mobile Device

    Directory of Open Access Journals (Sweden)

    Xiang He

    2015-12-01

    Full Text Available Nowadays, smart mobile devices include more and more sensors on board, such as motion sensors (accelerometer, gyroscope, magnetometer, wireless signal strength indicators (WiFi, Bluetooth, Zigbee, and visual sensors (LiDAR, camera. People have developed various indoor positioning techniques based on these sensors. In this paper, the probabilistic fusion of multiple sensors is investigated in a hidden Markov model (HMM framework for mobile-device user-positioning. We propose a graph structure to store the model constructed by multiple sensors during the offline training phase, and a multimodal particle filter to seamlessly fuse the information during the online tracking phase. Based on our algorithm, we develop an indoor positioning system on the iOS platform. The experiments carried out in a typical indoor environment have shown promising results for our proposed algorithm and system design.

  4. Bi-directional magnetic resonance based wireless power transfer for electronic devices

    International Nuclear Information System (INIS)

    Kar, Durga P.; Nayak, Praveen P.; Bhuyan, Satyanarayan; Mishra, Debasish

    2015-01-01

    In order to power or charge electronic devices wirelessly, a bi-directional wireless power transfer method has been proposed and experimentally investigated. In the proposed design, two receiving coils are used on both sides of a transmitting coil along its central axis to receive the power wirelessly from the generated magnetic fields through strongly coupled magnetic resonance. It has been observed experimentally that the maximum power transfer occurs at the operating resonant frequency for optimum electric load connected across the receiving coils on both side. The optimum wireless power transfer efficiency is 88% for the bi-directional power transfer technique compared 84% in the one side receiver system. By adopting the developed bi-directional power transfer method, two electronic devices can be powered up or charged simultaneously instead of a single device through usual one side receiver system without affecting the optimum power transfer efficiency

  5. Bi-directional magnetic resonance based wireless power transfer for electronic devices

    Energy Technology Data Exchange (ETDEWEB)

    Kar, Durga P.; Nayak, Praveen P.; Bhuyan, Satyanarayan; Mishra, Debasish [Department of Electronics and Instrumentation Engineering, Institute of Technical Education and Research, Siksha ‘O’ Anushandhan University, Bhubaneswar 751030 (India)

    2015-09-28

    In order to power or charge electronic devices wirelessly, a bi-directional wireless power transfer method has been proposed and experimentally investigated. In the proposed design, two receiving coils are used on both sides of a transmitting coil along its central axis to receive the power wirelessly from the generated magnetic fields through strongly coupled magnetic resonance. It has been observed experimentally that the maximum power transfer occurs at the operating resonant frequency for optimum electric load connected across the receiving coils on both side. The optimum wireless power transfer efficiency is 88% for the bi-directional power transfer technique compared 84% in the one side receiver system. By adopting the developed bi-directional power transfer method, two electronic devices can be powered up or charged simultaneously instead of a single device through usual one side receiver system without affecting the optimum power transfer efficiency.

  6. 78 FR 24775 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2013-04-26

    ... Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers... '826 patent''). The complaint further alleges the existence of a domestic industry. The Commission's...

  7. 77 FR 38826 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2012-06-29

    ... Devices, Portable Music and Data Processing Devices, Computers and Components Thereof, Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers... further alleges the existence of a domestic industry. The Commission's notice of investigation named Apple...

  8. 78 FR 12785 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2013-02-25

    ... Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers... further alleges the existence of a domestic industry. The Commission's notice of investigation named Apple...

  9. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  10. Mobile Service Platform: A Middleware for Nomadic Mobile Service Provisioning

    NARCIS (Netherlands)

    van Halteren, Aart; Pawar, P.

    Ongoing miniaturization and power efficiency of mobile devices have led to widespread availability of devices that have an increasing amount of processing power and storage, and that support multiple wireless network interfaces connecting to various auxiliary devices and to the Internet. It is now

  11. System Architecture and Mobility Management for Mobile Immersive Communications

    Directory of Open Access Journals (Sweden)

    Mehran Dowlatshahi

    2007-01-01

    Full Text Available We propose a system design for delivery of immersive communications to mobile wireless devices based on a distributed proxy model. It is demonstrated that this architecture addresses key technical challenges for the delivery of these services, that is, constraints on link capacity and power consumption in mobile devices. However, additional complexity is introduced with respect to application layer mobility management. The paper proposes three possible methods for updating proxy assignments in response to mobility management and compares the performance of these methods.

  12. Wireless IP and building the mobile Internet

    National Research Council Canada - National Science Library

    Dixit, Sudhir; Prasad, Ramjee

    2003-01-01

    ..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...

  13. Mining Behavioral Groups in Large Wireless LANs

    OpenAIRE

    Hsu, Wei-jen; Dutta, Debojyoti; Helmy, Ahmed

    2006-01-01

    One vision of future wireless networks is that they will be deeply integrated and embedded in our lives and will involve the use of personalized mobile devices. User behavior in such networks is bound to affect the network performance. It is imperative to study and characterize the fundamental structure of wireless user behavior in order to model, manage, leverage and design efficient mobile networks. It is also important to make such study as realistic as possible, based on extensive measure...

  14. A new JPEG-based steganographic algorithm for mobile devices

    Science.gov (United States)

    Agaian, Sos S.; Cherukuri, Ravindranath C.; Schneider, Erik C.; White, Gregory B.

    2006-05-01

    Currently, cellular phones constitute a significant portion of the global telecommunications market. Modern cellular phones offer sophisticated features such as Internet access, on-board cameras, and expandable memory which provide these devices with excellent multimedia capabilities. Because of the high volume of cellular traffic, as well as the ability of these devices to transmit nearly all forms of data. The need for an increased level of security in wireless communications is becoming a growing concern. Steganography could provide a solution to this important problem. In this article, we present a new algorithm for JPEG-compressed images which is applicable to mobile platforms. This algorithm embeds sensitive information into quantized discrete cosine transform coefficients obtained from the cover JPEG. These coefficients are rearranged based on certain statistical properties and the inherent processing and memory constraints of mobile devices. Based on the energy variation and block characteristics of the cover image, the sensitive data is hidden by using a switching embedding technique proposed in this article. The proposed system offers high capacity while simultaneously withstanding visual and statistical attacks. Based on simulation results, the proposed method demonstrates an improved retention of first-order statistics when compared to existing JPEG-based steganographic algorithms, while maintaining a capacity which is comparable to F5 for certain cover images.

  15. An Integrated Quantum Dot Barcode Smartphone Optical Device for Wireless Multiplexed Diagnosis of Infected Patients

    Science.gov (United States)

    Ming, Kevin

    Integrating mobile-cellular devices with multiplex molecular diagnostics can potentially provide the most powerful platform for tracking, managing and preventing the transmission of infectious diseases. With over 6.9 billion subscriptions globally, handheld mobile-cellular devices can be programmed to spatially map, temporally track, and transmit information on infections over wide geographical space and boundaries. Current cell phone diagnostic technologies have poor limit of detection, dynamic range, and cannot detect multiple pathogen targets simultaneously, limiting their utility to single infections with high load. Here we combined recent advances in quantum dot barcode technology for molecular detection with smartphones to engineer a simple and low-cost chip-based wireless multiplex diagnostic device. We validated our device using a variety of synthetic genomic targets for the respiratory virus and blood-borne pathogens, and demonstrated that it could detect clinical samples after simple amplification. More importantly, we confirmed that the device is capable of detecting patients infected with a single or multiple infectious pathogens (e.g., HIV and hepatitis B) in a single test. This device advances the capacity for global surveillance of infectious diseases and has the potential to accelerate knowledge exchange-transfer of emerging or exigent disease threats with healthcare and military organizations in real-time.

  16. On Radio over Fiber for Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Riaz, M. Tahir; Nielsen, Rasmus Hjorth; Pedersen, Jens Myrup

    2009-01-01

    The paper provides an overview of the radio over fiber (RoF) technology and its potential use in heterogeneous wireless networks. Wireless communications have seen a huge growth in the last decade. It has been estimated that five in every six people in the entire world will have a mobile phone...... in 2010. The vast growing use of Internet on the mobile devices has also been increased significantly. In order to provide a broadband access for mobile communications, a new wireless infrastructure (fiber optic networks for distributed, extendible heterogeneous radio architectures and service...... provisioning - FUTON) based on RoF technology has been introduced. The project adopts centralized processing of radio signals for number of wireless base stations can enhance the network performance in terms of bandwidth, and QoS parameters. The simplified remote access units (RAU) are expected to not only...

  17. Wirelessly powered microfluidic dielectrophoresis devices using printable RF circuits.

    Science.gov (United States)

    Qiao, Wen; Cho, Gyoujin; Lo, Yu-Hwa

    2011-03-21

    We report the first microfluidic device integrated with a printed RF circuit so the device can be wirelessly powered by a commercially available RFID reader. For conventional dielectrophoresis devices, electrical wires are needed to connect the electric components on the microchip to external equipment such as power supplies, amplifiers, function generators, etc. Such a procedure is unfamiliar to most clinicians and pathologists who are used to working with a microscope for examination of samples on microscope slides. The wirelessly powered device reported here eliminates the entire need for wire attachments and external instruments so the operators can use the device in essentially the same manner as they do with microscope slides. The integrated circuit can be fabricated on a flexible plastic substrate at very low cost using a roll-to-roll printing method. Electrical power at 13.56 MHz transmitted by a radio-frequency identification (RFID) reader is inductively coupled to the printed RFIC and converted into 10 V DC (direct current) output, which provides sufficient power to drive a microfluidic device to manipulate biological particles such as beads and proteins via the DC dielectrophoresis (DC-DEP) effect. To our best knowledge, this is the first wirelessly powered microfluidic dielectrophoresis device. Although the work is preliminary, the device concept, the architecture, and the core technology are expected to stimulate many efforts in the future and transform the technology to a wide range of clinical and point-of-care applications. This journal is © The Royal Society of Chemistry 2011

  18. Performance Evaluation of a Mobile Wireless Computational Grid ...

    African Journals Online (AJOL)

    This work developed and simulated a mathematical model for a mobile wireless computational Grid architecture using networks of queuing theory. This was in order to evaluate the performance of theload-balancing three tier hierarchical configuration. The throughput and resource utilizationmetrics were measured and the ...

  19. Analysis of Blocking Rate and Bandwidth Usage of Mobile IPTV Services in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Mingfu Li

    2014-01-01

    Full Text Available Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  20. Analysis of blocking rate and bandwidth usage of mobile IPTV services in wireless cellular networks.

    Science.gov (United States)

    Li, Mingfu

    2014-01-01

    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  1. Truck-based mobile wireless sensor networks for the experimental observation of vehicle–bridge interaction

    International Nuclear Information System (INIS)

    Kim, Junhee; Lynch, Jerome P; Lee, Jong-Jae; Lee, Chang-Geun

    2011-01-01

    Heavy vehicles driving over a bridge create a complex dynamic phenomenon known as vehicle–bridge interaction. In recent years, interest in vehicle–bridge interaction has grown because a deeper understanding of the phenomena can lead to improvements in bridge design methods while enhancing the accuracy of structural health monitoring techniques. The mobility of wireless sensors can be leveraged to directly monitor the dynamic coupling between the moving vehicle and the bridge. In this study, a mobile wireless sensor network is proposed for installation on a heavy truck to capture the vertical acceleration, horizontal acceleration and gyroscopic pitching of the truck as it crosses a bridge. The vehicle-based wireless monitoring system is designed to interact with a static, permanent wireless monitoring system installed on the bridge. Specifically, the mobile wireless sensors time-synchronize with the bridge's wireless sensors before transferring the vehicle response data. Vertical acceleration and gyroscopic pitching measurements of the vehicle are combined with bridge accelerations to create a time-synchronized vehicle–bridge response dataset. In addition to observing the vehicle vibrations, Kalman filtering is adopted to accurately track the vehicle position using the measured horizontal acceleration of the vehicle and positioning information derived from piezoelectric strip sensors installed on the bridge deck as part of the bridge monitoring system. Using the Geumdang Bridge (Korea), extensive field testing of the proposed vehicle–bridge wireless monitoring system is conducted. Experimental results verify the reliability of the wireless system and the accuracy of the vehicle positioning algorithm

  2. A randomized trial of standardized nursing patient assessment using wireless devices.

    Science.gov (United States)

    Dykes, Patricia C; Carroll, Diane L; Benoit, Angela; Coakley, Amanda; Chang, Frank; Empoliti, Joanne; Gallagher, Joan; Lasala, Cynthia; O'Malley, Rosemary; Rath, Greg; Silva, Judy; Li, Qi

    2007-10-11

    A complete and accurate patient assessment database is essential for effective communication, problem identification, planning and evaluation of patient status. When employed consistently for point-of-care documentation, information systems are associated with completeness and quality of documentation. The purpose of this paper is to report on the findings of a randomized, cross-over study conducted to evaluate the adequacy of a standard patient assessment module to support problem identification, care planning and tracking of nursing sensitive patient outcomes. The feasibility of wireless devices to support patient assessment data collection at the point-of-care was evaluated using wireless PDAs and tablet PCs. Seventy-nine (79) nurses from two patient care units at Massachusetts General Hospital (Boston, MA) were recruited into the study and randomized to complete patient assessment using wireless or paper devices. At the end of six weeks, nurses who where randomized to the paper assessment module were assigned to a device and those who used a device were assigned to paper for an additional six weeks. Impact was evaluated with regard to data capture, workflow implications and nurse satisfaction. Findings suggest that a standard patient assessment set promotes patient sensitive and quality data capture, which is augmented by the use of wireless devices.

  3. Addressing practical challenges in utility optimization of mobile wireless sensor networks

    Science.gov (United States)

    Eswaran, Sharanya; Misra, Archan; La Porta, Thomas; Leung, Kin

    2008-04-01

    This paper examines the practical challenges in the application of the distributed network utility maximization (NUM) framework to the problem of resource allocation and sensor device adaptation in a mission-centric wireless sensor network (WSN) environment. By providing rich (multi-modal), real-time information about a variety of (often inaccessible or hostile) operating environments, sensors such as video, acoustic and short-aperture radar enhance the situational awareness of many battlefield missions. Prior work on the applicability of the NUM framework to mission-centric WSNs has focused on tackling the challenges introduced by i) the definition of an individual mission's utility as a collective function of multiple sensor flows and ii) the dissemination of an individual sensor's data via a multicast tree to multiple consuming missions. However, the practical application and performance of this framework is influenced by several parameters internal to the framework and also by implementation-specific decisions. This is made further complex due to mobile nodes. In this paper, we use discrete-event simulations to study the effects of these parameters on the performance of the protocol in terms of speed of convergence, packet loss, and signaling overhead thereby addressing the challenges posed by wireless interference and node mobility in ad-hoc battlefield scenarios. This study provides better understanding of the issues involved in the practical adaptation of the NUM framework. It also helps identify potential avenues of improvement within the framework and protocol.

  4. Multichannel wireless ECoG array ASIC devices.

    Science.gov (United States)

    DeMichele, Glenn A; Cogan, Stuart F; Troyk, Philip R; Chen, Hongnan; Hu, Zhe

    2014-01-01

    Surgical resection of epileptogenic foci is often a beneficial treatment for patients suffering debilitating seizures arising from intractable epilepsy [1], [2], [3]. Electrodes placed subdurally on the surface of the brain in the form of an ECoG array is one of the multiple methods for localizing epileptogenic zones for the purpose of defining the region for surgical resection. Currently, transcutaneous wires from ECoG grids limit the duration of time that implanted grids can be used for diagnosis. A wireless ECoG recording and stimulation system may be a solution to extend the diagnostic period. To avoid the transcutaneous connections, a 64-channel wireless silicon recording/stimulating ASIC was developed as the electronic component of a wireless ECoG array that uses SIROF electrodes on a polyimide substrate[4]. Here we describe two new ASIC devices that have been developed and tested as part of the on-going wireless ECoG system design.

  5. 77 FR 35336 - Privacy and Security of Information Stored on Mobile Communications Devices

    Science.gov (United States)

    2012-06-13

    ... made available to a carrier by the customer solely by virtue of the carrier-customer relationship,'' a... mobile wireless services providers with respect to customer information stored on their users' mobile... practices of mobile wireless service providers with respect to customer information stored on their users...

  6. A New Tool for Assessing Mobile Device Proficiency in Older Adults: The Mobile Device Proficiency Questionnaire.

    Science.gov (United States)

    Roque, Nelson A; Boot, Walter R

    2018-02-01

    Mobile device proficiency is increasingly required to participate in society. Unfortunately, there still exists a digital divide between younger and older adults, especially with respect to mobile devices (i.e., tablet computers and smartphones). Training is an important goal to ensure that older adults can reap the benefits of these devices. However, efficient/effective training depends on the ability to gauge current proficiency levels. We developed a new scale to accurately assess the mobile device proficiency of older adults: the Mobile Device Proficiency Questionnaire (MDPQ). We present and validate the MDPQ and a short 16-question version of the MDPQ (MDPQ-16). The MDPQ, its subscales, and the MDPQ-16 were found to be highly reliable and valid measures of mobile device proficiency in a large sample. We conclude that the MDPQ and MDPQ-16 may serve as useful tools for facilitating mobile device training of older adults and measuring mobile device proficiency for research purposes.

  7. An Experimental Performance Measurement of Implemented Wireless Access Point for Interworking Wi-Fi and HSDPA Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of WAP(Wireless Access Point) that provides the wireless Internet access anywhere. Implemented WAP can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. WAP in the IP mechanism has to process connection setup procedure to one wireless WAN. Also, WAP can provide connection management procedures to reconnect interrupted connection automatically. By using WAP, several mobile devices such as netbook, UMPC and smart-phone in a moving vehicle can access to HSDPA network simultaneously. So, it has more convenient for using the WAP when there are needs to access wireless Internet more than two mobile devices in restricted spaces such as car, train and ship.

  8. A service protocol for post-processing of medical images on the mobile device

    Science.gov (United States)

    He, Longjun; Ming, Xing; Xu, Lang; Liu, Qian

    2014-03-01

    With computing capability and display size growing, the mobile device has been used as a tool to help clinicians view patient information and medical images anywhere and anytime. It is uneasy and time-consuming for transferring medical images with large data size from picture archiving and communication system to mobile client, since the wireless network is unstable and limited by bandwidth. Besides, limited by computing capability, memory and power endurance, it is hard to provide a satisfactory quality of experience for radiologists to handle some complex post-processing of medical images on the mobile device, such as real-time direct interactive three-dimensional visualization. In this work, remote rendering technology is employed to implement the post-processing of medical images instead of local rendering, and a service protocol is developed to standardize the communication between the render server and mobile client. In order to make mobile devices with different platforms be able to access post-processing of medical images, the Extensible Markup Language is taken to describe this protocol, which contains four main parts: user authentication, medical image query/ retrieval, 2D post-processing (e.g. window leveling, pixel values obtained) and 3D post-processing (e.g. maximum intensity projection, multi-planar reconstruction, curved planar reformation and direct volume rendering). And then an instance is implemented to verify the protocol. This instance can support the mobile device access post-processing of medical image services on the render server via a client application or on the web page.

  9. A Middleware Based Approach to Dynamically Deploy Location Based Services onto Heterogeneous Mobile Devices Using Bluetooth in Indoor Environment

    Science.gov (United States)

    Sadhukhan, Pampa; Sen, Rijurekha; Das, Pradip K.

    Several methods for providing location based service (LBS) to mobile devices in indoor environment using wireless technologies like WLAN, RFID and Bluetooth have been proposed, implemented and evaluated. However, most of them do not focus on heterogeneity of mobile platforms, memory constraint of mobile devices, the adaptability of client or device to the new services it discovers whenever it reaches a new location. In this paper, we have proposed a Middleware based approach of LBS provision in the indoor environment, where a Bluetooth enabled Base Station (BS) detects Bluetooth enabled mobile devices and pushes a proper client application only to those devices that belong to some registered subscriber of LBS. This dynamic deployment enables the mobile clients to access any new service without having preinstalled interface to that service beforehand and thus the client's memory consumption is reduced. Our proposed work also addresses the other issues like authenticating the clients before providing them LBSs and introducing paid services. We have evaluated its performance in term of file transfer time with respect to file size and throughput with respect to distance. Experimental results on service consumption time by the mobile client for different services are also presented.

  10. P2P Data Management in Mobile Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Nida Sahar Sayeda

    2013-04-01

    Full Text Available The rapid growth in wireless technologies has made wireless communication an important source for transporting data across different domains. In the same way, there are possibilities of many potential applications that can be deployed using WSNs (Wireless Sensor Networks. However, very limited applications are deployed in real life due to the uncertainty and dynamics of the environment and scare resources. This makes data management in WSN a challenging area to find an approach that suits its characteristics. Currently, the trend is to find efficient data management schemes using evolving technologies, i.e. P2P (Peer-to-Peer systems. Many P2P approaches have been applied in WSNs to carry out the data management due to similarities between WSN and P2P. With the similarities, there are differences too that makes P2P protocols inefficient in WSNs. Furthermore, to increase the efficiency and to exploit the delay tolerant nature of WSNs, where ever possible, the mobile WSNs are gaining importance. Thus, creating a three dimensional problem space to consider, i.e. mobility, WSNs and P2P. In this paper, an efficient algorithm is proposed for data management using P2P techniques for mobile WSNs. The real world implementation and deployment of proposed algorithm is also presented

  11. Using a Wireless Electroencephalography Device to Evaluate E-Health and E-Learning Interventions.

    Science.gov (United States)

    Mailhot, Tanya; Lavoie, Patrick; Maheu-Cadotte, Marc-André; Fontaine, Guillaume; Cournoyer, Alexis; Côté, José; Dupuis, France; Karsenti, Thierry; Cossette, Sylvie

    Measuring engagement and other reactions of patients and health professionals to e-health and e-learning interventions remains a challenge for researchers. The aim of this pilot study was to assess the feasibility and acceptability of using a wireless electroencephalography (EEG) device to measure affective (anxiety, enjoyment, relaxation) and cognitive (attention, engagement, interest) reactions of patients and healthcare professionals during e-health or e-learning interventions. Using a wireless EEG device, we measured patient (n = 6) and health professional (n = 7) reactions during a 10-minute session of an e-health or e-learning intervention. The following feasibility and acceptability indicators were assessed and compared for patients and healthcare professionals: number of eligible participants who consented to participate, reasons for refusal, time to install and calibrate the wireless EEG device, number of participants who completed the full 10-minute sessions, participant comfort when wearing the device, signal quality, and number of observations obtained for each reaction. The wireless EEG readings were compared to participant self-rating of their reactions. We obtained at least 75% of possible observations for attention, engagement, enjoyment, and interest. EEG scores were similar to self-reported scores, but they varied throughout the sessions, which gave information on participants' real-time reactions to the e-health/e-learning interventions. Results on the other indicators support the feasibility and acceptability of the wireless EEG device for both patients and professionals. Using the wireless EEG device was feasible and acceptable. Future studies must examine its use in other contexts of care and explore which components of the interventions affected participant reactions by combining wireless EEG and eye tracking.

  12. Mobility-based Time References for Wireless Sensor Networks

    CERN Document Server

    Sebastiano, Fabio; Makinwa, Kofi A A

    2013-01-01

     This book describes the use of low-power low-cost and extremely small radios to provide essential time reference for wireless sensor networks.  The authors explain how to integrate such radios in a standard CMOS process to reduce both cost and size, while focusing on the challenge of designing a fully integrated time reference for such radios. To enable the integration of the time reference, system techniques are proposed and analyzed, several kinds of integrated time references are reviewed, and mobility-based references are identified as viable candidates to provide the required accuracy at low-power consumption. Practical implementations of a mobility-based oscillator and a temperature sensor are also presented, which demonstrate the required accuracy over a wide temperature range, while drawing 51-uW from a 1.2-V supply in a 65-nm CMOS process. Provides system analysis to understand requirements for time/frequency accuracy in wireless sensor networks; Describes system optimization for time references i...

  13. On the Modelling of Context-Aware Security for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Tomasz Zurek

    2016-01-01

    Full Text Available Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.

  14. Electronic Payments using Mobile Communication Devices

    NARCIS (Netherlands)

    Waaij, B.D. van der; Siljee, B.I.J.; Broekhuijsen, B.J.; Ponsioen, C.; Maas, A.; Aten, R.M.; Hoepman, J.H.; Loon, J.H. van; Smit, M.

    2009-01-01

    A method of making a payment uses a first mobile communication device (1) and a second mobile communication device (2), each mobile communication device being provided with a respective near field communication unit (11, 21) and at least one of the mobile communication devices being provided with an

  15. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  16. Embedded RFID Recorder in short-range wireless devices

    DEFF Research Database (Denmark)

    2010-01-01

    range communication devices. The problem is solved in that the portable communications device comprises a wireless communications interface for communicating with another device, a memory and an RFID-recorder for receiving an RFID-signal transmitted from an RFID-interrogator, wherein the device...... is adapted for storing individual received RFID-signals in the memory. An advantage of the invention is that it provides a relatively simple scheme for extracting information from a current environment of a portable communications device. The invention may e.g. be used for adapting listening devices, e...

  17. Mobile Tourist Guide – An Intelligent Wireless System to Improve Tourism, using Semantic Web

    Directory of Open Access Journals (Sweden)

    Hosam El-Sofany

    2011-10-01

    Full Text Available With the recent advances in Internet and mobile technologies, there are increasing demands for electronic access to tourist information systems for service coordination and process integration. Mobile computing and mobile devices are used to implement various tourist services (e.g. electronic tourist guides, digital interactive maps, and tourist e-commerce transactions. However, due to disparate tourist information and service resources such as airlines, hotels, tour operators, it is still difficult for tourists to use them effectively during their trips or even in the planning stage. Neither can current tourist portals assist tourists proactively. To overcome this problem, we propose the analysis, design, and implementation of the “Mobile tourist guide" system, that access through wireless devices and use Semantic Web technologies for effective organization of information resources and service processes. The proposed system provides the users with various services such as: 1 displaying the shortest path between the sources and destinations the visitors specify, 2 displaying general information of shops, newest events of the plaza and shops, 3 provides service of hotel, restaurant and cinema-ticket reservations, 4 provides user-friendly administration service. The Admin can manage the position, blocking path details, general information of hotel, restaurant, shops and plaza, and reservation details via web browser without changing the framework of the system. The system prototype has been developed on the top of Java 2 Micro Edition which offers an ideal platform for the development of full-fledged, interactive and portable applications tailored for resource constrained mobile devices. The paper presents our development experiences and highlights its main advantages and limitations in relation to the implementation of such kind of applications.

  18. Mobile device security for dummies

    CERN Document Server

    Campagna, Rich; Krishnan, Ashwin

    2011-01-01

    The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati

  19. 77 FR 65580 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers...

    Science.gov (United States)

    2012-10-29

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-856] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers, and Components Thereof AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that the U.S. International...

  20. Bio-Inspired Energy-Aware Protocol Design for Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Perrucci, Gian Paolo; Anggraeni, Puri Novelti; Wardana, Satya Ardhy

    2011-01-01

    In this work, bio-inspired cooperation rules are applied to wireless communication networks. The main goal is to derive cooperative behaviour rules to improve the energy consumption of each mobile device. A medium access control (MAC) protocol particularly designed for peer-to-peer communication...... be achieved by this architecture using game theoretic approaches. As an extension, this work explores the impact of the MAC protocol on the power saving capabilities. This result shows that standard MAC mechanisms are not optimised for the considered cooperative setup. A new MAC protocol is proposed...... among cooperative wireless mobile devices is described. The work is based on a novel communication architecture, where a group of mobile devices are connected both to a cellular base station and among them using short-range communication links. A prior work has investigated the energy saving that can...

  1. Wearable wireless photoplethysmography sensors

    Science.gov (United States)

    Spigulis, Janis; Erts, Renars; Nikiforovs, Vladimirs; Kviesis-Kipge, Edgars

    2008-04-01

    Wearable health monitoring sensors may support early detection of abnormal conditions and prevention of their consequences. Recent designs of three wireless photoplethysmography monitoring devices embedded in hat, glove and sock, and connected to PC or mobile phone by means of the Bluetooth technology, are described. First results of distant monitoring of heart rate and pulse wave transit time using the newly developed devices are presented.

  2. Adapting cognitive radio technology for low-power wireless personal area network devices

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg; Rohde, John

    2011-01-01

    The application of wireless personal area network (WPAN) and simple point-to-point wireless communication devices has increased drastically both in private household and in our workspaces in general over the last decade. Combined with the fact that the total number of wireless devices...... and associated standards present in the wireless environment is experiencing an extreme growth, the frequency spectrum scarcity is exposed as a severe challenge. Setting up efficient and reliable wireless WPAN links can be challenging even today. This is especially true because of the intensive use...... discusses the challenges associated with the implementation of highly reliable low-power WPAN networks for the future and the adaption of Cognitive Radio technology as a potential solution. A brief status on the maturity of CR technology will be presented as an integral part of this discussion....

  3. Ubiquitous Monitoring Solution for Wireless Sensor Networks with Push Notifications and End-to-End Connectivity

    Directory of Open Access Journals (Sweden)

    Luis M. L. Oliveira

    2014-01-01

    Full Text Available Wireless Sensor Networks (WSNs belongs to a new trend in technology in which tiny and resource constrained devices are wirelessly interconnected and are able to interact with the surrounding environment by collecting data such as temperature and humidity. Recently, due to the huge growth in the use of mobile devices with Internet connection, smartphones are becoming the center of future ubiquitous wireless networks. Interconnecting WSNs with smartphones and the Internet is a big challenge and new architectures are required due to the heterogeneity of these devices. Taking into account that people are using smartphones with Internet connection, there is a good opportunity to propose a new architecture for wireless sensors monitoring using push notifications and smartphones. Then, this paper proposes a ubiquitous approach for WSN monitoring based on a REST Web Service, a relational database, and an Android mobile application. Real-time data sensed by WSNs are sent directly to a smartphone or stored in a database and requested by the mobile application using a well-defined RESTful interface. A push notification system was created in order to alert mobile users when a sensor parameter overcomes a given threshold. The proposed architecture and mobile application were evaluated and validated using a laboratory WSN testbed and are ready for use.

  4. Cost Benefit Analysis of Utilising Mobile Nodes in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2015-01-01

    Mobile nodes have been found useful for improving performance of network parameters such as coverage, data latency and load balancing in wireless sensor networks (WSNs). In spite of the benets which mobile nodes could oer when used in WSNs, they have been often stated as infeasible for use...

  5. A source-initiated on-demand routing algorithm based on the Thorup-Zwick theory for mobile wireless sensor networks.

    Science.gov (United States)

    Mao, Yuxin; Zhu, Ping

    2013-01-01

    The unreliability and dynamics of mobile wireless sensor networks make it hard to perform end-to-end communications. This paper presents a novel source-initiated on-demand routing mechanism for efficient data transmission in mobile wireless sensor networks. It explores the Thorup-Zwick theory to achieve source-initiated on-demand routing with time efficiency. It is able to find out shortest routing path between source and target in a network and transfer data in linear time. The algorithm is easy to be implemented and performed in resource-constrained mobile wireless sensor networks. We also evaluate the approach by analyzing its cost in detail. It can be seen that the approach is efficient to support data transmission in mobile wireless sensor networks.

  6. 76 FR 34845 - Medical Devices; Ear, Nose, and Throat Devices; Classification of the Wireless Air-Conduction...

    Science.gov (United States)

    2011-06-15

    ... control by other users with a similar medical device. Exposure to non-ionizing radiation Wireless... relating to EMC and wireless technology and human exposure to non-ionizing radiation. Therefore, on March... electro magnetic compatibility (EMC) and safety of exposure to non-ionizing radiation; (2) Design...

  7. Effective Testing Principles for the Mobile Data Services Applications

    NARCIS (Netherlands)

    Srirama, S.; Kakumani, R.; Aggarwal, A.; Pawar, P.

    Wireless communication technologies like GPRS, UMTS and WLAN, combined with the availability of high-end, affordable mobile devices enable the development of the advanced and innovative mobile services. Devices such as mobile phones and Personal Digital Assistants let the users access a wide range

  8. Wireless Sensor Network for Indoor Air Quality Monitoring

    Directory of Open Access Journals (Sweden)

    Jun Li

    2014-06-01

    Full Text Available Indoor air quality monitoring system consists of wireless sensor device, nRF24L01 wireless transceiver modules, C8051MCU, STM32103 remote monitoring platform, alarm device and data server. Distributed in the interior space of wireless sensors measure parameters of the local air quality, wireless transceiver module of the MCU to transmit data to the remote monitoring platform for analysis which displayed and stored field environment data or charts. The data collecting from wireless sensors to be send by wireless Access Point to the remote data server based on B/S architecture, intelligent terminals such as mobile phone, laptop, tablet PC on the Internet monitor indoor air quality in real-time. When site environment air quality index data exceeds the threshold in the monitoring device, the remote monitoring platform sends out the alarm SMS signal to inform user by GSM module. Indoor air quality monitoring system uses modular design method, has the portability and scalability has the low manufacture cost, real-time monitoring data and man-machine interaction.

  9. Content Adaptation for Heterogeneous Mobile Devices using web-based Mobile Services

    OpenAIRE

    Schmohl, Robert;Baumgarten, Uwe;Köthner, Lars

    2017-01-01

    Recent advances in mobile computing have spawned a very heterogeneous environment of mobile devices. Those devices have di erent capabilities in providing mobile services to the user, implying the challenge of considering heterogeneous devices during mobile service development. This especially encompasses the task of adapting the content, which a mobile service provides to a specific mobile device. In this paper we present an approach using a service platform, which utilizes a content adaptat...

  10. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  11. Tracking mobile users in wireless networks via semi-supervised colocalization.

    Science.gov (United States)

    Pan, Jeffrey Junfeng; Pan, Sinno Jialin; Yin, Jie; Ni, Lionel M; Yang, Qiang

    2012-03-01

    Recent years have witnessed the growing popularity of sensor and sensor-network technologies, supporting important practical applications. One of the fundamental issues is how to accurately locate a user with few labeled data in a wireless sensor network, where a major difficulty arises from the need to label large quantities of user location data, which in turn requires knowledge about the locations of signal transmitters or access points. To solve this problem, we have developed a novel machine learning-based approach that combines collaborative filtering with graph-based semi-supervised learning to learn both mobile users' locations and the locations of access points. Our framework exploits both labeled and unlabeled data from mobile devices and access points. In our two-phase solution, we first build a manifold-based model from a batch of labeled and unlabeled data in an offline training phase and then use a weighted k-nearest-neighbor method to localize a mobile client in an online localization phase. We extend the two-phase colocalization to an online and incremental model that can deal with labeled and unlabeled data that come sequentially and adapt to environmental changes. Finally, we embed an action model to the framework such that additional kinds of sensor signals can be utilized to further boost the performance of mobile tracking. Compared to other state-of-the-art systems, our framework has been shown to be more accurate while requiring less calibration effort in our experiments performed on three different testbeds.

  12. [Consideration of Mobile Medical Device Regulation].

    Science.gov (United States)

    Peng, Liang; Yang, Pengfei; He, Weigang

    2015-07-01

    The regulation of mobile medical devices is one of the hot topics in the industry now. The definition, regulation scope and requirements, potential risks of mobile medical devices were analyzed and discussed based on mobile computing techniques and the FDA guidance of mobile medical applications. The regulation work of mobile medical devices in China needs to adopt the risk-based method.

  13. Development of standard technical report on using and selecting wireless device in nuclear power plants

    International Nuclear Information System (INIS)

    Koo, I. S.; Hong, S. B.; Cho, J. W.

    2011-11-01

    1. Purpose · Development of IEC technical report on wireless device using in nuclear power plants 2. Contents · IEC technical reports of draft for circulation and final draft for next planary meeting · Case study on experiment of wireless devices 3. Implementation methods · Preparation of first draft with experts group, its circulation, discussions on the results of the circulation · Organizing three teams such as preparation, reviews and experiment 4. Results · Maintenance cost will be reduced with application of the wireless technologies in nuclear power plants · Commercial wireless devices will be developed before standard is issued

  14. Wireless autonomous device data transmission

    Science.gov (United States)

    Sammel, Jr., David W. (Inventor); Cain, James T. (Inventor); Mickle, Marlin H. (Inventor); Mi, Minhong (Inventor)

    2013-01-01

    A method of communicating information from a wireless autonomous device (WAD) to a base station. The WAD has a data element having a predetermined profile having a total number of sequenced possible data element combinations. The method includes receiving at the WAD an RF profile transmitted by the base station that includes a triggering portion having a number of pulses, wherein the number is at least equal to the total number of possible data element combinations. The method further includes keeping a count of received pulses and wirelessly transmitting a piece of data, preferably one bit, to the base station when the count reaches a value equal to the stored data element's particular number in the sequence. Finally, the method includes receiving the piece of data at the base station and using the receipt thereof to determine which of the possible data element combinations the stored data element is.

  15. W-NINE: A Two-Stage Emulation Platform for Mobile and Wireless Systems

    Directory of Open Access Journals (Sweden)

    Emmanuel Conchon

    2010-01-01

    Full Text Available More and more applications and protocols are now running on wireless networks. Testing the implementation of such applications and protocols is a real challenge as the position of the mobile terminals and environmental effects strongly affect the overall performance. Network emulation is often perceived as a good trade-off between experiments on operational wireless networks and discrete-event simulations on Opnet or ns-2. However, ensuring repeatability and realism in network emulation while taking into account mobility in a wireless environment is very difficult. This paper proposes a network emulation platform, called W-NINE, based on off-line computations preceding online pattern-based traffic shaping. The underlying concepts of repeatability, dynamicity, accuracy, and realism are defined in the emulation context. Two different simple case studies illustrate the validity of our approach with respect to these concepts.

  16. A simple miniature device for wireless stimulation of neural circuits in small behaving animals.

    Science.gov (United States)

    Zhang, Yisi; Langford, Bruce; Kozhevnikov, Alexay

    2011-10-30

    The use of wireless neural stimulation devices offers significant advantages for neural stimulation experiments in behaving animals. We demonstrate a simple, low-cost and extremely lightweight wireless neural stimulation device which is made from off-the-shelf components. The device has low power consumption and does not require a high-power RF preamplifier. Neural stimulation can be carried out in either a voltage source mode or a current source mode. Using the device, we carry out wireless stimulation in the premotor brain area HVC of a songbird and demonstrate that such stimulation causes rapid perturbations of the acoustic structure of the song. Published by Elsevier B.V.

  17. Mobile Device Usage in Higher Education

    Science.gov (United States)

    Delcker, Jan; Honal, Andrea; Ifenthaler, Dirk

    2016-01-01

    This paper focuses on mobile device usage of students in higher education. While more and more students embrace mobile devices in their daily life, institutions attempt to profit from those devices for educational purposes. It is therefore crucial for institutional development to identify students' needs and how mobile devices may facilitate these…

  18. Energy efficiency in future wireless networks: cognitive radio standardization requirements

    CSIR Research Space (South Africa)

    Masonta, M

    2012-09-01

    Full Text Available Energy consumption of mobile and wireless networks and devices is significant, indirectly increasing greenhouse gas emissions and energy costs for operators. Cognitive radio (CR) solutions can save energy for such networks and devices; moreover...

  19. Building Evacuation with Mobile Devices

    OpenAIRE

    Merkel, Sabrina

    2014-01-01

    The rapidly growing world population and increasingly dense settlements demand ever-larger and more complex buildings from today's engineers. In comparison to this technological progress, a building's equipment for emergency evacuation has been hardly developed further. This work presents a concept for a building evacuation system based on mobile devices. Furthermore, various algorithms for route planning with mobile devices and for indoor localization of mobile devices are addressed.

  20. Mobile Customer Relationship Management and Mobile Security

    Science.gov (United States)

    Sanayei, Ali; Mirzaei, Abas

    The purpose of this study is twofold. First, in order to guarantee a coherent discussion about mobile customer relationship management (mCRM), this paper presents a conceptualization of mCRM delineating its unique characteristics because of Among the variety of mobile services, considerable attention has been devoted to mobile marketing and in particular to mobile customer relationship management services. Second, the authors discusses the security risks in mobile computing in different level(user, mobile device, wireless network,...) and finally we focus on enterprise mobile security and it's subgroups with a series of suggestion and solution for improve mobile computing security.

  1. Rapid Prototyping of a Smart Device-based Wireless Reflectance Photoplethysmograph

    Science.gov (United States)

    Ghamari, M.; Aguilar, C.; Soltanpur, C.; Nazeran, H.

    2017-01-01

    This paper presents the design, fabrication, and testing of a wireless heart rate (HR) monitoring device based on photoplethysmography (PPG) and smart devices. PPG sensors use infrared (IR) light to obtain vital information to assess cardiac health and other physiologic conditions. The PPG data that are transferred to a computer undergo further processing to derive the Heart Rate Variability (HRV) signal, which is analyzed to generate quantitative markers of the Autonomic Nervous System (ANS). The HRV signal has numerous monitoring and diagnostic applications. To this end, wireless connectivity plays an important role in such biomedical instruments. The photoplethysmograph consists of an optical sensor to detect the changes in the light intensity reflected from the illuminated tissue, a signal conditioning unit to prepare the reflected light for further signal conditioning through amplification and filtering, a low-power microcontroller to control and digitize the analog PPG signal, and a Bluetooth module to transmit the digital data to a Bluetooth-based smart device such as a tablet. An Android app is then used to enable the smart device to acquire and digitally display the received analog PPG signal in real-time on the smart device. This article is concluded with the prototyping of the wireless PPG followed by the verification procedures of the PPG and HRV signals acquired in a laboratory environment. PMID:28959119

  2. Rapid Prototyping of a Smart Device-based Wireless Reflectance Photoplethysmograph.

    Science.gov (United States)

    Ghamari, M; Aguilar, C; Soltanpur, C; Nazeran, H

    2016-03-01

    This paper presents the design, fabrication, and testing of a wireless heart rate (HR) monitoring device based on photoplethysmography (PPG) and smart devices. PPG sensors use infrared (IR) light to obtain vital information to assess cardiac health and other physiologic conditions. The PPG data that are transferred to a computer undergo further processing to derive the Heart Rate Variability (HRV) signal, which is analyzed to generate quantitative markers of the Autonomic Nervous System (ANS). The HRV signal has numerous monitoring and diagnostic applications. To this end, wireless connectivity plays an important role in such biomedical instruments. The photoplethysmograph consists of an optical sensor to detect the changes in the light intensity reflected from the illuminated tissue, a signal conditioning unit to prepare the reflected light for further signal conditioning through amplification and filtering, a low-power microcontroller to control and digitize the analog PPG signal, and a Bluetooth module to transmit the digital data to a Bluetooth-based smart device such as a tablet. An Android app is then used to enable the smart device to acquire and digitally display the received analog PPG signal in real-time on the smart device. This article is concluded with the prototyping of the wireless PPG followed by the verification procedures of the PPG and HRV signals acquired in a laboratory environment.

  3. The regulation of mobile health applications

    OpenAIRE

    Barton, Amy J

    2012-01-01

    Abstract In July 2011, the United States Food and Drug Administration issued draft guidance concerning the regulation of mobile medical applications (applications on a wireless device that are used as accessories to medical devices or to convert a mobile platform to a medical device). While the suggestion of regulation is rooted in patient safety, concerns about limits on innovation and discovery as well as the evolving nature of both mobile health and current healthcare delivery have emerged...

  4. HotMobile 2008: Postconference Report

    NARCIS (Netherlands)

    Hong, J.; Lindqvist, J.; Pawar, P.; Stuntebeck, E.

    2008-01-01

    HotMobile 2008 presented a two-day program on mobile computing systems and applications. The authors focuses on the sessions on sensors, modularity, wireless, security, systems, and screens. The mobile device is the most amazing invention in history and that it has had the largest impact on human

  5. 75 FR 10502 - In the Matter of Certain Electronic Devices, Including Handheld Wireless Communications Devices...

    Science.gov (United States)

    2010-03-08

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-667; Investigation No. 337-TA-673] In the Matter of Certain Electronic Devices, Including Handheld Wireless Communications Devices; Notice of... Entirety AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that...

  6. Evaluation of a wireless audio streaming accessory to improve mobile telephone performance of cochlear implant users.

    Science.gov (United States)

    Wolfe, Jace; Morais Duke, Mila; Schafer, Erin; Cire, George; Menapace, Christine; O'Neill, Lori

    2016-01-01

    The objective of this study was to evaluate the potential improvement in word recognition in quiet and in noise obtained with use of a Bluetooth-compatible wireless hearing assistance technology (HAT) relative to the acoustic mobile telephone condition (e.g. the mobile telephone receiver held to the microphone of the sound processor). A two-way repeated measures design was used to evaluate differences in telephone word recognition obtained in quiet and in competing noise in the acoustic mobile telephone condition compared to performance obtained with use of the CI sound processor and a telephone HAT. Sixteen adult users of Nucleus cochlear implants and the Nucleus 6 sound processor were included in this study. Word recognition over the mobile telephone in quiet and in noise was significantly better with use of the wireless HAT compared to performance in the acoustic mobile telephone condition. Word recognition over the mobile telephone was better in quiet when compared to performance in noise. The results of this study indicate that use of a wireless HAT improves word recognition over the mobile telephone in quiet and in noise relative to performance in the acoustic mobile telephone condition for a group of adult cochlear implant recipients.

  7. Coverage Improvement for Wireless Sensor Networks using Grid Quorum based Node Mobility

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    Coverage of wireless sensor networks (WSNs) is an important quality of service (QoS) metric and often the desired coverage is not attainable at the initial deployment, but node mobility can be used to improve the coverage by relocating sensor nodes. Unconstrained node mobility is considered infea...

  8. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  9. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  10. Joint Optimized CPU and Networking Control Scheme for Improved Energy Efficiency in Video Streaming on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Sung-Woong Jo

    2017-01-01

    Full Text Available Video streaming service is one of the most popular applications for mobile users. However, mobile video streaming services consume a lot of energy, resulting in a reduced battery life. This is a critical problem that results in a degraded user’s quality of experience (QoE. Therefore, in this paper, a joint optimization scheme that controls both the central processing unit (CPU and wireless networking of the video streaming process for improved energy efficiency on mobile devices is proposed. For this purpose, the energy consumption of the network interface and CPU is analyzed, and based on the energy consumption profile a joint optimization problem is formulated to maximize the energy efficiency of the mobile device. The proposed algorithm adaptively adjusts the number of chunks to be downloaded and decoded in each packet. Simulation results show that the proposed algorithm can effectively improve the energy efficiency when compared with the existing algorithms.

  11. Final report : mobile surveillance and wireless communication systems field operational test. Volume 1, Executive summary

    Science.gov (United States)

    1999-03-01

    This study focused on assessing the application of traffic monitoring and management systems which use transportable surveillance and ramp meter trailers, video image processors, and wireless communications. The mobile surveillance and wireless commu...

  12. Novel developments in mobile sensing based on the integration of microfluidic devices and smartphones.

    Science.gov (United States)

    Yang, Ke; Peretz-Soroka, Hagit; Liu, Yong; Lin, Francis

    2016-03-21

    Portable electronic devices and wireless communication systems enable a broad range of applications such as environmental and food safety monitoring, personalized medicine and healthcare management. Particularly, hybrid smartphone and microfluidic devices provide an integrated solution for the new generation of mobile sensing applications. Such mobile sensing based on microfluidic devices (broadly defined) and smartphones (MS(2)) offers a mobile laboratory for performing a wide range of bio-chemical detection and analysis functions such as water and food quality analysis, routine health tests and disease diagnosis. MS(2) offers significant advantages over traditional platforms in terms of test speed and control, low cost, mobility, ease-of-operation and data management. These improvements put MS(2) in a promising position in the fields of interdisciplinary basic and applied research. In particular, MS(2) enables applications to remote in-field testing, homecare, and healthcare in low-resource areas. The marriage of smartphones and microfluidic devices offers a powerful on-chip operating platform to enable various bio-chemical tests, remote sensing, data analysis and management in a mobile fashion. The implications of such integration are beyond telecommunication and microfluidic-related research and technology development. In this review, we will first provide the general background of microfluidic-based sensing, smartphone-based sensing, and their integration. Then, we will focus on several key application areas of MS(2) by systematically reviewing the important literature in each area. We will conclude by discussing our perspectives on the opportunities, issues and future directions of this emerging novel field.

  13. Novel Developments of Mobile Sensing Based on the Integration of Microfluidic Devices and Smartphone

    Science.gov (United States)

    Yang, Ke; Peretz-Soroka, Hagit; Liu, Yong; Lin, Francis

    2016-01-01

    Portable electronic devices and wireless communication systems enable a broad range of applications such as environmental and food safety monitoring, personalized medicine and healthcare management. Particularly, hybrid smartphone and microfluidic devices provide an integrated solution for the new generation of mobile sensing applications. Such mobile sensing based on microfluidic devices (broadly defined) and smartphones (MS2) offers a mobile laboratory for performing a wide range of bio-chemical detection and analysis functions such as water and food quality analysis, routine health tests and disease diagnosis. MS2 offers significant advantages over traditional platforms in terms of test speed and control, low cost, mobility, ease-of-operation and data management. These improvements put MS2 in a promising position in the fields of interdisciplinary basic and applied research. In particular, MS2 enables applications to remote infield testing, homecare, and healthcare in low-resource areas. The marriage of smartphones and microfluidic devices offers a powerful on-chip operating platform to enable various bio-chemical tests, remote sensing, data analysis and management in a mobile fashion. The implications of such integration are beyond telecommunication and microfluidic-related research and technology development. In this review, we will first provide the general background of microfluidic-based sensing, smartphone-based sensing, and their integration. Then, we will focus on several key application areas of MS2 by systematically reviewing the important literature in each area. We will conclude by discussing our perspectives on the opportunities, issues and future directions of this emerging novel field. PMID:26899264

  14. Broadband Wireless Data Acquisition and Control Device, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Mobitrum is proposing to develop a broadband wireless device for real-time data acquisition and monitoring applicable to the field instrumentation and control...

  15. The regulation of mobile health applications

    Directory of Open Access Journals (Sweden)

    Barton Amy J

    2012-05-01

    Full Text Available Abstract In July 2011, the United States Food and Drug Administration issued draft guidance concerning the regulation of mobile medical applications (applications on a wireless device that are used as accessories to medical devices or to convert a mobile platform to a medical device. While the suggestion of regulation is rooted in patient safety, concerns about limits on innovation and discovery as well as the evolving nature of both mobile health and current healthcare delivery have emerged. This article discusses the prevalence of mobile health, the context of regulation concerning mobile medical applications, and implications for the future.

  16. 47 CFR 2.1091 - Radiofrequency radiation exposure evaluation: mobile devices.

    Science.gov (United States)

    2010-10-01

    ... transmission of a signal. In general, maximum average power levels must be used to determine compliance. (3) If... workers that can be easily re-located, such as wireless devices associated with a personal computer, are... Satellite Communications Services, the General Wireless Communications Service, the Wireless Communications...

  17. Address autoconfiguration in wireless ad hoc networks : Protocols and techniques

    NARCIS (Netherlands)

    Cempaka Wangi, N.I.; Prasad, R.V.; Jacobsson, M.; Niemegeers, I.

    2008-01-01

    With the advent of smaller devices having higher computational capacity and wireless communication capabilities, the world is becoming completely networked. Although, the mobile nature of these devices provides ubiquitous services, it also poses many challenges. In this article, we look in depth at

  18. An efficient schedule based data aggregation using node mobility for wireless sensor network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Pawar, Pranav M.; Prasad, Neeli R.

    2014-01-01

    In the Wireless Sensor Networks, (WSNs) a key challenge is to schedule the activities of the mobile node for improvement in throughput, energy consumption and delay. This paper proposes efficient schedule based data aggregation algorithm using node mobility (SDNM). It considers the cluster...

  19. Employment of mobile devices in chemistry education

    OpenAIRE

    Švehla, Martin

    2013-01-01

    This diploma thesis is focused on the use of mobile devices in chemistry education. Describes various mobile devices, including different operating systems and technology and shows huge potential that these devices bring to education. It also includes an overview of existing educational programs with a chemical theme on mobile devices. Part of this work was to create a custom supportive program Chemical helper for mobile devices, which can be used in chemistry education, laboratory and also i...

  20. MindEdit: A P300-based text editor for mobile devices.

    Science.gov (United States)

    Elsawy, Amr S; Eldawlatly, Seif; Taher, Mohamed; Aly, Gamal M

    2017-01-01

    Practical application of Brain-Computer Interfaces (BCIs) requires that the whole BCI system be portable. The mobility of BCI systems involves two aspects: making the electroencephalography (EEG) recording devices portable, and developing software applications with low computational complexity to be able to run on low computational-power devices such as tablets and smartphones. This paper addresses the development of MindEdit; a P300-based text editor for Android-based devices. Given the limited resources of mobile devices and their limited computational power, a novel ensemble classifier is utilized that uses Principal Component Analysis (PCA) features to identify P300 evoked potentials from EEG recordings. PCA computations in the proposed method are channel-based as opposed to concatenating all channels as in traditional feature extraction methods; thus, this method has less computational complexity compared to traditional P300 detection methods. The performance of the method is demonstrated on data recorded from MindEdit on an Android tablet using the Emotiv wireless neuroheadset. Results demonstrate the capability of the introduced PCA ensemble classifier to classify P300 data with maximum average accuracy of 78.37±16.09% for cross-validation data and 77.5±19.69% for online test data using only 10 trials per symbol and a 33-character training dataset. Our analysis indicates that the introduced method outperforms traditional feature extraction methods. For a faster operation of MindEdit, a variable number of trials scheme is introduced that resulted in an online average accuracy of 64.17±19.6% and a maximum bitrate of 6.25bit/min. These results demonstrate the efficacy of using the developed BCI application with mobile devices. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Advances in analog and RF IC design for wireless communication systems

    CERN Document Server

    Manganaro, Gabriele

    2013-01-01

    Advances in Analog and RF IC Design for Wireless Communication Systems gives technical introductions to the latest and most significant topics in the area of circuit design of analog/RF ICs for wireless communication systems, emphasizing wireless infrastructure rather than handsets. The book ranges from very high performance circuits for complex wireless infrastructure systems to selected highly integrated systems for handsets and mobile devices. Coverage includes power amplifiers, low-noise amplifiers, modulators, analog-to-digital converters (ADCs) and digital-to-analog converters

  2. MedMon: securing medical devices through wireless monitoring and anomaly detection.

    Science.gov (United States)

    Zhang, Meng; Raghunathan, Anand; Jha, Niraj K

    2013-12-01

    Rapid advances in personal healthcare systems based on implantable and wearable medical devices promise to greatly improve the quality of diagnosis and treatment for a range of medical conditions. However, the increasing programmability and wireless connectivity of medical devices also open up opportunities for malicious attackers. Unfortunately, implantable/wearable medical devices come with extreme size and power constraints, and unique usage models, making it infeasible to simply borrow conventional security solutions such as cryptography. We propose a general framework for securing medical devices based on wireless channel monitoring and anomaly detection. Our proposal is based on a medical security monitor (MedMon) that snoops on all the radio-frequency wireless communications to/from medical devices and uses multi-layered anomaly detection to identify potentially malicious transactions. Upon detection of a malicious transaction, MedMon takes appropriate response actions, which could range from passive (notifying the user) to active (jamming the packets so that they do not reach the medical device). A key benefit of MedMon is that it is applicable to existing medical devices that are in use by patients, with no hardware or software modifications to them. Consequently, it also leads to zero power overheads on these devices. We demonstrate the feasibility of our proposal by developing a prototype implementation for an insulin delivery system using off-the-shelf components (USRP software-defined radio). We evaluate its effectiveness under several attack scenarios. Our results show that MedMon can detect virtually all naive attacks and a large fraction of more sophisticated attacks, suggesting that it is an effective approach to enhancing the security of medical devices.

  3. Data transfer of structural strain by wireless device

    International Nuclear Information System (INIS)

    Kim, Chi Yeop; Kwon, Il Bum; Choi, Man Yong

    2002-01-01

    The wireless measurement device was instrumented to measure the stress distribution of structures. This device was composed of the data recorder, transmitter and receiver with PC interface. The specification of this device was as follows: Analog inputs of 8 channels, 400 MHz transmitted frequency, and the transmitted power of 5 mW. This device was manufactured as the sending and receiving system of long-term strains to calculate the stress distribution. The 4 channel strains of 150 Hz were well transmitted by this device. Also, these strain data was able to show the stress distribution of the experimental specimen. Furthermore, the data quantity was equal to the data quantity during three months at 1 hour sampling time

  4. Autonomous distributed self-organization for mobile wireless sensor networks.

    Science.gov (United States)

    Wen, Chih-Yu; Tang, Hung-Kai

    2009-01-01

    This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.

  5. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  6. Mathematical model on malicious attacks in a mobile wireless network with clustering

    International Nuclear Information System (INIS)

    Haldar, Kaushik; Mishra, Bimal Kumar

    2015-01-01

    A mathematical model has been formulated for the analysis of a wireless epidemic on a clustered heterogeneous network. The model introduces mobility into the epidemic framework assuming that the component nodes have a tendency to be attached with a frequently visited home cluster. This underlines the inherent regularity in the mobility pattern of mobile nodes in a wireless network. The analysis focuses primarily on features that arise because of the mobility considerations compared in the larger scenario formed by the epidemic aspects. A result on the invariance of the home cluster populations with respect to time provides an important view-point of the long-term behavior of the system. The analysis also focuses on obtaining a basic threshold condition that guides the epidemic behavior of the system. Analytical as well as numerical results have also been obtained to establish the asymptotic behavior of the connected components of the network, and that of the whole network when the underlying graph turns out to be irreducible. Applications to proximity based attacks and to scenarios with high cluster density have also been outlined

  7. RACOON: a multiuser QoS design for mobile wireless body area networks.

    Science.gov (United States)

    Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen

    2011-10-01

    In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.

  8. User Experience of Mobile Devices

    DEFF Research Database (Denmark)

    Raptis, Dimitrios

    that the overall physical form of a mobile device has a significant effect on the perceived usability of an application: the more attractive the physical form, the higher the perceived usability. The other study validated the effect of a particular physical form element on usability and showed that the screen size......This thesis focuses on mobile devices and it specifically investigates the effect of their physical form on two perceived user experience qualities, usability and coolness. With the term mobile devices, I refer to interactive products that users interact with while being on the move......, and with the term physical form I refer to the physical elements that constitute a mobile device as a whole, such as weight, size and materials. The selected research area was addressed through two research questions, one focusing on effects of physical form on usability and the other on effects on coolness...

  9. Probabilistic Location-based Routing Protocol for Mobile Wireless Sensor Networks with Intermittent Communication

    Directory of Open Access Journals (Sweden)

    Sho KUMAGAI

    2015-02-01

    Full Text Available In a sensor network, sensor data messages reach the nearest stationary sink node connected to the Internet by wireless multihop transmissions. Recently, various mobile sensors are available due to advances of robotics technologies and communication technologies. A location based message-by-message routing protocol, such as Geographic Distance Routing (GEDIR is suitable for such mobile wireless networks; however, it is required for each mobile wireless sensor node to know the current locations of all its neighbor nodes. On the other hand, various intermittent communication methods for a low power consumption requirement have been proposed for wireless sensor networks. Intermittent Receiver-driven Data Transmission (IRDT is one of the most efficient methods; however, it is difficult to combine the location based routing and the intermittent communication. In order to solve this problem, this paper proposes a probabilistic approach IRDT-GEDIR with the help of one of the solutions of the secretaries problem. Here, each time a neighbor sensor node wakes up from its sleep mode, an intermediate sensor node determines whether it forwards its buffered sensor data messages to it or not based on an estimation of achieved pseudo speed of the messages. Simulation experiments show that IRDT-GEDIR achieves higher pseudo speed of sensor data message transmissions and shorter transmission delay than achieves shorter transmission delay than the two naive combinations of IRDT and GEDIR in sensor networks with mobile sensor nodes and a stationary sink node. In addition, the guideline of the estimated numbers of the neighbor nodes of each intermediate sensor node is provided based on the results of the simulation experiments to apply the probabilistic approach IRDT-GEDIR.

  10. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things.

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-09-18

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified.

  11. Radiation from ingested wireless devices in bio-medical telemetry bands

    OpenAIRE

    Chirwa, L.C.; Roy, S.; Cumming, D.R.S.

    2003-01-01

    The performance of wireless devices, using electrically small antennae, in the human intestine is investigated using the finite difference time domain method in recommended biomedical device telemetry bands. The radiation field intensity was found to depend on position but more strongly on frequency, with a transmission peak at 650 MHz.

  12. Simulations of Large-scale WiFi-based Wireless Networks: Interdisciplinary Challenges and Applications

    OpenAIRE

    Nekovee, Maziar

    2008-01-01

    Wireless Fidelity (WiFi) is the fastest growing wireless technology to date. In addition to providing wire-free connectivity to the Internet WiFi technology also enables mobile devices to connect directly to each other and form highly dynamic wireless adhoc networks. Such distributed networks can be used to perform cooperative communication tasks such ad data routing and information dissemination in the absence of a fixed infrastructure. Furthermore, adhoc grids composed of wirelessly network...

  13. Dynamic Analysis of Mobile Device Applications

    Energy Technology Data Exchange (ETDEWEB)

    Corey Thuen

    2013-01-01

    The On-Device Dynamic Analysis of Mobile Applications (ODAMA) project was started in an effort to protect mobile devices used in Industrial Control Systems (ICS) from cyber attack. Because mobile devices hide as much of the “computer” as possible, the user’s ability to assess the software running on their system is limited. The research team chose Google’s Android platform for this initial research because it is open source and it would give us freedom in our approach, including the ability to modify the mobile device’s operating system itself. The research team concluded that a Privileged Application was the right approach, and the result was ODAMA. This project is an important piece of the work to secure the expanding use of mobile devices with our nation’s critical infrastructure.

  14. Wireless device for activation of an underground shock wave absorber

    Science.gov (United States)

    Chikhradze, M.; Akhvlediani, I.; Bochorishvili, N.; Mataradze, E.

    2011-10-01

    The paper describes the mechanism and design of the wireless device for activation of energy absorber for localization of blast energy in underground openings. The statistics shows that the greatest share of accidents with fatal results associate with explosions in coal mines due to aero-methane and/or air-coal media explosion. The other significant problem is terrorist or accidental explosions in underground structures. At present there are different protective systems to reduce the blast energy. One of the main parts of protective Systems is blast Identification and Registration Module. The works conducted at G. Tsulukidze Mining Institute of Georgia enabled to construct the wireless system of explosion detection and mitigation of shock waves. The system is based on the constant control on overpressure. The experimental research continues to fulfill the system based on both threats, on the constant control on overpressure and flame parameters, especially in underground structures and coal mines. Reaching the threshold value of any of those parameters, the system immediately starts the activation. The absorber contains a pyrotechnic device ensuring the discharge of dispersed water. The operational parameters of wireless device and activation mechanisms of pyrotechnic element of shock wave absorber are discussed in the paper.

  15. Discursive Deployments: Mobilizing Support for Municipal and Community Wireless Networks in the U.S.

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Rosio; Rodriguez, Juana Maria

    2008-08-16

    This paper examines Municipal Wireless (MW) deployments in the United States. In particular, the interest is in understanding how discourse has worked to mobilize widespread support for MW networks. We explore how local governments discursively deploy the language of social movements to create a shared understanding of the networking needs of communities. Through the process of"framing" local governments assign meaning to the MW networks in ways intended to mobilize support anddemobilize opposition. The mobilizing potential of a frame varies and is dependent on its centrality and cultural resonance. We examine the framing efforts of MW networks by using a sample of Request for Proposals for community wireless networks, semi-structured interviews and local media sources. Prominent values that are central to a majority of the projects and others that are culturally specific are identified and analyzed for their mobilizing potency.

  16. Use of a wireless local area network in an orthodontic clinic.

    Science.gov (United States)

    Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M

    2005-06-01

    Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.

  17. Mobility-aware Hybrid Synchronization for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2015-01-01

    Random mobility of node causes the frequent changes in the network dynamics causing the increased cost in terms of energy and bandwidth. It needs the additional efforts to synchronize the activities of nodes during data collection and transmission in Wireless Sensor Networks (WSNs). A key challenge...... in maintaining the effective data collection and transmission is to schedule and synchronize the activities of the nodes with the global clock. This paper proposes the Mobility-aware Hybrid Synchronization Algorithm (MHS) which works on the formation of cluster based on spanning tree mechanism (SPT). Nodes used...... for formation of the network have random mobility and heterogeneous in terms of energy with static sink. The nodes in the cluster and cluster heads in the network are synchronized with the notion of global time scale. In the initial stage, the algorithm establishes the hierarchical structure of the network...

  18. Analysis of mobile fronthaul bandwidth and wireless transmission performance in split-PHY processing architecture.

    Science.gov (United States)

    Miyamoto, Kenji; Kuwano, Shigeru; Terada, Jun; Otaka, Akihiro

    2016-01-25

    We analyze the mobile fronthaul (MFH) bandwidth and the wireless transmission performance in the split-PHY processing (SPP) architecture, which redefines the functional split of centralized/cloud RAN (C-RAN) while preserving high wireless coordinated multi-point (CoMP) transmission/reception performance. The SPP architecture splits the base stations (BS) functions between wireless channel coding/decoding and wireless modulation/demodulation, and employs its own CoMP joint transmission and reception schemes. Simulation results show that the SPP architecture reduces the MFH bandwidth by up to 97% from conventional C-RAN while matching the wireless bit error rate (BER) performance of conventional C-RAN in uplink joint reception with only 2-dB signal to noise ratio (SNR) penalty.

  19. Exploration of mobile educational technology

    OpenAIRE

    Hosny, W.

    2007-01-01

    Recent advances in mobile and wireless technology could be utilised to enhance the delivery of educational programmes. The use of this technology is known as “Mobile Education”. Mobile education technology provides unique opportunities for educators to flexibly deliver their educational material to learners via mobile services anywhere at any time. Moreover, the material delivered could be adapted to the learners’ needs and preferences. Examples of mobile devices which could be used in mobile...

  20. Socially Aware Heterogeneous Wireless Networks.

    Science.gov (United States)

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-06-11

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  1. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  2. [An implantable micro-device using wireless power transmission for measuring aortic aneurysm sac pressure].

    Science.gov (United States)

    Guo, Xudong; Ge, Bin; Wang, Wenxing

    2013-08-01

    In order to detect endoleaks after endovascular aneurysm repair (EVAR), we developed an implantable micro-device based on wireless power transmission to measure aortic aneurysm sac pressure. The implantable micro-device is composed of a miniature wireless pressure sensor, an energy transmitting coil, a data recorder and a data processing platform. Power transmission without interconnecting wires is performed by a transmitting coil and a receiving coil. The coupling efficiency of wireless power transmission depends on the coupling coefficient between the transmitting coil and the receiving coil. With theoretical analysis and experimental study, we optimized the geometry of the receiving coil to increase the coupling coefficient. In order to keep efficiency balance and satisfy the maximizing conditions, we designed a closed loop power transmission circuit, including a receiving voltage feedback module based on wireless communication. The closed loop improved the stability and reliability of transmission energy. The prototype of the micro-device has been developed and the experiment has been performed. The experiments showed that the micro-device was feasible and valid. For normal operation, the distance between the transmitting coil and the receiving coil is smaller than 8cm. Besides, the distance between the micro-device and the data recorder is within 50cm.

  3. A Middleware Solution for Wireless IoT Applications in Sparse Smart Cities

    Science.gov (United States)

    Lanzone, Stefano; Riberto, Giulio; Stefanelli, Cesare; Tortonesi, Mauro

    2017-01-01

    The spread of off-the-shelf mobile devices equipped with multiple wireless interfaces together with sophisticated sensors is paving the way to novel wireless Internet of Things (IoT) environments, characterized by multi-hop infrastructure-less wireless networks where devices carried by users act as sensors/actuators as well as network nodes. In particular, the paper presents Real Ad-hoc Multi-hop Peer-to peer-Wireless IoT Application (RAMP-WIA), a novel solution that facilitates the development, deployment, and management of applications in sparse Smart City environments, characterized by users willing to collaborate by allowing new applications to be deployed on their smartphones to remotely monitor and control fixed/mobile devices. RAMP-WIA allows users to dynamically configure single-hop wireless links, to manage opportunistically multi-hop packet dispatching considering that the network topology (together with the availability of sensors and actuators) may abruptly change, to actuate reliably sensor nodes specifically considering that only part of them could be actually reachable in a timely manner, and to upgrade dynamically the nodes through over-the-air distribution of new software components. The paper also reports the performance of RAMP-WIA on simple but realistic cases of small-scale deployment scenarios with off-the-shelf Android smartphones and Raspberry Pi devices; these results show not only the feasibility and soundness of the proposed approach, but also the efficiency of the middleware implemented when deployed on real testbeds. PMID:29099745

  4. A Middleware Solution for Wireless IoT Applications in Sparse Smart Cities.

    Science.gov (United States)

    Bellavista, Paolo; Giannelli, Carlo; Lanzone, Stefano; Riberto, Giulio; Stefanelli, Cesare; Tortonesi, Mauro

    2017-11-03

    The spread of off-the-shelf mobile devices equipped with multiple wireless interfaces together with sophisticated sensors is paving the way to novel wireless Internet of Things (IoT) environments, characterized by multi-hop infrastructure-less wireless networks where devices carried by users act as sensors/actuators as well as network nodes. In particular, the paper presents Real Ad-hoc Multi-hop Peer-to peer-Wireless IoT Application (RAMP-WIA), a novel solution that facilitates the development, deployment, and management of applications in sparse Smart City environments, characterized by users willing to collaborate by allowing new applications to be deployed on their smartphones to remotely monitor and control fixed/mobile devices. RAMP-WIA allows users to dynamically configure single-hop wireless links, to manage opportunistically multi-hop packet dispatching considering that the network topology (together with the availability of sensors and actuators) may abruptly change, to actuate reliably sensor nodes specifically considering that only part of them could be actually reachable in a timely manner, and to upgrade dynamically the nodes through over-the-air distribution of new software components. The paper also reports the performance of RAMP-WIA on simple but realistic cases of small-scale deployment scenarios with off-the-shelf Android smartphones and Raspberry Pi devices; these results show not only the feasibility and soundness of the proposed approach, but also the efficiency of the middleware implemented when deployed on real testbeds.

  5. A Middleware Solution for Wireless IoT Applications in Sparse Smart Cities

    Directory of Open Access Journals (Sweden)

    Paolo Bellavista

    2017-11-01

    Full Text Available The spread of off-the-shelf mobile devices equipped with multiple wireless interfaces together with sophisticated sensors is paving the way to novel wireless Internet of Things (IoT environments, characterized by multi-hop infrastructure-less wireless networks where devices carried by users act as sensors/actuators as well as network nodes. In particular, the paper presents Real Ad-hoc Multi-hop Peer-to peer-Wireless IoT Application (RAMP-WIA, a novel solution that facilitates the development, deployment, and management of applications in sparse Smart City environments, characterized by users willing to collaborate by allowing new applications to be deployed on their smartphones to remotely monitor and control fixed/mobile devices. RAMP-WIA allows users to dynamically configure single-hop wireless links, to manage opportunistically multi-hop packet dispatching considering that the network topology (together with the availability of sensors and actuators may abruptly change, to actuate reliably sensor nodes specifically considering that only part of them could be actually reachable in a timely manner, and to upgrade dynamically the nodes through over-the-air distribution of new software components. The paper also reports the performance of RAMP-WIA on simple but realistic cases of small-scale deployment scenarios with off-the-shelf Android smartphones and Raspberry Pi devices; these results show not only the feasibility and soundness of the proposed approach, but also the efficiency of the middleware implemented when deployed on real testbeds.

  6. Autonomous Distributed Self-Organization for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chih-Yu Wen

    2009-11-01

    Full Text Available This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently. A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.

  7. Reducing Exposure to Radiofrequency Electromagnetic Fields from Wireless Networking with Laptop Computers

    OpenAIRE

    Koppel, T; Ahonen, M; Vilcāne, I

    2014-01-01

    Mobile modems are used with laptops to connect Internet wirelessly. Recently several organisations, including the WHO IARC and the European Union have emphasised health risk-management practices related to wireless devices. We present here radio frequency (RF) power density measurements when a wireless modem is 30 cm, 1 m and 5 m from a user. Our results indicate that by using a USB cable and adding distance between a user and a wireless modem, there is a substantial reduction of exposure. Ad...

  8. Personal information search on mobile devices

    OpenAIRE

    Akbas, Mehmet.

    2007-01-01

    Today's mobile devices, especially mobile phones, are comparable in computing capability and storage to the desktop computers of a few years ago. The volume and diversity of the information kept on mobile devices has continually increased and users have taken advantage of this. Since information is being stored on multiple devices, searching for and retrieving the desired information has become an important function. This thesis focuses on search with regard to Personal Information Manag...

  9. Mobile Support For Logistics

    Science.gov (United States)

    2016-03-01

    support wireless capabilities, such as Wi-Fi or LTE -based 4G cellular infrastructures, into the DOD’s enterprise software, GCSS-MC could be a large...fielded mobile devices through ViaSat Inc. ViaSat’s goal is to provide secure communications over 3G/4G/ LTE cellular and Wi-Fi networks, secure...or commercial carrier network. While these measures are not all encompassing for protecting mobile devices, they are a ways that drastically improve

  10. An Introduction to Current Trends and Benefits of Mobile Wireless Technology Use in Higher Education

    Science.gov (United States)

    Kim, Sang Hyun; Mims, Clif; Holmes, Kerry P.

    2006-01-01

    The development of mobile wireless technologies has generated a considerable amount of excitement among practitioners and academics because it results in shifting the academic environment from traditional settings to mobile learning (m-learning) settings. Increasing numbers of institutions of higher education offer courses using mobile wireless…

  11. Adapting Mobile Beacon-Assisted Localization in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wei Dong

    2009-04-01

    Full Text Available The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL, to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL and Arrival and Departure Overlap (ADO when both of them use only a single mobile beacon for localization in static WSNs.

  12. Adapting mobile beacon-assisted localization in wireless sensor networks.

    Science.gov (United States)

    Teng, Guodong; Zheng, Kougen; Dong, Wei

    2009-01-01

    The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN) applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL) approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL), to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL) and Arrival and Departure Overlap (ADO) when both of them use only a single mobile beacon for localization in static WSNs.

  13. Power-Efficient Beacon Recognition Method Based on Periodic Wake-Up for Industrial Wireless Devices.

    Science.gov (United States)

    Song, Soonyong; Lee, Donghun; Jang, Ingook; Choi, Jinchul; Son, Youngsung

    2018-04-17

    Energy harvester-integrated wireless devices are attractive for generating semi-permanent power from wasted energy in industrial environments. The energy-harvesting wireless devices may have difficulty in their communication with access points due to insufficient power supply for beacon recognition during network initialization. In this manuscript, we propose a novel method of beacon recognition based on wake-up control to reduce instantaneous power consumption in the initialization procedure. The proposed method applies a moving window for the periodic wake-up of the wireless devices. For unsynchronized wireless devices, beacons are always located in the same positions within each beacon interval even though the starting offsets are unknown. Using these characteristics, the moving window checks the existence of the beacon associated withspecified resources in a beacon interval, checks again for neighboring resources at the next beacon interval, and so on. This method can reduce instantaneous power and generates a surplus of charging time. Thus, the proposed method alleviates the problems of power insufficiency in the network initialization. The feasibility of the proposed method is evaluated using computer simulations of power shortage in various energy-harvesting conditions.

  14. 78 FR 55294 - Certain Wireless Devices With 3G Capabilities and Components Thereof Commission Determination To...

    Science.gov (United States)

    2013-09-10

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-800] Certain Wireless Devices With 3G Capabilities and Components Thereof Commission Determination To Review the Final Initial Determination Finding... importation of certain wireless devices with 3G capabilities and components thereof by reason of infringement...

  15. Wireless recording systems: from noninvasive EEG-NIRS to invasive EEG devices.

    Science.gov (United States)

    Sawan, Mohamad; Salam, Muhammad T; Le Lan, Jérôme; Kassab, Amal; Gelinas, Sébastien; Vannasing, Phetsamone; Lesage, Frédéric; Lassonde, Maryse; Nguyen, Dang K

    2013-04-01

    In this paper, we present the design and implementation of a wireless wearable electronic system dedicated to remote data recording for brain monitoring. The reported wireless recording system is used for a) simultaneous near-infrared spectrometry (NIRS) and scalp electro-encephalography (EEG) for noninvasive monitoring and b) intracerebral EEG (icEEG) for invasive monitoring. Bluetooth and dual radio links were introduced for these recordings. The Bluetooth-based device was embedded in a noninvasive multichannel EEG-NIRS system for easy portability and long-term monitoring. On the other hand, the 32-channel implantable recording device offers 24-bit resolution, tunable features, and a sampling frequency up to 2 kHz per channel. The analog front-end preamplifier presents low input-referred noise of 5 μ VRMS and a signal-to-noise ratio of 112 dB. The communication link is implemented using a dual-band radio frequency transceiver offering a half-duplex 800 kb/s data rate, 16.5 mW power consumption and less than 10(-10) post-correction Bit-Error Rate (BER). The designed system can be accessed and controlled by a computer with a user-friendly graphical interface. The proposed wireless implantable recording device was tested in vitro using real icEEG signals from two patients with refractory epilepsy. The wirelessly recorded signals were compared to the original signals recorded using wired-connection, and measured normalized root-mean square deviation was under 2%.

  16. A secure wireless mobile-to-server link

    Science.gov (United States)

    Kumar, Abhinav; Akopian, David; Agaian, Sos; Creutzburg, Reiner

    2009-02-01

    Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends indicate continuous growth in mobile phone applications. Nowadays phones are equipped with cameras that can capture still images and video, they are equipped with software that can read, convert, manipulate, communicate and save multimedia in multiple formats. This tremendous progress increased the volumes of communicated sensitive information which should be protected against unauthorized access. This paper discusses two general approaches for data protection, steganography and cryptography, and demonstrates how to integrate such algorithms with a mobile-toserver link being used by many applications.

  17. Mobile Multimedia Systems

    NARCIS (Netherlands)

    Havinga, Paul J.M.

    2000-01-01

    Recent advances in wireless networking technology and the exponential development of semiconductor technology have engendered a new paradigm of computing, called personal mobile computing. In this paradigm, the basic personal computing and communication device will be an integrated, battery-operated

  18. Wireless communication with implanted medical devices using the conductive properties of the body.

    Science.gov (United States)

    Ferguson, John E; Redish, A David

    2011-07-01

    Many medical devices that are implanted in the body use wires or wireless radiofrequency telemetry to communicate with circuitry outside the body. However, the wires are a common source of surgical complications, including breakage, infection and electrical noise. In addition, radiofrequency telemetry requires large amounts of power and results in low-efficiency transmission through biological tissue. As an alternative, the conductive properties of the body can be used to enable wireless communication with implanted devices. In this article, several methods of intrabody communication are described and compared. In addition to reducing the complications that occur with current implantable medical devices, intrabody communication can enable novel types of miniature devices for research and clinical applications.

  19. Speech Recognition on Mobile Devices

    DEFF Research Database (Denmark)

    Tan, Zheng-Hua; Lindberg, Børge

    2010-01-01

    in the mobile context covering motivations, challenges, fundamental techniques and applications. Three ASR architectures are introduced: embedded speech recognition, distributed speech recognition and network speech recognition. Their pros and cons and implementation issues are discussed. Applications within......The enthusiasm of deploying automatic speech recognition (ASR) on mobile devices is driven both by remarkable advances in ASR technology and by the demand for efficient user interfaces on such devices as mobile phones and personal digital assistants (PDAs). This chapter presents an overview of ASR...

  20. Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality

    Directory of Open Access Journals (Sweden)

    Jie Zhang

    2016-01-01

    Full Text Available Mobile sensing has become a new style of applications and most of the smart devices are equipped with varieties of sensors or functionalities to enhance sensing capabilities. Current sensing systems concentrate on how to enhance sensing capabilities; however, the sensors or functionalities may lead to the leakage of users’ privacy. In this paper, we present WiPass, a way to leverage the wireless hotspot functionality on the smart devices to snoop the unlock passwords/patterns without the support of additional hardware. The attacker can “see” your unlock passwords/patterns even one meter away. WiPass leverages the impacts of finger motions on the wireless signals during the unlocking period to analyze the passwords/patterns. To practically implement WiPass, we are facing the difficult feature extraction and complex unlock passwords matching, making the analysis of the finger motions challenging. To conquer the challenges, we use DCASW to extract feature and hierarchical DTW to do unlock passwords matching. Besides, the combination of amplitude and phase information is used to accurately recognize the passwords/patterns. We implement a prototype of WiPass and evaluate its performance under various environments. The experimental results show that WiPass achieves the detection accuracy of 85.6% and 74.7% for passwords/patterns detection in LOS and in NLOS scenarios, respectively.

  1. A Novel Hybrid Intelligent Indoor Location Method for Mobile Devices by Zones Using Wi-Fi Signals.

    Science.gov (United States)

    Castañón-Puga, Manuel; Salazar, Abby Stephanie; Aguilar, Leocundo; Gaxiola-Pacheco, Carelia; Licea, Guillermo

    2015-12-02

    The increasing use of mobile devices in indoor spaces brings challenges to location methods. This work presents a hybrid intelligent method based on data mining and Type-2 fuzzy logic to locate mobile devices in an indoor space by zones using Wi-Fi signals from selected access points (APs). This approach takes advantage of wireless local area networks (WLANs) over other types of architectures and implements the complete method in a mobile application using the developed tools. Besides, the proposed approach is validated by experimental data obtained from case studies and the cross-validation technique. For the purpose of generating the fuzzy rules that conform to the Takagi-Sugeno fuzzy system structure, a semi-supervised data mining technique called subtractive clustering is used. This algorithm finds centers of clusters from the radius map given by the collected signals from APs. Measurements of Wi-Fi signals can be noisy due to several factors mentioned in this work, so this method proposed the use of Type-2 fuzzy logic for modeling and dealing with such uncertain information.

  2. A Novel Hybrid Intelligent Indoor Location Method for Mobile Devices by Zones Using Wi-Fi Signals

    Directory of Open Access Journals (Sweden)

    Manuel Castañón–Puga

    2015-12-01

    Full Text Available The increasing use of mobile devices in indoor spaces brings challenges to location methods. This work presents a hybrid intelligent method based on data mining and Type-2 fuzzy logic to locate mobile devices in an indoor space by zones using Wi-Fi signals from selected access points (APs. This approach takes advantage of wireless local area networks (WLANs over other types of architectures and implements the complete method in a mobile application using the developed tools. Besides, the proposed approach is validated by experimental data obtained from case studies and the cross-validation technique. For the purpose of generating the fuzzy rules that conform to the Takagi–Sugeno fuzzy system structure, a semi-supervised data mining technique called subtractive clustering is used. This algorithm finds centers of clusters from the radius map given by the collected signals from APs. Measurements of Wi-Fi signals can be noisy due to several factors mentioned in this work, so this method proposed the use of Type-2 fuzzy logic for modeling and dealing with such uncertain information.

  3. When Whereabouts is No Longer Thereabouts: Location Privacy in Wireless Networks

    OpenAIRE

    Freudiger, Julien

    2011-01-01

    Modern mobile devices are fast, programmable and feature localization and wireless capabilities. These technological advances notably facilitate mobile access to Internet, development of mobile applications and sharing of personal information, such as location information. Cell phone users can for example share their whereabouts with friends on online social networks. Following this trend, the field of ubiquitous computing foresees communication netwo...

  4. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified. PMID:26393617

  5. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Directory of Open Access Journals (Sweden)

    Lusheng Wang

    2015-09-01

    Full Text Available With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI. In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG, forming a congestion game with ICI (CGI and a congestion game with capacity (CGC. For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE. Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell is profoundly revealed, and the collapse points are identified.

  6. Reducing handover latency in future IP-based wireless networks: Fast Proxy Mobile IPv6

    NARCIS (Netherlands)

    Heijenk, Geert; Bargh, Mortaza S.; Laganier, Julien; Prasad, Anand R.

    2008-01-01

    Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the

  7. One4All Cooperative Media Access Strategy in Infrastructure Based Distributed Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    a cooperative cluster using their short-range air interface and one device contends the channel for all the devices within the cluster. This strategy reduces the number of mobile devices involved in the collision process for the wireless medium resulting in larger throughput, smaller access delay, and less...

  8. Device-Centric Monitoring for Mobile Device Management

    OpenAIRE

    Chircop, Luke; Colombo, Christian; Pace, Gordon J.

    2016-01-01

    The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centri...

  9. RFIC's challenges for third-generation wireless systems

    Science.gov (United States)

    Boric-Lubecke, Olga; Lin, Jenshan; Gould, Penny; Kermalli, Munawar

    2001-11-01

    Third generation (3G) cellular wireless systems are envisioned to offer low cost, high-capacity mobile communications with data rates of up to 2 Mbit/s, with global roaming and advanced data services. Besides adding mobility to the internet, 3G systems will provide location-based services, as well as personalized information and entertainment. Low cost, high dynamic-range radios, both for base stations (BS) and for mobile stations (MS) are required to enable worldwide deployment of such networks. A receiver's reference sensitivity, intermodulation characteristics, and blocking characteristics, set by a wireless standard, define performance requirements of individual components of a receiver front end. Since base station handles multiple signals from various distances simultaneously, its radio specifications are significantly more demanding than those for mobile devices. While high level of integration has already been achieved for second generation hand-sets using low-cost silicon technologies, the cost and size reduction of base stations still remains a challenge and necessity. While silicon RFIC technology is steadily improving, it is still difficult to achieve noise figure (NF), linearity, and phase noise requirements with presently available devices. This paper will discuss base station specification for 2G (GSM) and 3G (UMTS) systems, as well as the feasibility of implementing base station radios in low-cost silicon processes.

  10. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  11. Route Instruction Mechanism for Mobile Users Leveraging Distributed Wireless Resources

    Science.gov (United States)

    Kakehi, Takeshi; Shinkuma, Ryoichi; Murase, Tutomu; Motoyoshi, Gen; Yamori, Kyoko; Takahashi, Tatsuro

    The market growths of smart-phones and thin clients have been significantly increasing communication traffic in mobile networks. To handle the increased traffic, network operators should consider how to leverage distributed wireless resources such as distributed spots of wireless local access networks. In this paper, we consider the system where multiple moving users share distributed wireless access points on their traveling routes between their start and goal points and formulate as an optimization problem. Then, we come up with three algorithms as a solution for the problem. The key idea here is ‘longcut route instruction’, in which users are instructed to choose a traveling route where less congested access points are available; even if the moving distance increases, the throughput for users in the system would improve. In this paper, we define the gain function. Moreover, we analyze the basic characteristics of the system using as a simple model as possible.

  12. Mobile Device Security: Perspectives of Future Healthcare Workers.

    Science.gov (United States)

    Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander

    2017-01-01

    Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.

  13. A mobile field-work data collection system for the wireless era of health surveillance.

    Science.gov (United States)

    Forsell, Marianne; Sjögren, Petteri; Renard, Matthew; Johansson, Olle

    2011-03-01

    In many countries or regions the capacity of health care resources is below the needs of the population and new approaches for health surveillance are needed. Innovative projects, utilizing wireless communication technology, contribute to reliable methods for field-work data collection and reporting to databases. The objective was to describe a new version of a wireless IT-support system for field-work data collection and administration. The system requirements were drawn from the design objective and translated to system functions. The system architecture was based on fieldwork experiences and administrative requirements. The Smartphone devices were HTC Touch Diamond2s, while the system was based on a platform with Microsoft .NET components, and a SQL Server 2005 with Microsoft Windows Server 2003 operating system. The user interfaces were based on .NET programming, and Microsoft Windows Mobile operating system. A synchronization module enabled download of field data to the database, via a General Packet Radio Services (GPRS) to a Local Area Network (LAN) interface. The field-workers considered the here-described applications user-friendly and almost self-instructing. The office administrators considered that the back-office interface facilitated retrieval of health reports and invoice distribution. The current IT-support system facilitates short lead times from fieldwork data registration to analysis, and is suitable for various applications. The advantages of wireless technology, and paper-free data administration need to be increasingly emphasized in development programs, in order to facilitate reliable and transparent use of limited resources.

  14. Optimized Charging Scheduling with Single Mobile Charger for Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qihua Wang

    2017-11-01

    Full Text Available Due to the rapid development of wireless charging technology, the recharging issue in wireless rechargeable sensor network (WRSN has been a popular research problem in the past few years. The weakness of previous work is that charging route planning is not reasonable. In this work, a dynamic optimal scheduling scheme aiming to maximize the vacation time ratio of a single mobile changer for WRSN is proposed. In the proposed scheme, the wireless sensor network is divided into several sub-networks according to the initial topology of deployed sensor networks. After comprehensive analysis of energy states, working state and constraints for different sensor nodes in WRSN, we transform the optimized charging path problem of the whole network into the local optimization problem of the sub networks. The optimized charging path with respect to dynamic network topology in each sub-network is obtained by solving an optimization problem, and the lifetime of the deployed wireless sensor network can be prolonged. Simulation results show that the proposed scheme has good and reliable performance for a small wireless rechargeable sensor network.

  15. Regressive Prediction Approach to Vertical Handover in Fourth Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Abubakar M. Miyim

    2014-11-01

    Full Text Available The over increasing demand for deployment of wireless access networks has made wireless mobile devices to face so many challenges in choosing the best suitable network from a set of available access networks. Some of the weighty issues in 4G wireless networks are fastness and seamlessness in handover process. This paper therefore, proposes a handover technique based on movement prediction in wireless mobile (WiMAX and LTE-A environment. The technique enables the system to predict signal quality between the UE and Radio Base Stations (RBS/Access Points (APs in two different networks. Prediction is achieved by employing the Markov Decision Process Model (MDPM where the movement of the UE is dynamically estimated and averaged to keep track of the signal strength of mobile users. With the help of the prediction, layer-3 handover activities are able to occur prior to layer-2 handover, and therefore, total handover latency can be reduced. The performances of various handover approaches influenced by different metrics (mobility velocities were evaluated. The results presented demonstrate good accuracy the proposed method was able to achieve in predicting the next signal level by reducing the total handover latency.

  16. PhysioDroid: combining wearable health sensors and mobile devices for a ubiquitous, continuous, and personal monitoring.

    Science.gov (United States)

    Banos, Oresti; Villalonga, Claudia; Damas, Miguel; Gloesekoetter, Peter; Pomares, Hector; Rojas, Ignacio

    2014-01-01

    Technological advances on the development of mobile devices, medical sensors, and wireless communication systems support a new generation of unobtrusive, portable, and ubiquitous health monitoring systems for continuous patient assessment and more personalized health care. There exist a growing number of mobile apps in the health domain; however, little contribution has been specifically provided, so far, to operate this kind of apps with wearable physiological sensors. The PhysioDroid, presented in this paper, provides a personalized means to remotely monitor and evaluate users' conditions. The PhysioDroid system provides ubiquitous and continuous vital signs analysis, such as electrocardiogram, heart rate, respiration rate, skin temperature, and body motion, intended to help empower patients and improve clinical understanding. The PhysioDroid is composed of a wearable monitoring device and an Android app providing gathering, storage, and processing features for the physiological sensor data. The versatility of the developed app allows its use for both average users and specialists, and the reduced cost of the PhysioDroid puts it at the reach of most people. Two exemplary use cases for health assessment and sports training are presented to illustrate the capabilities of the PhysioDroid. Next technical steps include generalization to other mobile platforms and health monitoring devices.

  17. Experiences from Implementing a Mobile Multiplayer Real-Time Game for Wireless Networks with High Latency

    Directory of Open Access Journals (Sweden)

    Alf Inge Wang

    2009-01-01

    Full Text Available This paper describes results and experiences from designing, implementing, and testing a multiplayer real-time game over mobile networks with high latency. The paper reports on network latency and bandwidth measurements from playing the game live over GPRS, EDGE, UMTS, and WLAN using the TCP and the UDP protocols. These measurements describe the practical constraints of various wireless networks and protocols when used for mobile multiplayer game purposes. Further, the paper reports on experiences from implementing various approaches to minimize issues related to high latency. Specifically, the paper focuses on a discussion about how much of the game should run locally on the client versus on the server to minimize the load on the mobile device and obtain sufficient consistency in the game. The game was designed to reveal all kinds of implementation issues of mobile network multiplayer games. The goal of the game is for a player to push other players around and into traps where they loose their lives. The game relies heavily on collision detection between the players and game objects. The paper presents experiences from experimenting with various approaches that can be used to handle such collisions, and highlights the advantages and disadvantages of the various approaches.

  18. Data-Dependent Fingerprints for Wireless Device Authentication

    Science.gov (United States)

    2014-05-20

    conventional wireless local area network ( WLAN ). To verify that the node can be trusted, the DMN transmits a challenge, which is essentially a request for...varactor diode chosen for the application is the Skyworks SMV1236, which is a silicon hyperabrupt junction device with a high quality factor. The...and computes the MSD between each estimate and the correct response vector x using (7), with the result allowing application of the authentication

  19. Reducing Downlink Signaling Traffic in Wireless Systems Using Mobile-Assisted Scheduling

    OpenAIRE

    Moosavi, Reza; Larsson, Erik G.

    2010-01-01

    We present an idea to reduce the part of the downlink signaling traffic in wireless multiple access systems that contains scheduling information. The theoretical basis of the scheme is that the scheduling decisions made by the base station are correlated with the CSI reports from the mobiles. This correlation can be exploited by the source coding scheme that is used to compress the scheduling maps before they are sent to the mobiles. In the proposed scheme, this idea is implemented by letting...

  20. Copenhagen as a centre of excellence for mobile and Wireless communication

    DEFF Research Database (Denmark)

    Falch, Morten

    doing well with regard to connectivity of broadband and Internet access, and Denmark has also developed an advanced market for mobile services. The major share of the Danish mobile sector is concentrated in the capital region. In relative terms the mobile sector is largest in Northern Jutland......The aim of this paper is to analyze the potential of the Copenhagen capital region to maintain a leading position in development and provision of mobile technologies. The paper presents empirical data on the mobile sector in the capital region in order to identify strengths and weaknesses...... of the Capital Region of Copenhagen. Denmark is as the rest of Scandinavia considered to be among the leading countries with regard to mobile and wireless communication. This position has been confirmed in a long series of benchmarking analyses comparing e-readiness in countries and regions. Denmark is also...

  1. 47 CFR 95.1119 - Specific requirements for wireless medical telemetry devices operating in the 608-614 MHz band.

    Science.gov (United States)

    2010-10-01

    ... devices operating in the 608-614 MHz band. For a wireless medical telemetry device operating within the... 47 Telecommunication 5 2010-10-01 2010-10-01 false Specific requirements for wireless medical telemetry devices operating in the 608-614 MHz band. 95.1119 Section 95.1119 Telecommunication FEDERAL...

  2. Adaptive multi-node multiple input and multiple output (MIMO) transmission for mobile wireless multimedia sensor networks.

    Science.gov (United States)

    Cho, Sunghyun; Choi, Ji-Woong; You, Cheolwoo

    2013-10-02

    Mobile wireless multimedia sensor networks (WMSNs), which consist of mobile sink or sensor nodes and use rich sensing information, require much faster and more reliable wireless links than static wireless sensor networks (WSNs). This paper proposes an adaptive multi-node (MN) multiple input and multiple output (MIMO) transmission to improve the transmission reliability and capacity of mobile sink nodes when they experience spatial correlation. Unlike conventional single-node (SN) MIMO transmission, the proposed scheme considers the use of transmission antennas from more than two sensor nodes. To find an optimal antenna set and a MIMO transmission scheme, a MN MIMO channel model is introduced first, followed by derivation of closed-form ergodic capacity expressions with different MIMO transmission schemes, such as space-time transmit diversity coding and spatial multiplexing. The capacity varies according to the antenna correlation and the path gain from multiple sensor nodes. Based on these statistical results, we propose an adaptive MIMO mode and antenna set switching algorithm that maximizes the ergodic capacity of mobile sink nodes. The ergodic capacity of the proposed scheme is compared with conventional SN MIMO schemes, where the gain increases as the antenna correlation and path gain ratio increase.

  3. Mobile patient monitoring: The MobiHealth system

    NARCIS (Netherlands)

    Wac, K.E.; Bults, Richard G.A.; van Beijnum, Bernhard J.F.; Widya, I.A.; Jones, Valerie M.; Konstantas, D.; Vollenbroek-Hutten, Miriam Marie Rosé; Hermens, Hermanus J.

    2009-01-01

    The emergence of high bandwidth public wireless networks and miniaturized personal mobile devices give rise to new mobile healthcare services. To this end, the MobiHealth system provides highly customizable vital signs tele-monitoring and tele-treatment system based on a body area network (BAN) and

  4. Sparse Localization with a Mobile Beacon Based on LU Decomposition in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunhui Zhao

    2015-09-01

    Full Text Available Node localization is the core in wireless sensor network. It can be solved by powerful beacons, which are equipped with global positioning system devices to know their location information. In this article, we present a novel sparse localization approach with a mobile beacon based on LU decomposition. Our scheme firstly translates node localization problem into a 1-sparse vector recovery problem by establishing sparse localization model. Then, LU decomposition pre-processing is adopted to solve the problem that measurement matrix does not meet the re¬stricted isometry property. Later, the 1-sparse vector can be exactly recovered by compressive sensing. Finally, as the 1-sparse vector is approximate sparse, weighted Cen¬troid scheme is introduced to accurately locate the node. Simulation and analysis show that our scheme has better localization performance and lower requirement for the mobile beacon than MAP+GC, MAP-M, and MAP-MN schemes. In addition, the obstacles and DOI have little effect on the novel scheme, and it has great localization performance under low SNR, thus, the scheme proposed is robust.

  5. 76 FR 81527 - Certain Wireless Devices with 3G Capabilities and Components Thereof; Determination Not to Review...

    Science.gov (United States)

    2011-12-28

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-800] Certain Wireless Devices with 3G Capabilities and Components Thereof; Determination Not to Review Initial Determination Granting Motion for... importation, and the sale within the United States after importation of certain wireless devices with 3G...

  6. 78 FR 42107 - Certain Wireless Devices With 3G Capabilities and Components Thereof; Notice of Request for...

    Science.gov (United States)

    2013-07-15

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-800] Certain Wireless Devices With 3G Capabilities and Components Thereof; Notice of Request for Statements on the Public Interest AGENCY: U.S..., specifically a limited exclusion order against certain wireless devices with 3G capabilities and components...

  7. 77 FR 26788 - Certain Wireless Devices With 3G Capabilities and Components Thereof Determination Not To Review...

    Science.gov (United States)

    2012-05-07

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-800] Certain Wireless Devices With 3G Capabilities and Components Thereof Determination Not To Review Initial Determination To Amend the Notice of... importation of certain wireless devices with 3G capabilities and components thereof by reason of infringement...

  8. An externally head-mounted wireless neural recording device for laboratory animal research and possible human clinical use.

    Science.gov (United States)

    Yin, Ming; Li, Hao; Bull, Christopher; Borton, David A; Aceros, Juan; Larson, Lawrence; Nurmikko, Arto V

    2013-01-01

    In this paper we present a new type of head-mounted wireless neural recording device in a highly compact package, dedicated for untethered laboratory animal research and designed for future mobile human clinical use. The device, which takes its input from an array of intracortical microelectrode arrays (MEA) has ninety-seven broadband parallel neural recording channels and was integrated on to two custom designed printed circuit boards. These house several low power, custom integrated circuits, including a preamplifier ASIC, a controller ASIC, plus two SAR ADCs, a 3-axis accelerometer, a 48MHz clock source, and a Manchester encoder. Another ultralow power RF chip supports an OOK transmitter with the center frequency tunable from 3GHz to 4GHz, mounted on a separate low loss dielectric board together with a 3V LDO, with output fed to a UWB chip antenna. The IC boards were interconnected and packaged in a polyether ether ketone (PEEK) enclosure which is compatible with both animal and human use (e.g. sterilizable). The entire system consumes 17mA from a 1.2Ahr 3.6V Li-SOCl2 1/2AA battery, which operates the device for more than 2 days. The overall system includes a custom RF receiver electronics which are designed to directly interface with any number of commercial (or custom) neural signal processors for multi-channel broadband neural recording. Bench-top measurements and in vivo testing of the device in rhesus macaques are presented to demonstrate the performance of the wireless neural interface.

  9. Virtual Reality Interaction Using Mobile Devices

    KAUST Repository

    Aseeri, Sahar A.

    2013-07-01

    With the use of an immersive display system such as CAVE system, the user is able to realize a 3D immersive virtual environment realistically. However, interacting with virtual worlds in CAVE systems using traditional input devices to perform easy operations such as manipulation, object selection, and navigation is often difficult. This difficulty could diminish the immersion and sense of presence when it comes to 3D virtual environment tasks. Our research aims to implement and evaluate alternative approaches of interaction with immersive virtual environments on mobile devices for manipulation and object selection tasks. As many researchers have noted, using a mobile device as an interaction device has a number of advantages, including built-in display, built-in control, and touch screen facility. These advantages facilitate simple tasks within immersive virtual environments. This research proposes new methods using mobile devices like Smart-phones to perform di↵erent kinds of interactions both as an input device, (e.g. performing selection and manipulation of objects) and as an output device (e.g. utilizing the screen as an extra view for a virtual camera or information display). Moreover, we developed a prototype system to demonstrate and informally evaluate these methods. The research conclusion suggests using mobile devices as a 3D-controller. This will be a more intuitive approach to interact within the virtual environment.

  10. Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.

    Science.gov (United States)

    Wang, Tian; Wu, Qun; Wen, Sheng; Cai, Yiqiao; Tian, Hui; Chen, Yonghong; Wang, Baowei

    2017-01-13

    WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks by introducing mobile actuator elements. Previous studies indicated that mobile actuators can improve network performance in terms of data collection, energy supplementation, etc. However, according to our experimental simulations, the actuator's mobility also causes the sensor worm to spread faster if an attacker launches worm attacks on an actuator and compromises it successfully. Traditional worm propagation models and defense strategies did not consider the diffusion with a mobile worm carrier. To address this new problem, we first propose a microscopic mathematical model to describe the propagation dynamics of the sensor worm. Then, a two-step local defending strategy (LDS) with a mobile patcher (a mobile element which can distribute patches) is designed to recover the network. In LDS, all recovering operations are only taken in a restricted region to minimize the cost. Extensive experimental results demonstrate that our model estimations are rather accurate and consistent with the actual spreading scenario of the mobile sensor worm. Moreover, on average, the LDS outperforms other algorithms by approximately 50% in terms of the cost.

  11. Influence of Mobility Models in Precision Spray Aided by Wireless Sensor Networks

    International Nuclear Information System (INIS)

    Gonçalves, L B L; Neves, L A; Zafalon, G F D; Costa, F G; Ueyama, J; Montez, C; Pinto, A S R

    2015-01-01

    Precision Spray is a technique to increase performance of Precision Agriculture. This spray technique may be aided by a Wireless Sensor Network, however, for such approach, the communication between the agricultural input applicator vehicle and network is critical due to its proper functioning. Thus, this work analyzes how the number of nodes in a wireless sensor network, its type of distribution and different areas of scenario affects the performance of communication. We performed simulations to observe system's behavior changing to find the most fitted non-controlled mobility model to the system

  12. Application of mobile agent technology with portable information device to the maintenance support of nuclear power plant

    International Nuclear Information System (INIS)

    Takahashi, Makoto; Ito, Yo; Sato, Hisashi; Kitamura, Masaharu

    2004-01-01

    A support system for trouble shooting activities has been developed based on the distributed DB and mobile agent technology. The main purpose of the proposed system is to provide field workers with effective functions for realizing trouble-shooting with the aid of the mobile agents, which performs data retrieval from DB and fault diagnosis. In the proposed scheme of trouble shooting support, a portable information device is utilized by the maintenance personnel, which is connected to the local data base (LDB) via wireless network. The important point is that these functions can be accessed by the field workers through wearable information device with the lower cognitive burden. The prototype system has been developed using the JAVA-based Aglets Framework SDK and applied to the actual objective system. It has been confirmed through the experiments that the developed prototype system is capable of performing the tasks to support diagnostic activities. (author)

  13. Routing in Mobile Wireless Sensor Networks: A Leader-Based Approach.

    Science.gov (United States)

    Burgos, Unai; Amozarrain, Ugaitz; Gómez-Calzado, Carlos; Lafuente, Alberto

    2017-07-07

    This paper presents a leader-based approach to routing in Mobile Wireless Sensor Networks (MWSN). Using local information from neighbour nodes, a leader election mechanism maintains a spanning tree in order to provide the necessary adaptations for efficient routing upon the connectivity changes resulting from the mobility of sensors or sink nodes. We present two protocols following the leader election approach, which have been implemented using Castalia and OMNeT++. The protocols have been evaluated, besides other reference MWSN routing protocols, to analyse the impact of network size and node velocity on performance, which has demonstrated the validity of our approach.

  14. Signcryption-Based Key Management for MANETs Applications in Mobile Commerce

    Institute of Scientific and Technical Information of China (English)

    LI Jingfeng; ZHU Yuefei; ZHANG Yajuan; PAN Heng

    2006-01-01

    Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management.

  15. A Mobility-aware Broadcasting Infrastructure for a Wireless Internet with Hotspots

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, Henk; Eertink, E.H.; Widya, I.A.; Huizer, E.; Kermani, P.

    In this paper, we consider the problem of adaptively delivering live multimedia broadcasts (e.g., for applications such as TV, radio, or e-cinema) to a potentially large number of mobile hosts that roam about in a wireless internet with hotspots. We take a user-oriented approach based on an

  16. The development of display device for radioactive information using wireless communication

    International Nuclear Information System (INIS)

    Kim, Jung Taek; Park, Won Man; Lee, Bong Jae; Lim, Yoo Chung

    1998-06-01

    The improvement in the nuclear industry makes that it is important to protect personnel and equipment form radiation, because they have many chance to treat radioactive material. The head office on a prevention and an emergency measure for a radioactive release is necessary. In this study, display device for radioactive information using wireless communication has been developed to display a radioactivity using radio frequency modem. Therefore, the unlocated head office can be operated in a portable environment using a notebook PC or a compact display device. Korea Atomic Energy Research Institute, which runs a research reactor, HANARO, needs the head office on a prevention and an emergency measure for a radioactive release. The display device for radioactive information using wireless communication to be developed in this study, can be used to the head office as a display device not to pay additional cost. This study has developed the display device for radioactive information using wireless communication, Remote Radiation Display System(RRDS), which transmits every 10 second a radioactive information to be displayed to RMT(Radiation Monitoring Terminal) of Radiation Monitoring System in HANARO. In this study, first, a configuration of hardware and software in HANARO RMS has been reviewed. Second, a RS-2322C serial communication program to transmit a radioactive information in HARARO RMS to RRDS using radio frequency modem has been developed. Finally, a RS-2322C serial communication program to receive a radioactive information in HANARO RMS from RRDS using radio frequency modem and GUI program to display the received information to RRDS has been developed. (author). 19 refs., 3 tabs., 25 figs

  17. Security of Mobile Devices and Wi-Fi Networks

    OpenAIRE

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  18. Telemedicine Based on Mobile Devices and Mobile Cloud Computing

    OpenAIRE

    Lidong Wang; Cheryl Ann Alexander

    2014-01-01

    Mobile devices such as smartphones and tablets support kinds of mobile computing and services. They can access to the cloud or offload the computation-intensive part to the cloud computing resources. Mobile cloud computing (MCC) integrates the cloud computing into the mobile environment, which extends mobile devices’ battery lifetime, improves their data storage capacity and processing power, and improves their reliability and information security. In this paper, the applications of smartphon...

  19. Investigation of Unequal Planar Wireless Electricity Device for Efficient Wireless Power Transfer

    Directory of Open Access Journals (Sweden)

    M. H. Mohd Salleh

    2017-04-01

    Full Text Available This article focuses on the design and investigation of a pair of unequally sized wireless electricity (Witricity devices that are equipped with integrated planar coil strips. The proposed pair of devices consists of two different square-shaped resonator sizes of 120 mm × 120 mm and 80 mm × 80 mm, acting as a transmitter and receiver, respectively. The devices are designed, simulated and optimized using the CST Microwave Studio software prior to being fabricated and verified using a vector network analyzer (VNA. The surface current results of the coupled devices indicate a good current density at 10 mm to 30 mm distance range. This good current density demonstrates that the coupled devices’ surface has more electric current per unit area, which leads to a good performance up to 30 mm range. Hence, the results also reveal good coupling efficiency between the coupled devices, which is approximately 54.5% at up to a 30 mm distance, with both devices axially aligned. In addition, a coupling efficiency of 50% is achieved when a maximum lateral misalignment (LM of 10 mm, and a varied angular misalignment (AM from 0° to 40° are implemented to the proposed device.

  20. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents.

    Science.gov (United States)

    Wu, Chunxue; Wu, Wenliang; Wan, Caihua; Bekkering, Ernst; Xiong, Naixue

    2017-11-03

    Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  1. 3G, 4G and beyond bringing networks, devices and the web together

    CERN Document Server

    Sauter, Martin

    2012-01-01

    Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile devices, voice and multimedia services and the mobile web 2.0.  Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.  It discusses how these elements strongly influence each other and how network ca

  2. Mobile Web for Pervasive environments - design webexperiences for multiple mobile devices

    DEFF Research Database (Denmark)

    Hansen, Thomas Riisgaard

    2008-01-01

    In this paper we present an architecture for designing web pages that uses multiple mobile and stationary devices to present web content. The architecture extends standard web technology with a number of functions for expressing how web content might migrate and use multiple displays....... The architecture is developed to support desktop applications, but in this paper we describe how the architecture can be extended to mobile devices by using AJAX technology. The paper also presents an implementation and presents a number of applications for mobile devices developed with this framework....

  3. Joint Mobile Data Collection and Wireless Energy Transfer in Wireless Rechargeable Sensor Networks.

    Science.gov (United States)

    Zhong, Ping; Li, Ya-Ting; Liu, Wei-Rong; Duan, Gui-Hua; Chen, Ying-Wen; Xiong, Neal

    2017-08-16

    In wireless rechargeable sensor networks (WRSNs), there is a way to use mobile vehicles to charge node and collect data. It is a rational pattern to use two types of vehicles, one is for energy charging, and the other is for data collecting. These two types of vehicles, data collection vehicles (DCVs) and wireless charging vehicles (WCVs), are employed to achieve high efficiency in both data gathering and energy consumption. To handle the complex scheduling problem of multiple vehicles in large-scale networks, a twice-partition algorithm based on center points is proposed to divide the network into several parts. In addition, an anchor selection algorithm based on the tradeoff between neighbor amount and residual energy, named AS-NAE, is proposed to collect the zonal data. It can reduce the data transmission delay and the energy consumption for DCVs' movement in the zonal. Besides, we design an optimization function to achieve maximum data throughput by adjusting data rate and link rate of each node. Finally, the effectiveness of proposed algorithm is validated by numerical simulation results in WRSNs.

  4. Optimization of mobile IPv6-based handovers to support VoIP services in wireless heterogeneous networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    2007-01-01

    The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers. The durat......The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers...... at layer 3. Using analytical models, the authors evaluate MIPv4, MIPv6, fast MIPv6 (FMIPv6), and hierarchical MIPv6 (HMIPv6) and compare their performances in terms of handover delay for VoIP services. To optimize the handover delay, the authors propose to use the adaptive retransmission timer described...

  5. GSM module for wireless radiation monitoring system via SMS

    Science.gov (United States)

    Rahman, Nur Aira Abd; Hisyam Ibrahim, Noor; Lombigit, Lojius; Azman, Azraf; Jaafar, Zainudin; Arymaswati Abdullah, Nor; Hadzir Patai Mohamad, Glam

    2018-01-01

    A customised Global System for Mobile communication (GSM) module is designed for wireless radiation monitoring through Short Messaging Service (SMS). This module is able to receive serial data from radiation monitoring devices such as survey meter or area monitor and transmit the data as text SMS to a host server. It provides two-way communication for data transmission, status query, and configuration setup. The module hardware consists of GSM module, voltage level shifter, SIM circuit and Atmega328P microcontroller. Microcontroller provides control for sending, receiving and AT command processing to GSM module. The firmware is responsible to handle task related to communication between device and host server. It process all incoming SMS, extract, and store new configuration from Host, transmits alert/notification SMS when the radiation data reach/exceed threshold value, and transmits SMS data at every fixed interval according to configuration. Integration of this module with radiation survey/monitoring device will create mobile and wireless radiation monitoring system with prompt emergency alert at high-level radiation.

  6. Towards Scalable Graph Computation on Mobile Devices.

    Science.gov (United States)

    Chen, Yiqi; Lin, Zhiyuan; Pienta, Robert; Kahng, Minsuk; Chau, Duen Horng

    2014-10-01

    Mobile devices have become increasingly central to our everyday activities, due to their portability, multi-touch capabilities, and ever-improving computational power. Such attractive features have spurred research interest in leveraging mobile devices for computation. We explore a novel approach that aims to use a single mobile device to perform scalable graph computation on large graphs that do not fit in the device's limited main memory, opening up the possibility of performing on-device analysis of large datasets, without relying on the cloud. Based on the familiar memory mapping capability provided by today's mobile operating systems, our approach to scale up computation is powerful and intentionally kept simple to maximize its applicability across the iOS and Android platforms. Our experiments demonstrate that an iPad mini can perform fast computation on large real graphs with as many as 272 million edges (Google+ social graph), at a speed that is only a few times slower than a 13″ Macbook Pro. Through creating a real world iOS app with this technique, we demonstrate the strong potential application for scalable graph computation on a single mobile device using our approach.

  7. Towards Scalable Graph Computation on Mobile Devices

    Science.gov (United States)

    Chen, Yiqi; Lin, Zhiyuan; Pienta, Robert; Kahng, Minsuk; Chau, Duen Horng

    2015-01-01

    Mobile devices have become increasingly central to our everyday activities, due to their portability, multi-touch capabilities, and ever-improving computational power. Such attractive features have spurred research interest in leveraging mobile devices for computation. We explore a novel approach that aims to use a single mobile device to perform scalable graph computation on large graphs that do not fit in the device's limited main memory, opening up the possibility of performing on-device analysis of large datasets, without relying on the cloud. Based on the familiar memory mapping capability provided by today's mobile operating systems, our approach to scale up computation is powerful and intentionally kept simple to maximize its applicability across the iOS and Android platforms. Our experiments demonstrate that an iPad mini can perform fast computation on large real graphs with as many as 272 million edges (Google+ social graph), at a speed that is only a few times slower than a 13″ Macbook Pro. Through creating a real world iOS app with this technique, we demonstrate the strong potential application for scalable graph computation on a single mobile device using our approach. PMID:25859564

  8. Get Mobile – The Smartphone Brain Scanner

    DEFF Research Database (Denmark)

    Stahlhut, Carsten; Stopczynski, Arkadiusz; Petersen, Michael Kai

    This demonstration will provide live-interaction with a smartphone brain scanner consisting of a low-cost wireless 14-channel EEG headset (Emotiv Epoc) and a mobile device. With our system it is possible to perform real-time functional brain imaging on a smartphone device, including stimulus...

  9. LWAs computational platform for e-consultation using mobile devices: cases from developing nations.

    Science.gov (United States)

    Olajubu, Emmanuel Ajayi; Odukoya, Oluwatoyin Helen; Akinboro, Solomon Adegbenro

    2014-01-01

    Mobile devices have been impacting on human standard of living by providing timely and accurate information anywhere and anytime through wireless media in developing nations. Shortage of experts in medical fields is very obvious throughout the whole world but more pronounced in developing nations. Thus, this study proposes a telemedicine platform for the vulnerable areas of developing nations. The vulnerable area are the interior with little or no medical facilities, hence the dwellers are very susceptible to sicknesses and diseases. The framework uses mobile devices that can run LightWeight Agents (LWAs) to send consultation requests to a remote medical expert in urban city from the vulnerable interiors. The feedback is conveyed to the requester through the same medium. The system architecture which contained AgenRoller, LWAs, The front-end (mobile devices) and back-end (the medical server) is presented. The algorithm for the software component of the architecture (AgenRoller) is also presented. The system is modeled as M/M/1/c queuing system, and simulated using Simevents from MATLAB Simulink environment. The simulation result presented show the average queue length, the number of entities in the queue and the number of entities departure from the system. These together present the rate of information processing in the system. A full scale development of this system with proper implementation will help extend the few medical facilities available in the urban cities in developing nations to the interiors thereby reducing the number of casualties in the vulnerable areas of the developing world especially in Sub Saharan Africa.

  10. Mobile devices a practical guide for librarians

    CERN Document Server

    Rawlins, Ben

    2014-01-01

    As more users expect to use their mobile devices, librarians will want and need to develop the necessary skills to reach this growing user base. Mobile Devices: A Practical Guide for Librarians will aid libraries and librarians as they go through the process of planning, developing, implementing, marketing, and evaluating mobile services.

  11. Distributed Water Pollution Source Localization with Mobile UV-Visible Spectrometer Probes in Wireless Sensor Networks.

    Science.gov (United States)

    Ma, Junjie; Meng, Fansheng; Zhou, Yuexi; Wang, Yeyao; Shi, Ping

    2018-02-16

    Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible) spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO) procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.

  12. Student Use of Mobile Devices in University Lectures

    Science.gov (United States)

    Roberts, Neil; Rees, Michael

    2014-01-01

    Mobile devices are increasingly used by students in university lectures. This has resulted in controversy and the banning of mobile devices in some lectures. Although there has been some research into how students use laptop computers in lectures, there has been little investigation into the wider use of mobile devices. This study was designed to…

  13. Development of an extremely compact impedance-based wireless sensing device

    International Nuclear Information System (INIS)

    Overly, Timothy G S; Park, Gyuhae; Farinholt, Kevin M; Farrar, Charles R

    2008-01-01

    This paper describes the development of the next generation of an extremely compact, wireless impedance sensor node for use in structural health monitoring (SHM) and piezoelectric active-sensor self-diagnostics. The sensor node uses a recently developed, low-cost integrated circuit that can measure and record the electrical impedance of a piezoelectric transducer. The sensor node also integrates several components, including a microcontroller for local computing, telemetry for wirelessly transmitting data, multiplexers for managing up to seven piezoelectric transducers per node, energy harvesting and storage mediums, and a wireless triggering circuit into one package to truly realize a comprehensive, self-contained wireless active-sensor node for various SHM applications. It is estimated that the developed sensor node requires less than 60 mW of total power for measurement, computation, and transmission. In addition, the sensor node is equipped with active-sensor self-diagnostic capabilities that can monitor the condition of piezoelectric transducers used in SHM applications. The performance of this miniaturized device is compared to our previous results and its broader capabilities are demonstrated

  14. [Mobile phone-computer wireless interactive graphics transmission technology and its medical application].

    Science.gov (United States)

    Huang, Shuo; Liu, Jing

    2010-05-01

    Application of clinical digital medical imaging has raised many tough issues to tackle, such as data storage, management, and information sharing. Here we investigated a mobile phone based medical image management system which is capable of achieving personal medical imaging information storage, management and comprehensive health information analysis. The technologies related to the management system spanning the wireless transmission technology, the technical capabilities of phone in mobile health care and management of mobile medical database were discussed. Taking medical infrared images transmission between phone and computer as an example, the working principle of the present system was demonstrated.

  15. On the Querying for Places on the Mobile Web

    DEFF Research Database (Denmark)

    Jensen, Christian S.

    2011-01-01

    The web is undergoing a fundamental transformation: it is becoming mobile and is acquiring a spatial dimension. Thus, the web is increasingly being used from mobile devices, notably smartphones, that can be geo-positioned using GPS or technologies that exploit wireless communication networks...

  16. A Mobile Localization Strategy for Wireless Sensor Network in NLOS Conditions

    Institute of Scientific and Technical Information of China (English)

    Long Cheng; Yan Wang; Xingming Sun; Nan Hu; Jian Zhang

    2016-01-01

    The problem of mobile localization for wireless sensor network has attracted considerable attention in recent years.The localization accuracy will drastically grade in non-line of sight (NLOS) conditions.In this paper,we propose a mobile localization strategy based on Kalman filter.The key technologies for the proposed method are the NLOS identification and mitigation.The proposed method does not need the prior knowledge of the NLOS error and it is independent of the physical measurement ways.Simulation results show that the proposed method owns the higher localization accuracy when compared with other methods.

  17. Mobile Learning Devices. Essentials for Principals

    Science.gov (United States)

    Rogers, Kipp D.

    2011-01-01

    In "Mobile Learning Devices," the author helps educators confront and overcome their fears and doubts about using mobile learning devices (MLDs) such as cell phones, personal digital assistants, MP3 players, handheld games, digital audio players, and laptops in classrooms. School policies that ban such tools are outdated, the author suggests;…

  18. Five Tips for Managing Mobile Devices

    Science.gov (United States)

    Tucker, Catlin

    2015-01-01

    The author, an outspoken advocate for using technology in the classroom, knows how important it is to establish expectations for responsible use of mobile devices. She's found that five strategies help ensure that mobile devices enhance, rather than distract from, learning. Teachers need to establish new norms that clarify responsible use,…

  19. Midfield wireless powering of subwavelength autonomous devices.

    Science.gov (United States)

    Kim, Sanghoek; Ho, John S; Poon, Ada S Y

    2013-05-17

    We obtain an analytical bound on the efficiency of wireless power transfer to a weakly coupled device. The optimal source is solved for a multilayer geometry in terms of a representation based on the field equivalence principle. The theory reveals that optimal power transfer exploits the properties of the midfield to achieve efficiencies far greater than conventional coil-based designs. As a physical realization of the source, we present a slot array structure whose performance closely approaches the theoretical bound.

  20. Security Issues for Mobile Medical Imaging: A Primer.

    Science.gov (United States)

    Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George

    2015-10-01

    The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.

  1. Wireless, low-cost, FPGA-based miniature gamma ray spectrometer

    Energy Technology Data Exchange (ETDEWEB)

    Becker, E.M., E-mail: beckere@engr.orst.edu; Farsoni, A.T.

    2014-10-11

    A compact, low-cost, wireless gamma-ray spectrometer is a tool sought by a number of different organizations in the field of radiation detection. Such a device has applications in emergency response, battlefield assessment, and personal dosimetry. A prototype device fitting this description has been constructed in the Advanced Radiation Instrumentation Laboratory at Oregon State University. The prototype uses a CsI(Tl) scintillator coupled to a solid-state photomultiplier and a 40 MHz, 12-bit, FPGA-based digital pulse processor to measure gamma radiation, and is able to be accessed wirelessly by mobile phone. The prototype device consumes roughly 420 mW, weighs about 28 g (not including battery), and measures 2.54×3.81 cm{sup 2}. The prototype device is able to achieve 5.9% FWHM energy resolution at 662 keV.

  2. Addressing the Influence of Hidden State on Wireless Network Optimizations using Performance Maps

    DEFF Research Database (Denmark)

    Højgaard-Hansen, Kim; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2015-01-01

    be used to optimize the use of the wireless net- work by predicting future network performance and scheduling the net- work communication for certain applications on mobile devices. However, other important factors influence the performance of the wireless communication such as changes in the propagation...... environment and resource sharing. In this work we extend the framework of performance maps for wireless networks by introducing network state as an abstraction for all other factors than location that influence the performance. Since network state might not always be directly observable the framework......Performance of wireless connectivity for network client devices is location dependent. It has been shown that it can be beneficial to collect network performance metrics along with location information to generate maps of the location dependent network performance. These performance maps can...

  3. Efficient Signature Based Malware Detection on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Deepak Venugopal

    2008-01-01

    Full Text Available The threat of malware on mobile devices is gaining attention recently. It is important to provide security solutions to these devices before these threats cause widespread damage. However, mobile devices have severe resource constraints in terms of memory and power. Hence, even though there are well developed techniques for malware detection on the PC domain, it requires considerable effort to adapt these techniques for mobile devices. In this paper, we outline the considerations for malware detection on mobile devices and propose a signature based malware detection method. Specifically, we detail a signature matching algorithm that is well suited for use in mobile device scanning due to its low memory requirements. Additionally, the matching algorithm is shown to have high scanning speed which makes it unobtrusive to users. Our evaluation and comparison study with the well known Clam-AV scanner shows that our solution consumes less than 50% of the memory used by Clam-AV while maintaining a fast scanning rate.

  4. Mobility and Heterogeneity Aware Cluster-Based Data Aggregation for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    Internet of things (IoT) is the modern era, which offers a variety of novel applications for mobile targets and opens the new domains for the distributed data aggregations using Wireless Sensor Networks (WSNs). However, low cost tiny sensors used for network formation generate the large amount...

  5. A Survey on Security, Privacy and Trust in Mobile Crowdsourcing

    OpenAIRE

    Feng, Wei; Yan, Zheng; Zhang, Hengrun; Zeng, Kai; Xiao, Yu; Hou, Thomas

    2017-01-01

    With the popularity of sensor-rich mobile devices (e.g., smart phones and wearable devices), Mobile Crowdsourcing (MCS) has emerged as an effective method for data collection and processing. Compared with traditional Wireless Sensor Networking (WSN), MCS holds many advantages such as mobility, scalability, cost-efficiency, and human intelligence. However, MCS still faces many challenges with regard to security, privacy and trust. This paper provides a survey of these challenges and discusses ...

  6. ISSUES IN MOBILE DISTRIBUTED REAL TIME DATABASES: PERFORMANCE AND REVIEW

    OpenAIRE

    VISHNU SWAROOP,; Gyanendra Kumar Gupta,; UDAI SHANKER

    2011-01-01

    Increase in handy and small electronic devices in computing fields; it makes the computing more popularand useful in business. Tremendous advances in wireless networks and portable computing devices have led to development of mobile computing. Support of real time database system depending upon thetiming constraints, due to availability of data distributed database, and ubiquitous computing pull the mobile database concept, which emerges them in a new form of technology as mobile distributed ...

  7. Packets with deadlines a framework for real-time wireless networks

    CERN Document Server

    Hou, I-Hong

    2013-01-01

    With the explosive increase in the number of mobile devices and applications, it is anticipated that wireless traffic will increase exponentially in the coming years. Moreover, future wireless networks all carry a wide variety of flows, such as video streaming, online gaming, and VoIP, which have various quality of service (QoS) requirements. Therefore, a new mechanism that can provide satisfactory performance to the complete variety of all kinds of flows, in a coherent and unified framework, is needed.In this book, we introduce a framework for real-time wireless networks. This consists of a m

  8. MOBILE DEVICES AND EFFECTIVE INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    2013-05-01

    Full Text Available Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc. all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.

  9. A Double-Negative Metamaterial-Inspired Mobile Wireless Antenna for Electromagnetic Absorption Reduction.

    Science.gov (United States)

    Alam, Touhidul; Faruque, Mohammad Rashed Iqbal; Islam, Mohammad Tariqul

    2015-07-29

    A double-negative metamaterial-inspired antenna is presented for mobile wireless applications. The antenna consists of a semi-circular radiating patch and a 3 × 4 hexagonal shaped metamaterial unit cell array in the ground plane. The antenna is fed with a 50 Ω microstrip feed line. The electric dimensions of the proposed antenna are 0.20λ × 0.26λ × 0.004λ, at the low-end frequency. The proposed antenna achieves a -10 dB impedance with a bandwidth of 2.29 GHz at the lower band and 1.28 GHz at the upper band and can operate for most of the mobile applications such as upper GSM bands, WiMAX, Bluetooth, and wireless local area network (WLAN) frequency bands. The focused novelties of the proposed antenna are its small size, multi-standard operating bands, and electromagnetic absorption reduction at all the operating frequencies using the double-negative metamaterial ground plane.

  10. Data mining mobile devices

    CERN Document Server

    Mena, Jesus

    2013-01-01

    With today's consumers spending more time on their mobiles than on their PCs, new methods of empirical stochastic modeling have emerged that can provide marketers with detailed information about the products, content, and services their customers desire.Data Mining Mobile Devices defines the collection of machine-sensed environmental data pertaining to human social behavior. It explains how the integration of data mining and machine learning can enable the modeling of conversation context, proximity sensing, and geospatial location throughout large communities of mobile users

  11. Cooperative Mobile Web Browsing

    DEFF Research Database (Denmark)

    Perrucci, GP; Fitzek, FHP; Zhang, Qi

    2009-01-01

    This paper advocates a novel approach for mobile web browsing based on cooperation among wireless devices within close proximity operating in a cellular environment. In the actual state of the art, mobile phones can access the web using different cellular technologies. However, the supported data......-range links can then be used for cooperative mobile web browsing. By implementing the cooperative web browsing on commercial mobile phones, it will be shown that better performance is achieved in terms of increased data rate and therefore reduced access times, resulting in a significantly enhanced web...

  12. Mobile computing handbook

    CERN Document Server

    Ilyas, Mohammad

    2004-01-01

    INTRODUCTION AND APPLICATIONS OF MOBILE COMPUTING Wearable Computing,A. Smailagic and D.P. Siewiorek Developing Mobile Applications: A Lime Primer,G.P. Picco, A.L. Murphy, and G.-C. Roman Pervasive Application Development: Approaches and Pitfalls,G. Banavar, N. Cohen, and D. Soroker ISAM, Joining Context-Awareness and Mobility to Building Pervasive Applications,I. Augustin, A. Corrêa Yamin, J.L. Victória Barbosa, L. Cavalheiro da Silva, R. Araújo Real, G. Frainer, G.G. Honrich Cavalheiro, and C.F. Resin Geyer Integrating Mobile Wireless Devices into the Computational Grid,T. Phan, L. Huan

  13. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network

    OpenAIRE

    Bush, Stephen F.

    1999-01-01

    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dyna...

  14. TinyMAPS : a lightweight Java-based mobile agent system for wireless sensor networks

    NARCIS (Netherlands)

    Aiello, F.; Fortino, G.; Galzarano, S.; Vittorioso, A.; Brazier, F.M.T.; Nieuwenhuis, K.; Pavlin, G.; Warnier, M.; Badica, C.

    2012-01-01

    In the context of the development of wireless sensor network (WSN) applications, effective programming frameworks and middlewares for rapid and efficient prototyping of resource-constrained applications are highly required. Mobile agents are an effective distributed programming paradigm that is

  15. Mobility devices to promote activity and participation

    DEFF Research Database (Denmark)

    Salminen, Anna-Liisa; Brandt, Ase; Samuelsson, Kersti A M

    2009-01-01

    were included if they covered both baseline and follow-up data and focused on activity and participation. Study participants had to be aged over 18 years with mobility limitations. Mobility device interventions encompassed crutches, walking frames, rollators, manual wheelchairs and powered wheelchairs......, and 3 follow-up studies that included before and after data. Two studies dealt with the effects of powered wheelchair interventions and the other studies with various other types of mobility device. Two studies were of high, internal and external methodological quality. Interventions were found......OBJECTIVE: To determine the effectiveness of mobility device interventions in terms of activity and participation for people with mobility limitations. DESIGN: Systematic review. Search of 7 databases during the period 1996 to 2008. METHODS: Controlled studies and non-controlled follow-up studies...

  16. An approach for management of mobile devices in pharmaceutical company

    OpenAIRE

    Prešeren, Tadej

    2008-01-01

    The areas of the mobile device management is developing very fast. Hence, the thesis “An approach for management of mobile devices in pharmaceutical company” introduces all key directives that should be considered when implementing mobile device management. A survey of standards and recommendations on the mobile device security has been elaborated. Relevant guidelines for security policy definition are presented with the risk analysis for mobile device usage. Furthermore, the model for mana...

  17. Trustworthy execution on mobile devices

    CERN Document Server

    Vasudevan, Amit; Newsome, James

    2013-01-01

    This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

  18. Middle School Student Perceptions and Actual Use of Mobile Devices: Highlighting Disconnects in Student Planned and Actual Usage of Mobile Devices in Class

    Science.gov (United States)

    Bartholomew, Scott R.; Reeve, Edward

    2018-01-01

    Discussion surrounding the inclusion of mobile devices in K-12 classrooms has escalated since the early 2000s, and the literature base dedicated to mobile devices, mobile-learning, and e-learning has likewise grown. The majority of the research related to mobile devices and their inclusion in educational settings has largely revolved around…

  19. Wireless device connection problems and design solutions

    Science.gov (United States)

    Song, Ji-Won; Norman, Donald; Nam, Tek-Jin; Qin, Shengfeng

    2016-09-01

    Users, especially the non-expert users, commonly experience problems when connecting multiple devices with interoperability. While studies on multiple device connections are mostly concentrated on spontaneous device association techniques with a focus on security aspects, the research on user interaction for device connection is still limited. More research into understanding people is needed for designers to devise usable techniques. This research applies the Research-through-Design method and studies the non-expert users' interactions in establishing wireless connections between devices. The "Learning from Examples" concept is adopted to develop a study focus line by learning from the expert users' interaction with devices. This focus line is then used for guiding researchers to explore the non-expert users' difficulties at each stage of the focus line. Finally, the Research-through-Design approach is used to understand the users' difficulties, gain insights to design problems and suggest usable solutions. When connecting a device, the user is required to manage not only the device's functionality but also the interaction between devices. Based on learning from failures, an important insight is found that the existing design approach to improve single-device interaction issues, such as improvements to graphical user interfaces or computer guidance, cannot help users to handle problems between multiple devices. This study finally proposes a desirable user-device interaction in which images of two devices function together with a system image to provide the user with feedback on the status of the connection, which allows them to infer any required actions.

  20. Frequency-agile antennas for wireless communications

    CERN Document Server

    Petosa, Aldo

    2013-01-01

    Mobile data subscriptions are expected to more than double and mobile wireless traffic to increase by more than tenfold over the next few years. Proliferation of smart phones, tablets, and other portable devices are placing greater demands for services such as web browsing, global positioning, video streaming, and video telephony. Many of the proposed solutions to deal with these demands will have a significant impact on antenna designs. Antennas with frequency agility are considered a promising technology to help implement these new solutions.This book provides readers with a sense of the cap

  1. Poster: Virtual reality interaction using mobile devices

    KAUST Repository

    Aseeri, Sahar A.

    2013-03-01

    In this work we aim to implement and evaluate alternative approaches for interacting with virtual environments on mobile devices for navigation, object selection and manipulation. Interaction with objects in virtual worlds using traditional input such as current state-of-the-art devices is often difficult and could diminish the immersion and sense of presence when it comes to 3D virtual environment tasks. We have developed new methods to perform different kinds of interactions using a mobile device (e.g. a smartphone) both as input device, performing selection and manipulation of objects, and as output device, utilizing the screen as an extra view (virtual camera or information display). Our hypothesis is that interaction via mobile devices facilitates simple tasks like the ones described within immersive virtual reality systems. We present here our initial implementation and result. © 2013 IEEE.

  2. Mobile devices tools and technologies

    CERN Document Server

    Collins, Lauren

    2015-01-01

    Mobile Devices: Tools and Technologies provides readers with an understanding of the mobile landscape available to app developers, system and network engineers, and the avid techie. As the trend of mobile technology has enabled the continuous development of ubiquitous applications, this book offers insights into tools and technologies critical to evaluating and implementing mobile strategies.The book is organized into four parts of 18 contributed chapters written by engineers in the areas of application and database development, mobile enterprise strategy, and networking and security. Througho

  3. Mining Users Mobility at Public Transportation

    Directory of Open Access Journals (Sweden)

    joao ferreira

    2017-02-01

    Full Text Available In this research work we propose a new approach to estimate the number of passengers in a public transportation and determinate the users’ route path based on a passive approach without user intervention. The method is based on the probe requests of users mobile device through the collected data in wireless access point. This data is manipulated to extract the information about the numbers of users with mobile devices and track their route path and time. This data can be manipulated to extract useful knowledge related with users’ habits at public transportation and extract user mobility patterns.

  4. 78 FR 8191 - Certain Wireless Devices With 3G and/or 4G Capabilities and Components Thereof; Institution of...

    Science.gov (United States)

    2013-02-05

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-868] Certain Wireless Devices With 3G and... importation, and the sale within the United States after importation of certain wireless devices with 3G and... devices with 3G and/or 4G capabilities and components thereof by reason of infringement of one or more of...

  5. Mobile Device Encryption Systems

    OpenAIRE

    Teufl , Peter; Zefferer , Thomas; Stromberger , Christof

    2013-01-01

    Part 4: Software Security; International audience; The initially consumer oriented iOS and Android platforms, and the newly available Windows Phone 8 platform start to play an important role within business related areas. Within the business context, the devices are typically deployed via mobile device management (MDM) solutions, or within the bring-your-own-device (BYOD) context. In both scenarios, the security depends on many platform security functions, such as permission systems, manageme...

  6. Diagnostic Accuracy of microEEG: A Miniature, Wireless EEG Device

    OpenAIRE

    Grant, Arthur C.; Abdel-Baki, Samah G.; Omurtag, Ahmet; Sinert, Richard; Chari, Geetha; Malhotra, Schweta; Weedon, Jeremy; Fenton, Andre A.; Zehtabchi, Shahriar

    2014-01-01

    Measuring the diagnostic accuracy (DA) of an EEG device is unconventional and complicated by imperfect interrater reliability. We sought to compare the DA of a miniature, wireless, battery-powered EEG device (“microEEG”) to a reference EEG machine in emergency department (ED) patients with altered mental status (AMS). 225 ED patients with AMS underwent 3 EEGs. EEG1 (Nicolet Monitor, “reference”) and EEG2 (microEEG) were recorded simultaneously with EEG cup electrodes using a signal splitter. ...

  7. Data transport and management in P2P Data Management in Mobile Wireless Sensor Network

    International Nuclear Information System (INIS)

    Sahar, S.; Shaikh, F.K.

    2013-01-01

    The rapid growth in wireless technologies has made wireless communication an important source for transporting data across different domains. In the same way, there are possibilities of many potential applications that can be deployed using WSNs (Wireless Sensor Networks). However, very limited applications are deployed in real life due to the uncertainty and dynamics of the environment and scare resources. This makes data management in WSN a challenging area to find an approach that suits its characteristics. Currently, the trend is to find efficient data management schemes using evolving technologies, i.e. P2P (Peer-to-Peer) systems. Many P2P approaches have been applied in WSNs to carry out the data management due to similarities between WSN and P2P. With the similarities, there are differences too that makes P2P protocols inefficient in WSNs. Furthermore, to increase the efficiency and to exploit the delay tolerant nature of WSNs, where ever possible, the mobile WSNs are gaining importance. Thus, creating a three dimensional problem space to consider, i.e. mobility, WSNs and P2P. In this paper, an efficient algorithm is proposed for data management using P2P techniques for mobile WSNs. The real world implementation and deployment of proposed algorithm is also presented. (author)

  8. Distributed Water Pollution Source Localization with Mobile UV-Visible Spectrometer Probes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junjie Ma

    2018-02-01

    Full Text Available Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.

  9. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents

    Directory of Open Access Journals (Sweden)

    Chunxue Wu

    2017-11-01

    Full Text Available Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  10. Use of mobile devices for medical imaging.

    Science.gov (United States)

    Hirschorn, David S; Choudhri, Asim F; Shih, George; Kim, Woojin

    2014-12-01

    Mobile devices have fundamentally changed personal computing, with many people forgoing the desktop and even laptop computer altogether in favor of a smaller, lighter, and cheaper device with a touch screen. Doctors and patients are beginning to expect medical images to be available on these devices for consultative viewing, if not actual diagnosis. However, this raises serious concerns with regard to the ability of existing mobile devices and networks to quickly and securely move these images. Medical images often come in large sets, which can bog down a network if not conveyed in an intelligent manner, and downloaded data on a mobile device are highly vulnerable to a breach of patient confidentiality should that device become lost or stolen. Some degree of regulation is needed to ensure that the software used to view these images allows all relevant medical information to be visible and manipulated in a clinically acceptable manner. There also needs to be a quality control mechanism to ensure that a device's display accurately conveys the image content without loss of contrast detail. Furthermore, not all mobile displays are appropriate for all types of images. The smaller displays of smart phones, for example, are not well suited for viewing entire chest radiographs, no matter how small and numerous the pixels of the display may be. All of these factors should be taken into account when deciding where, when, and how to use mobile devices for the display of medical images. Copyright © 2014 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  11. Extending the Limits of Wireless Power Transfer to Miniaturized Implantable Electronic Devices

    Directory of Open Access Journals (Sweden)

    Hugo Dinis

    2017-12-01

    Full Text Available Implantable electronic devices have been evolving at an astonishing pace, due to the development of fabrication techniques and consequent miniaturization, and a higher efficiency of sensors, actuators, processors and packaging. Implantable devices, with sensing, communication, actuation, and wireless power are of high demand, as they pave the way for new applications and therapies. Long-term and reliable powering of such devices has been a challenge since they were first introduced. This paper presents a review of representative state of the art implantable electronic devices, with wireless power capabilities, ranging from inductive coupling to ultrasounds. The different power transmission mechanisms are compared, to show that, without new methodologies, the power that can be safely transmitted to an implant is reaching its limit. Consequently, a new approach, capable of multiplying the available power inside a brain phantom for the same specific absorption rate (SAR value, is proposed. In this paper, a setup was implemented to quadruple the power available in the implant, without breaking the SAR limits. A brain phantom was used for concept verification, with both simulation and measurement data.

  12. Capacity of Heterogeneous Mobile Wireless Networks with D-Delay Transmission Strategy.

    Science.gov (United States)

    Wu, Feng; Zhu, Jiang; Xi, Zhipeng; Gao, Kai

    2016-03-25

    This paper investigates the capacity problem of heterogeneous wireless networks in mobility scenarios. A heterogeneous network model which consists of n normal nodes and m helping nodes is proposed. Moreover, we propose a D-delay transmission strategy to ensure that every packet can be delivered to its destination nodes with limited delay. Different from most existing network schemes, our network model has a novel two-tier architecture. The existence of helping nodes greatly improves the network capacity. Four types of mobile networks are studied in this paper: i.i.d. fast mobility model and slow mobility model in two-dimensional space, i.i.d. fast mobility model and slow mobility model in three-dimensional space. Using the virtual channel model, we present an intuitive analysis of the capacity of two-dimensional mobile networks and three-dimensional mobile networks, respectively. Given a delay constraint D, we derive the asymptotic expressions for the capacity of the four types of mobile networks. Furthermore, the impact of D and m to the capacity of the whole network is analyzed. Our findings provide great guidance for the future design of the next generation of networks.

  13. 47 CFR 95.1121 - Specific requirements for wireless medical telemetry devices operating in the 1395-1400 and 1427...

    Science.gov (United States)

    2010-10-01

    ... wireless medical telemetry devices operating in the 1395-1400 and 1427-1432 MHz bands. Due to the critical... 47 Telecommunication 5 2010-10-01 2010-10-01 false Specific requirements for wireless medical telemetry devices operating in the 1395-1400 and 1427-1432 MHz bands. 95.1121 Section 95.1121...

  14. Evidence Considerations for Mobile Devices in the Occupational Therapy Process

    Directory of Open Access Journals (Sweden)

    Kelly Erickson

    2015-04-01

    Full Text Available Mobile app-based device utilization, including smartphones and handheld tablets, suggests a need to evaluate evidence to guide selection and implementation of these devices in the occupational therapy process. The purpose of the research was to explore the current body of evidence in relation to mobile app-based devices and to identify factors in the use of these devices throughout the occupational therapy process. Following review of available occupational therapy profession guidelines, assistive technology literature, and available mobile device research, practitioners using mobile app-based devices in occupational therapy should consider three areas: client needs, practitioner competence, and device factors. The purpose of this guideline is to identify factors in the selection and use of mobile app-based devices throughout the occupational therapy process based on available evidence. Considerations for mobile device implementation during the occupational therapy process is addressed, including evaluating outcomes needs, matching device with the client, and identifying support needs of the client.

  15. Evolution of Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  16. Delivering Diagnostic Quality Video over Mobile Wireless Networks for Telemedicine

    Directory of Open Access Journals (Sweden)

    Sira P. Rao

    2009-01-01

    Full Text Available In real-time remote diagnosis of emergency medical events, mobility can be enabled by wireless video communications. However, clinical use of this potential advance will depend on definitive and compelling demonstrations of the reliability of diagnostic quality video. Because the medical domain has its own fidelity criteria, it is important to incorporate diagnostic video quality criteria into any video compression system design. To this end, we used flexible algorithms for region-of-interest (ROI video compression and obtained feedback from medical experts to develop criteria for diagnostically lossless (DL quality. The design of the system occurred in three steps-measurement of bit rate at which DL quality is achieved through evaluation of videos by medical experts, incorporation of that information into a flexible video encoder through the notion of encoder states, and an encoder state update option based on a built-in quality criterion. Medical experts then evaluated our system for the diagnostic quality of the video, allowing us to verify that it is possible to realize DL quality in the ROI at practical communication data transfer rates, enabling mobile medical assessment over bit-rate limited wireless channels. This work lays the scientific foundation for additional validation through prototyped technology, field testing, and clinical trials.

  17. Columnar transmitter based wireless power delivery system for implantable device in freely moving animals.

    Science.gov (United States)

    Eom, Kyungsik; Jeong, Joonsoo; Lee, Tae Hyung; Lee, Sung Eun; Jun, Sang Bum; Kim, Sung June

    2013-01-01

    A wireless power delivery system is developed to deliver electrical power to the neuroprosthetic devices that are implanted into animals freely moving inside the cage. The wireless powering cage is designed for long-term animal experiments without cumbersome wires for power supply or the replacement of batteries. In the present study, we propose a novel wireless power transmission system using resonator-based inductive links to increase power efficiency and to minimize the efficiency variations. A columnar transmitter coil is proposed to provide lateral uniformity of power efficiency. Using this columnar transmitter coil, only 7.2% efficiency fluctuation occurs from the maximum transmission efficiency of 25.9%. A flexible polymer-based planar type receiver coil is fabricated and assembled with a neural stimulator and an electrode. Using the designed columnar transmitter coil, the implantable device successfully operates while it moves freely inside the cage.

  18. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  19. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking

    DEFF Research Database (Denmark)

    Papadimitratos, P.; Poturalski, M.; Schaller, P.

    2008-01-01

    Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND......) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications....... Thus, providing methods to mitigate this vulnerability and secure ND is crucial. In this article we focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed...

  20. Performance analysis of offloading systems in mobile wireless environments

    NARCIS (Netherlands)

    Ou, S.; Yang, K.; Liotta, A.; Hu, L.

    2007-01-01

    Offloading is an approach to leverage the severity of resource constrained nature of mobile devices (such as PDAs, mobile phones) by migrating part of the computation of applications to some nearby resource-rich surrogates (e.g., desktop PCs, mobility support stations). It is an essential mechanism

  1. Multiuser Collaboration with Networked Mobile Devices

    Science.gov (United States)

    Tso, Kam S.; Tai, Ann T.; Deng, Yong M.; Becks, Paul G.

    2006-01-01

    In this paper we describe a multiuser collaboration infrastructure that enables multiple mission scientists to remotely and collaboratively interact with visualization and planning software, using wireless networked personal digital assistants(PDAs) and other mobile devices. During ground operations of planetary rover and lander missions, scientists need to meet daily to review downlinked data and plan science activities. For example, scientists use the Science Activity Planner (SAP) in the Mars Exploration Rover (MER) mission to visualize downlinked data and plan rover activities during the science meetings [1]. Computer displays are projected onto large screens in the meeting room to enable the scientists to view and discuss downlinked images and data displayed by SAP and other software applications. However, only one person can interact with the software applications because input to the computer is limited to a single mouse and keyboard. As a result, the scientists have to verbally express their intentions, such as selecting a target at a particular location on the Mars terrain image, to that person in order to interact with the applications. This constrains communication and limits the returns of science planning. Furthermore, ground operations for Mars missions are fundamentally constrained by the short turnaround time for science and engineering teams to process and analyze data, plan the next uplink, generate command sequences, and transmit the uplink to the vehicle [2]. Therefore, improving ground operations is crucial to the success of Mars missions. The multiuser collaboration infrastructure enables users to control software applications remotely and collaboratively using mobile devices. The infrastructure includes (1) human-computer interaction techniques to provide natural, fast, and accurate inputs, (2) a communications protocol to ensure reliable and efficient coordination of the input devices and host computers, (3) an application

  2. Mobile-IT Education (MIT.EDU): M-Learning Applications for Classroom Settings

    Science.gov (United States)

    Sung, M.; Gips, J.; Eagle, N.; Madan, A.; Caneel, R.; DeVaul, R.; Bonsen, J.; Pentland, A.

    2005-01-01

    In this paper, we describe the Mobile-IT Education (MIT.EDU) system, which demonstrates the potential of using a distributed mobile device architecture for rapid prototyping of wireless mobile multi-user applications for use in classroom settings. MIT.EDU is a stable, accessible system that combines inexpensive, commodity hardware, a flexible…

  3. Wireless communication of real-time ultrasound data and control

    Science.gov (United States)

    Tobias, Richard J.

    2015-03-01

    The Internet of Things (IoT) is expected to grow to 26 billion connected devices by 2020, plus the PC, smart phone, and tablet segment that includes mobile Health (mHealth) connected devices is projected to account for another 7.3 billion units by 2020. This paper explores some of the real-time constraints on the data-flow and control of a wireless connected ultrasound machine. The paper will define an ultrasound server and the capabilities necessary for real-time use of the device. The concept of an ultrasound server wirelessly (or over any network) connected to multiple lightweight clients on devices like an iPad, iPhone, or Android-based tablet, smartphone and other network-attached displays (i.e., Google Glass) is explored. Latency in the ultrasound data stream is one of the key areas to measure and to focus on keeping as small as possible (20 frames-per-second on a properly configured wireless network. The ultrasound server needs to be designed to accept multiple ultrasound data clients and multiple control clients. A description of the server and some of its key features will be described.

  4. A wireless power transmission system for implantable devices in freely moving rodents.

    Science.gov (United States)

    Eom, Kyungsik; Jeong, Joonsoo; Lee, Tae Hyung; Kim, Jinhyung; Kim, Junghoon; Lee, Sung Eun; Kim, Sung June

    2014-08-01

    Reliable wireless power delivery for implantable devices in animals is highly desired for safe and effective experimental use. Batteries require frequent replacement; wired connections are inconvenient and unsafe, and short-distance inductive coupling requires the attachment of an exterior transmitter to the animal's body. In this article, we propose a solution by which animals with implantable devices can move freely without attachments. Power is transmitted using coils attached to the animal's cage and is received by a receiver coil implanted in the animal. For a three-dimensionally uniform delivery of power, we designed a columnar dual-transmitter coil configuration. A resonator-based inductive link was adopted for efficient long-range power delivery, and we used a novel biocompatible liquid crystal polymer substrate as the implantable receiver device. Using this wireless power delivery system, we obtain an average power transfer efficiency of 15.2% (minimum efficiency of 10% and a standard deviation of 2.6) within a cage of 15×20×15 cm3.

  5. Parallel Processing of Images in Mobile Devices using BOINC

    Science.gov (United States)

    Curiel, Mariela; Calle, David F.; Santamaría, Alfredo S.; Suarez, David F.; Flórez, Leonardo

    2018-04-01

    Medical image processing helps health professionals make decisions for the diagnosis and treatment of patients. Since some algorithms for processing images require substantial amounts of resources, one could take advantage of distributed or parallel computing. A mobile grid can be an adequate computing infrastructure for this problem. A mobile grid is a grid that includes mobile devices as resource providers. In a previous step of this research, we selected BOINC as the infrastructure to build our mobile grid. However, parallel processing of images in mobile devices poses at least two important challenges: the execution of standard libraries for processing images and obtaining adequate performance when compared to desktop computers grids. By the time we started our research, the use of BOINC in mobile devices also involved two issues: a) the execution of programs in mobile devices required to modify the code to insert calls to the BOINC API, and b) the division of the image among the mobile devices as well as its merging required additional code in some BOINC components. This article presents answers to these four challenges.

  6. Parallel Processing of Images in Mobile Devices using BOINC

    Directory of Open Access Journals (Sweden)

    Curiel Mariela

    2018-04-01

    Full Text Available Medical image processing helps health professionals make decisions for the diagnosis and treatment of patients. Since some algorithms for processing images require substantial amounts of resources, one could take advantage of distributed or parallel computing. A mobile grid can be an adequate computing infrastructure for this problem. A mobile grid is a grid that includes mobile devices as resource providers. In a previous step of this research, we selected BOINC as the infrastructure to build our mobile grid. However, parallel processing of images in mobile devices poses at least two important challenges: the execution of standard libraries for processing images and obtaining adequate performance when compared to desktop computers grids. By the time we started our research, the use of BOINC in mobile devices also involved two issues: a the execution of programs in mobile devices required to modify the code to insert calls to the BOINC API, and b the division of the image among the mobile devices as well as its merging required additional code in some BOINC components. This article presents answers to these four challenges.

  7. Device-Centric Monitoring for Mobile Device Management

    Directory of Open Access Journals (Sweden)

    Luke Chircop

    2016-03-01

    Full Text Available The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centric properties (e.g. the user may not send more than 100 messages per day across all applications being difficult or impossible to verify. In this paper we present a device-centric approach to runtime verify the device behaviour against a device policy with the different applications acting as independent components contributing to the overall behaviour of the device. We also present an implementation for Android devices, and evaluate it on a number of device-centric policies, reporting the empirical results obtained.

  8. Multi-Source Cooperative Data Collection with a Mobile Sink for the Wireless Sensor Network.

    Science.gov (United States)

    Han, Changcai; Yang, Jinsheng

    2017-10-30

    The multi-source cooperation integrating distributed low-density parity-check codes is investigated to jointly collect data from multiple sensor nodes to the mobile sink in the wireless sensor network. The one-round and two-round cooperative data collection schemes are proposed according to the moving trajectories of the sink node. Specifically, two sparse cooperation models are firstly formed based on geographical locations of sensor source nodes, the impairment of inter-node wireless channels and moving trajectories of the mobile sink. Then, distributed low-density parity-check codes are devised to match the directed graphs and cooperation matrices related with the cooperation models. In the proposed schemes, each source node has quite low complexity attributed to the sparse cooperation and the distributed processing. Simulation results reveal that the proposed cooperative data collection schemes obtain significant bit error rate performance and the two-round cooperation exhibits better performance compared with the one-round scheme. The performance can be further improved when more source nodes participate in the sparse cooperation. For the two-round data collection schemes, the performance is evaluated for the wireless sensor networks with different moving trajectories and the variant data sizes.

  9. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taegwon Jeong

    2011-05-01

    Full Text Available Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP, the Weighted-based Adaptive Clustering Algorithm (WACA, and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM. The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  10. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  11. Design and Implementation of Mobile Car with Wireless Video Monitoring System Based on STC89C52

    Directory of Open Access Journals (Sweden)

    Yang Hong

    2014-05-01

    Full Text Available With the rapid development of wireless networks and image acquisition technology, wireless video transmission technology has been widely applied in various communication systems. The traditional video monitoring technology is restricted by some conditions such as layout, environmental, the relatively large volume, cost, and so on. In view of this problem, this paper proposes a method that the mobile car can be equipped with wireless video monitoring system. The mobile car which has some functions such as detection, video acquisition and wireless data transmission is developed based on STC89C52 Micro Control Unit (MCU and WiFi router. Firstly, information such as image, temperature and humidity is processed by the MCU and communicated with the router, and then returned by the WiFi router to the host computer phone. Secondly, control information issued by the host computer phone is received by WiFi router and sent to the MCU, and then the MCU sends relevant instructions. Lastly, the wireless transmission of video images and the remote control of the car are realized. The results prove that the system has some features such as simple operation, high stability, fast response, low cost, strong flexibility, widely application, and so on. The system has certain practical value and popularization value.

  12. A Critical Review of 13 Years of Mobile Game-Based Learning

    Science.gov (United States)

    Giannakas, Filippos; Kambourakis, Georgios; Papasalouros, Andreas; Gritzalis, Stefanos

    2018-01-01

    With the increasing popularity of smartphones and tablets, game-based learning (GBL) is undergoing a rapid shift to mobile platforms. This transformation is driven by mobility, wireless interfaces, and built-in sensors that these smart devices offer in order to enable blended and context-sensitive mobile learning (m-Learning) activities. Thus,…

  13. Message Oriented Communication For Ipv6 Enabled Pervasive Devices

    Directory of Open Access Journals (Sweden)

    Tomasz Szydlo

    2013-01-01

    Full Text Available An increasing number of electronic devices in our environment is equipped with radio interfaces used for exposing and using their functionality by other devices and applications. Wireless communication in this class of devices is exposed to a number of situations that may occur including limited energy resources, equipment failures, nodes mobility and loss of communication between nodes. It causes that commonly used standards and protocols for sharing services are not practical and do not take into account the occurrence of these problems. The paper presents the concept of communication that relies on the exchange of messages between wireless pervasive devices available in the environment.

  14. Portable Wireless Device Threat Assessment for Aircraft Navigation Radios

    Science.gov (United States)

    Nguyen, Truong X.; Koppen, Sandra V.; Ely, Jay J.; Williams, Reuben A.; Smith, Laura J.; Salud, Maria Theresa P.

    2004-01-01

    This paper addresses the concern for Wireless Local Area Network devices and two-way radios to cause electromagnetic interference to aircraft navigation radio systems. Spurious radiated emissions from various IEEE 802.11a, 802.11b, and Bluetooth devices are characterized using reverberation chambers. The results are compared with baseline emissions from standard laptop computer and personal digital assistants (PDAs) that are currently allowed for use on aircraft. The results indicate that the WLAN devices tested are not more of a threat to aircraft navigation radios than standard laptop computers and PDAs in most aircraft bands. In addition, spurious radiated emission data from seven pairs of two-way radios are provided. These two-way radios emit at much higher levels in the bands considered. A description of the measurement process, device modes of operation and the measurement results are reported.

  15. Mobile device-based optical instruments for agriculture

    Science.gov (United States)

    Sumriddetchkajorn, Sarun

    2013-05-01

    Realizing that a current smart-mobile device such as a cell phone and a tablet can be considered as a pocket-size computer embedded with a built-in digital camera, this paper reviews and demonstrates on how a mobile device can be specifically functioned as a portable optical instrument for agricultural applications. The paper highlights several mobile device-based optical instruments designed for searching small pests, measuring illumination level, analyzing spectrum of light, identifying nitrogen status in the rice field, estimating chlorine in water, and determining ripeness level of the fruit. They are suitable for individual use as well as for small and medium enterprises.

  16. [The Development of Information Centralization and Management Integration System for Monitors Based on Wireless Sensor Network].

    Science.gov (United States)

    Xu, Xiu; Zhang, Honglei; Li, Yiming; Li, Bin

    2015-07-01

    Developed the information centralization and management integration system for monitors of different brands and models with wireless sensor network technologies such as wireless location and wireless communication, based on the existing wireless network. With adaptive implementation and low cost, the system which possesses the advantages of real-time, efficiency and elaboration is able to collect status and data of the monitors, locate the monitors, and provide services with web server, video server and locating server via local network. Using an intranet computer, the clinical and device management staffs can access the status and parameters of monitors. Applications of this system provide convenience and save human resource for clinical departments, as well as promote the efficiency, accuracy and elaboration for the device management. The successful achievement of this system provides solution for integrated and elaborated management of the mobile devices including ventilator and infusion pump.

  17. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  18. On Coverage and Capacity for Disaster Area Wireless Networks Using Mobile Relays

    Directory of Open Access Journals (Sweden)

    Guo Wenxuan

    2009-01-01

    Full Text Available Public safety organizations increasingly rely on wireless technology to provide effective communications during emergency and disaster response operations. This paper presents a comprehensive study on dynamic placement of relay nodes (RNs in a disaster area wireless network. It is based on our prior work of mobility model that characterizes the spatial movement of the first responders as mobile nodes (MNs during their operations. We first investigate the COverage-oriented Relay Placement (CORP problem that is to maximize the total number of MNs connected with the relays. Considering the network throughput, we then study the CApacity-oriented Relay Placement (CARP problem that is to maximize the aggregated data rate of all MNs. For both coverage and capacity studies, we provide each the optimal and the greedy algorithms with computational complexity analysis. Furthermore, simulation results are presented to compare the performance between the greedy and the optimal solutions for the CORP and CARP problems, respectively. It is shown that the greedy algorithms can achieve near optimal performance but at significantly lower computational complexity.

  19. An update on mobile phones interference with medical devices.

    Science.gov (United States)

    Mahmoud Pashazadeh, Ali; Aghajani, Mahdi; Nabipour, Iraj; Assadi, Majid

    2013-10-01

    Mobile phones' electromagnetic interference with medical devices is an important issue for the medical safety of patients who are using life-supporting medical devices. This review mainly focuses on mobile phones' interference with implanted medical devices and with medical equipment located in critical areas of hospitals. A close look at the findings reveals that mobile phones may adversely affect the functioning of medical devices, and the specific effect and the degree of interference depend on the applied technology and the separation distance. According to the studies' findings and the authors' recommendations, besides mitigating interference, using mobile phones at a reasonable distance from medical devices and developing technology standards can lead to their effective use in hospital communication systems.

  20. An update on mobile phones interference with medical devices

    International Nuclear Information System (INIS)

    Pashazadeh, A. M.; Aghajani, M.; Nabipour, I.; Assadi, M.

    2013-01-01

    Mobile phones' electromagnetic interference with medical devices is an important issue for the medical safety of patients who are using life-supporting medical devices. This review mainly focuses on mobile phones' interference with implanted medical devices and with medical equipment located in critical areas of hospitals. A close look at the findings reveals that mobile phones may adversely affect the functioning of medical devices, and the specific effect and the degree of interference depend on the applied technology and the separation distance. According to the studies' findings and the authors' recommendations, besides mitigating interference, using mobile phones at a reasonable distance from medical devices and developing technology standards can lead to their effective use in hospital communication systems. (authors)

  1. A Secure and Robust Connectivity Architecture for Smart Devices and Applications

    Directory of Open Access Journals (Sweden)

    Lee YangSun

    2011-01-01

    Full Text Available Convergence environments and technologies are urgently coming close to our life with various wireless communications and smart devices in order to provide many benefits such as connectivity, usability, mobility, portability, and flexibility as well as lower installation and maintenance costs. Convergence has brought important change not only in the way we live but also in the way we think. It is the progress towards the attempt to create and to evolve new valuable services through the device convergence and fusion of in-home, office, and various environments around the personal mobile apparatus. Based on the dynamic trends of convergence, it is widely argued that the increased requirements on secure and robust connectivity between a variety of mobile devices and their applications provide us the era of real pervasive computing environment. Thus, in this paper, we present a novel connectivity architecture using RF4CE-(Radio Frequency for Consumer Electronics- based wireless zero-configuration and enhanced key agreement approach. We analyze the security and performance of our proposed approach by the development of the prototype H/W and the construction of a testbed with CE and mobile devices.

  2. Fuzzy mobile-robot positioning in intelligent spaces using wireless sensor networks.

    Science.gov (United States)

    Herrero, David; Martínez, Humberto

    2011-01-01

    This work presents the development and experimental evaluation of a method based on fuzzy logic to locate mobile robots in an Intelligent Space using wireless sensor networks (WSNs). The problem consists of locating a mobile node using only inter-node range measurements, which are estimated by radio frequency signal strength attenuation. The sensor model of these measurements is very noisy and unreliable. The proposed method makes use of fuzzy logic for modeling and dealing with such uncertain information. Besides, the proposed approach is compared with a probabilistic technique showing that the fuzzy approach is able to handle highly uncertain situations that are difficult to manage by well-known localization methods.

  3. Wireless Sensor/Actuator Network Design for Mobile Control Applications

    Directory of Open Access Journals (Sweden)

    Youxian Sung

    2007-10-01

    Full Text Available Wireless sensor/actuator networks (WSANs are emerging as a new generationof sensor networks. Serving as the backbone of control applications, WSANs will enablean unprecedented degree of distributed and mobile control. However, the unreliability ofwireless communications and the real-time requirements of control applications raise greatchallenges for WSAN design. With emphasis on the reliability issue, this paper presents anapplication-level design methodology for WSANs in mobile control applications. Thesolution is generic in that it is independent of the underlying platforms, environment,control system models, and controller design. To capture the link quality characteristics interms of packet loss rate, experiments are conducted on a real WSAN system. From theexperimental observations, a simple yet efficient method is proposed to deal withunpredictable packet loss on actuator nodes. Trace-based simulations give promisingresults, which demonstrate the effectiveness of the proposed approach.

  4. Field-Based Experiential Learning Using Mobile Devices

    Science.gov (United States)

    Hilley, G. E.

    2015-12-01

    Technologies such as GPS and cellular triangulation allow location-specific content to be delivered by mobile devices, but no mechanism currently exists to associate content shared between locations in a way that guarantees the delivery of coherent and non-redundant information at every location. Thus, experiential learning via mobile devices must currently take place along a predefined path, as in the case of a self-guided tour. I developed a mobile-device-based system that allows a person to move through a space along a path of their choosing, while receiving information in a way that guarantees delivery of appropriate background and location-specific information without producing redundancy of content between locations. This is accomplished by coupling content to knowledge-concept tags that are noted as fulfilled when users take prescribed actions. Similarly, the presentation of the content is related to the fulfillment of these knowledge-concept tags through logic statements that control the presentation. Content delivery is triggered by mobile-device geolocation including GPS/cellular navigation, and sensing of low-power Bluetooth proximity beacons. Together, these features implement a process that guarantees a coherent, non-redundant educational experience throughout a space, regardless of a learner's chosen path. The app that runs on the mobile device works in tandem with a server-side database and file-serving system that can be configured through a web-based GUI, and so content creators can easily populate and configure content with the system. Once the database has been updated, the new content is immediately available to the mobile devices when they arrive at the location at which content is required. Such a system serves as a platform for the development of field-based geoscience educational experiences, in which students can organically learn about core concepts at particular locations while individually exploring a space.

  5. A Data-Driven Framework for Rapid Modeling of Wireless Communication Channels

    Science.gov (United States)

    2013-12-01

    important for at least two reasons. First, the collection and transfer of data to a central repository can be used by the driverless systems to improve...performance and safety. Second, as vehicles become driverless , passengers will likely use mobile wireless devices more heavily. Reference for connectivity

  6. Deep Space Habitat Wireless Smart Plug

    Science.gov (United States)

    Morgan, Joseph A.; Porter, Jay; Rojdev, Kristina; Carrejo, Daniel B.; Colozza, Anthony J.

    2014-01-01

    NASA has been interested in technology development for deep space exploration, and one avenue of developing these technologies is via the eXploration Habitat (X-Hab) Academic Innovation Challenge. In 2013, NASA's Deep Space Habitat (DSH) project was in need of sensors that could monitor the power consumption of various devices in the habitat with added capability to control the power to these devices for load shedding in emergency situations. Texas A&M University's Electronic Systems Engineering Technology Program (ESET) in conjunction with their Mobile Integrated Solutions Laboratory (MISL) accepted this challenge, and over the course of 2013, several undergraduate students in a Capstone design course developed five wireless DC Smart Plugs for NASA. The wireless DC Smart Plugs developed by Texas A&M in conjunction with NASA's Deep Space Habitat team is a first step in developing wireless instrumentation for future flight hardware. This paper will further discuss the X-Hab challenge and requirements set out by NASA, the detailed design and testing performed by Texas A&M, challenges faced by the team and lessons learned, and potential future work on this design.

  7. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  8. Resource-Constrained Low-Complexity Video Coding for Wireless Transmission

    DEFF Research Database (Denmark)

    Ukhanova, Ann

    of video quality. We proposed a new metric for objective quality assessment that considers frame rate. As many applications deal with wireless video transmission, we performed an analysis of compression and transmission systems with a focus on power-distortion trade-off. We proposed an approach...... for ratedistortion-complexity optimization of upcoming video compression standard HEVC. We also provided a new method allowing decrease of power consumption on mobile devices in 3G networks. Finally, we proposed low-delay and low-power approaches for video transmission over wireless personal area networks, including......Constrained resources like memory, power, bandwidth and delay requirements in many mobile systems pose limitations for video applications. Standard approaches for video compression and transmission do not always satisfy system requirements. In this thesis we have shown that it is possible to modify...

  9. Mobile access to the Internet: from personal bubble to satellites

    Science.gov (United States)

    Gerla, Mario

    2001-10-01

    Mobile, wireless access and networking has emerged in the last few years as one of the most important directions of Internet growth. The popularity of mobile, and, more generally, nomadic Internet access is due to many enabling factors including: (a) emergence of meaningful applications tailored to the individual on the move; (b) small form factor and long battery life; (c) efficient middleware designed to support mobility; and, (d) efficient wireless networking technologies. A key player in the mobile Internet access is the nomad, i.e. the individual equipped with various computing and I/O gadgets (cellular phone, earphones, GPS navigator, palm pilot, beeper, portable scanner, digital camera, etc.). These devices form his/her Personal Area Network or PAN or personal bubble. The connectivity within the bubble is wireless (using for example a low cost, low power wireless LAN such as Bluetooth). The bubble can expand and contract dynamically depending on needs. It may temporarily include sensors and actuators as the nomad walks into a new environment. In this paper, we identify the need for the interconnection of the PAN with other wireless networks in order to achieve costeffective mobile access to the Internet. We will overview some key networking technologies required to support the PAN (eg, Bluetooth). We will also discuss an emerging technology, Ad Hoc wireless networking which is the natural complement of the PAN in sparsely populated areas. Finally, we will identify the need for intelligent routers to assist the mobile user in the selection of the best Internet access strategy.

  10. Developing a reproducible non-line-of-sight experimental setup for testing wireless medical device coexistence utilizing ZigBee.

    Science.gov (United States)

    LaSorte, Nickolas J; Rajab, Samer A; Refai, Hazem H

    2012-11-01

    The integration of heterogeneous wireless technologies is believed to aid revolutionary healthcare delivery in hospitals and residential care. Wireless medical device coexistence is a growing concern given the ubiquity of wireless technology. In spite of this, a consensus standard that addresses risks associated with wireless heterogeneous networks has not been adopted. This paper serves as a starting point by recommending a practice for assessing the coexistence of a wireless medical device in a non-line-of-sight environment utilizing 802.15.4 in a practical, versatile, and reproducible test setup. This paper provides an extensive survey of other coexistence studies concerning 802.15.4 and 802.11 and reports on the authors' coexistence testing inside and outside an anechoic chamber. Results are compared against a non-line-of-sight test setup. Findings relative to co-channel and adjacent channel interference were consistent with results reported in the literature.

  11. THE MOBILE SPACE AND MOBILE TARGETING ENVIRONMENT FOR INTERNET USERS: FEATURES OF MODEL SUBMISSION AND USING IN EDUCATION

    Directory of Open Access Journals (Sweden)

    V. Bykov

    2013-08-01

    Full Text Available Article submitted the results of the analysis of the use of mobile devices in education. The substantiation of the definition of user mobility in the Internet space, taking into account the variability of mobile devices and communications. The use of mobile devices in the educational process is based on the paradigm of open and equal access to quality education. Considered the technology of using different types of devices and their functions . The conditions of user mobility in the internet environment, the factors influencing it, the creation and storage of mobile communications resources . Provided with basic mathematical model of user behavior in a virtual network. A model of migration as a user from device to device , and its geographic move , and then use the resulting model for the design of distance learning systems . Preliminary forecasts have been made on the development of education in the transition from the remote technology to open. It is assumed the appearance of new types of personal devices that will combine the power of a desktop PC and the autonomy of smartphones with constant access for broadband wireless connection to the Internet. The use of cloud technology to store and process information resources training helps centralize and synchronize data and access to them from different devices.

  12. Device Data Protection in Mobile Healthcare Applications

    Science.gov (United States)

    Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin

    The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality. However, the healthcare data is very sensitive and has to be protected against unauthorized access. While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentication in remote servers, protection of data on the mobile device itself has gained very little attention. This paper analyses the requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device. The capsule is a downloadable software agent with additional functionalities to enable secure external communication with healthcare service providers, network operators and other relevant communication parties.

  13. Radiology and the mobile device: Radiology in motion

    Directory of Open Access Journals (Sweden)

    Sridhar G Panughpath

    2012-01-01

    Full Text Available The use of mobile devices is revolutionizing the way we communicate, interact, are entertained, and organize our lives. With healthcare in general and radiology in particular becoming increasingly digital, the use of such devices in radiologic practice is inevitable. This article reviews the current status of the use of mobile devices in the clinical practice of radiology, namely in emergency teleradiology. Technical parameters such as luminance and resolution are discussed. The article also discusses the benefits of such mobility vis-à-vis the current limitations of the technologies available.

  14. Radiology and the mobile device: Radiology in motion

    International Nuclear Information System (INIS)

    Panughpath, Sridhar G; Kalyanpur, Arjun

    2012-01-01

    The use of mobile devices is revolutionizing the way we communicate, interact, are entertained, and organize our lives. With healthcare in general and radiology in particular becoming increasingly digital, the use of such devices in radiologic practice is inevitable. This article reviews the current status of the use of mobile devices in the clinical practice of radiology, namely in emergency teleradiology. Technical parameters such as luminance and resolution are discussed. The article also discusses the benefits of such mobility vis-à-vis the current limitations of the technologies available

  15. Mobile biometric device (MBD) technology :

    Energy Technology Data Exchange (ETDEWEB)

    Aldridge, Chris D.

    2013-06-01

    Mobile biometric devices (MBDs) capable of both enrolling individuals in databases and performing identification checks of subjects in the field are seen as an important capability for military, law enforcement, and homeland security operations. The technology is advancing rapidly. The Department of Homeland Security Science and Technology Directorate through an Interagency Agreement with Sandia sponsored a series of pilot projects to obtain information for the first responder law enforcement community on further identification of requirements for mobile biometric device technology. Working with 62 different jurisdictions, including components of the Department of Homeland Security, Sandia delivered a series of reports on user operation of state-of-the-art mobile biometric devices. These reports included feedback information on MBD usage in both operational and exercise scenarios. The findings and conclusions of the project address both the limitations and possibilities of MBD technology to improve operations. Evidence of these possibilities can be found in the adoption of this technology by many agencies today and the cooperation of several law enforcement agencies in both participating in the pilot efforts and sharing of information about their own experiences in efforts undertaken separately.

  16. Adaptive Energy-Efficient Target Detection Based on Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Tengyue Zou

    2017-05-01

    Full Text Available Target detection is a widely used application for area surveillance, elder care, and fire alarms; its purpose is to find a particular object or event in a region of interest. Usually, fixed observing stations or static sensor nodes are arranged uniformly in the field. However, each part of the field has a different probability of being intruded upon; if an object suddenly enters an area with few guardian devices, a loss of detection will occur, and the stations in the safe areas will waste their energy for a long time without any discovery. Thus, mobile wireless sensor networks may benefit from adaptation and pertinence in detection. Sensor nodes equipped with wheels are able to move towards the risk area via an adaptive learning procedure based on Bayesian networks. Furthermore, a clustering algorithm based on k-means++ and an energy control mechanism is used to reduce the energy consumption of nodes. The extended Kalman filter and a voting data fusion method are employed to raise the localization accuracy of the target. The simulation and experimental results indicate that this new system with adaptive energy-efficient methods is able to achieve better performance than the traditional ones.

  17. Adaptive Energy-Efficient Target Detection Based on Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Zou, Tengyue; Li, Zhenjia; Li, Shuyuan; Lin, Shouying

    2017-05-04

    Target detection is a widely used application for area surveillance, elder care, and fire alarms; its purpose is to find a particular object or event in a region of interest. Usually, fixed observing stations or static sensor nodes are arranged uniformly in the field. However, each part of the field has a different probability of being intruded upon; if an object suddenly enters an area with few guardian devices, a loss of detection will occur, and the stations in the safe areas will waste their energy for a long time without any discovery. Thus, mobile wireless sensor networks may benefit from adaptation and pertinence in detection. Sensor nodes equipped with wheels are able to move towards the risk area via an adaptive learning procedure based on Bayesian networks. Furthermore, a clustering algorithm based on k -means++ and an energy control mechanism is used to reduce the energy consumption of nodes. The extended Kalman filter and a voting data fusion method are employed to raise the localization accuracy of the target. The simulation and experimental results indicate that this new system with adaptive energy-efficient methods is able to achieve better performance than the traditional ones.

  18. A Multifactor Secure Authentication System for Wireless Payment

    Science.gov (United States)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  19. NFC like wireless technology for monitoring purposes in scientific/industrial facilities

    International Nuclear Information System (INIS)

    Badillo, I.; Eguiraun, M.; Jugo, J.

    2012-01-01

    Wireless technologies are becoming more and more used in large industrial and scientific facilities like particle accelerators for facilitating the monitoring and indeed sensing in these kind of large environments. Cabled equipment means little flexibility in placement and is very expensive in both money and effort whenever reorganization or new installation is needed. So, when cabling is not really needed for performance reasons wireless monitoring and control is a good option, due to the speed of implementation. There are several wireless flavors to choose, as Bluetooth, Zigbee, WiFi, etc. depending on the requirements of each specific application. In this work a wireless monitoring system for EPICS (Experimental and Industrial Control System) is presented. The desired control system variables are acquired over the network and published in a mobile device, allowing the operator to check process variables everywhere the signal spreads. In this approach, a Python based server will be continuously getting EPICS Process Variables via Channel Access protocol and sending them through a WiFi standard 802.11 network using ICE middle-ware. ICE is a tool-kit oriented to build distributed applications. Finally, the mobile device will read the data and show it to the operator. The security of the communication can be improved by means of a weak wireless signal, following the same idea as in Near Field Communication (NFC), but for more large distances. With this approach, local monitoring and control applications, as for example a vacuum control system for several pumps, are currently implemented. (authors)

  20. Testing Framework for Mobile Device Forensics Tools

    Directory of Open Access Journals (Sweden)

    Maxwell Anobah

    2014-09-01

    Full Text Available The proliferation of mobile communication and computing devices, in particular smart mobile phones, is almost paralleled with the increasing number of mobile device forensics tools in the market. Each mobile forensics tool vendor, on one hand claims to have a tool that is best in terms of performance, while on the other hand each tool vendor seems to be using different standards for testing their tools and thereby defining what support means differently. To overcome this problem, a testing framework based on a series of tests ranging from basic forensics tasks such as file system reconstruction up to more complex ones countering antiforensic techniques is proposed. The framework, which is an extension of an existing effort done in 2010, prescribes a method to clearly circumscribe the term support into precise levels. It also gives an idea of the standard to be developed and accepted by the forensic community that will make it easier for forensics investigators to quickly select the most appropriate tool for a particular mobile device.

  1. Multiple wireless protocol advertising system, enabling automatic access selection and local services

    NARCIS (Netherlands)

    Houben, S.A.; Baken, N.; Herve, P.; Smets, R.

    2006-01-01

    We examined efficiency within wireless access options for mobile devices and discovered that a classic pitfall is revisited. As with the proliferation of services in incumbents’ portfolios, leading to a number of coexisting so-called ‘stove-pipes’, we see an isomorphic phenomenon evolving in

  2. Measuring ionizing radiation with a mobile device

    Science.gov (United States)

    Michelsburg, Matthias; Fehrenbach, Thomas; Puente León, Fernando

    2012-02-01

    In cases of nuclear disasters it is desirable to know one's personal exposure to radioactivity and the related health risk. Usually, Geiger-Mueller tubes are used to assess the situation. Equipping everyone with such a device in a short period of time is very expensive. We propose a method to detect ionizing radiation using the integrated camera of a mobile consumer device, e.g., a cell phone. In emergency cases, millions of existing mobile devices could then be used to monitor the exposure of its owners. In combination with internet access and GPS, measured data can be collected by a central server to get an overview of the situation. During a measurement, the CMOS sensor of a mobile device is shielded from surrounding light by an attachment in front of the lens or an internal shutter. The high-energy radiation produces free electrons on the sensor chip resulting in an image signal. By image analysis by means of the mobile device, signal components due to incident ionizing radiation are separated from the sensor noise. With radioactive sources present significant increases in detected pixels can be seen. Furthermore, the cell phone application can make a preliminary estimate on the collected dose of an individual and the associated health risks.

  3. Jammer Localization Using Wireless Devices with Mitigation by Self-Configuration.

    Directory of Open Access Journals (Sweden)

    Qazi Mamoon Ashraf

    Full Text Available Communication abilities of a wireless network decrease significantly in the presence of a jammer. This paper presents a reactive technique, to detect and locate the position of a jammer using a distributed collection of wireless sensor devices. We employ the theory of autonomic computing as a framework to design the same. Upon detection of a jammer, the affected nodes self-configure their power consumption which stops unnecessary waste of battery resources. The scheme then proceeds to determine the approximate location of the jammer by analysing the location of active nodes as well as the affected nodes. This is done by employing a circular curve fitting algorithm. Results indicate a high degree of accuracy in localizing a jammer has been achieved.

  4. Wireless sEMG-Based Body-Machine Interface for Assistive Technology Devices.

    Science.gov (United States)

    Fall, Cheikh Latyr; Gagnon-Turcotte, Gabriel; Dube, Jean-Francois; Gagne, Jean Simon; Delisle, Yanick; Campeau-Lecours, Alexandre; Gosselin, Clement; Gosselin, Benoit

    2017-07-01

    Assistive technology (AT) tools and appliances are being more and more widely used and developed worldwide to improve the autonomy of people living with disabilities and ease the interaction with their environment. This paper describes an intuitive and wireless surface electromyography (sEMG) based body-machine interface for AT tools. Spinal cord injuries at C5-C8 levels affect patients' arms, forearms, hands, and fingers control. Thus, using classical AT control interfaces (keypads, joysticks, etc.) is often difficult or impossible. The proposed system reads the AT users' residual functional capacities through their sEMG activity, and converts them into appropriate commands using a threshold-based control algorithm. It has proven to be suitable as a control alternative for assistive devices and has been tested with the JACO arm, an articulated assistive device of which the vocation is to help people living with upper-body disabilities in their daily life activities. The wireless prototype, the architecture of which is based on a 3-channel sEMG measurement system and a 915-MHz wireless transceiver built around a low-power microcontroller, uses low-cost off-the-shelf commercial components. The embedded controller is compared with JACO's regular joystick-based interface, using combinations of forearm, pectoral, masseter, and trapeze muscles. The measured index of performance values is 0.88, 0.51, and 0.41 bits/s, respectively, for correlation coefficients with the Fitt's model of 0.75, 0.85, and 0.67. These results demonstrate that the proposed controller offers an attractive alternative to conventional interfaces, such as joystick devices, for upper-body disabled people using ATs such as JACO.

  5. C-RAM: breaking mobile device memory barriers using the cloud

    OpenAIRE

    Pamboris, A; Pietzuch, P

    2015-01-01

    ?Mobile applications are constrained by the available memory of mobile devices. We present C-RAM, a system that uses cloud-based memory to extend the memory of mobile devices. It splits application state and its associated computation between a mobile device and a cloud node to allow applications to consume more memory, while minimising the performance impact. C-RAM thus enables developers to realise new applications or port legacy desktop applications with a large memory footprint to mobile ...

  6. Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays

    Directory of Open Access Journals (Sweden)

    José María Pousada-Carballo

    2013-11-01

    Full Text Available Future wireless communications are heading towards an all-Internet Protocol (all-IP design, and will rely on the Session Initiation Protocol (SIP to manage services, such as voice over IP (VoIP. The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT and dSIP.

  7. Improving management performance of P2PSIP for mobile sensing in wireless overlays.

    Science.gov (United States)

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-11-08

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.

  8. Final report : mobile surveillance and wireless communication systems field operational test. Volume 2, FOT objectives, organization, system design, results, conclusions, and recommendations

    Science.gov (United States)

    1999-03-01

    The Mobile Surveillance and Wireless Communication Systems Field Operational Test (FOT) evaluated the performance of wireless traffic detection and communications systems in areas where permanent detectors, electrical power, and landline communicatio...

  9. Demographic Profile of Older Adults Using Wheeled Mobility Devices

    Directory of Open Access Journals (Sweden)

    Amol M. Karmarkar

    2011-01-01

    Full Text Available The purpose of this study was to determine whether the use of wheeled mobility devices differed with respect to age, gender, residential setting, and health-related factors among older adults. A total of 723 adults ageing 60 and older are representing three cohorts, from nursing homes, the Center for Assistive Technology, and the wheelchair registry from the Human Engineering Research Laboratories. Wheeled mobility devices were classified into three main groups: manual wheelchairs, power wheelchairs, and scooters. Our results found factors including age, gender, diagnosis, and living settings to be associated with differences in use of manual versus powered mobility devices. Differences in use were also noted for subtypes of manual (depot, standard, and customized and powered (scooter, standard, and customized mobility devices, on demographic, living arrangements, and health-related factors. Consideration of demographic, health-related, and environmental factors during the prescription process may help clinicians identify the most appropriate mobility device for the user.

  10. Adaptive Text Entry for Mobile Devices

    DEFF Research Database (Denmark)

    Proschowsky, Morten Smidt

    The reduced size of many mobile devices makes it difficult to enter text with them. The text entry methods are often slow or complicated to use. This affects the performance and user experience of all applications and services on the device. This work introduces new easy-to-use text entry methods...... for mobile devices and a framework for adaptive context-aware language models. Based on analysis of current text entry methods, the requirements to the new text entry methods are established. Transparent User guided Prediction (TUP) is a text entry method for devices with one dimensional touch input. It can...... be touch sensitive wheels, sliders or similar input devices. The interaction design of TUP is done with a combination of high level task models and low level models of human motor behaviour. Three prototypes of TUP are designed and evaluated by more than 30 users. Observations from the evaluations are used...

  11. Improving Educational Outcomes by Providing Educational Services through Mobile Technology

    OpenAIRE

    Hosam Farouk El-Sofany

    2013-01-01

    The use of Computers, Networks, and Internet has successfully enabled educational institutions to provide their students and instructors with various online educational services. With the recent developments in M-learning and mobile technology, further possibilities are emerging to provide such services through mobile devices such as mobile phones and PDAs. By providing the educational services using wireless and mobile technologies, the educational institutions can potentially bring great co...

  12. Cognitive streaming on android devices

    NARCIS (Netherlands)

    Torres Vega, M.; Mocanu, D.C.; Barresi, R.; Fortino, G.; Liotta, A.

    2015-01-01

    As the number of mobile devices increases, so do the complexity of wireless networks and the user's requirements. This tendency makes necessary for Multimedia Services to take the needed actions to adapt to the upcoming technology. A prominent example of this type of services is HTTP Adaptive Video

  13. THE EVOLUTION OF INTERFACE DESIGN ON MOBILE DEVICES

    Directory of Open Access Journals (Sweden)

    Atila Isik

    2016-09-01

    Full Text Available The most typical characteristic of 21. century is the light velocity changing of technology. Dizzily developments in the field of human-robot interaction, mobile communication and education as affect all the fields of life also have an impact on art and design area. Striking increase of interest had been seen for mobile devices which are product of developing technology as tablet and mobile phone. While this increase happening at the present time user interfaces at mobile world and user practices developed as much as dominating design tendency. And became primary impotance for visual designers. This study aims utulizing future options for designers and the oppurtunities and reach a conclusions with examining evolution field of interface design spesific to mobile devices. From Skemorfizm to ordinary design and Google’s recent transition of material design principles were discussed together in this study. And this workout deal with interface design logic of users for working with new computational arificial facts devices as wearable smart objects and devices which able to connect to internet.

  14. Intelligent Devices in Rural Wireless Networks

    Directory of Open Access Journals (Sweden)

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  15. AN EVOLUTIONARY ALGORITHM FOR CHANNEL ASSIGNMENT PROBLEM IN WIRELESS MOBILE NETWORKS

    Directory of Open Access Journals (Sweden)

    Yee Shin Chia

    2012-12-01

    Full Text Available The channel assignment problem in wireless mobile network is the assignment of appropriate frequency spectrum to incoming calls while maintaining a satisfactory level of electromagnetic compatibility (EMC constraints. An effective channel assignment strategy is important due to the limited capacity of frequency spectrum in wireless mobile network. Most of the existing channel assignment strategies are based on deterministic methods. In this paper, an adaptive genetic algorithm (GA based channel assignment strategy is introduced for resource management and to reduce the effect of EMC interferences. The most significant advantage of the proposed optimization method is its capability to handle both the reassignment of channels for existing calls as well as the allocation of channel to a new incoming call in an adaptive process to maximize the utility of the limited resources. It is capable to adapt the population size to the number of eligible channels for a particular cell upon new call arrivals to achieve reasonable convergence speed. The MATLAB simulation on a 49-cells network model for both uniform and nonuniform call traffic distributions showed that the proposed channel optimization method can always achieve a lower average new incoming call blocking probability compared to the deterministic based channel assignment strategy.

  16. Laser Direct Writing and Selective Metallization of Metallic Circuits for Integrated Wireless Devices.

    Science.gov (United States)

    Cai, Jinguang; Lv, Chao; Watanabe, Akira

    2018-01-10

    Portable and wearable devices have attracted wide research attention due to their intimate relations with human daily life. As basic structures in the devices, the preparation of high-conductive metallic circuits or micro-circuits on flexible substrates should be facile, cost-effective, and easily integrated with other electronic units. In this work, high-conductive carbon/Ni composite structures were prepared by using a facile laser direct writing method, followed by an electroless Ni plating process, which exhibit a 3-order lower sheet resistance of less than 0.1 ohm/sq compared to original structures before plating, showing the potential for practical use. The carbon/Ni composite structures exhibited a certain flexibility and excellent anti-scratch property due to the tight deposition of Ni layers on carbon surfaces. On the basis of this approach, a wireless charging and storage device on a polyimide film was demonstrated by integrating an outer rectangle carbon/Ni composite coil for harvesting electromagnetic waves and an inner carbon micro-supercapacitor for energy storage, which can be fast charged wirelessly by a commercial wireless charger. Furthermore, a near-field communication (NFC) tag was prepared by combining a carbon/Ni composite coil for harvesting signals and a commercial IC chip for data storage, which can be used as an NFC tag for practical application.

  17. Towards Self-Powered Wireless Sensor Networks

    OpenAIRE

    SPENZA, DORA

    2013-01-01

    Ubiquitous computing aims at creating smart environments in which computational and communication capabilities permeate the word at all scales, improving the human experience and quality of life in a totally unobtrusive yet completely reliable manner. According to this vision, an huge variety of smart devices and products (e.g., wireless sensor nodes, mobile phones, cameras, sensors, home appliances and industrial machines) are interconnected to realize a network of distributed agents that co...

  18. Viseu Mobile: A location based Augmented Reality tour guide for mobile devices

    Directory of Open Access Journals (Sweden)

    M.L. Martins

    2015-11-01

    Full Text Available This article reports on the project "Viseu na Palma da Mão", which is based on a Augmented Reality app for mobile devices, whose main purpose is to maximise the tourists’ experience when visiting the town of Viseu. The paper starts by presenting a reflection on Augmented Reality and its potential and applications, with a special emphasis on the tourism industry. The increasing possibility to access the Internet anytime, anywhere, together with the unprecedented growth of mobile device penetration has boosted the development of specific applications that seek to respond to the increasing demands of tourists. It is on this premise that the app Viseu Mobile emerges, seeking to enhance the constant use of mobile devices, and making them act as a personal tour guide, based on location based information. The different stages of development and different features of the application are also explained

  19. 30 CFR 77.410 - Mobile equipment; automatic warning devices.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Mobile equipment; automatic warning devices. 77... UNDERGROUND COAL MINES Safeguards for Mechanical Equipment § 77.410 Mobile equipment; automatic warning devices. (a) Mobile equipment such as front-end loaders, forklifts, tractors, graders, and trucks, except...

  20. An Evolutionary Mobility Aware Multi-Objective Hybrid Routing Algorithm for Heterogeneous Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Kulkarni, Nandkumar P.; Prasad, Neeli R.; Prasad, Ramjee

    deliberation. To tackle these two problems, Mobile Wireless Sensor Networks (MWSNs) is a better choice. In MWSN, Sensor nodes move freely to a target area without the need for any special infrastructure. Due to mobility, the routing process in MWSN has become more complicated as connections in the network can...... such as Average Energy consumption, Control Overhead, Reaction Time, LQI, and HOP Count. The authors study the influence of energy heterogeneity and mobility of sensor nodes on the performance of EMRP. The Performance of EMRP compared with Simple Hybrid Routing Protocol (SHRP) and Dynamic Multi-Objective Routing...

  1. mm-Wave Hybrid Photonic Wireless Links for Ultra-High Speed Wireless Transmissions

    DEFF Research Database (Denmark)

    Rommel, Simon; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso

    Hybrid photonic-wireless transmission schemes in the mm-wave frequency range are promising candidates to enable the multi-gigabit per second data communications required from wireless and mobile networks of the 5th and future generations. Large FCC spectrum allocations for wireless transmission...

  2. ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS – A SURVEY

    Directory of Open Access Journals (Sweden)

    K. Sankar

    2012-06-01

    Full Text Available Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in wireless communication. The performance of the medium access control (MAC scheme not only has a fairly significant end-result on the behaviour of the routing approach employed, but also on the energy consumption of the wireless network interface card (NIC. We investigate the inadequacies of the MAC schemes designed for ad hoc wireless networks in the context of power awareness herein. The topology changes due to uncontrollable factors such as node mobility, weather, interference, noise, as well as on controllable parameters such as transmission power and antenna direction results in significant amount of energy loss. Controlling rapid topology changes by minimizing the maximum transmission power used in ad hoc wireless networks, while still maintaining networks connectivity can prolong battery life and hence network lifetime considerably. In addition, we systematically explore the potential energy consumption pitfalls of non–power-based and power based routing schemes. We suggest a thorough energy-based performance survey of energy aware routing protocols for wireless mobile ad-hoc networks. We also present the statistical performance metrics measured by our simulations.

  3. Fuzzy Mobile-Robot Positioning in Intelligent Spaces Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    David Herrero

    2011-11-01

    Full Text Available This work presents the development and experimental evaluation of a method based on fuzzy logic to locate mobile robots in an Intelligent Space using Wireless Sensor Networks (WSNs. The problem consists of locating a mobile node using only inter-node range measurements, which are estimated by radio frequency signal strength attenuation. The sensor model of these measurements is very noisy and unreliable. The proposed method makes use of fuzzy logic for modeling and dealing with such uncertain information. Besides, the proposed approach is compared with a probabilistic technique showing that the fuzzy approach is able to handle highly uncertain situations that are difficult to manage by well-known localization methods.

  4. Exposure and Use of Mobile Media Devices by Young Children.

    Science.gov (United States)

    Kabali, Hilda K; Irigoyen, Matilde M; Nunez-Davis, Rosemary; Budacki, Jennifer G; Mohanty, Sweta H; Leister, Kristin P; Bonner, Robert L

    2015-12-01

    Research on children's use of mobile media devices lags behind its adoption. The objective of this study was to examine young children's exposure to and use of mobile media devices. Cross-sectional study of 350 children aged 6 months to 4 years seen October to November 2014 at a pediatric clinic in an urban, low-income, minority community. The survey was adapted from Common Sense Media's 2013 nationwide survey. Most households had television (97%), tablets (83%), and smartphones (77%). At age 4, half the children had their own television and three-fourths their own mobile device. Almost all children (96.6%) used mobile devices, and most started using before age 1. Parents gave children devices when doing house chores (70%), to keep them calm (65%), and at bedtime (29%). At age 2, most children used a device daily and spent comparable screen time on television and mobile devices. Most 3- and 4-year-olds used devices without help, and one-third engaged in media multitasking. Content delivery applications such as YouTube and Netflix were popular. Child ownership of device, age at first use, and daily use were not associated with ethnicity or parent education. Young children in an urban, low-income, minority community had almost universal exposure to mobile devices, and most had their own device by age 4. The patterns of use suggest early adoption, frequent and independent use, and media multitasking. Studies are urgently needed to update recommendations for families and providers on the use of mobile media by young children. Copyright © 2015 by the American Academy of Pediatrics.

  5. Wireless Communication Enhancement Methods for Mobile Robots in Radiation Environments

    CERN Document Server

    Nattanmai Parasuraman, Ramviyas; Ferre, Manuel

    In hostile environments such as in scientific facilities where ionising radiation is a dominant hazard, reducing human interventions by increasing robotic operations are desirable. CERN, the European Organization for Nuclear Research, has around 50 km of underground scientific facilities, where wireless mobile robots could help in the operation of the accelerator complex, e.g. in conducting remote inspections and radiation surveys in different areas. The main challenges to be considered here are not only that the robots should be able to go over long distances and operate for relatively long periods, but also the underground tunnel environment, the possible presence of electromagnetic fields, radiation effects, and the fact that the robots shall in no way interrupt the operation of the accelerators. Having a reliable and robust wireless communication system is essential for successful execution of such robotic missions and to avoid situations of manual recovery of the robots in the event that the robot runs ...

  6. 75 FR 68619 - In the Matter of Certain Wireless Communication Devices, Portable Music and Data Processing...

    Science.gov (United States)

    2010-11-08

    ... Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of... within the United States after importation of certain wireless communication devices, portable music and...''). The complaint further alleges that an industry in the United States exists as required by subsection...

  7. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  8. Modern Methods of Voice Authentication in Mobile Devices

    Directory of Open Access Journals (Sweden)

    Vladimir Leonovich Evseev

    2016-03-01

    Full Text Available Modern methods of voice authentication in mobile devices.The proposed evaluation of the probability errors of the first and second kind for multi-modal methods of voice authentication. The advantages of multimodal multivariate methods before, when authentication takes place in several stages – this is the one-stage, which means convenience for customers. Further development of multimodal methods of authentication will be based on the significantly increased computing power of mobile devices, the growing number and improved accuracy built-in mobile device sensors, as well as to improve the algorithms of signal processing.

  9. Link-quality measurement and reporting in wireless sensor networks.

    Science.gov (United States)

    Chehri, Abdellah; Jeon, Gwanggil; Choi, Byoungjo

    2013-03-04

    Wireless Sensor networks (WSNs) are created by small hardware devices that possess the necessary functionalities to measure and exchange a variety of environmental data in their deployment setting. In this paper, we discuss the experiments in deploying a testbed as a first step towards creating a fully functional heterogeneous wireless network-based underground monitoring system. The system is mainly composed of mobile and static ZigBee nodes, which are deployed on the underground mine galleries for measuring ambient temperature. In addition, we describe the measured results of link characteristics such as received signal strength, latency and throughput for different scenarios.

  10. Link-Quality Measurement and Reporting in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Byoungjo Choi

    2013-03-01

    Full Text Available Wireless Sensor networks (WSNs are created by small hardware devices that possess the necessary functionalities to measure and exchange a variety of environmental data in their deployment setting. In this paper, we discuss the experiments in deploying a testbed as a first step towards creating a fully functional heterogeneous wireless network-based underground monitoring system. The system is mainly composed of mobile and static ZigBee nodes, which are deployed on the underground mine galleries for measuring ambient temperature. In addition, we describe the measured results of link characteristics such as received signal strength, latency and throughput for different scenarios.

  11. Estimations of additional delays for mobile application data from Comparative Output-Input throughput Analysis

    NARCIS (Netherlands)

    Wac, K.E.; Fiedler, Markus; Bults, Richard G.A.; Hermens, Hermanus J.

    2010-01-01

    Mobile devices with ever increasing functionality are an important driving force behind innovative mobile applications that enrich our daily life. The ubiquitous availability of wireless data communication networks is an additional driving force. Their ability to support application data flows is

  12. Situated learning in the mobile age: mobile devices on a field trip to the sea

    Directory of Open Access Journals (Sweden)

    Vanessa D.I. Pfeiffer

    2009-12-01

    Full Text Available This study focuses on learning about fish biodiversity via mobile devices in a situated learning scenario. Mobile devices do not only facilitate relating the presented information to the real world in a direct way; they also allow the provision of dynamic representations on demand. This study asks whether mobile devices are suited to support knowledge acquisition in a situated learning scenario and whether providing dynamic content is an additional benefit of mobile devices in combination with a real-world experience. The study was conducted during a regular university course at the Mediterranean Sea. Students had to acquire knowledge on 18 Mediterranean fish species by using either static (n = 16 or dynamic learning materials (n = 17. An initial classroom activity was followed by a real-world experience with mobile devices (snorkelling activity. Learning outcomes were measured before and after snorkelling. A 2×2 mixed ANOVA revealed that students performed better after than before the mobile learning experience, whereas no main effect for learning material could be found. However, an interaction between both factors indicated that the knowledge gain in the dynamic group exceeded the knowledge gain in the static group. These results indicate that mobile devices are helpful to unfold the potential of dynamic visualisations for learning biodiversity in a situated learning scenario.

  13. Surface Acoustic Wave Devices for Harsh Environment Wireless Sensing

    Directory of Open Access Journals (Sweden)

    David W. Greve

    2013-05-01

    Full Text Available Langasite surface acoustic wave devices can be used to implement harsh-environment wireless sensing of gas concentration and temperature. This paper reviews prior work on the development of langasite surface acoustic wave devices, followed by a report of recent progress toward the implementation of oxygen gas sensors. Resistive metal oxide films can be used as the oxygen sensing film, although development of an adherent barrier layer will be necessary with the sensing layers studied here to prevent interaction with the langasite substrate. Experimental results are presented for the performance of a langasite surface acoustic wave oxygen sensor with tin oxide sensing layer, and these experimental results are correlated with direct measurements of the sensing layer resistivity.

  14. An energy efficient multiple mobile sinks based routing algorithm for wireless sensor networks

    Science.gov (United States)

    Zhong, Peijun; Ruan, Feng

    2018-03-01

    With the fast development of wireless sensor networks (WSNs), more and more energy efficient routing algorithms have been proposed. However, one of the research challenges is how to alleviate the hot spot problem since nodes close to static sink (or base station) tend to die earlier than other sensors. The introduction of mobile sink node can effectively alleviate this problem since sink node can move along certain trajectories, causing hot spot nodes more evenly distributed. In this paper, we mainly study the energy efficient routing method with multiple mobile sinks support. We divide the whole network into several clusters and study the influence of mobile sink number on network lifetime. Simulation results show that the best network performance appears when mobile sink number is about 3 under our simulation environment.

  15. Miniaturised wireless smart tag for optical chemical analysis applications.

    Science.gov (United States)

    Steinberg, Matthew D; Kassal, Petar; Tkalčec, Biserka; Murković Steinberg, Ivana

    2014-01-01

    A novel miniaturised photometer has been developed as an ultra-portable and mobile analytical chemical instrument. The low-cost photometer presents a paradigm shift in mobile chemical sensor instrumentation because it is built around a contactless smart card format. The photometer tag is based on the radio-frequency identification (RFID) smart card system, which provides short-range wireless data and power transfer between the photometer and a proximal reader, and which allows the reader to also energise the photometer by near field electromagnetic induction. RFID is set to become a key enabling technology of the Internet-of-Things (IoT), hence devices such as the photometer described here will enable numerous mobile, wearable and vanguard chemical sensing applications in the emerging connected world. In the work presented here, we demonstrate the characterisation of a low-power RFID wireless sensor tag with an LED/photodiode-based photometric input. The performance of the wireless photometer has been tested through two different model analytical applications. The first is photometry in solution, where colour intensity as a function of dye concentration was measured. The second is an ion-selective optode system in which potassium ion concentrations were determined by using previously well characterised bulk optode membranes. The analytical performance of the wireless photometer smart tag is clearly demonstrated by these optical absorption-based analytical experiments, with excellent data agreement to a reference laboratory instrument. © 2013 Elsevier B.V. All rights reserved.

  16. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  17. Smart home design for electronic devices monitoring based wireless gateway network using cisco packet tracer

    Science.gov (United States)

    Sihombing, Oloan; Zendrato, Niskarto; Laia, Yonata; Nababan, Marlince; Sitanggang, Delima; Purba, Windania; Batubara, Diarmansyah; Aisyah, Siti; Indra, Evta; Siregar, Saut

    2018-04-01

    In the era of technological development today, the technology has become the need for the life of today's society. One is needed to create a smart home in turning on and off electronic devices via smartphone. So far in turning off and turning the home electronic device is done by pressing the switch or remote button, so in control of electronic device control less effective. The home smart design is done by simulation concept by testing system, network configuration, and wireless home gateway computer network equipment required by a smart home network on cisco packet tracer using Internet Thing (IoT) control. In testing the IoT home network wireless network gateway system, multiple electronic devices can be controlled and monitored via smartphone based on predefined configuration conditions. With the Smart Ho me can potentially increase energy efficiency, decrease energy usage costs, control electronics and change the role of residents.

  18. A Randomized Trial of Pocket-Echocardiography Integrated Mobile Health Device Assessments in Modern Structural Heart Disease Clinics.

    Science.gov (United States)

    Bhavnani, Sanjeev P; Sola, Srikanth; Adams, David; Venkateshvaran, Ashwin; Dash, P K; Sengupta, Partho P

    2018-04-01

    This study sought to determine whether mobile health (mHealth) device assessments used as clinical decision support tools at the point-of-care can reduce the time to treatment and improve long-term outcomes among patients with rheumatic and structural heart diseases (SHD). Newly developed smartphone-connected mHealth devices represent promising methods to diagnose common diseases in resource-limited areas; however, the impact of technology-based care on long-term outcomes has not been rigorously evaluated. A total of 253 patients with SHD were randomized to an initial diagnostic assessment with wireless devices in mHealth clinics (n = 139) or to standard-care (n = 114) in India. mHealth clinics were equipped with point-of-care devices including pocket-echocardiography, smartphone-connected-electrocardiogram blood pressure and oxygen measurements, activity monitoring, and portable brain natriuretic peptide laboratory testing. All individuals underwent comprehensive transthoracic echocardiography to assess the severity of SHD. The primary endpoint was the time to referral for therapy with percutaneous valvuloplasty or surgical valve replacement. Secondary endpoints included the probability of a cardiovascular hospitalization and/or death over 1 year. An initial mHealth assessment was associated with a shorter time to referral for valvuloplasty and/or valve replacement (83 ± 79 days vs. 180 ± 101 days; p Mobile Health Device Assessments in Modern Structural Heart Disease Clinics; NCT02881398). Copyright © 2018 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  19. A Multiple Mobility Support Approach (MMSA Based on PEAS for NCW in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Bong-Joo Koo

    2011-01-01

    Full Text Available Wireless Sensor Networks (WSNs can be implemented as one of sensor systems in Network Centric Warfare (NCW. Mobility support and energy efficiency are key concerns for this application, due to multiple mobile users and stimuli in real combat field. However, mobility support approaches that can be adopted in this circumstance are rare. This paper proposes Multiple Mobility Support Approach (MMSA based on Probing Environment and Adaptive Sleeping (PEAS to support the simultaneous mobility of both multiple users and stimuli by sharing the information of stimuli in WSNs. Simulations using Qualnet are conducted, showing that MMSA can support multiple mobile users and stimuli with good energy efficiency. It is expected that the proposed MMSA can be applied to real combat field.

  20. 78 FR 958 - Certain Wireless Devices With 3G and/or 4G Capabilities and Components Thereof Notice of Receipt...

    Science.gov (United States)

    2013-01-07

    ... INTERNATIONAL TRADE COMMISSION [DN 2929] Certain Wireless Devices With 3G and/or 4G Capabilities... with 3G and/or 4G Capabilities and Components Thereof, DN 2929; the Commission is soliciting comments... importation of certain wireless devices with 3g and/or 4g capabilities and components thereof. The complaint...

  1. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuhua Wang

    2017-02-01

    Full Text Available Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  2. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  3. Augmented Reality user interface analysis in mobile devices

    OpenAIRE

    Guzmán Guzmán, José Daniel

    2014-01-01

    [ENGLISH] The presence of high-end phones in the telephony market, has allowed consumers to have access to the computational power of mobile smart-phone devices. Powerful processors, combined with cameras and ease of development encourage an increasing number of Augmented Reality (AR) researchers to adopt mobile smart-phones as AR platform. The same way, Augmented Reality on mobile devices has become increasingly popular for many applications, including search and location, tourism, and shopp...

  4. Mobile application development for Tele-ECG

    International Nuclear Information System (INIS)

    Srivastava, Shikha; Bharade, Sandeep; Sinha, Vineet; Sarade, Bhagyashree; Jindal, G.D.; Ananthakrishnan, T.S.; Pithawa, C.K.

    2010-01-01

    Mobile computing has caught the attention of research community for quite some time. The constant improvement of hardware and software related to mobile computing (e.g. better computing power, larger wireless network bandwidth) clearly enhance capabilities of mobile devices. The acceptance of mobile technology by the population at large would suggest that this could be the basis of a system for the communication of medical data from patients to remote physician and vice versa. This paper presents a mobile solution, which makes use of a Tele-ECG unit with a mobile phone to collect, store and forward ECG data to a cardiologist for diagnosis and recommendation. (author)

  5. Wireless-Uplinks-Based Energy-Efficient Scheduling in Mobile Cloud Computing

    OpenAIRE

    Xing Liu; Chaowei Yuan; Zhen Yang; Enda Peng

    2015-01-01

    Mobile cloud computing (MCC) combines cloud computing and mobile internet to improve the computational capabilities of resource-constrained mobile devices (MDs). In MCC, mobile users could not only improve the computational capability of MDs but also save operation consumption by offloading the mobile applications to the cloud. However, MCC faces the problem of energy efficiency because of time-varying channels when the offloading is being executed. In this paper, we address the issue of ener...

  6. Investigating Daily Mobile Device Use Among University Students in Indonesia

    Science.gov (United States)

    Pratama, Ahmad R.

    2018-03-01

    This study investigates daily mobile device use among Indonesian university students by using survey data collected in the first quarter of 2016. The data show that 55.49% of the students spend more than five hours a day on their mobile devices. OLS regression analysis shows that female students, owners of the most expensive smartphone or tablet, and those who access social media apps and play mobile games frequently are more likely to spend more time on their mobile devices each day. Contrary to that, those who consider themselves as laggards are less likely to do so. The findings in this study help better understand how university students in Indonesia use their mobile device and lay a foundation as part of a larger research agenda about the relationship between mobile technology and education in Indonesia.

  7. Evaluation of an enclosed ultraviolet-C radiation device for decontamination of mobile handheld devices.

    Science.gov (United States)

    Mathew, J Itty; Cadnum, Jennifer L; Sankar, Thriveen; Jencson, Annette L; Kundrapu, Sirisha; Donskey, Curtis J

    2016-06-01

    Mobile handheld devices used in health care settings may become contaminated with health care-associated pathogens. We demonstrated that an enclosed ultraviolet-C radiation device was effective in rapidly reducing methicillin-resistant Staphylococcus aureus, and with longer exposure times, Clostridium difficile spores, on glass slides and reducing contamination on in-use mobile handheld devices. Published by Elsevier Inc.

  8. An intelligent telecardiology system using a wearable and wireless ECG to detect atrial fibrillation.

    Science.gov (United States)

    Lin, Chin-Teng; Chang, Kuan-Cheng; Lin, Chun-Ling; Chiang, Chia-Cheng; Lu, Shao-Wei; Chang, Shih-Sheng; Lin, Bor-Shyh; Liang, Hsin-Yueh; Chen, Ray-Jade; Lee, Yuan-Teh; Ko, Li-Wei

    2010-05-01

    This study presents a novel wireless, ambulatory, real-time, and autoalarm intelligent telecardiology system to improve healthcare for cardiovascular disease, which is one of the most prevalent and costly health problems in the world. This system consists of a lightweight and power-saving wireless ECG device equipped with a built-in automatic warning expert system. This device is connected to a mobile and ubiquitous real-time display platform. The acquired ECG signals are instantaneously transmitted to mobile devices, such as netbooks or mobile phones through Bluetooth, and then, processed by the expert system. An alert signal is sent to the remote database server, which can be accessed by an Internet browser, once an abnormal ECG is detected. The current version of the expert system can identify five types of abnormal cardiac rhythms in real-time, including sinus tachycardia, sinus bradycardia, wide QRS complex, atrial fibrillation (AF), and cardiac asystole, which is very important for both the subjects who are being monitored and the healthcare personnel tracking cardiac-rhythm disorders. The proposed system also activates an emergency medical alarm system when problems occur. Clinical testing reveals that the proposed system is approximately 94% accurate, with high sensitivity, specificity, and positive prediction rates for ten normal subjects and 20 AF patients. We believe that in the future a business-card-like ECG device, accompanied with a mobile phone, can make universal cardiac protection service possible.

  9. Use of Mobile Devices for E-Learning in Geomatics

    Science.gov (United States)

    Mills, H.

    2015-05-01

    For the last 4 years, the School of Civil Engineering & Geosciences at Newcastle University, UK adapted mobile devices as learning approach only for undergraduate within Geomatics. All incoming students were given a mobile device as learning tool, which was supposed to be there main way to accessing teaching material. This paper will present how students adopted the mobile devices and how their learning has changed using mobile devices. It will highlight which apps can be used in a Geomatics teaching environment to engage students in their learning and teaching environment. The paper will furthermore look into apps which help students within the area of Photogrammetry and Remote Sensing, such as the Autodesk 123D catch up or the Remote RDP app to remotely control surveying instrumentations, such as laser scanners. Those apps are easy tools to engage students within digital learning environment which the students are familiar with. The paper will show how students embrace the technology but also current limitation of using those within Higher education establishments, such as sufficient Wifi and student support for using mobile devices.

  10. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  11. A world of minerals in your mobile device

    Science.gov (United States)

    Jenness, Jane E.; Ober, Joyce A.; Wilkins, Aleeza M.; Gambogi, Joseph

    2016-09-15

    Mobile phones and other high-technology communications devices could not exist without mineral commodities. More than one-half of all components in a mobile device—including its electronics, display, battery, speakers, and more—are made from mined and semiprocessed materials (mineral commodities). Some mineral commodities can be recovered as byproducts during the production and processing of other commodities. As an example, bauxite is mined for its aluminum content, but gallium is recovered during the aluminum production process. The images show the ore minerals (sources) of some mineral commodities that are used to make components of a mobile device. On the reverse side, the map and table depict the major source countries producing these mineral commodities along with how these commodities are used in mobile devices. For more information on minerals, visit http://minerals.usgs.gov.

  12. Location tracking forensics on mobile devices

    Science.gov (United States)

    Sack, Stefan; Kröger, Knut; Creutzburg, Reiner

    2013-03-01

    The spread of navigation devices has increased significantly over the last 10 years. With the help of the current development of even smaller navigation receiver units it is to navigate with almost any current smart phone. Modern navigation systems are no longer limited to satellite navigation, but use current techniques, e.g. WLAN localization. Due to the increased use of navigation devices their relevance to forensic investigations has risen rapidly. Because navigation, for example with navigation equipment and smartphones, have become common place these days, also the amount of saved navigation data has risen rapidly. All of these developments lead to a necessary forensic analysis of these devices. However, there are very few current procedures for investigating of navigation devices. Navigation data is forensically interesting because by the position of the devices in most cases the location and the traveled path of the owner can be reconstructed. In this work practices for forensic analysis of navigation devices are developed. Different devices will be analyzed and it is attempted, by means of forensic procedures to restore the traveled path of the mobile device. For analysis of the various devices different software and hardware is used. There will be presented common procedures for securing and testing of mobile devices. Further there will be represented the specials in the investigation of each device. The different classes considered are GPS handhelds, mobile navigation devices and smartphones. It will be attempted, wherever possible, to read all data of the device. The aim is to restore complete histories of the navigation data and to forensically study and analyze these data. This is realized by the usage of current forensic software e.g. TomTology or Oxygen Forensic Suite. It is also attempted to use free software whenever possible. Further alternative methods are used (e.g. rooting) to access locked data of the unit. To limit the practical work the

  13. The Influence of Perceived Convenience and Curiosity on Continuance Intention in Mobile English Learning for High School Students Using PDAs

    Science.gov (United States)

    Chang, Chi-Cheng; Tseng, Kuo-Hung; Liang, Chaoyun; Yan, Chi-Fang

    2013-01-01

    Mobile learning aims to utilise communication devices such as mobile devices and wireless connection in combination with e-learning systems, allowing learners to experience convenient, instant and suitable learning at unrestricted time and place. Participants were 125 Taiwanese senior high school students, whose continuance intention was examined…

  14. Live Mobile Distance Learning System for Smart Devices

    Directory of Open Access Journals (Sweden)

    Jang Ho Lee

    2015-03-01

    Full Text Available In recent years, mobile and ubiquitous computing has emerged in our daily lives, and extensive studies have been conducted in various areas using smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, in order to realize this computing technology. Especially, the integration of mobile networking technology and intelligent mobile devices has made it possible to develop the advanced mobile distance learning system that supports portable smart devices such as smartphones and tablets for the future IT environment. We present a synchronous mobile learning system that enables both instructor and student to participate in distance learning with their tablets. When an instructor gives a lecture using a tablet with front-face camera by bringing up slides and making annotations on them, students in the distance can watch the instructor and those slides with annotation on their own tablets in real time. A student can also ask a question or have a discussion together using the text chat feature of the system during a learning session. We also show the user evaluation of the system. A user survey shows that about 67% are in favor of the prototype of the system.

  15. Cross-Platform Development Techniques for Mobile Devices

    Science.gov (United States)

    2013-09-01

    solutions. Mobile devices run on diverse platforms requiring differing constraints that the developer must adhere to. Thus, extra time and resources...and growing market for providing solutions. Mobile devices run on diverse platforms requiring differing constraints that the developer must adhere...testing are an iOS- based Apple iPhone 4 and an Android-based Samsung Galaxy S III. For user interface analysis this chapter also includes, from both

  16. Providing Device Independence to Mobile Services

    OpenAIRE

    Nylander, Stina; Bylund, Markus

    2002-01-01

    People want user interfaces to services that are functional and well suited to the device they choose for access. To provide this, services must be able to offer device specific user interfaces for the wide range of devices available today. We propose to combine the two dominant approaches to platform independence, "Write Once, Run Every-where™" and "different version for each device", to create multiple device specific user interfaces for mobile services. This gives possibilities to minimize...

  17. A new challenge for advertising on mobile devices: Social TV

    OpenAIRE

    Natalia Quintas-Froufe; Ana González-Neira

    2015-01-01

    Mobile device advertising is a rapidly growing market due to the penetration of mobile devices in Spanish society. Advertising communication in this digital ecosystem continually poses new challenges. One of these - the subject of this proposal - is the link-up between mobile advertising with social TV. It opens up new possibilities for the development of advertising strategies on mobile devices.The aim of this paper is to describe the challenges faced by the Spanish advertising industry with...

  18. Applications and Security of Next-Generation, User-Centric Wireless Systems

    Directory of Open Access Journals (Sweden)

    Danfeng Yao

    2010-07-01

    Full Text Available Pervasive wireless systems have significantly improved end-users’ quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of next generation wireless systems in facilitating users’ daily activities will grow. Unique security and privacy issues exist in these wireless, context-aware, often decentralized systems. For example, the pervasive nature of such systems allows adversaries to launch stealthy attacks against them. In this review paper, we survey several emergent personal wireless systems and their applications. These systems include mobile social networks, active implantable medical devices, and consumer products. We explore each system’s usage of contextual information and provide insight into its security vulnerabilities. Where possible, we describe existing solutions for defendingagainst these vulnerabilities. Finally, we point out promising future research directions for improving these systems’ robustness and security

  19. Educational Multimedia Profiling Recommendations for Device-Aware Adaptive Mobile Learning

    Science.gov (United States)

    Moldovan, Arghir-Nicolae; Ghergulescu, Ioana; Muntean, Cristina Hava

    2014-01-01

    Mobile learning is seeing a fast adoption with the increasing availability and affordability of mobile devices such as smartphones and tablets. As the creation and consumption of educational multimedia content on mobile devices is also increasing fast, educators and mobile learning providers are faced with the challenge to adapt multimedia type…

  20. Effects of Practice Type in the Here and Now Mobile Learning Environment

    Science.gov (United States)

    Tutty, Jeremy I.; Martin, Florence

    2014-01-01

    This generation of technology is characterized by mobile and portable devices such as smartphones and tablet computers with wireless broadband access. Mobile technologies enable a new kind of learning called "here and now learning," where learners have access to information anytime and anywhere to perform authentic activities in the…

  1. Investigating the Determinants and Age and Gender Differences in the Acceptance of Mobile Learning

    Science.gov (United States)

    Wang, Yi-Shun; Wu, Ming-Cheng; Wang, Hsiu-Yuan

    2009-01-01

    With the proliferation of mobile computing technology, mobile learning (m-learning) will play a vital role in the rapidly growing electronic learning market. M-learning is the delivery of learning to students anytime and anywhere through the use of wireless Internet and mobile devices. However, acceptance of m-learning by individuals is critical…

  2. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  3. An Open Platform for the Creation and Deployment of Transport-Related Mobile Data Services

    DEFF Research Database (Denmark)

    Jensen, Christian Søndergaard; Torp, Kristian; Wind, Rico

    2007-01-01

    Advanced mobile computing devices with wireless communication and geo-positioning capabilities are finding increasingly widespread use in Europe and beyond. Example devices include smart phones, PDA phones, and navigation systems. It is thus becoming increasingly relevant and attractive to utiliz...

  4. Accessible Collaborative Learning Using Mobile Devices

    Science.gov (United States)

    Wald, Mike; Li, Yunjia; Draffan, E. A.

    2014-01-01

    This paper describes accessible collaborative learning using mobile devices with mobile enhancements to Synote, the freely available, award winning, open source, web based application that makes web hosted recordings easier to access, search, manage, and exploit for all learners, teachers and other users. Notes taken live during lectures using…

  5. Residual Network Data Structures in Android Devices

    Science.gov (United States)

    2011-09-01

    particular cellular tower that can be physically geolocated . Wireless routers, commonly found in businesses and homes share their unique Media Access...commercial acquisition tool. The method was compiled with standard Symbian APIs to access the file system and only tested on Symbian mobile devices [20

  6. A Wireless Fully Passive Neural Recording Device for Unobtrusive Neuropotential Monitoring.

    Science.gov (United States)

    Kiourti, Asimina; Lee, Cedric W L; Chae, Junseok; Volakis, John L

    2016-01-01

    We propose a novel wireless fully passive neural recording device for unobtrusive neuropotential monitoring. Previous work demonstrated the feasibility of monitoring emulated brain signals in a wireless fully passive manner. In this paper, we propose a novel realistic recorder that is significantly smaller and much more sensitive. The proposed recorder utilizes a highly efficient microwave backscattering method and operates without any formal power supply or regulating elements. Also, no intracranial wires or cables are required. In-vitro testing is performed inside a four-layer head phantom (skin, bone, gray matter, and white matter). Compared to our former implementation, the neural recorder proposed in this study has the following improved features: 1) 59% smaller footprint, 2) up to 20-dB improvement in neuropotential detection sensitivity, and 3) encapsulation in biocompatible polymer. For the first time, temporal emulated neuropotentials as low as 63 μVpp can be detected in a wireless fully passive manner. Remarkably, the high-sensitivity achieved in this study implies reading of most neural signals generated by the human brain. The proposed recorder brings forward transformational possibilities in wireless fully passive neural detection for a very wide range of applications (e.g., epilepsy, Alzheimer's, mental disorders, etc.).

  7. Latitude, longitude, and beyond : mining mobile objects' behavior

    NARCIS (Netherlands)

    Baratchi, Mitra

    2015-01-01

    Rapid advancements in Micro-Electro-Mechanical Systems (MEMS), and wireless communications, have resulted in a surge in data generation. Mobility data is one of the various forms of data, which are ubiquitously collected by different location sensing devices. Extensive knowledge about the behavior

  8. Structuring and Regulating Collaborative Learning in Higher Education with Wireless Networks and Mobile Tools

    Science.gov (United States)

    Jarvela, Sanna; Naykki, Piia; Laru, Jari; Luokkanen, Tiina

    2007-01-01

    In our recent research we have explored possibilities to scaffold collaborative learning in higher education with wireless networks and mobile tools. The pedagogical ideas are grounded on concepts of collaborative learning, including the socially shared origin of cognition, as well as self-regulated learning theory. This paper presents our three…

  9. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  10. Assessing the Influence of Smart Mobile Devices on How Employees Work

    Science.gov (United States)

    Gorski, Adam L.

    2017-01-01

    The smart mobile device market penetration reached 50% and has been increasing an average of 39% per year in the United States. More than 70% of the smart mobile device owners use such devices for personal and work activities. The problem was the lack of management's understanding of the effect smart mobile device use has on how employees work…

  11. Use of mobile devices to answer online surveys: implications for research.

    Science.gov (United States)

    Cunningham, John A; Neighbors, Clayton; Bertholet, Nicolas; Hendershot, Christian S

    2013-07-08

    There is a growing use of mobile devices to access the Internet. We examined whether participants who used a mobile device to access a brief online survey were quicker to respond to the survey but also, less likely to complete it than participants using a traditional web browser. Using data from a recently completed online intervention trial, we found that participants using mobile devices were quicker to access the survey but less likely to complete it compared to participants using a traditional web browser. More concerning, mobile device users were also less likely to respond to a request to complete a six week follow-up survey compared to those using traditional web browsers. With roughly a third of participants using mobile devices to answer an online survey in this study, the impact of mobile device usage on survey completion rates is a concern. ClinicalTrials.gov: NCT01521078.

  12. Reengineering a PC-based System into the Mobile Device Product Line

    DEFF Research Database (Denmark)

    Zhang, Weishan; Jarzabek, Stanislaw; Loughran, Neil

    2003-01-01

    There is a growing demand to port existing PC-based software systems to mobile device platforms. Systems running on mobile devices share basic characteristics with their PC-based counterparts, but differ from them in details of user interfaces, application models, etc. Systems running on mobile...... devices must also perform well using less memory than PC-based systems. Mobile devices themselves are different from each other in many ways, too. We describe how we made an existing PC-based City Guide System available on a wide range of mobile devices, in a cost-effective way. We applied "reengineering...... into a product line architecture" approach to achieve the goal. Our product line architecture facilitates reuse via generation. We generate specific City Guide Systems for target platforms including PC, Pocket PC and other mobile devices, from generic meta-components that form the City Guide System product line...

  13. A SIMULTANEOUS MOBILE E-LEARNING ENVIRONMENT AND APPLICATION

    Directory of Open Access Journals (Sweden)

    Hasan KARAL

    2010-04-01

    Full Text Available The purpose of the present study was to design a mobile learning environment that enables the use of a teleconference application used in simultaneous e-learning with mobile devices and to evaluate this mobile learning environment based on students’ views. With the mobile learning environment developed in the study, the students are able to follow a teleconference application realized by using appropriate mobile devices. The study was carried out with 8 post-graduate students enrolled in Karadeniz Technical University (KTU, Department of Computer Education and Instructional Technologies (CEIT, Graduate School of Natural and Applied Science. The students utilized this teleconference application using mobile devices supporting internet access and Adobe Flash technology. Of the 8 students, 4 accessed the system using EDGE technology and 4 used wireless internet technology. At the end of the application, the audio and display were delayed by 4-5 seconds with EDGE technology, and were delayed by 7-8 seconds with wireless internet technology. Based on the students’ views, it was concluded that the environment had some deficiencies in terms of quality, especially in terms of the screen resolution. Despite this, the students reported that this environment could provide more flexibility in terms of space and time when compared to other simultaneous distance education applications. Although the environment enables interaction, in particular, the problem of resolution caused by screen size is a disadvantage for the system. When this mobile learning application is compared to conventional education environments, it was found that mobile learning does have a role in helping the students overcome the problems of participating in learning activities caused by time and space constraints.

  14. Security Issues for Information Quality on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Dana Ramona ANDRISESCU

    2010-01-01

    Full Text Available Mobile devices are used everywhere, from making acall to store huge volume of information. But together withdevices shrinking and rise of storage space on a single device webring to mind the problem of trusting the stored information.Trusting the information and assuring its quality meansknowing the security threats these devices face and measuresthat should be taken. Many questions rise from here like “Whathappens when a mobile device is used by several persons andespecially employees?”, “Is that information reliable andoriginal?”, “Who is responsible for a device and its security?”.We are going to see in this paper that information quality can beassured even on portable devices by using the adequate securitymeasures.

  15. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP

    Directory of Open Access Journals (Sweden)

    Seung-Man Chun

    2017-01-01

    Full Text Available Under unreliable constrained wireless networks for Internet of Things (IoT environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6 and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF Constrained Application Protocol (CoAP retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  16. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP.

    Science.gov (United States)

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-12

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  17. Electromagnetic Interference to Flight Navigation and Communication Systems: New Strategies in the Age of Wireless

    Science.gov (United States)

    Ely, Jay J.

    2005-01-01

    Electromagnetic interference (EMI) promises to be an ever-evolving concern for flight electronic systems. This paper introduces EMI and identifies its impact upon civil aviation radio systems. New wireless services, like mobile phones, text messaging, email, web browsing, radio frequency identification (RFID), and mobile audio/video services are now being introduced into passenger airplanes. FCC and FAA rules governing the use of mobile phones and other portable electronic devices (PEDs) on board airplanes are presented along with a perspective of how these rules are now being rewritten to better facilitate in-flight wireless services. This paper provides a comprehensive overview of NASA cooperative research with the FAA, RTCA, airlines and universities to obtain laboratory radiated emission data for numerous PED types, aircraft radio frequency (RF) coupling measurements, estimated aircraft radio interference thresholds, and direct-effects EMI testing. These elements are combined together to provide high-confidence answers regarding the EMI potential of new wireless products being used on passenger airplanes. This paper presents a vision for harmonizing new wireless services with aeronautical radio services by detecting, assessing, controlling and mitigating the effects of EMI.

  18. Wireless Device-to-Device (D2D) Links for Machine-to-Machine (M2M) Communication

    DEFF Research Database (Denmark)

    Pratas, Nuno; Popovski, Petar

    2017-01-01

    Device-to-Device (D2D) communications will play an important role in the fifth generation (5G) cellular networks, by increasing the spatial reuse of spectrum resources and enabling communication links with low latency. D2D is composed of two fundamental building blocks: proximity discovery...... and direct communication between nearby users. Another emerging trend in wireless cellular systems is Machine-to-Machine (M2M) communications, often characterized by fixed, low transmission rates. In this chapter we motivate the synergy between D2D and M2M, and present technologies that enable M2M-via-D2D...

  19. Object tracking on mobile devices using binary descriptors

    Science.gov (United States)

    Savakis, Andreas; Quraishi, Mohammad Faiz; Minnehan, Breton

    2015-03-01

    With the growing ubiquity of mobile devices, advanced applications are relying on computer vision techniques to provide novel experiences for users. Currently, few tracking approaches take into consideration the resource constraints on mobile devices. Designing efficient tracking algorithms and optimizing performance for mobile devices can result in better and more efficient tracking for applications, such as augmented reality. In this paper, we use binary descriptors, including Fast Retina Keypoint (FREAK), Oriented FAST and Rotated BRIEF (ORB), Binary Robust Independent Features (BRIEF), and Binary Robust Invariant Scalable Keypoints (BRISK) to obtain real time tracking performance on mobile devices. We consider both Google's Android and Apple's iOS operating systems to implement our tracking approach. The Android implementation is done using Android's Native Development Kit (NDK), which gives the performance benefits of using native code as well as access to legacy libraries. The iOS implementation was created using both the native Objective-C and the C++ programing languages. We also introduce simplified versions of the BRIEF and BRISK descriptors that improve processing speed without compromising tracking accuracy.

  20. Natural Environment Illumination: Coherent Interactive Augmented Reality for Mobile and Non-Mobile Devices.

    Science.gov (United States)

    Rohmer, Kai; Jendersie, Johannes; Grosch, Thorsten

    2017-11-01

    Augmented Reality offers many applications today, especially on mobile devices. Due to the lack of mobile hardware for illumination measurements, photorealistic rendering with consistent appearance of virtual objects is still an area of active research. In this paper, we present a full two-stage pipeline for environment acquisition and augmentation of live camera images using a mobile device with a depth sensor. We show how to directly work on a recorded 3D point cloud of the real environment containing high dynamic range color values. For unknown and automatically changing camera settings, a color compensation method is introduced. Based on this, we show photorealistic augmentations using variants of differential light simulation techniques. The presented methods are tailored for mobile devices and run at interactive frame rates. However, our methods are scalable to trade performance for quality and can produce quality renderings on desktop hardware.