WorldWideScience

Sample records for wireless physical layer

  1. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  2. Securing wireless communications at the physical layer

    CERN Document Server

    Liu, Ruoheng

    2009-01-01

    Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validatio

  3. Wireless Physical Layer Security with CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2017-09-01

    Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users. Physical layer security is one of the most promising solutions that were proposed to enhance the security of next generation wireless systems. The fundamental idea behind this technique is to exploit the randomness and the fluctuations of the wireless channel to achieve security without conditional assumptions on the computational capabilities of the eavesdropper. In fact, while these elements have traditionally been associated with signal deterioration, physical layer security uses them to ensure the confidentiality of the users. Nevertheless, these technical virtues rely heavily on perhaps idealistic channel state information assumptions. In that regard, the aim of this thesis is to look at the physical layer security paradigm from the channel uncertainty perspective. In particular, we discuss the ergodic secrecy capacity of different wiretap channels when the transmitter is hampered by the imperfect knowledge of the channel state information (CSI). We consider two prevalent causes of uncertainty for the CSI at transmitter (CSIT); either an error of estimation occurs at the transmitter and he can only base his coding and the transmission strategies on a noisy version of the CSI, or the CSI feedback link has a limited capacity and the legitimate receivers can only inform the transmitter about the quantized CSI. We investigate both the single-user multiple-input multiple-output (MIMO) wiretap channel and the multi-user broadcast wiretap channel. In the latter scenario, we distinguish between two situations: multiple messages transmission and common message transmission. We also discuss the broadcast channel with confidential messages (BCCM) where the transmitter has one common message to be transmitted to two users and one

  4. Wireless Physical Layer Security with CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2017-01-01

    Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users

  5. Physical layer approaches for securing wireless communication systems

    CERN Document Server

    Wen, Hong

    2013-01-01

    This book surveys the outstanding work of physical-layer (PHY) security, including  the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated.  Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach

  6. Cognitive Security of Wireless Communication Systems in the Physical Layer

    Directory of Open Access Journals (Sweden)

    Mustafa Harun Yılmaz

    2017-01-01

    Full Text Available While the wireless communication systems provide the means of connectivity nearly everywhere and all the time, communication security requires more attention. Even though current efforts provide solutions to specific problems under given circumstances, these methods are neither adaptive nor flexible enough to provide security under the dynamic conditions which make the security breaches an important concern. In this paper, a cognitive security (CS concept for wireless communication systems in the physical layer is proposed with the aim of providing a comprehensive solution to wireless security problems. The proposed method will enable the comprehensive security to ensure a robust and reliable communication in the existence of adversaries by providing adaptive security solutions in the communication systems by exploiting the physical layer security from different perspective. The adaptiveness relies on the fact that radio adapts its propagation characteristics to satisfy secure communication based on specific conditions which are given as user density, application specific adaptation, and location within CS concept. Thus, instead of providing any type of new security mechanism, it is proposed that radio can take the necessary precautions based on these conditions before the attacks occur. Various access scenarios are investigated to enable the CS while considering these conditions.

  7. Applying Physical-Layer Network Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liew SoungChang

    2010-01-01

    Full Text Available A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11. This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in 1D regular linear networks with multiple random flows. The throughput improvements are even larger in 2D regular networks: 200% and 100%, respectively.

  8. Physical Layer Design in Wireless Sensor Networks for Fading Mitigation

    Directory of Open Access Journals (Sweden)

    Nuo Chen

    2013-09-01

    Full Text Available This paper presents the theoretical analysis, simulation results and suggests design in digital technology of a physical layer for wireless sensor networks. The proposed design is able to mitigate fading inside communication channel. To mitigate fading the chip interleaving technique is proposed. For the proposed theoretical model of physical layer, a rigorous mathematical analysis is conducted, where all signals are presented and processed in discrete time domain form which is suitable for further direct processing necessary for devices design in digital technology. Three different channels are used to investigate characteristics of the physical layer: additive white Gaussian noise channel (AWGN, AWG noise and flat fading channel and AWG noise and flat fading channel with interleaver and deinterleaver blocks in the receiver and transmitter respectively. Firstly, the mathematical model of communication system representing physical layer is developed based on the discrete time domain signal representation and processing. In the existing theory, these signals and their processing are represented in continuous time form, which is not suitable for direct implementation in digital technology. Secondly, the expressions for the probability of chip, symbol and bit error are derived. Thirdly, the communication system simulators are developed in MATLAB. The simulation results confirmed theoretical findings.

  9. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    Science.gov (United States)

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  10. Signal processing approaches to secure physical layer communications in multi-antenna wireless systems

    CERN Document Server

    Hong, Y-W Peter; Kuo, C-C Jay

    2013-01-01

    This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping. While most articles on physical layer secrecy focus on the information-theoretic aspect, we focus specifically on the signal processing aspects, including beamforming and precoding techniques for data transmission and discriminatory training schemes for channel estimation. The discussions will c

  11. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Science.gov (United States)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  12. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  13. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers

    NARCIS (Netherlands)

    Climent, S.; Sanchez, A.; Capella, J.V.; Meratnia, Nirvana; Serrano, J.J.

    2014-01-01

    This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control

  14. Cooperative Wireless Communications and Physical Layer Security : State of the Art

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    in the mobile equipment is not feasible due to resource constraints. Cooperative wireless communication (CWC) is the upcoming virtual MIMO technique to combat fading and achieve diversity through user cooperation. Physical layer security (PLS) is the imminent security guarantee for the cooperative communication....

  15. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuhua Wang

    2017-02-01

    Full Text Available Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  16. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  17. Improving the physical layer security of wireless communication networks using spread spectrum coding and artificial noise approach

    CSIR Research Space (South Africa)

    Adedeji, K

    2016-09-01

    Full Text Available at the application layer to protect the messages against eavesdropping. However, the evolution of strong deciphering mechanisms has made conventional cryptography-based security techniques ineffective against attacks from an intruder. Figure 1: Layer protocol... communication networks with passive and active eavesdropper,” IEEE Globecom; Wireless Communication System, pp. 4868-4873, 2012. [9] Y. Zou, X. Wang and W. Shen, “Optimal relay selection for physical layer security in cooperative wireless networks,” IEEE...

  18. A Real-Time GPP Software-Defined Radio Testbed for the Physical Layer of Wireless Standards

    NARCIS (Netherlands)

    Schiphorst, Roelof; Hoeksema, F.W.; Slump, Cornelis H.

    2005-01-01

    We present our contribution to the general-purpose-processor-(GPP)-based radio. We describe a baseband software-defined radio testbed for the physical layer of wireless LAN standards. All physical layer functions have been successfully mapped on a Pentium 4 processor that performs these functions in

  19. Revisiting of Channel Access Mechanisms in Mobile Wireless Networks through Exploiting Physical Layer Technologies

    Directory of Open Access Journals (Sweden)

    Junmei Yao

    2018-01-01

    Full Text Available The wireless local area networks (WLANs have been widely deployed with the rapid development of mobile devices and have further been brought into new applications with infrastructure mobility due to the growth of unmanned aerial vehicles (UAVs. However, the WLANs still face persistent challenge on increasing the network throughput to meet the customer’s requirement and fight against the node mobility. Interference is a well-known issue that would degrade the network performance due to the broadcast characteristics of the wireless signals. Moreover, with infrastructure mobility, the interference becomes the key obstacle in pursuing the channel capacity. Legacy interference management mechanism through the channel access control in the MAC layer design of the 802.11 standard has some well-known drawbacks, such as exposed and hidden terminal problems, inefficient rate adaptation, and retransmission schemes, making the efficient interference management an everlasting research topic over the years. Recently, interference management through exploiting physical layer mechanisms has attracted much research interest and has been proven to be a promising way to improve the network throughput, especially under the infrastructure mobility scenarios which provides more indicators for node dynamics. In this paper, we introduce a series of representative physical layer techniques and analyze how they are exploited for interference management to improve the network performance. We also provide some discussions about the research challenges and give potential future research topics in this area.

  20. An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Alouini, Mohamed-Slim

    2016-01-01

    The concept of physical layer security builds on the pivotal idea of turning the channel's imperfections, such as noise and fading, into a source of security. This is established through appropriately designed coding techniques and signal processing strategies. In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is better than the main channel. However, to fully benefit from what fading has to offer, the knowledge of the channel state information at the transmitter (CSIT) is of primordial importance. In practical wireless communication systems, CSIT is usually obtained, prior to data transmission, through CSI feedback sent by the receivers. The channel links over which this feedback information is sent can be either noisy, rate-limited, or delayed, leading to CSIT uncertainty. In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty. We focus on both information theoretic and signal processing approaches to the topic when the uncertainty concerns the channel to the wiretapper or the channel to the legitimate receiver. Moreover, we present a classification of the research works based on the considered channel uncertainty. Mainly, we distinguish between the cases when the uncertainty comes from an estimation error of the CSIT, from a CSI feedback link with limited capacity, or from an outdated CSI.

  1. An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2016-09-21

    The concept of physical layer security builds on the pivotal idea of turning the channel\\'s imperfections, such as noise and fading, into a source of security. This is established through appropriately designed coding techniques and signal processing strategies. In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is better than the main channel. However, to fully benefit from what fading has to offer, the knowledge of the channel state information at the transmitter (CSIT) is of primordial importance. In practical wireless communication systems, CSIT is usually obtained, prior to data transmission, through CSI feedback sent by the receivers. The channel links over which this feedback information is sent can be either noisy, rate-limited, or delayed, leading to CSIT uncertainty. In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty. We focus on both information theoretic and signal processing approaches to the topic when the uncertainty concerns the channel to the wiretapper or the channel to the legitimate receiver. Moreover, we present a classification of the research works based on the considered channel uncertainty. Mainly, we distinguish between the cases when the uncertainty comes from an estimation error of the CSIT, from a CSI feedback link with limited capacity, or from an outdated CSI.

  2. Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

    Directory of Open Access Journals (Sweden)

    Liuguo Yin

    2018-01-01

    Full Text Available Due to the broadcast and time-varying natures of wireless channels, traditional communication systems that provide data encryption at the application layer suffer many challenges such as error diffusion. In this paper, we propose a code-hopping based secrecy transmission scheme that uses dynamic nonsystematic low-density parity-check (LDPC codes and automatic repeat-request (ARQ mechanism to jointly encode and encrypt source messages at the physical layer. In this scheme, secret keys at the transmitter and the legitimate receiver are generated dynamically upon the source messages that have been transmitted successfully. During the transmission, each source message is jointly encoded and encrypted by a parity-check matrix, which is dynamically selected from a set of LDPC matrices based on the shared dynamic secret key. As for the eavesdropper (Eve, the uncorrectable decoding errors prevent her from generating the same secret key as the legitimate parties. Thus she cannot select the correct LDPC matrix to recover the source message. We demonstrate that our scheme can be compatible with traditional cryptosystems and enhance the security without sacrificing the error-correction performance. Numerical results show that the bit error rate (BER of Eve approaches 0.5 as the number of transmitted source messages increases and the security gap of the system is small.

  3. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  4. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-01-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public

  5. Cross-Layer Wireless Resource Allocation

    National Research Council Canada - National Science Library

    Berry, Randall A; Yeh, Edmund M

    2005-01-01

    .... This bit pipe is a simple abstraction of the underlying physical and data link layers. There is growing awareness that this simple bit-pipe view is inadequate, particularly in the context of modern wireless data networks...

  6. Joint optimization of physical layer parameters and routing in wireless mesh networks

    KAUST Repository

    Tobagi, Fouad A.

    2010-06-01

    Achieving the best performance in a wireless mesh network requires striking the right balance between the performance of links carrying traffic and the extent of spatial reuse of the wireless medium. The performance of a link depends on its transmit power and data rate as well as the level of interference caused by concurrent transmissions in the network; the latter is function of the Energy Detect (ED) threshold that determines when a node may access the medium. Which links in the network carry traffic is determined by the routing function; routing selects paths according to a link metric that reflects the relative performance of links (e.g., the expected transmission time of a packet on the link). In this paper, we seek to maximize end-to-end network throughput by jointly optimizing physical layer parameters and routing. We consider a random topology with a uniform node density. We consider that the signal attenuation between a pair of nodes is determined by a power law path loss model with an exponent equal to 3. Our findings are as follows. Consider first that the same transmit power and same data rate are used on all links. For any transmit power, data rate and ED threshold setting, the highest feasible load is obtained when the level of interference experienced by links used by routing is the highest possible. For a given transmit power and data rate setting, there is an optimum ED threshold that maximizes network performance. At the optimum ED threshold and maximum load, the range of link lengths used by routing is the lowest possible given the topology and routing metric used. With an ED threshold higher than the optimum, the same range of links is used by routing; however, the highest feasible load in this case is lower due to the fact that concurrent transmitters are allowed to be closer. With a lower ED threshold, concurrent transmitters are forced to be farther apart, and thus longer links become more attractive; as a result, the range of link lengths

  7. Joint optimization of physical layer parameters and routing in wireless mesh networks

    KAUST Repository

    Tobagi, Fouad A.; Hira, Mukesh M.

    2010-01-01

    Achieving the best performance in a wireless mesh network requires striking the right balance between the performance of links carrying traffic and the extent of spatial reuse of the wireless medium. The performance of a link depends on its transmit power and data rate as well as the level of interference caused by concurrent transmissions in the network; the latter is function of the Energy Detect (ED) threshold that determines when a node may access the medium. Which links in the network carry traffic is determined by the routing function; routing selects paths according to a link metric that reflects the relative performance of links (e.g., the expected transmission time of a packet on the link). In this paper, we seek to maximize end-to-end network throughput by jointly optimizing physical layer parameters and routing. We consider a random topology with a uniform node density. We consider that the signal attenuation between a pair of nodes is determined by a power law path loss model with an exponent equal to 3. Our findings are as follows. Consider first that the same transmit power and same data rate are used on all links. For any transmit power, data rate and ED threshold setting, the highest feasible load is obtained when the level of interference experienced by links used by routing is the highest possible. For a given transmit power and data rate setting, there is an optimum ED threshold that maximizes network performance. At the optimum ED threshold and maximum load, the range of link lengths used by routing is the lowest possible given the topology and routing metric used. With an ED threshold higher than the optimum, the same range of links is used by routing; however, the highest feasible load in this case is lower due to the fact that concurrent transmitters are allowed to be closer. With a lower ED threshold, concurrent transmitters are forced to be farther apart, and thus longer links become more attractive; as a result, the range of link lengths

  8. Physical-Layer Design for Next-Generation Cellular Wireless Systems

    NARCIS (Netherlands)

    Foschini, Gerard J.; Huang, Howard C.; Mullender, Sape J.; Venkatesan, Sivarama; Viswanathan, Harish

    The conventional cellular architecture will remain an integral part of nextgeneration wireless systems, providing high-speed packet data services directly to mobile users and also backhaul service for local area networks. In this paper, we present several proposals addressing the challenges

  9. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    of interfering nodes and usage of spatial reservation mechanisms. Specifically, we introduce a reserved area in order to protect the nodes involved in two-way relaying from the interference caused by neighboring nodes. We analytically derive the end-to-end rate achieved by PLNC considering the impact......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  10. High-rate wireless data communications: An underwater acoustic communications framework at the physical layer

    Directory of Open Access Journals (Sweden)

    Bessios Anthony G.

    1996-01-01

    Full Text Available A variety of signal processing functions are performed by Underwater Acoustic Systems. These include: 1 detection to determine presence or absence of information signals in the presence of noise, or an attempt to describe which of a predetermined finite set of possible messages { m i , i , ... , M } the signal represents; 2 estimation of some parameter θ ˆ associated with the received signal (i.e. range, depth, bearing angle, etc.; 3 classification and source identification; 4 dynamics tracking; 5 navigation (collision avoidance and terminal guidance; 6 countermeasures; and 7 communications. The focus of this paper is acoustic communications. There is a global current need to develop reliable wireless digital communications for the underwater environment, with sufficient performance and efficiency to substitute for costly wired systems. One possible goal is a wireless system implementation that insures underwater terminal mobility. There is also a vital need to improve the performance of the existing systems in terms of data-rate, noise immunity, operational range, and power consumption, since, in practice, portable high-speed, long range, compact, low-power systems are desired. We concede the difficulties associated with acoustic systems and concentrate on the development of robust data transmission methods anticipating the eventual need for real time or near real time video transmission. An overview of the various detection techniques and the general statistical digital communication problem is given based on a statistical decision theory framework. The theoretical formulation of the underwater acoustic data communications problem includes modeling of the stochastic channel to incorporate a variety of impairments and environmental uncertainties, and proposal of new compensation strategies for an efficient and robust receiver design.

  11. Information Security of PHY Layer in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weidong Fang

    2016-01-01

    Full Text Available Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.

  12. Cross-Layer Adaptive Feedback Scheduling of Wireless Control Systems

    Science.gov (United States)

    Xia, Feng; Ma, Longhua; Peng, Chen; Sun, Youxian; Dong, Jinxiang

    2008-01-01

    There is a trend towards using wireless technologies in networked control systems. However, the adverse properties of the radio channels make it difficult to design and implement control systems in wireless environments. To attack the uncertainty in available communication resources in wireless control systems closed over WLAN, a cross-layer adaptive feedback scheduling (CLAFS) scheme is developed, which takes advantage of the co-design of control and wireless communications. By exploiting cross-layer design, CLAFS adjusts the sampling periods of control systems at the application layer based on information about deadline miss ratio and transmission rate from the physical layer. Within the framework of feedback scheduling, the control performance is maximized through controlling the deadline miss ratio. Key design parameters of the feedback scheduler are adapted to dynamic changes in the channel condition. An event-driven invocation mechanism for the feedback scheduler is also developed. Simulation results show that the proposed approach is efficient in dealing with channel capacity variations and noise interference, thus providing an enabling technology for control over WLAN. PMID:27879934

  13. Cross-Layer Adaptive Feedback Scheduling of Wireless Control Systems

    Directory of Open Access Journals (Sweden)

    Jinxiang Dong

    2008-07-01

    Full Text Available There is a trend towards using wireless technologies in networked control systems. However, the adverse properties of the radio channels make it difficult to design and implement control systems in wireless environments. To attack the uncertainty in available communication resources in wireless control systems closed over WLAN, a cross-layer adaptive feedback scheduling (CLAFS scheme is developed, which takes advantage of the co-design of control and wireless communications. By exploiting crosslayer design, CLAFS adjusts the sampling periods of control systems at the application layer based on information about deadline miss ratio and transmission rate from the physical layer. Within the framework of feedback scheduling, the control performance is maximized through controlling the deadline miss ratio. Key design parameters of the feedback scheduler are adapted to dynamic changes in the channel condition. An eventdriven invocation mechanism for the feedback scheduler is also developed. Simulation results show that the proposed approach is efficient in dealing with channel capacity variations and noise interference, thus providing an enabling technology for control over WLAN.

  14. Distributed Cross-layer Monitoring in Wireless Mesh Networks

    OpenAIRE

    Panmin, Ye; Yong,

    2009-01-01

    Wireless mesh networks has rapid development over the last few years. However, due to properties such as distributed infrastructure and interference, which strongly affect the performance of wireless mesh networks, developing technology has to face the challenge of architecture and protocol design issues. Traditional layered protocols do not function efficiently in multi-hop wireless environments. To get deeper understanding on interaction of the layered protocols and optimize the performance...

  15. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  16. Cross-layer optimization of wireless multi-hop networks

    OpenAIRE

    Soldati, Pablo

    2007-01-01

    The interest in wireless communications has grown constantly for the past decades, leading to an enormous number of applications and services embraced by billions of users. In order to meet the increasing demand for mobile Internet access, several high data-rate radio networking technologies have been proposed to offer wide area high-speed wireless communications, eventually replacing fixed (wired) networks for many applications. This thesis considers cross-layer optimization of multi-hop rad...

  17. A cross-layer communication framework for wireless networked control systems

    NARCIS (Netherlands)

    Israr, N.; Scanlon, W.G.; Irwin, G.W.

    2009-01-01

    This paper presents a robust, dynamic cross-layer wireless communication architecture for wireless networked control systems. Each layer in the proposed protocol architecture contributes to the overall goal of reliable, energy efficient communication. The protocol stack also features a

  18. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  19. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Directory of Open Access Journals (Sweden)

    Xin Yang

    Full Text Available Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  20. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Science.gov (United States)

    Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  1. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  2. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  3. Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems

    Directory of Open Access Journals (Sweden)

    Troy Weingart

    2007-01-01

    Full Text Available The flexibility of cognitive and software-defined radio heralds an opportunity for researchers to reexamine how network protocol layers operate with respect to providing quality of service aware transmission among wireless nodes. This opportunity is enhanced by the continued development of spectrally responsive devices—ones that can detect and respond to changes in the radio frequency environment. Present wireless network protocols define reliability and other performance-related tasks narrowly within layers. For example, the frame size employed on 802.11 can substantially influence the throughput, delay, and jitter experienced by an application, but there is no simple way to adapt this parameter. Furthermore, while the data link layer of 802.11 provides error detection capabilities across a link, it does not specify additional features, such as forward error correction schemes, nor does it provide a means for throttling retransmissions at the transport layer (currently, the data link and transport layer can function counterproductively with respect to reliability. This paper presents an analysis of the interaction of physical, data link, and network layer parameters with respect to throughput, bit error rate, delay, and jitter. The goal of this analysis is to identify opportunities where system designers might exploit cross-layer interactions to improve the performance of Voice over IP (VoIP, instant messaging (IM, and file transfer applications.

  4. Trusted communications with physical layer security for 5G and beyond

    CERN Document Server

    Duong, Trung Q; Poor, H Vincent

    2017-01-01

    Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.

  5. Safe Cooperating Cyber-Physical Systems using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Sljivo, Irfan

    2017-01-01

    This paper presents an overview of the ECSEL project entitled ―Safe Cooperating Cyber-Physical Systems using Wireless Communication‖ (SafeCOP), which runs during the period 2016–2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  6. Optimised cross-layer synchronisation schemes for wireless sensor networks

    Science.gov (United States)

    Nasri, Nejah; Ben Fradj, Awatef; Kachouri, Abdennaceur

    2017-07-01

    This paper aims at synchronisation between the sensor nodes. Indeed, in the context of wireless sensor networks, it is necessary to take into consideration the energy cost induced by the synchronisation, which can represent the majority of the energy consumed. On communication, an already identified hard point consists in imagining a fine synchronisation protocol which must be sufficiently robust to the intermittent energy in the sensors. Hence, this paper worked on aspects of performance and energy saving, in particular on the optimisation of the synchronisation protocol using cross-layer design method such as synchronisation between layers. Our approach consists in balancing the energy consumption between the sensors and choosing the cluster head with the highest residual energy in order to guarantee the reliability, integrity and continuity of communication (i.e. maximising the network lifetime).

  7. A primer on physical-layer network coding

    CERN Document Server

    Liew, Soung Chang; Zhang, Shengli

    2015-01-01

    The concept of physical-layer network coding (PNC) was proposed in 2006 for application in wireless networks. Since then it has developed into a subfield of communications and networking with a wide following. This book is a primer on PNC. It is the outcome of a set of lecture notes for a course for beginning graduate students at The Chinese University of Hong Kong. The target audience is expected to have some prior background knowledge in communication theory and wireless communications, but not working knowledge at the research level. Indeed, a goal of this book/course is to allow the reader

  8. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  9. Physical layer simulation study for the coexistence of WLAN standards

    Energy Technology Data Exchange (ETDEWEB)

    Howlader, M. K. [Marquette Univ., 222 Haggerty Hall, P. O. Box 1881, Milwaukee, WI 53201 (United States); Keiger, C. [Analysis and Measurement Services Corporation, 9111 Cross Park Drive, Knoxville, TN 37923 (United States); Ewing, P. D. [Oak Ridge National Laboratory, MS-6006, P. O. Box 2008, Oak Ridge, TN 37831 (United States); Govan, T. V. [U.S. Nuclear Regulatory Commission, MS T-10-D20, 11545 Rockville Pike, Rockville, MD 20852 (United States)

    2006-07-01

    This paper presents the results of a study on the performance of wireless local area network (WLAN) devices in the presence of interference from other wireless devices. To understand the coexistence of these wireless protocols, simplified physical-layer-system models were developed for the Bluetooth, Wireless Fidelity (WiFi), and Zigbee devices, all of which operate within the 2.4-GHz frequency band. The performances of these protocols were evaluated using Monte-Carlo simulations under various interference and channel conditions. The channel models considered were basic additive white Gaussian noise (AWGN), Rayleigh fading, and site-specific fading. The study also incorporated the basic modulation schemes, multiple access techniques, and channel allocations of the three protocols. This research is helping the U.S. Nuclear Regulatory Commission (NRC) understand the coexistence issues associated with deploying wireless devices and could prove useful in the development of a technical basis for guidance to address safety-related issues with the implementation of wireless systems in nuclear facilities. (authors)

  10. Physical layer simulation study for the coexistence of WLAN standards

    International Nuclear Information System (INIS)

    Howlader, M. K.; Keiger, C.; Ewing, P. D.; Govan, T. V.

    2006-01-01

    This paper presents the results of a study on the performance of wireless local area network (WLAN) devices in the presence of interference from other wireless devices. To understand the coexistence of these wireless protocols, simplified physical-layer-system models were developed for the Bluetooth, Wireless Fidelity (WiFi), and Zigbee devices, all of which operate within the 2.4-GHz frequency band. The performances of these protocols were evaluated using Monte-Carlo simulations under various interference and channel conditions. The channel models considered were basic additive white Gaussian noise (AWGN), Rayleigh fading, and site-specific fading. The study also incorporated the basic modulation schemes, multiple access techniques, and channel allocations of the three protocols. This research is helping the U.S. Nuclear Regulatory Commission (NRC) understand the coexistence issues associated with deploying wireless devices and could prove useful in the development of a technical basis for guidance to address safety-related issues with the implementation of wireless systems in nuclear facilities. (authors)

  11. Cross Layer Interference Management in Wireless Biomedical Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil G. Spanakis

    2014-04-01

    Full Text Available Interference, in wireless networks, is a central phenomenon when multiple uncoordinated links share a common communication medium. The study of the interference channel was initiated by Shannon in 1961 and since then this problem has been thoroughly elaborated at the Information theoretic level but its characterization still remains an open issue. When multiple uncoordinated links share a common medium the effect of interference is a crucial limiting factor for network performance. In this work, using cross layer cooperative communication techniques, we study how to compensate interference in the context of wireless biomedical networks, where many links transferring biomedical or other health related data may be formed and suffer from all other interfering transmissions, to allow successful receptions and improve the overall network performance. We define the interference limited communication range to be the critical communication region around a receiver, with a number of surrounding interfering nodes, within which a successful communication link can be formed. Our results indicate that we can achieve more successful transmissions by adapting the transmission rate and power, to the path loss exponent, and the selected mode of the underline communication technique allowing interference mitigation and when possible lower power consumption and increase achievable transmission rates.

  12. Design and Study of Cognitive Network Physical Layer Simulation Platform

    Directory of Open Access Journals (Sweden)

    Yongli An

    2014-01-01

    Full Text Available Cognitive radio technology has received wide attention for its ability to sense and use idle frequency. IEEE 802.22 WRAN, the first to follow the standard in cognitive radio technology, is featured by spectrum sensing and wireless data transmission. As far as wireless transmission is concerned, the availability and implementation of a mature and robust physical layer algorithm are essential to high performance. For the physical layer of WRAN using OFDMA technology, this paper proposes a synchronization algorithm and at the same time provides a public platform for the improvement and verification of that new algorithm. The simulation results show that the performance of the platform is highly close to the theoretical value.

  13. Wireless data transmission for high energy physics applications

    Science.gov (United States)

    Dittmeier, Sebastian; Brenner, Richard; Dancila, Dragos; Dehos, Cedric; De Lurgio, Patrick; Djurcic, Zelimir; Drake, Gary; Gonzalez Gimenez, Jose Luis; Gustafsson, Leif; Kim, Do-Won; Locci, Elizabeth; Pfeiffer, Ullrich; Röhrich, Dieter; Rydberg, Anders; Schöning, André; Siligaris, Alexandre; Soltveit, Hans Kristian; Ullaland, Kjetil; Vincent, Pierre; Rodriguez Vazquez, Pedro; Wiedner, Dirk; Yang, Shiming

    2017-08-01

    Silicon tracking detectors operated at high luminosity collider experiments pose a challenge for current and future readout systems regarding bandwidth, radiation, space and power constraints. With the latest developments in wireless communications, wireless readout systems might be an attractive alternative to commonly used wired optical and copper based readout architectures. The WADAPT group (Wireless Allowing Data and Power Transmission) has been formed to study the feasibility of wireless data transmission for future tracking detectors. These proceedings cover current developments focused on communication in the 60 GHz band. This frequency band offers a high bandwidth, a small form factor and an already mature technology. Motivation for wireless data transmission for high energy physics application and the developments towards a demonstrator prototype are summarized. Feasibility studies concerning the construction and operation of a wireless transceiver system have been performed. Data transmission tests with a transceiver prototype operating at even higher frequencies in the 240 GHz band are described. Data transmission at rates up to 10 Gb/s have been obtained successfully using binary phase shift keying.

  14. Physical Layer Ethernet Clock Synchronization

    Science.gov (United States)

    2010-11-01

    42 nd Annual Precise Time and Time Interval (PTTI) Meeting 77 PHYSICAL LAYER ETHERNET CLOCK SYNCHRONIZATION Reinhard Exel, Georg...oeaw.ac.at Nikolaus Kerö Oregano Systems, Mohsgasse 1, 1030 Wien, Austria E-mail: nikolaus.keroe@oregano.at Abstract Clock synchronization ...is a service widely used in distributed networks to coordinate data acquisition and actions. As the requirement to achieve tighter synchronization

  15. Worlds largest particle physics laboratory selects Proxim Wireless Mesh

    CERN Multimedia

    2007-01-01

    "Proxim Wireless has announced that the European Organization for Nuclear Research (CERN), the world's largest particle physics laboratory and the birthplace of the World Wide Web, is using it's ORiNOCO AP-4000 mesh access points to extend the range of the laboratory's Wi-Fi network and to provide continuous monitoring of the lab's calorimeters" (1/2 page)

  16. A Cross-Layer Cooperation Mechanism of Wireless Networks Based on Game Theory

    OpenAIRE

    Chunsheng, Cui; Yongjian, Yang; Liping, Huang

    2014-01-01

    To meet the wireless network congestion control problem, we give a definition of congestion degree classification and propose a mechanism of directed cooperative path net, guided by the wireless network’s cross-layer design methods and node cooperation principles. Considering the virtual collision and “starved” phenomenon in congested networks, the QRD mechanism and channel competition mechanism QPCG are proposed, with introducing the game theory into the cross-layer design. Simulation result...

  17. Cross-Layer Optimal Rate Allocation for Heterogeneous Wireless Multicast

    Directory of Open Access Journals (Sweden)

    Amr Mohamed

    2009-01-01

    Full Text Available Heterogeneous multicast is an efficient communication scheme especially for multimedia applications running over multihop networks. The term heterogeneous refers to the phenomenon when multicast receivers in the same session require service at different rates commensurate with their capabilities. In this paper, we address the problem of resource allocation for a set of heterogeneous multicast sessions over multihop wireless networks. We propose an iterative algorithm that achieves the optimal rates for a set of heterogeneous multicast sessions such that the aggregate utility for all sessions is maximized. We present the formulation of the multicast resource allocation problem as a nonlinear optimization model and highlight the cross-layer framework that can solve this problem in a distributed ad hoc network environment with asynchronous computations. Our simulations show that the algorithm achieves optimal resource utilization, guarantees fairness among multicast sessions, provides flexibility in allocating rates over different parts of the multicast sessions, and adapts to changing conditions such as dynamic channel capacity and node mobility. Our results show that the proposed algorithm not only provides flexibility in allocating resources across multicast sessions, but also increases the aggregate system utility and improves the overall system throughput by almost 30% compared to homogeneous multicast.

  18. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  19. Cross-Layer Design of Source Rate Control and Congestion Control for Wireless Video Streaming

    Directory of Open Access Journals (Sweden)

    Peng Zhu

    2007-01-01

    Full Text Available Cross-layer design has been used in streaming video over the wireless channels to optimize the overall system performance. In this paper, we extend our previous work on joint design of source rate control and congestion control for video streaming over the wired channel, and propose a cross-layer design approach for wireless video streaming. First, we extend the QoS-aware congestion control mechanism (TFRCC proposed in our previous work to the wireless scenario, and provide a detailed discussion about how to enhance the overall performance in terms of rate smoothness and responsiveness of the transport protocol. Then, we extend our previous joint design work to the wireless scenario, and a thorough performance evaluation is conducted to investigate its performance. Simulation results show that by cross-layer design of source rate control at application layer and congestion control at transport layer, and by taking advantage of the MAC layer information, our approach can avoid the throughput degradation caused by wireless link error, and better support the QoS requirements of the application. Thus, the playback quality is significantly improved, while good performance of the transport protocol is still preserved.

  20. The Study of Cross-layer Optimization for Wireless Rechargeable Sensor Networks Implemented in Coal Mines

    Science.gov (United States)

    Ding, Xu; Shi, Lei; Han, Jianghong; Lu, Jingting

    2016-01-01

    Wireless sensor networks deployed in coal mines could help companies provide workers working in coal mines with more qualified working conditions. With the underground information collected by sensor nodes at hand, the underground working conditions could be evaluated more precisely. However, sensor nodes may tend to malfunction due to their limited energy supply. In this paper, we study the cross-layer optimization problem for wireless rechargeable sensor networks implemented in coal mines, of which the energy could be replenished through the newly-brewed wireless energy transfer technique. The main results of this article are two-fold: firstly, we obtain the optimal relay nodes’ placement according to the minimum overall energy consumption criterion through the Lagrange dual problem and KKT conditions; secondly, the optimal strategies for recharging locomotives and wireless sensor networks are acquired by solving a cross-layer optimization problem. The cyclic nature of these strategies is also manifested through simulations in this paper. PMID:26828500

  1. Migration of TCP Connections with Layer-2 Support in Wireless Environments

    NARCIS (Netherlands)

    Bosch, H.G.P.; Cortes, Mauricio; Janiszewski, Tom J.; McKie, Jim B.; Mullender, Sape J.; Rajkumar, Ajay; Recchione, Michael C.; Rossetti, David A.; Turner, Michael D.

    2008-01-01

    Example embodiments provide methods of transparently migrating a reliable transport layer connection between a user and a first base station and a second base station in a wireless network. The method includes receiving at least one transport layer connection state information parameter from the

  2. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    Science.gov (United States)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node

  3. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    Science.gov (United States)

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  4. A Cross-Layer Routing Design for Multi-Interface Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Tzu-Chieh Tsai

    2009-01-01

    Full Text Available In recent years, Wireless Mesh Networks (WMNs technologies have received significant attentions. WMNs not only accede to the advantages of ad hoc networks but also provide hierarchical multi-interface architecture. Transmission power control and routing path selections are critical issues in the past researches of multihop networks. Variable transmission power levels lead to different network connectivity and interference. Further, routing path selections among different radio interfaces will also produce different intra-/interflow interference. These features tightly affect the network performance. Most of the related works on the routing protocol design do not consider transmission power control and multi-interface environment simultaneously. In this paper, we proposed a cross-layer routing protocol called M2iRi2 which coordinates transmission power control and intra-/interflow interference considerations as routing metrics. Each radio interface calculates the potential tolerable-added transmission interference in the physical layer. When the route discovery starts, the M2iRi2 will adopt the appropriate power level to evaluate each interface quality along paths. The simulation results demonstrate that our design can enhance both network throughput and end-to-end delay.

  5. Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols

    NARCIS (Netherlands)

    Law, Y.W.; van Hoesel, L.F.W.; Doumen, J.M.; Hartel, Pieter H.; Havinga, Paul J.M.; Atluri, V.; Samarati, P.; Ning, P.; Du, W.

    2005-01-01

    A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help prevent the jammer from taking actions based on the content of the

  6. Cross-layer optimized rate adaptation and scheduling for multiple-user wireless video streaming

    NARCIS (Netherlands)

    Ozcelebi, T.; Sunay, M.O.; Tekalp, A.M.; Civanlar, M.R.

    2007-01-01

    We present a cross-layer optimized video rate adaptation and user scheduling scheme for multi-user wireless video streaming aiming for maximum quality of service (QoS) for each user,, maximum system video throughput, and QoS fairness among users. These objectives are jointly optimized using a

  7. Cross-Layer Techniques for Adaptive Video Streaming over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Yufeng Shan

    2005-02-01

    Full Text Available Real-time streaming media over wireless networks is a challenging proposition due to the characteristics of video data and wireless channels. In this paper, we propose a set of cross-layer techniques for adaptive real-time video streaming over wireless networks. The adaptation is done with respect to both channel and data. The proposed novel packetization scheme constructs the application layer packet in such a way that it is decomposed exactly into an integer number of equal-sized radio link protocol (RLP packets. FEC codes are applied within an application packet at the RLP packet level rather than across different application packets and thus reduce delay at the receiver. A priority-based ARQ, together with a scheduling algorithm, is applied at the application layer to retransmit only the corrupted RLP packets within an application layer packet. Our approach combines the flexibility and programmability of application layer adaptations, with low delay and bandwidth efficiency of link layer techniques. Socket-level simulations are presented to verify the effectiveness of our approach.

  8. Low latency adaptive streaming of HD H.264 video over 802.11 wireless networks with cross-layer feedback

    Science.gov (United States)

    Patti, Andrew; Tan, Wai-tian; Shen, Bo

    2007-09-01

    Streaming video in consumer homes over wireless IEEE 802.11 networks is becoming commonplace. Wireless 802.11 networks pose unique difficulties for streaming high definition (HD), low latency video due to their error-prone physical layer and media access procedures which were not designed for real-time traffic. HD video streaming, even with sophisticated H.264 encoding, is particularly challenging due to the large number of packet fragments per slice. Cross-layer design strategies have been proposed to address the issues of video streaming over 802.11. These designs increase streaming robustness by imposing some degree of monitoring and control over 802.11 parameters from application level, or by making the 802.11 layer media-aware. Important contributions are made, but none of the existing approaches directly take the 802.11 queuing into account. In this paper we take a different approach and propose a cross-layer design allowing direct, expedient control over the wireless packet queue, while obtaining timely feedback on transmission status for each packet in a media flow. This method can be fully implemented on a media sender with no explicit support or changes required to the media client. We assume that due to congestion or deteriorating signal-to-noise levels, the available throughput may drop substantially for extended periods of time, and thus propose video source adaptation methods that allow matching the bit-rate to available throughput. A particular H.264 slice encoding is presented to enable seamless stream switching between streams at multiple bit-rates, and we explore using new computationally efficient transcoding methods when only a high bit-rate stream is available.

  9. A Study of Application Layer Paradigm for Lower Layer Energy Saving Potentials in Cloud-Edge Social User Wireless Image Sharing

    Directory of Open Access Journals (Sweden)

    Wei Wang

    2015-08-01

    Full Text Available Energy saving becomes critical in modern cloud wireless multimedia and mobile communication systems. In this paper we propose to study a new paradigm named application layer Position-Value diversity for wireless image sharing for cloud-edge communications, which has significant energy saving potentials for modern wireless networking systems. In this new paradigm, saving energy is achieved by looking into application layer imaging traffic, in stead of MAC-PHY protocols at lower layers, and partitioning it into important positions and unimportant values. This paradigm could be integrated to existing wavelet-based tree compression, and truncation of image bit streams could be performed with regards to wireless communication energy budget estimation. Simulation results demonstrated that there are significant potentials of communication energy efficiency gain and Quality of Experience (QoE enhancement in wireless image communication systems.

  10. Resource Allocation and Cross Layer Control in Wireless Networks

    National Research Council Canada - National Science Library

    Georgiadis, L; Neely, M; Tassiulas, L

    2006-01-01

    Information .ow in a telecommunication network is accomplished through the interaction of mechanisms at various design layers with the end goal of supporting the information exchange needs of the applications...

  11. The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Hansson, Hans

    2016-01-01

    This paper presents an overview of the ECSEL project entitled "Safe Cooperating Cyber-Physical Systems using Wireless Communication" (SafeCOP), which runs during the period 2016 -- 2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  12. Wireless Monitoring of Induction Machine Rotor Physical Variables

    Directory of Open Access Journals (Sweden)

    Jefferson Doolan Fernandes

    2017-11-01

    Full Text Available With the widespread use of electric machines, there is a growing need to extract information from the machines to improve their control systems and maintenance management. The present work shows the development of an embedded system to perform the monitoring of the rotor physical variables of a squirrel cage induction motor. The system is comprised of: a circuit to acquire desirable rotor variable(s and value(s that send it to the computer; a rectifier and power storage circuit that converts an alternating current in a continuous current but also stores energy for a certain amount of time to wait for the motor’s shutdown; and a magnetic generator that harvests energy from the rotating field to power the circuits mentioned above. The embedded system is set on the rotor of a 5 HP squirrel cage induction motor, making it difficult to power the system because it is rotating. This problem can be solved with the construction of a magnetic generator device to avoid the need of using batteries or collector rings and will send data to the computer using a wireless NRF24L01 module. For the proposed system, initial validation tests were made using a temperature sensor (DS18b20, as this variable is known as the most important when identifying the need for maintenance and control systems. Few tests have shown promising results that, with further improvements, can prove the feasibility of using sensors in the rotor.

  13. Wireless Monitoring of Induction Machine Rotor Physical Variables.

    Science.gov (United States)

    Doolan Fernandes, Jefferson; Carvalho Souza, Francisco Elvis; Cipriano Maniçoba, Glauco George; Salazar, Andrés Ortiz; de Paiva, José Alvaro

    2017-11-18

    With the widespread use of electric machines, there is a growing need to extract information from the machines to improve their control systems and maintenance management. The present work shows the development of an embedded system to perform the monitoring of the rotor physical variables of a squirrel cage induction motor. The system is comprised of: a circuit to acquire desirable rotor variable(s) and value(s) that send it to the computer; a rectifier and power storage circuit that converts an alternating current in a continuous current but also stores energy for a certain amount of time to wait for the motor's shutdown; and a magnetic generator that harvests energy from the rotating field to power the circuits mentioned above. The embedded system is set on the rotor of a 5 HP squirrel cage induction motor, making it difficult to power the system because it is rotating. This problem can be solved with the construction of a magnetic generator device to avoid the need of using batteries or collector rings and will send data to the computer using a wireless NRF24L01 module. For the proposed system, initial validation tests were made using a temperature sensor (DS18b20), as this variable is known as the most important when identifying the need for maintenance and control systems. Few tests have shown promising results that, with further improvements, can prove the feasibility of using sensors in the rotor.

  14. Rendering Intelligence at Physical Layer for Smart Addressing and Multiple Access

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi; Prasad, Ramjee; Cianca, Ernestina

    2010-01-01

    addressing of a node. For a typical closed user group type of network, we propose a multiple access mechanism and network topology which will not only eliminate the need of intelligent core network equipments in the network area , but to use this intelligent physical layer to directly reach any node over......The primary objective of this work is to propose a technique of wireless communication, where we render intelligence to the physical layer. We aim to realize a physical layer that can take part in some processes which is otherwise confined to higher layer signalling activities, like for example...... the fundamentals behind the proposed multiple access scheme and draws out the benefits compared to the existing multiple access processes based on cellular approach....

  15. Physical parameters collection based on wireless senor network

    Science.gov (United States)

    Chen, Xin; Wu, Hong; Ji, Lei

    2013-12-01

    With the development of sensor technology, wireless senor network has been applied in the medical, military, entertainment field and our daily life. But the existing available wireless senor networks applied in human monitoring system still have some problems, such as big power consumption, low security and so on. To improve senor network applied in health monitoring system, the paper introduces a star wireless senor networks based on msp430 and DSP. We design a low-cost heart-rate monitor senor node. The communication between senor node and sink node is realized according to the newest protocol proposed by the IEEE 802.15.6 Task Group. This wireless senor network will be more energy-efficient and faster compared to traditional senor networks.

  16. H.264 Layered Coded Video over Wireless Networks: Channel Coding and Modulation Constraints

    Directory of Open Access Journals (Sweden)

    Ghandi MM

    2006-01-01

    Full Text Available This paper considers the prioritised transmission of H.264 layered coded video over wireless channels. For appropriate protection of video data, methods such as prioritised forward error correction coding (FEC or hierarchical quadrature amplitude modulation (HQAM can be employed, but each imposes system constraints. FEC provides good protection but at the price of a high overhead and complexity. HQAM is less complex and does not introduce any overhead, but permits only fixed data ratios between the priority layers. Such constraints are analysed and practical solutions are proposed for layered transmission of data-partitioned and SNR-scalable coded video where combinations of HQAM and FEC are used to exploit the advantages of both coding methods. Simulation results show that the flexibility of SNR scalability and absence of picture drift imply that SNR scalability as modelled is superior to data partitioning in such applications.

  17. Cross-Layer QoS Control for Video Communications over Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Pei Yong

    2005-01-01

    Full Text Available Assuming a wireless ad hoc network consisting of homogeneous video users with each of them also serving as a possible relay node for other users, we propose a cross-layer rate-control scheme based on an analytical study of how the effective video transmission rate is affected by the prevailing operating parameters, such as the interference environment, the number of transmission hops to a destination, and the packet loss rate. Furthermore, in order to provide error-resilient video delivery over such wireless ad hoc networks, a cross-layer joint source-channel coding (JSCC approach, to be used in conjunction with rate-control, is proposed and investigated. This approach attempts to optimally apply the appropriate channel coding rate given the constraints imposed by the effective transmission rate obtained from the proposed rate-control scheme, the allowable real-time video play-out delay, and the prevailing channel conditions. Simulation results are provided which demonstrate the effectiveness of the proposed cross-layer combined rate-control and JSCC approach.

  18. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  19. Adaptive Multi-Layered Space-Time Block Coded Systems in Wireless Environments

    KAUST Repository

    Al-Ghadhban, Samir

    2014-12-23

    © 2014, Springer Science+Business Media New York. Multi-layered space-time block coded systems (MLSTBC) strike a balance between spatial multiplexing and transmit diversity. In this paper, we analyze the block error rate performance of MLSTBC. In addition, we propose an adaptive MLSTBC schemes that are capable of accommodating the channel signal-to-noise ratio variation of wireless systems by near instantaneously adapting the uplink transmission configuration. The main results demonstrate that significant effective throughput improvements can be achieved while maintaining a certain target bit error rate.

  20. Layered ACO-OFDM for intensity-modulated direct-detection optical wireless transmission.

    Science.gov (United States)

    Wang, Qi; Qian, Chen; Guo, Xuhan; Wang, Zhaocheng; Cunningham, David G; White, Ian H

    2015-05-04

    Layered asymmetrically clipped optical orthogonal frequency division multiplexing (ACO-OFDM) with high spectral efficiency is proposed in this paper for optical wireless transmission employing intensity modulation with direct detection. In contrast to the conventional ACO-OFDM, which only utilizes odd subcarriers for modulation, leading to an obvious spectral efficiency loss, in layered ACO-OFDM, the subcarriers are divided into different layers and modulated by different kinds of ACO-OFDM, which are combined for simultaneous transmission. In this way, more subcarriers are used for data transmission and the spectral efficiency is improved. An iterative receiver is also proposed for layered ACO-OFDM, where the negative clipping distortion of each layer is subtracted once it is detected so that the signals from different layers can be recovered. Theoretical analysis shows that the proposed scheme can improve the spectral efficiency by up to 2 times compared with conventional ACO-OFDM approaches with the same modulation order. Meanwhile, simulation results confirm a considerable signal-to-noise ratio gain over ACO-OFDM at the same spectral efficiency.

  1. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally

  2. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  3. DEVELOPMENT OF WIRELESS TECHNIQUES IN DATA AND POWER TRANSMISSION APPLICATION FOR PARTICLE-PHYSICS DETECTORS

    CERN Document Server

    Brenner, R; Dehos, C; De Lurgio, P; Djurcic, Z; Drake, G; Gonzales Gimenez, JL; Gustafsson, L; Kim, DW; Locci, E; Pfeiffer, U; Röhrich, D; Rydberg, D; Schöning, A; Siligaris, A; Soltveit, HK; Ullaland, K; Vincent, P; Vasquez, PR; Wiedner, D; Yang, S

    2017-01-01

    In the WADAPT project described in this Letter of Intent, we propose to develop wireless techniques for data and power transmission in particle-physics detectors. Wireless techniques have developed extremely fast over the last decade and are now mature for being considered as a promising alternative to cables and optical links that would revolutionize the detector design. The WADAPT consortium has been formed to identify the specific needs of different projects that might benefit from wireless techniques with the objective of providing a common platform for research and development in order to optimize effectiveness and cost. The proposed R&D will aim at designing and testing wireless demonstrators for large instrumentation systems.

  4. A polygonal double-layer coil design for high-efficiency wireless power transfer

    Science.gov (United States)

    Mao, Shitong; Wang, Hao; Mao, Zhi-Hong; Sun, Mingui

    2018-05-01

    In this work, we present a novel coil structure for the design of Wireless Power Transfer (WPT) systems via magnetic resonant coupling. The new coil consists of two layers of flat polygonal windings in square, pentagonal and hexagonal shapes. The double-layer coil can be conveniently fabricated using the print circuit broad (PCB) technology. In our design, we include an angle between the two layers which can be adjusted to change the area of inter-layer overlap. This unique structure is thoroughly investigated with respect to the quality factor Q and the power transfer efficiency (PTE) using the finite element method (FEM). An equivalent circuit is derived and used to explain the properties of the angularly shifted double-layer coil theoretically. Comparative experiments are conducted from which the performance of the new coil is evaluated quantitatively. Our results have shown that an increased shift angle improves the Q-factor, and the optimal PTE is achieved when the angle reaches the maximum. When compared to the pentagonal and hexagonal coils, the square coil achieves the highest PTE due to its lowest parasitic capacitive effects. In summary, our new coil design improves the performance of WPT systems and allows a formal design procedure for optimization in a given application.

  5. Development of Wireless Techniques in Data and Power Transmission - Application for Particle Physics Detectors

    CERN Document Server

    Locci, E.; Dehos, C.; De Lurgio, P.; Djurcic, Z.; Drake, G.; Gimenez, J. L. Gonzalez; Gustafsson, L.; Kim, D.W.; Roehrich, D.; Schoening, A.; Siligaris, A.; Soltveit, H.K.; Ullaland, K.; Vincent, P.; Wiednert, D.; Yang, S.; Brenner, R.

    2015-01-01

    Wireless techniques have developed extremely fast over the last decade and using them for data and power transmission in particle physics detectors is not science- fiction any more. During the last years several research groups have independently thought of making it a reality. Wireless techniques became a mature field for research and new developments might have impact on future particle physics experiments. The Instrumentation Frontier was set up as a part of the SnowMass 2013 Community Summer Study [1] to examine the instrumentation R&D for the particle physics research over the coming decades: {\\guillemotleft} To succeed we need to make technical and scientific innovation a priority in the field {\\guillemotright}. Wireless data transmission was identified as one of the innovations that could revolutionize the transmission of data out of the detector. Power delivery was another challenge mentioned in the same report. We propose a collaboration to identify the specific needs of different projects that m...

  6. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao

    2018-01-09

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  7. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao; Yang, Liang; Alouini, Mohamed-Slim

    2018-01-01

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  8. Two-Layer Hierarchy Optimization Model for Communication Protocol in Railway Wireless Monitoring Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Ma

    2018-01-01

    Full Text Available The wireless monitoring system is always destroyed by the insufficient energy of the sensors in railway. Hence, how to optimize the communication protocol and extend the system lifetime is crucial to ensure the stability of system. However, the existing studies focused primarily on cluster-based or multihop protocols individually, which are ineffective in coping with the complex communication scenarios in the railway wireless monitoring system (RWMS. This study proposes a hybrid protocol which combines the cluster-based and multihop protocols (CMCP to minimize and balance the energy consumption in different sections of the RWMS. In the first hierarchy, the total energy consumption is minimized by optimizing the cluster quantities in the cluster-based protocol and the number of hops and the corresponding hop distances in the multihop protocol. In the second hierarchy, the energy consumption is balanced through rotating the cluster head (CH in the subnetworks and further optimizing the hops and the corresponding hop distances in the backbone network. On this basis, the system lifetime is maximized with the minimum and balance energy consumption among the sensors. Furthermore, the hybrid particle swarm optimization and genetic algorithm (PSO-GA are adopted to optimize the energy consumption from the two-layer hierarchy. Finally, the effectiveness of the proposed CMCP is verified in the simulation. The performances of the proposed CMCP in system lifetime, residual energy, and the corresponding variance are all superior to the LEACH protocol widely applied in the previous research. The effective protocol proposed in this study can facilitate the application of the wireless monitoring network in the railway system and enhance safety operation of the railway.

  9. Physical Layer Security Using Two-Path Successive Relaying

    Directory of Open Access Journals (Sweden)

    Qian Yu Liau

    2016-06-01

    Full Text Available Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

  10. Cross-Layer Active Predictive Congestion Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yinfeng Wu

    2009-10-01

    Full Text Available In wireless sensor networks (WSNs, there are numerous factors that may cause network congestion problems, such as the many-to-one communication modes, mutual interference of wireless links, dynamic changes of network topology and the memory-restrained characteristics of nodes. All these factors result in a network being more vulnerable to congestion. In this paper, a cross-layer active predictive congestion control scheme (CL-APCC for improving the performance of networks is proposed. Queuing theory is applied in the CL-APCC to analyze data flows of a single-node according to its memory status, combined with the analysis of the average occupied memory size of local networks. It also analyzes the current data change trends of local networks to forecast and actively adjust the sending rate of the node in the next period. In order to ensure the fairness and timeliness of the network, the IEEE 802.11 protocol is revised based on waiting time, the number of the node‟s neighbors and the original priority of data packets, which dynamically adjusts the sending priority of the node. The performance of CL-APCC, which is evaluated by extensive simulation experiments. is more efficient in solving the congestion in WSNs. Furthermore, it is clear that the proposed scheme has an outstanding advantage in terms of improving the fairness and lifetime of networks.

  11. Cross-layer active predictive congestion control protocol for wireless sensor networks.

    Science.gov (United States)

    Wan, Jiangwen; Xu, Xiaofeng; Feng, Renjian; Wu, Yinfeng

    2009-01-01

    In wireless sensor networks (WSNs), there are numerous factors that may cause network congestion problems, such as the many-to-one communication modes, mutual interference of wireless links, dynamic changes of network topology and the memory-restrained characteristics of nodes. All these factors result in a network being more vulnerable to congestion. In this paper, a cross-layer active predictive congestion control scheme (CL-APCC) for improving the performance of networks is proposed. Queuing theory is applied in the CL-APCC to analyze data flows of a single-node according to its memory status, combined with the analysis of the average occupied memory size of local networks. It also analyzes the current data change trends of local networks to forecast and actively adjust the sending rate of the node in the next period. In order to ensure the fairness and timeliness of the network, the IEEE 802.11 protocol is revised based on waiting time, the number of the node's neighbors and the original priority of data packets, which dynamically adjusts the sending priority of the node. The performance of CL-APCC, which is evaluated by extensive simulation experiments. is more efficient in solving the congestion in WSNs. Furthermore, it is clear that the proposed scheme has an outstanding advantage in terms of improving the fairness and lifetime of networks.

  12. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  13. Cross-layer Energy Optimization Under Image Quality Constraints for Wireless Image Transmissions.

    Science.gov (United States)

    Yang, Na; Demirkol, Ilker; Heinzelman, Wendi

    2012-01-01

    Wireless image transmission is critical in many applications, such as surveillance and environment monitoring. In order to make the best use of the limited energy of the battery-operated cameras, while satisfying the application-level image quality constraints, cross-layer design is critical. In this paper, we develop an image transmission model that allows the application layer (e.g., the user) to specify an image quality constraint, and optimizes the lower layer parameters of transmit power and packet length, to minimize the energy dissipation in image transmission over a given distance. The effectiveness of this approach is evaluated by applying the proposed energy optimization to a reference ZigBee system and a WiFi system, and also by comparing to an energy optimization study that does not consider any image quality constraint. Evaluations show that our scheme outperforms the default settings of the investigated commercial devices and saves a significant amount of energy at middle-to-large transmission distances.

  14. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks.

    Science.gov (United States)

    He, Huaguang; Li, Taoshen; Feng, Luting; Ye, Jin

    2017-07-15

    Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust the transmission rate is core work for transport protocol design. However, recent works have shown that the existing cross-layer congestion detection solutions are too complex to be deployed or not able to characterize the congestion accurately. We first propose a new congestion metric called frame transmission efficiency (i.e., the ratio of successful transmission delay to the frame service delay), which describes the medium contention in a fast and accurate manner. We further present the design and implementation of RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), a general supporting scheme that adjusts the transport sending rate through a standard ECN (Explicit Congestion Notification) signaling method. Our method can be deployed on commodity switches with small firmware updates, while making no modification on end hosts. We integrate RECN transparently (i.e., without modification) with TCP on NS2 simulation. The experimental results show that RECN remarkably improves network goodput across multiple concurrent TCP flows.

  15. A Cross-Layer Duty Cycle MAC Protocol Supporting a Pipeline Feature for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Chon Kim

    2011-05-01

    Full Text Available Although the conventional duty cycle MAC protocols for Wireless Sensor Networks (WSNs such as RMAC perform well in terms of saving energy and reducing end-to-end delivery latency, they were designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. In this paper, we propose a new cross-layer duty cycle MAC protocol with data forwarding supporting a pipeline feature (P-MAC for WSNs. P-MAC first divides the whole network into many grades around the sink. Each node identifies its grade according to its logical hop distance to the sink and simultaneously establishes a sleep/wakeup schedule using the grade information. Those nodes in the same grade keep the same schedule, which is staggered with the schedule of the nodes in the adjacent grade. Then a variation of the RTS/CTS handshake mechanism is used to forward data continuously in a pipeline fashion from the higher grade to the lower grade nodes and finally to the sink. No extra routing overhead is needed, thus increasing the network scalability while maintaining the superiority of duty-cycling. The simulation results in OPNET show that P-MAC has better performance than S-MAC and RMAC in terms of packet delivery latency and energy efficiency.

  16. The PASCO Wireless Smart Cart: A Game Changer in the Undergraduate Physics Laboratory

    Science.gov (United States)

    Shakur, Asif; Connor, Rainor

    2018-01-01

    With the introduction of the Wireless Smart Cart by PASCO scientific in April 2016, we expect a paradigm shift in undergraduate physics laboratory instruction. We have evaluated the feasibility of using the smart cart by carrying out experiments that are usually performed using traditional PASCO equipment. The simplicity, convenience, and…

  17. A Survey on Cross-Layer Intrusion Detection System for Wireless ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... forwarding, and open wireless medium are the factors that make ... Wireless Sensor Network (WSN) is a kind of network that ... These tiny sensors are mainly small sized and have low ..... they were integrated to WSN for intrusion detection in ..... Anomaly Detection Techniques for Smart City Wireless Sensor.

  18. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2008-04-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in

  19. The art of wireless sensor networks

    CERN Document Server

    2014-01-01

    During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.   “The Art of Wireless Sensor Networks: Volume 1: Fundamentals” focuses on the fundamentals concepts in the design, analysis, and implementation of wireless sensor networks. It covers the various layers of the lifecycle of this type of network from the physical layer up to the application layer. Its rationale is that the first volume covers contemporary design issues, tools, and protocols for radio-based two-dimensional terrestrial sensor networks. All the book chapters in this volume include up-to-date research work spanning various classic facets of the physical properties and functional behavior of wireless sensor networks, including physical layer, medium access control, data routing, topology management, mobility management, localization, task management, data management, data gathering, security, middleware, sensor technology, standards, and ...

  20. Cross-layer based adaptive wireless traffic control for per-flow and per-station fairness

    Directory of Open Access Journals (Sweden)

    Siwamogsatham Siwaruk

    2011-01-01

    Full Text Available Abstract In the IEEE 802.11 wireless LANs, the bandwidth is not fairly shared among stations due to the distributed coordination function (DCF mechanism in the IEEE 802.11 MAC protocol. It introduces the per-flow and per-station unfairness problems between uplink and downlink flows, as the uplink flows usually dominate the downlink flows. In addition, some users may use greedy applications such as video streaming, which may prevent other applications from connecting to the Internet. In this article, we propose an adaptive cross-layer bandwidth allocation mechanism to provide per-station and per-flow fairness. To verify the effectiveness and scalability, our scheme is implemented on a wireless access router and numerous experiments in a typical wireless environment with both TCP and UDP traffic are conducted to evaluate performance of the proposed scheme.

  1. On the physics of relativistic double layers

    International Nuclear Information System (INIS)

    Carlqvist, P.

    1982-06-01

    A model of a strong, time-independent, and relativistic double layer is studied. Besides double layers having the electric field parallel to the current the model also describes a certain type of oblique double layers. The 'Langmuir condition' (ratio of ion current density to electron current density) as well as an expression for the potential drop of the double layer are derived. Furthermore, the distribution of charged particles, electric field, and potential within the double layer are clarified and discussed. It is found that the properties of relativistic double layers differ substantially from the properties of corresponding non-relativistic double layers. (Author)

  2. Cross-layer cluster-based energy-efficient protocol for wireless sensor networks.

    Science.gov (United States)

    Mammu, Aboobeker Sidhik Koyamparambil; Hernandez-Jayo, Unai; Sainz, Nekane; de la Iglesia, Idoia

    2015-04-09

    Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs). One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE) can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs) and a cluster head (CH). The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED).

  3. Cross-Layer Cluster-Based Energy-Efficient Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Aboobeker Sidhik Koyamparambil Mammu

    2015-04-01

    Full Text Available Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs. One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs and a cluster head (CH. The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH and hybrid energy-efficient distributed clustering (HEED.

  4. Evaluation of 90nm 6T-SRAM as physical unclonable function for secure key generation in wireless sensor nodes

    NARCIS (Netherlands)

    Selimis, G.; Konijnenburg, M.; Ashouei, M.; Huisken, J.; de Groot, H.; van der Leest, V.; Schrijen, G.-J.; van Hulst, M.; Tuyls, P.

    2011-01-01

    Due to the unattended nature of WSN (Wireless Sensor Network) deployment, each sensor can be subject to physical capture, cloning and unauthorized device alteration. In this paper, we use the embedded SRAM, often available on a wireless sensor node, for secure data (cryptographic keys, IDs)

  5. [Exploration of the design of media access control layer of wireless body area network for medical healthcare].

    Science.gov (United States)

    Liu, Xuemei; Ge, Baofeng

    2012-04-01

    This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems.

  6. Adaptive Cross-Layer Distributed Energy-Efficient Resource Allocation Algorithms for Wireless Data Networks

    Directory of Open Access Journals (Sweden)

    Daniela Saturnino

    2008-10-01

    Full Text Available The issue of adaptive and distributed cross-layer resource allocation for energy efficiency in uplink code-division multiple-access (CDMA wireless data networks is addressed. The resource allocation problems are formulated as noncooperative games wherein each terminal seeks to maximize its own energy efficiency, namely, the number of reliably transmitted information symbols per unit of energy used for transmission. The focus of this paper is on the issue of adaptive and distributed implementation of policies arising from this approach, that is, it is assumed that only readily available measurements, such as the received data, are available at the receiver in order to play the considered games. Both single-cell and multicell networks are considered. Stochastic implementations of noncooperative games for power allocation, spreading code allocation, and choice of the uplink (linear receiver are thus proposed, and analytical results describing the convergence properties of selected stochastic algorithms are also given. Extensive simulation results show that, in many instances of practical interest, the proposed stochastic algorithms approach with satisfactory accuracy the performance of nonadaptive games, whose implementation requires much more prior information.

  7. Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wu Haitao

    2009-01-01

    Full Text Available We propose a MAC layer handoff mechanism for IEEE 802.11 Wireless Local Area Networks (WLAN to give benefit to bandwidth-greedy applications at STAs. The proposed mechanism determines an optimal AP with the maximum achievable throughput rather than the best signal condition by estimating the AP's bandwidth with a new on-the-fly measurement method, Transient Frame Capture (TFC, and predicting the actual throughput could be achieved at STAs. Since the TFC is employed based on the promiscuous mode of WLAN NIC, STAs can avoid the service degradation through the current associated AP. In addition, the proposed mechanism is a client-only solution which does not require any modification of network protocol on APs. To evaluate the performance of the proposed mechanism, we develop an analytic model to estimate reliable and accurate bandwidth of the AP and demonstrate through testbed measurement with various experimental study methods. We also validate the fairness of the proposed mechanism through simulation studies.

  8. Using Wireless Pedometers to Measure Children’s Physical Activity: How Reliable is the Fitbit Zip?

    Directory of Open Access Journals (Sweden)

    Tingting Xu

    2017-07-01

    Full Text Available The purpose of this study is to examine the reliability of wireless pedometers in measuring elementary school children’s physical activity. Activity measurement using a wireless pedometer Fitbit ZipTM was compared to activity measurement using Yamax Digi-WalkerTM SW701 for a group of randomly selected 25 children in Grades 3, 4, and 5. Fitbit ZipTM wireless pedometers were found to have an appropriate degree (Nunnally & Bernstein, 1994 of accuracy and reliability compared to the Yamax Digi-WalkerTM SW701 pedometer. The Fitbit ZipTM wireless pedometer collected more step counts than the Yamax Digi-WalkerTM SW701 pedometer; however, the difference was not statistically significant. Participants reported that they preferred wearing the Fitbit ZipTM to the Yamax Digi-WalkerTM SW701 because the Fitbit ZipTM was more comfortable to wear and less likely to fall off. Participants also reported being more motivated to move while wearing the Fitbit ZipTM.

  9. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks

  10. The PASCO Wireless Smart Cart: A Game Changer in the Undergraduate Physics Laboratory

    Science.gov (United States)

    Shakur, Asif; Connor, Rainor

    2018-03-01

    With the introduction of the Wireless Smart Cart by PASCO scientific in April 2016, we expect a paradigm shift in undergraduate physics laboratory instruction. We have evaluated the feasibility of using the smart cart by carrying out experiments that are usually performed using traditional PASCO equipment. The simplicity, convenience, and cost-saving achieved by replacing a plethora of traditional laboratory sensors, wires, and equipment clutter with the smart cart are reported here.

  11. Energy-Aware Broadcasting and Multicasting in Wireless Ad Hoc Networks: A Cross-Layering Approach

    National Research Council Canada - National Science Library

    Wieselthier, Jeffrey E; Nguyen, Gam D; Ephremides, Anthony

    2004-01-01

    ...) problems, especially when energy-aware operation is required. To address the specific problem of energy-aware tree construction in wireless ad hoc networks, we have developed the Broadcast Incremental Power (BIP...

  12. Wireless visual sensor network resource allocation using cross-layer optimization

    Science.gov (United States)

    Bentley, Elizabeth S.; Matyjas, John D.; Medley, Michael J.; Kondi, Lisimachos P.

    2009-01-01

    In this paper, we propose an approach to manage network resources for a Direct Sequence Code Division Multiple Access (DS-CDMA) visual sensor network where nodes monitor scenes with varying levels of motion. It uses cross-layer optimization across the physical layer, the link layer and the application layer. Our technique simultaneously assigns a source coding rate, a channel coding rate, and a power level to all nodes in the network based on one of two criteria that maximize the quality of video of the entire network as a whole, subject to a constraint on the total chip rate. One criterion results in the minimal average end-to-end distortion amongst all nodes, while the other criterion minimizes the maximum distortion of the network. Our approach allows one to determine the capacity of the visual sensor network based on the number of nodes and the quality of video that must be transmitted. For bandwidth-limited applications, one can also determine the minimum bandwidth needed to accommodate a number of nodes with a specific target chip rate. Video captured by a sensor node camera is encoded and decoded using the H.264 video codec by a centralized control unit at the network layer. To reduce the computational complexity of the solution, Universal Rate-Distortion Characteristics (URDCs) are obtained experimentally to relate bit error probabilities to the distortion of corrupted video. Bit error rates are found first by using Viterbi's upper bounds on the bit error probability and second, by simulating nodes transmitting data spread by Total Square Correlation (TSC) codes over a Rayleigh-faded DS-CDMA channel and receiving that data using Auxiliary Vector (AV) filtering.

  13. Wireless communications resource management

    CERN Document Server

    Lee, B; Seo, H

    2009-01-01

    Wireless technologies continue to evolve to address the insatiable demand for faster response times, larger bandwidth, and reliable transmission. Yet as the industry moves toward the development of post 3G systems, engineers have consumed all the affordable physical layer technologies discovered to date. This has necessitated more intelligent and optimized utilization of available wireless resources. Wireless Communications Resource Managem ent, Lee, Park, and Seo cover all aspects of this critical topic, from the preliminary concepts and mathematical tools to detailed descriptions of all the resource management techniques. Readers will be able to more effectively leverage limited spectrum and maximize device battery power, as well as address channel loss, shadowing, and multipath fading phenomena.

  14. Extending Wireless Broadband Network Architectures with Home Gateways, Localization, and Physical Environment Surveillance

    DEFF Research Database (Denmark)

    Jelling Kristoffersen, Kåre; Kjærgaard, Mikkel Baun; Chen, Jianjun

    2005-01-01

    homes. It must bridge across the most prevalent standard protocols for data, video, telephony and telemetry, and must be able to automatically discover new devices in a residence and allow over the air/wire provisioning, billing, management and aggregation of new services from multiple service providers...... is initially demonstrated in a 52 DECT base station installation covering four office buildings of total 4500 m2 . Finally the paper proposes the application of a commercial off-the-shelf wireless broadband network as a sensor network, without any additional hardware, for physical intrusion detection of e...

  15. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    International Nuclear Information System (INIS)

    Zacharias, Sven; Newe, Thomas

    2011-01-01

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  16. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    Energy Technology Data Exchange (ETDEWEB)

    Zacharias, Sven; Newe, Thomas, E-mail: Sven.Zacharias@ul.ie [University of Limerick (Ireland)

    2011-08-17

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  17. MAC layer power management schemes for efficient energy- delay tradeoffs in wireless local area networks

    OpenAIRE

    Sarkar, Mahasweta

    2006-01-01

    In order to minimize power consumption and thereby prolong the system lifetime of battery powered wireless devices, it makes sense for such devices to transit to a very low power "Sleep" state when they are not communicating with their peers. However the main challenge of the sleep mechanism lies in the wireless nodes inability to "wake up" as soon as a packet arrives for it during its sleep state. This leads to an obvious tradeoff between power saving and packet delay. In this dissertation w...

  18. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    Science.gov (United States)

    Zacharias, Sven; Newe, Thomas

    2011-08-01

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  19. Layer-component-based communication stack framework for wireless residential control systems

    DEFF Research Database (Denmark)

    Torbensen, R.; Hjorth, Theis S.

    2011-01-01

    on a common IP infrastructure, regardless of individual wireless technology. Legacy home automation devices are also supported. A prototype has been implemented on multiple resource-constrained hardware platforms, to demonstrate that the solution is both feasible for low-cost devices and portable. It has been...

  20. Layer-component-based communication stack framework for wireless residential control systems

    DEFF Research Database (Denmark)

    Torbensen, Rune; Hjorth, Theis

    2010-01-01

    on a common IP infrastructure, regardless of individual wireless technology. Legacy home automation devices are also supported. A prototype has been implemented on multiple resource-constrained hardware platforms, to demonstrate that the solution is both feasible for low-cost devices and portable. It has been...

  1. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal; Jamshaid, Kamran; Shihada, Basem; Ho, Pin-Han

    2012-01-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue

  2. PERFORMANCE STUDY OF DISTRIBUTED COORDINATION FUNCTION OVER IEEE 802.11A PHYSICAL LAYER

    Directory of Open Access Journals (Sweden)

    S. SELVAKENEDDY

    2006-06-01

    Full Text Available IEEE 802.11a is one of the latest standards to be released by the IEEE Project 802 for wireless LANs. It has specified an additional physical layer (PHY to support higher data rates, and is termed as the orthogonal frequency division multiplexing (OFDM. In order to exploit its benefits, one of the medium access control (MAC protocols specified in the IEEE 802.11 specification is called distributed coordination function (DCF. DCF is a carrier sense multiple access with collision avoidance (CSMA/CA scheme with slotted binary exponential backoff. The frames can be transmitted using the basic access scheme or the RTS/CTS scheme in DCF. It was demonstrated previously that the RTS/CTS mechanism works well in most scenarios for the previously specified PHYs. In this work, a simple simulator is developed to verify the scalability of the RTS/CTS mechanism over OFDM PHY, which supports much higher data rates.

  3. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  4. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  5. Quantum photonic network and physical layer security.

    Science.gov (United States)

    Sasaki, Masahide; Endo, Hiroyuki; Fujiwara, Mikio; Kitamura, Mitsuo; Ito, Toshiyuki; Shimizu, Ryosuke; Toyoshima, Morio

    2017-08-06

    Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to quantify the optimal balance of the transmission efficiency and the security level under power constraint and at finite code length. We then present experimental results on channel characterization based on 10 MHz on-off keying transmission in a 7.8 km terrestrial FSO wiretap channel.This article is part of the themed issue 'Quantum technology for the 21st century'. © 2017 The Author(s).

  6. Physical activity discrimination improvement using accelerometers and wireless sensor network localization - biomed 2013.

    Science.gov (United States)

    Bashford, Gregory R; Burnfield, Judith M; Perez, Lance C

    2013-01-01

    Automating documentation of physical activity data (e.g., duration and speed of walking or propelling a wheelchair) into the electronic medical record (EMR) offers promise for improving efficiency of documentation and understanding of best practices in the rehabilitation and home health settings. Commercially available devices which could be used to automate documentation of physical activities are either cumbersome to wear or lack the specificity required to differentiate activities. We have designed a novel system to differentiate and quantify physical activities, using inexpensive accelerometer-based biomechanical data technology and wireless sensor networks, a technology combination that has not been used in a rehabilitation setting to date. As a first step, a feasibility study was performed where 14 healthy young adults (mean age = 22.6 ± 2.5 years, mean height = 173 ± 10.0 cm, mean mass = 70.7 ± 11.3 kg) carried out eight different activities while wearing a biaxial accelerometer sensor. Activities were performed at each participant’s self-selected pace during a single testing session in a controlled environment. Linear discriminant analysis was performed by extracting spectral parameters from the subjects’ accelerometer patterns. It is shown that physical activity classification alone results in an average accuracy of 49.5%, but when combined with rule-based constraints using a wireless sensor network with localization capabilities in an in silico simulated room, accuracy improves to 99.3%. When fully implemented, our technology package is expected to improve goal setting, treatment interventions and patient outcomes by enhancing clinicians’ understanding of patients’ physical performance within a day and across the rehabilitation program.

  7. Protocol design and analysis for cooperative wireless networks

    CERN Document Server

    Song, Wei; Jin, A-Long

    2017-01-01

    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  8. A wireless interrogation system exploiting narrowband acoustic resonator for remote physical quantity measurement

    International Nuclear Information System (INIS)

    Friedt, J.-M; Droit, C.; Martin, G.; Ballandras, S.

    2010-01-01

    Monitoring physical quantities using acoustic wave devices can be advantageously achieved using the wave characteristic dependence to various parametric perturbations (temperature, stress, and pressure). Surface acoustic wave (SAW) resonators are particularly well suited to such applications as their resonance frequency is directly influenced by these perturbations, modifying both the phase velocity and resonance conditions. Moreover, the intrinsic radio frequency (rf) nature of these devices makes them ideal for wireless applications, mainly exploiting antennas reciprocity and piezoelectric reversibility. In this paper, we present a wireless SAW sensor interrogation unit operating in the 434 MHz centered ISM band--selected as a tradeoff between antenna dimensions and electromagnetic wave penetration in dielectric media--based on the principles of a frequency sweep network analyzer. We particularly focus on the compliance with the ISM standard which reveals complicated by the need for switching from emission to reception modes similarly to radar operation. In this matter, we propose a fully digital rf synthesis chain to develop various interrogation strategies to overcome the corresponding difficulties and comply with the above-mentioned standard. We finally assess the reader interrogation range, accuracy, and dynamics.

  9. A wireless interrogation system exploiting narrowband acoustic resonator for remote physical quantity measurement

    Energy Technology Data Exchange (ETDEWEB)

    Friedt, J.-M [SENSeOR, 32 Avenue de l' Observatoire, 25044 Besancon (France); Droit, C.; Martin, G.; Ballandras, S. [Department of Time and Frequency, FEMTO-ST, 32 Avenue de l' Observatoire, 25044 Besancon (France)

    2010-01-15

    Monitoring physical quantities using acoustic wave devices can be advantageously achieved using the wave characteristic dependence to various parametric perturbations (temperature, stress, and pressure). Surface acoustic wave (SAW) resonators are particularly well suited to such applications as their resonance frequency is directly influenced by these perturbations, modifying both the phase velocity and resonance conditions. Moreover, the intrinsic radio frequency (rf) nature of these devices makes them ideal for wireless applications, mainly exploiting antennas reciprocity and piezoelectric reversibility. In this paper, we present a wireless SAW sensor interrogation unit operating in the 434 MHz centered ISM band--selected as a tradeoff between antenna dimensions and electromagnetic wave penetration in dielectric media--based on the principles of a frequency sweep network analyzer. We particularly focus on the compliance with the ISM standard which reveals complicated by the need for switching from emission to reception modes similarly to radar operation. In this matter, we propose a fully digital rf synthesis chain to develop various interrogation strategies to overcome the corresponding difficulties and comply with the above-mentioned standard. We finally assess the reader interrogation range, accuracy, and dynamics.

  10. Physical-layer network coding in coherent optical OFDM systems.

    Science.gov (United States)

    Guan, Xun; Chan, Chun-Kit

    2015-04-20

    We present the first experimental demonstration and characterization of the application of optical physical-layer network coding in coherent optical OFDM systems. It combines two optical OFDM frames to share the same link so as to enhance system throughput, while individual OFDM frames can be recovered with digital signal processing at the destined node.

  11. Secure physical layer using dynamic permutations in cognitive OFDMA systems

    DEFF Research Database (Denmark)

    Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.

    2009-01-01

    This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured...... with a random and dynamic subcarrier permutation which is based on a single pre-shared information and depends on Dynamic Spectrum Access (DSA). The dynamic subcarrier permutation is varying over time, geographical location and environment status, resulting in a very robust protection that ensures...... confidentiality. The method is shown to be effective also for existing non-cognitive systems. The proposed mechanism is effective against eavesdropping even if the eavesdropper adopts a long-time patterns analysis, thus protecting cryptography techniques of higher layers. The correlation properties...

  12. OFDM systems for wireless communications

    CERN Document Server

    Narasimhamurthy, Adarsh

    2010-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is

  13. Microwave energy harvesting based on metamaterial absorbers with multi-layered square split rings for wireless communications

    Science.gov (United States)

    Karaaslan, Muharrem; Bağmancı, Mehmet; Ünal, Emin; Akgol, Oguzhan; Sabah, Cumali

    2017-06-01

    We propose the design of a multiband absorber based on multi-layered square split ring (MSSR) structure. The multi-layered metamaterial structure is designed to be used in the frequency bands such as WIMAX, WLAN and satellite communication region. The absorption levels of the proposed structure are higher than 90% for all resonance frequencies. In addition, the incident angle and polarization dependence of the multi-layered metamaterial absorber and harvester is also investigated and it is observed that the structure has polarization angle independent frequency response with good absorption characteristics in the entire working frequency band. The energy harvesting ratios of the structure is investigated especially for the resonance frequencies at which the maximum absorption occurs. The energy harvesting potential of the proposed MSSRs is as good as those of the structures given in the literature. Therefore, the suggested design having good absorption, polarization and angle independent characteristics with a wide bandwidth is a potential candidate for future energy harvesting applications in commonly used wireless communication bands, namely WIMAX, WLAN and satellite communication bands.

  14. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2012-08-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol to alleviate the unfairness problem in WMNs. Our protocol uses the age of packet as a priority metric for packet scheduling. Simulation is conducted to validate our model and to illustrate the fairness characteristics of our proposed MAC protocol. We conclude that we can achieve fairness with only little impact on network capacity.

  15. Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

    OpenAIRE

    Bhavana Butani; Piyush Kumar Shukla; Sanjay Silakari

    2014-01-01

    Wireless sensor networks (WSNs) are novel large-scale wireless networks that consist of distributed, self organizing, low-power, low-cost, tiny sensor devices to cooperatively collect information through infrastructure less wireless networks. These networks are envisioned to play a crucial role in variety of applications like critical military surveillance applications, forest fire monitoring, commercial applications such as building security monitoring, traffic surveillance, habitat monitori...

  16. Cooperative Communications for Wireless Information Assurance: Secure Cooperative Communications and Testbed Development

    National Research Council Canada - National Science Library

    Li, Xiaohua

    2007-01-01

    ..., and have invented a new cooperative OFDM transmission scheme to combat transmission asynchronism. They are helpful to the development of future physical-layer wireless information assurance techniques as well as the cooperative communication techniques...

  17. Metglas-Elgiloy bi-layer, stent cell resonators for wireless monitoring of viscosity and mass loading

    KAUST Repository

    Viswanath, Anupam

    2012-12-21

    This paper presents the design and evaluation of magnetoelastic sensors intended for wireless monitoring of tissue accumulation in peripheral artery stents. The sensors are fabricated from 28 μm thick foils of magnetoelastic 2826MB Metglas™, an amorphous Ni-Fe alloy. The sensor layer consists of a frame and an active resonator portion. The frame consists of 150 μm wide struts that are patterned in the same wishbone array pattern as a 12 mm × 1.46 mm Elgiloy stent cell. The active portion is a 10 mm long symmetric leaf shape and is anchored to the frame at mid length. The active portion nests within the stent cell, with a uniform gap separating the two. A gold-indium eutectic bonding process is used to bond Metglas™ and Elgiloy foils, which are subsequently patterned to form bi-layer resonators. The response of the sensor to viscosity changes and mass loading that precede and accompany artery occlusion is tested in vitro. The typical sensitivity to viscosity of the fundamental, longitudinal resonant frequency at 361 kHz is 427 ppm cP -1 over a 1.1-8.6 cP range. The sensitivity to mass loading is typically between 63000 and 65000 ppm mg-1 with the resonant frequency showing a reduction of 8.1% for an applied mass that is 15% of the unloaded mass of the sensor. This is in good agreement with the theoretical response. © 2013 IOP Publishing Ltd.

  18. Metglas-Elgiloy bi-layer, stent cell resonators for wireless monitoring of viscosity and mass loading

    KAUST Repository

    Viswanath, Anupam; Green, Scott Ryan; Kosel, Jü rgen; Gianchandani, Yogesh B.

    2012-01-01

    This paper presents the design and evaluation of magnetoelastic sensors intended for wireless monitoring of tissue accumulation in peripheral artery stents. The sensors are fabricated from 28 μm thick foils of magnetoelastic 2826MB Metglas™, an amorphous Ni-Fe alloy. The sensor layer consists of a frame and an active resonator portion. The frame consists of 150 μm wide struts that are patterned in the same wishbone array pattern as a 12 mm × 1.46 mm Elgiloy stent cell. The active portion is a 10 mm long symmetric leaf shape and is anchored to the frame at mid length. The active portion nests within the stent cell, with a uniform gap separating the two. A gold-indium eutectic bonding process is used to bond Metglas™ and Elgiloy foils, which are subsequently patterned to form bi-layer resonators. The response of the sensor to viscosity changes and mass loading that precede and accompany artery occlusion is tested in vitro. The typical sensitivity to viscosity of the fundamental, longitudinal resonant frequency at 361 kHz is 427 ppm cP -1 over a 1.1-8.6 cP range. The sensitivity to mass loading is typically between 63000 and 65000 ppm mg-1 with the resonant frequency showing a reduction of 8.1% for an applied mass that is 15% of the unloaded mass of the sensor. This is in good agreement with the theoretical response. © 2013 IOP Publishing Ltd.

  19. Adaptive Multi-Layered Space-Time Block Coded Systems in Wireless Environments

    KAUST Repository

    Al-Ghadhban, Samir

    2014-01-01

    © 2014, Springer Science+Business Media New York. Multi-layered space-time block coded systems (MLSTBC) strike a balance between spatial multiplexing and transmit diversity. In this paper, we analyze the block error rate performance of MLSTBC

  20. High speed optical wireless data transmission system for particle sensors in high energy physics

    Science.gov (United States)

    Ali, W.; Corsini, R.; Ciaramella, E.; Dell'Orso, R.; Messineo, A.; Palla, F.

    2015-08-01

    High speed optical fiber or copper wire communication systems are frequently deployed for readout data links used in particle physics detectors. Future detector upgrades will need more bandwidth for data transfer, but routing requirements for new cables or optical fiber will be challenging due to space limitations. Optical wireless communication (OWC) can provide high bandwidth connectivity with an advantage of reduced material budget and complexity of cable installation and management. In a collaborative effort, Scuola Superiore Sant'Anna and INFN Pisa are pursuing the development of a free-space optical link that could be installed in a future particle physics detector or upgrade. We describe initial studies of an OWC link using the inner tracker of the Compact Muon Solenoid (CMS) detector as a reference architecture. The results of two experiments are described: the first to verify that the laser source transmission wavelength of 1550 nm will not introduce fake signals in silicon strip sensors while the second was to study the source beam diameter and its tolerance to misalignment. For data rates of 2.5 Gb/s and 10 Gb/s over a 10 cm working distance it was observed that a tolerance limit of ±0.25 mm to ±0.8 mm can be obtained for misaligned systems with source beam diameters of 0.38 mm to 3.5 mm, respectively.

  1. SenseCube—a novel inexpensive wireless multisensor for physics lab experimentations

    Science.gov (United States)

    Mehta, Vedant; Lane, Charles D.

    2018-07-01

    SenseCube is a multisensor capable of measuring many different real-time events and changes in environment. Most conventional sensors used in introductory-physics labs use their own software and have wires that must be attached to a computer or an alternate device to analyze the data. This makes the standard sensors time consuming, tedious, and space-constricted. SenseCube was developed to overcome these limitations. This research was focused on developing a device that is all-encompassing, cost-effective, wireless, and compact, yet can perform the same tasks as the multiple standard sensors normally used in physics labs. It measures more than twenty distinct types of real-time events and transfers the data via Bluetooth. Both Windows and Mac software were developed so that the data from this device can be retrieved and/or saved on either platform. This paper describes the sensor itself, its development, its capabilities, and its cost comparison with standard sensors.

  2. On the Combination of Multi-Layer Source Coding and Network Coding for Wireless Networks

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Fitzek, Frank; Pedersen, Morten Videbæk

    2013-01-01

    quality is developed. A linear coding structure designed to gracefully encapsulate layered source coding provides both low complexity of the utilised linear coding while enabling robust erasure correction in the form of fountain coding capabilities. The proposed linear coding structure advocates efficient...

  3. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    Science.gov (United States)

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  4. Cross-layer design for radio resource allocation based on priority scheduling in OFDMA wireless access network

    Directory of Open Access Journals (Sweden)

    Chen Yen-Wen

    2011-01-01

    Full Text Available Abstract The orthogonal frequency-division multiple access (OFDMA system has the advantages of flexible subcarrier allocation and adaptive modulation with respect to channel conditions. However, transmission overhead is required in each frame to broadcast the arrangement of radio resources to all mobile stations within the coverage of the same base station. This overhead greatly affects the utilization of valuable radio resources. In this paper, a cross layer scheme is proposed to reduce the number of traffic bursts at the downlink of an OFDMA wireless access network so that the overhead of the media access protocol (MAP field can be minimized. The proposed scheme considers the priorities and the channel conditions of quality of service (QoS traffic streams to arrange for them to be sent with minimum bursts in a heuristic manner. In addition, the trade-off between the degradation of the modulation level and the reduction of traffic bursts is investigated. Simulation results show that the proposed scheme can effectively reduce the traffic bursts and, therefore, increase resource utilization.

  5. Adaptive Aggregation Routing to Reduce Delay for Multi-Layer Wireless Sensor Networks.

    Science.gov (United States)

    Li, Xujing; Liu, Anfeng; Xie, Mande; Xiong, Neal N; Zeng, Zhiwen; Cai, Zhiping

    2018-04-16

    The quality of service (QoS) regarding delay, lifetime and reliability is the key to the application of wireless sensor networks (WSNs). Data aggregation is a method to effectively reduce the data transmission volume and improve the lifetime of a network. In the previous study, a common strategy required that data wait in the queue. When the length of the queue is greater than or equal to the predetermined aggregation threshold ( N t ) or the waiting time is equal to the aggregation timer ( T t ), data are forwarded at the expense of an increase in the delay. The primary contributions of the proposed Adaptive Aggregation Routing (AAR) scheme are the following: (a) the senders select the forwarding node dynamically according to the length of the data queue, which effectively reduces the delay. In the AAR scheme, the senders send data to the nodes with a long data queue. The advantages are that first, the nodes with a long data queue need a small amount of data to perform aggregation; therefore, the transmitted data can be fully utilized to make these nodes aggregate. Second, this scheme balances the aggregating and data sending load; thus, the lifetime increases. (b) An improved AAR scheme is proposed to improve the QoS. The aggregation deadline ( T t ) and the aggregation threshold ( N t ) are dynamically changed in the network. In WSNs, nodes far from the sink have residual energy because these nodes transmit less data than the other nodes. In the improved AAR scheme, the nodes far from the sink have a small value of T t and N t to reduce delay, and the nodes near the sink are set to a large value of T t and N t to reduce energy consumption. Thus, the end to end delay is reduced, a longer lifetime is achieved, and the residual energy is fully used. Simulation results demonstrate that compared with the previous scheme, the performance of the AAR scheme is improved. This scheme reduces the delay by 14.91%, improves the lifetime by 30.91%, and increases energy

  6. Adaptive Aggregation Routing to Reduce Delay for Multi-Layer Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xujing Li

    2018-04-01

    Full Text Available The quality of service (QoS regarding delay, lifetime and reliability is the key to the application of wireless sensor networks (WSNs. Data aggregation is a method to effectively reduce the data transmission volume and improve the lifetime of a network. In the previous study, a common strategy required that data wait in the queue. When the length of the queue is greater than or equal to the predetermined aggregation threshold ( N t or the waiting time is equal to the aggregation timer ( T t , data are forwarded at the expense of an increase in the delay. The primary contributions of the proposed Adaptive Aggregation Routing (AAR scheme are the following: (a the senders select the forwarding node dynamically according to the length of the data queue, which effectively reduces the delay. In the AAR scheme, the senders send data to the nodes with a long data queue. The advantages are that first, the nodes with a long data queue need a small amount of data to perform aggregation; therefore, the transmitted data can be fully utilized to make these nodes aggregate. Second, this scheme balances the aggregating and data sending load; thus, the lifetime increases. (b An improved AAR scheme is proposed to improve the QoS. The aggregation deadline ( T t and the aggregation threshold ( N t are dynamically changed in the network. In WSNs, nodes far from the sink have residual energy because these nodes transmit less data than the other nodes. In the improved AAR scheme, the nodes far from the sink have a small value of T t and N t to reduce delay, and the nodes near the sink are set to a large value of T t and N t to reduce energy consumption. Thus, the end to end delay is reduced, a longer lifetime is achieved, and the residual energy is fully used. Simulation results demonstrate that compared with the previous scheme, the performance of the AAR scheme is improved. This scheme reduces the delay by 14.91%, improves the lifetime by 30.91%, and increases

  7. Wireless Technician

    Science.gov (United States)

    Tech Directions, 2011

    2011-01-01

    One of the hottest areas in technology is invisible. Wireless communications allow people to transmit voice messages, data, and other signals through the air without physically connecting senders to receivers with cables or wires. And the technology is spreading at lightning speed. Cellular phones, personal digital assistants, and wireless…

  8. Estimation of Physical Layer Performance inWSNs Exploiting the Method of Indirect Observations

    Directory of Open Access Journals (Sweden)

    Luigi Atzori

    2012-11-01

    Full Text Available Wireless Sensor Networks (WSNs are used in many industrial and consumer applications that are increasingly gaining impact in our day to day lives. Still great efforts are needed towards the definition of methodologies for their effective management. One big issue is themonitoring of the network status, which requires the definition of the performance indicators and methodologies and should be accurate and not intrusive at the same time. In this paper, we present a new process for the monitoring of the physical layer in WSNs making use of a completely passive methodology. From data sniffed by external nodes, we first estimate the position of the nodes by applying the Weighted Least Squares (WLS to the method of indirect observations. The resulting node positions are then used to estimate the status of the communication links using the most appropriate propagation model. We performed a significant number of measurements on the field in both indoor and outdoor environments. From the experiments, we were able to achieve an accurate estimation of the channel links status with an average error lower than 1 dB, which is around 5 dB lower than the error introduced without the application of the proposed method.

  9. Cross-Layer Handover Scheme for Multimedia Communications in Next Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Lin Chun-Cheng

    2010-01-01

    Full Text Available In order to achieve seamless handover for real-time applications in the IP Multimedia Subsystem (IMS of next generation network, a multiprotocol combined handover mechanism is proposed in this paper. We combine SIP (Session Initiation Protocol, FMIP (Fast Mobile IPv6 Protocol, and MIH (Media Independent Handover protocols by cross-layer design and optimize those protocols' signaling flows to improve the performance of vertical handover. Theoretical analysis and simulation results illustrate that our proposed mechanism performs better than the original SIP and MIH combined handover mechanism in terms of service interruption time and packet loss.

  10. Joint Schemes for Physical Layer Security and Error Correction

    Science.gov (United States)

    Adamo, Oluwayomi

    2011-01-01

    The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…

  11. Low-profile wireless passive resonators for sensing

    Energy Technology Data Exchange (ETDEWEB)

    Gong, Xun; An, Linan

    2017-04-04

    A resonator for sensing a physical or an environmental parameter includes a support having a top surface that provides a ground plane, and a polymer-derived ceramic (PDC) element positioned on the top surface including a PDC layer, and a metal patch on the PDC layer. The metal patch is electrically isolated from all surrounding structure, and the resonator has a resonant frequency that changes as a function of the physical or environmental parameter. A system for wirelessly sensing a physical or environmental parameter includes at least one resonator and a wireless RF reader located remotely from the resonator for transmitting a wide-band RF interrogation signal that excites the resonator. The wireless RF reader detects a sensing signal retransmitted by the resonator and includes a processor for determining the physical or environmental parameter at the location of the resonator from the sensing signal.

  12. Selective Route Based on SNR with Cross-Layer Scheme in Wireless Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Istikmal

    2017-01-01

    Full Text Available In this study, we developed network and throughput formulation models and proposed new method of the routing protocol algorithm with a cross-layer scheme based on signal-to-noise ratio (SNR. This method is an enhancement of routing protocol ad hoc on-demand distance vector (AODV. This proposed scheme uses selective route based on the SNR threshold in the reverse route mechanism. We developed AODV SNR-selective route (AODV SNR-SR for a mechanism better than AODV SNR, that is, the routing protocol that used average or sum of path SNR, and also better than AODV which is hop-count-based. We also used selective reverse route based on SNR mechanism, replacing the earlier method to avoid routing overhead. The simulation results show that AODV SNR-SR outperforms AODV SNR and AODV in terms of throughput, end-to-end delay, and routing overhead. This proposed method is expected to support Device-to-Device (D2D communications that are concerned with the quality of the channel awareness in the development of the future Fifth Generation (5G.

  13. Physical conditions in the reconnection layer in pulsar magnetospheres

    Energy Technology Data Exchange (ETDEWEB)

    Uzdensky, Dmitri A. [Center for Integrated Plasma Studies, Physics Department, University of Colorado, UCB 390, Boulder, CO 80309-0390 (United States); Spitkovsky, Anatoly, E-mail: uzdensky@colorado.edu, E-mail: anatoly@astro.princeton.edu [Department of Astrophysical Sciences, Princeton University, Princeton, NJ 08544 (United States)

    2014-01-01

    The magnetosphere of a rotating pulsar naturally develops a current sheet (CS) beyond the light cylinder (LC). Magnetic reconnection in this CS inevitably dissipates a nontrivial fraction of the pulsar spin-down power within a few LC radii. We develop a basic physical picture of reconnection in this environment and discuss its implications for the observed pulsed gamma-ray emission. We argue that reconnection proceeds in the plasmoid-dominated regime, via a hierarchical chain of multiple secondary islands/flux ropes. The inter-plasmoid reconnection layers are subject to strong synchrotron cooling, leading to significant plasma compression. Using the conditions of pressure balance across these current layers, the balance between the heating by magnetic energy dissipation and synchrotron cooling, and Ampere's law, we obtain simple estimates for key parameters of the layers—temperature, density, and layer thickness. In the comoving frame of the relativistic pulsar wind just outside of the equatorial CS, these basic parameters are uniquely determined by the strength of the reconnecting upstream magnetic field. For the case of the Crab pulsar, we find them to be of order 10 GeV, 10{sup 13} cm{sup –3}, and 10 cm, respectively. After accounting for the bulk Doppler boosting due to the pulsar wind, the synchrotron and inverse-Compton emission from the reconnecting CS can explain the observed pulsed high-energy (GeV) and very high energy (∼100 GeV) radiation, respectively. Also, we suggest that the rapid relative motions of the secondary plasmoids in the hierarchical chain may contribute to the production of the pulsar radio emission.

  14. Mathematical analogies in physics. Thin-layer wave theory

    Directory of Open Access Journals (Sweden)

    José M. Carcione

    2014-03-01

    Full Text Available Field theory applies to elastodynamics, electromagnetism, quantum mechanics, gravitation and other similar fields of physics, where the basic equations describing the phenomenon are based on constitutive relations and balance equations. For instance, in elastodynamics, these are the stress-strain relations and the equations of momentum conservation (Euler-Newton law. In these cases, the same mathematical theory can be used, by establishing appropriate mathematical equivalences (or analogies between material properties and field variables. For instance, the wave equation and the related mathematical developments can be used to describe anelastic and electromagnetic wave propagation, and are extensively used in quantum mechanics. In this work, we obtain the mathematical analogy for the reflection/refraction (transmission problem of a thin layer embedded between dissimilar media, considering the presence of anisotropy and attenuation/viscosity in the viscoelastic case, conductivity in the electromagnetic case and a potential barrier in quantum physics (the tunnel effect. The analogy is mainly illustrated with geophysical examples of propagation of S (shear, P (compressional, TM (transverse-magnetic and TE (transverse-electric waves. The tunnel effect is obtained as a special case of viscoelastic waves at normal incidence.

  15. A Cross-Layer Wireless Sensor Network Energy-Efficient Communication Protocol for Real-Time Monitoring of the Long-Distance Electric Transmission Lines

    Directory of Open Access Journals (Sweden)

    Jun Yu

    2015-01-01

    Full Text Available Optimization of energy consumption in Wireless Sensor Network (WSN nodes has become a critical link that constrains the engineering application of the smart grid due to the fact that the smart grid is characterized by long-distance transmission in a special environment. The paper proposes a linear hierarchical network topological structure specific to WSN energy conservation in environmental monitoring of the long-distance electric transmission lines in the smart grid. Based on the topological structural characteristics and optimization of network layers, the paper also proposes a Topological Structure be Layered Configurations (TSLC routing algorithm to improve the quality of WSN data transmission performance. Coprocessing of the network layer and the media access control (MAC layer is achieved by using the cross-layer design method, accessing the status for the nodes in the network layer and obtaining the status of the network nodes of the MAC layer. It efficiently saves the energy of the whole network, improves the quality of the network service performance, and prolongs the life cycle of the network.

  16. Efficient Evaluation of Wireless Real-Time Control Networks

    Directory of Open Access Journals (Sweden)

    Peter Horvath

    2015-02-01

    Full Text Available In this paper, we present a system simulation framework for the design and performance evaluation of complex wireless cyber-physical systems. We describe the simulator architecture and the specific developments that are required to simulate cyber-physical systems relying on multi-channel, multihop mesh networks. We introduce realistic and efficient physical layer models and a system simulation methodology, which provides statistically significant performance evaluation results with low computational complexity. The capabilities of the proposed framework are illustrated in the example of WirelessHART, a centralized, real-time, multi-hop mesh network designed for industrial control and monitor applications.

  17. Design of a hybrid (wired/wireless) acquisition data system for monitoring of cultural heritage physical parameters in Smart Cities.

    Science.gov (United States)

    García Diego, Fernando-Juan; Esteban, Borja; Merello, Paloma

    2015-03-25

    Preventive conservation represents a working method and combination of techniques which helps in determining and controlling the deterioration process of cultural heritage in order to take the necessary actions before it occurs. It is acknowledged as important, both in terms of preserving and also reducing the cost of future conservation measures. Therefore, long-term monitoring of physical parameters influencing cultural heritage is necessary. In the context of Smart Cities, monitoring of cultural heritage is of interest in order to perform future comparative studies and load information into the cloud that will be useful for the conservation of other heritage sites. In this paper the development of an economical and appropriate acquisition data system combining wired and wireless communication, as well as third party hardware for increased versatility, is presented. The device allows monitoring a complex network of points with high sampling frequency, with wired sensors in a 1-wire bus and a wireless centralized system recording data for monitoring of physical parameters, as well as the future possibility of attaching an alarm system or sending data over the Internet. This has been possible with the development of three board's designs and more than 5000 algorithm lines. System tests have shown an adequate system operation.

  18. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2018-01-01

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  19. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir

    2018-02-28

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  20. Cross-Layer Measurement on an IEEE 802.11g Wireless Network Supporting MPEG-2 Video Streaming Applications in the Presence of Interference

    Directory of Open Access Journals (Sweden)

    Alessandro Sona

    2010-01-01

    Full Text Available The performance of wireless local area networks supporting video streaming applications, based on MPEG-2 video codec, in the presence of interference is here dealt with. IEEE 802.11g standard wireless networks, that do not support QoS in according with IEEE 802.11e standard, are, in particular, accounted for and Bluetooth signals, additive white Gaussian noise, and competitive data traffic are considered as sources of interference. The goal is twofold: from one side, experimentally assessing and correlating the values that some performance metrics assume at the same time at different layers of an IEEE 802.11g WLAN delivering video streaming in the presence of in-channel interference; from the other side, deducing helpful and practical hints for designers and technicians, in order to efficiently assess and enhance the performance of an IEEE 802.11g WLAN supporting video streaming in some suitable setup conditions and in the presence of interference. To this purpose, an experimental analysis is planned following a cross-layer measurement approach, and a proper testbed within a semianechoic chamber is used. Valuable results are obtained in terms of signal-to-interference ratio, packet loss ratio, jitter, video quality, and interference data rate; helpful hints for designers and technicians are finally gained.

  1. Improved Wireless Security through Physical Layer Protocol Manipulation and Radio Frequency Fingerprinting

    Science.gov (United States)

    2014-09-18

    bands: fIS M=315, 433, 868, or 915 MHz. The CC1000 devices are used in home automation and Automatic Meter Reading (AMR) applications, each of which...topologies will be challenging for similar reasons. Nodes are largely stationary in ZigBee applications used in Smart Energy, Building Automation, and Home ... Automation , which will simplify required air monitor coverage. However, ZigBee applications requiring mobile ZEDs, such as those commonly used in

  2. Improving Wireless Physical Layer Security via Exploiting Co-Channel Interference

    Science.gov (United States)

    Li, Lingxiang; Petropulu, Athina P.; Chen, Zhi; Fang, Jun

    2016-12-01

    This paper considers a scenario in which a source-destination pair needs to establish a confidential connection against an external eavesdropper, aided by the interference generated by another source-destination pair that exchanges public messages. The goal is to compute the maximum achievable secrecy degrees of freedom (S.D.o.F) region of a MIMO two-user wiretap network. First, a cooperative secrecy transmission scheme is proposed, whose feasible set is shown to achieve all S.D.o.F. pairs on the S.D.o.F. region boundary. In this way, the determination of the S.D.o.F. region is reduced to a problem of maximizing the S.D.o.F. pair over the proposed transmission scheme. The maximum achievable S.D.o.F. region boundary points are obtained in closed form, and the construction of the precoding matrices achieving the maximum S.D.o.F. region boundary is provided. The obtained analytical expressions clearly show the relation between the maximum achievable S.D.o.F. region and the number of antennas at each terminal.

  3. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2010-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4's physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist...

  4. Optimization and Verification of the TR-MAC Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    Morshed, S.; Heijenk, Geert

    2015-01-01

    Energy-efficiency is an important requirement in the design of communication protocols for wireless sensor networks (WSN). TR-MAC is an energy-efficient medium access control (MAC) layer protocol for low power WSN that exploits transmitted-reference (TR) modulation in the physical layer. The

  5. System analysis and energy model of 60GHz radio-triggered wireless sensor receiver

    NARCIS (Netherlands)

    Gao, H.; Wu, Y.; Matters - Kammerer, M.; Milosevic, D.; Linnartz, J.P.M.G.; Baltus, P.

    2013-01-01

    The optimization of a wireless system towards low power performance is not straightforward, it is the combination and trade-offs among different communication layers. In the physical layer, the frequency and the data rate are the fundamental parameters for optimizing power consumption in the

  6. A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

    Directory of Open Access Journals (Sweden)

    N. Okati

    2017-12-01

    Full Text Available Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper’s link. For this scenario, the secrecy rate function is a non-linear non-convex problem. So, in this case, exact optimization methods can only achieve suboptimal solution. In this paper, we applied different meta-heuristic optimization techniques, like Genetic Algorithm (GA, Partial Swarm Optimization (PSO, Bee Algorithm (BA, Tabu Search (TS, Simulated Annealing (SA and Teaching-Learning-Based Optimization (TLBO. They are compared with each other to obtain solution for power allocation in a wiretap wireless network. Although all these techniques find suboptimal solutions, but they appear superlative to exact optimization methods. Finally, we define a Figure of Merit (FOM as a rule of thumb to determine the best meta-heuristic algorithm. This FOM considers quality of solution, number of required iterations to converge, and CPU time.

  7. Equivalent physical models and formulation of equivalent source layer in high-resolution EEG imaging

    International Nuclear Information System (INIS)

    Yao Dezhong; He Bin

    2003-01-01

    In high-resolution EEG imaging, both equivalent dipole layer (EDL) and equivalent charge layer (ECL) assumed to be located just above the cortical surface have been proposed as high-resolution imaging modalities or as intermediate steps to estimate the epicortical potential. Presented here are the equivalent physical models of these two equivalent source layers (ESL) which show that the strength of EDL is proportional to the surface potential of the layer when the outside of the layer is filled with an insulator, and that the strength of ECL is the normal current of the layer when the outside is filled with a perfect conductor. Based on these equivalent physical models, closed solutions of ECL and EDL corresponding to a dipole enclosed by a spherical layer are given. These results provide the theoretical basis of ESL applications in high-resolution EEG mapping

  8. Equivalent physical models and formulation of equivalent source layer in high-resolution EEG imaging

    Energy Technology Data Exchange (ETDEWEB)

    Yao Dezhong [School of Life Science and Technology, University of Electronic Science and Technology of China, Chengdu City, 610054, Sichuan Province (China); He Bin [The University of Illinois at Chicago, IL (United States)

    2003-11-07

    In high-resolution EEG imaging, both equivalent dipole layer (EDL) and equivalent charge layer (ECL) assumed to be located just above the cortical surface have been proposed as high-resolution imaging modalities or as intermediate steps to estimate the epicortical potential. Presented here are the equivalent physical models of these two equivalent source layers (ESL) which show that the strength of EDL is proportional to the surface potential of the layer when the outside of the layer is filled with an insulator, and that the strength of ECL is the normal current of the layer when the outside is filled with a perfect conductor. Based on these equivalent physical models, closed solutions of ECL and EDL corresponding to a dipole enclosed by a spherical layer are given. These results provide the theoretical basis of ESL applications in high-resolution EEG mapping.

  9. Physics of tokamak scrape-off layer confinement

    International Nuclear Information System (INIS)

    Cohen, R.H.

    1993-01-01

    Confinement in the scrape-off layer (SOL) of a tokamak is believed to be governed by classical flows along magnetic field lines terminated by sheaths, and turbulent transport across field lines. In this paper we review how these two effects conspire to establish the width of the SOL, and survey recent and ongoing work on mechanisms for turbulence in SOL's. The beneficial relationship between scrape-off layer turbulence in mitigating the heat flux density on divertors is noted, and tactics for actively altering SOL confinement so as to reduce the heat flux density are discussed

  10. CWAP Certified Wireless Analysis Professional Official Study Guide Exam PW0-270

    CERN Document Server

    Westcott, David A; Miller, Ben; Mackenzie, Peter

    2011-01-01

    The official study guide for the Certified Wireless Analysis Professional certification from CWNPFour leading wireless experts thoroughly prepare you for the vendor-neutral CWAP exam administered by CWNP, the industry leader for enterprise Wi-Fi training and certification.  This official study guide not only covers all exam objectives for the CWAP exam, it also prepares you to administer and troubleshoot complex enterprise WLAN environments.Covers all exam objectives for the Certified Wireless Analysis Professional (CWAP) examCovers 802.11 physical (PHY) and 802.11 MAC layer frame formats and

  11. Performance Evaluation of Localization Accuracy for a Log-Normal Shadow Fading Wireless Sensor Network under Physical Barrier Attacks.

    Science.gov (United States)

    Hussein, Ahmed Abdulqader; Rahman, Tharek A; Leow, Chee Yen

    2015-12-04

    Localization is an apparent aspect of a wireless sensor network, which is the focus of much interesting research. One of the severe conditions that needs to be taken into consideration is localizing a mobile target through a dispersed sensor network in the presence of physical barrier attacks. These attacks confuse the localization process and cause location estimation errors. Range-based methods, like the received signal strength indication (RSSI), face the major influence of this kind of attack. This paper proposes a solution based on a combination of multi-frequency multi-power localization (C-MFMPL) and step function multi-frequency multi-power localization (SF-MFMPL), including the fingerprint matching technique and lateration, to provide a robust and accurate localization technique. In addition, this paper proposes a grid coloring algorithm to detect the signal hole map in the network, which refers to the attack-prone regions, in order to carry out corrective actions. The simulation results show the enhancement and robustness of RSS localization performance in the face of log normal shadow fading effects, besides the presence of physical barrier attacks, through detecting, filtering and eliminating the effect of these attacks.

  12. Hybrid brain-computer interface for biomedical cyber-physical system application using wireless embedded EEG systems.

    Science.gov (United States)

    Chai, Rifai; Naik, Ganesh R; Ling, Sai Ho; Nguyen, Hung T

    2017-01-07

    One of the key challenges of the biomedical cyber-physical system is to combine cognitive neuroscience with the integration of physical systems to assist people with disabilities. Electroencephalography (EEG) has been explored as a non-invasive method of providing assistive technology by using brain electrical signals. This paper presents a unique prototype of a hybrid brain computer interface (BCI) which senses a combination classification of mental task, steady state visual evoked potential (SSVEP) and eyes closed detection using only two EEG channels. In addition, a microcontroller based head-mounted battery-operated wireless EEG sensor combined with a separate embedded system is used to enhance portability, convenience and cost effectiveness. This experiment has been conducted with five healthy participants and five patients with tetraplegia. Generally, the results show comparable classification accuracies between healthy subjects and tetraplegia patients. For the offline artificial neural network classification for the target group of patients with tetraplegia, the hybrid BCI system combines three mental tasks, three SSVEP frequencies and eyes closed, with average classification accuracy at 74% and average information transfer rate (ITR) of the system of 27 bits/min. For the real-time testing of the intentional signal on patients with tetraplegia, the average success rate of detection is 70% and the speed of detection varies from 2 to 4 s.

  13. Performance Evaluation of Localization Accuracy for a Log-Normal Shadow Fading Wireless Sensor Network under Physical Barrier Attacks

    Science.gov (United States)

    Abdulqader Hussein, Ahmed; Rahman, Tharek A.; Leow, Chee Yen

    2015-01-01

    Localization is an apparent aspect of a wireless sensor network, which is the focus of much interesting research. One of the severe conditions that needs to be taken into consideration is localizing a mobile target through a dispersed sensor network in the presence of physical barrier attacks. These attacks confuse the localization process and cause location estimation errors. Range-based methods, like the received signal strength indication (RSSI), face the major influence of this kind of attack. This paper proposes a solution based on a combination of multi-frequency multi-power localization (C-MFMPL) and step function multi-frequency multi-power localization (SF-MFMPL), including the fingerprint matching technique and lateration, to provide a robust and accurate localization technique. In addition, this paper proposes a grid coloring algorithm to detect the signal hole map in the network, which refers to the attack-prone regions, in order to carry out corrective actions. The simulation results show the enhancement and robustness of RSS localization performance in the face of log normal shadow fading effects, besides the presence of physical barrier attacks, through detecting, filtering and eliminating the effect of these attacks. PMID:26690159

  14. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Van Leeuwen, Brian P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Eldridge, John M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approach that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.

  15. Investigating physics learning with layered student interaction networks

    DEFF Research Database (Denmark)

    Bruun, Jesper; Traxler, Adrienne

    Centrality in student interaction networks (SINs) can be linked to variables like grades [1], persistence [2], and participation [3]. Recent efforts in the field of network science have been done to investigate layered - or multiplex - networks as mathematical objects [4]. These networks can be e......, this study investigates how target entropy [5,1] and pagerank [6,7] are affected when we take time and modes of interaction into account. We present our preliminary models and results and outline our future work in this area....

  16. Channel estimation for physical layer network coding systems

    CERN Document Server

    Gao, Feifei; Wang, Gongpu

    2014-01-01

    This SpringerBrief presents channel estimation strategies for the physical later network coding (PLNC) systems. Along with a review of PLNC architectures, this brief examines new challenges brought by the special structure of bi-directional two-hop transmissions that are different from the traditional point-to-point systems and unidirectional relay systems. The authors discuss the channel estimation strategies over typical fading scenarios, including frequency flat fading, frequency selective fading and time selective fading, as well as future research directions. Chapters explore the performa

  17. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  18. Performance Analysis of IEEE 802.11e (EDCF) and IEEE 802.11(DCF) WLAN Incorporating Different Physical Layer Standards

    Science.gov (United States)

    Sharma, V.; Singh, H.; Malhotra, J.

    2012-12-01

    Medium access coordination function basically implements the distributed coordination function (DCF) which provides support to best effort services but limited to QoS services. Subsequently, a new standard, namely enhanced distributed channel access (EDCA) is reported. The IEEE 802.11e (EDCA) defines MAC procedures to support QoS requirements which specifies distributed contention based access scheme to access the shared wireless media. This paper evaluates the performance of EDCA based IEEE 802.11 WLAN for various access categories (ACs) using OPNET™ Modeller 14.5. Further, the computed results are compared with DCF protocols in terms of QoS parameters. Furthermore, the simulative observation is reported at data rate of 54 Mbps using different physical layer protocols such as IEEE 802.11a/b/g to stumble on the best one to be implemented with EDCF to achieve improved QoS.

  19. Analysis of physical factors on chosen properties of anodic alumina oxide (AAO layers and environment

    Directory of Open Access Journals (Sweden)

    M. Gombár

    2016-10-01

    Full Text Available In the contribution is evaluated an impact of physical factors of anodizing process, namely the temperature of an electrolyte, anodizing time and voltage, on the change of values of Vickers microhardness and thickness of formed layer of experimental materials Al99∙5. By increasing of electrolyte temperature, the values of layer microhardness and thickness layer increase, namely about 0.78 % at the increasing of electrolyte temperature by 1 °C. By lengthening of anodizing time grows the value of layer thickness, but only to the value of the critical deposition time, when chemical dissolution of the layer start to be more prominent. By voltage increasing, values of layer thickness and micro-hardness are increased in the range of the used experimental values.

  20. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  1. Performance and energy efficiency in wireless self-organized networks

    Energy Technology Data Exchange (ETDEWEB)

    Gao, C.

    2009-07-01

    Self-organized packet radio networks (ad-hoc networks) and wireless sensor networks have got massive attention recently. One of critical problems in such networks is the energy efficiency, because wireless nodes are usually powered by battery. Energy efficiency design can dramatically increase the survivability and stability of wireless ad-hoc/sensor networks. In this thesis the energy efficiency has been considered at different protocol layers for wireless ad-hoc/sensor networks. The energy consumption of wireless nodes is inspected at the physical layer and MAC layer. At the network layer, some current routing protocols are compared and special attention has been paid to reactive routing protocols. A minimum hop analysis is given and according to the analysis result, a modification of AODV routing is proposed. A variation of transmit power can be also applied to clustering algorithm, which is believed to be able to control the scalability of network. Clustering a network can also improve the energy efficiency. We offer a clustering scheme based on the link state measurement and variation of transmit power of intra-cluster and inter-cluster transmission. Simulation shows that it can achieve both targets. In association with the clustering algorithm, a global synchronization scheme is proposed to increase the efficiency of clustering algorithm. The research attention has been also paid to self-organization for multi-hop cellular networks. A 2-hop 2-slot uplink proposal to infrastructure-based cellular networks. The proposed solution can significantly increase the throughput of uplink communication and reduce the energy consumption of wireless terminals. (orig.)

  2. Optimization of high-definition video coding and hybrid fiber-wireless transmission in the 60 GHz band

    DEFF Research Database (Denmark)

    Lebedev, Alexander; Pham, Tien Thang; Beltrán, Marta

    2011-01-01

    The paper addresses the problem of distribution of highdefinition video over fiber-wireless networks. The physical layer architecture with the low complexity envelope detection solution is investigated. We present both experimental studies and simulation of high quality high-definition compressed...... video transmission over 60 GHz fiberwireless link. Using advanced video coding we satisfy low complexity and low delay constraints, meanwhile preserving the superb video quality after significantly extended wireless distance. © 2011 Optical Society of America....

  3. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  4. A Micromachined Capacitive Pressure Sensor Using a Cavity-Less Structure with Bulk-Metal/Elastomer Layers and Its Wireless Telemetry Application

    Directory of Open Access Journals (Sweden)

    Yogesh B. Gianchandani

    2008-04-01

    Full Text Available This paper reports a micromachined capacitive pressure sensor intended for applications that require mechanical robustness. The device is constructed with two micromachined metal plates and an intermediate polymer layer that is soft enough to deform in a target pressure range. The plates are formed of micromachined stainless steel fabricated by batch-compatible micro-electro-discharge machining. A polyurethane roomtemperature- vulcanizing liquid rubber of 38-μm thickness is used as the deformable material. This structure eliminates both the vacuum cavity and the associated lead transfer challenges common to micromachined capacitive pressure sensors. For frequency-based interrogation of the capacitance, passive inductor-capacitor tanks are fabricated by combining the capacitive sensor with an inductive coil. The coil has 40 turns of a 127-μmdiameter copper wire. Wireless sensing is demonstrated in liquid by monitoring the variation in the resonant frequency of the tank via an external coil that is magnetically coupled with the tank. The sensitivity at room temperature is measured to be 23-33 ppm/KPa over a dynamic range of 340 KPa, which is shown to match a theoretical estimation. Temperature dependence of the tank is experimentally evaluated.

  5. A Cross-Layer Optimization Approach for Energy Efficient Wireless Sensor Networks: Coalition-Aided Data Aggregation, Cooperative Communication, and Energy Balancing

    Directory of Open Access Journals (Sweden)

    Qinghai Gao

    2007-01-01

    Full Text Available We take a cross-layer optimization approach to study energy efficient data transport in coalition-based wireless sensor networks, where neighboring nodes are organized into groups to form coalitions and sensor nodes within one coalition carry out cooperative communications. In particular, we investigate two network models: (1 many-to-one sensor networks where data from one coalition are transmitted to the sink directly, and (2 multihop sensor networks where data are transported by intermediate nodes to reach the sink. For the many-to-one network model, we propose three schemes for data transmission from a coalition to the sink. In scheme 1, one node in the coalition is selected randomly to transmit the data; in scheme 2, the node with the best channel condition in the coalition transmits the data; and in scheme 3, all the nodes in the coalition transmit in a cooperative manner. Next, we investigate energy balancing with cooperative data transport in multihop sensor networks. Built on the above coalition-aided data transmission schemes, the optimal coalition planning is then carried out in multihop networks, in the sense that unequal coalition sizes are applied to minimize the difference of energy consumption among sensor nodes. Numerical analysis reveals that energy efficiency can be improved significantly by the coalition-aided transmission schemes, and that energy balancing across the sensor nodes can be achieved with the proposed coalition structures.

  6. Employee Use of a Wireless Physical Activity Tracker Within Two Incentive Designs at One Company

    Science.gov (United States)

    Heltemes, Kevin J.; Heck, Debi; Osmick, Mary Jane

    2016-01-01

    Abstract Physical activity provides numerous health benefits, including reducing risk factors that contribute to the leading causes of morbidity and mortality. Many employers offer incentives to employees to motivate engagement in wellness program activities. Two incentive designs to reward employees for achieving step goals were evaluated. This study used a retrospective design and the study population consisted of benefit-eligible employees at American Specialty Health ages 18 to 65 years who completed a health assessment and biometric screening during 2011 (N=396) or 2012 (N=500). A total of 320 employees participated in both years. During 2011, the incentive goal was 500,000 steps per quarter. By comparison, a 3-tier step goal plan was implemented in 2012 (ie, 400,000; 650,000; or 900,000 steps/quarter). The prevalence of participants in the step program was 64.7% in 2011 and 72.8% in 2012. The percentage of employees who reached at least 1 quarterly incentive increased from 36.3% in 2011 to 51.4% in 2012. Average steps/day was higher in 2012 (mean [M]=3573, standard deviation [SD]=3010) compared to the same employees in 2011 (M=2817, SD=2654) (Pemployees in physical activity. A multitier incentive design offers participants choices for goal setting and may help shape behavior toward what may be perceived as a difficult goal to achieve. (Population Health Management 2016;19:88–94) PMID:26087300

  7. Employee Use of a Wireless Physical Activity Tracker Within Two Incentive Designs at One Company.

    Science.gov (United States)

    Norman, Gregory J; Heltemes, Kevin J; Heck, Debi; Osmick, Mary Jane

    2016-04-01

    Physical activity provides numerous health benefits, including reducing risk factors that contribute to the leading causes of morbidity and mortality. Many employers offer incentives to employees to motivate engagement in wellness program activities. Two incentive designs to reward employees for achieving step goals were evaluated. This study used a retrospective design and the study population consisted of benefit-eligible employees at American Specialty Health ages 18 to 65 years who completed a health assessment and biometric screening during 2011 (N=396) or 2012 (N=500). A total of 320 employees participated in both years. During 2011, the incentive goal was 500,000 steps per quarter. By comparison, a 3-tier step goal plan was implemented in 2012 (ie, 400,000; 650,000; or 900,000 steps/quarter). The prevalence of participants in the step program was 64.7% in 2011 and 72.8% in 2012. The percentage of employees who reached at least 1 quarterly incentive increased from 36.3% in 2011 to 51.4% in 2012. Average steps/day was higher in 2012 (mean [M]=3573, standard deviation [SD]=3010) compared to the same employees in 2011 (M=2817, SD=2654) (Pemployees in physical activity. A multitier incentive design offers participants choices for goal setting and may help shape behavior toward what may be perceived as a difficult goal to achieve. (Population Health Management 2016;19:88-94).

  8. ``Low Power Wireless Technologies: An Approach to Medical Applications''

    Science.gov (United States)

    Bellido O., Francisco J.; González R., Miguel; Moreno M., Antonio; de La Cruz F, José Luis

    Wireless communication supposed a great both -quantitative and qualitative, jump in the management of the information, allowing the access and interchange of it without the need of a physical cable connection. The wireless transmission of voice and information has remained in constant evolution, arising new standards like BluetoothTM, WibreeTM or ZigbeeTM developed under the IEEE 802.15 norm. These newest wireless technologies are oriented to systems of communication of short-medium distance and optimized for a low cost and minor consume, becoming recognized as a flexible and reliable medium for data communications across a broad range of applications due to the potential that the wireless networks presents to operate in demanding environments providing clear advantages in cost, size, power, flexibility, and distributed intelligence. About the medical applications, the remote health or telecare (also called eHealth) is getting a bigger place into the manufacturers and medical companies, in order to incorporate products for assisted living and remote monitoring of health parameteres. At this point, the IEEE 1073, Personal Health Devices Working Group, stablish the framework for these kind of applications. Particularly, the 1073.3.X describes the physical and transport layers, where the new ultra low power short range wireless technologies can play a big role, providing solutions that allow the design of products which are particularly appropriate for monitor people’s health with interoperability requirements.

  9. The effect of using waste newspaper in surface layers on physical and mechanical properties of three-layer particleboard

    Directory of Open Access Journals (Sweden)

    vahid vaziri

    2017-02-01

    Full Text Available In this study, physical and mechanical properties of particleboard made from recycled newspaper in the surface layers were investigated. Coarse and fine wood chips and recycled newspaper with dimension of 0.5 × 4 cm2 were used. The variable in this research were the ratio of recycled newspaper to wood chips (at five levels; 0:100, 15:85, 30:70, 45:55, 60:40. Urea formaldehyde resin used at 10% content on dry weight basis of the wood particles and newspaper and ammonium chloride was used as a catalyst to 2% of the dry weight of adhesive. Physical and mechanical properties of panels measured according to EN Standard. The results showed that panels containing recycled newspapers at the level of 45% had the highest bending strength and modulus of elasticity. Internal bonding and screw holding strength decreased with increasing of recycled newspaper and control sample had the highest strength. Water absorption and thickness swelling increased with increasing of recycled newspaper portion. On the basis of results of this study can be concluded that particleboard containing recycled newspapers in the surface layers up to the level of 30% can be used for general purpose boards and interior fitments (including furniture for use in dry conditions.

  10. Physical-Layer Security with Full-Duplex Transceivers and Multiuser Receiver at Eve

    DEFF Research Database (Denmark)

    Mahmood, Nurul Huda; Shafique Ansari, Imran; Popovski, Petar

    2017-01-01

    , leading researchers to study other possible applications that can accord higher gains. The potential of full-duplex communication in improving the physical-layer security of a communication link is investigated in this contribution. We specifically present a thorough analysis of the achievable ergodic...

  11. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  12. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  13. Comparison of WRF local and nonlocal boundary layer Physics in Greater Kuala Lumpur, Malaysia

    Science.gov (United States)

    Ooi, M. C. G.; Chan, A.; Kumarenthiran, S.; Morris, K. I.; Oozeer, M. Y.; Islam, M. A.; Salleh, S. A.

    2018-02-01

    The urban boundary layer (UBL) is the internal advection layer of atmosphere above urban region which determines the exchanges of momentum, water and other atmospheric constituents between the urban land surface and the free troposphere. This paper tested the performance of three planetary boundary layer (PBL) physics schemes of Weather Research and Forecast (WRF) software to ensure the appropriate representation of vertical structure of UBL in Greater Kuala Lumpur (GKL). Comparison was conducted on the performance of respective PBL schemes to generate vertical and near-surface weather profile and rainfall. Mellor-Yamada- Janjíc (MYJ) local PBL scheme coupled with Eta MM5 surface layer scheme was found to predict the near-surface temperature and wind profile and mixing height better than the nonlocal schemes during the intermonsoonal period with least influences of the synoptic background weather.

  14. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  15. Physical-layer network coding for passive optical interconnect in datacenter networks.

    Science.gov (United States)

    Lin, Rui; Cheng, Yuxin; Guan, Xun; Tang, Ming; Liu, Deming; Chan, Chun-Kit; Chen, Jiajia

    2017-07-24

    We introduce physical-layer network coding (PLNC) technique in a passive optical interconnect (POI) architecture for datacenter networks. The implementation of the PLNC in the POI at 2.5 Gb/s and 10Gb/s have been experimentally validated while the gains in terms of network layer performances have been investigated by simulation. The results reveal that in order to realize negligible packet drop, the wavelengths usage can be reduced by half while a significant improvement in packet delay especially under high traffic load can be achieved by employing PLNC over POI.

  16. Investigating Wireless Power Transfer

    Science.gov (United States)

    St. John, Stuart A.

    2017-01-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a…

  17. Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.

    Science.gov (United States)

    Alharbi, Abdullah; Armstrong, Darren; Alharbi, Somayah; Shahrjerdi, Davood

    2017-12-26

    Physically unclonable cryptographic primitives are promising for securing the rapidly growing number of electronic devices. Here, we introduce physically unclonable primitives from layered molybdenum disulfide (MoS 2 ) by leveraging the natural randomness of their island growth during chemical vapor deposition (CVD). We synthesize a MoS 2 monolayer film covered with speckles of multilayer islands, where the growth process is engineered for an optimal speckle density. Using the Clark-Evans test, we confirm that the distribution of islands on the film exhibits complete spatial randomness, hence indicating the growth of multilayer speckles is a spatial Poisson process. Such a property is highly desirable for constructing unpredictable cryptographic primitives. The security primitive is an array of 2048 pixels fabricated from this film. The complex structure of the pixels makes the physical duplication of the array impossible (i.e., physically unclonable). A unique optical response is generated by applying an optical stimulus to the structure. The basis for this unique response is the dependence of the photoemission on the number of MoS 2 layers, which by design is random throughout the film. Using a threshold value for the photoemission, we convert the optical response into binary cryptographic keys. We show that the proper selection of this threshold is crucial for maximizing combination randomness and that the optimal value of the threshold is linked directly to the growth process. This study reveals an opportunity for generating robust and versatile security primitives from layered transition metal dichalcogenides.

  18. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  19. Using physical and numerical models to study possibilities of storing natural gas in horizontal layers

    Energy Technology Data Exchange (ETDEWEB)

    Boucher, M; Marrast, j

    1969-11-01

    The absence of suitable structures in some regions has led Gaz de France to investigate the storage of natural gas in horizontal layers. Research aimed at completing work done in this field by Soviet researchers has been carried out at the Institut Francais du Petrole using physical and numerical models together with computing. This research included an examination of storage stability, of how the effective volume of gas evolved during different cycles, of how the gas bubble migrates under the effect of a slight dip, and of the influence of instabilities. The possibility of storing gas in horizontal or sub-horizontal layers was thus justified from a theoretical viewpoint. When the time comes to make a decision concerning the creation of such a storage area, it is the economic factor that will be preponderant. The effective volume of recoverable gas has turned out to depend to a large extent on the thickness of the layer. (12 refs.)

  20. Synthesis of PVA/PVP hydrogels having two-layer by radiation and their physical properties

    International Nuclear Information System (INIS)

    Park, K.R.; Nho, Y.C.

    2003-01-01

    In these studies, two-layer hydrogels which consisted of polyurethane membrane and a mixture of polyvinyl alcohol(PVA)/poly-N-vinylpyrrolidone(PVP)/glycerin/chitosan were made for the wound dressing. Polyurethane was dissolved in solvent, the polyurethane solution was poured on the mould, and then dried to make the thin membrane. Hydrophilic polymer solutions were poured on the polyurethane membranes, they were exposed to gamma irradiation or two steps of 'freezing and thawing' and gamma irradiation doses to make the hydrogels. The physical properties such as gelation, water absorptivity, and gel strength were examined to evaluate the hydrogels for wound dressing. The physical properties of hydrogels such as gelation and gel strength was greatly improved when polyurethane membrane was used as a covering layer of hydrogel, and the evaporation speed of water in hydrogel was reduced

  1. Effects of wireless packet loss in industrial process control systems.

    Science.gov (United States)

    Liu, Yongkang; Candell, Richard; Moayeri, Nader

    2017-05-01

    controller to the burstiness of packet loss is also characterized in different process stages. The performance results indicate that wireless links with redundant bandwidth reservation can meet the requirements of the TE process model under normal operational conditions. When disturbances are introduced in the TE plant model, wireless packet loss during transitions between process stages need further protection in severely impaired links. Techniques such as retransmission scheduling, multipath routing and enhanced physical layer design are discussed and the latest industrial wireless protocols are compared. Published by Elsevier Ltd.

  2. Link adaptation performance evaluation for a MIMO-OFDM physical layer in a realistic outdoor environment

    OpenAIRE

    Han, C; Armour, SMD; Doufexi, A; Ng, KH; McGeehan, JP

    2006-01-01

    This paper presents a downlink performance analysis of a link adaptation (LA) algorithm applied to a MIMO-OFDM Physical Layer (PHY) which is a popular candidate for future generation cellular communication systems. The new LA algorithm attempts to maximize throughput and adaptation between various modulation and coding schemes in combination with both space-time block codes (STBC) and spatial multiplexing (SM) is based on knowledge of SNR and H matrix determinant; the parameters which are fou...

  3. Physical-layer Network Coding in Two-Way Heterogeneous Cellular Networks with Power Imbalance

    OpenAIRE

    Thampi, Ajay K; Liew, Soung Chang; Armour, Simon M D; Fan, Zhong; You, Lizhao; Kaleshi, Dritan

    2016-01-01

    The growing demand for high-speed data, quality of service (QoS) assurance and energy efficiency has triggered the evolution of 4G LTE-A networks to 5G and beyond. Interference is still a major performance bottleneck. This paper studies the application of physical-layer network coding (PNC), a technique that exploits interference, in heterogeneous cellular networks. In particular, we propose a rate-maximising relay selection algorithm for a single cell with multiple relays assuming the decode...

  4. Functional Basis for Efficient Physical Layer Classical Control in Quantum Processors

    Science.gov (United States)

    Ball, Harrison; Nguyen, Trung; Leong, Philip H. W.; Biercuk, Michael J.

    2016-12-01

    The rapid progress seen in the development of quantum-coherent devices for information processing has motivated serious consideration of quantum computer architecture and organization. One topic which remains open for investigation and optimization relates to the design of the classical-quantum interface, where control operations on individual qubits are applied according to higher-level algorithms; accommodating competing demands on performance and scalability remains a major outstanding challenge. In this work, we present a resource-efficient, scalable framework for the implementation of embedded physical layer classical controllers for quantum-information systems. Design drivers and key functionalities are introduced, leading to the selection of Walsh functions as an effective functional basis for both programing and controller hardware implementation. This approach leverages the simplicity of real-time Walsh-function generation in classical digital hardware, and the fact that a wide variety of physical layer controls, such as dynamic error suppression, are known to fall within the Walsh family. We experimentally implement a real-time field-programmable-gate-array-based Walsh controller producing Walsh timing signals and Walsh-synthesized analog waveforms appropriate for critical tasks in error-resistant quantum control and noise characterization. These demonstrations represent the first step towards a unified framework for the realization of physical layer controls compatible with large-scale quantum-information processing.

  5. SystemC modelling of wireless communication channel

    Science.gov (United States)

    Conti, Massimo; Orcioni, Simone

    2011-05-01

    This paper presents the definition in SystemC of wireless channels at different levels of abstraction. The different levels of description of the wireless channel can be easily interchanged allowing the reuse of the application and baseband layers in a high level analysis of the network or in a deep analysis of the communication between the wireless devices.

  6. Resource sharing in wireless networks: The SAPHYRE approach

    NARCIS (Netherlands)

    Jorswieck, E.A.; Badia, L.; Fahldieck, T.; Gesbert, D.; Gustafsson, S.; Haardt, M.; Ho, K.-M.; Karipidis, E.; Kortke, A.; Larsson, E.G.; Mark, H.; Nawrocki, M.; Piesiewicz, R.; Römer, F.; Schubert, M.; Sykora, J.; Trommelen, P.H.; Ende, B.D. van; Zorzi, M.

    2010-01-01

    Physical resource sharing between wireless operators and service providers is necessary in order to support efficient, competitive, and innovative wireless communication markets. By sharing resources, such as spectrum or infrastructure, which are usually exclusively allocated interference is created

  7. Wireless Cybersecurity

    Science.gov (United States)

    2013-04-01

    completely change the entire landscape. For example, under the quantum computing regime, factoring prime numbers requires only polynomial time (i.e., Shor’s...AFRL-OSR-VA-TR-2013-0206 Wireless Cybersecurity Biao Chen Syracuse University April 2013 Final Report DISTRIBUTION A...19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 21-02-2013 FINAL REPORT 01-04-2009 TO 30-11-2012 Wireless Cybersecurity

  8. Physics considerations in MV-CBCT multi-layer imager design.

    Science.gov (United States)

    Hu, Yue-Houng; Fueglistaller, Rony; Myronakis, Marios E; Rottmann, Joerg; Wang, Adam; Shedlock, Daniel; Morf, Daniel; Baturin, Paul; Huber, Pascal; Star-Lack, Josh M; Berbeco, Ross I

    2018-05-30

    Megavoltage (MV) cone-beam computed tomography (CBCT) using an electronic portal imaging (EPID) offers advantageous features, including 3D mapping, treatment beam registration, high-z artifact suppression, and direct radiation dose calculation. Adoption has been slowed by image quality limitations and concerns about imaging dose. Developments in imager design, including pixelated scintillators, structured phosphors, inexpensive scintillation materials, and multi-layer imager (MLI) architecture have been explored to improve EPID image quality and reduce imaging dose. The present study employs a hybrid Monte Carlo and linear systems model to determine the effect of detector design elements, such as multi-layer architecture and scintillation materials. We follow metrics of image quality including modulation transfer function (MTF) and noise power spectrum (NPS) from projection images to 3D reconstructions to in-plane slices and apply a task based figure-of-merit, the ideal observer signal-to-noise ratio (d') to determine the effect of detector design on object detectability. Generally, detectability was limited by detector noise performance. Deploying an MLI imager with a single scintillation material for all layers yields improvement in noise performance and d' linear with the number of layers. In general, improving x-ray absorption using thicker scintillators results in improved DQE(0). However, if light yield is low, performance will be affected by electronic noise at relatively high doses, resulting in rapid image quality degradation. Maximizing image quality in a heterogenous MLI detector (i.e. multiple different scintillation materials) is most affected by limiting imager noise. However, while a second-order effect, maximizing total spatial resolution of the MLI detector is a balance between the intensity contribution of each layer against its individual MTF. So, while a thinner scintillator may yield a maximal individual-layer MTF, its quantum efficiency will

  9. Physical properties of layered homologous RE-B-C(N) compounds

    International Nuclear Information System (INIS)

    Mori, Takao; Zhang Fuxiang; Leithe-Jasper, Andreas

    2004-01-01

    Physical properties of a series of homologous RE-B-C(N) B 12 cluster compounds REB 17 CN, REB 22 C 2 N, and REB 28.5 C 4 (RE=Er,Ho) were investigated. The structures of the compounds are layer-like along the c-axis, with rare earth and B 6 octahedral layers separated by B 12 icosahedral and C-B-C chain layers whose number increases successively from two B 12 layers for the REB 17 CN compound to four for the REB 28.5 C 4 compound. The rare earth atoms are configured in two triangular flat layers which are stacked on top of one another in AB stacking where the nearest-neighbor rare earth directions are the three atoms forming a triangle in the adjacent layer. The series of homologous compounds exhibit a spin glass transition with T f shifting in correspondence with variations of the basal plane lattice constants, consistent with the magnetic interaction being effective in the basal planes. The isothermal remanent magnetization shows a stretched exponential decay I m (t)∝ exp[-Ct -(1-n) ]. Exponents determined for the different homologous compounds were scaled as a function of T r =T/T f and found to follow the empirical dependency determined for typical spin glasses. It is indicated that a mixture of disorder originating from the partial occupancy of the rare earth sites and frustration of interactions due to the unique configuration is responsible for the manifestation of spin glass transitions in these homologous systems

  10. Self-organization of grafted polyelectrolyte layers via the coupling of chemical equilibrium and physical interactions.

    Science.gov (United States)

    Tagliazucchi, Mario; de la Cruz, Mónica Olvera; Szleifer, Igal

    2010-03-23

    The competition between chemical equilibrium, for example protonation, and physical interactions determines the molecular organization and functionality of biological and synthetic systems. Charge regulation by displacement of acid-base equilibrium induced by changes in the local environment provides a feedback mechanism that controls the balance between electrostatic, van der Waals, steric interactions and molecular organization. Which strategies do responsive systems follow to globally optimize chemical equilibrium and physical interactions? We address this question by theoretically studying model layers of end-grafted polyacids. These layers spontaneously form self-assembled aggregates, presenting domains of controlled local pH and whose morphologies can be manipulated by the composition of the solution in contact with the film. Charge regulation stabilizes micellar domains over a wide range of pH by reducing the local charge in the aggregate at the cost of chemical free energy and gaining in hydrophobic interactions. This balance determines the boundaries between different aggregate morphologies. We show that a qualitatively new form of organization arises from the coupling between physical interactions and protonation equilibrium. This optimization strategy presents itself with polyelectrolytes coexisting in two different and well-defined protonation states. Our results underline the need of considering the coupling between chemical equilibrium and physical interactions due to their highly nonadditive behavior. The predictions provide guidelines for the creation of responsive polymer layers presenting self-organized patterns with functional properties and they give insights for the understanding of competing interactions in highly inhomogeneous and constrained environments such as those relevant in nanotechnology and those responsible for biological cells function.

  11. Time-difference imaging of magnetic induction tomography in a three-layer brain physical phantom

    International Nuclear Information System (INIS)

    Liu, Ruigang; Li, Ye; Fu, Feng; You, Fusheng; Shi, Xuetao; Dong, Xiuzhen

    2014-01-01

    Magnetic induction tomography (MIT) is a contactless and noninvasive technique to reconstruct the conductivity distribution in a human cross-section. In this paper, we want to study the feasibility of imaging the low-contrast perturbation and small volume object in human brains. We construct a three-layer brain physical phantom which mimics the real conductivity distribution of brains by introducing an artificial skull layer. Using our MIT data acquisition system on this phantom and differential algorithm, we have obtained a series of reconstructed images of conductivity perturbation objects. All of the conductivity perturbation objects in the brain phantom can be clearly distinguished in the reconstructed images. The minimum detectable conductivity difference between the object and the background is 0.03 S m −1  (12.5%). The minimum detectable inner volume of the objects is 3.4 cm 3 . The three-layer brain physical phantom is able to simulate the conductivity distribution of the main structures of a human brain. The images of the low-contrast perturbation and small volume object show the prospect of MIT in the future. (paper)

  12. A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach

    Directory of Open Access Journals (Sweden)

    Qiao Liu

    2017-01-01

    Full Text Available Security issue has been considered as one of the most pivotal aspects for the fifth-generation mobile network (5G due to the increasing demands of security service as well as the growing occurrence of security threat. In this paper, instead of focusing on the security architecture in the upper layer, we investigate the secure transmission for a basic channel model in a heterogeneous network, that is, two-way relay channels. By exploiting the properties of the transmission medium in the physical layer, we propose a novel secure scheme for the aforementioned channel mode. With precoding design, the proposed scheme is able to achieve a high transmission efficiency as well as security. Two different approaches have been introduced: information theoretical approach and physical layer encryption approach. We show that our scheme is secure under three different adversarial models: (1 untrusted relay attack model, (2 trusted relay with eavesdropper attack model, and (3 untrusted relay with eavesdroppers attack model. We also derive the secrecy capacity of the two different approaches under the three attacks. Finally, we conduct three simulations of our proposed scheme. The simulation results agree with the theoretical analysis illustrating that our proposed scheme could achieve a better performance than the existing schemes.

  13. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  14. Scattering from a random layer of leaves in the physical optics limit

    Science.gov (United States)

    Lang, R. H.; Seker, S. S.; Le Vine, D. M.

    1982-01-01

    Backscatter of electromagnetic radiation from a layer of vegetation over flat lossy ground has been studied in collaborative research at the George Washingnton University and the Goddard Space Flight Center. In this work the vegetation is composed of leaves which are modeled by a random collection of lossy dielectric disks. Backscattering coefficients for the vegetation layer have been calculated in the case of disks whose diameter is large compared to wavelength. These backscattering coefficients are obtained in terms of the scattering amplitude of an individual disk by employing the distorted Born procedure. The scattering amplitude for a disk which is large compared to wavelength is then found by physical optic techniques. Computed results are interpreted in terms of dominant reflected and transmitted contributions from the disks and ground.

  15. Experiments on the flow field physics of confluent boundary layers for high-lift systems

    Science.gov (United States)

    Nelson, Robert C.; Thomas, F. O.; Chu, H. C.

    1994-01-01

    The use of sub-scale wind tunnel test data to predict the behavior of commercial transport high lift systems at in-flight Reynolds number is limited by the so-called 'inverse Reynolds number effect'. This involves an actual deterioration in the performance of a high lift device with increasing Reynolds number. A lack of understanding of the relevant flow field physics associated with numerous complicated viscous flow interactions that characterize flow over high-lift devices prohibits computational fluid dynamics from addressing Reynolds number effects. Clearly there is a need for research that has as its objective the clarification of the fundamental flow field physics associated with viscous effects in high lift systems. In this investigation, a detailed experimental investigation is being performed to study the interaction between the slat wake and the boundary layer on the primary airfoil which is known as a confluent boundary layer. This little-studied aspect of the multi-element airfoil problem deserves special attention due to its importance in the lift augmentation process. The goal of this research is is to provide an improved understanding of the flow physics associated with high lift generation. This process report will discuss the status of the research being conducted at the Hessert Center for Aerospace Research at the University of Notre Dame. The research is sponsored by NASA Ames Research Center under NASA grant NAG2-905. The report will include a discussion of the models that have been built or that are under construction, a description of the planned experiments, a description of a flow visualization apparatus that has been developed for generating colored smoke for confluent boundary layer studies and some preliminary measurements made using our new 3-component fiber optic LDV system.

  16. Radio frequency identification enabled wireless sensing for intelligent food logistics.

    Science.gov (United States)

    Zou, Zhuo; Chen, Qiang; Chen, Qing; Uysal, Ismail; Zheng, Lirong

    2014-06-13

    Future technologies and applications for the Internet of Things (IoT) will evolve the process of the food supply chain and create added value of business. Radio frequency identifications (RFIDs) and wireless sensor networks (WSNs) have been considered as the key technological enablers. Intelligent tags, powered by autonomous energy, are attached on objects, networked by short-range wireless links, allowing the physical parameters such as temperatures and humidities as well as the location information to seamlessly integrate with the enterprise information system over the Internet. In this paper, challenges, considerations and design examples are reviewed from system, implementation and application perspectives, particularly with focus on intelligent packaging and logistics for the fresh food tracking and monitoring service. An IoT platform with a two-layer network architecture is introduced consisting of an asymmetric tag-reader link (RFID layer) and an ad-hoc link between readers (WSN layer), which are further connected to the Internet via cellular or Wi-Fi. Then, we provide insights into the enabling technology of RFID with sensing capabilities. Passive, semi-passive and active RFID solutions are discussed. In particular, we describe ultra-wideband radio RFID which has been considered as one of the most promising techniques for ultra-low-power and low-cost wireless sensing. Finally, an example is provided in the form of an application in fresh food tracking services and corresponding field testing results.

  17. Ion - beam assisted process in the physical deposition of organic thin layers

    Energy Technology Data Exchange (ETDEWEB)

    Dimov, D; Spassova, E; Assa, J; Danev, G [Acad. J .Malinowski Central Laboratory of Photoprocesses, Bulgarian Academy of Sciences, Acad. G. Bonchev Str., Bl.109, 1113 Sofia (Bulgaria); Georgiev, A, E-mail: dean@clf.bas.b [University of Chemical Technology and Metallurgy, 8 Kl. Ohridski Blvd., 1756 Sofia (Bulgaria)

    2010-04-01

    A novel method was developed for physical deposition of thin polyimide layers by applying an argon plasma assisted process. The influence was investigated of the plasma on the combined molecular flux of the two thermally evaporated precursors - oxydianiline and pyromellitic dianhydride. The effects observed on the properties of the deposited films are explained with the increased energy of the precursor molecules resulting from the ion-molecular collisions. As could be expected, molecules with higher energy possess higher mobility and thus determine the modification of the films structure and their electrical properties.

  18. Wireless motion sensor network for monitoring motion in a process, wireless sensor node, reasoning node, and feedback and/or actuation node for such wireless motion sensor network

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Marin Perianu, Raluca; Marin Perianu, Mihai

    2010-01-01

    Wireless motion sensor network for monitoring motion in a process comprising at least one wireless sensor node for measuring at least one physical quantity related to motion or orientation, feature extraction means for deriving a feature for the measured quantities, a wireless transmitter connected

  19. Double-Layer Structured CO2 Adsorbent Functionalized with Modified Polyethyleneimine for High Physical and Chemical Stability.

    Science.gov (United States)

    Jeon, Sunbin; Jung, Hyunchul; Kim, Sung Hyun; Lee, Ki Bong

    2018-06-18

    CO 2 capture using polyethyleneimine (PEI)-impregnated silica adsorbents has been receiving a lot of attention. However, the absence of physical stability (evaporation and leaching of amine) and chemical stability (urea formation) of the PEI-impregnated silica adsorbent has been generally established. Therefore, in this study, a double-layer impregnated structure, developed using modified PEI, is newly proposed to enhance the physical and chemical stabilities of the adsorbent. Epoxy-modified PEI and diepoxide-cross-linked PEI were impregnated via a dry impregnation method in the first and second layers, respectively. The physical stability of the double-layer structured adsorbent was noticeably enhanced when compared to the conventional adsorbents with a single layer. In addition to the enhanced physical stability, the result of simulated temperature swing adsorption cycles revealed that the double-layer structured adsorbent presented a high potential working capacity (3.5 mmol/g) and less urea formation under CO 2 -rich regeneration conditions. The enhanced physical and chemical stabilities as well as the high CO 2 working capacity of the double-layer structured adsorbent were mainly attributed to the second layer consisting of diepoxide-cross-linked PEI.

  20. Investigation on iterative multiuser detection physical layer network coding in two-way relay free-space optical links with turbulences and pointing errors.

    Science.gov (United States)

    Abu-Almaalie, Zina; Ghassemlooy, Zabih; Bhatnagar, Manav R; Le-Minh, Hoa; Aslam, Nauman; Liaw, Shien-Kuei; Lee, It Ee

    2016-11-20

    Physical layer network coding (PNC) improves the throughput in wireless networks by enabling two nodes to exchange information using a minimum number of time slots. The PNC technique is proposed for two-way relay channel free space optical (TWR-FSO) communications with the aim of maximizing the utilization of network resources. The multipair TWR-FSO is considered in this paper, where a single antenna on each pair seeks to communicate via a common receiver aperture at the relay. Therefore, chip interleaving is adopted as a technique to separate the different transmitted signals at the relay node to perform PNC mapping. Accordingly, this scheme relies on the iterative multiuser technique for detection of users at the receiver. The bit error rate (BER) performance of the proposed system is examined under the combined influences of atmospheric loss, turbulence-induced channel fading, and pointing errors (PEs). By adopting the joint PNC mapping with interleaving and multiuser detection techniques, the BER results show that the proposed scheme can achieve a significant performance improvement against the degrading effects of turbulences and PEs. It is also demonstrated that a larger number of simultaneous users can be supported with this new scheme in establishing a communication link between multiple pairs of nodes in two time slots, thereby improving the channel capacity.

  1. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  2. Fuel Thermo-physical Characterization Project: Evaluation of Models to Calculate Thermal Diffusivity of Layered Composites

    Energy Technology Data Exchange (ETDEWEB)

    Burkes, Douglas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Casella, Amanda J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gardner, Levi D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Casella, Andrew M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Huber, Tanja K. [Technische Universität München, Munich (Germany); Breitkreutz, Harald [Technische Universität München, Munich (Germany)

    2015-02-11

    The Office of Material Management and Minimization Fuel Thermo-physical Characterization Project at Pacific Northwest National Laboratory (PNNL) is tasked with using PNNL facilities and processes to receive irradiated low enriched uranium-molybdenum fuel plate samples and perform analyses in support of the Office of Material Management and Minimization Reactor Conversion Program. This work is in support of the Fuel Development Pillar that is managed by Idaho National Laboratory. A key portion of the scope associated with this project was to measure the thermal properties of fuel segments harvested from plates that were irradiated in the Advanced Test Reactor. Thermal diffusivity of samples prepared from the fuel segments was measured using laser flash analysis. Two models, one developed by PNNL and the other developed by the Technische Universität München (TUM), were evaluated to extract the thermal diffusivity of the uranium-molybdenum alloy from measurements made on the irradiated, layered composites. The experimental data of the “TC” irradiated fuel segment was evaluated using both models considering a three-layer and five-layer system. Both models are in acceptable agreement with one another and indicate that the zirconium diffusion barrier has a minimal impact on the overall thermal diffusivity of the monolithic U-Mo fuel.

  3. Physical layer impairments tolerance based lightpath provision in software defined optical network

    Institute of Scientific and Technical Information of China (English)

    Zhao Xianlong; Xu Xianze; Bai Huifeng

    2017-01-01

    As all-optical networks grow with ever increasing ultra-high speed, the communication quality suffers seriously from physical layer impairments ( PLIs) .The same problem still exists in software defined optical network ( SDON) controlled by OpenFlow.Aimed to solve this problem, a PLIs tol-erance based lightpath provision scheme is proposed for OpenFlow controlled optical networks.This proposed approach not only takes the OSNR model to represent those linear PLIs factors, but also in-troduces those nonlinear factors into the OSNR model.Thus, the proposed scheme is able to cover most PLIs factors of each optical link and conduct optical lightpath provison with better communica-tion quality.Moreover, PLIs tolerance model is also set up and considered in this work with some necessary extension to OpenFlow protocols to achieve better compatibility between physical layer im-pairments factors and various services connections.Simulation results show that the proposed scheme is able to get better performance in terms of packet loss rate and connection setup time.

  4. Physical Layer Definition for a Long-Haul HF Antarctica to Spain Radio Link

    Directory of Open Access Journals (Sweden)

    Rosa Ma Alsina-Pagès

    2016-05-01

    Full Text Available La Salle and the Observatori de l’Ebre (OE have been involved in a remote sensing project in Antarctica for the last 11 years. The OE has been monitoring the geomagnetic activity for more than twenty years and also the ionospheric activity of the last ten years in the Spanish Antarctic Station Juan Carlos I (ASJI (62.7 ° S, 299.6 ° E. La Salle is finishing the design and testing of a low-power communication system between the ASJI and Cambrils (41.0 ° N, 1.0 ° E with a double goal: (i the transmission of data from the sensors located at the ASJI and (ii the performance of an oblique ionospheric sounding of a 12,760 km HF link. Previously, La Salle has already performed sounding and modulation tests to describe the channel performance in terms of availability, Signal-to-Noise Ratio (SNR, Doppler spread and delay spread. This paper closes the design of the physical layer, by means of the channel error study and the synchronization performance, and concludes with a new physical layer proposal for the Oblique Ionosphere Sounder. Narrowband and wideband frames have been defined to be used when the oblique sounder performs as an ionospheric sensor. Finally, two transmission modes have been defined for the modem performance: the High Robustness Mode (HRM for low SNR hours and the High Throughput Mode (HTM for the high SNR hours.

  5. Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems

    Directory of Open Access Journals (Sweden)

    Li Tongtong

    2007-01-01

    Full Text Available Historically developed for secure communication and military use, CDMA has been identified as a major modulation and multiple-access technique for 3G systems and beyond. In addition to the wide bandwidth and low power-spectrum density which make CDMA signals robust to narrowband jamming and easy to be concealed within the noise floor, the physical layer built-in information privacy of CDMA system is provided by pseudorandom scrambling. In this paper, first, security weakness of the operational and proposed CDMA airlink interfaces is analyzed. Second, based on the advanced encryption standard (AES, we propose to enhance the physical layer built-in security of CDMA systems through secure scrambling. Performance analysis demonstrates that while providing significantly improved information privacy, CDMA systems with secure scrambling have comparable computational complexity and overall system performance with that of conventionally scrambled systems. Moreover, it is shown that by scrambling the training sequence and the message sequence separately with two independent scrambling sequences, both information privacy and system performance can be further improved. The proposed scheme can readily be applied to 3G systems and beyond.

  6. Point Defects in Two-Dimensional Layered Semiconductors: Physics and Its Applications

    Science.gov (United States)

    Suh, Joonki

    Recent advances in material science and semiconductor processing have been achieved largely based on in-depth understanding, efficient management and advanced application of point defects in host semiconductors, thus finding the relevant techniques such as doping and defect engineering as a traditional scientific and technological solution. Meanwhile, two- dimensional (2D) layered semiconductors currently draw tremendous attentions due to industrial needs and their rich physics at the nanoscale; as we approach the end of critical device dimensions in silicon-based technology, ultra-thin semiconductors have the potential as next- generation channel materials, and new physics also emerges at such reduced dimensions where confinement of electrons, phonons, and other quasi-particles is significant. It is therefore rewarding and interesting to understand and redefine the impact of lattice defects by investigating their interactions with energy/charge carriers of the host matter. Potentially, the established understanding will provide unprecedented opportunities for realizing new functionalities and enhancing the performance of energy harvesting and optoelectronic devices. In this thesis, multiple novel 2D layered semiconductors, such as bismuth and transition- metal chalcogenides, are explored. Following an introduction of conventional effects induced by point defects in semiconductors, the related physics of electronically active amphoteric defects is revisited in greater details. This can elucidate the complication of a two-dimensional electron gas coexisting with the topological states on the surface of bismuth chalcogenides, recently suggested as topological insulators. Therefore, native point defects are still one of the keys to understand and exploit topological insulators. In addition to from a fundamental science point of view, the effects of point defects on the integrated thermal-electrical transport, as well as the entropy-transporting process in

  7. Analysis Of Packets Delay In Wireless Data Networks

    Directory of Open Access Journals (Sweden)

    Krivchenkov Aleksandr

    2015-12-01

    Full Text Available The networks with wireless links for automation control applications traffic transmission when packets have small size and application payload is predictable are under consideration. Analytical model for packets delay on their propagation path through the network is proposed. Estimations for network architectures based on WiFi and Bluetooth wireless technologies are made. The specifications for physical layer 802.11 a/b/g/n and 802.15.1 are under consideration. Analytical and experimental results for delivered network bandwidth for different network architecture, traffic structure and wireless technologies were compared to validate that basic mechanisms are correctly taken into account in the model. It is shown that basic effects are taken into account and further accuracy “improvement” of the model will give not more than 5%. As a result that is important for automation control applications we have reliably received the lowest possible level for packets delay in one wireless link. For 802.11 it is of order of 0.2 ms, for 802.15.1 it is 1.25 ms and is true when application packet can be transferred by one data frame.

  8. On the physical mechanism at the origin of multiple double layers appearance in plasma

    International Nuclear Information System (INIS)

    Dimitriu, D.G.; Gurlui, S.; Aflori, M.; Ivan, L.M.

    2005-01-01

    Double layers (DLs) in plasma are nonlinear potential structures consisting of two adjacent layers of positive and negative space charge, respectively. Between these layers a potential jump exists, creating an electric field. A common way to obtain a DL structure is to positively bias an electrode immersed in asymptotic stable plasma. In this way, a complex space charge structure (CSCS) in form of a positive 'nucleus' surrounded by a nearly spherical DL is obtained. Under certain experimental conditions (gas nature and pressure, plasma density, electron temperature) a more complex structure in form of two or more subsequent DLs was observed, which was called multiple double layers (MDL). It appears as several bright and concentric plasma shells attached to the electrode. The successive DLs are located at the abrupt changes of luminosity between two adjacent plasma shells. Probe measurements emphasized that the axial profile of the plasma potential has a stair steps shape, with potential jumps close to the ionization potential of the used gas. Experimental results clarify the essential role of excitation and ionization electron-neutral collisions for the generation and dynamics of MDL structures. However, if the electrode is large, the MDL structure appears non-concentrically, as a network of plasma spheres, near each other, almost equally distributed on the electrode surface. Each of the plasma spots is a CSCS as described above. Here, we will present experimental result on concentric and non-concentric MDL, which prove that the same physical mechanism is at the origin of their appearance in plasma. In this mechanism the electron-neutral impact excitations and ionizations play the key role. A simultaneously generation of both types of MDL was recorded. The dynamics of the MDL structures was analyzed by using the modern methods provided by the nonlinear dynamics. In this way, a scenario of transition to chaos by torus breakdown was emphasized, related with the

  9. PropBase Query Layer: a single portal to UK subsurface physical property databases

    Science.gov (United States)

    Kingdon, Andrew; Nayembil, Martin L.; Richardson, Anne E.; Smith, A. Graham

    2013-04-01

    Until recently, the delivery of geological information for industry and public was achieved by geological mapping. Now pervasively available computers mean that 3D geological models can deliver realistic representations of the geometric location of geological units, represented as shells or volumes. The next phase of this process is to populate these with physical properties data that describe subsurface heterogeneity and its associated uncertainty. Achieving this requires capture and serving of physical, hydrological and other property information from diverse sources to populate these models. The British Geological Survey (BGS) holds large volumes of subsurface property data, derived both from their own research data collection and also other, often commercially derived data sources. This can be voxelated to incorporate this data into the models to demonstrate property variation within the subsurface geometry. All property data held by BGS has for many years been stored in relational databases to ensure their long-term continuity. However these have, by necessity, complex structures; each database contains positional reference data and model information, and also metadata such as sample identification information and attributes that define the source and processing. Whilst this is critical to assessing these analyses, it also hugely complicates the understanding of variability of the property under assessment and requires multiple queries to study related datasets making extracting physical properties from these databases difficult. Therefore the PropBase Query Layer has been created to allow simplified aggregation and extraction of all related data and its presentation of complex data in simple, mostly denormalized, tables which combine information from multiple databases into a single system. The structure from each relational database is denormalized in a generalised structure, so that each dataset can be viewed together in a common format using a simple

  10. Complex confining layers : a physical and geochemical characterization of heterogeneous unconsolidated fluvial deposits using a facies-based approach

    NARCIS (Netherlands)

    Helvoort, Pieter-Jan van

    2003-01-01

    A proper characterization of physical and chemical heterogeneities in the subsoil is an important condition for successful modeling of groundwater flow and solute transport. This study focuses on the physical and chemical characterization of a complex confining layer in the Rhine–Meuse deltaic plain

  11. Electromagnetic design, engineering development and magnetic qualification of a horizontal layered scaled magnet for physics experiments

    Energy Technology Data Exchange (ETDEWEB)

    Trivedi, Praveen; Teotia, Vikas; Malhotra, Sanjay; Taly, Y.K., E-mail: praveent@barc.gov.in [Control Instrumentation Division, Bhabha Atomic Research Centre, Mumbai (India)

    2014-07-01

    Neutrino detectors around the world have shown evidence that these weakly interacting, little-understood particles are not really mass less, as was thought so far. Not only do they have non-zero masses, different species (or flavors) of neutrinos seem to mix and oscillate into one another as they traverse through the cosmos. If this is true, this is not only one of the first pieces of evidence for physics beyond the so-called Standard Model of Particle Physics, but would also have great impact on diverse fields such as nuclear and particle physics, astrophysics and cosmology. It is thus imperative to study the details of the interactions of these particles. These will be detected by means of an iron calorimeter (ICAL), comprising detectors sandwiched in alternate layers of soft magnetic iron. The iron core is magnetized to allow bending of the charged particles. The direction and the energy of the original incoming neutrino, that caused the interaction, can then be accurately determined. Racetrack coils through slots cut in the iron core create a uniform magnetic field in the iron core. A highly uniform magnetic field in the soft iron core is required to accurately determine the mass and energy of incident particle. The charged particles bend in this magnetic field; oppositely charged particles bending in opposite directions. The charge, energy and momentum of the emitted particle is thus determined. An electromagnet was designed as a laboratory facility for conducting experimental studies in particle physics. This paper discusses the electromagnetic design, development, fabrication, magnetic qualification and magnetic measurement issues of an electromagnet developed for physics studies. (author)

  12. Wireless Tots

    Science.gov (United States)

    Scott, Lee-Allison

    2003-01-01

    The first wireless technology program for preschoolers was implemented in January at the Primrose School at Bentwater in Atlanta, Georgia, a new corporate school operated by Primrose School Franchising Co. The new school serves as a testing and training facility for groundbreaking educational approaches, including emerging innovations in…

  13. Physical and Chemical Interactions between Mg:Al Layered Double Hydroxide and Hexacyanoferrate

    Science.gov (United States)

    Boclair, Joseph W.; Braterman, Paul S.; Brister, Brian D.; Wang, Zhiming; Yarberry, Faith

    2001-11-01

    The physical and chemical interactions of ferrocyanide (potassium and ammonium salts) and ferricyanide (potassium salt) with Mg:Al layered double hydroxides (LDH) (having Mg:Al ratios of 2 and 3) are investigated using powder XRD and FTIR spectroscopy. Physically, the potassium ferricyanide is shown to intercalate with a small local field deformation similar to that seen for hexacyanocobaltate (III) in similar materials. Chemically, the reduction of ferricyanide to ferrocyanide upon intercalation is confirmed. Physical interactions of ferrocyanide with 3:1 LDH are shown spectroscopically to include the possible generation of anions in differing environments. Chemically, ferrocyanide is shown to generate cubic ferrocyanides (of the type M2MgFe(CN)6, where M=K+ or NH+4) under conditions where free Mg2+ is likely present in solution, namely, solutions with a pH lower than ∼7.5. It is shown that the reported 2112-cm-1 band found in some chemically altered LDH ferrocyanide is indeed due to interlayer ferricyanide, but that the 2080 cm-1 band is due to the cubic material.

  14. Synthesis of PVA/PVP hydrogels having two layers by radiation and their physical properties

    International Nuclear Information System (INIS)

    Nho, Y.C.; Park, K.R.

    2002-01-01

    Complete text of publication follows. The radiation can induce chemical reaction to modify polymer under even the solid state or in the low temperature. The radiation crosslinking can be easily adjusted by controlling the radiation dose and is reproducible. The finished product contains no residuals of substances required to initiate the chemical crosslinking that can restrict the application possibilities. In these studies, two layer's hydrogel which consisted of urethane membrane and a mixture of polyvinyl alcohol/poly-N-vinylpyrrolidone /glycerin/chitosan was made by gamma-ray irradiation or two steps of 'freezing and thawing' and gamma-ray irradiation for wound dressing. The physical properties such as gelation, water absorptivity, and gel strength were examined to evaluate the hydrogels for wound dressing. Urethane was dissolved in solvent, the urethane solution was poured on the mould, and then dried to make the thin membrane. Hydrophilic polymer solutions were poured on the urethane membranes, they were exposed to gamma irradiation or 'freezing and thawing' and gamma irradiation doses of 25, 35, 50 and 60 kGy to evaluate the physical properties of hydrogels. The physical properties of hydrogels such as gelation and gel strength were improved, and the evaporation speed of water in hydrogel was low when urethane membrane was used

  15. Coordinated Transmissions to Direct and Relayed Users in Wireless Cellular Systems

    DEFF Research Database (Denmark)

    Thai, Chan; Popovski, Petar; Kaneko, Megumi

    2011-01-01

    The ideas of wireless network coding at the physical layer promise high throughput gains in wireless systems with relays and multi–way traffic flows. This gain can be ascribed to two principles: (1) joint transmission of multiple communication flows and (2) usage of a priori information to cancel...... the interference. In this paper we use these principles to devise new transmission schemes in wireless cellular systems that feature both users served directly by the base stations (direct users) and users served through relays (relayed users). We present four different schemes for coordinated transmission...... of uplink and downlink traffic in which one direct and one relayed user are served. These schemes are then used as building blocks in multi–user scenarios, where we present several schemes for scheduling pairs of users for coordinated transmissions. The optimal scheme involves exhaustive search of the best...

  16. Joint Power Allocation for Multicast Systems with Physical-Layer Network Coding

    Directory of Open Access Journals (Sweden)

    Zhu Wei-Ping

    2010-01-01

    Full Text Available This paper addresses the joint power allocation issue in physical-layer network coding (PLNC of multicast systems with two sources and two destinations communicating via a large number of distributed relays. By maximizing the achievable system rate, a constrained optimization problem is first formulated to jointly allocate powers for the source and relay terminals. Due to the nonconvex nature of the cost function, an iterative algorithm with guaranteed convergence is developed to solve the joint power allocation problem. As an alternative, an upper bound of the achievable rate is also derived to modify the original cost function in order to obtain a convex optimization solution. This approximation is shown to be asymptotically optimal in the sense of maximizing the achievable rate. It is confirmed through Monte Carlo simulations that the proposed joint power allocation schemes are superior to the existing schemes in terms of achievable rate and cumulative distribution function (CDF.

  17. Physical Models of Layered Polar Firn Brightness Temperatures from 0.5 to 2 GHz

    Science.gov (United States)

    Tan, Shurun; Aksoy, Mustafa; Brogioni, Marco; Macelloni, Giovanni; Durand, Michael; Jezek, Kenneth C.; Wang, Tian-Lin; Tsang, Leung; Johnson, Joel T.; Drinkwater, Mark R.; hide

    2015-01-01

    We investigate physical effects influencing 0.5-2 GHz brightness temperatures of layered polar firn to support the Ultra Wide Band Software Defined Radiometer (UWBRAD) experiment to be conducted in Greenland and in Antarctica. We find that because ice particle grain sizes are very small compared to the 0.5-2 GHz wavelengths, volume scattering effects are small. Variations in firn density over cm- to m-length scales, however, cause significant effects. Both incoherent and coherent models are used to examine these effects. Incoherent models include a 'cloud model' that neglects any reflections internal to the ice sheet, and the DMRT-ML and MEMLS radiative transfer codes that are publicly available. The coherent model is based on the layered medium implementation of the fluctuation dissipation theorem for thermal microwave radiation from a medium having a nonuniform temperature. Density profiles are modeled using a stochastic approach, and model predictions are averaged over a large number of realizations to take into account an averaging over the radiometer footprint. Density profiles are described by combining a smooth average density profile with a spatially correlated random process to model density fluctuations. It is shown that coherent model results after ensemble averaging depend on the correlation lengths of the vertical density fluctuations. If the correlation length is moderate or long compared with the wavelength (approximately 0.6x longer or greater for Gaussian correlation function without regard for layer thinning due to compaction), coherent and incoherent model results are similar (within approximately 1 K). However, when the correlation length is short compared to the wavelength, coherent model results are significantly different from the incoherent model by several tens of kelvins. For a 10-cm correlation length, the differences are significant between 0.5 and 1.1 GHz, and less for 1.1-2 GHz. Model results are shown to be able to match the v

  18. Investigating wireless power transfer

    Science.gov (United States)

    St John, Stuart A.

    2017-09-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.

  19. First MCM-D modules for the b-physics layer of the ATLAS Pixel Detector

    CERN Document Server

    Basken, O; Ehrmann, O; Gerlach, P; Grah, C; Gregor, I M; Linder, C; Meuser, S; Richardson, J; Topper, M; Wolf, J

    2000-01-01

    The innermost layer (b-physics layer) of the ATLAS Pixel Detector will consist of modules based on MCM-D technology. Such a module consists of a sensor tile with an active area of 16.4 mm*60.4 mm, 16 read out ICs, each serving 24* 160 pixel unit cells, a module controller chip (MCC), an optical transceiver and the local signal interconnection and power distribution busses. We show a prototype of such a module with additional test pads on both sides. The outer dimensions of the final module will be 21.4 mm*67.8 mm. The extremely high wiring density, which is necessary to interconnect the read-out chips, was achieved using a thin film copper/photo-BCB process on the pixel array. The bumping of the read out chips was done using electroplating PbSn. All dice are then attached by flip-chip assembly to the sensor diodes and the local busses. The focus of this paper is the description of the first results of such MCM-D-type modules. (11 refs).

  20. COMPARATIVE ANALYSIS OF LEACH AND HEEMPCP PROTOCOLS FOR WIRELESS SENSOR NETWORKS SYSTEM

    OpenAIRE

    Richa Asstt. Pro.Misha Thakur

    2018-01-01

    In this paper author aims at describing a wireless sensor network. wireless sensor network consisting of spatially distributed autonomous devices using sensor to monitor physical or environmental conditions. Wireless sensor network can be used in wide range of applications including environmental monitoring, habitat monitoring, various military applications, smart home technologiesand agriculture. Wireless sensor networks constitute one of promising application areas of the recently developed...

  1. An ad hoc wireless sensor network for tele medicine applications

    International Nuclear Information System (INIS)

    Sheltami, Tarek R.; Mahmoud, Ashraf S.; Abu-Amara, Marwan H.

    2007-01-01

    Recent advances in embedded computing systems have led to the emergence of wireless sensor networks (SNETs), consisting of small, battery-powered motes with limited computation and radio communication capabilities. SNETs permit data gathering and computation to be deeply embedded in the physical environment. Large scale ad hoc sensor networks (ASNET), when deployed among mobile patients, can provide dynamic data query architecture to allow medical specialists to monitor patients at any place via the web or cellular network. In case of an emergency, doctors and/or nurses will be contacted automatically through their handheld personal digital assistants (PDAs) or cellular phones. In specific, the proposed network consists of sensor nodes at the first layer whose responsibility is to measure, collect and communicate, via wired or wireless interface, readings to a microcontroller presenting the second layer of architecture. Deployed microcontrollers process incoming readings and report to a central system via a wireless interface. The implemented network distinguishes between periodic sensor readings and critical or event driven readings where higher priorities is given for the latter. In this paper we implement 3 special cases for tracking and monitoring patients and doctors using SNETs. In addition, the performance of a large scale of our implementation has been tested by means of mathematical analysis. (author)

  2. Significant performance improvement obtained in a wireless mesh network using a beamswitching antenna

    CSIR Research Space (South Africa)

    Lysko, AA

    2012-09-01

    Full Text Available mesh network operated in a fixed 11 Mbps mode. The throughput improvement in multi-hop communication obtained in the presence of an interferer is tenfold, from 0.2 Mbps to 2 Mbps. Index Terms?antenna, smart antenna, wireless mesh network, WMN... efficiency in the communications, and active research and development of new methods and technologies enabling this at the physical layer, including multiple antenna techniques, such as multiple input multiple output (MIMO) and smart antennas...

  3. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  4. Capacity Analysis of Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    M. I. Gumel

    2012-06-01

    Full Text Available The next generation wireless networks experienced a great development with emergence of wireless mesh networks (WMNs, which can be regarded as a realistic solution that provides wireless broadband access. The limited available bandwidth makes capacity analysis of the network very essential. While the network offers broadband wireless access to community and enterprise users, the problems that limit the network capacity must be addressed to exploit the optimum network performance. The wireless mesh network capacity analysis shows that the throughput of each mesh node degrades in order of l/n with increasing number of nodes (n in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network.

  5. U Patch Antenna for RFID and Wireless Applications

    International Nuclear Information System (INIS)

    Abi Saad, R.; Melhem, Z.; Nader, C.; Zaatar, Y.; Zaouk, D.

    2011-01-01

    in this paper, we propose a new multi-band patch antenna structure for embedded RFID (Radio Frequency Identification) readers and wireless communications. The proposed antenna is a dual band microstrip patch antenna using U-slot geometry. The operating frequencies of the proposed antenna are chosen as 2.4 and 0.9 (GHz), obtained by optimizing the physical dimensions of the U-slot. Several parameters have been investigated using Ansoft Designer software. The antenna is fed through a quarter wavelength transformer for impedance matching. An additional layer of alumina is added above the surface of the conductors to increase the performance of the antenna. (author)

  6. Influences of layer thickness on the compatibility and physical properties of polycarbonate/polystyrene multilayered film via nanolayer coextrusion

    Science.gov (United States)

    Cheng, Junfeng; Chen, Zhiru; Zhou, Jiaqi; Cao, Zheng; Wu, Dun; Liu, Chunlin; Pu, Hongting

    2018-05-01

    The effects of layer thickness on the compatibility between polycarbonate (PC) and polystyrene (PS) and physical properties of PC/PS multilayered film via nanolayer coextrusion are studied. The morphology of multilayered structure is observed using a scanning electron microscope. This multilayered structure may have a negative impact on the transparency, but it can improve the water resistance and heat resistance of film. To characterize the compatibility between PC and PS, differential scanning calorimetry is used to measure the glass transition temperature. The compatibility is found to be improved with the decrease of layer thickness. Therefore, the viscosity of multilayered film is also reduced with the decrease of layer thickness. In addition, the multilayered structure can improve the tensile strength with the increase of layer numbers. Because of the complete and continuous layer structure of PC, the PC/PS multilayered film can retain its mechanical strength at the temperature above Tg of PS.

  7. Security Belt for Wireless Implantable Medical Devices.

    Science.gov (United States)

    Kulaç, Selman

    2017-09-19

    In this study, a new protective design compatible with existing non-secure systems was proposed, since it is focused on the secure communication of wireless IMD systems in all transmissions. This new protector is an external wearable device and appears to be a belt fitted around for the patients IMD implanted. However, in order to provide effective full duplex transmissions and physical layer security, some sophisticated transceiver antennas have been placed on the belt. In this approach, beam-focused multi-antennas in optimal positions on the belt are randomly switched when transmissions to the IMD are performed and multi-jammer switching with MRC combining or majority-rule based receiving techniques are applied when transmissions from the IMD are carried out. This approach can also reduce the power consumption of the IMDs and contribute to the prolongation of the IMD's battery life.

  8. Cross-Layer Design and Analysis of Downlink Communications in Cellular CDMA Systems

    Directory of Open Access Journals (Sweden)

    Sun Jin Yuan

    2006-01-01

    Full Text Available A cellular CDMA network with voice and data communications is considered. Focusing on the downlink direction, we seek for the overall performance improvement which can be achieved by cross-layer analysis and design, taking physical layer, link layer, network layer, and transport layer into account. We are concerned with the role of each single layer as well as the interaction among layers, and propose algorithms/schemes accordingly to improve the system performance. These proposals include adaptive scheduling for link layer, priority-based handoff strategy for network admission control, and an algorithm for the avoidance of TCP spurious timeouts at the transport layer. Numerical results show the performance gain of each proposed scheme over independent performance of an individual layer in the wireless mobile network. We conclude that the system performance in terms of capacity, throughput, dropping probability, outage, power efficiency, delay, and fairness can be enhanced by jointly considering the interactions across layers.

  9. Annual and semiannual variations in the ionospheric F2-layer: II. Physical discussion

    Directory of Open Access Journals (Sweden)

    H. Rishbeth

    2000-08-01

    Full Text Available The companion paper by Zou et al. shows that the annual and semiannual variations in the peak F2-layer electron density (NmF2 at midlatitudes can be reproduced by a coupled thermosphere-ionosphere computational model (CTIP, without recourse to external influences such as the solar wind, or waves and tides originating in the lower atmosphere. The present work discusses the physics in greater detail. It shows that noon NmF2 is closely related to the ambient atomic/molecular concentration ratio, and suggests that the variations of NmF2 with geographic and magnetic longitude are largely due to the geometry of the auroral ovals. It also concludes that electric fields play no important part in the dynamics of the midlatitude thermosphere. Our modelling leads to the following picture of the global three-dimensional thermospheric circulation which, as envisaged by Duncan, is the key to explaining the F2-layer variations. At solstice, the almost continuous solar input at high summer latitudes drives a prevailing summer-to-winter wind, with upwelling at low latitudes and throughout most of the summer hemisphere, and a zone of downwelling in the winter hemisphere, just equatorward of the auroral oval. These motions affect thermospheric composition more than do the alternating day/night (up-and-down motions at equinox. As a result, the thermosphere as a whole is more molecular at solstice than at equinox. Taken in conjunction with the well-known relation of F2-layer electron density to the atomic/molecular ratio in the neutral air, this explains the F2-layer semiannual effect in NmF2 that prevails at low and middle latitudes. At higher midlatitudes, the seasonal behaviour depends on the geographic latitude of the winter downwelling zone, though the effect of the composition changes is modified by the large solar zenith angle at midwinter. The zenith angle effect is especially important in longitudes far from the magnetic poles. Here, the downwelling occurs

  10. Annual and semiannual variations in the ionospheric F2-layer: II. Physical discussion

    Directory of Open Access Journals (Sweden)

    H. Rishbeth

    Full Text Available The companion paper by Zou et al. shows that the annual and semiannual variations in the peak F2-layer electron density (NmF2 at midlatitudes can be reproduced by a coupled thermosphere-ionosphere computational model (CTIP, without recourse to external influences such as the solar wind, or waves and tides originating in the lower atmosphere. The present work discusses the physics in greater detail. It shows that noon NmF2 is closely related to the ambient atomic/molecular concentration ratio, and suggests that the variations of NmF2 with geographic and magnetic longitude are largely due to the geometry of the auroral ovals. It also concludes that electric fields play no important part in the dynamics of the midlatitude thermosphere. Our modelling leads to the following picture of the global three-dimensional thermospheric circulation which, as envisaged by Duncan, is the key to explaining the F2-layer variations. At solstice, the almost continuous solar input at high summer latitudes drives a prevailing summer-to-winter wind, with upwelling at low latitudes and throughout most of the summer hemisphere, and a zone of downwelling in the winter hemisphere, just equatorward of the auroral oval. These motions affect thermospheric composition more than do the alternating day/night (up-and-down motions at equinox. As a result, the thermosphere as a whole is more molecular at solstice than at equinox. Taken in conjunction with the well-known relation of F2-layer electron density to the atomic/molecular ratio in the neutral air, this explains the F2-layer semiannual effect in NmF2 that prevails at low and middle latitudes. At higher midlatitudes, the seasonal behaviour depends on the geographic latitude of the winter downwelling zone, though the effect of the composition changes is modified by the large solar zenith angle at midwinter. The zenith angle effect is especially important in longitudes far from the magnetic

  11. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    Simeone O

    2007-01-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  12. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    O. Simeone

    2007-03-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  13. Wireless optical network for a home network

    Science.gov (United States)

    Bouchet, Olivier; Porcon, Pascal; Walewski, Joachim W.; Nerreter, Stefan; Langer, Klaus-Dieter; Fernández, Luz; Vucic, Jelena; Kamalakis, Thomas; Ntogari, Georgia; Neokosmidis, Ioannis; Gueutier, Eric

    2010-08-01

    During the European collaborative project OMEGA, two optical-wireless prototypes have been developed. The first prototype operates in the near-infrared spectral region and features Giga Ethernet connectivity, a simple transceiver architecture due to the use of on-off keying, a multi-sector transceiver, and an ultra-fast switch for sector-to-sector hand over. This full-duplex system, composed by one base station and one module, transmits data on three meters. The second prototype is a visible-light-communications system based on DMT signal processing and an adapted MAC sublayer. Data rates around to 100 Mb/s at the physical layer are achieved. This broadcast system, composed also by one base station and one module, transmits data up to two meters. In this paper we present the adapted optical wireless media-access-control sublayer protocol for visible-light communications. This protocol accommodates link adaptation from 128 Mb/s to 1024 Mb/s with multi-sector coverage, and half-duplex or full-duplex transmission.

  14. Wireless Industrial Monitoring and Control Networks: The Journey So Far and the Road Ahead

    Directory of Open Access Journals (Sweden)

    Paul Havinga

    2012-08-01

    Full Text Available While traditional wired communication technologies have played a crucial role in industrial monitoring and control networks over the past few decades, they are increasingly proving to be inadequate to meet the highly dynamic and stringent demands of today’s industrial applications, primarily due to the very rigid nature of wired infrastructures. Wireless technology, however, through its increased pervasiveness, has the potential to revolutionize the industry, not only by mitigating the problems faced by wired solutions, but also by introducing a completely new class of applications. While present day wireless technologies made some preliminary inroads in the monitoring domain, they still have severe limitations especially when real-time, reliable distributed control operations are concerned. This article provides the reader with an overview of existing wireless technologies commonly used in the monitoring and control industry. It highlights the pros and cons of each technology and assesses the degree to which each technology is able to meet the stringent demands of industrial monitoring and control networks. Additionally, it summarizes mechanisms proposed by academia, especially serving critical applications by addressing the real-time and reliability requirements of industrial process automation. The article also describes certain key research problems from the physical layer communication for sensor networks and the wireless networking perspective that have yet to be addressed to allow the successful use of wireless technologies in industrial monitoring and control networks.

  15. The impact of an online social network with wireless monitoring devices on physical activity and weight loss.

    Science.gov (United States)

    Greene, Jessica; Sacks, Rebecca; Piniewski, Brigitte; Kil, David; Hahn, Jin S

    2013-07-01

    Online social networks (OSNs) are a new, promising approach for catalyzing health-related behavior change. To date, the empirical evidence on their impact has been limited. Using a randomized trial, we assessed the impact of a health-oriented OSN with accelerometer and scales on participant's physical activity, weight, and clinical indicators. A sample of 349 PeaceHealth Oregon employees and family members were randomized to the iWell OSN or a control group and followed for 6 months in 2010-2011. The iWell OSN enabled participants to connect with "friends," make public postings, view contacts' postings, set goals, download the number of their steps from an accelerometer and their weight from a scale, view trends in physical activity and weight, and compete against others in physical activity. Both control and intervention participants received traditional education material on diet and physical activity. Laboratory data on weight and clinical indicators (triglycerides, high-density lipoprotein, or low-density lipoprotein), and self-reported data on physical activity, were collected at baseline, 3 months, and 6 months. At 6 months, the intervention group increased leisure walking minutes by 164% compared with 47% in the control group. The intervention group also lost more weight than the controls (5.2 pounds compared with 1.5 pounds). There were no observed significant differences in vigorous exercise or clinical indicators between the 2 groups. Among intervention participants, greater OSN use, as measured by number of private messages sent, was associated with a greater increase in leisure walking and greater weight reduction over the study period. The study provides evidence that interventions using OSNs can successfully promote increases in physical activity and weight loss.

  16. Acemind new indoor full duplex optical wireless communication prototype

    Science.gov (United States)

    Bouchet, Olivier; Perrufel, Micheline; Topsu, Suat; Guan, Hongyu

    2016-09-01

    For over a century and Mr. Guglielmo Marconi invention, systems using radio waves have controlled over wireless telecommunication solutions; from Amplitude Modulation (AM) radio products to satellite communications for instance. But beyond an increasingly negative opinion face to radio waves and radio spectrum availability more and more reduced; there is an unprecedented opportunity with LED installation in displays and lighting to provide optical wireless communication solutions. As a result, technologically mature solutions are already commercially available for services such as Location Based Services (LBS), broadcast diffusion or Intelligent Transport Services (ITS). Pending finalization of the standard review process IEEE 802.15.7 r1, our paper presents the results of the European collaborative project named "ACEMIND". It offers an indoor bilateral optical wireless communication prototype having the following characteristics: use of the existing electrical infrastructure, through judicious combination with Light Fidelity (LiFi), Power Line Communication (PLC) and Ethernet to reduce the implementation cost. We propose a bilateral optical wireless communication even when the light is switched off by using Visible Light Communication (VLC) and Infra-Red Communication (IRC) combined to a remote optical switch. Dimensionally optimized LiFi module is presented in order to offer the possibility for integration inside a laptop. Finally, there is operational mechanism implementation such as OFDM/DMT to increase throughput. After the introduction, we will present the results of a market study from Orange Labs customers about their opinion on LiFi components. Then we will detail the LiFi prototype, from the physical layer aspect to MAC layer before concluding on commercial development prospects.

  17. Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links

    Science.gov (United States)

    Jiao, Haisong; Pu, Tao; Xiang, Peng; Zheng, Jilin; Fang, Tao; Zhu, Huatao

    2017-08-01

    The quantitative security of quantum-noise randomized cipher (QNRC) in optically amplified links is analyzed from the perspective of physical-layer advantage. Establishing the wire-tap channel models for both key and data, we derive the general expressions of secrecy capacities for the key against ciphertext-only attack and known-plaintext attack, and that for the data, which serve as the basic performance metrics. Further, the maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. Based on the same framework, the secrecy capacities of various cases can be assessed and compared. The results indicate perfect secrecy is potentially achievable for data transmission, and an elementary principle of setting proper number of photons and bases is given to ensure the maximal data secrecy capacity. But the key security is asymptotically perfect, which tends to be the main constraint of systemic maximal secrecy rate. Moreover, by adopting cascaded optical amplification, QNRC can realize long-haul transmission with secure rate up to Gb/s, which is orders of magnitude higher than the perfect secrecy rates of other encryption systems.

  18. Defect physics vis-à-vis electrochemical performance in layered mixed-metal oxide cathode materials

    Science.gov (United States)

    Hoang, Khang; Johannes, Michelle

    Layered mixed-metal oxides with different compositions of (Ni,Co,Mn) [NCM] or (Ni,Co,Al) [NCA] have been used in commercial lithium-ion batteries. Yet their defect physics and chemistry is still not well understood, despite having important implications for the electrochemical performance. In this presentation, we report a hybrid density functional study of intrinsic point defects in the compositions LiNi1/3Co1/3Mn1/3O2 (NCM1/3) and LiNi1/3Co1/3Al1/3O2 (NCA1/3) which can also be regarded as model compounds for NCM and NCA. We will discuss defect landscapes in NCM1/3 and NCA1/3 under relevant synthesis conditions with a focus on the formation of metal antisite defects and its implications on the electrochemical properties and ultimately the design of NCM and NCA cathode materials.

  19. Understanding the Flow Physics of Shock Boundary-Layer Interactions Using CFD and Numerical Analyses

    Science.gov (United States)

    Friedlander, David J.

    2013-01-01

    Computational fluid dynamic (CFD) analyses of the University of Michigan (UM) Shock/Boundary-Layer Interaction (SBLI) experiments were performed as an extension of the CFD SBLI Workshop held at the 48th AIAA Aerospace Sciences Meeting in 2010. In particular, the UM Mach 2.75 Glass Tunnel with a semi-spanning 7.75deg wedge was analyzed in attempts to explore key physics pertinent to SBLI's, including thermodynamic and viscous boundary conditions as well as turbulence modeling. Most of the analyses were 3D CFD simulations using the OVERFLOW flow solver, with additional quasi-1D simulations performed with an in house MATLAB code interfacing with the NIST REFPROP code to explore perfect verses non-ideal air. A fundamental exploration pertaining to the effects of particle image velocimetry (PIV) on post-processing data is also shown. Results from the CFD simulations showed an improvement in agreement with experimental data with key contributions including adding a laminar zone upstream of the wedge and the necessity of mimicking PIV particle lag for comparisons. Results from the quasi-1D simulation showed that there was little difference between perfect and non-ideal air for the configuration presented.

  20. Development of analytical theory of the physical libration for a two-layer Moon

    Science.gov (United States)

    Petrova, Natalia; Barkin, Yurii; Gusev, Alexander; Ivanova, Tamara

    2010-05-01

    Investigation is being carried out in the frame of Russian-Japanese grant and directed onto providing of the future observations in the frame of the ILOM-project which is planned onto the end of the second decade. The analytical theory presents both scientific interest in its own right and can be useful as a base for the lunar annual in a future, as a clue to lunar interiors and to processes inside the lunar body. A comparison of the libration's analytical theory with new observations will allow to refine the parameters of lunar interiors: an existence or absence of a core, its size, composition and state of aggregation, Love numbers, qualitative parameter Q, etc. Contrary to the usual application of numerical libration models for analyses of observations, the analytical model is able to predict the new harmonics, early unknown and not observed (owing to the insufficient accuracy of observations) in libration's series of observations. As part of the investigation the following results were achieved. Development of the analytical theory of the Lunar Physical Libration (LPhL) were performed using the Poisson Series Processor (PSP). The base solution is realized for the 'main problem' of the LPhL in view of 4-th harmonic of selenopotential. Data on a dynamical figure of the Moon are incorporated in the theory on the basis of new observations of the Lunar gravitational field, received in a frame of space projects Clementine (1994, NASA), Lunar Prospector (1999, NASA) and the SELENE (2007 - 2009, Japan). On the basis of the constructed theory the following actions were done: 1) analyses of the present dynamical models; 2) modeling of stars trajectories in the field of view of the future optical telescope, which is planned to be placed on one of the Lunar poles in the second stage of the Japanese project SELENE-B - ILOM. Results of modeling have shown opportunities of determination of LPhL-parameters with the desirable accuracy 0.001 arc seconds planned in the ILOM

  1. The effects of mechanised equipment on physical load among road workers and floor layers in the construction industry

    NARCIS (Netherlands)

    Burdorf, A.; Windhorst, J.; Beek, A.J. van der; Molen, H. van der; Swuste, P.H.J.J.

    2007-01-01

    This study describes the impact of the use of mechanised equipment on physical load and workers' health among road workers and floor layers by comparing the traditional manual work method with frequently occurring scenarios of use of this new equipment. Continuous direct measurements of postures

  2. Design and implementation of a software defined HiperLAN/2 physical layer model for simulation purposes

    NARCIS (Netherlands)

    van Hoesel, L.F.W.

    2002-01-01

    In this Master of Science thesis a simulation model of the HiperLAN/2 physical layer is designed and implemented. The model should provide insight in the demodulation functions that are necessary in HiperLAN/2 and it should be useful for determining channel selection and computational requirements

  3. Physical Layer Multi-Core Prototyping A Dataflow-Based Approach for LTE eNodeB

    CERN Document Server

    Pelcat, Maxime; Piat, Jonathan; Nezan, Jean-François

    2013-01-01

    Base stations developed according to the 3GPP Long Term Evolution (LTE) standard require unprecedented processing power. 3GPP LTE enables data rates beyond hundreds of Mbits/s by using advanced technologies, necessitating a highly complex LTE physical layer. The operating power of base stations is a significant cost for operators, and is currently optimized using state-of-the-art hardware solutions, such as heterogeneous distributed systems. The traditional system design method of porting algorithms to heterogeneous distributed systems based on test-and-refine methods is a manual, thus time-expensive, task.   Physical Layer Multi-Core Prototyping: A Dataflow-Based Approach for LTE eNodeB provides a clear introduction to the 3GPP LTE physical layer and to dataflow-based prototyping and programming. The difficulties in the process of 3GPP LTE physical layer porting are outlined, with particular focus on automatic partitioning and scheduling, load balancing and computation latency reduction, specifically in sys...

  4. Performance Assessment of New Land-Surface and Planetary Boundary Layer Physics in the WRF-ARW

    Science.gov (United States)

    The Pleim-Xiu land surface model, Pleim surface layer scheme, and Asymmetric Convective Model (version 2) are now options in version 3.0 of the Weather Research and Forecasting model (WRF) Advanced Research WRF (ARW) core. These physics parameterizations were developed for the f...

  5. Body area networks using IEEE 802156 implementing the ultra wide band physical layer

    CERN Document Server

    Hernandez, Marco; Mucchi, Lorenzo

    2014-01-01

    The market of wearable wireless medical sensors is experiencing a rapid growth and the associated telecommunications services for the healthcare sector are forecast to further increase in the next years. Medical body area networks (MBANs) allow the mobility of patients and medical personnel by facilitating the remote monitoring of patients suffering from chronic or risky diseases. Currently, MBANs are being introduced in unlicensed frequency bands, where the risk of mutual interference with other electronic devices radiating in the same band can be high. Thus, coexistence is an issue on which

  6. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  7. Wireless passive radiation sensor

    Science.gov (United States)

    Pfeifer, Kent B; Rumpf, Arthur N; Yelton, William G; Limmer, Steven J

    2013-12-03

    A novel measurement technique is employed using surface acoustic wave (SAW) devices, passive RF, and radiation-sensitive films to provide a wireless passive radiation sensor that requires no batteries, outside wiring, or regular maintenance. The sensor is small (<1 cm.sup.2), physically robust, and will operate unattended for decades. In addition, the sensor can be insensitive to measurement position and read distance due to a novel self-referencing technique eliminating the need to measure absolute responses that are dependent on RF transmitter location and power.

  8. Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring

    Directory of Open Access Journals (Sweden)

    Salman Ali

    2015-03-01

    Full Text Available The synergy of computational and physical network components leading to the Internet of Things, Data and Services has been made feasible by the use of Cyber Physical Systems (CPSs. CPS engineering promises to impact system condition monitoring for a diverse range of fields from healthcare, manufacturing, and transportation to aerospace and warfare. CPS for environment monitoring applications completely transforms human-to-human, human-to-machine and machine-to-machine interactions with the use of Internet Cloud. A recent trend is to gain assistance from mergers between virtual networking and physical actuation to reliably perform all conventional and complex sensing and communication tasks. Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to leverage environment, strategic and economic benefits. In this paper, we evaluate the applications and technical requirements for seamlessly integrating CPS with sensor network plane from a reliability perspective and review the strategies for communicating information between remote monitoring sites and the widely deployed sensor nodes. Related challenges and issues in network architecture design and relevant protocols are also provided with classification. This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. Network parameters like node-discovery, node-mobility, data security, link connectivity, data aggregation, information knowledge discovery and quality of service provisioning have been reviewed.

  9. Network challenges for cyber physical systems with tiny wireless devices: a case study on reliable pipeline condition monitoring.

    Science.gov (United States)

    Ali, Salman; Qaisar, Saad Bin; Saeed, Husnain; Khan, Muhammad Farhan; Naeem, Muhammad; Anpalagan, Alagan

    2015-03-25

    The synergy of computational and physical network components leading to the Internet of Things, Data and Services has been made feasible by the use of Cyber Physical Systems (CPSs). CPS engineering promises to impact system condition monitoring for a diverse range of fields from healthcare, manufacturing, and transportation to aerospace and warfare. CPS for environment monitoring applications completely transforms human-to-human, human-to-machine and machine-to-machine interactions with the use of Internet Cloud. A recent trend is to gain assistance from mergers between virtual networking and physical actuation to reliably perform all conventional and complex sensing and communication tasks. Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to leverage environment, strategic and economic benefits. In this paper, we evaluate the applications and technical requirements for seamlessly integrating CPS with sensor network plane from a reliability perspective and review the strategies for communicating information between remote monitoring sites and the widely deployed sensor nodes. Related challenges and issues in network architecture design and relevant protocols are also provided with classification. This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. Network parameters like node-discovery, node-mobility, data security, link connectivity, data aggregation, information knowledge discovery and quality of service provisioning have been reviewed.

  10. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  11. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2009-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4’s physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  12. MOS-Based Multiuser Multiapplication Cross-Layer Optimization for Mobile Multimedia Communication

    Directory of Open Access Journals (Sweden)

    Shoaib Khan

    2007-01-01

    Full Text Available We propose a cross-layer optimization strategy that jointly optimizes the application layer, the data-link layer, and the physical layer of a wireless protocol stack using an application-oriented objective function. The cross-layer optimization framework provides efficient allocation of wireless network resources across multiple types of applications run by different users to maximize network resource usage and user perceived quality of service. We define a novel optimization scheme based on the mean opinion score (MOS as the unifying metric over different application classes. Our experiments, applied to scenarios where users simultaneously run three types of applications, namely voice communication, streaming video and file download, confirm that MOS-based optimization leads to significant improvement in terms of user perceived quality when compared to conventional throughput-based optimization.

  13. Exploring the physical layer frontiers of cellular uplink: The Vienna LTE-A Uplink Simulator.

    Science.gov (United States)

    Zöchmann, Erich; Schwarz, Stefan; Pratschner, Stefan; Nagel, Lukas; Lerch, Martin; Rupp, Markus

    Communication systems in practice are subject to many technical/technological constraints and restrictions. Multiple input, multiple output (MIMO) processing in current wireless communications, as an example, mostly employs codebook-based pre-coding to save computational complexity at the transmitters and receivers. In such cases, closed form expressions for capacity or bit-error probability are often unattainable; effects of realistic signal processing algorithms on the performance of practical communication systems rather have to be studied in simulation environments. The Vienna LTE-A Uplink Simulator is a 3GPP LTE-A standard compliant MATLAB-based link level simulator that is publicly available under an academic use license, facilitating reproducible evaluations of signal processing algorithms and transceiver designs in wireless communications. This paper reviews research results that have been obtained by means of the Vienna LTE-A Uplink Simulator, highlights the effects of single-carrier frequency-division multiplexing (as the distinguishing feature to LTE-A downlink), extends known link adaptation concepts to uplink transmission, shows the implications of the uplink pilot pattern for gathering channel state information at the receiver and completes with possible future research directions.

  14. Layer dividing and zone dividing of physical property of crust and deep structure in Jiangxi province

    International Nuclear Information System (INIS)

    Li Chunhua; Yang Yaxin; Gong Yuling; Huang Linping

    2001-01-01

    On the base of summing experiences both at home and abroad, the Bugar gravitative anomalies are studied by major means of data processing. According to the anomalous character, three layer crust models (surface layer, middle layer in region and material layer under crust) are built up, depth of upper and bottom surfaces for every layer is calculated quantitatively, their varied characters of depth are studied and deep geological tectonics are outlined. The 'density' and 'mass' of every layer are calculated, and according to these two parameters, the shallow geological tectonics are researched. The relation-factor R between the surface altitude and Bugar gravitative anomalies are calculated and the stable or unstable crust zones are divided. The favorable mine zones for uranium deposit in Jiangxi Province are outlined

  15. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  16. Analysis of wireless sensor network topology and estimation of optimal network deployment by deterministic radio channel characterization.

    Science.gov (United States)

    Aguirre, Erik; Lopez-Iturri, Peio; Azpilicueta, Leire; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco

    2015-02-05

    One of the main challenges in the implementation and design of context-aware scenarios is the adequate deployment strategy for Wireless Sensor Networks (WSNs), mainly due to the strong dependence of the radiofrequency physical layer with the surrounding media, which can lead to non-optimal network designs. In this work, radioplanning analysis for WSN deployment is proposed by employing a deterministic 3D ray launching technique in order to provide insight into complex wireless channel behavior in context-aware indoor scenarios. The proposed radioplanning procedure is validated with a testbed implemented with a Mobile Ad Hoc Network WSN following a chain configuration, enabling the analysis and assessment of a rich variety of parameters, such as received signal level, signal quality and estimation of power consumption. The adoption of deterministic radio channel techniques allows the design and further deployment of WSNs in heterogeneous wireless scenarios with optimized behavior in terms of coverage, capacity, quality of service and energy consumption.

  17. Resistance of Terrestrial Microbial Communities to Impack of Physical Conditinos of Subsurface Layers of Martian Regolith

    Science.gov (United States)

    Cheptsov, V. S.; Vorobyova, E. A.

    2017-05-01

    Currently, astrobiology is focused on Mars as one of the most perspective objects in the Solar System to search for microbial life. It was assumed that the putative biosphere of Mars could be cryopreserved and had been stored for billions of years in anabiotic state like microbial communities of Arctic and Antarctic permafrost deposits have been preserved till now for millions of years. In this case microbial cells should be not able to repair the damages or these processes have to be significantly depressed, and the main factor causing cell's death should be ionizing radiation. In a series of experiments we simulated the effects of combination of physical factors known as characteristics of the Martian regolith (and close to the space environment) on the natural microbial communities inhabiting xerophytic harsh habitats with extreme temperature conditions: polar permafrost and desert soils. The aim of the study was to examine the cumulative effect of factors (gamma radiation, low temperature, low pressure) to assess the possibility of metabolic reactions, and to find limits of the viability of natural microbial communities after exposure to the given conditions. It was found that microbial biomarkers could be reliably detected in soil samples after radiation dose accumulation up to 1 MGy (not further investigated) in combination with exposure to low temperature and low pressure. Resistance to extremely high doses of radiation in simulated conditions proves that if there was an Earth-like biosphere on the early Mars microorganisms could survive in the surface or subsurface layers of the Martian regolith for more than tens of millions of years after climate change. The study gives also some new grounds for the approval of transfer of viable microorganisms in space.

  18. Collaborative Algortihms for Communication in Wireless Sensor Networks

    NARCIS (Netherlands)

    Nieberg, T.; Dulman, S.O.; Havinga, Paul J.M.; van Hoesel, L.F.W.; Wu Jian, W.J.

    In this paper, we present the design of the communication in a wireless sensor network. The resource limitations of a wireless sensor network, especially in terms of energy, require an integrated, and collaborative approach for the different layers of communication. In particular, energy-efficient

  19. Collaborative Algorithms for Communication in Wireless Sensor Networks

    NARCIS (Netherlands)

    Nieberg, T.; Dulman, S.O.; Havinga, Paul J.M.; van Hoesel, L.F.W.; Wu Jian, W.J.; Basten, Twan; Geilen, Marc; de Groot, Harmke

    2003-01-01

    In this paper, we present the design of the communication in a wireless sensor network. The resource limitations of a wireless sensor network, especially in terms of energy, require an integrated, and collaborative approach for the different layers of communication. In particular, energy-efficient

  20. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  1. The electric double layer put to work : thermal physics at electrochemical interfaces

    NARCIS (Netherlands)

    Janssen, M.A.

    2017-01-01

    Where charged electrode surfaces meet fluids that contain mobile ions, so-called electric double layers (EDLs) form to screen the electric surface charge by a diffuse cloud of counterionic charge in the fluid phase. This double layer has been studied for over a century and is of paramount importance

  2. The layering and physical characteristics of Shaver Brown Hens in a ...

    African Journals Online (AJOL)

    Eggs were collected from 120 Shaver Brown hens for a period of 56 days in order to determine their oviposition time, sequence of laying, lag time, laying intensity and egg weight. The hens were subsequently divided into three classes on the basis of their laying performance namely: good layers, intermediate layers and ...

  3. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  4. Location-Aware Cross-Layer Design Using Overlay Watermarks

    Directory of Open Access Journals (Sweden)

    Paul Ho

    2007-04-01

    Full Text Available A new orthogonal frequency division multiplexing (OFDM system embedded with overlay watermarks for location-aware cross-layer design is proposed in this paper. One major advantage of the proposed system is the multiple functionalities the overlay watermark provides, which includes a cross-layer signaling interface, a transceiver identification for position-aware routing, as well as its basic role as a training sequence for channel estimation. Wireless terminals are typically battery powered and have limited wireless communication bandwidth. Therefore, efficient collaborative signal processing algorithms that consume less energy for computation and less bandwidth for communication are needed. Transceiver aware of its location can also improve the routing efficiency by selective flooding or selective forwarding data only in the desired direction, since in most cases the location of a wireless host is unknown. In the proposed OFDM system, location information of a mobile for efficient routing can be easily derived when a unique watermark is associated with each individual transceiver. In addition, cross-layer signaling and other interlayer interactive information can be exchanged with a new data pipe created by modulating the overlay watermarks. We also study the channel estimation and watermark removal techniques at the physical layer for the proposed overlay OFDM. Our channel estimator iteratively estimates the channel impulse response and the combined signal vector from the overlay OFDM signal. Cross-layer design that leads to low-power consumption and more efficient routing is investigated.

  5. Physical and optical characterisation of carbon-silicon layers produced by rapid thermal chemical vapour deposition

    International Nuclear Information System (INIS)

    McBride, G.M.

    1994-04-01

    The Quplas II reactor is a novel chemical vapour deposition (CVD) system, which was recently designed and built at The Queen's University of Belfast. The system was intended to produce layers of Silicon (Si) for application in advanced bipolar transistor manufacture. It became clear that the system was capable of depositing novel materials such as Silicon-Carbon (Si-C) films which could have application as the emitter material in heterojunction bipolar transistors (HBT's) formed on silicon substrates. This work focuses mainly on the development of analytical techniques to allow characterisation of the deposited layers of Si-C and permit optimisation of both the process conditions and the deposition system. The techniques that were developed to characterise the Si-C films in terms of their physical and optical properties included: Secondary Ion Mass Spectroscopy (SIMS), X-Ray Diffractometry (XRD), Transmission and Scanning Electron Microscopy (TEM and SEM), Near Infrared (NIR) and Ultraviolet/Visible/Near Infrared (UV/VIS/NIR) Spectroscopy. From assessing the data obtained from the analysis of the samples using the techniques mentioned above, it was possible to characterise the Si-C films in terms of: stoichiometry, crystallinity, degree of oxygen contamination, thickness, optical roughness of the film/air and film/substrate interfaces, and energy bandgap. In the fabrication of Si-C films it was found to be necessary to use low process pressures in order to ensure that the film deposition was slow enough to allow for a more ordered growth process. This led to the formation of polycrystalline Si-C films which had greatly reduced levels of oxygen compared to earlier amorphous films. In addition the polycrystalline Si-C films tended to have optically rough film/air and film/substrate interfaces. For most samples it was possible to obtain the thickness of their Si-C films from their SIMS profiles. Based on the method of interferometry, the thickness of the Si-C films

  6. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  7. Advanced Signal Processing for Wireless Multimedia Communications

    Directory of Open Access Journals (Sweden)

    Xiaodong Wang

    2000-01-01

    Full Text Available There is at present a worldwide effort to develop next-generation wireless communication systems. It is envisioned that many of the future wireless systems will incorporate considerable signal-processing intelligence in order to provide advanced services such as multimedia transmission. In general, wireless channels can be very hostile media through which to communicate, due to substantial physical impediments, primarily radio-frequency interference and time-arying nature of the channel. The need of providing universal wireless access at high data-rate (which is the aim of many merging wireless applications presents a major technical challenge, and meeting this challenge necessitates the development of advanced signal processing techniques for multiple-access communications in non-stationary interference-rich environments. In this paper, we present some key advanced signal processing methodologies that have been developed in recent years for interference suppression in wireless networks. We will focus primarily on the problem of jointly suppressing multiple-access interference (MAI and intersymbol interference (ISI, which are the limiting sources of interference for the high data-rate wireless systems being proposed for many emerging application areas, such as wireless multimedia. We first present a signal subspace approach to blind joint suppression of MAI and ISI. We then discuss a powerful iterative technique for joint interference suppression and decoding, so-called Turbo multiuser detection, that is especially useful for wireless multimedia packet communications. We also discuss space-time processing methods that employ multiple antennas for interference rejection and signal enhancement. Finally, we touch briefly on the problems of suppressing narrowband interference and impulsive ambient noise, two other sources of radio-frequency interference present in wireless multimedia networks.

  8. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  9. Clock- and data-recovery IC with demultiplexer for a 2.5 Gb/s ATM physical layer controller

    DEFF Research Database (Denmark)

    Hansen, Flemming; Salama, C.A.T.

    1996-01-01

    A Clock- and Data-Recovery (CDR) IC for a Physical Layer Controller in an Asynchronous Transfer Mode (ATM) system operating at a bit rate of 2.488 Gb/s is presented. The circuit was designed and fabricated in a 0.8 μm BiCMOS process featuring 13 GHz fT bipolar transistors. Clock-recovery is accom......A Clock- and Data-Recovery (CDR) IC for a Physical Layer Controller in an Asynchronous Transfer Mode (ATM) system operating at a bit rate of 2.488 Gb/s is presented. The circuit was designed and fabricated in a 0.8 μm BiCMOS process featuring 13 GHz fT bipolar transistors. Clock...

  10. ZERO: Probabilistic Routing for Deploy and Forget Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jose Carlos Pacho

    2010-09-01

    Full Text Available As Wireless Sensor Networks are being adopted by industry and agriculture for large-scale and unattended deployments, the need for reliable and energy-conservative protocols become critical. Physical and Link layer efforts for energy conservation are not mostly considered by routing protocols that put their efforts on maintaining reliability and throughput. Gradient-based routing protocols route data through most reliable links aiming to ensure 99% packet delivery. However, they suffer from the so-called ”hot spot” problem. Most reliable routes waste their energy fast, thus partitioning the network and reducing the area monitored. To cope with this ”hot spot” problem we propose ZERO a combined approach at Network and Link layers to increase network lifespan while conserving reliability levels by means of probabilistic load balancing techniques.

  11. Experimental studies and physically substantiated model of carbon dioxide emission from the exposed cultural layer of Velikii Novgorod

    Science.gov (United States)

    Smagin, A. V.; Dolgikh, A. V.; Karelin, D. V.

    2016-04-01

    The results of quantitative assessment and modeling of carbon dioxide emission from urban pedolithosediments (cultural layer) in the central part of Velikii Novgorod are discussed. At the first stages after the exposure of the cultural layer to the surface in archaeological excavations, very high CO2 emission values reaching 10-15 g C/(m2 h) have been determined. These values exceed the normal equilibrium emission from the soil surface by two orders of magnitude. However, they should not be interpreted as indications of the high biological activity of the buried urban sediments. A model based on physical processes shows that the measured emission values can be reliably explained by degassing of the soil water and desorption of gases from the urban sediments. This model suggests the diffusion mechanism of the transfer of carbon dioxide from the cultural layer into the atmosphere; in addition, it includes the equations to describe nonequilibrium interphase interactions (sorption-desorption and dissolution-degassing of CO2) with the first-order kinetics. With the use of statistically reliable data on physical parameters—the effective diffusion coefficient as dependent on the aeration porosity, the effective solubility, the Henry constant for the CO2 sorption, and the kinetic constants of the CO2 desorption and degassing of the soil solution—this model reproduces the experimental data on the dynamics of CO2 emission from the surface of the exposed cultural layer obtained by the static chamber method.

  12. Electrical and physical characteristics for crystalline atomic layer deposited beryllium oxide thin film on Si and GaAs substrates

    International Nuclear Information System (INIS)

    Yum, J.H.; Akyol, T.; Lei, M.; Ferrer, D.A.; Hudnall, Todd W.; Downer, M.; Bielawski, C.W.; Bersuker, G.; Lee, J.C.; Banerjee, S.K.

    2012-01-01

    In a previous study, atomic layer deposited (ALD) BeO exhibited less interface defect density and hysteresis, as well as less frequency dispersion and leakage current density, at the same equivalent oxide thickness than Al 2 O 3 . Furthermore, its self-cleaning effect was better. In this study, the physical and electrical characteristics of ALD BeO grown on Si and GaAs substrates are further evaluated as a gate dielectric layer in III–V metal-oxide-semiconductor devices using transmission electron microscopy, selective area electron diffraction, second harmonic generation, and electrical analysis. An as-grown ALD BeO thin film was revealed as a layered single crystal structure, unlike the well-known ALD dielectrics that exhibit either poly-crystalline or amorphous structures. Low defect density in highly ordered ALD BeO film, less variability in electrical characteristics, and great stability under electrical stress were demonstrated. - Highlights: ► BeO is an excellent electrical insulator, but good thermal conductor. ► Highly crystalline film of BeO has been grown using atomic layer deposition. ► An ALD BeO precursor, which is not commercially available, has been synthesized. ► Physical and electrical characteristics have been investigated.

  13. User Needs and Advances in Space Wireless Sensing and Communications

    Science.gov (United States)

    Kegege, Obadiah

    2017-01-01

    Decades of space exploration and technology trends for future missions show the need for new approaches in space/planetary sensor networks, observatories, internetworking, and communications/data delivery to Earth. The User Needs to be discussed in this talk includes interviews with several scientists and reviews of mission concepts for the next generation of sensors, observatories, and planetary surface missions. These observatories, sensors are envisioned to operate in extreme environments, with advanced autonomy, whereby sometimes communication to Earth is intermittent and delayed. These sensor nodes require software defined networking capabilities in order to learn and adapt to the environment, collect science data, internetwork, and communicate. Also, some user cases require the level of intelligence to manage network functions (either as a host), mobility, security, and interface data to the physical radio/optical layer. For instance, on a planetary surface, autonomous sensor nodes would create their own ad-hoc network, with some nodes handling communication capabilities between the wireless sensor networks and orbiting relay satellites. A section of this talk will cover the advances in space communication and internetworking to support future space missions. NASA's Space Communications and Navigation (SCaN) program continues to evolve with the development of optical communication, a new vision of the integrated network architecture with more capabilities, and the adoption of CCSDS space internetworking protocols. Advances in wireless communications hardware and electronics have enabled software defined networking (DVB-S2, VCM, ACM, DTN, Ad hoc, etc.) protocols for improved wireless communication and network management. Developing technologies to fulfil these user needs for wireless communications and adoption of standardized communication/internetworking protocols will be a huge benefit to future planetary missions, space observatories, and manned missions

  14. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  15. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  16. Wireless communication technology NFC

    OpenAIRE

    MÁROVÁ, Kateřina

    2014-01-01

    Aim of this bachelor thesis is to handle the issue of new wireless communication technology NFC (Near Field Communication) including a comparison of advantages and disadvantages of NFC with other wireless technologies (Bluetooth, Wi-Fi, etc.). NFC is a technology for wireless communications between different electronic devices, one of which is typically a mobile phone. Near Field Communication allows wireless communication at very short distance by approaching or enclosing two devices and can...

  17. Wireless steganography

    Science.gov (United States)

    Agaian, Sos S.; Akopian, David; D'Souza, Sunil

    2006-02-01

    Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on Symbian TM/Series60 TM architecture. Finally, two data hiding applications developed for Symbian TM/Series60 TM mobile phones are presented.

  18. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  19. Physical mechanisms of SiNx layer structuring with ultrafast lasers by direct and confined laser ablation

    International Nuclear Information System (INIS)

    Rapp, S.; Heinrich, G.; Wollgarten, M.; Huber, H. P.; Schmidt, M.

    2015-01-01

    In the production process of silicon microelectronic devices and high efficiency silicon solar cells, local contact openings in thin dielectric layers are required. Instead of photolithography, these openings can be selectively structured with ultra-short laser pulses by confined laser ablation in a fast and efficient lift off production step. Thereby, the ultrafast laser pulse is transmitted by the dielectric layer and absorbed at the substrate surface leading to a selective layer removal in the nanosecond time domain. Thermal damage in the substrate due to absorption is an unwanted side effect. The aim of this work is to obtain a deeper understanding of the physical laser-material interaction with the goal of finding a damage-free ablation mechanism. For this, thin silicon nitride (SiN x ) layers on planar silicon (Si) wafers are processed with infrared fs-laser pulses. Two ablation types can be distinguished: The known confined ablation at fluences below 300 mJ/cm 2 and a combined partial confined and partial direct ablation at higher fluences. The partial direct ablation process is caused by nonlinear absorption in the SiN x layer in the center of the applied Gaussian shaped laser pulses. Pump-probe investigations of the central area show ultra-fast reflectivity changes typical for direct laser ablation. Transmission electron microscopy results demonstrate that the Si surface under the remaining SiN x island is not damaged by the laser ablation process. At optimized process parameters, the method of direct laser ablation could be a good candidate for damage-free selective structuring of dielectric layers on absorbing substrates

  20. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  1. The Wireless ATM Architecture

    Directory of Open Access Journals (Sweden)

    R. Palitefka

    1998-06-01

    Full Text Available An overview of the proposed wireless ATM structure is provided. Wireless communication have been developed to a level where offered services can now be extended beyond voice and data. There are already wireless LANs, cordless systems offering data services and mobile data. Wireless LAN systems are basically planned for local, on-promises and in-house networking providing short distance radio or infrared links between computer system. The main challenge of wireless ATM is to harmonise the development of broadband wireless system with service B -ISDN/ATM and ATM LANs, and offer multimedia multiservice features for the support of time-sensitive voice communication, video, desktop multimedia applications, and LAN data traffic for the wireless user.

  2. Cross-platform wireless sensor network development

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Kusy, Branislav

    Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as well as traditional desktop computers. We propose Tinylnventor, an open...

  3. Collaborative communication protocols for wireless sensor networks

    NARCIS (Netherlands)

    Dulman, S.O.; van Hoesel, L.F.W.; Nieberg, T.; Havinga, Paul J.M.

    In this document, the design of communication within a wireless sensor network is discussed. The resource limitations of such a network, especially in terms of energy, require an integrated approach for all (traditional) layers of communication. We present such an integrated, collaborative approach

  4. Data aggregation in wireless sensor networks using the SOAP protocol

    International Nuclear Information System (INIS)

    Al-Yasiri, A; Sunley, A

    2007-01-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  5. Data aggregation in wireless sensor networks using the SOAP protocol

    Energy Technology Data Exchange (ETDEWEB)

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  6. Physics-based Inverse Problem to Deduce Marine Atmospheric Boundary Layer Parameters

    Science.gov (United States)

    2017-03-07

    knowledge and capabilities in the use and development of inverse problem techniques to deduce atmospheric parameters. WORK COMPLETED The research completed...please find the Final Technical Report with SF 298 for Dr. Erin E. Hackett’s ONR grant entitled Physics -based Inverse Problem to Deduce Marine...From- To) 07/03/2017 Final Technica l Dec 2012- Dec 2016 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Physics -based Inverse Problem to Deduce Marine

  7. Smart Multiple Access Topologi Employing Intelligent Physical Layer for addressing the Mobile Node

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi

    2014-01-01

    of the mobile users, the cell size of the mobile network will shrink. Eventually, there will be an upsurge of signaling messages interchanged between the device and the network due to an increase in handover related operations. Attempt should be made to reduce the interaction with the network and simplify...... the mobility and location management related processes. In this thesis we set out a technical architecture of a mobile network to abridge the intricate mobility and location management processes as well as the addressing principle to render more operational efficiency and cater to the needs of the data hungry......, for example, addressing of a node. If we have a method to actuate user identification for the purpose of mobility management by implementing lower layer processes, we can simplify or eliminate the layer 7 processes and hence reduce the intricacy and costs of mobile network elements and user equipment...

  8. QoS Modeling for End-to-End Performance Evaluation over Networks with Wireless Access

    Directory of Open Access Journals (Sweden)

    Gómez Gerardo

    2010-01-01

    Full Text Available This paper presents an end-to-end Quality of Service (QoS model for assessing the performance of data services over networks with wireless access. The proposed model deals with performance degradation across protocol layers using a bottom-up strategy, starting with the physical layer and moving on up to the application layer. This approach makes it possible to analytically assess performance at different layers, thereby facilitating a possible end-to-end optimization process. As a representative case, a scenario where a set of mobile terminals connected to a streaming server through an IP access node has been studied. UDP, TCP, and the new TCP-Friendly Rate Control (TFRC protocols were analyzed at the transport layer. The radio interface consisted of a variable-rate multiuser and multichannel subsystem, including retransmissions and adaptive modulation and coding. The proposed analytical QoS model was validated on a real-time emulator of an end-to-end network with wireless access and proved to be very useful for the purposes of service performance estimation and optimization.

  9. Spin-transfer phenomena in layered magnetic structures: Physical phenomena and materials aspects

    International Nuclear Information System (INIS)

    Gruenberg, P.; Buergler, D.E.; Dassow, H.; Rata, A.D.; Schneider, C.M.

    2007-01-01

    During the past 20 years, layered structures consisting of ferromagnetic layers and spacers of various material classes with a thickness of only a few nanometers have revealed a variety of exciting and potentially very useful phenomena not present in bulk material. Representing distinct manifestations of spin-transfer processes, these phenomena may be categorized into interlayer exchange coupling (IEC), giant magnetoresistance (GMR), tunneling magnetoresistance (TMR), and the more recently discovered spin-transfer torque effect leading to current-induced magnetization switching (CIMS) and current-driven magnetization dynamics. These phenomena clearly confer novel material properties on magnetic layered structures with respect to the (magneto-)transport and the magnetostatic as well as magnetodynamic behavior. Here, we will first concentrate on the less well understood aspects of IEC across insulating and semiconducting interlayers and relate the observations to TMR in the corresponding structures. In this context, we will also discuss more recent advances in TMR due to the use of electrodes made from Heusler alloys and the realization of coherent tunneling in epitaxial magnetic tunneling junctions. Finally, we will review our results on CIMS in epitaxial magnetic nanostructures showing that normal and inverse CIMS can occur simultaneously in a single nanopillar device. In all cases discussed, material issues play a major role in the detailed understanding of the spin-transfer effects, in particular in those systems that yield the largest effects and are thus of utmost interest for applications

  10. High throughput route selection in multi-rate wireless mesh networks

    Institute of Scientific and Technical Information of China (English)

    WEI Yi-fei; GUO Xiang-li; SONG Mei; SONG Jun-de

    2008-01-01

    Most existing Ad-hoc routing protocols use the shortest path algorithm with a hop count metric to select paths. It is appropriate in single-rate wireless networks, but has a tendency to select paths containing long-distance links that have low data rates and reduced reliability in multi-rate networks. This article introduces a high throughput routing algorithm utilizing the multi-rate capability and some mesh characteristics in wireless fidelity (WiFi) mesh networks. It uses the medium access control (MAC) transmission time as the routing metric, which is estimated by the information passed up from the physical layer. When the proposed algorithm is adopted, the Ad-hoc on-demand distance vector (AODV) routing can be improved as high throughput AODV (HT-AODV). Simulation results show that HT-AODV is capable of establishing a route that has high data-rate, short end-to-end delay and great network throughput.

  11. Wireless Information-Theoretic Security in an Outdoor Topology with Obstacles: Theoretical Analysis and Experimental Measurements

    Directory of Open Access Journals (Sweden)

    Dagiuklas Tasos

    2011-01-01

    Full Text Available This paper presents a Wireless Information-Theoretic Security (WITS scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks. An autonomic network of moving users was implemented via 802.11n nodes of an ad hoc network for an outdoor topology with obstacles. Obstructed-Line-of-Sight (OLOS and Non-Line-of-Sight (NLOS propagation scenarios were examined. Low-speed user movement was considered, so that Doppler spread could be discarded. A transmitter and a legitimate receiver exchanged information in the presence of a moving eavesdropper. Average Signal-to-Noise Ratio (SNR values were acquired for both the main and the wiretap channel, and the Probability of Nonzero Secrecy Capacity was calculated based on theoretical formula. Experimental results validate theoretical findings stressing the importance of user location and mobility schemes on the robustness of Wireless Information-Theoretic Security and call for further theoretical analysis.

  12. Wireless mesh networks.

    Science.gov (United States)

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

  13. The Impact of Microphysics and Planetary Boundary Layer Physics on Model Simulation of U.S. Deep South Summer Convection

    Science.gov (United States)

    McCaul, Eugene W., Jr.; Case, Jonathan L.; Zavodsky, Bradley T.; Srikishen, Jayanthi; Medlin, Jeffrey M.; Wood, Lance

    2014-01-01

    Inspection of output from various configurations of high-resolution, explicit convection forecast models such as the Weather Research and Forecasting (WRF) model indicates significant sensitivity to the choices of model physics pararneterizations employed. Some of the largest apparent sensitivities are related to the specifications of the cloud microphysics and planetary boundary layer physics packages. In addition, these sensitivities appear to be especially pronounced for the weakly-sheared, multicell modes of deep convection characteristic of the Deep South of the United States during the boreal summer. Possible ocean-land sensitivities also argue for further examination of the impacts of using unique ocean-land surface initialization datasets provided by the NASA Short-term Prediction Research and Transition (SPoRn Center to select NOAAlNWS weather forecast offices. To obtain better quantitative understanding of these sensitivities and also to determine the utility of the ocean-land initialization data, we have executed matrices of regional WRF forecasts for selected convective events near Mobile, AL (MOB), and Houston, TX (HGX). The matrices consist of identically initialized WRF 24-h forecasts using any of eight microphysics choices and any of three planetary boWldary layer choices. The resulting 24 simulations performed for each event within either the MOB or HGX regions are then compared to identify the sensitivities of various convective storm metrics to the physics choices. Particular emphasis is placed on sensitivities of precipitation timing, intensity, and coverage, as well as amount and coverage oflightuing activity diagnosed from storm kinematics and graupel in the mixed phase layer. The results confirm impressions gleaned from study of the behavior of variously configured WRF runs contained in the ensembles produced each spring at the Center for the Analysis and Prediction of Storms, but with the benefit of more straightforward control of the

  14. The effect of oxidation on physical properties of porous silicon layers for optical applications

    Energy Technology Data Exchange (ETDEWEB)

    Pirasteh, Parasteh [Laboratoire d' Optronique, CNRS-UMR FOTON 6082, Universite de Rennes 1, ENSSAT Tecnhopole Anticipa, 6 rue de Kerampont, BP 447, 22305 Lannion Cedex (France); Charrier, Joel [Laboratoire d' Optronique, CNRS-UMR FOTON 6082, Universite de Rennes 1, ENSSAT Tecnhopole Anticipa, 6 rue de Kerampont, BP 447, 22305 Lannion Cedex (France)]. E-mail: joel.charrier@univ-rennes1.fr; Soltani, Ali [Institut d' Electronique, de Microemectronique et de Nanotechnologie, CNRS-UMR 8520, Cite Scientifique Avenue Poincare, BP 69, 59652 Villeneuve d' Ascq Cedex (France); Haesaert, Severine [Laboratoire d' Optronique, CNRS-UMR FOTON 6082, Universite de Rennes 1, ENSSAT Tecnhopole Anticipa, 6 rue de Kerampont, BP 447, 22305 Lannion Cedex (France); Haji, Lazhar [Laboratoire d' Optronique, CNRS-UMR FOTON 6082, Universite de Rennes 1, ENSSAT Tecnhopole Anticipa, 6 rue de Kerampont, BP 447, 22305 Lannion Cedex (France); Godon, Christine [Laboratoire de Physique Crystalline, Institut des Materiaux Jean Rouxel, 44322 Nantes Cedex 3 (France); Errien, Nicolas [Laboratoire de Physique Crystalline, Institut des Materiaux Jean Rouxel, 44322 Nantes Cedex 3 (France)

    2006-12-15

    In order to understand the optical loss mechanisms in porous silicon based waveguides, structural and optical studies have been performed. Scanning and transmission electron microscopic observations of porous silicon layers are obtained before and after an oxidation process at high temperature in wet O{sub 2}. Pore size and shape of heavily p-type doped Si wafers are estimated and correlated to the optical properties of the material before and after oxidation. The refractive index was measured and compared to that determined by the Bruggeman model.

  15. Discrete multi-physics simulations of diffusive and convective mass transfer in boundary layers containing motile cilia in lungs.

    Science.gov (United States)

    Ariane, Mostapha; Kassinos, Stavros; Velaga, Sitaram; Alexiadis, Alessio

    2018-04-01

    In this paper, the mass transfer coefficient (permeability) of boundary layers containing motile cilia is investigated by means of discrete multi-physics. The idea is to understand the main mechanisms of mass transport occurring in a ciliated-layer; one specific application being inhaled drugs in the respiratory epithelium. The effect of drug diffusivity, cilia beat frequency and cilia flexibility is studied. Our results show the existence of three mass transfer regimes. A low frequency regime, which we called shielding regime, where the presence of the cilia hinders mass transport; an intermediate frequency regime, which we have called diffusive regime, where diffusion is the controlling mechanism; and a high frequency regime, which we have called convective regime, where the degree of bending of the cilia seems to be the most important factor controlling mass transfer in the ciliated-layer. Since the flexibility of the cilia and the frequency of the beat changes with age and health conditions, the knowledge of these three regimes allows prediction of how mass transfer varies with these factors. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. Discontinuous Galerkin methods for plasma physics in the scrape-off layer of tokamaks

    International Nuclear Information System (INIS)

    Michoski, C.; Meyerson, D.; Isaac, T.; Waelbroeck, F.

    2014-01-01

    A new parallel discontinuous Galerkin solver, called ArcOn, is developed to describe the intermittent turbulent transport of filamentary blobs in the scrape-off layer (SOL) of fusion plasma. The model is comprised of an elliptic subsystem coupled to two convection-dominated reaction–diffusion–convection equations. Upwinding is used for a class of numerical fluxes developed to accommodate cross product driven convection, and the elliptic solver uses SIPG, NIPG, IIPG, Brezzi, and Bassi–Rebay fluxes to formulate the stiffness matrix. A novel entropy sensor is developed for this system, designed for a space–time varying artificial diffusion/viscosity regularization algorithm. Some numerical experiments are performed to show convergence order on manufactured solutions, regularization of blob/streamer dynamics in the SOL given unstable parameterizations, long-time stability of modon (or dipole drift vortex) solutions arising in simulations of drift-wave turbulence, and finally the formation of edge mode turbulence in the scrape-off layer under turbulent saturation conditions

  17. Physical and Electrical Properties of SiO2 Layer Synthesized by Eco-Friendly Method

    Science.gov (United States)

    Kim, Jong-Woong; Kim, Young-Seok; Hong, Sung-Jei; Hong, Tae-Hwan; Han, Jeong-In

    2010-05-01

    SiO2 thin film has a wide range of applications, including insulation layers in microelectronic devices, such as semiconductors and flat panel displays, due to its advantageous characteristics. Herein, we developed a new eco-friendly method for manufacturing SiO2 nanoparticles and, thereby, SiO2 paste to be used in the digital printing process for the fabrication of SiO2 film. By excluding harmful Cl- and NO3- elements from the SiO2 nanoparticle synthetic process, we were able to lower the heat treatment temperature for the SiO2 precursor from 600 to 300 °C and the diameter of the final SiO2 nanoparticles to about 14 nm. The synthesized SiO2 nanoparticles were dispersed in an organic solvent with additives to make a SiO2 paste for feasibility testing. The SiO2 paste was printed onto a glass substrate to test the feasibility of using it for digital printing. The insulation resistance of the printed film was high enough for it to be used as an insulation layer for passivation.

  18. A physics-based model for maintenance of the pH gradient in the gastric mucus layer.

    Science.gov (United States)

    Lewis, Owen L; Keener, James P; Fogelson, Aaron L

    2017-12-01

    It is generally accepted that the gastric mucus layer provides a protective barrier between the lumen and the mucosa, shielding the mucosa from acid and digestive enzymes and preventing autodigestion of the stomach epithelium. However, the precise mechanisms that contribute to this protective function are still up for debate. In particular, it is not clear what physical processes are responsible for transporting hydrogen protons, secreted within the gastric pits, across the mucus layer to the lumen without acidifying the environment adjacent to the epithelium. One hypothesis is that hydrogen may be bound to the mucin polymers themselves as they are convected away from the mucosal surface and eventually degraded in the stomach lumen. It is also not clear what mechanisms prevent hydrogen from diffusing back toward the mucosal surface, thereby lowering the local pH. In this work we investigate a physics-based model of ion transport within the mucosal layer based on a Nernst-Planck-like equation. Analysis of this model shows that the mechanism of transporting protons bound to the mucus gel is capable of reproducing the trans-mucus pH gradients reported in the literature. Furthermore, when coupled with ion exchange at the epithelial surface, our analysis shows that bicarbonate secretion alone is capable of neutralizing the epithelial pH, even in the face of enormous diffusive gradients of hydrogen. Maintenance of the pH gradient is found to be robust to a wide array of perturbations in both physiological and phenomenological model parameters, suggesting a robust physiological control mechanism. NEW & NOTEWORTHY This work combines modeling techniques based on physical principles, as well as novel numerical simulations to test the plausibility of one hypothesized mechanism for proton transport across the gastric mucus layer. Results show that this mechanism is able to maintain the extreme pH gradient seen in in vivo experiments and suggests a highly robust regulation

  19. How to model wireless mesh networks topology

    International Nuclear Information System (INIS)

    Sanni, M L; Hashim, A A; Anwar, F; Ali, S; Ahmed, G S M

    2013-01-01

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  20. Intelligent Wireless Sensor Network

    OpenAIRE

    Saeed, Bakhtiar I.; Mehrdadi, Bruce

    2010-01-01

    In recent years, there has been significant increase in utilisation of embedded-microcontrollers in broad range of applications extending from commercial products to industrial process system monitoring. Furthermore, improvements in speed, size and power consumption of microcontrollers with added wireless capabilities has provided new generation of applications. These include versatile and\\ud low cost solutions in wireless sensor networking applications such as wireless system monitoring and ...

  1. Wireless sensor network

    Science.gov (United States)

    Perotti, Jose M.; Lucena, Angel R.; Mullenix, Pamela A.; Mata, Carlos T.

    2006-05-01

    Current and future requirements of aerospace sensors and transducers demand the design and development of a new family of sensing devices, with emphasis on reduced weight, power consumption, and physical size. This new generation of sensors and transducers will possess a certain degree of intelligence in order to provide the end user with critical data in a more efficient manner. Communication between networks of traditional or next-generation sensors can be accomplished by a Wireless Sensor Network (WSN) developed by NASA's Instrumentation Branch and ASRC Aerospace Corporation at Kennedy Space Center (KSC), consisting of at least one central station and several remote stations and their associated software. The central station is application-dependent and can be implemented on different computer hardware, including industrial, handheld, or PC-104 single-board computers, on a variety of operating systems: embedded Windows, Linux, VxWorks, etc. The central stations and remote stations share a similar radio frequency (RF) core module hardware that is modular in design. The main components of the remote stations are an RF core module, a sensor interface module, batteries, and a power management module. These modules are stackable, and a common bus provides the flexibility to stack other modules for additional memory, increased processing, etc. WSN can automatically reconfigure to an alternate frequency if interference is encountered during operation. In addition, the base station will autonomously search for a remote station that was perceived to be lost, using relay stations and alternate frequencies. Several wireless remote-station types were developed and tested in the laboratory to support different sensing technologies, such as resistive temperature devices, silicon diodes, strain gauges, pressure transducers, and hydrogen leak detectors.

  2. Structural and physical properties of a novel misfit-layered cobalt oxide (CaOH)1.14CoO2

    International Nuclear Information System (INIS)

    Isobe, Masaaki; Shizuya, Mitsuyuki; Takayama-Muromachi, Eiji

    2007-01-01

    We have studied crystal structure and physical properties of a new layered cobalt oxide (CaOH) 1.14 CoO 2 . The compound is a composite crystal which consists of two interpenetrating subsystems of the CdI 2 -type CoO 2 layer and the rock-salt-type double CaOH atomic layer. The two subsystems have incommensurate periodicity along the a-axis, resulting in modulated crystal structure due to the inter-subsystem interaction. We found that the observed physical properties originate in the electronic state with a 'low-carrier-density limit' in the cobalt t 2g band

  3. Antibacterial, cytotoxicity and physical properties of laser - silver doped hydroxyapatite layers

    Czech Academy of Sciences Publication Activity Database

    Jelínek, Miroslav; Kocourek, Tomáš; Remsa, Jan; Weiserová, Marie; Jurek, Karel; Mikšovský, Jan; Strnad, J.; Galandáková, A.; Ulrichová, J.

    2013-01-01

    Roč. 33, č. 3 (2013), s. 1242-1246 ISSN 0928-4931 R&D Projects: GA MŠk LD12069 Institutional support: RVO:68378271 ; RVO:61388971 Keywords : hydroxyapatite * silver * thin films * PLD * antibacterial * cytotoxicity Subject RIV: BM - Solid Matter Physics ; Magnetism Impact factor: 2.736, year: 2013 http://dx.doi.org/10.1016/j.msec.2012.12.018

  4. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  5. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  6. The Model of Communication Channel in the 802.11b Standard Wireless Network

    Directory of Open Access Journals (Sweden)

    Zdenek Nemec

    2008-01-01

    Full Text Available The paper deals with software modelling of a communication channel in the 802.11b standard wireless network physical layer. A computer model of signal processing was created to verify possibility of the proposal of localisation system. Functionality of the signal generation and processing model was verified by the Spectrum Analyzer. Simulations run inSimulink/Matlab SW. The Simulink is used for the signal processor model and a pure Matlab software is used for mathematical evaluations of data processor model and for determination of initial conditions.

  7. Emulating Wired Backhaul with Wireless Network Coding

    DEFF Research Database (Denmark)

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    In this paper we address the need for wireless network densification. We propose a solution wherein the wired backhaul employed in heterogeneous cellular networks is replaced with wireless links, while maintaining the rate requirements of the uplink and downlink traffic of each user. The first...... of the two-way protocol. The transmit power is set high enough to enable successive decoding at the small cell base station where the downlink data to the user is first decoded and its contribution removed from the received signal followed by the uplink data from the user. The decoding of the second layer......, the uplink traffic to the user, remains identical to the one performed in a wired system. In the broadcast phase, the decoding of the downlink traffic can also be guaranteed to remain identical. Hence, our solution claims an emulation of a wired backhaul with wireless network coding with same performance. We...

  8. Comparison of autoregressive (AR) strategy with that of regression approach for determining ozone layer depletion as a physical process

    International Nuclear Information System (INIS)

    Yousufzai, M.A.K; Aansari, M.R.K.; Quamar, J.; Iqbal, J.; Hussain, M.A.

    2010-01-01

    This communication presents the development of a comprehensive characterization of ozone layer depletion (OLD) phenomenon as a physical process in the form of mathematical models that comprise the usual regression, multiple or polynomial regression and stochastic strategy. The relevance of these models has been illuminated using predicted values of different parameters under a changing environment. The information obtained from such analysis can be employed to alter the possible factors and variables to achieve optimum performance. This kind of analysis initiates a study towards formulating the phenomenon of OLD as a physical process with special reference to the stratospheric region of Pakistan. The data presented here establishes that the Auto regressive (AR) nature of modeling OLD as a physical process is an appropriate scenario rather than using usual regression. The data reported in literature suggest quantitatively the OLD is occurring in our region. For this purpose we have modeled this phenomenon using the data recorded at the Geophysical Centre Quetta during the period 1960-1999. The predictions made by this analysis are useful for public, private and other relevant organizations. (author)

  9. Interference in wireless ad hoc networks with smart antennas

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-01-01

    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical

  10. Dynamic power control for wireless backbone mesh networks: a survey

    CSIR Research Space (South Africa)

    Olwal, TO

    2010-01-01

    Full Text Available points of failures, and robust against RF interference, obstacles or power outage. This is because WMRs forming wireless backbone mesh networks (WBMNs) are built on advanced physical technologies. Such nodes perform both accessing and forwarding...

  11. Flood and Traffic Wireless Monitoring System for Smart Cities

    KAUST Repository

    Mousa, Mustafa

    2016-01-01

    The convergence of computation, communication and sensing has led to the emergence of Wireless Sensor Networks (WSNs), which allow distributed monitoring of physical phenomena over extended areas. In this thesis, we focus on a dual flood and traffic

  12. Disassembly and physical separation of electric/electronic components layered in printed circuit boards (PCB).

    Science.gov (United States)

    Lee, Jaeryeong; Kim, Youngjin; Lee, Jae-chun

    2012-11-30

    Although printed circuit boards (PCBs) contain various elements, only the major elements (i.e., those with content levels in wt% or over grade) of and precious metals (e.g., Ag, Au, and platinum groups) contained within PCBs can be recycled. To recover other elements from PCBs, the PCBs should be properly disassembled as the first step of the recycling process. The recovery of these other elements would be beneficial for efforts to conserve scarce resources, reuse electric/electronic components (EECs), and eliminate environmental problems. This paper examines the disassembly of EECs from wasted PCBs (WPCBs) and the physical separation of these EECs using a self-designed disassembling apparatus and a 3-step separation process of sieving, magnetic separation, and dense medium separation. The disassembling efficiencies were evaluated by using the ratio of grinding area (E(area)) and the weight ratio of the detached EECs (E(weight)). In the disassembly treatment, these efficiencies were improved with an increase of grinder speed and grinder height. 97.7% (E(area)) and 98% (E(weight)) could be accomplished ultimately by 3 repetitive treatments at a grinder speed of 5500 rpm and a grinder height of 1.5mm. Through a series of physical separations, most groups of the EECs (except for the diode, transistor, and IC chip groups) could be sorted at a relatively high separation efficiency of about 75% or more. To evaluate the separation efficiency with regard to the elemental composition, the distribution ratio (R(dis)) and the concentration ratio (R(conc)) were used. 15 elements could be separated with the highest R(dis) and R(conc) in the same separated division. This result implies that the recyclability of the elements is highly feasible, even though the initial content in EECs is lower than several tens of mg/kg. Copyright © 2012 Elsevier B.V. All rights reserved.

  13. Fabrication and physical properties of transparent poly (methyl-methacrylate)-layered silicate nanocomposites

    Science.gov (United States)

    Vasiliu, Elena

    Transparent polymer nanocomposites have promising potential for protective coating applications with improved surface resistance, higher temperature performance and low gas permeability for containers and films. Extremely thin protective layers are required for improved performance of various electronic devices in aviation, aerospace and medical equipment as well as for lenses and fiber optics in optical communications. This research study developed a method for fabricating optically transparent nanocomposites of poly(methyl-methacrylate)(PMMA) and a commercial organically-modified layered silicate CloisiteRTM 6A (C6A). The nanocomposites were produced by dispersing C6A and PMMA separately in a common solvent xylene followed by mixing the two solutions by mechanical stirring and/or ultrasonic agitation and then removing the solvent by evaporation. Processing conditions such as the mixing methods and times and the rates of solvent removal were investigated in order to achieve a high degree of dispersion and exfoliation of C6A in the polymer matrix and produce a nanocomposite material with high optical transparency. Small-angle x-ray scattering (SAXS) was used to monitor the morphology of the C6A after each processing step. Thin films of PMMA/C6A nanocomposites were produced by casting and spraying. SAXS results suggest that C6A was partially exfoliated in the composite material with an average of 2 to 3 platelets per crystallite. Transmission electron microscopy (TEM) confirmed the existence of both exfoliated and intercalated C6A in PMMA. One mm thick discs were obtained by molding the sprayed films. The optical transmission of the nanocomposite films and discs was measured with an UV/VIS spectrometer. The spectroscopic results served to identify the best process for producing PMMA-C6A films of high optical transparency. Even the nanocomposite films containing up to 20 wt.% C6A prepared by this process exhibited optical transmittance in the range of 80 to 90

  14. A Remote WIRELESS Facility

    Directory of Open Access Journals (Sweden)

    Kees Uiterwijk

    2007-10-01

    Full Text Available Continuing need for available distance learning facilities has led to the development of a remote lab facility focusing on wireless technology. In the field of engineering there is a student need of gaining experience in set-up, monitoring and maintenance of 802.11A/B/G based wireless LAN environments.

  15. Warming Up to Wireless

    Science.gov (United States)

    Milner, Jacob

    2005-01-01

    In districts big and small across the U.S., students, teachers, and administrators alike have come to appreciate the benefits of wireless technology. Because the technology delivers Internet signals on airborne radio frequencies, wireless networking allows users of all portable devices to move freely on a school's campus and stay connected to the…

  16. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  17. One Kind of Routing Algorithm Modified in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Wei Ni Ni

    2016-01-01

    Full Text Available The wireless sensor networks are the emerging next generation sensor networks, Routing technology is the wireless sensor network communication layer of the core technology. To build reliable paths in wireless sensor networks, we can consider two ways: providing multiple paths utilizing the redundancy to assure the communication reliability or constructing transmission reliability mechanism to assure the reliability of every hop. Braid multipath algorithm and ReInforM routing algorithm are the realizations of these two mechanisms. After the analysis of these two algorithms, this paper proposes a ReInforM routing algorithm based braid multipath routing algorithm.

  18. Physics of collisionless scrape-off-layer plasma during normal and off-normal Tokamak operating conditions

    International Nuclear Information System (INIS)

    Hassanein, A.; Konkashbaev, I.

    1999-01-01

    The structure of a collisionless scrape-off-layer (SOL) plasma in tokamak reactors is being studied to define the electron distribution function and the corresponding sheath potential between the divertor plate and the edge plasma. The collisionless model is shown to be valid during the thermal phase of a plasma disruption, as well as during the newly desired low-recycling normal phase of operation with low-density, high-temperature, edge plasma conditions. An analytical solution is developed by solving the Fokker-Planck equation for electron distribution and balance in the SOL. The solution is in good agreement with numerical studies using Monte-Carlo methods. The analytical solutions provide an insight to the role of different physical and geometrical processes in a collisionless SOL during disruptions and during the enhanced phase of normal operation over a wide range of parameters

  19. A chaotic modified-DFT encryption scheme for physical layer security and PAPR reduction in OFDM-PON

    Science.gov (United States)

    Fu, Xiaosong; Bi, Meihua; Zhou, Xuefang; Yang, Guowei; Li, Qiliang; Zhou, Zhao; Yang, Xuelin

    2018-05-01

    This letter proposes a modified discrete Fourier transform (DFT) encryption scheme with multi-dimensional chaos for the physical layer security and peak-to-average power ratio (PAPR) reduction in orthogonal frequency division multiplexing passive optical network (OFDM-PON) system. This multiple-fold encryption algorithm is mainly composed by using the column vectors permutation and the random phase encryption in the standard DFT matrix, which can create ∼10551 key space. The transmission of ∼10 Gb/s encrypted OFDM signal is verified over 20-km standard single mode fiber (SMF). Moreover, experimental results show that, the proposed scheme can achieve ∼2.6-dB PAPR reduction and ∼1-dB improvement of receiver sensitivity if compared with the common OFDM-PON.

  20. Simulation of an extreme heavy rainfall event over Chennai, India using WRF: Sensitivity to grid resolution and boundary layer physics

    KAUST Repository

    Srinivas, C.V.

    2018-05-04

    In this study, the heavy precipitation event on 01 December 2015 over Chennai located on the southeast coast of India was simulated using the Weather Research and Forecast (WRF) model. A series of simulations were conducted using explicit convection and varying the planetary boundary layer (PBL) parameterization schemes. The model results were compared with available surface, satellite and Doppler Weather Radar observations. Simulations indicate strong, sustained moist convection associated with development of a mesoscale upper air cyclonic circulation, during the passage of a synoptic scale low-pressure trough caused heavy rainfall over Chennai and its surroundings. Results suggest that veering of wind with height associated with strong wind shear in the layer 800–400 hPa together with dry air advection facilitated development of instability and initiation of convection. The 1-km domain using explicit convection improved the prediction of rainfall intensity of about 450 mm and its distribution. The PBL physics strongly influenced the rainfall prediction by changing the location of upper air circulation, energy transport, moisture convergence and intensity of convection in the schemes YSU, MYJ and MYNN. All the simulations underestimated the first spell of the heavy rainfall. While YSU and MYJ schemes grossly underestimated the rainfall and dislocated the area of maximum rainfall, the higher order MYNN scheme simulated the rainfall pattern in better agreement with observations. The MYNN showed lesser mixing and simulated more humid boundary layer, higher convective available potential energy (CAPE) and stronger winds at mid-troposphere than did the other schemes. The MYNN also realistically simulated the location of upper air cyclonic flow and various dynamic and thermodynamic features. Consequently it simulated stronger moisture convergence and higher precipitation.

  1. Simulation of an extreme heavy rainfall event over Chennai, India using WRF: Sensitivity to grid resolution and boundary layer physics

    KAUST Repository

    Srinivas, C.V.; Yesubabu, V.; Hari Prasad, D.; Hari Prasad, K.B.R.R.; Greeshma, M.M.; Baskaran, R.; Venkatraman, B.

    2018-01-01

    In this study, the heavy precipitation event on 01 December 2015 over Chennai located on the southeast coast of India was simulated using the Weather Research and Forecast (WRF) model. A series of simulations were conducted using explicit convection and varying the planetary boundary layer (PBL) parameterization schemes. The model results were compared with available surface, satellite and Doppler Weather Radar observations. Simulations indicate strong, sustained moist convection associated with development of a mesoscale upper air cyclonic circulation, during the passage of a synoptic scale low-pressure trough caused heavy rainfall over Chennai and its surroundings. Results suggest that veering of wind with height associated with strong wind shear in the layer 800–400 hPa together with dry air advection facilitated development of instability and initiation of convection. The 1-km domain using explicit convection improved the prediction of rainfall intensity of about 450 mm and its distribution. The PBL physics strongly influenced the rainfall prediction by changing the location of upper air circulation, energy transport, moisture convergence and intensity of convection in the schemes YSU, MYJ and MYNN. All the simulations underestimated the first spell of the heavy rainfall. While YSU and MYJ schemes grossly underestimated the rainfall and dislocated the area of maximum rainfall, the higher order MYNN scheme simulated the rainfall pattern in better agreement with observations. The MYNN showed lesser mixing and simulated more humid boundary layer, higher convective available potential energy (CAPE) and stronger winds at mid-troposphere than did the other schemes. The MYNN also realistically simulated the location of upper air cyclonic flow and various dynamic and thermodynamic features. Consequently it simulated stronger moisture convergence and higher precipitation.

  2. Laboratory investigation of physical mechanisms of auroral charged particle acceleration in the field-aligned currents layers

    Science.gov (United States)

    Gavrilov, B.; Zetzer, J.; Sobyanin, D.; Podgorny, I.

    One of the major topics of space weather research is to understand auroral structure and the processes that guide, accelerate, and otherwise control particle precipitation and produce auroral substorms. Navigation, communications and radars in the high latitude regions are severely affected through the effects on the ionosphere. It has long been recognized that the direct cause of the aurora is the precipitation of energetic electrons and ions into the atmosphere leading to excitation of the ambient atmospheric gases. Observations of the ionospheric ionization profiles and auroral precipitation characteristics have shown that field-aligned potential drops are formed to create this effect. The problem is that it is not clear the structure of the regions of magnetic field-aligned electric fields and how they are supported in the magnetospheric plasma. The objective of this research is to study the physical mechanisms of these phenomena in a laboratory experiment. It should be achieved by simulating the charged particle acceleration due to field-aligned electrical field generation in all totality of the interconnected events: generation of a plasma flow, its evolution in the magnetic field, polarization of plasma, generation of the field-aligned currents, development of instabilities in the plasma and current layers, double layers or anomalous resistance regions appearance, electrons acceleration. Parameters of the laboratory simulation and preliminary results of the experiment are discussed.

  3. Physics of the intermediate layer between a plasma and a collisionless sheath and mathematical meaning of the Bohm criterion

    Energy Technology Data Exchange (ETDEWEB)

    Almeida, N. A.; Benilov, M. S. [Departamento de Fisica, CCCEE, Universidade da Madeira Largo do Municipio, 9000 Funchal (Portugal)

    2012-07-15

    A transformation of the ion momentum equation simplifies a mathematical description of the transition layer between a quasi-neutral plasma and a collisionless sheath and clearly reveals the physics involved. Balance of forces acting on the ion fluid is delicate in the vicinity of the sonic point and weak effects come into play. For this reason, the passage of the ion fluid through the sonic point, which occurs in the transition layer, is governed not only by inertia and electrostatic force but also by space charge and ion-atom collisions and/or ionization. Occurrence of different scenarios of asymptotic matching in the plasma-sheath transition is analyzed by means of simple mathematical examples, asymptotic estimates, and numerical calculations. In the case of a collisionless sheath, the ion speed distribution plotted on the logarithmic scale reveals a plateau in the intermediate region between the sheath and the presheath. The value corresponding to this plateau has the meaning of speed with which ions leave the presheath and enter the sheath; the Bohm speed. The plateau is pronounced reasonably well provided that the ratio of the Debye length to the ion mean free path is of the order of 10{sup -3} or smaller. There is no such plateau if the sheath is collisional and hence no sense in talking of a speed with which ions enter the sheath.

  4. Wireless Sensor Networks : Structure and Algorithms

    NARCIS (Netherlands)

    van Dijk, T.C.

    2014-01-01

    In this thesis we look at various problems in wireless networking. First we consider two problems in physical-model networks. We introduce a new model for localisation. The model is based on a range-free model of radio transmissions. The first scheme is randomised and we analyse its expected

  5. Wireless adiabatic power transfer

    International Nuclear Information System (INIS)

    Rangelov, A.A.; Suchowski, H.; Silberberg, Y.; Vitanov, N.V.

    2011-01-01

    Research highlights: → Efficient and robust mid-range wireless energy transfer between two coils. → The adiabatic energy transfer is analogous to adiabatic passage in quantum optics. → Wireless energy transfer is insensitive to any resonant constraints. → Wireless energy transfer is insensitive to noise in the neighborhood of the coils. - Abstract: We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  6. Physical and chemical properties of the regional mixed layer of Mexico's Megapolis

    Directory of Open Access Journals (Sweden)

    P. Arnott

    2009-08-01

    Full Text Available The concentration of gases and aerosol particles have been measured at the mountain site of Altzomoni, 4010 m in altitude, located 60 km southeast of Mexico City, 50 km east of Puebla and 70 km northeast of Cuernavaca. The objective of this study was to evaluate the properties of gases and particles in the Regional Mixed Layer (RML of Mexico's Megapolis. Altzomoni is generally above the RML from late evening until late morning at which time the arrival of the RML is marked by increasing concentrations of CO and aerosol particles that reach their maxima in mid-afternoon. The average diurnal cycles for fourteen days in March, 2006 were evaluated during which time the synoptic scale circulation had three principal patterns: from the east (E, southwest (SW and west northwest (WNW. The original hypothesis was that air arriving from the direction of Mexico City would have much higher concentrations of anthropogenic gases and particles than air from Puebla or Cuernavaca, due to the relatively large differences in populations. In fact, not only were the average, maximum concentrations of CO and O3 (0.3 and 0.1 ppmv approximately the same for air originating from the WNW and E, but the average maximum concentrations of Peroxyacyl nitrates (PAN,PPN and particle organic matter (POM in air from the E exceeded those in air from the WNW. Comparisons of measurements from the mountain site with those made by aircraft during the same period, using the same type of aerosol mass spectrometer, show that the total masses of POM, NO3−, SO42− and NH4+ were approximately the same from aircraft measurements made over Mexico City and when winds were from the east at the mountain site. In contrast 75% of the total aerosol mass at the mountain site was POM whereas over Mexico City the fraction of POM was less than 60%. The measurements suggest the occasional influence of emissions from the nearby volcano, Popocatepetl, as well as possible incursions of biomass

  7. Development of an Internal Real-Time Wireless Diagnostic Tool for a Proton Exchange Membrane Fuel Cell

    Directory of Open Access Journals (Sweden)

    Chi-Yuan Lee

    2018-01-01

    Full Text Available To prolong the operating time of unmanned aerial vehicles which use proton exchange membrane fuel cells (PEMFC, the performance of PEMFC is the key. However, a long-term operation can make the Pt particles of the catalyst layer and the pollutants in the feedstock gas bond together (e.g., CO, so that the catalyst loses reaction activity. The performance decay and aging of PEMFC will be influenced by operating conditions, temperature, flow and CO concentration. Therefore, this study proposes the development of an internal real-time wireless diagnostic tool for PEMFC, and uses micro-electro-mechanical systems (MEMS technology to develop a wireless and thin (<50 μm flexible integrated (temperature, flow and CO microsensor. The technical advantages are (1 compactness and three wireless measurement functions; (2 elastic measurement position and accurate embedding; (3 high accuracy and sensitivity and quick response; (4 real-time wireless monitoring of dynamic performance of PEMFC; (5 customized design and development. The flexible integrated microsensor is embedded in the PEMFC, three important physical quantities in the PEMFC, which are the temperature, flow and CO, can be measured simultaneously and instantly, so as to obtain the authentic and complete reaction in the PEMFC to enhance the performance of PEMFC and to prolong the service life.

  8. Wireless synapses in bio-inspired neural networks

    Science.gov (United States)

    Jannson, Tomasz; Forrester, Thomas; Degrood, Kevin

    2009-05-01

    Wireless (virtual) synapses represent a novel approach to bio-inspired neural networks that follow the infrastructure of the biological brain, except that biological (physical) synapses are replaced by virtual ones based on cellular telephony modeling. Such synapses are of two types: intracluster synapses are based on IR wireless ones, while intercluster synapses are based on RF wireless ones. Such synapses have three unique features, atypical of conventional artificial ones: very high parallelism (close to that of the human brain), very high reconfigurability (easy to kill and to create), and very high plasticity (easy to modify or upgrade). In this paper we analyze the general concept of wireless synapses with special emphasis on RF wireless synapses. Also, biological mammalian (vertebrate) neural models are discussed for comparison, and a novel neural lensing effect is discussed in detail.

  9. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  10. In-to-out body path loss for wireless radio frequency capsule endoscopy in a human body.

    Science.gov (United States)

    Vermeeren, G; Tanghe, E; Thielens, A; Martens, L; Joseph, W

    2016-08-01

    Physical-layer characterization is important for design of in-to-out body communication for wireless body area networks (WBANs). This paper numerically investigates the path loss of an in-to-out body radio frequency (RF) wireless link between an endoscopy capsule and a receiver outside the body using a 3D electromagnetic solver. A spiral antenna in the endoscopy capsule is tuned to operate in the Medical Implant Communication Service (MICS) band at 402 MHz, accounting for the properties of the human body. The influence of misalignment, rotation of the capsule, and human body model are investigated. Semi-empirical path loss models for various homogeneous tissues and 3D realistic human body models are provided for manufacturers to evaluate the performance of in-to-out-body WBAN systems.

  11. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  12. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  13. Temperature-Dependent Physical and Memory Characteristics of Atomic-Layer-Deposited RuOx Metal Nanocrystal Capacitors

    Directory of Open Access Journals (Sweden)

    S. Maikap

    2011-01-01

    Full Text Available Physical and memory characteristics of the atomic-layer-deposited RuOx metal nanocrystal capacitors in an n-Si/SiO2/HfO2/RuOx/Al2O3/Pt structure with different postdeposition annealing temperatures from 850–1000°C have been investigated. The RuOx metal nanocrystals with an average diameter of 7 nm and a highdensity of 0.7 × 1012/cm2 are observed by high-resolution transmission electron microscopy after a postdeposition annealing temperature at 1000°C. The density of RuOx nanocrystal is decreased (slightly by increasing the annealing temperatures, due to agglomeration of multiple nanocrystals. The RuO3 nanocrystals and Hf-silicate layer at the SiO2/HfO2 interface are confirmed by X-ray photoelectron spectroscopy. For post-deposition annealing temperature of 1000°C, the memory capacitors with a small equivalent oxide thickness of ~9 nm possess a large hysteresis memory window of >5 V at a small sweeping gate voltage of ±5 V. A promising memory window under a small sweeping gate voltage of ~3 V is also observed due to charge trapping in the RuOx metal nanocrystals. The program/erase mechanism is modified Fowler-Nordheim (F-N tunneling of the electrons and holes from Si substrate. The electrons and holes are trapped in the RuOx nanocrystals. Excellent program/erase endurance of 106 cycles and a large memory window of 4.3 V with a small charge loss of ~23% at 85°C are observed after 10 years of data retention time, due to the deep-level traps in the RuOx nanocrystals. The memory structure is very promising for future nanoscale nonvolatile memory applications.

  14. Integrating atomic layer deposition and ultra-high vacuum physical vapor deposition for in situ fabrication of tunnel junctions

    Energy Technology Data Exchange (ETDEWEB)

    Elliot, Alan J., E-mail: alane@ku.edu, E-mail: jwu@ku.edu; Malek, Gary A.; Lu, Rongtao; Han, Siyuan; Wu, Judy Z., E-mail: alane@ku.edu, E-mail: jwu@ku.edu [Department of Physics and Astronomy, The University of Kansas, Lawrence, Kansas 66045 (United States); Yu, Haifeng; Zhao, Shiping [Beijing National Laboratory for Condensed Matter Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100190 (China)

    2014-07-15

    Atomic Layer Deposition (ALD) is a promising technique for growing ultrathin, pristine dielectrics on metal substrates, which is essential to many electronic devices. Tunnel junctions are an excellent example which require a leak-free, ultrathin dielectric tunnel barrier of typical thickness around 1 nm between two metal electrodes. A challenge in the development of ultrathin dielectric tunnel barriers using ALD is controlling the nucleation of dielectrics on metals with minimal formation of native oxides at the metal surface for high-quality interfaces between the tunnel barrier and metal electrodes. This poses a critical need for integrating ALD with ultra-high vacuum (UHV) physical vapor deposition. In order to address these challenges, a viscous-flow ALD chamber was designed and interfaced to an UHV magnetron sputtering chamber via a load lock. A sample transportation system was implemented for in situ sample transfer between the ALD, load lock, and sputtering chambers. Using this integrated ALD-UHV sputtering system, superconductor-insulator-superconductor (SIS) Nb-Al/Al{sub 2}O{sub 2}/Nb Josephson tunnel junctions were fabricated with tunnel barriers of thickness varied from sub-nm to ∼1 nm. The suitability of using an Al wetting layer for initiation of the ALD Al{sub 2}O{sub 3} tunnel barrier was investigated with ellipsometry, atomic force microscopy, and electrical transport measurements. With optimized processing conditions, leak-free SIS tunnel junctions were obtained, demonstrating the viability of this integrated ALD-UHV sputtering system for the fabrication of tunnel junctions and devices comprised of metal-dielectric-metal multilayers.

  15. ENERGY OPTIMIZATION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    T. SHANKAR

    2014-04-01

    Full Text Available Wireless sensor networks (WSN are made up of sensor nodes which are usually battery-operated devices, and hence energy saving of sensor nodes is a major design issue. To prolong the networks lifetime, minimization of energy consumption should be implemented at all layers of the network protocol stack starting from the physical to the application layer including cross-layer optimization. Optimizing energy consumption is the main concern for designing and planning the operation of the WSN. Clustering technique is one of the methods utilized to extend lifetime of the network by applying data aggregation and balancing energy consumption among sensor nodes of the network. This paper proposed new version of Low Energy Adaptive Clustering Hierarchy (LEACH, protocols called Advanced Optimized Low Energy Adaptive Clustering Hierarchy (AOLEACH, Optimal Deterministic Low Energy Adaptive Clustering Hierarchy (ODLEACH, and Varying Probability Distance Low Energy Adaptive Clustering Hierarchy (VPDL combination with Shuffled Frog Leap Algorithm (SFLA that enables selecting best optimal adaptive cluster heads using improved threshold energy distribution compared to LEACH protocol and rotating cluster head position for uniform energy dissipation based on energy levels. The proposed algorithm optimizing the life time of the network by increasing the first node death (FND time and number of alive nodes, thereby increasing the life time of the network.

  16. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography.

    Science.gov (United States)

    Dautov, Ruslan; Tsouri, Gill R

    2016-01-01

    Stringent resource constraints and broadcast transmission in wireless body area network raise serious security concerns when employed in biomedical applications. Protecting data transmission where any minor alteration is potentially harmful is of significant importance in healthcare. Traditional security methods based on public or private key infrastructure require considerable memory and computational resources, and present an implementation obstacle in compact sensor nodes. This paper proposes a lightweight encryption framework augmenting compressed sensing with wireless physical layer security. Augmenting compressed sensing to secure information is based on the use of the measurement matrix as an encryption key, and allows for incorporating security in addition to compression at the time of sampling an analog signal. The proposed approach eliminates the need for a separate encryption algorithm, as well as the predeployment of a key thereby conserving sensor node's limited resources. The proposed framework is evaluated using analysis, simulation, and experimentation applied to a wireless electrocardiogram setup consisting of a sensor node, an access point, and an eavesdropper performing a proximity attack. Results show that legitimate communication is reliable and secure given that the eavesdropper is located at a reasonable distance from the sensor node and the access point.

  17. The Most Possible Scheme of Joint Service Detection for the Next Wireless Communication Technologies

    Directory of Open Access Journals (Sweden)

    Firdaus Firdaus

    2013-03-01

    Full Text Available The era of beyond third generation wireless communication is highly heterogeneous in that it comprises several radio access technologies that need to be joined into a single multimode terminal. In this respect, this paper introduces a common service recognition system for the next wireless communication technologies i.e. Long Term Evolution (LTE, WiMAX or IEEE 802.16, and Wireless Local Area Network (WLAN or IEEE 802.11. It is done in physical layer as one of multimode terminal ability regardless network cooperation existence. We investigated on the preamble and synchronization signals as indicators of the available services instead of carrier frequency detection. To detect these signals, we proposed a time domain detection system consisting of auto-correlation, cross-correlation, and a peak period detection. Based on complexity analysis, this paper proposes the most possible scheme with lower complexity than cross-correlation implementation. Moreover, the fixed point simulation results show that the proposed system satisfies the minimum receiver sensitivity requirements that specified in the standards.

  18. Feasibility studies for a wireless 60 GHz tracking detector readout

    International Nuclear Information System (INIS)

    Dittmeier, S.; Schöning, A.; Soltveit, H.K.; Wiedner, D.

    2016-01-01

    The amount of data produced by highly granular silicon tracking detectors in high energy physics experiments poses a major challenge to readout systems. At high collision rates, e.g. at LHC experiments, only a small fraction of data can be read out with currently used technologies. To cope with the requirements of future or upgraded experiments new data transfer techniques are required which offer high data rates at low power and low material budget. Wireless technologies operating in the 60 GHz band or at higher frequencies offer high data rates and are thus a promising upcoming alternative to conventional data transmission via electrical cables or optical fibers. Using wireless technology, the amount of cables and connectors in detectors can be significantly reduced. Tracking detectors profit most from a reduced material budget as fewer secondary particle interactions (multiple Coulomb scattering, energy loss, etc.) improve the tracking performance in general. We present feasibility studies regarding the integration of the wireless technology at 60 GHz into a silicon tracking detector. We use spare silicon strip modules of the ATLAS experiment as test samples which are measured to be opaque in the 60 GHz range. The reduction of cross talk between links and the attenuation of reflections is studied. An estimate of the maximum achievable link density is given. It is shown that wireless links can be placed as close as 2 cm next to each other for a layer distance of 10 cm by exploiting one or several of the following measures: highly directive antennas, absorbers like graphite foam, linear polarization and frequency channeling. Combining these measures, a data rate area density of up to 11 Tb/(s·m"2) seems feasible. In addition, two types of silicon sensors are tested under mm-wave irradiation in order to determine the influence of 60 GHz data transmission on the detector performance: an ATLAS silicon strip sensor module and an HV-MAPS prototype for the Mu3e

  19. Feasibility studies for a wireless 60 GHz tracking detector readout

    Energy Technology Data Exchange (ETDEWEB)

    Dittmeier, S., E-mail: dittmeier@physi.uni-heidelberg.de; Schöning, A.; Soltveit, H.K.; Wiedner, D.

    2016-09-11

    The amount of data produced by highly granular silicon tracking detectors in high energy physics experiments poses a major challenge to readout systems. At high collision rates, e.g. at LHC experiments, only a small fraction of data can be read out with currently used technologies. To cope with the requirements of future or upgraded experiments new data transfer techniques are required which offer high data rates at low power and low material budget. Wireless technologies operating in the 60 GHz band or at higher frequencies offer high data rates and are thus a promising upcoming alternative to conventional data transmission via electrical cables or optical fibers. Using wireless technology, the amount of cables and connectors in detectors can be significantly reduced. Tracking detectors profit most from a reduced material budget as fewer secondary particle interactions (multiple Coulomb scattering, energy loss, etc.) improve the tracking performance in general. We present feasibility studies regarding the integration of the wireless technology at 60 GHz into a silicon tracking detector. We use spare silicon strip modules of the ATLAS experiment as test samples which are measured to be opaque in the 60 GHz range. The reduction of cross talk between links and the attenuation of reflections is studied. An estimate of the maximum achievable link density is given. It is shown that wireless links can be placed as close as 2 cm next to each other for a layer distance of 10 cm by exploiting one or several of the following measures: highly directive antennas, absorbers like graphite foam, linear polarization and frequency channeling. Combining these measures, a data rate area density of up to 11 Tb/(s·m{sup 2}) seems feasible. In addition, two types of silicon sensors are tested under mm-wave irradiation in order to determine the influence of 60 GHz data transmission on the detector performance: an ATLAS silicon strip sensor module and an HV-MAPS prototype for the Mu3e

  20. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  1. Wireless radio a history

    CERN Document Server

    Coe, Lewis

    2006-01-01

    ""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.

  2. Rapid visible color change and physical swelling during water exposure in triethanolamine-metalcone films formed by molecular layer deposition

    International Nuclear Information System (INIS)

    Lemaire, Paul C.; Oldham, Christopher J.; Parsons, Gregory N.

    2016-01-01

    Molecular layer deposition (MLD) of “metalcones,” including alucone, zincone, titanicone, and others, involves self-limiting half-reactions between organic and organometallic (or metal-halide) reactants. Studies have typically focused on metal precursors reacting with ethylene glycol or glycerol to form the films' polymeric O-M-O-(CH x ) y -O-M-O repeat units. The authors report new MLD materials that incorporate tertiary amine groups into the organic linkage. Specifically, reacting triethanolamine (TEA) with either trimethylaluminum or titanium tetrachloride produces TEA-alucone (Al-TEA) and TEA-titanicone (Ti-TEA), respectively, and the amine group leads to unique physical and optical properties. Fourier-transform infrared (FTIR) analysis confirms that the films have prominent C-H, C-N, and M-O-C peaks, consistent with the expected bond structure. When exposed to vapors, including water, alcohol, or ammonia, the Ti-TEA films changed their visible color within minutes and increased physical thickness by >35%. The Al-TEA showed significantly less response. X-ray photoelectron spectroscopy and FTIR suggest that HCl generated during MLD coordinates to the amine forming a quaternary ammonium salt that readily binds adsorbates via hydrogen bonding. The visible color change is reversible, and ellipsometry confirms that the color change results from vapor absorption. The unique absorptive and color-changing properties of the TEA-metalcone films point to new possible applications for MLD materials in filtration, chemical absorption, and multifunctional chemical separations/sensing device systems

  3. Rapid visible color change and physical swelling during water exposure in triethanolamine-metalcone films formed by molecular layer deposition

    Energy Technology Data Exchange (ETDEWEB)

    Lemaire, Paul C.; Oldham, Christopher J.; Parsons, Gregory N., E-mail: gnp@ncsu.edu [Department of Chemical and Biomolecular Engineering, North Carolina State University, Raleigh, North Carolina 27695 (United States)

    2016-01-15

    Molecular layer deposition (MLD) of “metalcones,” including alucone, zincone, titanicone, and others, involves self-limiting half-reactions between organic and organometallic (or metal-halide) reactants. Studies have typically focused on metal precursors reacting with ethylene glycol or glycerol to form the films' polymeric O-M-O-(CH{sub x}){sub y}-O-M-O repeat units. The authors report new MLD materials that incorporate tertiary amine groups into the organic linkage. Specifically, reacting triethanolamine (TEA) with either trimethylaluminum or titanium tetrachloride produces TEA-alucone (Al-TEA) and TEA-titanicone (Ti-TEA), respectively, and the amine group leads to unique physical and optical properties. Fourier-transform infrared (FTIR) analysis confirms that the films have prominent C-H, C-N, and M-O-C peaks, consistent with the expected bond structure. When exposed to vapors, including water, alcohol, or ammonia, the Ti-TEA films changed their visible color within minutes and increased physical thickness by >35%. The Al-TEA showed significantly less response. X-ray photoelectron spectroscopy and FTIR suggest that HCl generated during MLD coordinates to the amine forming a quaternary ammonium salt that readily binds adsorbates via hydrogen bonding. The visible color change is reversible, and ellipsometry confirms that the color change results from vapor absorption. The unique absorptive and color-changing properties of the TEA-metalcone films point to new possible applications for MLD materials in filtration, chemical absorption, and multifunctional chemical separations/sensing device systems.

  4. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim

    2017-01-01

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  5. On the physical and chemical details of alumina atomic layer deposition: A combined experimental and numerical approach

    International Nuclear Information System (INIS)

    Pan, Dongqing; Ma, Lulu; Xie, Yuanyuan; Yuan, Chris; Jen, Tien Chien

    2015-01-01

    Alumina thin film is typically studied as a model atomic layer deposition (ALD) process due to its high dielectric constant, high thermal stability, and good adhesion on various wafer surfaces. Despite extensive applications of alumina ALD in microelectronics industries, details on the physical and chemical processes are not yet well understood. ALD experiments are not able to shed adequate light on the detailed information regarding the transient ALD process. Most of current numerical approaches lack detailed surface reaction mechanisms, and their results are not well correlated with experimental observations. In this paper, the authors present a combined experimental and numerical study on the details of flow and surface reactions in alumina ALD using trimethylaluminum and water as precursors. Results obtained from experiments and simulations are compared and correlated. By experiments, growth rate on five samples under different deposition conditions is characterized. The deposition rate from numerical simulation agrees well with the experimental results. Details of precursor distributions in a full cycle of ALD are studied numerically to bridge between experimental observations and simulations. The 3D transient numerical model adopts surface reaction kinetics and mechanisms based on atomic-level studies to investigate the surface deposition process. Surface deposition is shown as a strictly self-limited process in our numerical studies. ALD is a complex strong-coupled fluid, thermal and chemical process, which is not only heavily dependent on the chemical kinetics and surface conditions but also on the flow and material distributions

  6. Thermal annealing evolution to physical properties of ZnS thin films as buffer layer for solar cell applications

    Science.gov (United States)

    Kaushalya; Patel, S. L.; Purohit, A.; Chander, S.; Dhaka, M. S.

    2018-07-01

    The conventional CdS window layer in solar cells is found to be hazardous for the environment due to toxic nature of the cadmium. Therefore, in order to seek an alternative, a study on effect of post-annealing treatment on physical properties of e-beam evaporated ZnS thin films has been carried out where films of thickness 150 nm were deposited on glass and indium tin oxide (ITO) substrates. The post annealing treatment was performed in air atmosphere within the temperature range from 100 °C to 500 °C. X-ray diffraction analysis reveals that the films on glass substrate are found to be amorphous at low temperature annealing (≤300 °C) while have α-ZnS hexagonal phase (wurtzite structure) at higher annealing. The patterns also show that the possibility of oxidation is increased significantly at temperature 500 °C which leads to decrease in direct band gap from 3.28 eV to 3.18 eV except films annealed at 300 °C (i.e. 3.39 eV). The maximum transmittance is found about 95% as a result of Doppler blue shift while electrical analysis indicated almost ohmic behavior between current and voltage and surface roughness is increased with post-annealing treatment.

  7. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.

    2017-04-18

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  8. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  9. Puff pastry with low saturated fat contents: The role of fat and dough physical interactions in the development of a layered structure

    NARCIS (Netherlands)

    Renzetti, S.; Harder, R. de; Jurgens, A.

    2015-01-01

    In puff pastry, fat and dough rheological behavior during sheeting control pastry dough development by formation of the layered structure which is essential for product quality. The aim of this work was to unravel the influence of fat and dough physical interactions during sheeting, as affected by

  10. Self-powered wireless disposable sensor for welfare application.

    Science.gov (United States)

    Douseki, Takakuni; Tanaka, Ami

    2013-01-01

    A self-powered urinary incontinence sensor consisting of a flexible urine-activated battery and a wireless transmitter has been developed as an application for wireless biosensor networks. The flexible urine-activated battery is embedded in a disposal diaper and makes possible both the sensing of urine leakage and self-powered operation. An intermittent power-supply circuit that uses an electric double-layer capacitor (EDLC) with a small internal resistance suppresses the supply voltage drop due to the large internal resistance of the battery. This circuit supplies the power to a wireless transmitter. A 315-MHz-band wireless transmitter performs low-power operation. To verify the effectiveness of the circuit scheme, we fabricated a prototype sensor system. When 80 cc of urine is poured onto the diaper, the battery outputs a voltage of 1 V; and the sensor can transmit an ID signal over a distance of 5 m.

  11. Passive Classification of Wireless NICs during Rate Switching

    OpenAIRE

    Beyah RaheemA; Copeland JohnA; Corbett CheritaL

    2008-01-01

    Abstract Computer networks have become increasingly ubiquitous. However, with the increase in networked applications, there has also been an increase in difficulty to manage and secure these networks. The proliferation of 802.11 wireless networks has heightened this problem by extending networks beyond physical boundaries. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC). This mechanism can be applied to support the detection of unauthorize...

  12. A Review of Various Security Protocols in Wireless Sensor Network

    OpenAIRE

    Anupma Sangwan; Deepti Sindhu; Kulbir Singh

    2011-01-01

    Sensor networks are highly distributed networks of small, lightweight wireless sensor nodes, deployed in large numbers to monitor the environment or system by the measurement of physical parameters such as temperature, pressure, or relative humidity, sound, vibration, motion or pollutants, at different locations. A WSN [1] is composed of a large number of low-cost sensor nodes (SNs) and one or several base stations (BS) or destination nodes. SNs are typically small wireless devices with limit...

  13. Truncated power control for improving TCP/IP performance over CDMA wireless links

    DEFF Research Database (Denmark)

    Cianca, Ernestina; Prasad, Ramjee; De Sanctis, Mauro

    2005-01-01

    The issue of the performance degradation of transmission control protocol/Internet Protocol (TCP/IP) over wireless links due to the presence of noncongestion-related packet losses has been addressed with a physical layer approach. The effectiveness of automatic repeat request techniques...... in enhancing TCP/IP performance depends on the tradeoff between frame transmission delay and residual errors after retransmissions. The paper shows how a truncated power control can be effectively applied to improve that tradeoff so that a higher transmission reliability is provided without increasing...... the frame transmission delay through the radio link layer and without increasing the energy consumption. An analytical framework has been developed to show the feasibility and effectiveness of the proposed power control. The analytical results, which are carried out assuming a constant multiuser...

  14. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José

    2014-01-01

    compare the transmission performances in terms of achievable wireless distances with and without using a high-frequency electrical power amplifier at the wireless transmitter. A downlink 16-Gbit/s QPSK signal and an uplink 1.25-Gbit/s ASK signal transmission over the two implementations are experimentally......We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...... the transmission performances in two scenarios: a fiber-wireless access link that directly provide high-speed connections to wireless end users, and a fiber-wireless-fiber signal relay where a high capacity wireless link can be used to bridge two access fiber spans over physical obstacles. In both scenarios, we...

  15. Evolution of Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  16. TULIP: A Link-Level Protocol for Improving TCP over Wireless Links

    National Research Council Canada - National Science Library

    Parsa, Christina; Garcia-Luna-Aceves, J. J

    1999-01-01

    We present the transport unaware link improvement protocol (TULIP), which dramatically improves the performance of TCP over lossy wireless links, without competing with or modifying the transport- or network-layer protocols...

  17. Mass-physical properties of surficial sediments on the Rhoˆne continental margin: implications for the nepheloid benthic layer

    Science.gov (United States)

    Chassefiere, Bernard

    1990-09-01

    Mass-physical properties of the surficial (upper 5 m) sediments on the Gulf of Lions continental margin were analysed, from more than 100 short (1 m) and longer (5 m) cores obtained during several cruises. Data include water content, unit weight, Atterberg limits (liquid limit, plastic limit, plasticity index), shear strength and compression index, and are used to determine: first, the mass property distribution, according to the main parameters influencing mass-physical properties; the relationships between these properties and the nepheloid layer on the shelf. The shoreline (lagoons) and inner shelf are characterized by low density and shear strength and high water content deposits, due to electrochemical flocculation of the sediment. The outer shelf is blanketed by higher density and shear strength and lower water content deposits generated by normal settling of suspended particles. On the inner shelf, during river peak discharges, a short-term thin bottom layer of "yogurt-like" [ FASS (1985) Geomarine Letters, 4, 147-152; FASS (1986) Continental Shelf Research, 6, 189-208] fluid-mud (unit weight lower than 1.3 mg m -3) is supplied, by a bottom nepheloid layer. During stormy periods, this "yogurt-like" layer (about 10 cm thick) partly disappears by resuspension of suspended particulate matter; this is advected, in the bottom nepheloid layer, over the shelf and the canyons within the upper slope.

  18. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  19. Reactor building indoor wireless network channel quality estimation using RSSI measurement of wireless sensor network

    International Nuclear Information System (INIS)

    Merat, S.

    2008-01-01

    Expanding wireless communication network reception inside reactor buildings (RB) and service wings (SW) has always been a technical challenge for operations service team. This is driven by the volume of metal equipment inside the Reactor Buildings (RB) that blocks and somehow shields the signal throughout the link. In this study, to improve wireless reception inside the Reactor Building (RB), an experimental model using indoor localization mesh based on IEEE 802.15 is developed to implement a wireless sensor network. This experimental model estimates the distance between different nodes by measuring the RSSI (Received Signal Strength Indicator). Then by using triangulation and RSSI measurement, the validity of the estimation techniques is verified to simulate the physical environmental obstacles, which block the signal transmission. (author)

  20. Reactor building indoor wireless network channel quality estimation using RSSI measurement of wireless sensor network

    Energy Technology Data Exchange (ETDEWEB)

    Merat, S. [Wardrop Engineering Inc., Toronto, Ontario (Canada)

    2008-07-01

    Expanding wireless communication network reception inside reactor buildings (RB) and service wings (SW) has always been a technical challenge for operations service team. This is driven by the volume of metal equipment inside the Reactor Buildings (RB) that blocks and somehow shields the signal throughout the link. In this study, to improve wireless reception inside the Reactor Building (RB), an experimental model using indoor localization mesh based on IEEE 802.15 is developed to implement a wireless sensor network. This experimental model estimates the distance between different nodes by measuring the RSSI (Received Signal Strength Indicator). Then by using triangulation and RSSI measurement, the validity of the estimation techniques is verified to simulate the physical environmental obstacles, which block the signal transmission. (author)

  1. Bandwidth Estimation in Wireless Lans for Multimedia Streaming Services

    Directory of Open Access Journals (Sweden)

    Heung Ki Lee

    2007-01-01

    Full Text Available The popularity of multimedia streaming services via wireless networks presents major challenges in the management of network bandwidth. One challenge is to quickly and precisely estimate the available bandwidth for the decision of streaming rates of layered and scalable multimedia services. Previous studies based on wired networks are too burdensome to be applied to multimedia applications in wireless networks. In this paper, a new method, IdleGap, is suggested to estimate the available bandwidth of a wireless LAN based on the information from a low layer in the protocol stack. We use a network simulation tool, NS-2, to evaluate our new method with various ranges of cross-traffic and observation times. Our simulation results show that IdleGap accurately estimates the available bandwidth for all ranges of cross-traffic (100 Kbps ∼ 1 Mbps with a very short observation time of 10 seconds.

  2. Physical modeling of emergency emission in the atmosphere (experimental investigation of Lagrangian turbulence characteristics in the surface and boundary layer of the atmosphere)

    International Nuclear Information System (INIS)

    Garger, E.K.

    2013-01-01

    Results of diffusion experiments simulating emergency emission in the surface and boundary layers of the atmosphere are presented. Interpretation of measurements in the surface layer of the atmosphere had been conducted on the basis of the Lagrangian similarity hypothesis., Results of measurements in the boundary layer of the atmosphere are interpreted with use of the homogeneous turbulence theory. Regimes of turbulent diffusion from land and low sources of admixtures predicted by the Lagrangian similarity hypothesis for various conditions of thermal stratification in the surface layer of the atmosphere are experimentally confirmed. Universal empirical constants for these regimes are received that allows to use their in practice. Calculation diffusion parameters and concentrations of an admixture from various sources in the surface layer of the atmosphere by model is presented. Results of calculation on this model are compared to independent measurements of mass concentration of a admixture in horizontal and vertical planes. Results of simultaneous measurements Eulerian and Lagrangian turbulence characteristics for various diffusion times in the boundary layer of the atmosphere have allowed to estimate turbulence time scales in Lagrangian variables for conditions close to neutral thermal stratification. The monograph is intended for scientists and students engaged in the field of meteorology, physics of the atmosphere and pollution air control, services of radiation and ecological safety

  3. Localization in Wireless Networks Foundations and Applications

    CERN Document Server

    Sanford, Jessica Feng; Slijepcevic, Sasha

    2012-01-01

    In a computational tour-de-force, this volume wipes away a host of problems related to location discovery in wireless ad-hoc sensor networks. WASNs have recognized potential in many applications that are location-dependent, yet are heavily constrained by factors such as cost and energy consumption. Their “ad-hoc” nature, with direct rather than mediated connections between a network of wireless devices, adds another layer of difficulty.   Basing this work entirely on data-driven, coordinated algorithms, the authors' aim is to present location discovery techniques that are highly accurate—and which fit user criteria. The research deploys nonparametric statistical methods and relies on the concept of joint probability to construct error (including location error) models and environmental field models. It also addresses system issues such as the broadcast and scheduling of the beacon. Reporting an impressive accuracy gain of almost 17 percent, and organized in a clear, sequential manner, this book represe...

  4. Experimental validation of wireless communication with chaos

    Energy Technology Data Exchange (ETDEWEB)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian [Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing, Xian University of Technology, Xian 710048 (China); Baptista, Murilo S.; Grebogi, Celso [Institute for Complex System and Mathematical Biology, SUPA, University of Aberdeen, Aberdeen AB24 3UE (United Kingdom)

    2016-08-15

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  5. Experimental validation of wireless communication with chaos

    International Nuclear Information System (INIS)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian; Baptista, Murilo S.; Grebogi, Celso

    2016-01-01

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  6. Optical wireless connected objects for healthcare.

    Science.gov (United States)

    Toumieux, Pascal; Chevalier, Ludovic; Sahuguède, Stéphanie; Julien-Vergonjanne, Anne

    2015-10-01

    In this Letter the authors explore the communication capabilities of optical wireless technology for a wearable device dedicated to healthcare application. In an indoor environment sensible to electromagnetic perturbations such as a hospital, the use of optical wireless links can permit reducing the amount of radio frequencies in the patient environment. Moreover, this technology presents the advantage to be secure, low-cost and easy to deploy. On the basis of commercially available components, a custom-made wearable device is presented, which allows optical wireless transmission of accelerometer data in the context of physical activity supervision of post-stroke patients in hospital. Considering patient mobility, the experimental performance is established in terms of packet loss as a function of the number of receivers fixed to the ceiling. The results permit to conclude that optical wireless links can be used to perform such mobile remote monitoring applications. Moreover, based on the measurements obtained with one receiver, it is possible to theoretically determine the performance according to the number of receivers to be deployed.

  7. Experimental validation of wireless communication with chaos.

    Science.gov (United States)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian; Baptista, Murilo S; Grebogi, Celso

    2016-08-01

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  8. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  9. Midfield wireless powering of subwavelength autonomous devices.

    Science.gov (United States)

    Kim, Sanghoek; Ho, John S; Poon, Ada S Y

    2013-05-17

    We obtain an analytical bound on the efficiency of wireless power transfer to a weakly coupled device. The optimal source is solved for a multilayer geometry in terms of a representation based on the field equivalence principle. The theory reveals that optimal power transfer exploits the properties of the midfield to achieve efficiencies far greater than conventional coil-based designs. As a physical realization of the source, we present a slot array structure whose performance closely approaches the theoretical bound.

  10. Scaling Laws for Heterogeneous Wireless Networks

    Science.gov (United States)

    2009-09-01

    planned and the size of communication networks that are fundamentally understood. On the one hand, wireline networks (like the Internet) have grown from...Franceschetti, Marco D. Migliore, and Paolo Minero . The capacity of wireless networks: Information-theoretic and physical limits. In Proceedings of the...Allerton Conference on Communication, Control, and Computing, September 2007. [12] Massimo Franceschetti, Marco D. Migliore, and Paolo Minero . The

  11. Wireless sensor platform

    Science.gov (United States)

    Joshi, Pooran C.; Killough, Stephen M.; Kuruganti, Phani Teja

    2017-08-08

    A wireless sensor platform and methods of manufacture are provided. The platform involves providing a plurality of wireless sensors, where each of the sensors is fabricated on flexible substrates using printing techniques and low temperature curing. Each of the sensors can include planar sensor elements and planar antennas defined using the printing and curing. Further, each of the sensors can include a communications system configured to encode the data from the sensors into a spread spectrum code sequence that is transmitted to a central computer(s) for use in monitoring an area associated with the sensors.

  12. Wireless Testbed Bonsai

    Science.gov (United States)

    2006-02-01

    wireless sensor device network, and a about 200 Stargate nodes higher-tier multi-hop peer- to-peer 802.11b wireless network. Leading up to the full ExScal...deployment, we conducted spatial scaling tests on our higher-tier protocols on a 7 × 7 grid of Stargates nodes 45m and with 90m separations respectively...onW and its scaled version W̃ . III. EXPERIMENTAL SETUP Description of Kansei testbed. A stargate is a single board linux-based computer [7]. It uses a

  13. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  14. Wireless optical telecommunications

    CERN Document Server

    Bouchet, Olivier

    2013-01-01

    Wireless optical communication refers to communication based on the unguided propagation of optical waves. The past 30 years have seen significant improvements in this technique - a wireless communication solution for the current millennium - that offers an alternative to radio systems; a technique that could gain attractiveness due to recent concerns regarding the potential effects of radiofrequency waves on human health.The aim of this book is to look at the free space optics that are already used for the exchange of current information; its many benefits, such as incorporating chan

  15. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  16. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  17. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  18. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  19. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  20. Capacity analysis of wireless mesh networks | Gumel | Nigerian ...

    African Journals Online (AJOL)

    ... number of nodes (n) in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network. Key words: Wireless mesh network (WMN), Adhoc network, Network capacity analysis, Bottleneck collision domain, Medium access control ...

  1. Liquid-crystal intraocular adaptive lens with wireless control

    NARCIS (Netherlands)

    Simonov, A.N.; Vdovine, G.V.; Loktev, M.

    2007-01-01

    We present a prototype of an adaptive intraocular lens based on a modal liquid-crystal spatial phase modulator with wireless control. The modal corrector consists of a nematic liquid-crystal layer sandwiched between two glass substrates with transparent low- and high-ohmic electrodes, respectively.

  2. Three-dimensional direct numerical simulation of electromagnetically driven multiscale shallow layer flows: Numerical modeling and physical properties

    Science.gov (United States)

    Lardeau, Sylvain; Ferrari, Simone; Rossi, Lionel

    2008-12-01

    Three-dimensional (3D) direct numerical simulations of a flow driven by multiscale electromagnetic forcing are performed in order to reproduce with maximum accuracy the quasi-two-dimensional (2D) flow generated by the same multiscale forcing in the laboratory. The method presented is based on a 3D description of the flow and the electromagnetic forcing. Very good agreements between our simulations and the experiments are found both on velocity and acceleration field, this last comparison being, to our knowledge, done for the first time. Such agreement requires that both experiments and simulations are carefully performed and, more importantly, that the underlying simplification to model the experiments and the multiscale electromagnetic forcing do not introduce significant errors. The results presented in this paper differ significantly from previous 2D direct numerical simulation in which a classical linear Rayleigh friction modeling term was used to mimic the effect of the wall-normal friction. Indeed, purely 2D simulations are found to underestimate the Reynolds number and, due to the dominance of nonhomogeneous bottom friction, lead to the wrong physical mechanism. For the range of conditions presented in this paper, the Reynolds number, defined by the ratio between acceleration and viscous terms, remains the order of unity, and the Hartmann number, defined by the ratio between electromagnetic force terms and viscous terms, is about 2. The main conclusion is that 3D simulations are required to model the (3D) electromagnetic forces and the wall-normal shear. Indeed, even if the flow is quasi-2D in terms of energy, a full 3D approach is required to simulate these shallow layer flows driven by multiscale electromagnetic forcing. In the range of forcing intensity investigated in this paper, these multiscale flows remain quasi-2D, with negligible energy in the wall-normal velocity component. It is also shown that the driving terms are the electromagnetic forcing and

  3. A Novel Passive Wireless Sensor for Concrete Humidity Monitoring.

    Science.gov (United States)

    Zhou, Shuangxi; Deng, Fangming; Yu, Lehua; Li, Bing; Wu, Xiang; Yin, Baiqiang

    2016-09-20

    This paper presents a passive wireless humidity sensor for concrete monitoring. After discussing the transmission of electromagnetic wave in concrete, a novel architecture of wireless humidity sensor, based on Ultra-High Frequency (UHF) Radio Frequency Identification (RFID) technology, is proposed for low-power application. The humidity sensor utilizes the top metal layer to form the interdigitated electrodes, which were then filled with polyimide as the humidity sensing layer. The sensor interface converts the humidity capacitance into a digital signal in the frequency domain. A two-stage rectifier adopts a dynamic bias-voltage generator to boost the effective gate-source voltage of the switches in differential-drive architecture. The clock generator employs a novel structure to reduce the internal voltage swing. The measurement results show that our proposed wireless humidity can achieve a high linearity with a normalized sensitivity of 0.55% %RH at 20 °C. Despite the high losses of concrete, the proposed wireless humidity sensor achieves reliable communication performances in passive mode. The maximum operating distance is 0.52 m when the proposed wireless sensor is embedded into the concrete at the depth of 8 cm. The measured results are highly consistent with the results measured by traditional methods.

  4. A Novel Passive Wireless Sensor for Concrete Humidity Monitoring

    Directory of Open Access Journals (Sweden)

    Shuangxi Zhou

    2016-09-01

    Full Text Available This paper presents a passive wireless humidity sensor for concrete monitoring. After discussing the transmission of electromagnetic wave in concrete, a novel architecture of wireless humidity sensor, based on Ultra-High Frequency (UHF Radio Frequency Identification (RFID technology, is proposed for low-power application. The humidity sensor utilizes the top metal layer to form the interdigitated electrodes, which were then filled with polyimide as the humidity sensing layer. The sensor interface converts the humidity capacitance into a digital signal in the frequency domain. A two-stage rectifier adopts a dynamic bias-voltage generator to boost the effective gate-source voltage of the switches in differential-drive architecture. The clock generator employs a novel structure to reduce the internal voltage swing. The measurement results show that our proposed wireless humidity can achieve a high linearity with a normalized sensitivity of 0.55% %RH at 20 °C. Despite the high losses of concrete, the proposed wireless humidity sensor achieves reliable communication performances in passive mode. The maximum operating distance is 0.52 m when the proposed wireless sensor is embedded into the concrete at the depth of 8 cm. The measured results are highly consistent with the results measured by traditional methods.

  5. A Novel Passive Wireless Sensor for Concrete Humidity Monitoring

    Science.gov (United States)

    Zhou, Shuangxi; Deng, Fangming; Yu, Lehua; Li, Bing; Wu, Xiang; Yin, Baiqiang

    2016-01-01

    This paper presents a passive wireless humidity sensor for concrete monitoring. After discussing the transmission of electromagnetic wave in concrete, a novel architecture of wireless humidity sensor, based on Ultra-High Frequency (UHF) Radio Frequency Identification (RFID) technology, is proposed for low-power application. The humidity sensor utilizes the top metal layer to form the interdigitated electrodes, which were then filled with polyimide as the humidity sensing layer. The sensor interface converts the humidity capacitance into a digital signal in the frequency domain. A two-stage rectifier adopts a dynamic bias-voltage generator to boost the effective gate-source voltage of the switches in differential-drive architecture. The clock generator employs a novel structure to reduce the internal voltage swing. The measurement results show that our proposed wireless humidity can achieve a high linearity with a normalized sensitivity of 0.55% %RH at 20 °C. Despite the high losses of concrete, the proposed wireless humidity sensor achieves reliable communication performances in passive mode. The maximum operating distance is 0.52 m when the proposed wireless sensor is embedded into the concrete at the depth of 8 cm. The measured results are highly consistent with the results measured by traditional methods. PMID:27657070

  6. Physics of Transitional Shear Flows Instability and Laminar–Turbulent Transition in Incompressible Near-Wall Shear Layers

    CERN Document Server

    Boiko, Andrey V; Grek, Genrih R; Kozlov, Victor V

    2012-01-01

    Starting from fundamentals of classical stability theory, an overview is given of the transition phenomena in subsonic, wall-bounded shear flows. At first, the consideration focuses on elementary small-amplitude velocity perturbations of laminar shear layers, i.e. instability waves, in the simplest canonical configurations of a plane channel flow and a flat-plate boundary layer. Then the linear stability problem is expanded to include the effects of pressure gradients, flow curvature, boundary-layer separation, wall compliance, etc. related to applications. Beyond the amplification of instability waves is the non-modal growth of local stationary and non-stationary shear flow perturbations which are discussed as well. The volume continues with the key aspect of the transition process, that is, receptivity of convectively unstable shear layers to external perturbations, summarizing main paths of the excitation of laminar flow disturbances. The remainder of the book addresses the instability phenomena found at l...

  7. Miniaturized wireless sensor network

    OpenAIRE

    Lecointre , Aubin; Dragomirescu , Daniela; Dubuc , David; Grenier , Katia; Pons , Patrick; Aubert , Hervé; Müller , A.; Berthou , Pascal; Gayraud , Thierry; Plana , Robert

    2006-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  8. Future of wireless communication

    Energy Technology Data Exchange (ETDEWEB)

    Barker, M

    1996-12-31

    This document reproduces slides from a conference presentation giving an overview of current and upcoming wireless communication methods of interest to Canadian electric utilities. Both voice and data communication methods are considered, including cellular telephone, satellite communications, personal communication services, regulated licensed arrowband data systems, and integrated services.

  9. Wired vs. Wireless.

    Science.gov (United States)

    Fielding, Randall

    2000-01-01

    Presents a debate on which technology will be in tomorrow's classrooms and the pros and cons of wiring classrooms and using a wireless network. Concluding comments address the likelihood, and desirability, of placing computers throughout the entire educational process and what types of computers and capabilities are needed. (GR)

  10. Wireless Remote Control System

    Directory of Open Access Journals (Sweden)

    Adrian Tigauan

    2012-06-01

    Full Text Available This paper presents the design of a wireless remote control system based on the ZigBee communication protocol. Gathering data from sensors or performing control tasks through wireless communication is advantageous in situations in which the use of cables is impractical. An Atmega328 microcontroller (from slave device is used for gathering data from the sensors and transmitting it to a coordinator device with the help of the XBee modules. The ZigBee standard is suitable for low-cost, low-data-rate and low-power wireless networks implementations. The XBee-PRO module, designed to meet ZigBee standards, requires minimal power for reliable data exchange between devices over a distance of up to 1600m outdoors. A key component of the ZigBee protocol is the ability to support networking and this can be used in a wireless remote control system. This system may be employed e.g. to control temperature and humidity (SHT11 sensor and light intensity (TSL230 sensor levels inside a commercial greenhouse.

  11. Building the Wireless Campus

    Science.gov (United States)

    Gerraughty, James F.; Shanafelt, Michael E.

    2005-01-01

    This prototype is a continuation of a series of wireless prototypes which began in August 2001 and was reported on again in August 2002. This is the final year of this prototype. This continuation allowed Saint Francis University's Center of Excellence for Remote and Medically Under-Served Areas (CERMUSA) to refine the existing WLAN for the Saint…

  12. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  13. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  14. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  15. NASA Bluetooth Wireless Communications

    Science.gov (United States)

    Miller, Robert D.

    2007-01-01

    NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.

  16. A Cross-Layer Approach in Sensing and Resource Allocation for Multimedia Transmission over Cognitive UWB Networks

    Directory of Open Access Journals (Sweden)

    Lo ACC

    2010-01-01

    Full Text Available We propose an MAC centric cross-layer approach to address the problem of multimedia transmission over cognitive Ultra Wideband (C-UWB networks. Several fundamental design issues, which are related to application (APP, medium access control (MAC, and physical (PHY layer, are discussed. Although substantial research has been carried out in the PHY layer perspective of cognitive radio system, this paper attempts to extend the existing research paradigm to MAC and APP layers, which can be considered as premature at this time. This paper proposed a cross-layer design that is aware of (a UWB wireless channel conditions, (b time slot allocations at the MAC layer, and (c MPEG-4 video at the APP layer. Two cooperative sensing mechanisms, namely, AND and OR, are analyzed in terms of probability of detection ( , probability of false alarm ( , and the required sensing period. Then, the impact of sensing scheduling to the MPEG-4 video transmission over wireless cognitive UWB networks is observed. In addition, we also proposed the packet reception rate- (PRR- based resource allocation scheme that is aware of the channel condition, target PRR, and queue status.

  17. Analysis of Wireless Sensor Network Topology and Estimation of Optimal Network Deployment by Deterministic Radio Channel Characterization

    Directory of Open Access Journals (Sweden)

    Erik Aguirre

    2015-02-01

    Full Text Available One of the main challenges in the implementation and design of context-aware scenarios is the adequate deployment strategy for Wireless Sensor Networks (WSNs, mainly due to the strong dependence of the radiofrequency physical layer with the surrounding media, which can lead to non-optimal network designs. In this work, radioplanning analysis for WSN deployment is proposed by employing a deterministic 3D ray launching technique in order to provide insight into complex wireless channel behavior in context-aware indoor scenarios. The proposed radioplanning procedure is validated with a testbed implemented with a Mobile Ad Hoc Network WSN following a chain configuration, enabling the analysis and assessment of a rich variety of parameters, such as received signal level, signal quality and estimation of power consumption. The adoption of deterministic radio channel techniques allows the design and further deployment of WSNs in heterogeneous wireless scenarios with optimized behavior in terms of coverage, capacity, quality of service and energy consumption.

  18. Implementation of a Low-Cost Energy and Environment Monitoring System Based on a Hybrid Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Dong Sik Kim

    2017-01-01

    Full Text Available A low-cost hybrid wireless sensor network (WSN that utilizes the 917 MHz band Wireless Smart Utility Network (Wi-SUN and a 447 MHz band narrow bandwidth communication network is implemented for electric metering and room temperature, humidity, and CO2 gas measurements. A mesh network connection that is commonly utilized for the Internet of Things (IoT is used for the Wi-SUN under the Contiki OS, and a star connection is used for the narrow bandwidth network. Both a duty-cycling receiver algorithm and a digitally controlled temperature-compensated crystal oscillator algorithm for frequency reference are implemented at the physical layer of the receiver to accomplish low-power and low-cost wireless sensor node design. A two-level temperature-compensation approach, in which first a fixed third-order curve and then a sample-based first-order curve are applied, is proposed using a conventional AT-cut quartz crystal resonator. The developed WSN is installed in a home and provides reliable data collection with low construction complexity and power consumption.

  19. Group-Orthogonal Code-Division Multiplex: A Physical-Layer Enhancement for IEEE 802.11n Networks

    Directory of Open Access Journals (Sweden)

    Felip Riera-Palou

    2010-01-01

    Full Text Available The new standard for wireless local area networks (WLANs, named IEEE 802.11n, has been recently released. This new norm builds upon and remains compatible with the previous WLANs standards IEEE 802.11a/g while it is able to achieve transmission rates of up to 600 Mbps. These increased data rates are mainly a consequence of two important new features: (1 multiple antenna technology at transmission and reception, and (2 optional doubling of the system bandwidth thanks to the availability of an additional 20 MHz band. This paper proposes the use of Group-Orthogonal Code Division Multiplex (GO-CDM as a means to improve the performance of the 802.11n standard by further exploiting the inherent frequency diversity. It is explained why GO-CDM synergistically matches with the two aforementioned new features and the performance gains it can offer under different configurations is illustrated. Furthermore, the effects that group-orthogonal has on key implementation issues such as channel estimation, carrier frequency offset, and peak-to-average power ratio (PAPR are also considered.

  20. Wireless transmission: state of research, applications, trends

    International Nuclear Information System (INIS)

    Berger, A.

    2016-01-01

    At the end of the 19th century Nikola Tesla started his work in the field of wireless energy transmission. More than 100 years after Tesla, the progress in modern semiconductor technology offer developers the possibility to realize highly efficient systems and have led to a revival of wireless energy transmission. The application ranges from the transmission of a few milliwatts in biomedical applications, over a few watts for the charging of mobile phones, to hundreds of kilowatts in the automotive sector. Depending on the used method, the possible transmission distances vary between a few centimeters up to thousands of kilometers. The physical basis of these technologies is the transmission of energy by electromagnetic waves. State-of-the-art systems use wavelengths ranging from radio waves to microwaves, to ultraviolet light. Current research focuses on optimizing transmission efficiency, increasing the possible transmission distance between transmitter and receiver, and improving spatial freedom of movement. This lecture gives an overview of the different approaches of wireless energy transmission and their physical background, the established industrial standards and the current state of research. In addition, the advantages and disadvantages of the individual methods are illustrated by selected commercial and scientific applications. (rössner) [de

  1. Ubiquitous Wireless Smart Sensing and Control

    Science.gov (United States)

    Wagner, Raymond

    2013-01-01

    Need new technologies to reliably and safely have humans interact within sensored environments (integrated user interfaces, physical and cognitive augmentation, training, and human-systems integration tools). Areas of focus include: radio frequency identification (RFID), motion tracking, wireless communication, wearable computing, adaptive training and decision support systems, and tele-operations. The challenge is developing effective, low cost/mass/volume/power integrated monitoring systems to assess and control system, environmental, and operator health; and accurately determining and controlling the physical, chemical, and biological environments of the areas and associated environmental control systems.

  2. Structure and physical properties for a new layered pnictide-oxide: BaTi2As2O

    International Nuclear Information System (INIS)

    Wang, X F; Yan, Y J; Ying, J J; Li, Q J; Zhang, M; Xu, N; Chen, X H

    2010-01-01

    We have successfully synthesized a new layered pnictide-oxide: BaTi 2 As 2 O. It shares similar characteristics with Na 2 Ti 2 Sb 2 O. The crystal has a layered structure with a tetragonal P4/nmm group (a = 4.047(3) A, c = 7.275(4) A). The resistivity shows an anomaly at 200 K, which should be ascribed to an SDW or structural transition. The SDW or structural transition is confirmed by magnetic susceptibility and heat capacity measurements. These behaviors are very similar to those observed in parent compounds of high-T c iron-based pnictide superconductors, in which the superconductivity shows up when the anomaly due to the SDW or structural transition is suppressed. Therefore, the new layered pnictide-oxide, BaTi 2 As 2 O, could be a potential parent compound for superconductivity. It is found that Li + doping significantly suppresses the anomaly, but no superconductivity emerges so far.

  3. NASA Fuel Tank Wireless Power and Signal Study

    Science.gov (United States)

    Merrill, Garrick

    2015-01-01

    Hydro Technologies has developed a custom electronics and mechanical framework for interfacing with off-the-shelf sensors to achieve through barrier sensing solutions. The core project technology relies on Hydro Technologies Wireless Power and Signal Interface (Wi psi) System for transmitting data and power wirelessly using magnetic fields. To accomplish this, Wi psi uses a multi-frequency local magnetic field to produce magnetic fields capable of carrying data and power through almost any material such as metals, seawater, concrete, and air. It will also work through layers of multiple materials.

  4. Novel Reduced-Feedback Wireless Communication Systems

    KAUST Repository

    Shaqfeh, Mohammad Obaidah; Alnuweiri, Hussein; Alouini, Mohamed-Slim

    2011-01-01

    We have recently contributed to this field and published several journal and conference papers. We are the pioneers to propose a novel reduced-feedback opportunistic scheduling scheme that combines many desired features including fairness in resources distribution across the active terminals and distributed processing at the MAC layer level. In addition our scheme operates close to the upper capacity limits of achievable transmission rates over wireless links. We have also proposed another hybrid scheme that enables adjusting the feedback load flexibly based on rates requirements. We are currently investigating other novel ideas to design reduced-feedback communication systems.

  5. Wireless Communications Device Wakeup Method and System

    NARCIS (Netherlands)

    Drago, S.; Sebastiano, F.; Leenaerts, D.M.W.; Breems, L.J.

    2008-01-01

    Abstract of WO 2009044368 Disclosed are wakeable wireless communications devices, and methods for waking wireless communications devices, for use in a wireless network of such devices. The devices communicate during respectively-designated timeslots according to a communications protocol. The

  6. Multilayered security and privacy protection in Car-to-X networks solutions from application down to physical layer

    CERN Document Server

    Stübing, Hagen

    2013-01-01

    Car-to-X (C2X) communication in terms of Car-to-Car (C2C) and Car-to-Infrastructure (C2I) communication aims at increasing road safety and traffic efficiency by exchanging foresighted traffic information. Thereby, security and privacy are regarded as an absolute prerequisite for successfully establishing the C2X technology on the market. Towards the paramount objective of covering the entire ITS reference model with security and privacy measures, Hagen Stübing develops dedicated solutions for each layer, respectively. On application layer a security architecture in terms of a Public Key Infras

  7. Passive Classification of Wireless NICs during Rate Switching

    Directory of Open Access Journals (Sweden)

    Cherita L. Corbett

    2008-02-01

    Full Text Available Computer networks have become increasingly ubiquitous. However, with the increase in networked applications, there has also been an increase in difficulty to manage and secure these networks. The proliferation of 802.11 wireless networks has heightened this problem by extending networks beyond physical boundaries. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC. This mechanism can be applied to support the detection of unauthorized systems that use NICs which are different from that of a legitimate system. We focus on rate switching, a vaguely specified mechanism required by the 802.11 standard that is implemented in the hardware and software of the wireless NIC. We show that the implementation of this function influences the transmission patterns of a wireless stream, which are observable through traffic analysis. Our mechanism for NIC identification uses signal processing to analyze the periodicity embedded in the wireless traffic caused by rate switching. A stable spectral profile is created from the periodic components of the traffic and used for the identity of the wireless NIC. We show that we can distinguish between NICs manufactured by different vendors and NICs manufactured by the same vendor using their spectral profiles.

  8. Passive Classification of Wireless NICs during Rate Switching

    Directory of Open Access Journals (Sweden)

    Beyah RaheemA

    2008-01-01

    Full Text Available Abstract Computer networks have become increasingly ubiquitous. However, with the increase in networked applications, there has also been an increase in difficulty to manage and secure these networks. The proliferation of 802.11 wireless networks has heightened this problem by extending networks beyond physical boundaries. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC. This mechanism can be applied to support the detection of unauthorized systems that use NICs which are different from that of a legitimate system. We focus on rate switching, a vaguely specified mechanism required by the 802.11 standard that is implemented in the hardware and software of the wireless NIC. We show that the implementation of this function influences the transmission patterns of a wireless stream, which are observable through traffic analysis. Our mechanism for NIC identification uses signal processing to analyze the periodicity embedded in the wireless traffic caused by rate switching. A stable spectral profile is created from the periodic components of the traffic and used for the identity of the wireless NIC. We show that we can distinguish between NICs manufactured by different vendors and NICs manufactured by the same vendor using their spectral profiles.

  9. Temperature estimation of induction machines based on wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Y. Huang

    2018-04-01

    Full Text Available In this paper, a fourth-order Kalman filter (KF algorithm is implemented in the wireless sensor node to estimate the temperatures of the stator winding, the rotor cage and the stator core in the induction machine. Three separate wireless sensor nodes are used as the data acquisition systems for different input signals. Six Hall sensors are used to acquire the three-phase stator currents and voltages of the induction machine. All of them are processed to root mean square (rms in ampere and volt. A rotary encoder is mounted for the rotor speed and Pt-1000 is used for the temperature of the coolant air. The processed signals in the physical unit are transmitted wirelessly to the host wireless sensor node, where the KF is implemented with fixed-point arithmetic in Contiki OS. Time-division multiple access (TDMA is used to make the wireless transmission more stable. Compared to the floating-point implementation, the fixed-point implementation has the same estimation accuracy at only about one-fifth of the computation time. The temperature estimation system can work under any work condition as long as there are currents through the machine. It can also be rebooted for estimation even when wireless transmission has collapsed or packages are missing.

  10. Competition in the domain of wireless networks security

    Science.gov (United States)

    Bednarczyk, Mariusz

    2017-04-01

    Wireless networks are very popular and have found wide spread usage amongst various segments, also in military environment. The deployment of wireless infrastructures allow to reduce the time it takes to install and dismantle communications networks. With wireless, users are more mobile and can easily get access to the network resources all the time. However, wireless technologies like WiFi or Bluetooth have security issues that hackers have extensively exploited over the years. In the paper several serious security flaws in wireless technologies are presented. Most of them enable to get access to the internal networks and easily carry out man-in-the-middle attacks. Very often, they are used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum. For instance, there are well known instances of Bluetooth connection spoofing in order to steal WiFi password stored in the mobile device. To raise the security awareness and protect wireless networks against an adversary attack, an analysis of attack methods and tools over time is presented in the article. The particular attention is paid to the severity, possible targets as well as the ability to persist in the context of protective measures. Results show that an adversary can take complete control of the victims' mobile device features if the users forget to use simple safety principles.

  11. Utilizing Cross-Layer Information to Improve Performance in JPEG2000 Decoding

    Directory of Open Access Journals (Sweden)

    Hannes Persson

    2007-01-01

    Full Text Available We focus on wireless multimedia communication and investigate how cross-layer information can be used to improve performance at the application layer, using JPEG2000 as an example. The cross-layer information is in the form of soft information from the physical layer. The soft information, which is supplied by a soft decision demodulator, yields reliability measures for the received bits and is fed into two soft input iterative JPEG2000 image decoders. When errors are detected with the error detecting mechanisms in JPEG2000, the decoders utilize the soft information to point out likely transmission errors. Hence, the decoders can correct errors and increase the image quality without making time-consuming retransmissions. We believe that the proposed decoding method utilizing soft information is suitable for a general IP-based network and that it keeps the principles of a layered structure of the protocol stack intact. Further, experimental results with images transmitted over a simulated wireless channel show that a simple decoding algorithm that utilizes soft information can give high gains in image quality compared to the standard hard-decision decoding.

  12. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  13. Security For Wireless Sensor Network

    OpenAIRE

    Saurabh Singh,; Dr. Harsh Kumar Verma

    2011-01-01

    Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodescommunicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks aredeployed in hostile environments. Environmental conditions along with resource-constraints give...

  14. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  15. An Assessment of Emerging Wireless Broadband Technologies

    National Research Council Canada - National Science Library

    Fountanas, Leonidas

    2001-01-01

    ... technologies in providing broadband services today, emerging wireless broadband technologies are expected to significantly increase their market share over the next years, Deploying a wireless network...

  16. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network.

    Science.gov (United States)

    Taboun, Mohammed S; Brennan, Robert W

    2017-09-14

    With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network.

  17. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network

    Science.gov (United States)

    Brennan, Robert W.

    2017-01-01

    With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network. PMID:28906452

  18. Photonics in wireless transceivers

    International Nuclear Information System (INIS)

    Bogani, A.; Ghelfi, P.

    2013-01-01

    During the last few years, the cross-fertilization between photonics and radio systems has been helping to overcome some major limitations of the classical radio technologies, setting new paradigms, and promising improved performance and new applications with strong benefits for public communications and safety. In particular, photonics-based wireless systems, albeit still at research level, are moving toward a new generation of multifunctional systems able to manage the wireless communication with several different frequencies and protocols, even simultaneously while also realizing surveillance operations. Photonics matches the new requirements of flexibility for software-defined architectures, thanks to its ultra-wide bandwidths and ease of tunability, and guarantees low footprint and weight, thanks to integrated photonic technologies. Moreover, photonics also allows increased resolution and sensitivity by means of the inherent low phase noise of lasers. (author)

  19. Wireless infrared computer control

    Science.gov (United States)

    Chen, George C.; He, Xiaofei

    2004-04-01

    Wireless mouse is not restricted by cable"s length and has advantage over its wired counterpart. However, all the mice available in the market have detection range less than 2 meters and angular coverage less than 180 degrees. Furthermore, commercial infrared mice are based on track ball and rollers to detect movements. This restricts them to be used in those occasions where users want to have dynamic movement, such as presentations and meetings etc. This paper presents our newly developed infrared wireless mouse, which has a detection range of 6 meters and angular coverage of 180 degrees. This new mouse uses buttons instead of traditional track ball and is developed to be a hand-held device like remote controller. It enables users to control cursor with a distance closed to computer and the mouse to be free from computer operation.

  20. Adaptive Wireless Transceiver, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  1. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  2. Resource management for multimedia services in high data rate wireless networks

    CERN Document Server

    Zhang, Ruonan; Pan, Jianping

    2017-01-01

    This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

  3. Initial Results from an Energy-Aware Airborne Dynamic, Data-Driven Application System Performing Sampling in Coherent Boundary-Layer Structures

    Science.gov (United States)

    Frew, E.; Argrow, B. M.; Houston, A. L.; Weiss, C.

    2014-12-01

    The energy-aware airborne dynamic, data-driven application system (EA-DDDAS) performs persistent sampling in complex atmospheric conditions by exploiting wind energy using the dynamic data-driven application system paradigm. The main challenge for future airborne sampling missions is operation with tight integration of physical and computational resources over wireless communication networks, in complex atmospheric conditions. The physical resources considered here include sensor platforms, particularly mobile Doppler radar and unmanned aircraft, the complex conditions in which they operate, and the region of interest. Autonomous operation requires distributed computational effort connected by layered wireless communication. Onboard decision-making and coordination algorithms can be enhanced by atmospheric models that assimilate input from physics-based models and wind fields derived from multiple sources. These models are generally too complex to be run onboard the aircraft, so they need to be executed in ground vehicles in the field, and connected over broadband or other wireless links back to the field. Finally, the wind field environment drives strong interaction between the computational and physical systems, both as a challenge to autonomous path planning algorithms and as a novel energy source that can be exploited to improve system range and endurance. Implementation details of a complete EA-DDDAS will be provided, along with preliminary flight test results targeting coherent boundary-layer structures.

  4. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  5. Wearable wireless photoplethysmography sensors

    Science.gov (United States)

    Spigulis, Janis; Erts, Renars; Nikiforovs, Vladimirs; Kviesis-Kipge, Edgars

    2008-04-01

    Wearable health monitoring sensors may support early detection of abnormal conditions and prevention of their consequences. Recent designs of three wireless photoplethysmography monitoring devices embedded in hat, glove and sock, and connected to PC or mobile phone by means of the Bluetooth technology, are described. First results of distant monitoring of heart rate and pulse wave transit time using the newly developed devices are presented.

  6. Wireless Cellular Mobile Communications

    OpenAIRE

    Zalud, V.

    2002-01-01

    In this article is briefly reviewed the history of wireless cellular mobile communications, examined the progress in current second generation (2G) cellular standards and discussed their migration to the third generation (3G). The European 2G cellular standard GSM and its evolution phases GPRS and EDGE are described somewhat in detail. The third generation standard UMTS taking up on GSM/GPRS core network and equipped with a new advanced access network on the basis of code division multiple ac...

  7. PHYSICS

    CERN Multimedia

    P. Sphicas

    There have been three physics meetings since the last CMS week: “physics days” on March 27-29, the Physics/ Trigger week on April 23-27 and the most recent physics days on May 22-24. The main purpose of the March physics days was to finalize the list of “2007 analyses”, i.e. the few topics that the physics groups will concentrate on for the rest of this calendar year. The idea is to carry out a full physics exercise, with CMSSW, for select physics channels which test key features of the physics objects, or represent potential “day 1” physics topics that need to be addressed in advance. The list of these analyses was indeed completed and presented in the plenary meetings. As always, a significant amount of time was also spent in reviewing the status of the physics objects (reconstruction) as well as their usage in the High-Level Trigger (HLT). The major event of the past three months was the first “Physics/Trigger week” in Apri...

  8. Chemistry and physics of a single atomic layer: strategies and challenges for functionalization of graphene and graphene-based materials.

    Science.gov (United States)

    Yan, Liang; Zheng, Yue Bing; Zhao, Feng; Li, Shoujian; Gao, Xingfa; Xu, Bingqian; Weiss, Paul S; Zhao, Yuliang

    2012-01-07

    Graphene has attracted great interest for its superior physical, chemical, mechanical, and electrical properties that enable a wide range of applications from electronics to nanoelectromechanical systems. Functionalization is among the significant vectors that drive graphene towards technological applications. While the physical properties of graphene have been at the center of attention, we still lack the knowledge framework for targeted graphene functionalization. In this critical review, we describe some of the important chemical and physical processes for graphene functionalization. We also identify six major challenges in graphene research and give perspectives and practical strategies for both fundamental studies and applications of graphene (315 references). This journal is © The Royal Society of Chemistry 2012

  9. Implementation of atomic layer deposition-based AlON gate dielectrics in AlGaN/GaN MOS structure and its physical and electrical properties

    Science.gov (United States)

    Nozaki, Mikito; Watanabe, Kenta; Yamada, Takahiro; Shih, Hong-An; Nakazawa, Satoshi; Anda, Yoshiharu; Ueda, Tetsuzo; Yoshigoe, Akitaka; Hosoi, Takuji; Shimura, Takayoshi; Watanabe, Heiji

    2018-06-01

    Alumina incorporating nitrogen (aluminum oxynitride; AlON) for immunity against charge injection was grown on a AlGaN/GaN substrate through the repeated atomic layer deposition (ALD) of AlN layers and in situ oxidation in ozone (O3) ambient under optimized conditions. The nitrogen distribution was uniform in the depth direction, the composition was controllable over a wide range (0.5–32%), and the thickness could be precisely controlled. Physical analysis based on synchrotron radiation X-ray photoelectron spectroscopy (SR-XPS) revealed that harmful intermixing at the insulator/AlGaN interface causing Ga out-diffusion in the gate stack was effectively suppressed by this method. AlON/AlGaN/GaN MOS capacitors were fabricated, and they had excellent electrical properties and immunity against electrical stressing as a result of the improved interface stability.

  10. Additional Layers of Violence: The Intersections of Gender and Disability in the Violence Experiences of Women With Physical Disabilities in South Africa.

    Science.gov (United States)

    van der Heijden, Ingrid; Abrahams, Naeemah; Harries, Jane

    2016-04-27

    South Africa has unprecedented levels of violence and many South African women are exposed to violence during their lifetime. This article explores how gender and disability intersect in women's experiences of violence during their lifetime. Repeat in-depth qualitative interviews with 30 physically disabled women in Cape Town reveal that women with physical disabilities are exposed to various forms of violence, and shows how their impairments shape their violence experiences. The most common forms of violence women with disabilities experience are psychological violence, financial abuse, neglect, and deprivation, with disability stigma playing a central role and contributing to how women with disabilities are exploited and dehumanized. Constructions of women as asexual shape their sexual relationships and experiences of sexual violence. This article identifies that women with disabilities are more at risk and experience additional layers of violence than women without disabilities. These additional risks and layers of violence need to be recognized and inform interventions to prevent and respond to violence against women with disabilities in the country. Prevention of violence against women with physical disabilities in South Africa needs to address the role of disability stigma that shapes the types of violence they experience, change gender norms, and create accessible and safe environments and economic empowerment opportunities. © The Author(s) 2016.

  11. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  12. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.

  13. Novel Methodology for Functional Modeling and Simulation of Wireless Embedded Systems

    Directory of Open Access Journals (Sweden)

    Sosa Morales Emma

    2008-01-01

    Full Text Available Abstract A novel methodology is presented for the modeling and the simulation of wireless embedded systems. Tight interaction between the analog and the digital functionality makes the design and verification of such systems a real challenge. The applied methodology brings together the functional models of the baseband algorithms written in C language with the circuit descriptions at behavioral level in Verilog or Verilog-AMS for the system simulations in a single kernel environment. The physical layer of an ultrawideband system has been successfully modeled and simulated. The results confirm that this methodology provides a standardized framework in order to efficiently and accurately simulate complex mixed signal applications for embedded systems.

  14. An improved technique for the detection of pilot contamination attacks in TDD wireless communication systems

    Directory of Open Access Journals (Sweden)

    Mihaylova Dimitriya

    2017-01-01

    Full Text Available One of the problems phasing the physical layer security of a wireless system is its vulnerability to pilot contamination attacks and hence schemes for its detection need to be applied. A method proposed in the literature consists of training with two N-PSK pilots. Although the method is effective in most of the cases, it is not able to discover an attack initiated during the transmission of the second pilot from the pair if both the legitimate and non-legitimate pilots coincide. In this current paper, an improvement to this method is proposed which detects an intruder who misses the first pilot transmission. The suggested improvement eliminates the usage of threshold values in the detection – a main drawback of previously existing solution.

  15. Radial transfer of tracking data with wireless links

    CERN Document Server

    Pelikan, Daniel; Brenner, Richard; Dancila, Dragos; Gustafsson, Leif

    2014-01-01

    Wireless data transfer has revolutionized the consumer mar ket for the last decade giving products equipped with transmitters and receiver for wireless data t ransfer. Wireless technology has fea- tures attractive for data transfer in future tracking detec tors. The removal of wires and connectors for data links is certainly beneficial both for the material b udget and the reliability of the system. One other advantage is the freedom of routing signals which t oday is particularly complicated when bringing the data the first 50 cm outside the tracker. Wit h wireless links intelligence can be built into a tracker by introducing communication betwee n tracking layers within a Region Of Interest which would allow the construction of track primit ives in real time. The wireless signal is transmitted by a passive antenna structure which is a radiat ion hard and much less complex object than an optical link. Due to the requirement of high data rate s in detectors a high bandwidth is required. The frequency band aro...

  16. Layered inorganic solids

    Czech Academy of Sciences Publication Activity Database

    Čejka, Jiří; Morris, R. E.; Nachtigall, P.; Roth, Wieslaw Jerzy

    2014-01-01

    Roč. 43, č. 27 (2014), s. 10274-10275 ISSN 1477-9226 Institutional support: RVO:61388955 Keywords : layered inorganic solids * physical chemistry * catalysis Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 4.197, year: 2014

  17. Implementation of WirelessHART in the NS-2 Simulator and Validation of Its Correctness

    Directory of Open Access Journals (Sweden)

    Pouria Zand

    2014-05-01

    Full Text Available One of the first standards in the wireless sensor networks domain,WirelessHART (HART (Highway Addressable Remote Transducer, was introduced to address industrial process automation and control requirements. This standard can be used as a reference point to evaluate other wireless protocols in the domain of industrial monitoring and control. This makes it worthwhile to set up a reliable WirelessHART simulator in order to achieve that reference point in a relatively easy manner. Moreover, it offers an alternative to expensive testbeds for testing and evaluating the performance of WirelessHART. This paper explains our implementation of WirelessHART in the NS-2 network simulator. According to our knowledge, this is the first implementation that supports the WirelessHART network manager, as well as the whole stack (all OSI (Open Systems Interconnection model layers of the WirelessHART standard. It also explains our effort to validate the correctness of our implementation, namely through the validation of the implementation of the WirelessHART stack protocol and of the network manager. We use sniffed traffic from a realWirelessHART testbed installed in the Idrolab plant for these validations. This confirms the validity of our simulator. Empirical analysis shows that the simulated results are nearly comparable to the results obtained from real networks. We also demonstrate the versatility and usability of our implementation by providing some further evaluation results in diverse scenarios. For example, we evaluate the performance of the WirelessHART network by applying incremental interference in a multi-hop network.

  18. Optimization design of wireless charging system for autonomous robots based on magnetic resonance coupling

    Directory of Open Access Journals (Sweden)

    Junhua Wang

    2018-05-01

    Full Text Available Wireless charging is the key technology to realize real autonomy of mobile robots. As the core part of wireless power transfer system, coupling mechanism including coupling coils and compensation topology is analyzed and optimized through simulations, to achieve stable and practical wireless charging suitable for ordinary robots. Multi-layer coil structure, especially double-layer coil is explored and selected to greatly enhance coupling performance, while shape of ferrite shielding goes through distributed optimization to guarantee coil fault tolerance and cost effectiveness. On the basis of optimized coils, primary compensation topology is analyzed to adopt composite LCL compensation, to stabilize operations of the primary side under variations of mutual inductance. Experimental results show the optimized system does make sense for wireless charging application for robots based on magnetic resonance coupling, to realize long-term autonomy of robots.

  19. Optimization design of wireless charging system for autonomous robots based on magnetic resonance coupling

    Science.gov (United States)

    Wang, Junhua; Hu, Meilin; Cai, Changsong; Lin, Zhongzheng; Li, Liang; Fang, Zhijian

    2018-05-01

    Wireless charging is the key technology to realize real autonomy of mobile robots. As the core part of wireless power transfer system, coupling mechanism including coupling coils and compensation topology is analyzed and optimized through simulations, to achieve stable and practical wireless charging suitable for ordinary robots. Multi-layer coil structure, especially double-layer coil is explored and selected to greatly enhance coupling performance, while shape of ferrite shielding goes through distributed optimization to guarantee coil fault tolerance and cost effectiveness. On the basis of optimized coils, primary compensation topology is analyzed to adopt composite LCL compensation, to stabilize operations of the primary side under variations of mutual inductance. Experimental results show the optimized system does make sense for wireless charging application for robots based on magnetic resonance coupling, to realize long-term autonomy of robots.

  20. Wireless remote monitoring system for sleep apnea

    Science.gov (United States)

    Oh, Sechang; Kwon, Hyeokjun; Varadan, Vijay K.

    2011-04-01

    Sleep plays the important role of rejuvenating the body, especially the central nervous system. However, more than thirty million people suffer from sleep disorders and sleep deprivation. That can cause serious health consequences by increasing the risk of hypertension, diabetes, heart attack and so on. Apart from the physical health risk, sleep disorders can lead to social problems when sleep disorders are not diagnosed and treated. Currently, sleep disorders are diagnosed through sleep study in a sleep laboratory overnight. This involves large expenses in addition to the inconvenience of overnight hospitalization and disruption of daily life activities. Although some systems provide home based diagnosis, most of systems record the sleep data in a memory card, the patient has to face the inconvenience of sending the memory card to a doctor for diagnosis. To solve the problem, we propose a wireless sensor system for sleep apnea, which enables remote monitoring while the patient is at home. The system has 5 channels to measure ECG, Nasal airflow, body position, abdominal/chest efforts and oxygen saturation. A wireless transmitter unit transmits signals with Zigbee and a receiver unit which has two RF modules, Zigbee and Wi-Fi, receives signals from the transmitter unit and retransmits signals to the remote monitoring system with Zigbee and Wi-Fi, respectively. By using both Zigbee and Wi-Fi, the wireless sensor system can achieve a low power consumption and wide range coverage. The system's features are presented, as well as continuous monitoring results of vital signals.

  1. PHYSICS

    CERN Multimedia

    D. Acosta

    2010-01-01

    A remarkable amount of progress has been made in Physics since the last CMS Week in June given the exponential growth in the delivered LHC luminosity. The first major milestone was the delivery of a variety of results to the ICHEP international conference held in Paris this July. For this conference, CMS prepared 15 Physics Analysis Summaries on physics objects and 22 Summaries on new and interesting physics measurements that exploited the luminosity recorded by the CMS detector. The challenge was incorporating the largest batch of luminosity that was delivered only days before the conference (300 nb-1 total). The physics covered from this initial running period spanned hadron production measurements, jet production and properties, electroweak vector boson production, and even glimpses of the top quark. Since then, the accumulated integrated luminosity has increased by a factor of more than 100, and all groups have been working tremendously hard on analysing this dataset. The September Physics Week was held ...

  2. Link Investigation of IEEE 802.15.4 Wireless Sensor Networks in Forests.

    Science.gov (United States)

    Ding, Xingjian; Sun, Guodong; Yang, Gaoxiang; Shang, Xinna

    2016-06-27

    Wireless sensor networks are expected to automatically monitor the ecological evolution and wildlife habits in forests. Low-power links (transceivers) are often adopted in wireless sensor network applications, in order to save the precious sensor energy and then achieve long-term, unattended monitoring. Recent research has presented some performance characteristics of such low-power wireless links under laboratory or outdoor scenarios with less obstacles, and they have found that low-power wireless links are unreliable and prone to be affected by the target environment. However, there is still less understanding about how well the low-power wireless link performs in real-world forests and to what extent the complex in-forest surrounding environments affect the link performances. In this paper, we empirically evaluate the low-power links of wireless sensors in three typical different forest environments. Our experiment investigates the performance of the link layer compatible with the IEEE 802.15.4 standard and analyzes the variation patterns of the packet reception ratio (PRR), the received signal strength indicator (RSSI) and the link quality indicator (LQI) under diverse experimental settings. Some observations of this study are inconsistent with or even contradict prior results that are achieved in open fields or relatively clean environments and thus, provide new insights both into effectively evaluating the low-power wireless links and into efficiently deploying wireless sensor network systems in forest environments.

  3. PHYSICS

    CERN Multimedia

    J. Incandela

    There have been numerous developments in the physics area since the September CMS week. The biggest single event was the Physics/Trigger week in the end of Octo¬ber, whereas in terms of ongoing activities the “2007 analyses” went into high gear. This was in parallel with participation in CSA07 by the physics groups. On the or¬ganizational side, the new conveners of the physics groups have been selected, and a new database for man¬aging physics analyses has been deployed. Physics/Trigger week The second Physics-Trigger week of 2007 took place during the week of October 22-26. The first half of the week was dedicated to working group meetings. The ple¬nary Joint Physics-Trigger meeting took place on Wednesday afternoon and focused on the activities of the new Trigger Studies Group (TSG) and trigger monitoring. Both the Physics and Trigger organizations are now focused on readiness for early data-taking. Thus, early trigger tables and preparations for calibr...

  4. PHYSICS

    CERN Multimedia

    P. Sphicas

    The CPT project came to an end in December 2006 and its original scope is now shared among three new areas, namely Computing, Offline and Physics. In the physics area the basic change with respect to the previous system (where the PRS groups were charged with detector and physics object reconstruction and physics analysis) was the split of the detector PRS groups (the old ECAL-egamma, HCAL-jetMET, Tracker-btau and Muons) into two groups each: a Detector Performance Group (DPG) and a Physics Object Group. The DPGs are now led by the Commissioning and Run Coordinator deputy (Darin Acosta) and will appear in the correspond¬ing column in CMS bulletins. On the physics side, the physics object groups are charged with the reconstruction of physics objects, the tuning of the simulation (in collaboration with the DPGs) to reproduce the data, the provision of code for the High-Level Trigger, the optimization of the algorithms involved for the different physics analyses (in collaboration with the analysis gr...

  5. Green Wireless Power Transfer Networks

    NARCIS (Netherlands)

    Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.

    2016-01-01

    wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.

  6. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  7. Next Generation Intelligent Wireless Infrastructure

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg

    2010-01-01

    Given the commercial success of wireless technologies that has already taken place over the last couple of decades, with a global mobile communication penetration beyond 3 billion subscribers as well as the enormous success of wireless data communication through IEEE 802.11x and Bluetooth, people...

  8. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  9. CWSP Certified Wireless Security Professional Official Study Guide, Exam PW0-204

    CERN Document Server

    Coleman, David D; Harkins, Bryan E

    2010-01-01

    Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802.11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802.11 networks, and managed endpoint security systems. It also covers enterprise/SMB/SOHO/Public-Network Security design models and security solution implementation, building robust security networks, wireless LAN management systems, and much more.

  10. Securing the communication of medical information using local biometric authentication and commercial wireless links.

    Science.gov (United States)

    Ivanov, Vladimir I; Yu, Paul L; Baras, John S

    2010-09-01

    Medical information is extremely sensitive in nature - a compromise, such as eavesdropping or tampering by a malicious third party, may result in identity theft, incorrect diagnosis and treatment, and even death. Therefore, it is important to secure the transfer of medical information from the patient to the recording system. We consider a portable, wireless device transferring medical information to a remote server. We decompose this problem into two sub-problems and propose security solutions to each of them: (1) to secure the link between the patient and the portable device, and (2) to secure the link between the portable device and the network. Thus we push the limits of the network security to the edge by authenticating the user using their biometric information; authenticating the device to the network at the physical layer; and strengthening the security of the wireless link with a key exchange mechanism. The proposed authentication methods can be used for recording the readings of medical data in a central database and for accessing medical records in various settings.

  11. Intelligent Local Avoided Collision (iLAC) MAC Protocol for Very High Speed Wireless Network

    Science.gov (United States)

    Hieu, Dinh Chi; Masuda, Akeo; Rabarijaona, Verotiana Hanitriniala; Shimamoto, Shigeru

    Future wireless communication systems aim at very high data rates. As the medium access control (MAC) protocol plays the central role in determining the overall performance of the wireless system, designing a suitable MAC protocol is critical to fully exploit the benefit of high speed transmission that the physical layer (PHY) offers. In the latest 802.11n standard [2], the problem of long overhead has been addressed adequately but the issue of excessive colliding transmissions, especially in congested situation, remains untouched. The procedure of setting the backoff value is the heart of the 802.11 distributed coordination function (DCF) to avoid collision in which each station makes its own decision on how to avoid collision in the next transmission. However, collision avoidance is a problem that can not be solved by a single station. In this paper, we introduce a new MAC protocol called Intelligent Local Avoided Collision (iLAC) that redefines individual rationality in choosing the backoff counter value to avoid a colliding transmission. The distinguishing feature of iLAC is that it fundamentally changes this decision making process from collision avoidance to collaborative collision prevention. As a result, stations can avoid colliding transmissions with much greater precision. Analytical solution confirms the validity of this proposal and simulation results show that the proposed algorithm outperforms the conventional algorithms by a large margin.

  12. Review of optical wireless communications for data centers

    Science.gov (United States)

    Arnon, Shlomi

    2017-10-01

    A data center (DC) is a facility either physical or virtual, for running applications, searching, storage, management and dissemination of information known as cloud computing, which consume a huge amount of energy. A DC includes thousands of servers, communication and storage equipment and a support system including an air conditioning system, security, monitoring equipment and electricity regulator units. Data center operators face the challenges of meeting exponentially increasing demands for network bandwidth without unreasonable increases in operation and infrastructure cost. In order to meet the requirements of moderate increase in operation and infrastructure cost technology, a revolution is required. One way to overcome the shortcomings of traditional static (wired) data center architectures is use of a hybrid network based on fiber and optical wireless communication (OWC) or free space optics (FSO). The OWC link could be deployed on top of the existing cable/fiber network layer, so that live migration could be done easily and dynamically. In that case the network topology is flexible and adapts quickly to changes in traffic, heat distribution, power consumption and characteristics of the applications. In addition, OWC could provide an easy way to maintain and scale up data centers. As a result total cost of ownership could be reduced and the return on investment could be increased. In this talk we will review the main OWC technologies applicable for data centers, indicate how energy could be saved using OWC multichannel communication and discuss the issue of OWC pointing accuracy for data center scenario.

  13. Pion Condensation and Alternating Layer Spin Model in Symmetric Nuclear Matter : Use of Extended Effective Nuclear Forces : Nuclear Physics

    OpenAIRE

    Teiji, KUNIHIRO; Tatsuyuki, TAKATSUKA; Ryozo, TAMAGAKI; Department of National Sciences, Ryukoku University; College of Humanities and Social Sciences, Iwate University; Department of Physics, Kyoto University

    1985-01-01

    Pion condensation in the symmetric nuclear matter is investigated on the basis of the ALS (alternating-layer-spin) model which provides a good description for the π^0 condensation. We perform energy calculations in a realistic way where the isobar (Δ)-mixing, the short range effects and the exchange energy of the interaction are taken into account. The Δ-mixing effect is built in the model state as previously done in the neutron matter. We preferentially employ G-0 force of Sprung and Banerje...

  14. Intelligent future wireless networks for energy efficiency: overall analysis and standardization activities

    CSIR Research Space (South Africa)

    Kliks, A

    2013-10-01

    Full Text Available solutions supporting sophisticated energy management within each layer of the OSI stack model in the context of wireless networking, as well as the overview of cross-layer energy-efficient applications. All parts of the chapter have adequate references...

  15. Less is more : data reduction in wireless sensor networks

    NARCIS (Netherlands)

    Masoum, Alireza

    2018-01-01

    Wireless sensor networks are monitoring systems consisting of many small, low-cost and low-power devices called sensor nodes. A large number of sensor nodes are deployed in an environment to monitor a physical phenomenon, execute light processes on collected data, and send either raw data or

  16. Energy-aware Wireless Multi-hop Networks

    NARCIS (Netherlands)

    Vazifehdan, J.

    2011-01-01

    Wireless networks have provided us a variety of services which facilitate communication between people beyond the physical boundaries. Mobile telephony, mobile Internet and high-deffnition video calls are examples of services supported by modern networks nowadays. Beyond this, enhancements in

  17. Mechanisms for Prolonging Network Lifetime in Wireless Sensor Networks

    Science.gov (United States)

    Yang, Yinying

    2010-01-01

    Sensors are used to monitor and control the physical environment. A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [18][5]. Sensor nodes measure various parameters of the environment and transmit data collected to one or more sinks, using…

  18. Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract)

    NARCIS (Netherlands)

    Law, Yee Wei; Doumen, Jeroen; Hartel, Pieter H.

    The energy efficiency requirement of wireless sensor networks (WSNs) is especially high because the sensor nodes are meant to operate without human intervention for a long period of time with little energy supply. Besides, available storage is scarce due to their small physical size. Therefore

  19. Influence of Embedded Fibers and an Epithelium Layer on the Glottal Closure Pattern in a Physical Vocal Fold Model

    Science.gov (United States)

    Xuan, Yue; Zhang, Zhaoyan

    2014-01-01

    Purpose: The purpose of this study was to explore the possible structural and material property features that may facilitate complete glottal closure in an otherwise isotropic physical vocal fold model. Method: Seven vocal fold models with different structural features were used in this study. An isotropic model was used as the baseline model, and…

  20. Physical and numerical modelling of natural convection in a fluid layer of small aspect ratio, in the frame of severe accidents of nuclear pressurized water reactors

    International Nuclear Information System (INIS)

    Villermaux, Clotilde

    1999-01-01

    In the framework of PWR reactor accidents studies, the possibility of cooling the corium by the vessel flooding, is analysed. A particular attention is given to the liquid materials of the upper part of this pool. The confinement and the physical properties of this melt pool, may threat the vessel integrity by a heat flux concentration on the vessel lateral wall. A bibliographic study on the thermal transfers in natural convection, enhances the influence of the thermal extreme conditions and the layer geometry on the flow structure and the heat distribution. The lower part of the corium is constituted of an oxides layer. A stability study shows its perenniality: the metallic layer can be slipped of the oxides pool. The results analysis of the experimental program, BALI-metal, is completed by a direct numerical simulation with the TRIOU code. A model of the flow structure allows the find in bulk the experimental results. Finally a numerical simulation of the experimental tests is realized with the thermo-hydraulic code TOLBIAC. (A.L.B.)

  1. Toward the Physical Basis of Complex Systems: Dielectric Analysis of Porous Silicon Nanochannels in the Electrical Double Layer Length Range

    Directory of Open Access Journals (Sweden)

    Radu Mircea Ciuceanu

    2011-01-01

    Full Text Available Dielectric analysis (DEA shows changes in the properties of
    a materials as a response to the application on it of a time dependent electric field. Dielectric measurements are extremely sensitive to small changes in materials properties, that molecular relaxation, dipole changes, local motions that involve the reorientation of dipoles, and so can be observed by DEA. Electrical double layer (EDL, consists in a shielding layer that is naturally created within the liquid near a charged surface. The thickness of the EDL is given by the characteristic Debye length what grows less with the ionic strength defined by half summ products of concentration with square of charge for all solvent
    ions (co-ions, counterions, charged molecules. The typical length scale for the Debye length is on the order of 1 nm, depending on the ionic contents in the solvent; thus, the EDL becomes significant for nano-capillaries that nanochannels. The electrokinetic e®ects in the nanochannels depend essentialy on the distribution of charged species in EDL, described by the Poisson-Boltzmann equation those solutions require the solvent dielectric permittivity. In this work we propose a model for solvent low-frequency permittivity and a DEA profile taking into account both the porous silicon electrode and aqueous solvent properties in the Debye length range.

  2. Contrasting the surface ocean distribution of bromoform and methyl iodide; implications for boundary layer physics, chemistry and climate

    Energy Technology Data Exchange (ETDEWEB)

    Palmer, C J, E-mail: carl.j.palmer@gmail.co [Department of Oceanography, University of Cape Town, 7701 (South Africa)

    2010-08-15

    Bromoform and methyl iodide are both methane-like hydrocarbons with a halogen atom replacing one or more of the hydrogen atoms. Both of these compounds occur naturally in the environment as a result of their production from seaweed and kelp. They are of interest to climate science as a result of their catalytic destruction of boundary layer ozone (a potent greenhouse gas) and, specifically for methyl iodide, the proposed role in the formation of new cloud condensation nuclei with implications for climate. In this paper, the currently available data on the distribution of bromoform and methyl iodide are analysed and contrasted to show that the concentrations of bromoform and methyl iodide do not correlate, that, in contrast to bromoform, the parameterization of sea surface methyl iodide concentrations demands only the sea surface temperature, and that the pelagic distribution of methyl iodide appears to follow the solar zenith angle. These three observations together suggest that, while the pelagic source of bromoform is mostly biogenic, the source of methyl iodide is photochemical. This has implications for the understanding of planetary boundary layer chemistry and potential organohalogen mediated feedbacks to climate.

  3. Physical and electrical characteristics of Si/SiC quantum dot superlattice solar cells with passivation layer of aluminum oxide.

    Science.gov (United States)

    Tsai, Yi-Chia; Li, Yiming; Samukawa, Seiji

    2017-12-01

    In this work, we numerically simulate the silicon (Si)/silicon carbide (SiC) quantum dot superlattice solar cell (SiC-QDSL) with aluminum oxide (Al 2 O 3 -QDSL) passivation. By exploiting the passivation layer of Al 2 O 3 , the high photocurrent and the conversion efficiency can be achieved without losing the effective bandgap. Based on the two-photon transition mechanism in an AM1.5 and a one sun illumination, the simulated short-circuit current (J sc ) of 4.77 mA cm -2 is very close to the experimentally measured 4.75 mA cm -2 , which is higher than those of conventional SiC-QDSLs. Moreover, the efficiency fluctuation caused by the structural variation is less sensitive by using the passivation layer. A high conversion efficiency of 17.4% is thus estimated by adopting the QD's geometry used in the experiment; and, it can be further boosted by applying a hexagonal QD formation with an inter-dot spacing of 0.3 nm.

  4. Physical and electrical characteristics of Si/SiC quantum dot superlattice solar cells with passivation layer of aluminum oxide

    Science.gov (United States)

    Tsai, Yi-Chia; Li, Yiming; Samukawa, Seiji

    2017-12-01

    In this work, we numerically simulate the silicon (Si)/silicon carbide (SiC) quantum dot superlattice solar cell (SiC-QDSL) with aluminum oxide (Al2O3-QDSL) passivation. By exploiting the passivation layer of Al2O3, the high photocurrent and the conversion efficiency can be achieved without losing the effective bandgap. Based on the two-photon transition mechanism in an AM1.5 and a one sun illumination, the simulated short-circuit current (J sc) of 4.77 mA cm-2 is very close to the experimentally measured 4.75 mA cm-2, which is higher than those of conventional SiC-QDSLs. Moreover, the efficiency fluctuation caused by the structural variation is less sensitive by using the passivation layer. A high conversion efficiency of 17.4% is thus estimated by adopting the QD’s geometry used in the experiment; and, it can be further boosted by applying a hexagonal QD formation with an inter-dot spacing of 0.3 nm.

  5. Contrasting the surface ocean distribution of bromoform and methyl iodide; implications for boundary layer physics, chemistry and climate

    International Nuclear Information System (INIS)

    Palmer, C J

    2010-01-01

    Bromoform and methyl iodide are both methane-like hydrocarbons with a halogen atom replacing one or more of the hydrogen atoms. Both of these compounds occur naturally in the environment as a result of their production from seaweed and kelp. They are of interest to climate science as a result of their catalytic destruction of boundary layer ozone (a potent greenhouse gas) and, specifically for methyl iodide, the proposed role in the formation of new cloud condensation nuclei with implications for climate. In this paper, the currently available data on the distribution of bromoform and methyl iodide are analysed and contrasted to show that the concentrations of bromoform and methyl iodide do not correlate, that, in contrast to bromoform, the parameterization of sea surface methyl iodide concentrations demands only the sea surface temperature, and that the pelagic distribution of methyl iodide appears to follow the solar zenith angle. These three observations together suggest that, while the pelagic source of bromoform is mostly biogenic, the source of methyl iodide is photochemical. This has implications for the understanding of planetary boundary layer chemistry and potential organohalogen mediated feedbacks to climate.

  6. PHYSICS

    CERN Multimedia

    Submitted by

    Physics Week: plenary meeting on physics groups plans for startup (14–15 May 2008) The Physics Objects (POG) and Physics Analysis (PAG) Groups presented their latest developments at the plenary meeting during the Physics Week. In the presentations particular attention was given to startup plans and readiness for data-taking. Many results based on the recent cosmic run were shown. A special Workshop on SUSY, described in a separate section, took place the day before the plenary. At the meeting, we had also two special DPG presentations on “Tracker and Muon alignment with CRAFT” (Ernesto Migliore) and “Calorimeter studies with CRAFT” (Chiara Rovelli). We had also a report from Offline (Andrea Rizzi) and Computing (Markus Klute) on the San Diego Workshop, described elsewhere in this bulletin. Tracking group (Boris Mangano). The level of sophistication of the tracking software increased significantly over the last few months: V0 (K0 and Λ) reconstr...

  7. Wireless Technology in K-12 Education

    Science.gov (United States)

    Walery, Darrell

    2004-01-01

    Many schools begin implementing wireless technology slowly by creating wireless "hotspots" on the fly. This is accomplished by putting a wireless access point on a cart along with a set of wireless laptop computers. A teacher can then wheel the cart anywhere in the school that has a network drop, plug the access point in and have an…

  8. Wireless Distributed Antenna MIMO

    DEFF Research Database (Denmark)

    2015-01-01

    The present disclosure relates to system applications of multicore optical fibers. One embodiment relates to a base transceiver station for a wireless telecommunication system comprising a plurality of antenna units arranged in a MIMO configuration and adapted for transmission and/or reception...... of radio-frequency signals, an optical transmitter in the form of an electro-optic conversion unit for each of said plurality of antenna units, each electro-optic conversion unit adapted for converting an RF signal into an optical signal, a plurality of a single core optical fibers for guiding the optical...

  9. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  10. Deployable wireless Fresnel lens

    Science.gov (United States)

    Kennedy, Timothy F. (Inventor); Fink, Patrick W. (Inventor); Chu, Andrew W. (Inventor); Lin, Gregory Y. (Inventor)

    2013-01-01

    Apparatus and methods for enhancing the gain of a wireless signal are provided. In at least one specific embodiment, the apparatus can include a screen comprised of one or more electrically conductive regions for reflecting electromagnetic radiation and one or more non-conductive regions for permitting electromagnetic radiation therethrough. The one or more electrically conductive regions can be disposed adjacent to at least one of the one or more non-conductive regions. The apparatus can also include a support member disposed about at least a portion of the screen. The screen can be capable of collapsing by twisting the support member in opposite screw senses to form interleaved concentric sections.

  11. Wireless Headset Communication System

    Science.gov (United States)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  12. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  13. Wireless installation standard

    International Nuclear Information System (INIS)

    Lim, Hwang Bin

    2007-12-01

    This is divided six parts which are radio regulation law on securing of radio resource, use of radio resource, protection of radio resource, radio regulation enforcement ordinance with securing, distribution and assignment of radio regulation, radio regulation enforcement regulation on utility of radio resource and technical qualification examination, a wireless installation regulation of technique standard and safety facility standard, radio regulation such as certification regulation of information communicative machines and regulation of radio station on compliance of signal security, radio equipment in radio station, standard frequency station and emergency communication.

  14. Wireless Cellular Mobile Communications

    Directory of Open Access Journals (Sweden)

    V. Zalud

    2002-12-01

    Full Text Available In this article is briefly reviewed the history of wireless cellularmobile communications, examined the progress in current secondgeneration (2G cellular standards and discussed their migration to thethird generation (3G. The European 2G cellular standard GSM and itsevolution phases GPRS and EDGE are described somewhat in detail. Thethird generation standard UMTS taking up on GSM/GPRS core network andequipped with a new advanced access network on the basis of codedivision multiple access (CDMA is investigated too. A sketch of theperspective of mobile communication beyond 3G concludes this article.

  15. Optical wireless links with enhanced linearity and selectivity [Invited

    Science.gov (United States)

    Green, Roger J.; Sweet, C.; Idrus, S.

    2005-10-01

    Optical wireless is an attractive medium as an alternative to optical fiber communications, and also to RF, because of its high bandwidth and relative ease of use, especially when it comes to deployment in new physical situations. We describe an optical wireless link approach that offers a performance that gives analog transmission with significantly reduced distortion levels and enhanced reception sensitivity by combining a novel hybrid detector-amplifier technique. Reduction of distortion by 40 dB and improvement in sensitivity of 20-30 dB is possible, using the techniques described.

  16. Passive wireless sensing tags NASA inflatable structures.

    Energy Technology Data Exchange (ETDEWEB)

    Brocato, Robert Wesley

    2006-03-01

    This report gives a description of several types of wireless, unpowered remote sensors. Surface acoustic wave (SAW) devices were coupled with conventional sensors to create entirely new types of sensors. These sensors report physically measurable data in the same manner as the conventional sensors, but they do it remotely and without any local power source. The sensors are measured remotely using a radar-like interrogation device, and the sensors and their related communication electronics draw all of the power needed for communicating from the radar pulse. The report covers only a description of prototype sensors and not of the manufacturing requirements of these devices.

  17. Layered materials

    Science.gov (United States)

    Johnson, David; Clarke, Simon; Wiley, John; Koumoto, Kunihito

    2014-06-01

    Layered compounds, materials with a large anisotropy to their bonding, electrical and/or magnetic properties, have been important in the development of solid state chemistry, physics and engineering applications. Layered materials were the initial test bed where chemists developed intercalation chemistry that evolved into the field of topochemical reactions where researchers are able to perform sequential steps to arrive at kinetically stable products that cannot be directly prepared by other approaches. Physicists have used layered compounds to discover and understand novel phenomena made more apparent through reduced dimensionality. The discovery of charge and spin density waves and more recently the remarkable discovery in condensed matter physics of the two-dimensional topological insulating state were discovered in two-dimensional materials. The understanding developed in two-dimensional materials enabled subsequent extension of these and other phenomena into three-dimensional materials. Layered compounds have also been used in many technologies as engineers and scientists used their unique properties to solve challenging technical problems (low temperature ion conduction for batteries, easy shear planes for lubrication in vacuum, edge decorated catalyst sites for catalytic removal of sulfur from oil, etc). The articles that are published in this issue provide an excellent overview of the spectrum of activities that are being pursued, as well as an introduction to some of the most established achievements in the field. Clusters of papers discussing thermoelectric properties, electronic structure and transport properties, growth of single two-dimensional layers, intercalation and more extensive topochemical reactions and the interleaving of two structures to form new materials highlight the breadth of current research in this area. These papers will hopefully serve as a useful guideline for the interested reader to different important aspects in this field and

  18. Synthesis and physical properties of new layered double hydroxides based on ionic liquids: Application to a polylactide matrix

    KAUST Repository

    Livi, Sébastien

    2012-12-01

    Ionic liquids based on tetraalkylphosphonium salts combined with different anions (decanoate and dodecylsulfonate) have been used as intercalating agents of layered double hydroxides (LDHs) by ion exchange. The synthesized phosphonium-treated LDHs display a dramatically improved thermal degradation and a significant increase in the interlayer distance as confirmed by thermogravimetric analysis (TGA) and X-ray Diffraction (XRD), respectively. To highlight the effect of thermostable ionic liquids, a very low amount of LDHs has been introduced within a polylactide (PLA) matrix and PLA/LDHs nanocomposites have been processed in melt by twin-screw extrusion. Then, transmission electron microscopy (TEM) analysis has been used to investigate the influence of ILs on the different morphologies of these nanocomposites. Even though the thermal stability of PLA matrix decreased, an excellent stiffness-toughness compromise has been obtained. © 2012 Elsevier Inc.

  19. PHYSICAL AND CHEMICAL FUNDAMENTALS OF PROTECTION PROCESSES FOR SURFACE LAYER OF CONCRETE ROAD PAVING BY IMPREGNATING COMPOSITIONS

    Directory of Open Access Journals (Sweden)

    M. K. Pshembayev

    2017-01-01

    Full Text Available Construction of concrete road paving which was started in the 30-ies of the last century in the United States has proved its perspectiveness from the viewpoint of service life. In addition to that an analysis of road usage has shown that concrete paving is a deformation tendency due to some reasons and the tendency entails some difficulties in their repair after rather long operation. The deformations appear more intensively after 5-10-year road operational period. The following negative effects are practically unavoidable: micro-crack formation, scaling, deformation due to freezing of angular edges in concrete plates, destruction of deformation joints etc. The defects are characterized by rather large scope and they are present practically on all the roads. It is necessary to note the fact that a great number of the above-mentioned defects can be avoided on the condition that measures on strengthening surface layer of concrete paving will be undertaken in time. The measures presuppose application of impregnating method while using compositions that contain hydrophobisator and silicon dioxide sol. Industry-produced potassium methyl siliconate, oligomethyl hydride siliconate, tetraethoxysilane have been used as hydrophobisator and they form not easily soluble film on the surface of concrete pores which prevents penetration of water into concrete. Calcium hydrate being formed in the dissolution and hydrolysis process of cement clinker minerals is bound in hydrosilicates which are contained in the solution impregnated by silicon dioxide sol. These hydrosilicates culmatate concrete pores and strengthen its surface layer due to additional hard phase and according to chemical composition it is related to calcium hydrosilicates formed as a result of concrete hardening.

  20. Advanced Measurements of the Aggregation Capability of the MPT Network Layer Multipath Communication Library

    Directory of Open Access Journals (Sweden)

    Gábor Lencse

    2015-05-01

    Full Text Available The MPT network layer multipath communicationlibrary is a novel solution for several problems including IPv6transition, reliable data transmission using TCP, real-time transmissionusing UDP and also wireless network layer routingproblems. MPT can provide an IPv4 or an IPv6 tunnel overone or more IPv4 or IPv6 communication channels. MPT canalso aggregate the capacity of multiple physical channels. In thispaper, the channel aggregation capability of the MPT libraryis measured up to twelve 100Mbps speed channels. Differentscenarios are used: both IPv4 and IPv6 are used as the underlyingand also as the encapsulated protocols and also both UDP andTCP are used as transport protocols. In addition, measurementsare taken with both 32-bit and 64-bit version of the MPT library.In all cases, the number of the physical channels is increased from1 to 12 and the aggregated throughput is measured.